Filters
total: 515
filtered: 399
Search results for: CRYPTOGRAPHY PROTOCOLS
-
Analysis of pesticide residue in tomato samples using analytical protocol based on application of QuEChERS technique and GC-ECD system
PublicationQuEChERS sample preparation method was used for the determination of 10 pesticides and their metabolites in tomato samples, coupled to gas chromatography with electron capture detector (GCECD). The experimental parameters including oven temperature program, amount of the sample and purifying agent were optimized. The GC-ECD method was validated in terms of linearity, selectivity and recovery. The limits of detection (LODs) of the...
-
Development of an Analytical Protocol for Determination of Cyanide in Human Biological Samples Based on Application of Ion Chromatography with Pulsed Amperometric Detection
PublicationA simple and accurate ion chromatography (IC) method with pulsed amperometric detection (PAD) was proposed for the determination of cyanide ion in urine, sweat, and saliva samples. The sample pretreatment relies on alkaline digestion and application of Dionex OnGuard II H cartridge. Under the optimized conditions, the method showed good linearity in the range of 1–100 μg/L for urine, 5–100 μg/L for saliva, and 3–100 μg/L for sweat...
-
Quantum security and theory of decoherence
PublicationWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Physics-based protein-structure prediction using a hierarchical protocol based on the UNRES force field: Assessment in two blind tests
Publication -
Acute Effects of Using Added Respiratory Dead Space Volume in a Cycling Sprint Interval Exercise Protocol: A Cross-Over Study
Publication -
Analysis of pesticide residue in fruits and vegetables using analytical analytical protocol based on application of QuEChERS technique and GC-ECD system
PublicationQuEChERS sample preparation method was used for the determination of 10 pesticides and their metabolites in fruits (apple, grape) and vegetables (tomato, paprika), coupled to gas chromatography with electron capture detector (GC-ECD). The experimental parameters including amount of the sample, types of solvents, extraction time and types of sorbent at the purification stage were optimized. The GC-ECD method was validated in terms...
-
Structural Transformation to Attain Responsible BIOSciences (STARBIOS2): Protocol for a Horizon 2020 Funded European Multicenter Project to Promote Responsible Research and Innovation
Publication -
Structural Transformation to Attain Responsible BIOSciences (STARBIOS2): Protocol for a Horizon 2020 Funded European Multicenter Project to Promote Responsible Research and Innovation
Publication -
Comparison of the adaptive implementation and evaluation of the Meeting Centers Support Program for people with dementia and their family carers in Europe; study protocol of the MEETINGDEM project
Publication -
Profiling and Qualitative Assessment of Enzymatically and Thermally Oxidized Egg Yolk Phospholipids using a Two‐Step High‐Performance Liquid Chromatography Protocol
PublicationA two‐step high‐performance liquid chromatography (HPLC) method for the profiling and qualitative assessment of oxidized phospholipids (oxPL) present in foods was developed. The applicability of the investigated two‐step HPLC protocol was verified for separation of enzymatically and thermally oxidized hen egg yolk phospholipids (PL) as a relevant food model. In the first step, seven individual PL classes were separated using hydrophilic...
-
The realization of ASON/GMPLS control plane
PublicationASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols like RSVP-TE, OSPF-TE, LMP. This solution is named ASON/GMPLS. In this chapter we present the control plane problems and proposes ASON/GMPLS network realization that are tested on testbed consists of three and...
-
High efficiency protocol of DNA extraction from Micromys minutus mandibles from owl pellets: a tool for molecular research of cryptic mammal species
Publication -
History-based dynamic weight voting for multi-agent systems
PublicationTaking decision in multi-agent systems may involve voting. Two basic voting protocols are surveyed in the paper. Then, a new history-based dynamic weight voting is proposed. This voting protocol allows for identification of the agents which contribute to the correct system decision. The proposed solution is contrasted with majority voting and with weighted average voting, to show its advantages
-
Policy Evaluation Network (PEN): Protocol for systematic literature reviews examining the evidence for impact of policies on physical activity across seven different policy domains
Publication -
Model of control plane of ASON/GMPLS network
PublicationASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols. This solution, an ASON control plane built on GMPLS protocols is named ASON/GMPLS. In the paper, we decompose the control plane problem and show the main concepts of ASON network. We propose a hierarchical architecture...
