Search results for: SENTINEL NODE BIOPSY - Bridge of Knowledge

Search

Search results for: SENTINEL NODE BIOPSY

Search results for: SENTINEL NODE BIOPSY

  • LYMPH NODES, Lymph node face, head ,neck - Unknown, 62 - Tissue image [3300730069384551]

    Open Research Data

    This is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.

  • LYMPH NODES, Lymph node face, head ,neck - Unknown, 62 - Tissue image [3300730069382121]

    Open Research Data

    This is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.

  • LYMPH NODES, Lymph node face, head ,neck - Unknown, 62 - Tissue image [3300730069382081]

    Open Research Data

    This is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.

  • LYMPH NODES, Lymph node face, head ,neck - Unknown, 62 - Tissue image [3300730069384201]

    Open Research Data

    This is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.

  • LYMPH NODES, Lymph node face, head ,neck - Unknown, 62 - Tissue image [3300730069382491]

    Open Research Data

    This is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.

  • LYMPH NODES, Lymph node face, head ,neck - Unknown, 62 - Tissue image [3300730069387581]

    Open Research Data

    This is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.

  • Distinguishing views in symmetric networks: A tight lower bound

    Publication

    The view of a node in a port-labeled network is an infinite tree encoding all walks in the network originating from this node. We prove that for any integers n ≥ D ≥ 1, there exists a port-labeled network with at most n nodes and diameter at most D which contains a pair of nodes whose (infinite) views are different, but whose views truncated to depth Omega( D log(n/ D )) are identical.

    Full text available to download

  • Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks

    Publication

    - Electronics - Year 2022

    Dominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...

    Full text available to download

  • Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

    Publication

    - Year 2014

    We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...

    Full text to download in external service

  • Design and Performance Evaluation of the Energy Subsystem of a Hybrid Light andWave Energy Harvester

    The paper presents the design and performance of an energy subsystem (ES) dedicated to hybrid energy harvesters (HEHs): wave energy converters (WECs) combined with photovoltaic panels (PVPs). The considered ES is intended for compact HEHs powering autonomous end-node devices in distributed IoT networks. The designed ES was tested experimentally and evaluated in relation to the mobile and wireless distributed communication use case....

    Full text available to download

  • Asynchronous time difference of arrival (ATDOA) method

    Publication

    A new method for a location service in the asynchronous wireless sensor networks is outlined. This method, which is called asynchronous time difference of arrival (ATDOA), enables calculation of the position of a mobile node without knowledge of relative time differences (RTDs) between measuring sensors. The ATDOA method is based on the measurement of time difference of arrival between the node and the same sensor at the discrete...

    Full text to download in external service

  • The Application of Satellite Image Analysis in Oil Spill Detection

    In recent years, there has been an increasing use of satellite sensors to detect and track oil spills. The satellite bands, namely visible, short, medium infrared, and microwave radar bands, are used for this purpose. The use of satellite images is extremely valuable for oil spill analysis. With satellite images, we can identify the source of leakage and assess the extent of potential damage. However, it is not yet clear how to...

    Full text available to download

  • The reliability of any-hop star networks with respect to failures of communication nodes.

    Publication

    - Year 2009

    This paper investigated the reliability of any-hop star networks. The any-hop star topology is used in centralized computer networks. We will assume that the all nodes fail independently, links are failure-free. Following measures of network reliability are assumed: the expected number of nodes, which can communicate with the central node; the expected number of node pairs, which are connected by a path through the central node;...

  • Improving platelet‐RNA‐based diagnostics: a comparative analysis of machine learning models for cancer detection and multiclass classification

    Publication

    - Molecular Oncology - Year 2024

    Liquid biopsy demonstrates excellent potential in patient management by providing a minimally invasive and cost-effective approach to detecting and monitoring cancer, even at its early stages. Due to the complexity of liquid biopsy data, machine-learning techniques are increasingly gaining attention in sample analysis, especially for multidimensional data such as RNA expression profiles. Yet, there is no agreement in the community...

