Filters
total: 29926
-
Catalog
- Publications 5872 available results
- Journals 713 available results
- Conferences 173 available results
- Publishing Houses 3 available results
- People 237 available results
- Inventions 1 available results
- Projects 24 available results
- Laboratories 1 available results
- e-Learning Courses 165 available results
- Events 25 available results
- Open Research Data 22712 available results
displaying 1000 best results Help
Search results for: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS.
-
Wybrane problemy ochrony żeglugi (Maritime Security)
Publicationprzedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...
-
Algorithms for testing security in graphs
PublicationIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Rough Sets Applied to Mood of Music Recognition
PublicationWith the growth of accessible digital music libraries over the past decade, there is a need for research into automated systems for searching, organizing and recommending music. Mood of music is considered as one of the most intuitive criteria for listeners, thus this work is focused on the emotional content of music and its automatic recognition. The research study presented in this work contains an attempt to music emotion recognition...
-
Functional safety and security assessment of the control and protection systems
PublicationW artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublicationThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
E-textbook technologies for academics in medical education
PublicationPublic universities in Poland receive fairly limited financial support for creating e-textbooks and lack the appropriate ICT competences among teaching staff, especially in the case of non-technical universities. The authors propose a pedagogical and technological paradigm for e-textbooks in medical education using open source software with minimal IT skills required. Technologies used to develop e-textbooks are connected with:...
-
Multimedia industrial and medical applications supported by machine learning
PublicationThis article outlines a keynote paper presented at the Intelligent DecisionTechnologies conference providing a part of the KES Multi-theme Conference “Smart Digital Futures” organized in Rome on June 14–16, 2023. It briefly discusses projects related to traffic control using developed intelligent traffic signs and diagnosing the health of wind turbine mechanisms and multimodal biometric authentication for banking branches to provide...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublicationIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Biopolymers in designing modern antimicrobial medical materials. Part I. Biopolymer medical materials - collagen, chitosan
PublicationThe article is a review of the literature concerning the possible use of biopolymers for the preparation of dressings with antimicrobial activity. Authors show the potential of biopolymers: collagen and chitosan - which have the ability to immobilize and control the release of various active compounds - for providing the appropriate antibacterial, bacteriostatic and wound healing properties. Types of threats, for which the dressing...
-
Security Assessment of a Turbo-Gas Power Plant
PublicationCritical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.
-
ANYTIME POLYNOMIAL HEURISTIC ALGORITHM FOR PARTITIONING GROUPS OF DATA WITH PRESERVING CLASS PROPORTIONS FOR CROSS-VALIDATION
PublicationThe article describes a problem of splitting data for k-fold cross-validation, where class proportions must be preserved, with additional constraint that data is divided into groups that cannot be split into different cross-validation sets. This problem often occurs in e.g. medical data processing, where data samples from one patient must be included in the same cross-validation set. As this problem is NP-complete, a heuristic...
-
A J-lossless coprime factorisation approach to H control in delta domain
PublicationPraca dotyczy sterowania wielowymiarowym obiektem dynamicznym czasu ciągłego opisanym dyskretnoczasowym modelem w przestrzeni stanu, przy założeniu, że wskaźnik jakości sterowania oparty jest na normie H-inf. Odpowiednie zadanie optymalizacji tego wskaźnika rozwiązuje się, stosując tak zwaną względnie pierwszą J-bezstratną faktoryzację modelu sterowanego. Pokazano, że synteza optymalnego sterownika, wymagająca rozwiązania dwóch...
-
I-lossless factorisations for robust H-inf-control in delta-domain
Publication...
-
Kinetyka reakcji utwardzania eteru diglicydylowego bisfenolu-Amodyfikowanego 2-hydroksyetylometyloakrylanem
PublicationObecnie na świecie zużywa się około 1,3 mln ton żywic epoksydowych rocznie a prognozy wzrostu zapotrzebowania na tę grupę materiałów polimerowych są obiecujące, ze względu na nieskomplikowaną technologię ich wytwarzania. Wiele ośrodków naukowych prowadzi badania w kierunku uzyskania coraz to lepszych parametrów fizyko-chemicznych pozwalających na rozszerzenie spektrum ich zastosowania. Badania te prowadzą również do zmiany w budowie...