-
Protokoły łączności do transmisji strumieni multimedialnych na platformie KASKADA
PublicationPlatforma KASKADA rozumiana jako system przetwarzania strumieni multimedialnych dostarcza szeregu usług wspomagających zapewnienie bezpieczeństwa publicznego oraz ocenę badań medycznych. Wydajność platformy KASKADA w znaczącym stopniu uzależniona jest od efektywności metod komunikacji, w tym wymiany danych multimedialnych, które stanowią podstawę przetwarzania. Celem prowadzonych prac było zaprojektowanie podsystemu komunikacji...
-
Optimization of a Fabric Phase Sorptive Extraction protocol for the isolation of six bisphenols from juice pouches to be analysed by high performance liquid chromatography coupled with diode array detector
PublicationFabric Phase Sorptive Extraction (FPSE) combined with high pressure liquid chromatography using to diode array detection (HPLC-DAD) was applied for the simultaneous determination of bisphenols (BPA, BPB, BPC, BPE, BPF, BPS) in juice pouches. The FPSE procedure was optimized with regards to the critical parameters that affect the performance of the method including the selection of the FPSE membrane type and size, adsorption time,...
-
Fabrication of toughened plastic using styrene butadiene rubber-poly (methyl methacrylate) interpenetrating polymer networks
PublicationA standard set of interpenetrating polymeric networks (IPNs) has been contrived using an elastomerstyrene butadiene rubber and a thermoplastic poly (methyl methacrylate) through sequential polymerization protocol. This low-cost material can be hopefully engaged as a toughened plastic with cocontinuous morphology. Different morphological protocols including Raman imaging are effectively utilized to envisage the effect of blend ratio...
-
Analiza wpływu transmisji danych na jakość działania rozproszonych systemów sterowania
PublicationW artykule przedstawiono zagadnienia związane z transmisją danych w rozproszonych systemach sterowania. Opisano cechy charakterystyczne przemysłowych sieci i protokołów informatycznych. Utworzono model rozproszonego systemu sterowania poziomem cieczy w zbiorniku, w którym komunikacja oparta została na protokole Modbus RTU. Na podstawie zmian parametrów transmisji danych wykazano, że poprawna komunikacja pomiędzy elementami systemu...
-
Influence of Early versus Late supplemental ParenteraL Nutrition on long-term quality of life in ICU patients after gastrointestinal oncological surgery (hELPLiNe): study protocol for a randomized controlled trial
Publication -
Performance Evaluation of Control Plane Functions in ASON/GMPLS Architecture
PublicationIt is assumed that demands of information society could be satisfied by architecture ASON/GMPLS comprehended as Automatically Switched Optical Network (ASON) with Generalized Multi-Protocol Label Switching (GMPLS) protocols. Introduction this solution must be preceded performance evaluation to guarantee society expectations. Practical realization is expensive and simulations models are necessary to examine standardized propositions....
-
Comparison of GC–MS and MEKC methods for caffeine determination in preworkout supplements
PublicationIn this study, GC–MS- and MEKC-based methods for determination of caffeine (CAF) in preworkout supplements were developed and validated. The proposed protocols utilized minimal sample preparation (simple dilution and syringe filtration). The developed methods achieved satisfactory validation parameters, i.e. good linearity (R2 0.9988 and R2 0.9985 for GC–MS- and MEKC-based method, respectively), satisfactory intraand interaccuracy...
-
High efficacy and safety of VTD as an induction protocol in patients with newly diagnosed multiple myeloma eligible for high dose therapy and autologous stem cell transplantation: A report of the Polish Myeloma Study Group
Publication -
The effect of oligofructose-enriched inulin supplementation on gut microbiota, nutritional status and gastrointestinal symptoms in paediatric coeliac disease patients on a gluten-free diet: study protocol for a pilot randomized controlled trial
Publication -
No Quantum Realization of Extremal No-Signaling Boxes
PublicationThe study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand,...