    Full text available to download

  • Modele budowy wartości dla klienta - charakterystyka i rozwinięcie

    Publication

    Rozwój form realizacji biznesu umożliwił zbadanie nowych obiektów związanych z generowaniem wartości dla klienta i przedsiębiorstwa. W pracy scharakteryzowano logiki tworzenia wartości będące podstawą modeli łańcucha wartości, sklepu wartości, sieci wartości oraz chmury wartości. Zaproponowano także wprowadzenie nowego składnika do struktury tych modeli w postaci węzła wartości.

    Full text to download in external service

  • Multidimensional GIS for satellite imagery analysis

    Multidimensional Geographical Information System allows storing, querying and processing of multidimensional query data. It is able to process satellite imagery and provide tools for its analysis. In the article authors present the developed system that analyzes a time series of SENTINEL - 1 mission satellite imagery acquired over the coast of Poland. The algorithm used finds and detects changes in the shape...

    Full text available to download

  • Thin-walled frames and grids - statics and dynamics

    Publication

    Frames and grids assembled with thin-walled beams of open cross-section are widely applied in various civil engineering and vehicle or machine structures. Static and dynamic analysis of theses structures may be carried out by means of different models, startingfrom the classical models made of beam elements undergoing the Kirchhoff assumptions to the FE discretization of whole frame into plane elements. The former model is very...

  • Network Graph Transformation Providing Fast Calculation of Paths for Resilient Routing

    Publication

    Protection of transmission against failures can be appropriately dealt with by alternative paths. However, common schemes (e.g., Bhandaris scheme) are characterized by a remarkable delay while determining the transmission paths. This in turn may have a serious impact on serving dynamic demands (characterized by relatively short duration time). As a remedy to this problem, we introduce an approach to pre-compute the sets of disjoint...

  • Comparison of Transmission Capacities of Two Regulation Systems: Lateral and in-phase Control Transformers

    This paper presents a comparison of regulation capabilities of lateral and in-phase control transformers in a selected node of a power system. Their regulation capabilities are presented, as well as cross-system exchange options.

    Full text available to download

  • Fracture simulations in concrete beam under bending using a mesoscopic model with cohesive elements

    Publication

    - Year 2016

    The main aim of this paper was to investigate a complex fracture process in a concrete beam subjected to 3-point bending test by means of the 2D meso-scale FEM with 4-node cohesive elements embedded in the initial mesh of 3-node solid elements. The material heterogeneity was taken into account by considering 3 different phases (aggregate, cement matrix, ITZs) on the basis of randomly generated internal structure of concrete and...

  • Influence of Dielectric Overlay Permittivity on Size and Performance of Miniaturized ESPAR Antenna

    Publication

    In this paper, influence of dielectric overlay permittivity on miniaturized ESPAR antenna parameters is presented. ESPAR antenna is a low-cost and energy-efficient way to implement beam steering capability to a node and improve network performance. The antenna size reduction is obtained by embedding its active and passive elements in ABS based materials of relative permittivity equal to 4, 5.5 and 7.5 in order to achieve network...

    Full text available to download

  • Reliability model of the crankshaft-piston assembly

    Publication

    - Journal of KONES - Year 2012

    The laws that govern the durability of crankshaft-piston assembly friction nodes can be proved or at least derived or justified in an intuitive way. Operation of all the friction nodes is disturbed by external factors occurring with randomly changing intensity and also appearing at random. As the crankshaft-piston assembly friction nodes have a series structure and effects of those disturbances accumulate, their fitness for use...

    Full text available to download

  • Toward Fast Calculation of Communication Paths for Resilient Routing

    Publication

    - NETWORKS - Year 2017

    Utilization of alternate communication paths is a common technique to provide protection of transmission against failures of network nodes/links. However, a noticeable delay is encountered when calculating the relevant sets of disjoint paths using the available algorithms (e.g., using Bhandari’s approach). This, in turn, may have a serious impact on the ability of a network to serve dynamic demands...

    Full text to download in external service

  • Interior Point Method Evaluation for Reactive Power Flow Optimization in the Power System

    The paper verifies the performance of an interior point method in reactive power flow optimization in the power system. The study was conducted on a 28 node CIGRE system, using the interior point method optimization procedures implemented in Power Factory software.

    Full text available to download

  • The reliability of tree and star networks.

