Filters
total: 29921
-
Catalog
- Publications 5870 available results
- Journals 713 available results
- Conferences 173 available results
- Publishing Houses 3 available results
- People 236 available results
- Inventions 1 available results
- Projects 24 available results
- Laboratories 1 available results
- e-Learning Courses 165 available results
- Events 24 available results
- Open Research Data 22711 available results
displaying 1000 best results Help
Search results for: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS.
-
SMART AND RESILIENT CITIES – NEW CHALLENGES FOR POLISH CITIES IN TERMS OF 2020 BUILDING ENERGY EFFICIENCY AND CLIMATE CHANGE ACTION.
PublicationGlobal climate change action along with energy efficiency optimizations are becoming increasingly pressing principles in terms of moving towards sustainable development. As a member of EU and UN Poland is also obliged to follow restricted rules concerning energy efficiency of buildings which come to force in 2020. To meet new goals, innovative approaches - like moving towards smart and resilient cities -may be required. Through...
-
Information Systems Security 2023/2024
e-Learning CoursesThe e-learning course for the Information Systems Security, in the field of Electronics and Telecommunications in the II degree studies (2nd year of studies, 3rd semester).
-
J-lossless and extended J-lossless factorisations approach for delta do main Hinf control.
Publication.
-
Processing of musical data employing rough sets and artificial neural networks
PublicationArtykuł opisuje założenia systemu automatycznej identyfikacji muzyki i dźwięków muzycznych. Dokonano przeglądu standardu MPEG-7, ze szczególnym naciskiem na parametry opisowe dźwięku. Przedyskutowano problemy analizy danych audio, związane z zastosowaniami wykorzystującymi MPEG-7. W oparciu o eksperymenty przedstawiono efektywność deskryptorów niskiego poziomu w automatycznym rozpoznawaniu dźwięków instrumentów muzycznych. Przedyskutowano...
-
Processing of musical data employing rough sets and artificial neural networks
PublicationArtykuł opisuje założenia systemu automatycznej identyfikacji muzyki i dźwięków muzycznych. Dokonano przeglądu standardu MPEG-7, ze szczególnym naciskiem na parametry opisowe dźwięku. Przedyskutowano problemy analizy danych audio, związane z zastosowaniami wykorzystującymi MPEG-7. W oparciu o eksperymenty przedstawiono efektywność deskryptorów niskiego poziomu w automatycznym rozpoznawaniu dźwięków instrumentów muzycznych. Przedyskutowano...
-
Quantum security and theory of decoherence
PublicationWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Implementation of AES cryptography alghoritm in FPGA
PublicationW artykule przedstawiono porównanie dwóch realizacji algorytmu kryptograficznego AES w układzie programowalnym FPGA. W pierwszej wersji zrealizowano algorytm prosty i odwrotny łącznie z modułami sprzętowej realizacji rozwijania klucza. W drugiej wersji klucze są rozwijane programowo poprzez wbudowany procesor. Obie realizacje zostały przetestowane praktycznie na płytce prototypowej. Przedstawiono osiągnięte przepustowości jak również...
-
Minimal 2-dominating sets in Trees
PublicationWe provide an algorithm for listing all minimal 2-dominating sets of a tree of order n in time O(1.3247^n). This leads to that every tree has at most 1.3247^n minimal 2-dominating sets. We also show that thisbound is tight.
-
Minimal double dominating sets in trees
PublicationWe provide an algorithm for listing all minimal double dominating sets of a tree of order $n$ in time $\mathcal{O}(1.3248^n)$. This implies that every tree has at most $1.3248^n$ minimal double dominating sets. We also show that this bound is tight.
-
Chemometric exploration of sea water chemical component data sets with missing elements
Publication -
Algorithms for spatial analysis and interpolation of discrete sets of Critical Infrastructure hazard data
PublicationNowo opracowane zaawansowane narzędzia technologii informacyjnych i komunikacyjnych (TIK) ujawniają swoją przydatność do przewidywania różnego rodzaju zagrożeń oraz minimalizowania związanego z nimi potencjalnego ryzyka. Jednakże większość tych narzędzi operuje jedynie na niektórych typach infrastruktury i zaniedbuje ich przestrzenne interakcje z otoczeniem oraz innymi strukturami. Niniejszy artykuł zawiera propozycje kilku algorytmów...
-
Application of the Msplitmethod for filtering airborne laser scanning data-sets to estimate digital terrain models
PublicationALS point cloud filtering involves the separation of observations representing the physical terrain surface from those representing terrain details. A digital terrain model (DTM) is created from a subset of points representing the ground surface. The accuracy of the generated DTM is influenced by several factors, including the survey method used, the accuracy of the source data, the applied DTM generation algorithm, and the survey...
-
EVALUATION OF THE ENERGY SECURITY AS A COMPONENT OF NATIONAL SECURITY OF THE COUNTRY
Publication -
Modeling of Human Tissue for Medical Purposes
PublicationThe paper describes the possibilities offered for medicine by modeling of human tissue using virtual and augmented reality. It also presents three proposals of breast modeling for the use in clinical practice. These proposals are the result of arrangements of medical and computer scientists team (the authors) and will be pursued and implemented in the near future. There is included also a brief description of the most popular methods...
-
Experimental Research of an Axial Piston Pump with Displaced Swash Plate Axis of Rotation
PublicationThe article describes the influence of displacement of the swash plate rotation axis on the efficiency of axial piston pumps. The dead space volume was defined as the volume of the working chamber in the extreme position of the piston at the end of the pumping phase and its variability was determined as a function of the position of the axis of rotation of the swash plate and the swing angle of swash plate. The influence of swash...
-
Measurement of idlers rotation speed in belt conveyors based on image data analysis for diagnostic purposes
Publication -
A Highly Sensitive Planar Microwave Sensor for Detecting Direction and Angle of Rotation
PublicationThis article presents a technique based on a modified complementary split-ring resonator (CSRR) to detect angular displacement and direction of rotation with high resolution and sensitivity over a wide dynamic range. The proposed microwave planar sensor takes advantage of the asymmetry of the sensor geometry and measures the angle of rotation in terms of the change in the relative phase of the reflection coefficients. The sensor...
-
Convergence of expansions in Schrödinger and Dirac eigenfunctions, with an application to the R-matrix theory
PublicationW pracy zbadano właściwości rozwinięć w szeregi funkcji własnych dla zagadnień Schrödingera i Diraca. Potwierdzono obserwacje poczynione wcześniej przez Rosenthala oraz przez Szmytkowskiego i Hinze, że szereg funkcyjny występujący w teorii R-macierzy dla cząstek Diraca w ogólności nie zbiega do funkcji ciągłej.
-
Integrated spatial and energy planning – importance of a problem for contemporary architects and urban planners with focus on environmental factors
PublicationAlong with respecting basic sustainable development goals, planners will also be obliged to meet more stringent provisions related to energy efficiency in the coming years. In Poland, a crucial year will be 2021, when the EU directive on the energy efficiency of buildings comes into force. In this matter, not only the characteristics of individual objects are of great importance, but their whole complexes and the overall approach...
-
Trees having many minimal dominating sets
PublicationWe provide an algorithm for listing all minimal dominating sets of a tree of order n in time O(1.4656^n). This leads to that every tree has at most 1.4656^n minimal dominating sets. We also give an infinite family of trees of odd and even order for which the number of minimal dominating sets exceeds 1.4167^n, thus exceeding 2^{n/2}. This establishes a lower bound on the running time of an algorithm for listing all minimal dominating...
-
Managing enterprise IT infrastructure and security 2022
e-Learning CoursesThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
Global defensive sets in graphs
PublicationIn the paper we study a new problem of finding a minimum global defensive set in a graph which is a generalization of the global alliance problem. For a given graph G and a subset S of a vertex set of G, we define for every subset X of S the predicate SEC ( X ) = true if and only if | N [ X ] ∩ S | ≥ | N [ X ] \ S | holds, where N [ X ] is a closed neighbourhood of X in graph G. A set S is a defensive alliance if and only if for...
-
Reconfiguring Minimum Dominating Sets in Trees
PublicationWe provide tight bounds on the diameter of γ-graphs, which are reconfiguration graphs of the minimum dominating sets of a graph G. In particular, we prove that for any tree T of order n ≥ 3, the diameter of its γ-graph is at most n/2 in the single vertex replacement adjacency model, whereas in the slide adjacency model, it is at most 2(n − 1)/3. Our proof is constructive, leading to a simple linear-time algorithm for determining...
-
THE ROLE OF INFERENCE IN MOBILE MEDICAL APPLICATION DESIGN
PublicationIn the early 21st century, artificial intelligence began to be used to process medical information. However, before this happened, predictive models used in healthcare could only consider a limited number of variables, and only in properly structured and organised medical data. Today, advanced tools based on machine learning techniques - which, using artificial neural networks, can explore extremely complex relationships - and...
-
On quantum cryptography with bipartite bound entangled states
PublicationOstatnio pokazano bezpośrednie zastosowanie splątania związanego w kryptografii kwantowej. W niniejszym artykule dokonano przeglądu niektórych najnowszych osiągnięć dotyczących tego zagadnienia. W szczególności przypomniano istotne pojęcia i definicje. Ponadto podano nową konstrukcję stanów o splątaniu związanym, posiadających bezpieczne korelacje, dostarczając w ten sposób niskowymiarowe (6x6) stany o splątaniu związanym z niezerowym...
-
A survey of medical researchers indicates poor awareness of research data management processes and a role for data librarians
Publication -
Innovative Web-Based Geographic Information System for Municipal Areas and Coastal Zone Security and Threat Monitoring Using EO Satellite Data
PublicationThe paper presents a novel design of a Web-based Safe City & Coastal Zone GIS (SCCZ-GIS). The system integrates data acquired from different remote sensing and geospatial data sources for the purpose monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilises several innovative technologies and solutions, and is capable of direct co-operation with different remote sensing data sources...