-
Wpływ 2-hydroksyetylometyloakrylanu na właściwości fizyczne eteru diglicydylowego bisfenolu-A utwardzanego diaminodifenylometanem
PublicationW pracy przedstawiono wyniki badań wpływu 2-hydroksyetylometyloakrylanu (HEMA) na właściowści fizyczne eteru diglicydylowego bisfenolu-A (DGEBA) utwardzanego diaminodifenylometanem (DDM). Badania statycznych właściwości mechanicznych: wytrzymałość na rozciąganie, twardość, gęstość oraz parametry kinetyki reakcji sieciowania wykazały ścisłą zależność pomiędzy składem wymienionych substratów a ich wpływem na uzyskane parametry fizyczne.
-
Rotationally invariant bipartite states and bound entanglement
PublicationW pracy rozważano stany kwantowe niezmiennicze na działanie grupy SO(3). Pokazano, że w przypadku, gdy pierwszy podukład ma parzysty wymiar większy lub równy cztery oraz drugi podukład ma wymiar dowolny, większy niż pierwszy to pośród takich stanów zawsze istnieje splątanie związane.
-
Computational modelling of the modification of epoxy resins
PublicationSymulacja komputerowa właściwości fizycznych sieci żywic epoksydowych (DGEBA/DDM) modyfikowanych związkami akrylowymi przy użyciu programu Cheops® MillionZillion Software.
-
The use of machine learning for face regions detection in thermograms
PublicationThe aim of this study is to analyse the methods of detecting characteristic points of the face in thermographic images. As part of the implementation an extensive analysis of scientific publications covering similar issues both for the analysis of images made in visible light and thermographic images was carried out. On the basis of this analysis, 3 models were selected and then they were implemented and tested on the basis of...
-
Interactions in aqueous solutions of K-peptide and DMSO – spectroscopic and calorimetric studies
PublicationIntroduction K-peptide (GILQINSRW) – short 9 amino acid fragment of the hen egg white lysozyme has the ability to form amyloid structures. Dimethyl sulfoxide (DMSO) is an osmolyte which can alter this ability. Our goal was to get an insight into the mechanism of Kpeptide-DMSO interactions in aqueous solutions. Such a knowledge can be helpful to understand processes leading to various neurodegenerative diseases. Methods ATR-FTIR...
-
Customized crossover in evolutionary sets of safe ship trajectories
PublicationThe paper presents selected aspects of evolutionary sets of safe ship trajectories-a method which applies evolutionary algorithms and some of the assumptions of game theory to solving ship encounter situations. For given positions and motion parameters of the ships, the method finds a near optimal set of safe trajectories of all ships involved in an encounter. The method works in real time and the solutions must be returned within...
-
DESIGNS CODES AND CRYPTOGRAPHY
Journals -
Adaptive system for recognition of sounds indicating threats to security of people and property employing parallel processing of audio data streams
PublicationA system for recognition of threatening acoustic events employing parallel processing on a supercomputing cluster is featured. The methods for detection, parameterization and classication of acoustic events are introduced. The recognition engine is based onthreshold-based detection with adaptive threshold and Support Vector Machine classifcation. Spectral, temporal and mel-frequency descriptors are used as signal features. The...
-
A note on an approximative scheme of finding almost homoclinic solutions for Newtonian systems
PublicationIn this work we will be concerned with the existence of an almost homoclinic solution for a perturbed Newtonian system in a finite dimensional space. It is assumed that a potential is C^1 smooth and its gradient is bounded with respect to a time variable. Moreover, a forcing term is continuous, bounded and squere integrable. We will show that the appproximative scheme due to J. Janczewska for a time periodic potential extends to...
