Filters
total: 29956
-
Catalog
- Publications 5894 available results
- Journals 713 available results
- Conferences 173 available results
- Publishing Houses 3 available results
- People 237 available results
- Inventions 1 available results
- Projects 24 available results
- Laboratories 1 available results
- e-Learning Courses 165 available results
- Events 25 available results
- Open Research Data 22720 available results
displaying 1000 best results Help
Search results for: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS.
-
Modifiers for Medical Grade Polymeric Systems used in FDM 3D Printing - Short Review
PublicationFDM 3D printing could find an application in the wide range of biomedical applications. Unfortunately, the quantity of polymeric biomaterials suitable to processing into filaments is limited. The most frequently used biomaterials for medical constructs such as bone grafts, soft tissue scaffolds or another DDS include PCL, PLA, PVA, HPC, EVA copolymer, EC and TPUs. Various modifiers such as TCP, HA, TEC, MMC could be applicated...
-
Characterization of slow and fast fading in off-body communication at 2.45 GHz with space diversity scheme in indoor environment
PublicationThe characterization of slow and fast fading in Wireless Body Area Networks with space diversity scheme has been presented. The analysis, based on the measurements at 2.45 GHz in indoor environment, has shown that for all investigated configurations of receiving wearable antennas the correlation coefficient values of received signals’ parameters are below the assumed value of 0.5, being close to zero for the vast majority of cases. It...
-
Characterization of Slow and Fast Fading in Off-Body Communication at 2.45 GHz with Space Diversity Scheme in an Indoor Environment
PublicationThe characterization of slow and fast fading in wireless body area networks with space diversity scheme has been presented. The analysis, based on the measurements at 2.45 GHz in an indoor environment, has shown that for all investigated configurations of receiving wearable antennas, the correlation coefficient values of the received signals’ parameters are below the assumed value of 0.5, being close to zero for the vast majority...
-
THE 3D MODEL OF WATER SUPPLY NETWORK WITH APPLICATION OF THE ELEVATION DATA
Publication3D visualization is a key element of research and analysis and as the source used by experts in various fields e.g.: experts from water and sewage systems. The aim of this study was to visualize in three-dimensional space model of water supply network with relief. The path of technological development of GESUT data (Geodezyjna Ewidencja Sieci Uzbrojenia Terenu – geodetic records of public utilities) for water supply and measurement...
-
Technical physics (Data Engineering)_22/23
e-Learning CoursesField of study: Data Engineering; Subject name: Technical physics; Lecture notes and other course materials.
-
Technical physics (Data Engineering)_23/24
e-Learning CoursesField of study: Data Engineering; Subject name: Technical physics; Lecture notes and other course materials.
-
Circulating MAdCAM-1 and ITGB7 in Patients with Plaque Psoriasis and Eruptive Lichen Planus—Preliminary Data
Publication -
Basics of Data Warehouses Path
e-Learning CoursesWithin this path the basic aspects of data warehouses (architecture, star schema, etc.) are discussed. The course is intended for students of the 1st degree of Informatics Field (semester 5) - Kurs planowany dla studentów I stopnia kierunku informatyka (semestr 5) - przedmiot Hurtownie danych oraz dla studentów II stopnia kierunku informatyka, specjalność ZAD.
-
Data Structures (Doctoral Studies) - New
e-Learning CoursesThe course is designed to provide students with the knowledge regarding basic data structures and associated algorithms used in broad range of applications. Students will also gain knowledge about how to evaluate the quality of algorithms in the context of time and space usage. Additionally, during seminars, students get familiar with biographies of most famous creators of the algorithms.
-
BIG PROBLEMS WITH BIG DATA
PublicationThe article presents an overview of the most important issues related to the phenomenon called big data. The characteristics of big data concerning the data itself and the data sources are presented. Then, the big data life cycle concept is formulated. The next sections focus on two big data technologies: MapReduce for big data processing and NoSQL databases for big data storage.
-
Musical Instrument Tagging Using Data Augmentation and Effective Noisy Data Processing
PublicationDeveloping signal processing methods to extract information automatically has potential in several applications, for example searching for multimedia based on its audio content, making context-aware mobile applications (e.g., tuning apps), or pre-processing for an automatic mixing system. However, the last-mentioned application needs a significant amount of research to reliably recognize real musical instruments in recordings....
-
Improving css-KNN Classification Performance by Shifts in Training Data
PublicationThis paper presents a new approach to improve the performance of a css-k-NN classifier for categorization of text documents. The css-k-NN classifier (i.e., a threshold-based variation of a standard k-NN classifier we proposed in [1]) is a lazy-learning instance-based classifier. It does not have parameters associated with features and/or classes of objects, that would be optimized during off-line learning. In this paper we propose...
