Filters
total: 2121
filtered: 1442
-
Catalog
- Publications 1442 available results
- Journals 21 available results
- Conferences 6 available results
- People 27 available results
- Projects 8 available results
- Laboratories 1 available results
- Research Teams 1 available results
- e-Learning Courses 31 available results
- Events 4 available results
- Open Research Data 580 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: SECRET-KEY
-
KU812 basophils express urocortin, CRH-R, MC1R and steroidogenic enzymes and secrete progesterone
Publication -
The conception of secure and efficient process of migration into IPv6
PublicationZe względu na wady rozwiązań opartych o tunelowanie, w pracy zaproponowano koncepcję przejścia z IPv4 do IPv6 nie wymagającą od dostawców usług internetowych wzajemnej współpracy, nie narażoną na ataki związane z przekaźnikami, wzajemnym zaufaniem ISP. W koncepcji tej ograniczono tunelowanie do obszaru jednego ISP. W pracy wskazano istotne elementy ograniczające możliwość i zasadność wprowadzania mechanizmów tunelowania. Wskazano...
-
Acoustic analysis of selected sacred buildings in Szczecin
Publication -
The methods of secure data transmission in the KNX system
PublicationThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Secure Quaternion Feistel Cipher for DICOM Images
PublicationAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
Secured wired BPL voice transmission system
PublicationDesigning a secured voice transmission system is not a trivial task. Wired media, thanks to their reliability and resistance to mechanical damage, seem an ideal solution. The BPL (Broadband over Power Line) cable is resistant to electricity stoppage and partial damage of phase conductors, ensuring continuity of transmission in case of an emergency. It seems an appropriate tool for delivering critical data, mostly clear and understandable...
-
XXIV Aukcja Wielkie Serce
Publication -
XXVIII Aukcja Wielkie Serce
PublicationAukcja to wyjątkowa okazja dla miłośników i kolekcjonerów polskiej sztuki współczesnej. Kolejny raz będzie można obcować z dziełami artystów, którzy tworzą kanon, są „żywą encyklopedią” grafiki i malarstwa polskiego. Od początku lat 90. ubiegłego stulecia, organizatorzy aukcji szczycą się i zaufaniem najwybitniejszych polskich twórców. Pieniądze z licytacji ich dzieł, jak co roku, przekazane zostaną na rzecz wychowanków Specjalnego...
-
The molecular function of kallikrein‐related peptidase 14 demonstrates a key modulatory role in advanced prostate cancer
Publication -
Preparing samples for analysis - the key to analytical success=Przygotowanie próbek do analizy - droga do sukcesu
PublicationW artykule przedstawiono i dokonano krytycznego omówienia informacji literaturowych na temat poszczególnych etapów przygotowania próbek środowiskowych do etapu oznaczeń końcowych analitów występujących w tych próbkach na niskich poziomach zawartości.Szczególną uwagę zwrócono na:- Wyzwania związane z analityką specjacyjną,- Nowoczesne techniki ekstrakcji i wzbogacania analitów,- Możliwość zastosowania ultradźwięków oraz promieniowania...
-
Non-Dioxin-Like PCBs – the Key Air Pollutant Associated with Lung Cancer in 15 Cities in Silesia
Publication -
Pedestrian protection, speed enforcement and road network structure the key action for implementing Poland's Vision Zero
PublicationSince 1991 Poland's road safety has been systematically improving with a 60% reduction in road deaths. Despite the progress Poland continues to be one of the European Union' worst performing countries. The country's main road safety problems remain unchanged: dangerous behaviour of road users, underdeveloped system of road safety management and low quality of road infrastructure. This is why subsequent road safety programmes (implemented...
-
The IP vs. VDE competition as a key factor determining the stability of the MgBX5 (X = F, Cl) compounds
Publication -
Inverse Analysis as a Key Element of Safety Assessment under the Snow Load For The Large Suspension Roofs Structure
PublicationThe paper presents a concept and realization of monitoring system for the Silesian Stadium in Chorzow. The idea of the system lies in fusion of structure monitoring with a calibrated numerical FEM model [1]. The inverse problem is solved. On the base of measured selected displacements, the numerical FEM model of the structure combined with iterative method, develops the current snow load distribution. Knowing the load, we can calculate...