-
Orientation-aware ship detection via a rotation feature decoupling supported deep learning approach
PublicationShip imaging position plays an important role in visual navigation, and thus significant focuses have been paid to accurately extract ship imaging positions in maritime videos. Previous studies are mainly conducted in the horizontal ship detection manner from maritime image sequences. This can lead to unsatisfied ship detection performance due to that some background pixels maybe wrongly identified as ship contours. To address...
-
Proposal of a mobile medical waste incinerator with automatic waste feeder and heat recovery system
PublicationThe paper presents and discusses the issue of medical waste (including hazardous ones) and their proper management. Inappropriate handling of infectious medical waste directly endangers the human being health and the environment. Infectious waste must therefore be properly disposed of – one of the most commonly used methods is the thermal treatment in the incinerators tailored for this purpose. During designing an incinerator unit,...
-
Big Data i 5V – nowe wyzwania w świecie danych (Big Data and 5V – New Challenges in the World of Data)
PublicationRodzaje danych, składające się na zbiory typu Big Data, to m.in. dane generowane przez użytkowników portali internetowych, dane opisujące transakcje dokonywane poprzez Internet, dane naukowe (biologiczne, astronomiczne, pomiary fizyczne itp.), dane generowane przez roboty w wyniku automatycznego przeszukiwania przez nie Internetu (Web mining, Web crawling), dane grafowe obrazujące powiązania pomiędzy stronami WWW itd. Zazwyczaj,...
-
Investigating beliefs in anti-vax conspiracy theories among medical students
PublicationAbstract: While the doctors’ role in immunization is essential, their lack of knowledge or vaccine hesitancy may affect their ability to communicate effectively and educate patients about vaccination, vaccine hesitancy, and vaccine conspiracy theories. This, in turn, may hinder health policy aimed at fighting infectious diseases. Vaccine hesitancy is prevalent not only among the general population but also among healthcare...
-
COLREGS compliance in Evolutionary Sets of Cooperating Ship Trajectories
PublicationIn general, Evolutionary Sets of Cooperating Ship Trajectories combine some of the assumptions of game theory with evolutionary programming and aim to find optimal set of cooperating trajectoriesof all ships involved in an encounter situation. In a two-ship encounter situation the method enables the operator of an on-board collision-avoidance system to predict the most probable behaviour of atarget and to plan the own manoeuvres...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublicationWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Scabies – still current medical and social problem. A retrospective analysis of 193 cases
Publication -
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
Automatic sound recognition for security purposes
PublicationIn the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...
-
On Software Unit Testing For Security and Performance Gain At Unit Level
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
On Software Unit Testing For Improving Security And Performance Of Distributed Applications
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
Data Mining Applications and Methods in Medicine
PublicationIn this paper we describe the research area of data mining and its applications in medicine. The origins of data mining and its crucial features are shortly presented. We discuss the specificity of medicine as an application area for computer systems. Characteristic features of the medical data are investigated. Common problems in the area are also presented as well as the strengths and capabilities of the data mining methods....
-
Data Analytics Meeting
EventsData Analytics Meeting Konferencja studentów i doktorantów
-
Rotation Triggers Nucleotide-Independent Conformational Transition of the Empty β Subunit of F1-ATPase
PublicationF1-ATPase (F1) is the catalytic portion of ATP synthase, a rotary motor protein that couples proton gradients to ATP synthesis. Driven by a proton flux, the F1 asymmetric γ subunit undergoes a stepwise rotation inside the α3β3 headpiece and causes the β subunits’ binding sites to cycle between states of different affinity for nucleotides. These concerted transitions drive the synthesis of ATP from ADP and phosphate. Here, we study...
-
Evolutionary Sets of Safe Ship Trajectories: problem dedicated operators
PublicationThe paper presents the optimization process of the evolutionary sets of safe ship trajectories method, with a focus on its problem-dedicated operators. The method utilizes a customized evolutionary algorithm to solve a constrained optimization problem. This problem is defined as finding a set of cooperating trajectories (a set is an evolutionary individual) of all the ships involved in the encounter situation. The resulting trajectories...
