Filters
total: 318
filtered: 266
Search results for: PROTOCOL
-
Device-independent quantum key distribution based on measurement inputs
PublicationWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Robust amplification of Santha-Vazirani sources with three devices
PublicationWe demonstrate that amplification of arbitrarily weak randomness is possible using quantum resources. We present a randomness amplification protocol that involves Bell experiments. We find a Bell inequality which can amplify arbitrarily weak randomness and give a detailed analysis of the protocol involving it. Our analysis includes finding a sufficient violation of Bell inequality as a function of the initial quality of randomness....
-
Dynamic Route Discovery Using Modified Grasshopper Optimization Algorithm in Wireless Ad-Hoc Visible Light Communication Network
PublicationIn recent times, visible light communication is an emerging technology that supports high speed data communication for wireless communication systems. However, the performance of the visible light communication system is impaired by inter symbol interference, the time dispersive nature of the channel, and nonlinear features of the light emitting diode that significantly reduces the bit error rate performance. To address these problems,...
-
Why is IPv6 Deployment Important for the Internet Evolution?
PublicationAbstract-Replacing the IPv4 protocol with IPv6 on the Internet is currently one of the aims of the European Union policy. The main reason for this replacement is the effeteness of the addresses pool in the IPv4 protocol, which can cause serious complications in the evolution of the Internet and its adaptation in new areas, e.g., in next generation mobile telephony or the so called Internet of Things. Simultaneously, the addressing...
-
Analiza porównawcza wybranych hierarchicznych algorytmów trasowania w sieciach ad hoc
PublicationW referacie przybliżono ogólną zasadę działania algorytmów hierarchicznych stosowanych w sieciach ad hoc. Szczegółowo omówiono dwa hierarchiczne protokoły trasowania: Cluster Based Routing Protocol oraz Zone Routing Protocol. Osobny punkt referatu poświęcono analizie porównawczej obu protokołów. W podsumowaniu przeanalizowano zasadność zastosowania wspomnianych protokołów w Zautomatyzowanym Systemie Radarowego Nadzoru Polskich...
-
Advanced surveillance and operational communication system employing mobile terminals
PublicationDistributed surveillance and operational communications system based on XMPP protocol is presented. Its architecture and assumptions leading to the depicted design are shown. Features of XMPP protocol are portrayed with the emphasis on those most important in the context of the application. Real-time multimedia transmission with the use of Jingle/XMPP extension is discussed. The use of PDA-class computers as mobile terminals is...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublicationRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
Anonymity Architecture for Mobile Agent Systems
PublicationThe paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...
-
All Nonclassical Correlations Can Be Activated into Distillable Entanglement
PublicationWe devise a protocol in which general nonclassical multipartite correlations produce a physically relevant effect, leading to the creation of bipartite entanglement. In particular, we show that the relative entropy of quantumness, which measures all nonclassical correlations among subsystems of a quantum system, is equivalent to and can be operationally interpreted as the minimum distillable entanglement generated between the system...
-
Randomness Amplification under Minimal Fundamental Assumptions on the Devices
PublicationRecently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...
-
Analiza danych osobowych przetwarzanych w systemach telekomunikacyjnych klasy IP PBX oraz metod ich anonimizacji za pomocą systemów SBC
PublicationOpisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody...
-
Quantum-state transfer in spin chains via isolated resonance of terminal spins
PublicationWe propose a quantum-state transfer protocol in a spin chain that requires only the control of the spins at the ends of the quantum wire. The protocol is to a large extent insensitive to inhomogeneity caused by local magnetic fields and perturbation of exchange couplings. Moreover, apart from the free evolution regime, it allows one to induce an adiabatic spin transfer, which provides the possibility of performing the transfer...
-
Next generation automatic IP configuration deployment issues
PublicationAlthough Dynamic Host Configuration Protocol for IPv6 (DHCPv6) protocol was defined in 2003, it was designed as a framework rather than a complete solution to the automatic configuration in IPv6 networks. There are still some unsolved problems and new options yet to be defined. One example of such case is Fully Qualified Domain Name (FQDN) option, which final version has been published in late 2007. It describes DHCPv6 client...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublicationManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Experimentally feasible semi-device-independent certification of four-outcome positive-operator-valued measurements
PublicationRecently the quantum information science community devoted a lot of attention to the theoretical and practical aspects of generalized measurements, the formalism of all possible quantum operations leading to acquisition of classical information. On the other hand, due to imperfections present in quantum devices, and limited thrust to them, a trend of formulating quantum information tasks in a semi-device-independent manner emerged....
-
A method to monitor urinary carbon dioxide in patients with septic shock
PublicationSevere sepsis and septic shock are life-threatening conditions with mortality rates exceeding 31% (Levy et al., 2012) [1]. Septicemia was the most expensive US hospital condition in 2011 (Torio and Andrews, 2006)[2]. Urinary carbon dioxide may provide rapid, clinically useful information about a patient’s status, empowering physicians to intervene earlier and improve septic shock mortality. The objective of this paper is to validate...