-
FUZZY SETS AND SYSTEMS
Journals -
Evaluation of Medical Staff Satisfaction for Workplace Architecture in Temporary COVID-19 Hospital: A Case Study in Gdańsk, Poland
PublicationThis article analyses the architecture that was used in the temporary AmberExpo hospital in Gdańsk, Poland which was installed during the COVID-19 pandemic. The construction of this type of facility is often based on experimental approaches, aimed at caring for patients suffering from an infectious disease in emergency conditions. In order to assess the level of employee satisfaction with the architectural and technical elements...
-
The impact of security aspects on functional safety analysis = Wpływ aspectów ochrony informacji na wyniki analiz bezpieczeństwa funkcjonalnego
PublicationIt can be said that a distributed control and protection system’s security level may have a significant impact on functional safety analyses and their results. However the issue of integrating those both aspects are difficult and usually is neglected during functional safety analyses. Known methods of functional safety analyses don’t take into consideration this kind of concept also. This paper discusses an attempt to integrate...
-
Coping Strategies and Psychopathological Responses Among Medical and Non-medical Professionals – a Cross-Sectional Online Survey
Publication -
Seafloor Characterisation and Imaging Using Multibeam Sonar Data
PublicationThe approach to seafloor characterisation and imaging is presented. It relies on the combined, concurrent use of several techniques of multibeam sonar data processing. The first one is based on constructing the grey-level sonar images of seabed using the backscattering strength calculated for the echoes received in the consecutive beams. Then, the set of parameters describing the local region of sonar image is calculated. The second...
-
Data on the identification of microsatellite markers in Eisenia fetida and Eisenia andrei
Publication -
C-1311 (Symadex), a potential anti-cancer drug, intercalates into DNA between A and G moieties. NMR-derived and MD-refined stereostructure of the d(GAGGCCTC) 2 :C-1311 complex
PublicationImidazoacridinone C-1311 (Symadex®) is an antitumor agent which has been recommended for Phase II clinical trials a few years ago. Previously, it was shown experimentally that during the initial stage of its action C-1311 forms stable intercalation complexes with DNA duplexes. Herein, a NMR-derived stereostructure of d(GAGGCCTC)2:C-1311 complex was reported. The ligand was found locating itself between A and G moieties, forming...
-
Burst loss probability for the combination of extended offset time based service differentiation scheme and PPS in optical burst switching network
PublicationIn the paper analytical model for calculating burst loss probabilities for the combination of two service differentiation schemes for OBS network namely: extended offset time based scheme and PPS (Preemption Priority Schemes) is revised. Moreover authors introduce analytical model for calculating burst loss probabilities for an optical path when OBS network employs both service differentiation schemes and JET signaling. The comparison...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
INCREASING THE COUNTRY'S SECURITY AND PUBLIC TRANSPORT ACCESSIBILITY BY CREATING A NETWORK OF SMALL AIRPORTS
PublicationIt has been shown that by creating a network of small airports, it is possible to increase the communication accessibility of large population groups and the country's security, including safety at sea. The airports mentioned above may also be located on land considered to be weak from an engineering point of view. These include, for example, wetlands, swamps, flood embankments, poor coastal belt grounds, and reclaimed land. A...
-
The optimized Rayleigh–Ritz scheme for determining the quantum-mechanical spectrum
Publication -
A distributed scheme for optimization of interdomain routing between collaborating domains
Publication -
Comments on ''an SVD-based watermarking scheme for protecting rightful ownership''
PublicationW pracy wykazano, że algorytm zaproponowany w komentowanym artykule nie ma wartości praktycznej, gdyż charakteryzuje się bardzo dużym prawdopodobieństwem fałszywej akceptacji.
-
On convergence and stability of a numerical scheme of Coupled Nonlinear Schrödinger Equations
PublicationRozważamy rozwiązania numeryczne układu sprężynowych równań nieliniowych Schrödingera. Udowodniliśmy stabilność i zbieżność. Testujemy za pomocą rozwiązań solitonowych.
-
Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface
PublicationMultimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...
-
Benchmarking Scalability and Security Configuration Impact for A Distributed Sensors-Server IOT Use Case
PublicationInternet of Things has been getting more and more attention and found numerous practical applications. Especially important in this context are performance, security and ability to cope with failures. Especially crucial is to find good trade-off between these. In this article we present results of practical tests with multiple clients representing sensors sending notifications to an IoT middleware – DeviceHive. We investigate performance...
