Filters
total: 1634
-
Catalog
- Publications 1200 available results
- Journals 130 available results
- Conferences 82 available results
- Publishing Houses 1 available results
- People 40 available results
- Projects 9 available results
- e-Learning Courses 15 available results
- Events 2 available results
- Open Research Data 155 available results
displaying 1000 best results Help
Search results for: BATHING SECURITY
-
COLON, Ascending colon - Female, 79 - Tissue image [8200729592216271]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Techniczne aspekty implementacji nowoczesnej platformy e-learningowej
PublicationZaprezentowano aspekty techniczne implementacji nowoczesnej platformy nauczania zdalnego. Omówiono obszary funkcjonalne takie jak: system zarządzania nauczaniem, serwis informacyjny, dodatkowe oprogramowanie dydaktyczne oraz kolekcja zasobów multimedialnych. Przybliżono zagadnienia związane z bezpieczeństwem takiej platformy. Na końcu przedstawiono parametry techniczne wdrożonej na Politechnice Gdańskiej platformy eNauczanie.
-
Optimal edge-coloring with edge rate constraints
PublicationWe consider the problem of covering the edges of a graph by a sequence of matchings subject to the constraint that each edge e appears in at least a given fraction r(e) of the matchings. Although it can be determined in polynomial time whether such a sequence of matchings exists or not [Grötschel et al., Combinatorica (1981), 169–197], we show that several questions about the length of the sequence are computationally intractable....
-
Knowledge engineer – more than only technical position. The concept of knowledge engineering education at the Faculty of Management and Economics
PublicationOrganizational learning means an effective knowledge management. Management is nothing more than the constant decision-making. Therefore organizational learning must be seen through the prism of decisions taken at all levels. Unfortunately decisions are never taken within comfortable conditions. Decision maker suffers from a lack of any support. There is often a problem with human resources having right skills, sometimes they do...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
SEM images of Ni-Mo2CTx/Mo2Ga2C before and after catalytic dry reforming of methane
Open Research DataThe dataset includes SEM images of Ni-Mo2CTx/Mo2Ga2C catalysts before and after the dry reforming of methane.
-
A comprehensive overview of software product management challenges
PublicationThe principal focus of software product management is to ensure the economic success of the product, which means to prolong the product life as much as possible with modest expenditures to maximizs profits. Software product managers play an important role in the software development organization while being responsible for the strategy, business case, product roadmap, high-level requirements, product deployment (release-management),...
-
Tracking body movement for radio channel measurements in BAN with indoor positioning system
PublicationThis paper presents indoor positioning system based on inertial navigation with additional distance measurements using UWB modems and map matching to increase accuracy and eliminate position drift. Such system may be used to track position of human body during radio channel measurements for body area networks. Performance of proposed system and limitations caused by inertial navigation are briefly described.
-
Report no WOiO/II/67/2015 - Expertise about load capacity of twistlock foundation and sliding foundation
PublicationCustomer delivered to Laboratory 17 elements - twist lock foundations and sliding lock foundations (ship equipment for container lashing). Elements were selected from production series. Each element was loaded for braking load. After test visual inspection had been performed. The expertise contains: description of tested elements, test assumptions, test stand, results and conclusions
-
Detection of Closing Crack in Beam Based on Responses Induced by Harmonic Excitation
PublicationThe non-linear contact model was chosen to simulate the closed crack in the cantilever beam. The study examines the shape and characteristics of the phase diagram of a cantilever beam with closed cracks. It investigates how various crack properties influence the geometry of the phase diagram and proposes a method for identifying cracks based on their features. The area of each closed curve in the phase diagram is determined using...
-
Abuse or contamination? Ratio determination of clenbuterol enantiomers to distinguish between doping use and meat contamination
PublicationClenbuterol has been detected in urine of several athletes during routine doping control in the past years. Athletes claimed that the clenbuterol was ingested by eating contaminated meat. Providing analytical prove for this claim is difficult. clenbuterol consists of two enantiomers, R(-) and S(+)-clenbuterol. Currently available human and veterinary preparations were found to consist of a racemic mixture of both enantiomers. When...
