displaying 1000 best results Help
Search results for: SELFISH NODES
-
Enlarged lymph nodes, unspecified - Male, 64 - Tissue image [8020729577656001]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015162691]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015165741]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015168841]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Male, 64 - Tissue image [8020729577656531]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Male, 68 - Tissue image [6280729578144481]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [622073001516121]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Male, 64 - Tissue image [8020729577654541]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Male, 68 - Tissue image [628072957814841]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015169071]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015168621]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015167281]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015162871]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015161711]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015168721]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Male, 64 - Tissue image [8020729577654631]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Male, 68 - Tissue image [6280729578148091]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Male, 68 - Tissue image [6280729578146391]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Male, 64 - Tissue image [802072957765971]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015162571]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015163681]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Enlarged lymph nodes, unspecified - Female, 12 - Tissue image [6220730015165271]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Trust Management Method for Wireless Sensor Networks
PublicationA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Experimental Testing of Innovative Cold-Formed "GEB" Section / Badania Eksperymentalne Innowacyjnego Kształtownika Giętego Na Zimno Typu „Geb“
PublicationOne of the major advantages of light gauge steel structures made of cold-formed steel sections is their low weight, so manufacturers are increasingly using the possibilities of those sections for the production of typical single-storey steel structures systems. Well known profiles, such as Z, C and the so called hat sections that have been studied and described in the literature, are used mainly as purlins or truss components....
-
Dedukcja zachowań węzłów sieci ad hoc na podstawie potwierdzeń końcowych: ocena dokładności
PublicationPrzebadano precyzję algorytmu dedukcji rzeczywistych spolegliwości węzłów sieci MANET w oparciu o potwierdzenia end-to-end i bez użycia mechanizmu watchdog. W przeprowadzonych eksperymentach numerycznych wskazano charakterystyki topologiczne wpływające na tę precyzję.
-
A Parallel MPI I/O Solution Supported by Byte-addressable Non-volatile RAM Distributed Cache
PublicationWhile many scientific, large-scale applications are data-intensive, fast and efficient I/O operations have become of key importance for HPC environments. We propose an MPI I/O extension based on in-system distributed cache with data located in Non-volatile Random Access Memory (NVRAM) available in each cluster node. The presented architecture makes effective use of NVRAM properties such as persistence and byte-level access behind...
-
Standing Waves in One-Dimensional Resonator Contaning an Ideal Isothermal Gas Affected by the Constant Mass Force
PublicationThe study is devoted to standing acoustic waves in one-dimensional planar resonator which containing an ideal gas. A gas is affected by the constant mass force. Two types of physically justified boundary conditions are considered: zero velocity or zero excess pressure at both boundaries. The variety of nodal and antinodal points is determined. The conclusion is that the nodes of pressure and antinodes of velocity do not longer...
-
Te use of acoustic emission for assessment of the oil lubricity in a four-ball tester
Publicationin view of the increased dynamic and temperature load in the compression-ignition engine tribological systems, particular attention is drawn to the problem of such lubrication of the friction nodes that after breaking the boundary layer it could be restored without any wear occurring. therefore, an idea has been devised of introducing to friction nodes, with the lubrication oils, of new substances (operational preparations) modifying...
-
Interaction between acoustic and non-acoustic mode in bubbly liquid
PublicationThe nonlinear interaction of acoustic and entropy modes in a bubbly liquid is the subject of investigation. Thedynamic equation governing an excess density of the entropy mode is derived. Nonlinearity and dispersion are the reasons forexcitation of the entropy mode. The nonlinear interaction of modes as a reason for bubble to grow due to sound, is discovered.Some numerical examples of the modes interactions are made.
-
Dekodowanie kodów iterowanych z użyciem sieci neuronowej
PublicationNadmiarowe kody iterowane są jedną z prostych metod pozyskiwania długich kodów korekcyjnych zapewniających dużą ochronę przed błędami. Jednocześnie, chociaż ich podstawowy iteracyjny dekoder jest prosty koncepcyjnie oraz łatwy w implementacji, to nie jest on rozwiązaniem optymalnym. Poszukując alternatywnych rozwiązań zaproponowano, przedstawioną w pracy, strukturę dekodera tego typu kodów wspomaganą przez sieci neuronowe. Zaproponowane...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Aplikacja demonstrująca działanie kodów fontannowych
PublicationIstotną cechą kodów fontannowych jest możliwość odtwarzania nadawanych danych niezależnie od jakości kanału. Wynika to z tego, że kody te nie mają z góry założonej zawartości informacyjnej, a kolejne symbole nadmiarowe są generowane, dopóki jest taka potrzeba. Jest to szczególnie przydatne w transmisjach broadcastowych, bo każdy z odbiorców może zdekodować dane tak wcześnie, na ile pozwala jakość łącza. Aby przybliżyć funkcjonowanie...
-
Reconstruction of 3D structure of positive corona streamer by local methods
PublicationThe computer algorithms were used for reconstruction of streamer 3D structure. We propose the 3D tree structure model of corona discharge streamer composed with nodes and edges between chosen couples of nodes, which enables easy computation of some important parameters ofstreamers. The 3D model can be derived directly from two projection images by global methods like evolutionary searching or particle simulations. In this paper...
