Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "detection algorithm" wg kryterium: Temat


Tytuł:
The study of the spoofer’s some properties with help of GNSS signal repeater
Autorzy:
Ochin, E.
Lemieszewski, Ł.
Lusznikov, E.
Dobryakova, L.
Powiązania:
https://bibliotekanauki.pl/articles/358948.pdf
Data publikacji:
2013
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
satelite navigation systems
transport equipment
spoofer
spoofing detection algorithm
signal receiver
Opis:
Satellite navigation systems are widely used in navigation for precise trajectory determination of transport equipment. In this article mathematical models and algorithms have been developed to solve the problems of precision and safety of satellite navigation. One of the problems is spoofing (substitution) – a situation in which a system (hardware, software, etc.) successfully masquerades as another by falsifying data system and performs illegal actions. What is considered in the paper is spoofing detection algorithm based on the analysis of a civil satellite signal generated by the two receivers but instead a fully functional Spoofer GNSS signal repeater was used. This work is intended to equip GNSS users and receiver manufacturers with authentication methods that are effective against unsophisticated spoofing attacks. The work also serves to refine the civilian spoofing threat assessment by demonstrating the challenges involved in mounting a spoofing attack.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2013, 36 (108) z. 2; 159-165
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cloud-based GNSS navigation spoofing detection
Autorzy:
Dobryakova, Larisa
Lemieszewski, Łukasz
Ochin, Evgeny
Powiązania:
https://bibliotekanauki.pl/articles/135509.pdf
Data publikacji:
2019
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
Cloud-based GNSS
GNSS
antiterrorism
antispoofing
transport safety
spoofer
spoofing detection algorithm
Opis:
Satellite navigation systems are commonly used to precisely determine the trajectory of transportation equipment. The widespread deployment of GNSS is pushing the current receiver technology to its limits due to the stringent demands for seamless, ubiquitous and secure/reliable positioning information. This fact is further aggravated by the advent of new applications where the miniaturized size, low power consumption and limited computational capabilities of user terminals pose serious risks to the implementation of even the most basic GNSS signal processing tasks. This paper has presented the advantage of Cloud-based GNSS Navigation, which facilitates the possibility of developing innovative applications where their particularities (e.g. massive processing of data, cooperation among users, security-related applications, etc.) make them suitable for implementation using Cloud-based infrastructure.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2019, 57 (129); 29-37
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Spoofing detection for underwater acoustic GNSS-like positioning systems
Autorzy:
Ochin, Evgeny
Powiązania:
https://bibliotekanauki.pl/articles/135055.pdf
Data publikacji:
2019
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
antiterrorism
GNSS
spoofer
antispoofing
spoofing detection algorithm
underwater vehicle
underwater transport safety
acoustic communication
Opis:
The need for accuracy, precision, and data registration in underwater positioning and navigation should be viewed as no less stringent than that which exists on the sea surface. In the same way in which GNSS (Global Navigation Satellite System) receivers rely on the signals from multiple satellites to calculate a precise position, undersea vehicles discern their location by ranging to the acoustic signals originating from several fixed underwater acoustic sources using the Time-of-Arrival algorithm (ToA) through the Ordinary Least Squares method (OLS). In this article, the scope has been limited to only considering underwater positioning systems in which the navigation receiver is acoustically passive. The receiver “listens” to the buoys, receives their messages and solves the problem of finding its own position based on the geographical coordinates of the buoys. Often, such systems are called GNSS-like Underwater Positioning Systems (GNSS-like UPS). It is important to note the distinction between general purpose GNSS-like UPS (mainly civil systems) and special purpose GNSS-like UPS (mainly military systems). In this article, only general purpose GNSS-like UPS systems have been considered. Depending on the scale of system’s service areas, GNSS-like UPS are divided into global, regional, zonal and local systems. Only local GNSS-like UPS systems have been considered in this article. The spoofing of acoustic GNSS-like UPS works as follows: the acoustic GNSS signal generator transmits a simulated signal of several satellites. If the level of the simulated signal exceeds the signal strength of the real satellites, the acoustic receiver of an underwater object will “capture” the fake signal and calculate a false position based on it. All receivers that fall into the spoofing zone will calculate the same coordinates, while the receivers located in different places will have a mismatch in the XYZ coordinates.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2019, 57 (129); 38-46
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Novel rogue optical network unit detection algorithm for gigabit passive optical networks
Autorzy:
Horvath, T.