    Publication

    - Year 2008

    One of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...

  • On a Recurrence Arising in Graph Compression

    Publication

    - ELECTRONIC JOURNAL OF COMBINATORICS - Year 2012

    In a recently proposed graphical compression algorithm by Choi and Szpankowski (2012), the following tree arose in the course of the analysis. The root contains n balls that are consequently distributed between two subtrees according to a simple rule: In each step, all balls independently move down to the left subtree (say with probability p) or the right subtree (with probability 1􀀀p). A new node is created as long as...

    Full text available to download

  • Classification of Sea Going Vessels Properties Using SAR Satellite Images

    Publication

    The aim of the project was to analyze the possibility of using machine learning and computer vision to identify (indicate the location) of all sea-going vessels located in the selected area of the open sea and to classify the main attributes of the vessel. The key elements of the project were to download data from the Sentinel-1 satellite [1], download data on the sea vessels [2], then automatically tag data and develop a detection...

    Full text to download in external service

  • How Specific Can We Be with k-NN Classifier?

    Publication

    This paper discusses the possibility of designing a two stage classifier for large-scale hierarchical and multilabel text classification task, that will be a compromise between two common approaches to this task. First of it is called big-bang, where there is only one classifier that aims to do all the job at once. Top-down approach is the second popular option, in which at each node of categories’ hierarchy, there is a flat classifier...

    Full text to download in external service

  • Porównanie możliwości przesyłowych dwóch układów regulacyjnych: transformatorów z regulacją poprzeczną oraz transformatorów z regulacją wzdłużną

    W artykule przedstawiono porównanie możliwości regulacyjnych transformatorów z regulacją poprzeczną oraz wzdłużną w wybranym węźle systemu elektroenergetycznego. Zaprezentowano możliwości regulacyjne tych układów oraz możliwości kształtowania wymiany międzysystemowej.

    Full text available to download

  • Approximation Strategies for Generalized Binary Search in Weighted Trees

    Publication

    - Year 2017

    We consider the following generalization of the binary search problem. A search strategy is required to locate an unknown target node t in a given tree T. Upon querying a node v of the tree, the strategy receives as a reply an indication of the connected component of T\{v} containing the target t. The cost of querying each node is given by a known non-negative weight function, and the considered objective is to minimize the total...

    Full text to download in external service

  • Collision-Free Network Exploration

    Publication
    • J. Czyzowicz
    • D. Dereniowski
    • L. Gąsieniec
    • R. Klasing
    • A. Kosowski
    • D. Pająk

    - Year 2014

    A set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...

    Full text to download in external service

  • Controlling nodal displacement of pantographic structures using matrix condensation and interior-point optimization: A numerical and experimental study

    Publication

    This study presents an innovative approach for the precise control of nodal displacements in pantographic structures. The method is founded on the Matrix Condensation of Force Method, seamlessly integrated with an Interior Point Optimization algorithm. This combination offers a unique advantage by allowing users to manipulate displaced nodes within a defined coordination domain. Furthermore, this approach introduces the Interior...

    Full text to download in external service

  • Service-based Resilience for Embedded IoT Networks

    Publication

    - Year 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Full text to download in external service

  • Collision-free network exploration

    Publication
    • J. Czyzowicz
    • D. Dereniowski
    • L. Gąsieniec
    • R. Klasing
    • A. Kosowski
    • D. Pająk

    - JOURNAL OF COMPUTER AND SYSTEM SCIENCES - Year 2017

    Mobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...

    Full text available to download

  • Bounds on the cover time of parallel rotor walks

    Publication

    - JOURNAL OF COMPUTER AND SYSTEM SCIENCES - Year 2016

    The rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node successively propagates walkers visiting it along its outgoing arcs in round-robin fashion, according to a fixed ordering. We consider...

    Full text available to download

  • Timber frame houses resistant to dynamic loads - seismic analysis

    The aim of the article is to present results of seismic analysis results of two real-sized timber frame buildings subjected to seismic excitations. The first model was insulated with mineral wool, the second one with polyurethane foam. Technology and specifications involved in both models construction is based on the previously conducted experimental research on timber frame houses, including wall panels tests, wall numerical models...

