Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The aim of this paper is to highlight the central role of the human in aviation security. This means that appropriate competencies are essential for this service to achieve its objective of protecting civil aviation from illegal acts. However, with the advent of automation, and coupled with enhanced awareness to costs, competency requirements have changed significantly. This paper also seeks to identify...
The security of a complex site is strongly dependent on the use of integrated technological systems. Any weakness of the integrated system involves a weakness of the security of the site itself. For this reason it is necessary to design and realize highly integrated, efficient and reliable security systems. The authors illustrate the work made to design and realize the integrated security system of...
Heightened concerns about the treatment of individuals during interviews and interrogations have stimulated efforts to develop ldquonon-intrusiverdquo technologies for rapidly assessing the credibility of statements by individuals in a variety of sensitive environments. Methods or processes that have the potential to precisely focus investigative resources will advance operational excellence and improve...
The effect of changing the image resolution over a biometric system based on hand geometry is analyzed in this paper. Image resolution is progressively diminished from an initial 120 dpi resolution up to 24 dpi. The robustness of the examined system is analyzed with 2 databases and two identifiers. The first database acquires the images of the hand underneath whereas the second database acquires the...
Robust and secure transmission strategy for high-quality image through wireless networks is considered a great challenge. However, majority of encrypted image transmission schemes do not consider well the effect of bit errors occurring during transmission and this issue is considered a problem that should be handled by an efficient coding scheme. In this paper, a modified wireless image transmission...
The resolution of emergency crises and natural disasters is heavily dependent, among other things, on efficient supply chain management to bring the necessary material to the first time responders. The supply chain used in the resolution of emergency crises must have capabilities of agility and flexibility to respond to the challenges, which are typical of these scenarios. Emergency crises are often...
To improve understanding of how to achieve effective performance in an airport search comb a simulation of the complete search process was constructed. The simulation was developed in two stages: a model of the processes underlying the search comb team task was constructed in the Integrated Performance Modelling Environment (IPME) so that the consistency of the task times and reliability could be...
This paper describes a new intelligent control and diagnostic system for public air transport. System operation modes and diagnostic methods were studied during hard/ and software development of public air transport. To provide safe operation of equipment, the most important functions are rapid pinpointing of faults and evaluation of defective systems, devices and components.
Access control systems consist of many components. Development is often focused on the more complex technologies used in such systems, such as the electronics, network security and biometrics used. However, more basic vulnerabilities also need to be assessed when evaluating access control installations and components. Standards exist for testing the physical and electrical security of locking systems...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.