Munster, P.
Dubravec, L.
Filka, M.
Powiązania:
https://bibliotekanauki.pl/articles/174637.pdf
Data publikacji:
2016
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
gigabit passive optical network
GPON
rogue optical network unit
ONU
data analysis
detection algorithm
Opis:
Passive optical networks are widely used as a promising solution for future access networks. Currently, the bandwidth is still increasing which means the current copper networks are not able to transfer new services such as 4K video, live streaming, etc. In other words, they reached their capacity limit. The passive optical networks rely on point-to-multipoint technology. That means each customer uses a share medium by time slots. Each time slot exactly specifies who and when is able to transfer data. In general, this control mechanism is implemented in the optical network unit by worst transmission convergence layer. On the other hand, there are cases when the optical network unit (it is called rogue optical network unit) does not follow instructions provided by the optical line termination, for example, if an attacker modifies a firmware of the end unit and/or when the control protocol is not loaded properly inside optical network unit. In worst case, the optical network unit transmits data in a continual mode (other optical network units cannot send data). Thestandard defines finding of the rogue optical network unit but it does not specify how the rogue optical network unit should be allocated because the frames of the rogue optical network unit do not contain the proper parameters. We realized a measurement in a real network with the rogue optical network unit and then we analyzed the captured data. A new algorithm for the rogue optical network unit allocation is presented. We do not consider any modification of the transmission convergence layer in gigabit passive optical networks.
Źródło:
Optica Applicata; 2016, 46, 3; 421-433
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Design of a vision‐based autonomous turret
Autorzy:
Louali, Rabah
Negadi, Djilali
Hamadouche, Rabah
Nemra, Abdelkrim
Powiązania:
https://bibliotekanauki.pl/articles/27314239.pdf
Data publikacji:
2022
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
autonomous turret
stepper motor
DC motor
vision based control
Tracking‐Learning‐Detection algorithm
TLD algorithm
Kalman based visual tracking
Opis:
This article describes the hardware and software de‐ sign of a vision‐based autonomous turret system. A two degree of freedom (2 DOF) turret platform is designed to carry a cannon equipped with an embedded camera and actuated by stepper motors or direct current motors. The turret system includes a central calculator running a visual detection and tracking solution, and a microcon‐ troller, responsible for actuators control. The Tracking‐ Learning‐Detection (TLD) algorithm is implemented for target detection and tracking. Furthermore, a Kalman filter algorithm is implemented to continue the tracking in case of occlusion. The performances of the designed turret, regarding response time, accuracy and the execu‐ tion time of its main tasks, are evaluated. In addition, an experimental scenario was performed for real‐time autonomous detection and tracking of a moving target.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2022, 16, 4; 72--77
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
GPS/GNSS spoofing and the real-time single-antenna-based spoofing detection system
Autorzy:
Ochin, E.