-
The secure transmission protocol of sensor Ad Hoc network
PublicationThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Edge-Computing based Secure E-learning Platforms
PublicationImplementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...
-
Localization of key amino acid residues in the dominant conformational epitopes on thyroid peroxidase recognized by mouse monoclonal antibodies
Publication -
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Human serum interactions with phenolic and aroma substances of Kaffir(Citrus hystrix) and Key lime (Citrus aurantifolia) juices
PublicationTo understand the therapeutic application of polyphenols extracted from Kaffir (PolKaf) and Key (PolKey) limesdifferent analytical methods were applied. Based on quantitative analysis by two dimensional gas chromato-graphy (GC×GC) and time of flight mass spectrometry (TOFMS) it can be observed that the biggest differencesin the contents of selected terpenes of Kaffir and Key limes occur in chemical compounds such as limonene, citraland...
-
The valance state of vanadium-key factor in the flexibility of potassium vanadates structure as cathode materials in Li-ion batteries
PublicationPotassium hexavanadate (K2V6O16·nH2O) nanobelts have been synthesized by the LPE-IonEx method, which is dedicated to synthesis of transition metal oxide bronzes with controlled morphology and structure. The electrochemical performance of K2V6O16·nH2O as a cathode material for lithium-ion batteries has been evaluated. The KVO nanobelts demonstrated a high discharge capacity of 260 mAh g−1, and long-term cyclic stability up to 100...
-
Neue erfahrungen mit der KEM
Publication..
-
Malarstwo jest okey. - Janusz Osicki
PublicationKatalog towarzyszący wystawie "Malarstwo jest okey" w Foyer Opery Bałtyckiej w Gdańsku w ramach 3. edycji Festiwalu Kultury Trójmiasta "Metropolia jest okey", który odbył się w dniach 26-30.12.2009. Katalog liczy 120 stron i zawiera tekst krytyczny w języku polskim i angielskim, noty biograficzne artystów w języku polskim i angielskim oraz 55 kolorowych reprodukcji prac artystów (prace autorów: J. Buczkowski s. 16-17, D. Krechowicz...
-
Malarstwo jest okey. - Krzysztof Wróblewski
PublicationKatalog towarzyszący wystawie "Malarstwo jest okey" w Foyer Opery Bałtyckiej w Gdańsku w ramach 3. edycji Festiwalu Kultury Trójmiasta "Metropolia jest okey", który odbył się w dniach 26-30.12.2009. Katalog liczy 120 stron i zawiera tekst krytyczny w języku polskim i angielskim, noty biograficzne artystów w języku polskim i angielskim oraz 55 kolorowych reprodukcji prac artystów (prace autorów: J. Buczkowski s. 16-17, D. Krechowicz...
-
Malarstwo jest okey. -Dominika Krechowicz
PublicationKatalog towarzyszący wystawie "Malarstwo jest okey" w Foyer Opery Bałtyckiej w Gdańsku w ramach 3. edycji Festiwalu Kultury Trójmiasta "Metropolia jest okey", który odbył się w dniach 26-30.12.2009. Katalog liczy 120 stron i zawiera tekst krytyczny w języku polskim i angielskim, noty biograficzne artystów w języku polskim i angielskim oraz 55 kolorowych reprodukcji prac artystów (prace autorów: J. Buczkowski s. 16-17, D. Krechowicz...
-
Malarstwo jest okey. - Jan Buczkowski
PublicationKatalog towarzyszący wystawie "Malarstwo jest okey" w Foyer Opery Bałtyckiej w Gdańsku w ramach 3. edycji Festiwalu Kultury Trójmiasta "Metropolia jest okey", który odbył się w dniach 26-30.12.2009. Katalog liczy 120 stron i zawiera tekst krytyczny w języku polskim i angielskim, noty biograficzne artystów w języku polskim i angielskim oraz 55 kolorowych reprodukcji prac artystów (prace autorów: J. Buczkowski s. 16-17, D. Krechowicz...
