Filtry
wszystkich: 1144
-
Katalog
- Publikacje 1073 wyników po odfiltrowaniu
- Czasopisma 1 wyników po odfiltrowaniu
- Konferencje 3 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 21 wyników po odfiltrowaniu
- Kursy Online 6 wyników po odfiltrowaniu
- Wydarzenia 4 wyników po odfiltrowaniu
- Dane Badawcze 35 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: ATTACK SCENARIO
-
The Novel Findings About the Hussite’s Warfares in the Gdansk/Danzig Surrounding in the Late Summer of 1433
PublikacjaOne of the most spectacular episodes during the Hussite Wars was the Czech raid through the lands of the Teutonic Order up to the Baltic Sea in 1433. Although historians and then-witnesses focused on the sacked Cistercian Abbey in Oliva and soldiers filling the bottles with seawater, the scale of damages in the main harbour of Prussia and its surroundings has not been the subject of research yet. Furthermore, most scholars treatthe...
-
CFD modeling of a diesel evaporator used in fuel cell systems
Publikacja -
CFD analysis of jet flows ejected from different nozzles
Publikacja -
A novel hybrid adaptive framework for support vector machine-based reliability analysis: A comparative study
PublikacjaThis study presents an innovative hybrid Adaptive Support Vector Machine - Monte Carlo Simulation (ASVM-MCS) framework for reliability analysis in complex engineering structures. These structures often involve highly nonlinear implicit functions, making traditional gradient-based first or second order reliability algorithms and Monte Carlo Simulation (MCS) time-consuming. The application of surrogate models has proven effective...
-
Pounding between high-rise buildings with different structural arrangements
PublikacjaEarthquake-induced structural pounding has led to significant damages during previous earthquakes. This paper investigates the effect of pounding on the dynamic response of colliding high-rise buildings with different structural arrangements. Three 3-D buildings are considered in the study, including 5-storey building, 7-storey building and 9-storey building. Three pounding scenarios are also taken into account, i.e. pounding between...
-
Optimised Robust Placement of Hard Quality Sensors for Robust Monitoring of Quality in Drinking Water Distribution Systems
PublikacjaA problem of optimised robust placement of the hard quality sensors in Drinking Water Distribution Systems under several water demand scenarios for robust quality monitoring is formulated. Numerical algorithms to solve the problem are derived. The optimality is meant as achieving at the same time a desired trade off between the sensor capital and maintenance costs and resulting robust estimation accuracy of the monitoring algorithm...
-
Current trends in the field of steganalysis and guidelines for constructions of new steganalysis schemes
PublikacjaThe paper concerns blind steganalysis techniques in the passive steganalysis scenario designed to detect the steganographic cover modification schemes. The goal is to investigate the state-of-art in the field of steganalysis, and, above all, to recognize current trends existing in this field and determine guidelines for constructions of new steganalysis schemes. The intended effects are to examine the possibilities for the development...
-
Blackout initial disturbances in electric Power System searching
PublikacjaThe paper contains short survey of the blackouts that took place in the last few years. The sources and initial disturbances are discussed. The typical scenario of the disturbance, leading to blackout in the electrical power system are presented.Next, models of a power system eligible to considered topic are discussed. Finally the algorithm of the blackout initial disturbances in power system searching is presented.The consideration...
-
Controlling nodal displacement of pantographic structures using matrix condensation and interior-point optimization: A numerical and experimental study
PublikacjaThis study presents an innovative approach for the precise control of nodal displacements in pantographic structures. The method is founded on the Matrix Condensation of Force Method, seamlessly integrated with an Interior Point Optimization algorithm. This combination offers a unique advantage by allowing users to manipulate displaced nodes within a defined coordination domain. Furthermore, this approach introduces the Interior...