-
Software Quality, Reliability, and Security (International Conference on Quality Software [QSIC])
Conferences -
Joint Working Conference on Secure Information Networks: Communications and Multimedia Security
Conferences -
ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code
Conferences -
Validating data acquired with experimental multimodal biometric system installed in bank branches
PublicationAn experimental system was engineered and implemented in 100 copies inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank client voice recognition and hand vein distribution verification. The main purpose of the presented research was to analyze questionnaire responses reflecting user opinions on: comfort, ergonomics, intuitiveness and other aspects of the biometric enrollment...
-
OCHRONA PRYWATNOŚCI W SYSTEMACH MONITORINGU WIZYJNEGO, PRZEGLĄD OPRACOWANYCH ARCHITEKTUR I ALGORYTMÓW
PublicationNieustannie rozwijające się technologie informacyjne związane z inteligentnym monitoringiem wizyjnym stwarzają ryzyko niewłaściwego wykorzystywania danych osobowych. W celu zapewnienia prawidłowej ochrony materiału wizyjnego, w ramach projektów realizowanych w Katedrze Systemów Multimedialnych WETI PG, opracowany został szereg architektur i algorytmów, które ułatwiają ochronę danych wrażliwych, takich jak: wizerunki osób, numery...
-
Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger
PublicationW artykule opisano aplikację, która automatycznie wykrywa zdarzenia dźwiękowe takie jak: rozbita szyba, wystrzał, wybuch i krzyk. Opisany system składa się z bloku parametryzacji i klasyfikatora. W artykule dokonano porównania parametrów dedykowanych dla tego zastosowania oraz standardowych deskryptorów MPEG-7. Porównano też dwa klasyfikatory: Jeden oparty o Percetron (sieci neuronowe) i drugi oparty o Maszynę wektorów wspierających....
-
Study of the Effectiveness of Model Order Reduction Algorithms in the Finite Element Method Analysis of Multi-port Microwave Structures
PublicationThe purpose of this paper is to investigate the effectiveness of model order reduction algorithms in finite element method analysis of multi-port microwave structures. Consideration is given to state of the art algorithms, i.e. compact reduced-basis method (CRBM), second-order Arnoldi method for passive-order reduction (SAPOR), reduced-basis methods (RBM) and subspace-splitting moment-matching MOR (SSMM-MOR)
-
SMALL INTESTINE, Overlapping lesion of small intestine - Female, 79 - Tissue image [8200729592202181]
Open Research DataThis is the histopathological image of SMALL INTESTINE tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Bartosz Sawik
PeopleDr Bartosz Sawik is a Professor at the Department of Business Informatics and Engineering Management, AGH University of Science and Technology, Krakow, Poland and at the Institute of Smart Cities, GILT-OR Group, Department of Statistics, Computer Science and Mathematics, Public University of Navarre, Pamplona, Spain. He is a Visiting Researcher at the University of California, Berkeley, USA. He has a Ph.D. and a M.Sc. and Eng....
-
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublicationML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublicationFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublicationAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Towards the value-based design of on-line services
PublicationThe paper identifies economic factors shaping customer bahaviour in on-line services in two interrelated dimensions; (1) economic needs and requirements, relevant to expected benefits and values perceived by customers; (2) technical components, allowing technical realization of on-line services. Technical components were cathegorized into four groups, creating so-called VIPR model: Visual, Interactive, Process and Relationship-relevant...
-
Resolving conflicts in object tracking for automatic detection of events in video
PublicationW referacie przedstawiono algorytm rozwiązywania konfliktów w śledzeniu obiektów ruchomych. Proponowana metoda wykorzystuje predykcję stanu obiektu obliczaną przez filtry Kalmana oraz dopasowuje wykryte obiekty do struktur śledzących ich ruch na podstawie deskryptorów koloru i tekstury. Omówiono specyficzne sytuacje powodujące konflikty, takie jak rozdzielanie obiektów. Przedstawiono wyniki testów. Algorytm może być zastosowany...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublicationRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks
PublicationHandover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...