-
Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart Cities
PublicationIn relation to smart city planning and management, processing huge amounts of generated data and execution of non-lightweight cryptographic algorithms on resource constraint devices at disposal, is the primary focus of researchers today. To enable secure exchange of data between cloud networks and mobile devices, in particular smart hand held devices, this paper presents Blockchain based approach that disperses a public/free key...
-
Polymeric membrane-modified voltammetric sensors for lipophilic analytes with nanomolar detection limit: Key parameters influencing the response characteristics
Publication -
The evaluation of COD fractionation and modeling as a key factor for appropriate optimization and monitoring of modern cost-effective activated sludge systems
PublicationA study was conducted to characterize the raw wastewater entering a modern cost effective municipal WWTP in Poland using two approaches; 1) a combination of modeling and carbonaceous oxygen demand (COD) fractionation using respirometric test coupled with model estimation (RTME) and 2) flocculation/filtration COD fractionation method combined with BOD measurements (FF-BOD). It was observed that the particulate fractions of COD obtained...
-
A Concept of Using Knowledge Models to Secure Intellectual Capital in Enterprise
PublicationWithout a doubt, knowledge has become the most important resource for all companies in the world. Knowledge extended of our own observations and practice is being called experience. With the increase of knowledge and gained experience, the individual becomes more and more valuable employee in terms of business. The above mentioned knowledge can be gained only by self-improvement, which requires time and other necessary elements...
-
Quantum states representing perfectly secure bits are always distillable
PublicationW pracy pokazano, że ostatnio wprowadzone stany kwantowe reprezentujące perfekcyjnie bezpieczny bit klucza kryptograficznegooraz ich wielocząstkowe i wielowymiarowe uogólnienia zawsze reprezentują destylowalne splątanie. Podano ograniczenia dolne na wielkość destylowalnego splątania. Ponadto podano alternatywny dowód faktu, że koszt splątania jest ograniczeniem górnym na wielkość destylowalnego klucza kryptograficznego w dwucząstkowym...
-
Experimental Extraction of Secure Correlations from a Noisy Private State
PublicationWe report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies...
-
Secure transmission of visual image in the VTS system using fingerprinting
Publication -
Technical Limitations in Merging Secular and Sacred Functions in Monumental Churches
PublicationThe abandonment of churches and their adaptation for secular purposes is a current subject in Europe and worldwide. Most cases involve objects that were desacralized and then rebuilt as a whole object for alternative functions. Thus far, the merging of secular and sacred functions in one monumental Catholic church has not raised any issues. The paper describes the case of St. Catherine’s Church in Gdansk, Poland, where sacred function...
-
Advanced field investigations of screw piles and columns
PublicationPrzedstawiono opis badań pali i kolumn wkręcanych na terenowym poletku doświadczalnym, wykonanych w ramach projektu badawczego MNiSW. Badania statyczne pali i kolumn wykonano z zaawansowanym systemem do pomiaru rozkładu siły wzdłuż trzonów. Przedstawiono podstawowe wyniki badań z rozdziałem obciążenia na podstawę i pobocznicę pali i kolumn.
-
Serce miasta jako muzeum sztuki narodowej
PublicationSerce miasta to przestrzeń obok bycia gdzieś, będąca kiedyś. Tak rozumiana specyfika serca miasta prowadzi do pytania o jego kompozycję rozgrywającą się w wymiarze czasowym. Rytmiczność i unikatowość składają się na kompozycję serca miasta rozumianą jako uporządkowana przestrzeń wydarzeń. Te cechy zbliżają myślenie o sercu miasta i rozumienie jego specyfiki do współczesnych teorii kształtowania muzeum sztuki. Współczesne muzeum...