Powiązania:
https://bibliotekanauki.pl/articles/135406.pdf
Data publikacji:
2017
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
Global Navigation Satellite System
Global Positioning System
anti-terrorism
anti-spoofing
transport safety
spoofer
spoofing detection algorithm
Opis:
The idea of C/A codes GPS/GNSS Spoofing (Substitution), or the ability to mislead a satellite navigation receiver into establishing a position or time fix which is incorrect, has been gaining attention as spoofing has become more sophisticated. Various techniques have been proposed to detect if a receiver is being spoofed – with varying degrees of success and computational complexity. If the jammer signals are sufficiently plausible then the GNSS receiver may not realize it has been duped. There are various means of detecting spoofing activity and hence providing effective mitigation methods. In this paper, a novel signal processing method applicable to a single antenna handset receiver for spoofing detection has been described. Mathematical models and algorithms have been developed to solve the problems of satellite navigation safety. What has been considered in the paper is a spoofing detection algorithm based on the analysis of a civil satellite signal generated by mobile C/A GPS/GNSS single-antenna receivers. The work has also served to refine the civilian spoofing threat assessment by demonstrating the challenges involved in mounting a spoofing attack.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2017, 52 (124); 145-153
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Modelowanie i optymalizacja procedur detekcji zagrożeń epidemiologicznych
Autorzy:
Ameljańczyk, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/111029.pdf
Data publikacji:
2019
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
podobieństwo
wskaźniki podobieństwa
relacje podobieństwa
patogeny
modele zagrożeń epidemiologicznych
wzorzec zagrożenia epidemiologicznego
algorytmy detekcji zagrożeń
similarity
similarity indicators
similarity relations
pathogens
threat detection
epidemiological system
detection algorithm
Opis:
W pracy przedstawiono ogólny model procedury rozpoznawania zagrożeń epidemiologicznych oparty na wielokryterialnej ocenie podobieństwa zagrożeń do wzorców zawartych w repozytorium. Zdefiniowano ogólną przestrzeń detekcji podobieństwa, w której sformułowano zadanie optymalizacji rozpoznawania wzorców. Przedstawiono przykład algorytmu wspomagania procesu wyznaczania wstępnego rozpoznania oparty na stwierdzonych objawach zagrożenia i występujących czynnikach ryzyka. Przedstawiony algorytm pozwala wyznaczać zbiór zagrożeń od których nie ma bardziej prawdopodobnych oraz jego ranking.
Źródło:
Inżynieria Bezpieczeństwa Obiektów Antropogenicznych; 2019, 1-2; 17-27
2450-1859
2450-8721
Pojawia się w:
Inżynieria Bezpieczeństwa Obiektów Antropogenicznych
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Algorytm detekcji obiektów dla radarowego detektora przeszkód
Algorithm for target detection for radar terget detector
Autorzy:
Szpakowska-Peas, E.
Powiązania:
https://bibliotekanauki.pl/articles/213340.pdf
Data publikacji:
2012
Wydawca:
Sieć Badawcza Łukasiewicz - Instytut Lotnictwa
Tematy:
algorytm detekcji obiektów
Radarowy Detektor Przeszkód (RDP)
algorithm target detection
radar target detector
Opis:
W niniejszej pracy opisano algorytm detekcji obiektów dla modułu Radarowego Detektora Przeszkód (RDP). Został opisany sposób akwizycji oraz analizy sygnału z anteny. Algorytm detekcji został zaimplementowany na platformę systemową mikroprocesora sygnałowego TMS32F28335.
In this thesis an algorithm for target detection for Radar Target Detector has been presented. Acquisition method and antennas signal analysis has been described. Algorithm for target detection has been implemented in system of digital signal processor TMS32F28335.
Źródło:
Prace Instytutu Lotnictwa; 2012, 3 (224); 9-19
0509-6669
2300-5408
Pojawia się w:
Prace Instytutu Lotnictwa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Surface damage assessment by analysis of electrical resistance changes in graphite-based sensing skin
Autorzy:
Stepnowski, Marek
Janczak, Daniel
Jakubowska, Małgorzata
Pyrzanowski, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/2106421.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
sensing skin
damage
detection
algorithm
ERT
Opis:
The article presents the method of identifying surface damage by measuring changes in resistance in graphite-based sensing skin. The research focused on analysis of conductivity anomalies caused by surface damage. Sensitivity maps obtained with Finite Element Method (FEM) in conjunction with the analytical damage model were used to build the coating evaluation algorithm. The experiment confirmed the ability of this method to identify a single elliptical-shape damage. Eight electrodes were enough to locate the damage that covered about 0.1‰ of the examined area. The proposed algorithm can prove useful in simple applications for surface condition monitoring. It can be implemented wherever it is possible to apply a thin layer of conductor to a non-conductive surface.
Źródło:
Metrology and Measurement Systems; 2022, 29, 2; 347--360
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Traffic Video and VANET data fusion algorithm
Autorzy:
Bernaś, M.