-
Subrahmanyam Sappati Ph. D
OsobyTenure track faculty position at the Gdansk University of Technology, Gdansk, Poland. (Nobelium grant fellow)! Working on the behavior of short hydrogen bonds SB both in-ground and excited state in crystals, aqueous & bio environ
-
Influence of windsurfing fin stiffness distribution on the lift-drag characteristics
PublikacjaThis article addresses the problem of determining the hydromechanical loads generated by flexible hydrofoils. The research was done on the example of the composite windsurfing fin for the RS:X monotype class. Despite the assumption of fins identity, everyday practice showed that variations of mechanical properties occur and strongly affect their performance. Therefore, we decided to study the differences between the windsurfing...
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublikacjaNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Architektura pomników poświęconych ofiarom ataków terrorystycznych jako kontynuacja realizacji komemoratywnych kształtowanych w postpamięci
Publikacjaarchitecture of Memorials Dedicated to the Victims of terrorist attacks as a continuation of commemorative Structures created within Post-memory Having the rich art of commemorating events of the Second World War as a key reference, this article will try to show how contemporary architectural interven- tions in public space make attempts to respond to the social need of dealing with traumatic events and formulating a new attitude...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Government in the metaverse: Requirements and suitability for providing digital public services
PublikacjaDigital government comprises all means to enable governments to interact with their constituents digitally. The metaverse provides a virtual reality environment where various activities can be carried out without physically visiting the places of interest, including the public authorities. Yet, how governments can use the metaverse is unknown. This paper aims to extend the understanding of the metaverse architecture requirements...
-
An optimized system for sensor ontology meta-matching using swarm intelligent algorithm
PublikacjaIt is beneficial to annotate sensor data with distinct sensor ontologies in order to facilitate interoperability among different sensor systems. However, for this interoperability to be possible, comparable sensor ontologies are required since it is essential to make meaningful links between relevant sensor data. Swarm Intelligent Algorithms (SIAs), namely the Beetle Swarm Optimisation Algorithm (BSO), present a possible answer...
-
Service and Path Discovery Extensions for Self-forming IEEE 802.11s Wireless Mesh Systems
PublikacjaWith the rapid growth of the quantity and capabilities of end-user electronic devices, both stationary and mobile, they are employed in increasing number of applications. In this situation, wireless network technologies begin to play a crucial role as networks access technologies, as cable-based solutions tend to be of limited utility in case of easily portable or mobile devices. Resulting development of wireless technologies reached...
-
Coastal Cliffs Monitoring and Prediction of Displacements Using Terrestial Laser Scanning
PublikacjaCoastal cliffs are very sensitive to degradation caused by erosion and abrasion. Thus, it is very important to monitor susceptibility of the cliffs in terms of slope angles and ground fall resulting from vertical morphology of the cliffs. The results could be used for example to establish the boundaries of the safe investments zone or retreat infrastructure buildings in case of real threat such as degradation of the objects of...
-
Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture
PublikacjaThe aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors. The authors present the architecture of the designed system along with the employed workflows for embedding and extracting the watermark followed by the implementation phase description and the analysis of the experimental results. Some possible attack simulations on the embedded watermarks are reviewed,...
-
Diver Observations by Means of Acoustic Methods
PublikacjaSearching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...
-
Energy Recovery Analysis in A-Type Pressure Regulation and Measurement Stations in Istanbul, Esenyurt
Publikacja -
Applying Web 2.0 Concepts to Creating Energy Planning Portal
PublikacjaCommunity authorities in Europe are tasked to create Advanced Local Energy Plans (ALEP), which encompasses collecting local data on current energy use and generation, as well as generating future development scenarios. Both the data and the development scenarios must be publicly accessible as a basis for energy-related decisions taken by residents, local companies and other local institutions. The data must partially be collected...