-
Interplay between Structure and Charge as a Key to Allosteric Modulation of Human 20S Proteasome by the Basic Fragment of HIV-1 Tat Protein
Publication -
SiC-based phase-shift dual half bridge DC-DC converter as a key component of multilevel cascaded MV converters
PublicationThe paper describes SiC-based dual half bridge (DHB) DC-DC converter considered as a key component of high frequency isolated multilevel cascaded medium voltage converters. Two topologies of bi-directional DC-DC converters: the resonant half-bridge DC-DC converter and the phase-shift DHB converter are compared in the paper. Experimental results of SiC-based 50 kHz DHB DC-DC converter are presented in the paper.
-
The advanced monitoring as a key factor for appropriate optimization and control of full-scale activated sludge systems – case study Debogorze WWTP.
PublicationComputer simulation has become a helpful tool in wastewater treatment systems performance and effectiveness analysis. Advanced monitoring, by using appropriate software, enables to create a mathematical model of a real wastewater treatment plant (WWTP), run a simulation and subsequently interpret results under various conditions. An operation of WWTP is usually controlled by global parameters such as flow, solids retention time,...
-
Forgotten academic modernism in the reconstruction of downtown Le Havre by Auguste Perret
Publication -
Decision Regret after Laparoscopic Sleeve Gastrectomy—5 Years’ Perspective
Publication -
Distributed measurement system with data transmission secured using XXTEA algorithm
PublicationThe paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Photophysics of Soret-Excited Tin(IV) Porphyrins in Solution
PublicationThe photophysics of low-chlorin tin(IV) tetraphenylporphyrin dihydroxide, a core building block for axially substituted supramolecular tin porphyrin constructs, has been studied in a variety of hydrogen-bonding, nonpolar, and aprotic polar solvents using steady-state, nanosecond, and femtosecond time-resolved emission, and femtosecond time-resolved absorption methods. In hydrogen-bonding solvents the metalloporphyrin exists as...
-
FEM modelling of screw displacement pile interaction with subsoil
PublicationPredicting the-settlement characteristics of piles is an important element in the designing of pile foundations. The most reliable method in evaluating pile-soil interaction is the static load test, preferably performed with instrumentation for measuring shaft and pile base resistances. This, however, is a mostly post-implementation test. In the design phase, prediction methods are needed, in which numerical simulations play an...
-
Quantum privacy witness
PublicationWhile it is usually known that the mean value of a single observable is enough to detect entanglement or its distillability, the counterpart of such an approach in the case of quantum privacy has been missing. Here we develop the concept of a privacy witness, i.e., a single observable that may detect the presence of the secure key even in the case of bound entanglement. Then we develop the notion of secret-key estimation based...
-
Key-Marker Volatile Compounds in Aromatic Rice (Oryza sativa) Grains: An HS-SPME Extraction Method Combined with GC×GC-TOFMS
PublicationThe aroma of rice essentially contributes to the quality of rice grains. For some varieties, their aroma properties really drive consumer preferences. In this paper, using a dynamic headspace solid-phase microextraction (HS-SPME) system coupled to a two-dimensional gas chromatography (GC×GC) using a time-of-flight mass spectrometric detector (TOFMS) and multivariate analysis, the volatile compounds of aromatic and non-aromatic...
-
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile
PublicationThe paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...
-
Carvacrol as a Stimulant of the Expression of Key Genes of the Ginsenoside Biosynthesis Pathway and Its Effect on the Production of Ginseng Saponins in Panax quinquefolium Hairy Root Cultures
Publication -
Influenza vaccination: key facts for general practitioners in Europe—a synthesis by European experts based on national guidelines and best practices in the United Kingdom and the Netherlands
Publication -
Cavitation based cleaner technologies for biodiesel production and processing of hydrocarbon streams: A perspective on key fundamentals, missing process data and economic feasibility – A review
PublicationThe present review emphasizes the role of hydrodynamic cavitation (HC) and acoustic cavitation in clean and green technologies for selected fuels (of hydrocarbon origins such as gasoline, naphtha, diesel, heavy oil, and crude oil) processing applications including biodiesel production. Herein, the role of cavitation reactors, their geometrical parameters, physicochemical properties of liquid media, liquid oxidants, catalyst loading,...