-
Simple and novel synthesis of 3-(thio)phosphoryl-β-lactams by radical cyclization
PublicationRadical cyclization of phosphono-acetenamides promoted by manganese(III) acetate leads exclusively to the formation of 3-phosphoryl-β-lactams. The thiophosphoryl analogues were also prepared using this method. In particular, the presented protocol does not require the use of noble metals, while comparable methods do.
-
SUSHI - jak to ugryźć? Czyli o standaryzacji i gromadzeniu statystyk wykorzystania zasobów elektronicznych na przykładzie Biblioteki Głównej Gdańskiego Uniwersytetu Medycznego
PublicationStatystyki wykorzystania dostarczają bibliotekarzom informacji niezbędnych przy podejmowaniu decyzji o zakupie dostępu do wybranych zasobów elektronicznych. W roku 2002 rozpoczął działalność międzynaro- dowy projekt COUNTER (Counting Online Usage of Networked Electronic Resources), którego celem było ujednolicenie raportów wykorzystania e-zasobów, a także uczynienie ich możliwie najbardziej miarodajnymi. W roku 2007 amerykańska...
-
Collision‐Aware Routing Using Multi‐Objective Seagull Optimization Algorithm for WSN‐Based IoT
PublicationIn recent trends, wireless sensor networks (WSNs) have become popular because of their cost, simple structure, reliability, and developments in the communication field. The Internet of Things (IoT) refers to the interconnection of everyday objects and sharing of information through the Internet. Congestion in networks leads to transmission delays and packet loss and causes wastage of time and energy on recovery. The routing protocols...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublicationThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
Extension management of a knowledge base migration process to IPv6
PublicationThere are many reasons to deploy IPv6 protocol with IPv4 address space depletion being the most indisputable. Unfortunately, migration to IPv6 protocol seems slower than anticipated. To improve pace of the IPv6 deployment, authors of the article developed the two applications that supports the migration process. Their main purpose is to help less experienced network administrators facilitate the migration process with a particular...
-
The realization of ASON/GMPLS control plane
PublicationASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols like RSVP-TE, OSPF-TE, LMP. This solution is named ASON/GMPLS. In this chapter we present the control plane problems and proposes ASON/GMPLS network realization that are tested on testbed consists of three and...
-
MRM–MS of marker peptides and their abundance as a tool for authentication of meat species and meat cuts in single-cut meat products
PublicationThe abundance of protein markers in different types of meat cuts was explored in the context of authentication of raw meat (pork, beef and chicken) and processed meat products. Peptides originating from myoglobin (Mb) and myosin (My) were analyzed using multiple reaction monitoring mass spectrometry (MRM–MS). Analytical protocol was optimized for good repeatability (CV < 10%) and high sensitivity. The MS signal intensity of Mb...
-
PROGRAMMABLE YANG - BASED INTERFACE IN CONTROL OF OPTICAL TRANSPORT NETWORK
PublicationSince over a decade we observe intensive effort of research institutions and industrial consortia on extending flexibility and automation of the transport network control also known under the term network programmability. Key aspect of each programming interface is ability to evolve but also sensitivity to future modifications. As indicated in the past work in the specific context of optical transport networks an important criterion...
-
Management Information Base module for electrical power system configuration and use
PublicationInternet standards describe a virtual information store, termed the Management Information Base (MIB), which is made available through Simple Network Management Protocol (SNMP). No standard MIB exists to date for monitoring power lines in facilities over IP network. This paper defines a subset of the MIB for power system monitoring.
-
Chromium‑based metal organic framework for pipette tip micro‑solid phase extraction: an effective approach for determination of methyl and propyl parabens in wastewater and shampoo samples
PublicationAbstract Background A chromium-based metal organic framework was synthesized and employed as an efficient sorbent for pipette tip micro-solid phase extraction and preconcentration of parabens from wastewater and shampoo samples up to sub-ppb level before their spectrophotometric analysis. Results Factors affecting preconcentration including volume and type of solvent, amount of sorbent, number of extraction, and volume and pH of...
-
Practical I-Voting on Stellar Blockchain
PublicationIn this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...
-
Distributed Framework for Visual Event Detection in Parking Lot Area
PublicationThe paper presents the framework for automatic detection of various events occurring in a parking lot basing on multiple camera video analysis. The framework is massively distributed, both in the logical and physical sense. It consists of several entities called node stations that use XMPP protocol for internal communication and SRTP protocol with Jingle extension for video streaming. Recognized events include detecting parking...
