Filters
total: 514
filtered: 398
Search results for: CRYPTOGRAPHY PROTOCOLS
-
mRNA heptaplex protocol for distinguishing between menstrual and peripheral blood
Publication -
An untraceability protocol for mobile agents and its enhanced security study
PublicationArtykuł przedstawia rozszerzoną analizę bezpieczeństwa zaproponowanego przez nas protokołu ochrony przed tropieniem (ang. untraceability protocol) dla agentów mobilnych. Jak dotąd, tak systematyczna analiza bezpieczeństwa nie została przeprowadzona. Co więcej, istniejące znane analizy bezpieczeństwa koncentrują się wyłącznie na atakujących wewnętrznych. Uważamy, że stworzona przez nas lista kontrolna ataków może posłużyć jako...
-
On efficiency of layer 2 of the radio interface protocol stack in UMTS
PublicationCelem pracy jest szczegółowa analiza funkcjonowania warstwy łącza danych w podsystemie dostępu radiowego UTRAN systemu UMTS i na tej podstawie przedstawienie szeregu zmian i usprawnień oraz wskazówek odnośnie konfiguracji protokołów, jakie należy w tej warstwie zastosować aby zmaksymalizować jej wydajność głównie pod kątem oferowanej przepływności, wprowadzanych opóźnień oraz wsparcia priorytetów przesyłanego ruchu. Teza pracy...
-
Methodology of Conformity Testing of VoIP Connections Scenarios for SIP Protocol
PublicationConformity and conformity testing have always had a crucial role in telecommunications. These issues are especially important in VoIP technology with SIP protocol as there are many hardware, software and service implementations. In this paper a methodology of automatic conformity testing of VoIP connections scenarios applying to any IP network is proposed. Example implementation of the methodology as Linux shell scripts is presented....
-
MICROPROPAGATION PROTOCOL OF RABBIT FOOT FERN DAVALLIA FEJEENSIS HOOK
Publication -
Distributed Operation of CHP and Hybrid PV Using Consensus Protocol
Publication -
Acute Effects of Different Blood Flow Restriction Protocols on Bar Velocity During the Squat Exercise
Publication -
Comparison of the main bioactive compounds and antioxidants in garlic and white and red onion after treatment protocols
PublicationPolski czosnek, biała i czerwona cebula była blanszowana, gotowana, smażona i poddawana działaniom promieniowania mikrofalowego. Następnie były w nich oznaczane m.in. takie związki jak polifenole, flawonoidy, kwas ascorbinowy i aktywne antyoksydanty. Udowodniono, że blanszowanie, smażenie i poddawanie działaniu promieniowania mikrofalowego nie wpływa znacząco na zmiejszenie zawartości badanych związków w czosnku i cebuli. Wyznaczono...
-
Acute Effects of Varied Back Squat Activation Protocols on Muscle-Tendon Stiffness and Jumping Performance
Publication -
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublicationThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network
PublicationIn this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...
-
Experimental certification of an informationally complete quantum measurement in a device-independent protocol
PublicationMinimal informationally complete positive operator-valued measures (MIC-POVMs) are special kinds of measurement in quantum theory in which the statistics of their d2-outcomes are enough to reconstruct any d-dimensional quantum state. For this reason, MIC-POVMs are referred to as standard measurements for quantum information.Here, we report an experiment with entangled photon pairs that certifies, for what we believe is the first...
-
PROTOCOL FOR IN VITRO MASS PRODUCTION OF NEPHROLEPIS EXALTATA SCHOTT (BOSTON FERN)
Publication -
Subgroup and per-protocol analyses from the Hypertension in the Very Elderly Trial
Publication -
Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs
PublicationA rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...
-
Soft Real-Time Communication with WebSocket and WebRTC Protocols Performance Analysis for Web-based Control Loops
PublicationThe web browser has become an access window for content and services. The browser is available on almost any device connected to the network, regardless of its intended use: desktop, mobile device, computing server, e-book reader etc. Browsers are used by people to read news, contact the world, to check a bank account, register a visit at the doctor, watching video content, electronic purchases, using web versions of the office...
-
An Idea Bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANs
PublicationDla klasy protokołów MAC opartych na przypadkowo krążącym żetonie dononano rozdziału polityki wyłaniania zwycięzcy od strategii wyboru szczeliny dla żądania dostępu. Wyróżniono klasę protokołów RT/ECD, dla której zidentyfikowano typ wynikowej gry niekooperacyjnej. Pokazano, że gra ta zasadniczo różni się od wieloosobowego dylematu więźnia. Zaprojektowano heurystyczną strategię asymptotycznie zniechęcającą do zachowań egoistycznych...