-
Natural Deep Eutectic Solvents as Agents for Improving Solubility, Stability and Delivery of Curcumin
PublicationPurpose Study on curcumin dissolved in natural deep eutectic solvents (NADES) was aimed at exploiting their beneficial properties as drug carriers. Methods The concentration of dissolved curcumin in NADES was measured. Simulated gastrointestinal fluids were used to determine the concentration of curcumin and quantum chemistry computations were performed for clarifying the origin of curcumin solubility enhancement in NADES. Results NADES...
-
Civil liability for artificial intelligence products versus the sustainable development of CEECs: which institutions matter?
PublicationThe aim of this paper is to conduct a meta-analysis of the EU and CEECs civil liability institutions in order to find out if they are ready for the Artificial Intelligence (AI) race. Particular focus is placed on ascertaining whether civil liability institutions such as the Product Liability Directive (EU) or civil codes (CEECs) will protect consumers and entrepreneurs, as well as ensure undistorted competition. In line with the...
-
Data Compression in Ultrasonic Network Communication via Sparse Signal Processing
PublicationThis document presents the approach of using compressed sensing in signal encoding and information transferring within a guided wave sensor network, comprised of specially designed frequency steerable acoustic transducers (FSATs). Wave propagation in a damaged plate was simulated using commercial FEM-based software COMSOL. Guided waves were excited by means of FSATs, characterized by the special shape of its electrodes, and modeled...
-
BADANIE MOŻLIWOŚCI SYMULACYJNYCH ŚRODOWISKA ‘MININET’ POD KĄTEM WSPARCIA PROTOKOŁU NETCONF
PublicationNiniejszy artykuł został poświęcony zagadnieniu wykorzystania środowiska emulacyjnego Mininet do testowania mechanizmów działania protokołu NETCONF. Omówiono w nim projekt inżynierski, którego wynikiem było zaimplementowanie wirtualnego środowiska, umożliwiającego prowadzenie takich badań. Opisano także wyniki testów emulacji dwóch pierścieniowych domen sieciowych, składających się z 30 węzłów.
-
Non-Wave Variations in Temperature Caused by Sound in a Chemically Reacting Gas
PublicationA weakly nonlinear generation of non-acoustic modes in the field of sound in a gas is considered. An exotericchemical reaction of A->B type, which takes place in a gas, may be reversible or not. Two types of sound areconsidered, low-frequency and high-frequency as compared with the characteristic time of a chemical reaction.For both these cases, the governing equations of non-acoustic modes are derived and conclusions of the efficiencyof...
-
Context sensitive privacy management in a distributed environment
PublicationArtykuł przedstawia mechanizm zarządzania prywatnością stworzony dla systemu rozproszonego z założeniem, że węzły systemu mają ograniczone zasoby (moc procesora, pamięć). Podstawowy pomysł zakłada, że prywatne dane są filtrowane zgodnie z polityką prywatności użytkowników przed ich ujawnieniem innym użytkownikom. Te decyzje są silnie umiejscowione, co ogranicza narzut związany z zarządzaniem prywatnością na węzłach systemu. Sam...
-
Postquarter-Point Case of Ship’s Side-Berthing and Its Influence on Marine Fender Pitch
PublicationThis paper presents a critical analysis of some selected codes and practical recommendations used as basic rules in the design procedures of modern marine fender systems. The first part of the discussion pertains to the existing equations used in calculating the eccentricity coefficient in the ship’s kinetic energy equation and the maximum allowable fender pitch (spacing) in a set of fenders installed along a quay wall. A new approach...
-
Long-distance quantum communication over noisy networks without long-time quantum memory
PublicationThe problem of sharing entanglement over large distances is crucial for implementations of quantum cryptography. A possible scheme for long-distance entanglement sharing and quantum communication exploits networks whose nodes share Einstein-Podolsky-Rosen (EPR) pairs. In Perseguers et al. [Phys. Rev. A 78, 062324 (2008)] the authors put forward an important isomorphism between storing quantum information in a dimension D and transmission...
-
New Method for Increasing Precision of Position Estimation of a Moving Person in Hybrid Inertial Navigation System
PublicationIn this article a new method for increasing precision of position estimation of inertial navigation in hybrid localization system with reduced number of reference nodes for radio distance measurements is presented. Measuring tests were carried out to verify precision of position estimation of moving person in indoor environment.
-
Wireless Systems of Threats Monitoring
PublicationConcept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless systems of threats monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless systems of threats monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublicationThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
Technical physics (Data Engineering)
e-Learning CoursesField of study: Data Engineering; Subject name: Technical physics; Lecture notes and other course materials.
-
Technical physics (Data Engineering)_22/23
e-Learning CoursesField of study: Data Engineering; Subject name: Technical physics; Lecture notes and other course materials.
-
Przedmioty od wyboru sem VI GP
e-Learning CoursesW ramach przedmiotu omówione zostaną zagadnienia związane z projektowaniem i planowaniem z wykorzystaniem tzw. urban design codes.