-
History-based dynamic weight voting for multi-agent systems
PublicationTaking decision in multi-agent systems may involve voting. Two basic voting protocols are surveyed in the paper. Then, a new history-based dynamic weight voting is proposed. This voting protocol allows for identification of the agents which contribute to the correct system decision. The proposed solution is contrasted with majority voting and with weighted average voting, to show its advantages
-
System load impact on VRRP advertisements delay
PublicationThe aim of the paper is to show how system load can affect network tasks (especially VRRP advertising depending on factors such as kernel schedu-ler [3] version, kernel settings and load priority. Two versions of the Linux kernel will be used: 2.6.22 (with "O(1) scheduler) and 2.6.23 (with "CFS" scheduler). "vrrpd" version 0.4 is used as an VRRP protocol implementation.
-
BADANIE MOŻLIWOŚCI SYMULACYJNYCH ŚRODOWISKA ‘MININET’ POD KĄTEM WSPARCIA PROTOKOŁU NETCONF
PublicationNiniejszy artykuł został poświęcony zagadnieniu wykorzystania środowiska emulacyjnego Mininet do testowania mechanizmów działania protokołu NETCONF. Omówiono w nim projekt inżynierski, którego wynikiem było zaimplementowanie wirtualnego środowiska, umożliwiającego prowadzenie takich badań. Opisano także wyniki testów emulacji dwóch pierścieniowych domen sieciowych, składających się z 30 węzłów.
-
Connections between Mutually Unbiased Bases and Quantum Random Access Codes
PublicationWe present a new quantum communication complexity protocol, the promise--Quantum Random Access Code, which allows us to introduce a new measure of unbiasedness for bases of Hilbert spaces. The proposed measure possesses a clear operational meaning and can be used to investigate whether a specific number of mutually unbiased bases exist in a given dimension by employing Semi--Definite Programming techniques.
-
Implementation of high-speed data transmission technological demonstrator using software defined radio technology
PublicationIn the article implementation of high-speed data transmission technological demonstrator using software defined radio technology is presented. A system architecture design including asymmetric framing transmission organization, which differs from the ones used in cellular systems is described. The construction of technological demonstrator consisting of management unit, radio unit and programmable multithreaded software performing...
-
Serial control of CNC machines
PublicationIn this paper a new method of the serial control of CNC machines is proposed. Actuators are controlled locally and the role of the central computer is limited to sending commands to the controller instead of sending it directly to actuators. It has been achieved with the use of the serial protocol with the use of the USB port. The taken approach leads to more reliable operation because commands are buffered and no synchronization...
-
Mechanizmy komunikacji w rozproszonych systemach specjalnego przeznaczenia
PublicationZadania ochrony i bezpieczeństwa granic państwa realizowane przez Straż Graniczną wymagają wsparcia ze strony nowoczesnych systemów Technologii Informacyjnych (TI) uwarunkowanych ich specjalnym przeznaczeniem. Z uwagi na charakter tej służby, rozwiązania dla jej potrzeb muszą być realizowane jako systemy rozproszone umożliwiające przenoszenie i przetwarzanie informacji głosowych oraz różnorodnych danych, w tym specjalnego przeznaczenia....
-
Active Annotation in Evaluating the Credibility of Web-Based Medical Information: Guidelines for Creating Training Data Sets for Machine Learning
PublicationMethods Results Discussion References Abbreviations Copyright Abstract Background: The spread of false medical information on the web is rapidly accelerating. Establishing the credibility of web-based medical information has become a pressing necessity. Machine learning offers a solution that, when properly deployed, can be an effective tool in fighting medical misinformation on the web. Objective: The aim of this study is to...
-
Implementation of high-speed data transmission technological demonstrator using software defined radio technology
PublicationIn the article implementation of a high-speed data transmission technological demonstrator using software defined radio technology is presented. A system architecture design including asymmetric framing transmission organization, which differs from the ones used in cellular systems is described. The construction of technological demonstrator consisting of a management unit, radio unit and programmable multi-threaded software performing...
-
Negocjacyjna metoda generowania protokołu uzgodnień na platformie EBXML
PublicationCelem standardu ebXML jest ustanowienie globalnej platformy dla biznesu elektronicznego, umożliwiającej dowolnym przedsiębiorstwom( bez względu na ich wielkość i lokalizację)poszukiwanie partnerów handlowych i realizowanie transakcji kupna-sprzedaży w oparciu o wymianę dokumentów elektronicznych o strukturze logicznej opisanej w XML.Podstawą do nawiązania kontaktu przez dowolny podmiot jest publikowany przez niego w specjalnym...
-
Monolithic capsule phase microextraction prior to gas chromatography-mass spectrometry for the determination of organochlorine pesticides in environmental water samples
PublicationIn this study, a capsule phase microextraction (CPME) protocol followed by gas chromatography-mass spectrometry is proposed for the accurate and sensitive monitoring of organochlorine pesticides (OCPs) in environmental water samples. Different monolithic sol–gel encapsulated sorbents were compared and monolithic sol–gel poly(ethylene glycol)-based sorbent incorporated into porous microextraction capsules resulted in the highest...
