Filters
total: 30204
filtered: 6060
-
Catalog
- Publications 6060 available results
- Journals 714 available results
- Conferences 173 available results
- Publishing Houses 3 available results
- People 249 available results
- Inventions 1 available results
- Projects 25 available results
- Laboratories 1 available results
- e-Learning Courses 191 available results
- Events 25 available results
- Open Research Data 22762 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS.
-
Biopolymers in designing modern antimicrobial medical materials. Part I. Biopolymer medical materials - collagen, chitosan
PublicationThe article is a review of the literature concerning the possible use of biopolymers for the preparation of dressings with antimicrobial activity. Authors show the potential of biopolymers: collagen and chitosan - which have the ability to immobilize and control the release of various active compounds - for providing the appropriate antibacterial, bacteriostatic and wound healing properties. Types of threats, for which the dressing...
-
Adaptive system for recognition of sounds indicating threats to security of people and property employing parallel processing of audio data streams
PublicationA system for recognition of threatening acoustic events employing parallel processing on a supercomputing cluster is featured. The methods for detection, parameterization and classication of acoustic events are introduced. The recognition engine is based onthreshold-based detection with adaptive threshold and Support Vector Machine classifcation. Spectral, temporal and mel-frequency descriptors are used as signal features. The...
-
A note on an approximative scheme of finding almost homoclinic solutions for Newtonian systems
PublicationIn this work we will be concerned with the existence of an almost homoclinic solution for a perturbed Newtonian system in a finite dimensional space. It is assumed that a potential is C^1 smooth and its gradient is bounded with respect to a time variable. Moreover, a forcing term is continuous, bounded and squere integrable. We will show that the appproximative scheme due to J. Janczewska for a time periodic potential extends to...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublicationWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
COLREGS compliance in Evolutionary Sets of Cooperating Ship Trajectories
PublicationIn general, Evolutionary Sets of Cooperating Ship Trajectories combine some of the assumptions of game theory with evolutionary programming and aim to find optimal set of cooperating trajectoriesof all ships involved in an encounter situation. In a two-ship encounter situation the method enables the operator of an on-board collision-avoidance system to predict the most probable behaviour of atarget and to plan the own manoeuvres...
-
Orientation-aware ship detection via a rotation feature decoupling supported deep learning approach
PublicationShip imaging position plays an important role in visual navigation, and thus significant focuses have been paid to accurately extract ship imaging positions in maritime videos. Previous studies are mainly conducted in the horizontal ship detection manner from maritime image sequences. This can lead to unsatisfied ship detection performance due to that some background pixels maybe wrongly identified as ship contours. To address...
-
Big Data i 5V – nowe wyzwania w świecie danych (Big Data and 5V – New Challenges in the World of Data)
PublicationRodzaje danych, składające się na zbiory typu Big Data, to m.in. dane generowane przez użytkowników portali internetowych, dane opisujące transakcje dokonywane poprzez Internet, dane naukowe (biologiczne, astronomiczne, pomiary fizyczne itp.), dane generowane przez roboty w wyniku automatycznego przeszukiwania przez nie Internetu (Web mining, Web crawling), dane grafowe obrazujące powiązania pomiędzy stronami WWW itd. Zazwyczaj,...
-
Rotationally invariant bipartite states and bound entanglement
PublicationW pracy rozważano stany kwantowe niezmiennicze na działanie grupy SO(3). Pokazano, że w przypadku, gdy pierwszy podukład ma parzysty wymiar większy lub równy cztery oraz drugi podukład ma wymiar dowolny, większy niż pierwszy to pośród takich stanów zawsze istnieje splątanie związane.
-
Interactions in aqueous solutions of K-peptide and DMSO – spectroscopic and calorimetric studies
PublicationIntroduction K-peptide (GILQINSRW) – short 9 amino acid fragment of the hen egg white lysozyme has the ability to form amyloid structures. Dimethyl sulfoxide (DMSO) is an osmolyte which can alter this ability. Our goal was to get an insight into the mechanism of Kpeptide-DMSO interactions in aqueous solutions. Such a knowledge can be helpful to understand processes leading to various neurodegenerative diseases. Methods ATR-FTIR...