-
Flexible Knowledge–Vision–Integration Platform for Personal Protective Equipment Detection and Classification Using Hierarchical Convolutional Neural Networks and Active Leaning
PublikacjaThis work is part of an effort to develop of a Knowledge-Vision Integration Platform for Hazard Control (KVIP-HC) in industrial workplaces, adaptable to a wide range of industrial environments. The paper focuses on hazards resulted from the non-use of personal protective equipment (PPE). The objective is to test the capability of the platform to adapt to different industrial environments by simulating the process of randomly selecting...
-
International Telecommunication Networks and Applications Conference (Australian Telecommunication Networks and Applications Conference [ATNAC])
Konferencje -
Multi-Criteria Knowledge-Based Recommender System for Decision Support in Complex Business Processes
PublikacjaIn this paper, we present a concept of a multi-criteria knowledge-based Recommender System (RS) designed to provide decision support in complex business process (BP) scenarios. The developed approach is based on the knowledge aspects of Stylistic Patterns, Business Sentiment and Decision-Making Logic extracted from the BP unstructured texts. This knowledge serves as an input for a multi-criteria RS algorithm. The output is prediction...
-
An Empirical System Loss Model for Body Area Networks in a Passenger Ferry Environment
PublikacjaThis paper presents a general empirical system loss model for estimating propagation loss in Body Area Networks in off-body communications at 2.45 GHz in a passenger ferry environment. The model is based on measurements, which were carried out in dynamic scenarios in the discotheque passenger ferry environment. The model consists of three components: mean system loss, attenuation resulting from the variable antenna position on...
-
Disciplines and measures of information resilience
PublikacjaCommunication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...
-
Balancing Energy Inputs/Outputs and GHG Emissions for Sustainable Wastewater Treatment – a Case Study
PublikacjaThe aim of the study is a model-based evaluation of the selected operating modes and technological upgrades on the energy balance and greenhouse gas (GHG) emissions in a large wastewater treatment plant in the city of Slupsk (northern Poland). The considered scenarios focus on energy savings for aeration, increasing energy recovery via biogas cogeneration and reduction of the CO2 equivalent emission from both direct processes (related...
-
An Empirical System Loss Model for Body Area Networks in a Passenger Ferry Environment
PublikacjaThis paper presents a general empirical system loss model for estimating propagation loss in Body Area Networks in off-body communications at 2.45 GHz in a passenger ferry environment. The model is based on measurements, which were carried out in dynamic scenarios in the discotheque passenger ferry environment. The model consists of three components: mean system loss, attenuation resulting from the variable antenna position on...
-
Energy Efficiency Study of Audio-video Content Consumption on Selected Android Mobile Terminals
PublikacjaMobile devices are widely used by billions of users worldwide. Thanks to their main advantage, which is portability, they should be fully operational as long as possible, without the need to recharge or connect them to external power sources. This paper describes a study, carried out on four different mobile devices, with different hardware and software parameters, running the Android operating system. The research campaign involved...
-
Bioterrorism — characteristics and possibilities of prevention
PublikacjaIn the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.
-
Mode choice modelling for urban areas
PublikacjaThe article presents the question of mode choice modelling in a four-stage travel modelling process. The article indicates limitations of currently used simplified methods of mode choice modelling and presents the possibility of using a more detailed approach that accounts for additional, statistically significant factors with the use of advanced mathematical tools, discrete choice models. A need has also been identified to include...
-
Distributed representation of information on cyclic events
PublikacjaA representation of information on cyclic events has been proposed which is advantageous for computing environments where a distributed set of Receivers reacts to cyclic events generated by distributed sources. In such scenario no immanent central information repository exist on event timing or volume. Receivers are able to learn the event cycles without communicating with each other, merely on the basis of the fact that an event...
-
Device for spoofing in global positioning system
PublikacjaThis article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...
-
Incremental dynamic analysis and fragility assessment of buildings founded on different soil types experiencing structural pounding during earthquakes
PublikacjaThe effect of the soil type on buildings experiencing pounding during earthquakes is investigated in this study using the incremental dynamic analysis and fragility assessment methods. Three 3-D structures with different number of storeys (4, 6 and 8) were considered in this study. Three pounding scenarios between these three buildings were taken into account, i.e. pounding between 4-storey and 6-storey buildings, between 4-storey...