-
A Novel Method for the Combined Photocatalytic Activity Determination and Bandgap Estimation
Publication -
INFOGEST static in vitro simulation of gastrointestinal food digestion
PublicationDeveloping a mechanistic understanding of the impact of food structure and composition on human health has increasingly involved simulating digestion in the upper gastrointestinal tract. These simulations have used a wide range of different conditions that often have very little physiological relevance, and this impedes the meaningful comparison of results. The standardized protocol presented here is based on an international consensus...
-
Call and Connections Times in ASON/GMPLS Architecture
PublicationIt is assumed that demands of information soci- ety could be satisfied by architecture ASON/GMPLS comprehended as Automatically Switched Optical Network (ASON) with Generalized Multi-Protocol Label Switching (GMPLS) protocols. Introduction this solution must be preceded by performance evaluation to guarantee society expectations. Call and connections times are in ASON/GMPLS architecture important for real-time applications. Practical...
-
Collision‐Aware Routing Using Multi‐Objective Seagull Optimization Algorithm for WSN‐Based IoT
PublicationIn recent trends, wireless sensor networks (WSNs) have become popular because of their cost, simple structure, reliability, and developments in the communication field. The Internet of Things (IoT) refers to the interconnection of everyday objects and sharing of information through the Internet. Congestion in networks leads to transmission delays and packet loss and causes wastage of time and energy on recovery. The routing protocols...
-
General paradigm for distilling classical key from quantum states
PublicationIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
Call Control Evaluation in ASON/GMPLS Architecture
PublicationThe Automatically Switched Optical Network (ASON) utilizing Generalized Multi–Protocol Label Switching (GMPLS) protocols named as ASON/GMPLS is one of the propositions of Next Generation Network. The basic assumption of ASON control plane is a separation of call control from connection control. The control plane is divided into call control and connection control components. Presented work regards the problem of call control evaluation...
-
Exploring multi-step glucose oxidation kinetics at GOx-functionalized nanotextured gold surfaces with differential impedimetric technique
PublicationFor a few past years, we can observe the enormous growth of investigations related to ultrasensitive electrochemical sensors capable of reliable determination of important body parameters and analytes. Utilized procedures rely on standard electrochemical methods, demanding electrode polarization, and information about the initial characteristics of the working electrode. More and more complex electrode materials are characterized...
-
Isolation and 3-dimensional Culture of Primary Murine Intestinal Epithelial Cells
Publication -
Induction of Epithelial-mesenchymal Transition in MDCK II Cells
Publication -
Quantum entanglement
PublicationAll our former experience with application of quantum theory seems to say that what is predicted by quantum formalism must occur in the laboratory. But the essence of quantum formalism-entanglement, recognized by Einstein, Podolsky, Rosen, and Schrödinger-waited over 70 years to enter laboratories as a new resource as real as energy. This holistic property of compound quantum systems, which involves nonclassical correlations between...
-
Towards hardware built-in support for computer system safety
PublicationArtykuł omawia dostępne technologie wirtualizacji zasobów pamięci i systemów I/O w systemach komputerowych takie jak Execute Disable Bit (EDB) capability i Virtual Machine Architecture (VMA). Nastepnie wprowadza założenia na rozszerzenie tych technologii w celu uzyskania funkcjonalności Safe Call Execution dzieki technologii Execution Disabling Policies (EDP). Wprowadzono również założenia na funkcjonalność Memory Virtualization...
-
Operating system security by integrity checking and recovery using write-protected storage
PublicationThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
Extraction pathways and purification strategies towards carminic acid as natural-based food colorant: A comprehensive review
PublicationAs a current trend of fabricating healthier products, food manufacturing companies seek for natural-based food colorant aiming to replace the synthetic ones, which apart from meeting sensorial and organoleptic aspects, they can also act as health promoters offering additional added value. Carminic acid is a natural based food colorant typically found in several insect taxa. However, there are current approaches which pursue the...