-
The use of machine learning for face regions detection in thermograms
PublicationThe aim of this study is to analyse the methods of detecting characteristic points of the face in thermographic images. As part of the implementation an extensive analysis of scientific publications covering similar issues both for the analysis of images made in visible light and thermographic images was carried out. On the basis of this analysis, 3 models were selected and then they were implemented and tested on the basis of...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
Automatic sound recognition for security purposes
PublicationIn the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...
-
Proposal of a mobile medical waste incinerator with automatic waste feeder and heat recovery system
PublicationThe paper presents and discusses the issue of medical waste (including hazardous ones) and their proper management. Inappropriate handling of infectious medical waste directly endangers the human being health and the environment. Infectious waste must therefore be properly disposed of – one of the most commonly used methods is the thermal treatment in the incinerators tailored for this purpose. During designing an incinerator unit,...
-
Investigating beliefs in anti-vax conspiracy theories among medical students
PublicationAbstract: While the doctors’ role in immunization is essential, their lack of knowledge or vaccine hesitancy may affect their ability to communicate effectively and educate patients about vaccination, vaccine hesitancy, and vaccine conspiracy theories. This, in turn, may hinder health policy aimed at fighting infectious diseases. Vaccine hesitancy is prevalent not only among the general population but also among healthcare...
-
On Software Unit Testing For Security and Performance Gain At Unit Level
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
On Software Unit Testing For Improving Security And Performance Of Distributed Applications
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
Arithmetic Loophole in Bell's Theorem: Overlooked Threat to Entangled-State Quantum Cryptography
PublicationBell’s theorem is supposed to exclude all local hidden-variable models of quantum correlations. However,an explicit counterexample shows that a new class of local realistic models, based on generalized arith-metic and calculus, can exactly reconstruct rotationally symmetric quantum probabilities typical oftwo-electron singlet states. Observable probabilities are consistent with the usual arithmetic employedby macroscopic observers...
-
A sense of security and freedom in a residential environment
PublicationThe article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...
-
Evolutionary Sets of Safe Ship Trajectories: problem dedicated operators
PublicationThe paper presents the optimization process of the evolutionary sets of safe ship trajectories method, with a focus on its problem-dedicated operators. The method utilizes a customized evolutionary algorithm to solve a constrained optimization problem. This problem is defined as finding a set of cooperating trajectories (a set is an evolutionary individual) of all the ships involved in the encounter situation. The resulting trajectories...
-
Rotation Triggers Nucleotide-Independent Conformational Transition of the Empty β Subunit of F1-ATPase
PublicationF1-ATPase (F1) is the catalytic portion of ATP synthase, a rotary motor protein that couples proton gradients to ATP synthesis. Driven by a proton flux, the F1 asymmetric γ subunit undergoes a stepwise rotation inside the α3β3 headpiece and causes the β subunits’ binding sites to cycle between states of different affinity for nucleotides. These concerted transitions drive the synthesis of ATP from ADP and phosphate. Here, we study...
-
Periodic expansion in determining minimal sets of Lefschetz periods for Morse–Smale diffeomorphisms
PublicationWe apply the representation of Lefschetz numbers of iterates in the form of periodic expansion to determine the minimal sets of Lefschetz periods of Morse–Smale diffeomorphisms. Applying this approach we present an algorithmic method of finding the family of minimal sets of Lefschetz periods for Ng, a non-orientable compact surfaces without boundary of genus g. We also partially confirm the conjecture of Llibre and Sirvent (J Diff...
-
Data Mining Applications and Methods in Medicine
PublicationIn this paper we describe the research area of data mining and its applications in medicine. The origins of data mining and its crucial features are shortly presented. We discuss the specificity of medicine as an application area for computer systems. Characteristic features of the medical data are investigated. Common problems in the area are also presented as well as the strengths and capabilities of the data mining methods....
-
Scabies – still current medical and social problem. A retrospective analysis of 193 cases
Publication -
Polyurethanes as a Potential Medical-Grade Filament for Use in Fused Deposition Modeling 3D Printers – a Brief Review
PublicationThe possibility of using 3D printing technology (3DP) in medical field is a kind of revolution in health care. This has contributed to a rapid growth in demand for 3D printers, whose systems and materials are adapted to strict medical requirements. In this paper, we report a brief review of polyurethanes as a potential medical-grade filament for use in Fused Deposition Modeling (FDM) 3D printer technology. The advantages of polyurethanes...