-
Polyurethanes as a Potential Medical-Grade Filament for Use in Fused Deposition Modeling 3D Printers – a Brief Review
PublicationThe possibility of using 3D printing technology (3DP) in medical field is a kind of revolution in health care. This has contributed to a rapid growth in demand for 3D printers, whose systems and materials are adapted to strict medical requirements. In this paper, we report a brief review of polyurethanes as a potential medical-grade filament for use in Fused Deposition Modeling (FDM) 3D printer technology. The advantages of polyurethanes...
-
Arithmetic Loophole in Bell's Theorem: Overlooked Threat to Entangled-State Quantum Cryptography
PublicationBell’s theorem is supposed to exclude all local hidden-variable models of quantum correlations. However,an explicit counterexample shows that a new class of local realistic models, based on generalized arith-metic and calculus, can exactly reconstruct rotationally symmetric quantum probabilities typical oftwo-electron singlet states. Observable probabilities are consistent with the usual arithmetic employedby macroscopic observers...
-
Periodic expansion in determining minimal sets of Lefschetz periods for Morse–Smale diffeomorphisms
PublicationWe apply the representation of Lefschetz numbers of iterates in the form of periodic expansion to determine the minimal sets of Lefschetz periods of Morse–Smale diffeomorphisms. Applying this approach we present an algorithmic method of finding the family of minimal sets of Lefschetz periods for Ng, a non-orientable compact surfaces without boundary of genus g. We also partially confirm the conjecture of Llibre and Sirvent (J Diff...
-
A sense of security and freedom in a residential environment
PublicationThe article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...
-
Elastoplastic law of Cosserat type in shell theory with drilling rotation
PublicationWithin the framework of six-parameter non-linear shell theory, with strain measures of the Cosserat type, we develop small-strain J2-type elastoplastic constitutive relations. The relations are obtained from the Cosserat plane stress relations assumed in each shell layer, by through-the-thickness integration employing the first-order shear theory. The formulation allows for unlimited translations and rotations. The constitutive...
-
Visual Attention Distribution Based Assessment of User's Skill in Electronic Medical Record Navigation
PublicationCurrently, the most precise way of reflecting the skills level is an expert’s subjective assessment. In this paper we investigate the possibility of the use of eye tracking data for scalar quantitative and objective assessment of medical staff competency in EMR system navigation. According to the experiment conducted by Yarbus the observation process of particular features is associated with thinking. Moreover, eye tracking is...
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublicationThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
DEEP CONVOLUTIONAL NEURAL NETWORKS AS A DECISION SUPPORT TOOL IN MEDICAL PROBLEMS – MALIGNANT MELANOMA CASE STUDY
PublicationThe paper presents utilization of one of the latest tool from the group of Machine learning techniques, namely Deep Convolutional Neural Networks (CNN), in process of decision making in selected medical problems. After the survey of the most successful applications of CNN in solving medical problems, the paper focuses on the very difficult problem of automatic analyses of the skin lesions. The authors propose the CNN structure...
-
ATOMIC DATA AND NUCLEAR DATA TABLES
Journals -
Mariusz Kaczmarek dr hab. inż.
PeopleReceived M.Sc., Eng. in Electronics in 1995 from Gdansk University of Technology, Ph.D. in Medical Electronics in 2003 and habilitation in Biocybernetics and Biomedical Engineering in 2017. He was an investigator in about 13 projects receiving a number of awards, including four best papers, practical innovations (7 medals and awards) and also the Andronicos G. Kantsios Award and Siemens Award. Main research activities: the issues...
-
PUBLIC SOURCES OF FINANCE FOR CULTURE AS AN ELEMENT OF CULTURAL SECURITY IN POLAND
PublicationCulture is an important element of the country, playing an important role both for its security and the economy. It cannot be only seen as a cost-creating sector, but may be a significant factor in economic development. For this to happen, it is necessary to create a system of financing this economic sector. This article’s aim is to analyze the use of funds from public sources in Poland to finance culture-related activities. The...