20 research outputs found

    Class action

    Get PDF
    Zadanie pt. „Digitalizacja i udostępnienie w Cyfrowym Repozytorium Uniwersytetu Łódzkiego kolekcji czasopism naukowych wydawanych przez Uniwersytet Łódzki” nr 885/P-DUN/2014 dofinansowane zostało ze środków MNiSW w ramach działalności upowszechniającej naukę

    Diffusion in Networks, Journal of Telecommunications and Information Technology, 2012, nr 2

    Get PDF
    In this paper a concept of method and its application examining a dynamic of diffusion processes in networks is considered. Presented method was used as a core framework for system CARE (Creative Application to Remedy Epidemics)

    The prediction of terrorist threat on the basis of semantic association acquisition and complex network evolution, Journal of Telecommunications and Information Technology, 2008, nr 2

    Get PDF
    In this paper, which is the continuation of an MCC 2006 Conf. publication by the same group of authors, we propose a concept of early detection of terrorist action preparation activities. Our ideas rely on semantic and complex networks to extract useful information for terrorist threat indication. Presented methods will be used as a core framework for Early Warning System

    The Upper Cretaceous Ostravice Sandstone in the Polish sector of the Silesian Nappe, Outer Western Carpathians

    Get PDF
    The Ostravice Sandstone Member was identified and described as a lithostratigraphic unit in the Polish part of the Outer Carpathians. This division occurs in the lowermost part of the Godula Formation, is underlain by variegated deposits of the Mazák Formation or directly by the Barnasiówka and Lhoty formations, and overlain by the Czernichów Member of the Godula Formation. Domination by thick- and very thick-bedded sandstones, conglomeratic sandstones and conglomerates rich in calcareous clasts, mostly of the Štramberk-type limestones, is typical for the Ostravice Sandstone Member. These deposits are widespread between the Moravskoslezské Beskydy Mountains in the Czech Republic and the Ciężkowice Foothills in Poland. The documentation of the Ostravice Sandstone Member occurrence as well as the petrological, sedimentological features, and inventory of the carbonate clasts are presented here

    Design status of ASPIICS, an externally occulted coronagraph for PROBA-3

    Get PDF
    The "sonic region" of the Sun corona remains extremely difficult to observe with spatial resolution and sensitivity sufficient to understand the fine scale phenomena that govern the quiescent solar corona, as well as phenomena that lead to coronal mass ejections (CMEs), which influence space weather. Improvement on this front requires eclipse-like conditions over long observation times. The space-borne coronagraphs flown so far provided a continuous coverage of the external parts of the corona but their over-occulting system did not permit to analyse the part of the white-light corona where the main coronal mass is concentrated. The proposed PROBA-3 Coronagraph System, also known as ASPIICS (Association of Spacecraft for Polarimetric and Imaging Investigation of the Corona of the Sun), with its novel design, will be the first space coronagraph to cover the range of radial distances between ~1.08 and 3 solar radii where the magnetic field plays a crucial role in the coronal dynamics, thus providing continuous observational conditions very close to those during a total solar eclipse. PROBA-3 is first a mission devoted to the in-orbit demonstration of precise formation flying techniques and technologies for future European missions, which will fly ASPIICS as primary payload. The instrument is distributed over two satellites flying in formation (approx. 150m apart) to form a giant coronagraph capable of producing a nearly perfect eclipse allowing observing the sun corona closer to the rim than ever before. The coronagraph instrument is developed by a large European consortium including about 20 partners from 7 countries under the auspices of the European Space Agency. This paper is reviewing the recent improvements and design updates of the ASPIICS instrument as it is stepping into the detailed design phase

    Preventive Action in Comparative Law

    No full text
    Zadanie pt. „Digitalizacja i udostępnienie w Cyfrowym Repozytorium Uniwersytetu Łódzkiego kolekcji czasopism naukowych wydawanych przez Uniwersytet Łódzki” nr 885/P-DUN/2014 dofinansowane zostało ze środków MNiSW w ramach działalności upowszechniającej naukę

    Modeling and simulation of botnet based cyber-threats

    No full text
    The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed

    Adaptive method of similarity detection of user profiles on Online Social Networks

    No full text
    W pracy podjęto próbę opracowania adaptacyjnej metody uwzględniającej strukturalne i ilościowe związki między kontami w Internetowej Sieci Społecznej w celu wykrywania potencjalnie sklonowanych profili użytkowników. Wprowadzono również technikę kontenerów podobieństwa, pozwalającą na grupowanie atrybutów profilu użytkownika ze względu na typ danych oraz istotność. Zaprezentowano przykład liczbowy, który ilustruje działanie opracowanej metody. Zasygnalizowano przydatność opracowania symulatora pozwalającego na badanie wpływu zawiązywania znajomości między użytkownikami Internetowej Sieci Społecznej na skuteczność wykrywania sklonowanych profili użytkowników, dając tym samym podstawy do zbudowania środowiska prognozującego klonowanie profili.The paper presents a method, based on graph and network theory, which allows to detect cloned user profiles on Online Social Networks. Moreover, an idea of similarity containers, which gives an opportunity to incorporate importance and context of data into a model, was introduced. The presented solutions were adapted to the idea of simulation environment, which will allow to detect a profile cloning process before that activity will be completely performed by an attacker

    Modeling and simulation of botnet based cyber-threats

    No full text
    The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed
    corecore