-
A distributed system for conducting chess games in parallel
PublicationThis paper proposes a distributed and scalable cloud based system designed to play chess games in parallel. Games can be played between chess engines alone or between clusters created by combined chess engines. The system has a built-in mechanism that compares engines, based on Elo ranking which finally presents the strength of each tested approach. If an approach needs more computational power, the design of the system allows...
-
Experimental Extraction of Secure Correlations from a Noisy Private State
PublicationWe report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies...
-
Sport-related concussion alters cerebral hemodynamic activity during controlled respiration
PublicationThis study investigated cerebral hemodynamic activity following sport-related concussion. Prefrontal cortex oxygenation was assessed by near-infrared spectroscopy (NIRS) during a controlled breathing protocol. Wavelet transformation of the NIRS signals showed significant decreases in HbO2 and HbD amplitude at the respiratory frequency interval (0.10–0.6 HZ) from preseason baseline to acute concussion. These results suggest a decreased...
-
Hardware accelerated thin client for virtual reality applications
PublicationThin client applications often make minimal use of hardware available at the client side. This article focuses on the problem of creating portable thin client application for virtual reality applications, which allows use of client graphics hardware to aid rendering process. Some already available potential solutions are presented and entirely new protocol for client-server communication is presented to allow fast and reliable...
-
Specyfikacja Systemu IP QoS opartego na architekturze DiffServ
PublicationArtykuł przedstawia ogólną specyfikację systemu IP QoS (ang. Internet Protocol Quality of Service), który to system jest obecnie implementowany w ramach projektu krajowego "Zarządzanie ruchemw sieciach IP". System ten jest zgodny z architekturą DiffServ (ang. Differentiated Services) i architekturą NGN (Next Generation Networks). W szczególności, artykuł pokrótce omawia architekturęsystemu, oferowane klasy usług w systemie oraz...
-
QoS Resource Reservation Mechanisms for Switched Optical Networks
PublicationThe paper regards the problem of resource reservation mechanisms for Quality of Service support in switched optical networks. The authors propose modifications and extensions for resources reservation strategy algorithms with resources pools, link capacity threshold and adaptive advance reservation approach. They examine proposed solutions in Automatically Switched Optical Network with Generalized Multi-Protocol Label Switching...
-
Analiza wpływu transmisji danych na jakość działania rozproszonych systemów sterowania
PublicationW artykule przedstawiono zagadnienia związane z transmisją danych w rozproszonych systemach sterowania. Opisano cechy charakterystyczne przemysłowych sieci i protokołów informatycznych. Utworzono model rozproszonego systemu sterowania poziomem cieczy w zbiorniku, w którym komunikacja oparta została na protokole Modbus RTU. Na podstawie zmian parametrów transmisji danych wykazano, że poprawna komunikacja pomiędzy elementami systemu...
-
Exploring multi-step glucose oxidation kinetics at GOx-functionalized nanotextured gold surfaces with differential impedimetric technique
PublicationFor a few past years, we can observe the enormous growth of investigations related to ultrasensitive electrochemical sensors capable of reliable determination of important body parameters and analytes. Utilized procedures rely on standard electrochemical methods, demanding electrode polarization, and information about the initial characteristics of the working electrode. More and more complex electrode materials are characterized...
-
EMULACJA ŚRODOWISKA DLA ZASTOSOWANIA PROTOKOŁU IN-BAND NETWORK TELEMETRY
PublicationOkreślenie jakości obsługi strumieni pakietów w sieci przełączników wymaga odpowiedniego środowiska badawczego w którym prowadzi się doświadczenia i pomiary wybranych wielkości. Protokół In-band Network Telemetry jest jednym z narzędzi, które można wykorzystać do realizacji tych zadań. W pracy zaproponowano zwirtualizowane środowisko badawcze w którym można emulować sieć przełączników programowalnych w języku P4 wraz z implementacją...
-
Quantum communication complexity advantage implies violation of a Bell inequality
PublicationWe obtain a general connection between a quantum advantage in communication complexity and non-locality. We show that given any protocol offering a (sufficiently large) quantum advantage in communication complexity, there exists a way of obtaining measurement statistics which violate some Bell inequality. Our main tool is port-based teleportation. If the gap between quantum and classical communication complexity can grow arbitrarily...
-
Selected Features of Dynamic Voting
PublicationIn multi-agent systems composed of autonomous agents with local knowledge, it is often desirable to aggregate their knowledge in order to make an educated decision. One of the methods of agreeing to a common decision is voting. A new history-based dynamic weight protocol allows for identification of the agents which contribute to the correct system decision. The main advantage of this approach, compared to static weighted system...