    Full text available to download

  • Influence of YARN Schedulers on Power Consumption and Processing Time for Various Big Data Benchmarks

    Climate change caused by human activities can influence the lives of everybody onthe planet. The environmental concerns must be taken into consideration by all fields of studyincludingICT. Green Computing aims to reduce negative effects of IT on the environment while,at the same time, maintaining all of the possible benefits it provides. Several Big Data platformslike Apache Spark orYARNhave become widely used in analytics and...

    Full text available to download

  • Bounds on the Cover Time of Parallel Rotor Walks

    Publication

    - Year 2014

    The rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node maintains a cyclic ordering of its outgoing arcs, and successively propagates walkers which visit it along its outgoing arcs in...

    Full text to download in external service

  • Towards Scalable Simulation of Federated Learning

    Federated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...

    Full text to download in external service

  • Collaborative Exploration of Trees by Energy-Constrained Mobile Robots

    Publication

    - THEORY OF COMPUTING SYSTEMS - Year 2018

    We study the problem of exploration of a tree by mobile agents (robots) that have limited energy. The energy constraint bounds the number of edges that can be traversed by a single agent. We use a team of agents to collectively explore the tree and the objective is to minimize the size of this team. The agents start at a single node, the designated root of the tree and the height of the tree is assumed to be less than the energy...

    Full text to download in external service

  • THE CONCEPT OF MODELING OF SNOW IMPACT ON THE STRUCTURE OF THE SUSPENDED TAURON ARENA ROOF IN CRACOW

    Publication

    - Year 2018

    The article presents studies and numerical simulations on modeling snow influence on TAURON ARENA suspended roof structure in Cracow. The scope of work includes experimental tests, functions solutions taking into account various cases of snow impact according to PN and EC, as well as numerical simulations for the sport and entertainment arena in the Czyzyny district. The FEM roof structure model developed in the SOFISITK software...

  • Identification of the Contamination Source Location in the Drinking Water Distribution System Based on the Neural Network Classifier

    Publication

    The contamination ingression to the Water Distribution System (WDS) may have a major impact on the drinking water consumers health. In the case of the WDS contamination the data from the water quality sensors may be efficiently used for the appropriate disaster management. In this paper the methodology based on the Learning Vector Quantization (LVQ) neural network classifier for the identification of the contamination source location...

    Full text to download in external service

  • The Transmission Protocol of Sensor Ad Hoc Networks

    Publication

    - Year 2015

    This paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.

  • Preserving Trees in Automata

    Publication

    - Year 2015

    We present a method to store additional information in a minimal automaton so that it is possible to compute a corresponding tree node number for a state. The number can then be used to retrieve additional information. The method works for minimal (and any other) deterministic acyclic finite state automata (DFAs). We also show how to compute the inverse mapping.

    Full text to download in external service

  • Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks

    Publication

    - SENSORS - Year 2020

    The aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...

    Full text available to download

  • Service-based Resilience via Shared Protection in Mission-critical Embedded Networks

    Publication

    - IEEE Transactions on Network and Service Management - Year 2021

    Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...

    Full text available to download

  • The secure transmission protocol of sensor Ad Hoc network

    The paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.

    Full text to download in external service

  • Low-power device simulator for micro-energy measurement methods testing

    The paper presents low-power device simulator designed for testing of micro-energy measurement methods. Such kind methods can be used for evaluation of power systems based on Energy Harvesting. The device allows to set the current consumption characteristic over the time, thus making possible playing the role of different types of low-power devices e.g. simulating sensor network node.

    Full text available to download

  • THE INFLUENCE OF PHASE SHIFTERS ON THE VOLTAGE STABILITY OF CONNECTED POWER SYSTEMS

    Publication

    The paper presents the results of simulation tests of connected power systems in which phase shifters were installed on cross-border links. The analysis was carried out in terms of assessing the impact of shifters on node voltage stability. Individual systems were characterized by different balance of active power: deficit or excess. The evaluation of voltage stability was based on the dU/dQ and dU/dP criteria.

  • Topology recognition and leader election in colored networks

    Publication

    Topology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...

    Full text available to download