Powiązania:
https://bibliotekanauki.pl/articles/393489.pdf
Data publikacji:
2012
Wydawca:
Polskie Stowarzyszenie Telematyki Transportu
Tematy:
Vanet
detekcja
algorytm fuzji
detection
fusion algorithm
Opis:
Modern Intelligent Transport Systems incorporate the traffic control strategies that are based not only on long term traffic analysis and forecasts, but also on the real time events detection like accidents or high congestion. The flexibility of these systems depends on accurate and precise data set describing the current state of road network. To estimate it, the data from various sources like: video surveillance, induction loops or vehicles itself (Vehicle to Infrastructure communication -V2I) is gathered. Excluding detection errors, the video surveillance data is a reliable source of general information about the traffic flow. On the other hand, the vehicle communication can provide less reliable, but more detailed information about a particular vehicle like: its engine state or planned manoeuvre. Unreliable or forged C2I information can be used to disturb traffic or to gain a higher priority on the road. The paper reviews the fusion algorithms that are used to merge data from video tracking algorithms and vehicular networks. Based on the survey, a weighted fusion algorithm is proposed that estimates the acquired data reliability. The algorithm uses the video surveillance data as a filter for C2I communication. Finally, applications for microscopic traffic models and safety issues are taken into consideration.
Źródło:
Archives of Transport System Telematics; 2012, 5, 2; 3-8
1899-8208
Pojawia się w:
Archives of Transport System Telematics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Automatic identification of malfunctions of large turbomachinery during transient states with genetic algorithm optimization
Autorzy:
Barszcz, Tomasz
Zabaryłło, Mateusz
Powiązania:
https://bibliotekanauki.pl/articles/2052104.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
machine learning
fault detection
transient
turbine generator
genetic algorithm
Opis:
Turbines and generators operating in the power generation industry are a major source of electrical energy worldwide. These are critical machines and their malfunctions should be detected in advance in order to avoid catastrophic failures and unplanned shutdowns. A maintenance strategy which enables to detect malfunctions at early stages of their existence plays a crucial role in facilities using such types of machinery. The best source of data applied for assessment of the technical condition are the transient data measured during start-ups and coast-downs. Most of the proposed methods using signal decomposition are applied to small machines with a rolling element bearing in steady-state operation with a shaft considered as a rigid body. The machines examined in the authors’ research operate above their first critical rotational speed interval and thus their shafts are considered to be flexible and are equipped with a hydrodynamic sliding bearing. Such an arrangement introduces significant complexity to the analysis of the machine behavior, and consequently, analyzing such data requires a highly skilled human expert. The main novelty proposed in the paper is the decomposition of transient vibration data into components responsible for particular failure modes. The method is automated and can be used for identification of turbogenerator malfunctions. Each parameter of a particular decomposed function has its physical representation and can help the maintenance staff to operate the machine properly. The parameters can also be used by the managing personnel to plan overhauls more precisely. The method has been validated on real-life data originating from a 200 MW class turbine. The real-life field data, along with the data generated by means of the commercial software utilized in GE’s engineering department for this particular class of machines, was used as the reference data set for an unbalanced response during the transients in question.
Źródło:
Metrology and Measurement Systems; 2022, 29, 1; 175-190
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The detection of anomalies in controlling of the combustion process by using a genetic algorithm
Detekcja anomalii w sterowaniu procesem spalania za pomocą algorytmu genetycznego
Autorzy:
Marciniak, J.
Powiązania:
https://bibliotekanauki.pl/articles/328740.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Polskie Towarzystwo Diagnostyki Technicznej PAN
Tematy:
genetic algorithm
diagnose
anomaly detection
algorytm genetyczny
diagnostyka
detekcja anomalii
Opis:
The article presents the problem of dynamically changing fuel quality during the control of combustion process. The way of the measurement process variables related with this process was described. In the next part of the article schematics, ideas and genetic algorithm were presented by the author. They are also presented conditions in which the above anomaly detection algorithm perform in the regulation of combustion. The results of these solution were presented in the final section.
W artykule przedstawiono problem związany ze zmieniającą się dynamicznie jakością paliwa podczas sterowania procesem spalania. Opisano sposób pomiaru zmiennych procesowych związanych z tym procesem. W kolejnej części artykułu autor przedstawił schemat, idee oraz działanie algorytmu genetycznego. Zostały również przedstawione warunki w których powyższy algorytm realizuje detekcje anomalii w procesie regulacji spalana. W ostatniej części został przedstawiony rezultat zaproponowanego rozwiązania.