-
Bio-inspired Urban Design: Smart Growth and Sustainable Development Frameworks for a New Urban Unit in Cracow
PublikacjaIn March 2012, architects João Diniz (Brazil) and Dorota Wiśniewska (Poland) answered a call to competition from the City of Cracow, submitting an entry for the redesign of 5600 ha of the Nowa Huta district in eastern Cracow, focusing on economic revitalization within a framework of smart growth and sustainable development. The scenario included an ArcerolMittal Steelworks and incorporated a strong ecological analysis for the easternmost...
-
Mobility Oriented Development (MOD): Public-Private Partnership in Urban Parking & Traffic Management with the Use of Autonomous Automobiles, Car-Sharing, Ridesharing Modes of Transport & Mobility as a Service (MaaS)
PublikacjaThe focus of the following research are relations between mobility technologies and metropolitan (urban and suburban) spatial structures. In this paper the author discusses various urban modes of transport (automobile, mass transit) in the context of emerging technical (autonomous vehicles, self-driving cars and driverless shuttles) and organizational (carpooling, ridesharing, car-sharing, on-demand mobility) solutions for " mobility...
-
Jerzy Konorski dr hab. inż.
OsobyJerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...
-
Applicability of null-steering for spoofing mitigation in civilian GPS
PublikacjaCivilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of the effective countermeasures, covering detection and mitigation, is necessary...
-
Multipartite secret key distillation and bound entanglement
PublikacjaRecently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable...
-
Experience Based Clinical Decision Support Systems: An Overview and Case Studies
PublikacjaThis chapter briefly overviews the evolution of the application of the Decisional DNA and the Set of Experience Knowledge Structure (SOEKS) in the medical domain and in particular in the specific case of the experience-based decision support systems. Decisional DNA, as a knowledge representation structure, offers great possibilities on gathering explicit knowledge of formal decision events as well as a tool for decision making...
-
Previous Opinions is All You Need - Legal Information Retrieval System
PublikacjaWe present a system for retrieving the most relevant legal opinions to a given legal case or question. To this end, we checked several state-of-the-art neural language models. As a training and testing data, we use tens of thousands of legal cases as question-opinion pairs. Text data has been subjected to advanced pre-processing adapted to the specifics of the legal domain. We empirically chose the BERT-based HerBERT model to perform...
-
Dynamic unattended measurement based routing algorithm for diffServ architecture
PublikacjaDynamic routing is very important in terms of assuring QoS in today's packet networks especially for streaming and elastic services. Existing solutions dedicated to dynamic routing are often too complicated and seem to be not usable in real time traffic scenarios where transferred traffic may vary significantly. This was the main reason for research and new routing mechanism proposal which should apply to today's packet networks....
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublikacjaWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Rendezvous of Heterogeneous Mobile Agents in Edge-Weighted Networks
PublikacjaWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublikacjaThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
PTR-MS and electronic nose application for volatile fraction analysis of cigar tobacco
PublikacjaCigar consumers attach great importance to the quality of these products. At the same time, cigars are often expensive, so destructive analytical methods of quality control are not being desired. However, it has been found that there are many volatile organic compounds in their headspace. Because of that, proton transfer reaction–mass spectrometry and electronic nose were used to analyse it. The obtained results were used to distinguish...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublikacjaThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Sharp transitions in low-number quantum dots Bayesian magnetometry
PublikacjaWe consider Bayesian estimate of static magnetic field, characterized by a prior Gaussian probability distribution, in systems of a few electron quantum dot spins interacting with infinite temperature spin environment via hyperfine interaction. Sudden transitions among optimal states and measurements are observed. Usefulness of measuring occupation levels is shown for all times of the evolution, together with the role of entanglement...