-
Optimization of the autoconfiguration mechanisms of the mobile stations supporting IPv6 protocol in the IEEE 802.16
PublicationCelem pracy jest analiza funkcjonowania procedur przełączania w sieciachWiMAX/IPv6, wybór mechanizmów będących powodem największych opóźnień izaproponowanie ich poprawy. Teza pracy dotyczy wykazania, że procesrekonfiguracji IPv6 w czasie przełączenia w sieciach 802.16 nie jestoptymalny i możliwe jest osiągnięcie zwiększonej wydajności przełączaniapoprzez modyfikację protokołów IPv6, DHCPv6 oraz Mobile IPv6. Na drodzedo osiągnięcia...
-
The model of end-to-end call setup time calculation for Session Initiation Protocol
PublicationEnd-to-end call setup delay is one of the most important grade of service (GoS) parameters for VoIP networks with Session Initiation Protocol (SIP). A typical subscriber wants to have a connection established as soon as possible. From the operator's perspective call setup time is also crucial because he needs to know how probability of successful packet transmission on SIP links is related to a call setup delay. Then he can make...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublicationA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
A random access protocol under backoff attack: performance and game-theoretic deterrent
PublicationPrzedstawiono metodę obrony przed atakiem na protokół CSMA/CA, opartą na generacji sekwencji zagłuszających z wykorzystaniem wzajemnej słyszalności stacji. Na podstawie analizy wypłat odpowiedniej gry w formie rozwiniętej pokazano możliwość osiągania punktu równowagi odpowiadającego standardowym ustawieniom protokołu.
-
BDNF Val66Met Polymorphism, the Allele-Specific Analysis by qRT-PCR - a Novel Protocol
Publication -
Cost-Effectiveness of Open Repair of Abdominal Aortic Aneurysms with a Novel Perioperative Protocol
Publication -
An incentive-based forwarding protocol for mobile ad hoc networks with anonymous packets
PublicationPrzekazywanie pakietów w sieciach ad hoc z transmisją wieloetapową zależy od współpracy ruchomych terminali oraz stworzenia właściwego systemu motywacyjnego. Zaproponowany protokół wykorzystuje elementy podejścia systemu reputacyjnego dla stworzenia funkcji wypłaty w grze niekooperacyjnej, w której strategie dotyczą konfiguracji progu admisji pakietów źródłowych w stacjach. Dla symetrycznego modelu sieci pokazano, że istnieją punkty...
-
Efficient micropropagation protocol of three cultivars of highbush blueberry (Vaccinium corymbosum L.)
Publication -
Effect of Plant Growth Regulators and Lights on Micropropagation Protocol for Quisqualis indica L.
Publication -
New Screening Protocol for Effective Green Solvents Selection of Benzamide, Salicylamide and Ethenzamide
PublicationNew protocol for screening efficient and environmentally friendly solvents was proposed and experimentally verified. The guidance for solvent selection comes from computed solubility via COSMO-RS approach. Furthermore, solute-solvent affinities computed using advanced quantum chemistry level were used as a rationale for observed solvents ranking. The screening protocol pointed out that 4-formylomorpholine (4FM) is an attractive...
-
Dynamic Re-Clustering Leach-Based (Dr-Leach) Protocol for Wireless Sensor Networks
Publication -
Artificial intelligence-based imaging analysis of stem cells: a systematic scoping review protocol
Publication -
A rapid, selective, and ultrasensitive voltammetric and gravimetric protocol for MMP-1 active form detection
Publication -
The protocol for using elastic wall model in modeling blood flow within human artery
PublicationMedical diagnostic tools will play a major role in the future for an effective patient treatment and reduction their mortality, related to the cardiovascular system diseases (CVDs). There is an urgent need for developing diagnostic procedure to be robust, reliable, accurate and efficient, in the framework of a paradigm shift. Application of numerical techniques is seen as a perspective tool for such purpose. Nevertheless, existing...
-
Rating by detection: an artifact detection protocol for rating EEG quality with average event duration
PublicationQuantitative evaluation protocols are critical for the development of algorithms that remove artifacts from real EEG optimally. However, visually inspecting the real EEG to select the top-performing artifact removal pipeline is infeasible while hand-crafted EEG data allow assessing artifact removal configurations only in a simulated environment. This study proposes a novel, principled approach for quantitatively evaluating algorithmically...
-
Mobility Management Solutions for IP Networks Comparative Analysis of IP-based Mobility Protocols and Handover Algorithms Invited Paper
PublicationA rapid growth of IP-based networks and services hascreated a vast collection of resources and functionalities availableto users by means of a uniform method of access offered by the IPprotocol. At the same time, advances in the design of mobileelectronic devices allowed them to reach a utility levelcomparable to desktop computers, while still retaining theirmobility advantage. Unfortunately, the base IP protocol does notperform...
