In the article a short historical outline of noise control conferences organized in Poland is given. Those conferences with the participation of Polish specialists have been organized since 1964; since 1976 they have been evolved into International Noise Control Conferences. Silhouettes of four Polish scientists, which have made a large contribution to the noise and vibration control in Poland, are presented. Also the current state of threats by noise and vibrations have been briefly mentioned. The significance of such conferences has been emphasized.
Nairobi International Convention on the Removal of Wrecks came into force on 14th April 2015 and has been ratified by now by over 40 states across the world (among them Australia, China, India, South Africa and most of the EU countries). The convention provides legal framework for action taken by the Coastal States aiming at removal of wrecks posing danger or impediment to navigation, as well as to the marine environment, or damage to the coastline or related interests of one or more States.
The Convention fills the existing legal gap by enabling the States to remove wrecks beyond their territories (as well as within if States decide so). Beside the existing international regulations like Intervention Convention or UNCLOS, the Nairobi Convention clarifies the Costal State’s rights to remove wrecks from its EEZ if they pose a danger for safe navigation or marine environment. The Convention corresponds with mentioned conventions but also equips Coastal States with new legal instruments to deal with hazardous wrecks beyond their territory. The aim of the paper is to analyse the new rights and duties of states, as well as scope of the notion of navigational and environmental threats causes by wrecks. It will refer also to regulatory problems faced by the states implementing the Convention. Even if the Convention is to be applied to territorial sea, its multiple provisions are not. Moreover, the Convention leaves many important aspects unregulated. Those issues will be analysed from the perspective of a country which has not yet ratified the Convention, and will be confronted with the experience from other jurisdictions.
The article herein presents the method and algorithms for forming the feature space for the base of intellectualized system knowledge for the support system in the cyber threats and anomalies tasks. The system being elaborated might be used both autonomously by cyber threat services analysts and jointly with information protection complex systems. It is shown, that advised algorithms allow supplementing dynamically the knowledge base upon appearing the new threats, which permits to cut the time of their recognition and analysis, in particular, for cases of hard-to-explain features and reduce the false responses in threat recognizing systems, anomalies and attacks at informatization objects. It is stated herein, that collectively with the outcomes of previous authors investigations, the offered algorithms of forming the feature space for identifying cyber threats within decisions making support system are more effective. It is reached at the expense of the fact, that, comparing to existing decisions, the described decisions in the article, allow separate considering the task of threat recognition in the frame of the known classes, and if necessary supplementing feature space for the new threat types. It is demonstrated, that new threats features often initially are not identified within the frame of existing base of threat classes knowledge in the decision support system. As well the methods and advised algorithms allow fulfilling the time-efficient cyber threats classification for a definite informatization object.
The purpose of this article is to identify and assess environmental risks that may have the greatest impact on the future of humanity. They were divided into two basic groups, i.e. for natural processes and resources. In addition, climate change is described as different group. The authors decided, that a holistic approach to this issue is more desirable than dividing it into two above-mentioned groups. The comparison of various threats was possible due to the application of identical assessment criteria, such as: the harmfulness, rate of spread, scope and moment of occurrence of a given group of threats. Each of the listed criteria has been evaluated on a five-point scale, where 1 has the smallest and 5 the largest impact force. The obtained results show the leading importance of natural processes in maintaining the existing Earth system. In addition, the authors point to a greater risk of problems related to renewable resources than non-renewable one. As a result, it can be assumed that the current degradation of natural processes and excessive use of resources is likely to lead to the risk of global disasters.
The paper depicts a complex, distributed information system aimed at promoting cybersecurity awareness at the national level. The system, that is built in accordance with the Act on National Cybersecurity, passed by the Polish Parliament, enables collecting and processing in near-real time available information on the security status of essential services and digital services and, also, provides for assessment of negative impact of the identified threats concerned with the provision of those services. Advanced access control and dissemination mechanisms, for secure information sharing within the system, are provided in order to aggregate distributed knowledge and use this information for online security risk analysis and for generation and distribution of early warnings.
Almost every construction investment should contain elements of risk forecasting, whose validity depends, among other things, on the correct assessment of potential threats. These risks were defined by the Authors as risk factors that were characterized and then grouped on the basis of performed research in the scope of their identification. Due to lack of method of scheduling railway investments on the construction market, including risk assessment, a research effort was undertaken [14-17], the result of which is the proposed method. The article presents the main assumptions of the original method of rail investment planning, which on the one hand, will take into account the impact of potential threats identified previously by the Authors, and, on the other, will allow project managers to refer to the conditions in which the implementation of a specific facility is planned. The assumption was made that the method, relatively easy to implement, supported by an appropriate computational program, will encourage teams planning the implementation of railway undertakings to its application and will improve the reliability of the schedules they develop.