-
Introduction to MIP synthesis, characteristics and analytical application
PublicationOne of the trends in analytical chemistry is associated with designing and developing new types of sample preparation techniques, which might significantly increase the efficiency and selectivity of the analytes isolation or/and preconcentration process. One of the most widely employed solutions are selective sorption materials, defined as molecularly imprinted polymers (MIPs), as well as the sorbents with the molecular fingerprint....
-
Zagrożenia bezpieczeństwa protokołów komunikacji morskiej, lotniczej i lądowej
PublicationW artykule przedstawiono przykładowe zagrożenia wykorzystujące słabości wybranych protokołów komunikacji morskiej, lotniczej i lądowej. Wskazano, jakie czynności należy podjąć, żeby się przed nimi ustrzec (przynajmniej częściowo). Opisano również kierunek, w jakim powinny być rozwijane analizowane protokoły, aby zwiększyć bezpieczeństwo osób je używających.
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
INFOGEST inter-laboratory recommendations for assaying gastric and pancreatic lipases activities prior to in vitro digestion studies
PublicationIn vitro digestion studies often use animal digestive enzyme extracts as substitutes of human gastric and pancreatic secretions. Pancreatin from porcine origin is thus commonly used to provide relevant pancreatic enzymes such as proteases, amylase and lipase. Rabbit gastric extracts (RGE) have been recently introduced to provide gastric lipase in addition to pepsin. Before preparing simulated gastric and pancreatic extracts with...
-
An approach to constructing genuinely entangled subspaces of maximal dimension
PublicationGenuinely entangled subspaces (GESs) are the class of completely entangled subspaces that contain only genuinely multiparty entangled states. They constitute a particularly useful notion in the theory of entanglement but also have found an application, for instance, in quantum error correction and cryptography. In a recent study (Demianowicz and Augusiak in Phys Rev A 98:012313, 2018), we have shown how GESs can be efficiently...
-
The role of electrolysis and enzymatic hydrolysis treatment in the enhancement of the electrochemical properties of 3D-printed carbon black/poly(lactic acid) structures
PublicationAdditive manufacturing, also known as 3D printing, is beginning to play an unprecedented role in developing many applications for industrial or personalized products. The conductive composite structures require additional treatment to achieve an electroactive surface useful for electrochemical devices. In this paper, the surfaces of carbon black/poly(lactic acid) CB-PLA printouts were activated by electrolysis or enzymatic digestion...
-
Simulator for Performance Evaluation of ASON/GMPLS Network
PublicationThe hierarchical control plane network architecture of Automatically Switched Optical Network with utilization of Generalized Multi-Protocol Label Switching protocols is compliant to next generation networks requirements and can supply connections with required quality of service, even with incomplete domain information. Considering connection control, connection management and network management, the controllers of this architecture...
-
Distributed measurement system with data transmission secured using XXTEA algorithm
PublicationThe paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...
-
Robust amplification of Santha-Vazirani sources with three devices
PublicationWe demonstrate that amplification of arbitrarily weak randomness is possible using quantum resources. We present a randomness amplification protocol that involves Bell experiments. We find a Bell inequality which can amplify arbitrarily weak randomness and give a detailed analysis of the protocol involving it. Our analysis includes finding a sufficient violation of Bell inequality as a function of the initial quality of randomness....
-
Multiple access in ad-hoc wireless LANs with noncooperative stations
PublicationA class of contention-type MAC protocols (e.g., CSMA/CA) relies on random deferment of packet transmission, and subsumes a deferment selection strategy and a scheduling policy that determines the winner of each contention cycle. This paper examines contention-type protocols in a noncooperative an ad-hoc wireless LAN setting, where a number of stations self-optimise their strategies to obtain a more-than-fair bandwidth share. Two...
-
Dynamic Route Discovery Using Modified Grasshopper Optimization Algorithm in Wireless Ad-Hoc Visible Light Communication Network
PublicationIn recent times, visible light communication is an emerging technology that supports high speed data communication for wireless communication systems. However, the performance of the visible light communication system is impaired by inter symbol interference, the time dispersive nature of the channel, and nonlinear features of the light emitting diode that significantly reduces the bit error rate performance. To address these problems,...
-
Architecture and Basic Assumptions of RSMAD
PublicationThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...