Źródło:
Diagnostyka; 2016, 17, 1; 21-25
1641-6414
2449-5220
Pojawia się w:
Diagnostyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Determination Of Gas Mixture Components Using Fluctuation Enhanced Sensing And The LS-SVM Regression Algorithm
Autorzy:
Lentka, Ł.
Smulko, J. M.
Ionescu, R.
Granqvist, C. G.
Kish, L. B.
Powiązania:
https://bibliotekanauki.pl/articles/221708.pdf
Data publikacji:
2015
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
LS-SVM algorithm
resistance gas sensor
fluctuation enhanced sensing
gas detection
Opis:
This paper analyses the effectiveness of determining gas concentrations by using a prototype WO3 resistive gas sensor together with fluctuation enhanced sensing. We have earlier demonstrated that this method can determine the composition of a gas mixture by using only a single sensor. In the present study, we apply Least-Squares Support-Vector-Machine-based (LS-SVM-based) nonlinear regression to determine the gas concentration of each constituent in a mixture. We confirmed that the accuracy of the estimated gas concentration could be significantly improved by applying temperature change and ultraviolet irradiation of the WO3 layer. Fluctuation-enhanced sensing allowed us to predict the concentration of both component gases.
Źródło:
Metrology and Measurement Systems; 2015, 22, 3; 341-350
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Integrated and deep learning–based social surveillance system : a novel approach
Autorzy:
Litoriya, Ratnesh
Ramchandani, Dev
Moyal, Dhruvansh
Bothra, Dhruv
Powiązania:
https://bibliotekanauki.pl/articles/27314204.pdf
Data publikacji:
2022
Wydawca:
Sieć Badawcza Łukasiewicz - Przemysłowy Instytut Automatyki i Pomiarów
Tematy:
Video Surveillance
object detection
object tracking
YOLO v4 algorithm
OpenCV
Opis:
In industry and research, big data applications are gaining a lot of traction and space. Surveillance videos contribute significantly to big unlabelled data. The aim of visual surveillance is to understand and determine object behavior. It includes static and moving object detection, as well as video tracking to comprehend scene events. Object detection algorithms may be used to identify items in any video scene. Any video surveillance system faces a significant challenge in detecting moving objects and differentiating between objects with same shapes or features. The primary goal of this work is to provide an integrated framework for quick overview of video analysis utilizing deep learning algorithms to detect suspicious activity. In greater applications, the detection method is utilized to determine the region where items are available and the form of objects in each frame. This video analysis also aids in the attainment of security. Security may be characterized in a variety of ways, such as identifying theft or violation of covid protocols. The obtained results are encouraging and superior to existing solutions with 97% accuracy.
Źródło:
Journal of Automation Mobile Robotics and Intelligent Systems; 2022, 16, 3; 30--39
1897-8649
2080-2145
Pojawia się w:
Journal of Automation Mobile Robotics and Intelligent Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Non-contact harmonic detection of ferromagnetic material defects based on SQGSR and OPLTF
Autorzy:
Zhao, Yizhen
Wang, Xinhua
Chen, Yingchun
Ju, Haiyang
Shuai, Yi
Powiązania:
https://bibliotekanauki.pl/articles/1848986.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
harmonic detection
ferromagnetic materials defects
focusing vector array
signal extraction algorithm
Opis:
In order to find the defects in ferromagnetic materials, a non-contact harmonic detection method is proposed. According to the principle of frequency modulated carrier wave, a tunnel magneto resistance harmonic focusing vector array detector was designed which radiates lower and higher frequency electromagnetic waves through the coil array to the detection targets. We use bistable stochastic resonance to enhance the energy of collected weak target signal and apply quantum computation and a Sobol low deviation sequence to improve genetic algorithm performance. Then we use the orthogonal phase-locked loop to eliminate the intrinsic background excitation field and tensor calculations to fuse the vector array signal. The finite element model of array detector and the magnetic dipole harmonic numerical model were also established. The simulation results show that the target signal can be identified effectively, its focusing performance is improved by 2 times, and the average signal-to-noise ratio is improved by 9.6 times after the algorithm processing. For the experiments, we take Q235 steel pipeline as the object to realize the recognition of three defects. Compared with the traditional methods, the proposed method is more effective for ferromagnetic materials defects detection.
Źródło:
Metrology and Measurement Systems; 2021, 28, 1; 55-72
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies