Search results for: PROTOCOL
-
Assessment of the physical fitness of road cyclists in the step and ramp protocols of the incremental test
Publication -
Interlaboratory Test to Characterize the Cyclic Behavior of Bituminous Interlayers: An Overview of Testing Equipment and Protocols
PublicationThe performance assessment of multi-layered pavements strongly depends on the mechanical behavior of the interface between bituminous layers. So far, comprehensive studies have been carried out mainly using quasi-static laboratory tests focusing on the interlayer shear strength at failure. However, it is generally recognized that cyclic shear testing will lead to the determination of parameters which are more closely linked to...
-
Interlaboratory Test to Characterize the Cyclic Behavior of Bituminous Interlayers: An Overview of Testing Equipment and Protocols
PublicationThe performance assessment of multi-layered pavements strongly depends on the mechanical behavior of the interface between bituminous layers. So far, comprehensive studies have been carried out mainly using quasi-static laboratory tests focusing on the interlayer shear strength at failure. However, it is generally recognized that cyclic shear testing will lead to the determination of parameters which are more closely linked to...
-
Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs
PublicationA rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...
-
International Journal of Surgery Protocols
Journals -
Current Protocols in Protein Science
Journals -
Current Protocols in Molecular Biology
Journals -
Current Protocols in Cell Biology
Journals -
Current protocols in mouse biology
Journals -
Cold Spring Harbor Protocols
Journals -
Current Protocols in Human Genetics
Journals -
Current protocols in chemical biology
Journals -
Current protocols in plant biology
Journals -
Comparison of the main bioactive compounds and antioxidants in garlic and white and red onion after treatment protocols
PublicationPolski czosnek, biała i czerwona cebula była blanszowana, gotowana, smażona i poddawana działaniom promieniowania mikrofalowego. Następnie były w nich oznaczane m.in. takie związki jak polifenole, flawonoidy, kwas ascorbinowy i aktywne antyoksydanty. Udowodniono, że blanszowanie, smażenie i poddawanie działaniu promieniowania mikrofalowego nie wpływa znacząco na zmiejszenie zawartości badanych związków w czosnku i cebuli. Wyznaczono...
-
Acute Effects of Varied Back Squat Activation Protocols on Muscle-Tendon Stiffness and Jumping Performance
Publication -
Acute Effects of Different Blood Flow Restriction Protocols on Bar Velocity During the Squat Exercise
Publication -
An Idea Bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANs
PublicationDla klasy protokołów MAC opartych na przypadkowo krążącym żetonie dononano rozdziału polityki wyłaniania zwycięzcy od strategii wyboru szczeliny dla żądania dostępu. Wyróżniono klasę protokołów RT/ECD, dla której zidentyfikowano typ wynikowej gry niekooperacyjnej. Pokazano, że gra ta zasadniczo różni się od wieloosobowego dylematu więźnia. Zaprojektowano heurystyczną strategię asymptotycznie zniechęcającą do zachowań egoistycznych...
-
Soft Real-Time Communication with WebSocket and WebRTC Protocols Performance Analysis for Web-based Control Loops
PublicationThe web browser has become an access window for content and services. The browser is available on almost any device connected to the network, regardless of its intended use: desktop, mobile device, computing server, e-book reader etc. Browsers are used by people to read news, contact the world, to check a bank account, register a visit at the doctor, watching video content, electronic purchases, using web versions of the office...
-
Mobility Management Solutions for IP Networks Comparative Analysis of IP-based Mobility Protocols and Handover Algorithms Invited Paper
PublicationA rapid growth of IP-based networks and services hascreated a vast collection of resources and functionalities availableto users by means of a uniform method of access offered by the IPprotocol. At the same time, advances in the design of mobileelectronic devices allowed them to reach a utility levelcomparable to desktop computers, while still retaining theirmobility advantage. Unfortunately, the base IP protocol does notperform...
-
Current Protocols in Nucleic Acid Chemistry
Journals -
Current Protocols in Essential Laboratory Techniques
Journals -
Current Protocols in Stem Cell Biology
Journals -
JMIR Research Protocols
Journals -
Effect of BMI on safety of bariatric surgery during the COVID-19 pandemic, procedure choice, and safety protocols – An analysis from the GENEVA Study
Publication -
Association between use of enhanced recovery after surgery protocols and postoperative complications in colorectal surgery in Europe: The EuroPOWER international observational study
Publication -
Application of EARL (ResEARch 4 Life®) protocols for [18F]FDG-PET/CT clinical and research studies. A roadmap towards exact recovery coefficient
Publication -
Estudios Institucionales. Revista internacional de investigación en Instituciones, Ceremonial y Protocolo.
Journals -
Nature Protocols
Journals -
International Conference on Network Protocols
Conferences -
International Workshop on Security Protocols
Conferences -
INFOGEST static in vitro simulation of gastrointestinal food digestion
PublicationDeveloping a mechanistic understanding of the impact of food structure and composition on human health has increasingly involved simulating digestion in the upper gastrointestinal tract. These simulations have used a wide range of different conditions that often have very little physiological relevance, and this impedes the meaningful comparison of results. The standardized protocol presented here is based on an international consensus...
-
International Workshop on Group-Oriented Cryptographic Protocols
Conferences -
A Novel Method for the Combined Photocatalytic Activity Determination and Bandgap Estimation
Publication -
Workshop on Localized Algorithms and Protocols for Wireless Sensor Networks
Conferences -
ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Conferences -
Revsable framework for telecontrol protocols. W: Springer Homepage [online] Proceedings. Second International ESPRIT ARES Workshop on Development and Evolution of Software Architectures for Product Families. Las Palmas de Gran Canaria, Spain, February 26-27, 1998. [Dostęp: 20 grudnia**2002]. Ed. F. van der Linden. Dostępny w World Wide Web: http://link.springer.de/link/ /service/series/0558/tocs/t1429.htm [s. 6-13, 5 rys. bibliogr. 6 poz.] Wzorce wielokrotnego wykorzystania oprogramowania protokołów telesterowa- nia.
PublicationZaprezentowano wzorzec COMSOFT wielokrotnego wykorzystania oprogramowania o-pracowany dla protokołów telesterowania. Jego podstawy tworzą: metodologiaobiektowa i wzorce wielokrotnego użycia. Zastosowanie wzorców wspomagają:biblioteka komponentów, wykorzystywanych we wszystkich fazach konstrukcji o-programowania oraz procedury użytkowania i parametryzacji. Opracowane wzorcezostały praktycznie zastosowane do konstrukcji oprogramowania...
-
Sylwester Kaczmarek dr hab. inż.
PeopleSylwester Kaczmarek received his M.Sc in electronics engineering, Ph.D. and D.Sc. in switching and teletraffic science from the Gdansk University of Technology, Gdansk, Poland, in 1972, 1981 and 1994, respectively. His research interests include: IP QoS and GMPLS and SDN networks, switching, QoS routing, teletraffic, multimedia services and quality of services. Currently, his research is focused on developing and applicability...
-
The effect of anthraquinone derivatives on telomerase activity
Open Research DataThe data set contains images of the PCR products obtained from the Telomerase Repeated Amplification Protocol (TRAP). The effect of anthraquinone derivatives (TXT1-TXT9) on telomerase activity was comparatively examined using the following reference compounds: BIBR1532, TMPyP4 and mitoxantrone (MTX).
-
The effect of anthraquinone derivatives (C1-C9) on telomerase activity
Open Research DataThe data set contains images of the PCR products obtained from the Telomerase Repeated Amplification Protocol (TRAP). The effect of anthraquinone derivatives (C-C9) on telomerase activity was analyzed using lysates from drug-treatedcancer cell line.
-
Device-independent quantum key distribution based on measurement inputs
PublicationWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Robust amplification of Santha-Vazirani sources with three devices
PublicationWe demonstrate that amplification of arbitrarily weak randomness is possible using quantum resources. We present a randomness amplification protocol that involves Bell experiments. We find a Bell inequality which can amplify arbitrarily weak randomness and give a detailed analysis of the protocol involving it. Our analysis includes finding a sufficient violation of Bell inequality as a function of the initial quality of randomness....
-
Dynamic Route Discovery Using Modified Grasshopper Optimization Algorithm in Wireless Ad-Hoc Visible Light Communication Network
PublicationIn recent times, visible light communication is an emerging technology that supports high speed data communication for wireless communication systems. However, the performance of the visible light communication system is impaired by inter symbol interference, the time dispersive nature of the channel, and nonlinear features of the light emitting diode that significantly reduces the bit error rate performance. To address these problems,...
-
Why is IPv6 Deployment Important for the Internet Evolution?
PublicationAbstract-Replacing the IPv4 protocol with IPv6 on the Internet is currently one of the aims of the European Union policy. The main reason for this replacement is the effeteness of the addresses pool in the IPv4 protocol, which can cause serious complications in the evolution of the Internet and its adaptation in new areas, e.g., in next generation mobile telephony or the so called Internet of Things. Simultaneously, the addressing...
-
Analiza porównawcza wybranych hierarchicznych algorytmów trasowania w sieciach ad hoc
PublicationW referacie przybliżono ogólną zasadę działania algorytmów hierarchicznych stosowanych w sieciach ad hoc. Szczegółowo omówiono dwa hierarchiczne protokoły trasowania: Cluster Based Routing Protocol oraz Zone Routing Protocol. Osobny punkt referatu poświęcono analizie porównawczej obu protokołów. W podsumowaniu przeanalizowano zasadność zastosowania wspomnianych protokołów w Zautomatyzowanym Systemie Radarowego Nadzoru Polskich...
-
Anna Brillowska-Dąbrowska dr hab. inż.
PeopleAnna Brillowska-Dąbrowska, born in 1971 in Gdańsk, Poland, graduated in 1996 in Biotechnology from the Faculty of Chemistry, Gdańsk University of Technology (GUT). In 2001 she got her PhD, in 2013 became a DSc (habilitation). She was employed in 2004 as a researcher in Statens Serum Institut in Denmark. Currently she is an Associate Professor (adiunkt) in the Department of Molecular Biotechnology and Microbiology and Vice-dean...
-
Advanced surveillance and operational communication system employing mobile terminals
PublicationDistributed surveillance and operational communications system based on XMPP protocol is presented. Its architecture and assumptions leading to the depicted design are shown. Features of XMPP protocol are portrayed with the emphasis on those most important in the context of the application. Real-time multimedia transmission with the use of Jingle/XMPP extension is discussed. The use of PDA-class computers as mobile terminals is...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublicationRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
Anonymity Architecture for Mobile Agent Systems
PublicationThe paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...
-
All Nonclassical Correlations Can Be Activated into Distillable Entanglement
PublicationWe devise a protocol in which general nonclassical multipartite correlations produce a physically relevant effect, leading to the creation of bipartite entanglement. In particular, we show that the relative entropy of quantumness, which measures all nonclassical correlations among subsystems of a quantum system, is equivalent to and can be operationally interpreted as the minimum distillable entanglement generated between the system...
-
Randomness Amplification under Minimal Fundamental Assumptions on the Devices
PublicationRecently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...