-
Elastoplastic law of Cosserat type in shell theory with drilling rotation
PublicationWithin the framework of six-parameter non-linear shell theory, with strain measures of the Cosserat type, we develop small-strain J2-type elastoplastic constitutive relations. The relations are obtained from the Cosserat plane stress relations assumed in each shell layer, by through-the-thickness integration employing the first-order shear theory. The formulation allows for unlimited translations and rotations. The constitutive...
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublicationThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
PUBLIC SOURCES OF FINANCE FOR CULTURE AS AN ELEMENT OF CULTURAL SECURITY IN POLAND
PublicationCulture is an important element of the country, playing an important role both for its security and the economy. It cannot be only seen as a cost-creating sector, but may be a significant factor in economic development. For this to happen, it is necessary to create a system of financing this economic sector. This article’s aim is to analyze the use of funds from public sources in Poland to finance culture-related activities. The...
-
Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
Publication[Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublicationModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Visual Attention Distribution Based Assessment of User's Skill in Electronic Medical Record Navigation
PublicationCurrently, the most precise way of reflecting the skills level is an expert’s subjective assessment. In this paper we investigate the possibility of the use of eye tracking data for scalar quantitative and objective assessment of medical staff competency in EMR system navigation. According to the experiment conducted by Yarbus the observation process of particular features is associated with thinking. Moreover, eye tracking is...
-
Towards systemic functional safety and security management in hazardous plants
PublicationThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Evolutionary Sets of Safe Ship Trajectories: simulation results
PublicationThe Evolutionary Sets of Safe Ship Trajectories is a method solving multi-ship encounter situations. For given positions and motion parameters the method finds a near optimal set of safe trajectories of all ships involved in an encounter. The paper briefly presents foundations of the method and focuses on simulation results for selected test cases based on the Baltic Basin. The computer simulations cover both open waters and restricted...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublicationThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
DEEP CONVOLUTIONAL NEURAL NETWORKS AS A DECISION SUPPORT TOOL IN MEDICAL PROBLEMS – MALIGNANT MELANOMA CASE STUDY
PublicationThe paper presents utilization of one of the latest tool from the group of Machine learning techniques, namely Deep Convolutional Neural Networks (CNN), in process of decision making in selected medical problems. After the survey of the most successful applications of CNN in solving medical problems, the paper focuses on the very difficult problem of automatic analyses of the skin lesions. The authors propose the CNN structure...
-
Security of export transactions in the offer of leading banks on the Polish market
PublicationThe following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...
-
VIBRATION DIAGNOSTICS OF FOOTBRIDGE WITH USE OF ROTATION SENSOR
PublicationThe benefits of the additional measurement of rotational degrees of free-dom on the performance of the vibration diagnosis of bridges are studied in this paper. The common vibrational diagnostics that uses translational degrees of freedom is extended by measurements of rotations. The study is curried out on a footbridge and the presence of damage as well as its location and size is determined with use of FEM updating procedure....
-
Optical rotation in the lithium triborate nonlinear crystal
PublicationA dual-wavelength polarimetric technique at 633 and 661 nm has been used for the characterization of a nonlinear lithium triborate (LiB3O5) nonenantiomorphous biaxial crystal. The mismatch of the crystallographic and optical coordinate systems was taken into account. The optical rotatory power for light propagation along one of the optical axes is ρ = 7.06° mm−1. The gyration tensor component along the bisector between the x and...
-
A Text as a Set of Research Data. A Number of Aspects of Data Acquisition and Creation of Datasets in Neo-Latin Studies
PublicationIn this paper, the authors, who specialise in part in neo-Latin studies and the his-tory of early modern education, share their experiences of collecting sources for Open Research Data sets under the Bridge of Data project. On the basis of inscription texts from St. Mary’s Church in Gdańsk, they created 29 Open Research Data sets. In turn, the text of the lectures of the Gdańsk scholar Michael Christoph Hanow, Praecepta de arte...