-
Manufacturing Data Analysis in Internet of Things/Internet of Data (IoT/IoD) Scenario
PublicationComputer integrated manufacturing (CIM) has enormous benefits as it increases the rate of production, reduces errors and production waste, and streamlines manufacturing sub-systems. However, there are some new challenges related to CIM operating in the Internet of Things/Internet of Data (IoT/IoD) scenarios associated with Industry 4.0 and cyber-physical systems. The main challenge is to deal with the massive volume of data flowing...
-
Journal of Discrete Mathematical Sciences & Cryptography
Journals -
Projektowanie Urbanistyczne 1 MGR
e-Learning CoursesProjektowanie Urbanistyczne 1, przedmiot prowadzony na pierwszym semestrze studiów magisterskich na kierunku Architektura. Prowadzący: dr inż. arch. Joanna Bach-Głowińska mgr inż. arch. Julia Kurek
-
Time-of-flight spectroscopy for medical applications.
PublicationW pracy przedstawiono korzyści optycznej spektroskopii czasu przelotu, w zastosowaniach medycznych. Przedstawiono także zasadę pomiarów oraz pokazano, jak z danych pomiarowych można wyznaczyć podstawowe parametry optyczne tkanki. Potencjał pomiarowy optycznej spektroskopii czasu przelotu zaprezentowano na przykładzie pomiarów ośrodków silnie rozpraszających światło jakimi są: papier, cicze technologiczne z papierni, wodne roztwory...
-
Distributed processing in medical, parametric imaging
PublicationArtykuł prezentuje metodę dystrybucji bazującej na JavaSpace do zastosowania w wyznaczaniu obrazów parametrycznych. Zaimplementowano metodologię Compute Server, którą użyto do aktywnej termografii i dynamicznych badań MRI mózgu.
-
RAAS inhibition – a practice of medical progress
Publication -
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublicationThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...
-
Analytical Estimation of Power Losses in a Dual Active Bridge Converter Controlled with a Single-Phase Shift Switching Scheme
PublicationMicro-grid solutions around the world rely on the operation of DC/DC power conver- sion systems. The most commonly used solution for these topologies is the use of a dual active bridge (DAB) converter. Increasing the efficiency and reliability of this system contributes to the improvement in the stability of the entire microgrid. This paper discussed an analytical method of energy efficiency and power loss estimation in a single...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Big Data processing frameworks - 2022
e-Learning CoursesInformatics, postgraduate studies Data Engineering, undergraduate studies
-
Big Data processing frameworks - 2023
e-Learning CoursesInformatics, postgraduate studies Data Engineering, undergraduate studies
-
Big Data processing frameworks - 2024
e-Learning CoursesInformatics, postgraduate studies Data Engineering, undergraduate studies
-
Aspects of maritime security and safety of Poland
PublicationReferat przedstawia wybrane aspekty morskiego bezpieczeństwa Polski. Prezentacja problematyki jest ukierunkowana na problemy techniczne związane z bezpieczeństwem, pozostawiając na uboczu problemy prawne, logistyczne i społeczne. Na wstępie przedstawiono analizę zagrożeń dla bezpieczeństwa Bałtyku. Następnie opisano wybrane instytucje odpowiedzialne za morskie bezpieczeństwo Polski, ze szczegółowym uwzględnieniem Morskiej Straży...
-
An integrated method for security protocols analysis
Publication -
Architecture supporting security of agent systems
PublicationW rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...
-
Indo-French Defence and Security Partnership
Publication -
The Impact of Terrorism on International Peace and Security
Publication -
NEEDS AND CHALLENGES IN DISPATCHING EMERGENCY MEDICAL SERVICES IN SITUATIONS OF POTENTIAL MILITARY DANGER
Publication -
BUILDING SMARTSLOW_SLOWSMART IN NOWY PORT- THE MULIDISICIPLINARY EDUCATIONAL EXPERIMENT OF JOINT DESIGN STUDIO
PublicationThis study presents the results of students’ work from Hafen City University in Hamburg and Gdansk University of Technology, carried out as part of a joint studio dealing with Nowy Port problem area. It refers to the methodology and design proposals, as well as to individual projects of students from Gdansk University of Technology - Spatial Management and Architecture. The aim of this study is to present framework project guidelines...
-
The complete list of two-dimensional rotation-symmetric number-conserving septenary cellular automata
Open Research DataThis dataset contains a complete list of all 30144 two-dimensional rotation-symmetric number-con-serving cellular automata with the state set {0,1,2,3,4,5,6} based on adjacent cells only, i.e. with the von Neumann neighborhood. The detailed definitions and the method of enumerating are given in the paper:
-
Analiza danych typu Big Data 2022/23
e-Learning CoursesThe aim of the course is to familiarize students with the methods of storing and analysis of big data. Practical tools for these tasks are presented.