-
Protocolo de Preparación y Evaluación de Pilas de Combustible de Óxido Sólido
PublicationEste protocolo describe la metodología para la preparación de celdas de óxido sólido y su evaluación como pila de combustible (SOFC). Es fruto del estudio realizado en el marco de los proyectos FCTESTNET [1] y SOFCNET [2] del V Programa Marco, en el Comité IEC/TC105 [3] e investigaciones llevadas a cabo en el laboratorio. Las pilas de combustible son dispositivos capaces de transformar la energía química de un combustible en energía...
-
A CRISPR/Cas9-Based Mutagenesis Protocol for Brachypodium distachyon and Its Allopolyploid Relative, Brachypodium hybridum
Publication -
A targeted metabolomic protocol for quantitative analysis of volatile organic compounds in urine of children with celiac disease
Publication -
Research Protocol of the Polish Adaptation and Validation of HOPE Scale: Qualitative Measurement of Patients' Spiritual Needs
Publication -
Novel and effective synthesis protocol of AgNPs functionalized using L-cysteine as a potential drug carrier
Publication -
Unconditional privacy over channels which cannot convey quantum information
PublicationQuantum cryptography enables one to verify that the state of the quantum system has not been tampered with and thus one can obtain privacy regardless of the power of the eavesdropper. All previous protocols relied on the ability to faithfully send quantum states or equivalently to share pure entanglement. Here we show this need not be the case-one can obtain verifiable privacy even through some channels which cannot be used to...
-
Evaluation of a new freezing protocol containing 20% dimethyl sulphoxide concentration to cryopreserve human ovarian tissue
Publication -
Finding the Right Solvent: A Novel Screening Protocol for Identifying Environmentally Friendly and Cost-Effective Options for Benzenesulfonamide
PublicationThis study investigated the solubility of benzenesulfonamide (BSA) as a model compound using experimental and computational methods. New experimental solubility data were collected in the solvents DMSO, DMF, 4FM, and their binary mixtures with water. The predictive model was constructed based on the best-performing regression models trained on available experimental data, and their hyperparameters were optimized using a newly...
-
Effect of BMI on safety of bariatric surgery during the COVID-19 pandemic, procedure choice, and safety protocols – An analysis from the GENEVA Study
Publication -
Association between use of enhanced recovery after surgery protocols and postoperative complications in colorectal surgery in Europe: The EuroPOWER international observational study
Publication -
Device-independent quantum key distribution based on measurement inputs
PublicationWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Application of EARL (ResEARch 4 Life®) protocols for [18F]FDG-PET/CT clinical and research studies. A roadmap towards exact recovery coefficient
Publication -
Service time distribution influence on end-to-end call setup delay calculation in networks with Session Initiation Protocol
PublicationThe most important GoS parameter for networks with SIP protocol is end-to-end call setup delay. So far there were no coherent models allowing calculation of these parameters for networks with SIP protocol. Few models were developed but they are insufficient. In the paper we propose model which allows end-to-end call setup delay calculation for networks with SIP protocol. The model is using chain of M/G/1/K models and is applicable...
-
High compliance to ERAS protocol does not improve overall survival in patients treated for resectable advanced gastric cancer
Publication -
Epoxydibenzo[b,f][1,5]diazocines: From a Hidden Structural Motif to an Efficient Solvent-Free Synthetic Protocol
Publication -
Analysis of pesticide residue in tomato samples using analytical protocol based on application of QuEChERS technique and GC-ECD system
PublicationQuEChERS sample preparation method was used for the determination of 10 pesticides and their metabolites in tomato samples, coupled to gas chromatography with electron capture detector (GCECD). The experimental parameters including oven temperature program, amount of the sample and purifying agent were optimized. The GC-ECD method was validated in terms of linearity, selectivity and recovery. The limits of detection (LODs) of the...
-
Development of an Analytical Protocol for Determination of Cyanide in Human Biological Samples Based on Application of Ion Chromatography with Pulsed Amperometric Detection
PublicationA simple and accurate ion chromatography (IC) method with pulsed amperometric detection (PAD) was proposed for the determination of cyanide ion in urine, sweat, and saliva samples. The sample pretreatment relies on alkaline digestion and application of Dionex OnGuard II H cartridge. Under the optimized conditions, the method showed good linearity in the range of 1–100 μg/L for urine, 5–100 μg/L for saliva, and 3–100 μg/L for sweat...