-
Kinetyka reakcji utwardzania eteru diglicydylowego bisfenolu-Amodyfikowanego 2-hydroksyetylometyloakrylanem
PublicationObecnie na świecie zużywa się około 1,3 mln ton żywic epoksydowych rocznie a prognozy wzrostu zapotrzebowania na tę grupę materiałów polimerowych są obiecujące, ze względu na nieskomplikowaną technologię ich wytwarzania. Wiele ośrodków naukowych prowadzi badania w kierunku uzyskania coraz to lepszych parametrów fizyko-chemicznych pozwalających na rozszerzenie spektrum ich zastosowania. Badania te prowadzą również do zmiany w budowie...
-
Wpływ 2-hydroksyetylometyloakrylanu na właściwości fizyczne eteru diglicydylowego bisfenolu-A utwardzanego diaminodifenylometanem
PublicationW pracy przedstawiono wyniki badań wpływu 2-hydroksyetylometyloakrylanu (HEMA) na właściowści fizyczne eteru diglicydylowego bisfenolu-A (DGEBA) utwardzanego diaminodifenylometanem (DDM). Badania statycznych właściwości mechanicznych: wytrzymałość na rozciąganie, twardość, gęstość oraz parametry kinetyki reakcji sieciowania wykazały ścisłą zależność pomiędzy składem wymienionych substratów a ich wpływem na uzyskane parametry fizyczne.
-
Computational modelling of the modification of epoxy resins
PublicationSymulacja komputerowa właściwości fizycznych sieci żywic epoksydowych (DGEBA/DDM) modyfikowanych związkami akrylowymi przy użyciu programu Cheops® MillionZillion Software.
-
Lessons learned in a decade: Medical‐toxicological view of tattooing
PublicationTattooing has been part of the human culture for thousands of years, yet only in the past decades has it entered the mainstream of the society. With the rise in popularity, tattoos also gained attention among researchers, with the aim to better understand the health risks posed by their application. 'A medical-toxicological view of tattooing'-a work published in The Lancet almost a decade ago, resulted from the international collaboration...
-
Portable raman spectrometer for maritime security applications
PublicationThe fast identification of explosives, narcotics and other chemicals carried on board of ships or transported in containers to the harbors is an important problem of maritime security. Raman spectroscopy is widely used for fast identification of various chemicals. Continuous progress in the field of photonics has resulted in commercial availability of low-power compact Raman spectrometers which can be integrated into portable systems....
-
Safety integrity level verification for safety-related functions with security aspects
PublicationThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
An intelligent cellular automaton scheme for modelling forest fires
PublicationForest fires have devastating consequences for the environment, the economy and human lives. Understanding their dynamics is therefore crucial for planning the resources allocated to combat them effectively. In a world where the incidence of such phenomena is increasing every year, the demand for efficient and accurate computational models is becoming increasingly necessary. In this study, we perform a revision of an initial proposal...
-
A comprehensive evaluation of flexible FDM/FFF 3D printing filament as a potential material in medical application
PublicationThe use of FDM/FFF in 3D printing for medical sciences is becoming common. This is due to the high availability and decent price of both 3D printers and filaments useful for FDM/FFF. Currently, researchers' attention is focused mainly on the study of medical filaments based on PLA, PCL or their modifications. This contributes to insufficient diversity of medical-grade filaments on the market. Moreover, due to the lack of specified...
-
Super Dominating Sets in Graphs
PublicationIn this paper some results on the super domination number are obtained. We prove that if T is a tree with at least three vertices, then n2≤γsp(T)≤n−s, where s is the number of support vertices in T and we characterize the extremal trees.
-
Segmentation Quality Refinement in Large-Scale Medical Image Dataset with Crowd-Sourced Annotations
PublicationDeployment of different techniques of deep learning including Convolutional Neural Networks (CNN) in image classification systems has accomplished outstanding results. However, the advantages and potential impact of such a system can be completely negated if it does not reach a target accuracy. To achieve high classification accuracy with low variance in medical image classification system, there is needed the large size of the...
-
Evolutionary Sets of Safe Ship Trajectories: development of the method
PublicationThe Evolutionary Sets of Safe Ship Trajectories is a method solving ship encounter situations. The method combines evolutionary approach to planning ship trajectory with some of the assumption of game theory. For given positions and motion parameters the method finds a near optimal set of safe trajectories of all ships involved in an encounter. The version presented here is an updated one and its authors have tested extensively...