-
Influence of the position of the swash plate rotation axis on the volumetric efficiency of the axial pistons pumps
PublicationThe article describes the influence of the position of the swash plate axis of rotation on the size of the dead space and the volumetric efficiency of the axial pistons pump. Superposition of the two motions have been proposed - the rotation of the swash plate with respect to axis intersecting the axis of rotation of the pump shaft and the shifts of swash plate yielding a result of the rotation axis offset effect. In the article...
-
Application of Msplit method for filtering airborne laser scanning data sets to estimate digital terrain models
PublicationALS point cloud filtering involves the separation of observations representing the physical terrain surface from those representing terrain details. A digital terrain model (DTM) is created from a subset of points representing the ground surface. The accuracy of the generated DTM is influenced by several factors, including the survey method used, the accuracy of the source data, the applied DTM generation algorithm, and the survey...
-
Some Security Features of Selected IoT Platforms
PublicationIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
Energy Security of Polish Consumers in 2004-2021
Open Research DataEnergy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. In the years 2004–2021, energy security of the individual consumer in the economic dimension significantly improved. This was due to several factors:1....
-
Ukraine’s Energy Security in Strategies
PublicationDuring the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublicationThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublicationML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
Active Dynamic Thermography in Medical Diagnostics
PublicationThis is an overview of active thermal imaging methods in medical diagnostics using external thermal stimulation. In this chapter, several clinical cases diagnosed using the active dynamic thermography method, ADT, are presented. Features of this technology are discussed and main advantages underlined. Applications in skin burn diagnostics and quantitative evaluation leading to modern classification of burned patients for further...
-
GPU-Accelerated Finite-Element Matrix Generation for Lossless, Lossy, and Tensor Media [EM Programmer's Notebook]
PublicationThis paper presents an optimization approach for limiting memory requirements and enhancing the performance of GPU-accelerated finite-element matrix generation applied in the implementation of the higher-order finite-element method (FEM). It emphasizes the details of the implementation of the matrix-generation algorithm for the simulation of electromagnetic wave propagation in lossless, lossy, and tensor media. Moreover, the impact...
-
Security Mechanisms in the Comcute System
PublicationThe aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.
-
ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS
PublicationThe article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...
-
Electronic Noses in Medical Diagnostics
PublicationElectronic nose technology is being developed in order to identify aromas in a way parallel to the biologic olfaction. When applied to the field of medicine, such device should be able to identify and discriminate between different diseases. In recent years this kind of approach finds application in medical diagnostics, and especially in disease screening. Despite the fact that devices utilizing chemical sensor arrays are not routinely...
-
Rafał Leszczyna dr hab. inż.
PeopleDr hab. Rafal Leszczyna is an associate professor at Gdansk University of Technology, Faculty of Management and Economics. He holds the M.Sc. degrees of Computer Science and Business Management. In December, 2006 he earned a Ph.D. in Computer Science, specialisation - Computer Security at the Faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. Between 2004 and 2008 he worked in the European...
-
Graph security testing
PublicationSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Process layout planning and optimised product range selection in manufacture of wooden construction sets
PublicationThis paper introduces a systematic deterministic framework for planning and the analysis of facility layouts aimed at manufacturing a variety of parts, as components of specific end products. The essence of the proposed approach lies in the decomposition of a traditional job-shop into layout modules of generic material flow patterns, that inherently yields improved efficiency of the entire system. It entails the use of a relevant...
-
Dependable Integration of Medical Image Recognition Components
PublicationComputer driven medical image recognition may support medical doctors in the diagnosis process, but requires high dependability considering potential consequences of incorrect results. The paper presentsa system that improves dependability of medical image recognition by integration of results from redundant components. The components implement alternative recognition algorithms of diseases in thefield of gastrointestinal endoscopy....
-
Art and Healthcare - Healing Potential of Artistic Interventions in Medical Settings
PublicationThe stereotype of a machine for healing seems to be well rooted in common thinking and social perception of hospital buildings. The technological aspect of healthcare architecture has been influenced for several years by three major factors. The first is linked to the necessity of providing safety and security in the environment of elevated epidemiological risk. The second concerns the need for incorporating advanced technology...
-
Hardware cryptography coprocessor for system on chip soft processor
PublicationW artykule przedstawiono realizację sprzętową i programową szyfrującejo i deszyfrującego algorytmu AES.Obydwie implementacje zostały zralizowane z wykorzystaniem układu Virtex II i przetestowane. Jako kryterium porónawcze wybrano zużycie zasobów układu oraz wydajność. Realizacja sprzętowa wykonuje operację szyfrowania 2 dekady szybcie niż wersja programowa, ale wymaga pięciokrotnie więcej zasobówIn this paper hardware and software...
-
Security and Defence Quarterly
Journals -
Extendable Safety and Security Ontology
PublicationSecurity plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...
-
Application of Intuitionistic Fuzzy Sets to the assessment of technical university students
PublicationThe article proposes application of artificial intelligence methods to assess students of technical universities. The level of achieved educational goals can be assessed using measurements based on the idea of Fuzzy Intuitionistic Sets (IFS). A classification algorithm was developed and an exemplary distribution of the criteria values using IFS was presented. The application of the proposed approach in online education can enrich...
-
Areas of research in maritime security
PublicationW referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.
-
An integrated framework for security protocol analysis
PublicationAssurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...