-
Hazardous material-related propagation of the effects of train accidents in the subgrade
PublicationA large part of the transport of hazardous materials is carried out by rail. Therefore, the security of these transports is becoming increasingly important. Every catastrophe involving dangerous materials has a negative impact on the participants of the incident and the surrounding environment, because its range is generally not local. It follows that in the event of a catastrophe, its effects should be minimized and remediation...
-
Concept of Multifactor Method and Non-Functional Requirements Solution to Increase Resilience through Functional Safety with Cybersecurity Analysis
PublicationIn the process of designing safety systems, an integrated approach in safety and cybersecurity analysis is necessary. The paper describes a new technique of increasing resilience through integrated analysis of functional safety and cybersecurity. It is a modeling methodology based on the combination of the multifactor method utilizing modified risk graphs, used previously for Safety Integrity Level (SIL) assessment, and the Non-Functional...
-
Hardened Steel Surface Waviness Created by Rolling Burnishing Process
PublicationThe surface of the finishing machined parts is defined mainly by roughness parameters. Growing demands on the part, especially mating sliding or rolling, require the specification of additional parameters, such as waviness parameters, particularly when there is significant resistance to seizing or noise reduction. This paper presents surface waviness characteristics of hardened burnished steel.
-
Calculation of Induced Sheath Voltages in Power Cables – Single Circuit System versus Double Circuit System
PublicationThis paper presents comparison of values of induced sheath voltages in power cable metallic sheaths when one or two cables per phase are used. Calculation of voltages is performed for various phase sequences of the power cables. Three types of the sheaths bonding and earthing are considered. Shock hazard and voltage stress of non-metallic outer sheath of cables are evaluated. The proposed, optimal configuration of the power cable...
-
Adenocarcinoma, NOS - Female, 62 - Tissue image [9070730015333431]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Adenocarcinoma, NOS - Female, 62 - Tissue image [9070730015334941]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Tubular adenocarcinoma - Female, 80 - Tissue image [611073002144151]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Tubular adenocarcinoma - Female, 80 - Tissue image [6110730021446561]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Tubular adenocarcinoma - Female, 80 - Tissue image [6110730021443521]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Tubular adenocarcinoma - Female, 80 - Tissue image [6110730021448541]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Tubular adenocarcinoma - Female, 80 - Tissue image [61107300214461]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Tubular adenocarcinoma - Female, 80 - Tissue image [704024710496161]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Tubular adenocarcinoma - Female, 80 - Tissue image [6110730021445541]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Tubular adenocarcinoma - Female, 80 - Tissue image [6110730021442991]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Tubular adenocarcinoma - Female, 80 - Tissue image [611073002144811]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Tubular adenocarcinoma - Female, 80 - Tissue image [6110730021441551]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Tubular adenocarcinoma - Female, 80 - Tissue image [6110730021442641]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Feedline Alterations for Optimization-Based Design of Compact Super-Wideband MIMO Antennas in Parallel Configuration
PublicationThis letter presents a technique for size reduction of wideband multiple-input-multiple-output (MIMO) antennas. Our approach is a two-stage procedure. At the first stage, the antenna structure is modified to improve its impedance matching. This is achieved through incorporation of an n-section tapered feedline, followed by reoptimization of geometry parameters. Reducing the maximum in-band reflection well beyond the acceptance...
-
Towards More Realistic Probabilistic Models for Data Structures: The External Path Length in Tries under the Markov Model
PublicationTries are among the most versatile and widely used data structures on words. They are pertinent to the (internal) structure of (stored) words and several splitting procedures used in diverse contexts ranging from document taxonomy to IP addresses lookup, from data compression (i.e., Lempel- Ziv'77 scheme) to dynamic hashing, from partial-match queries to speech recognition, from leader election algorithms to distributed hashing...
-
Hybrid technique for the analysis of circular waveguide junctions loaded with ferrite posts
PublicationThis study presents a hybrid technique for the analysis of circular waveguide junctions loaded with axially symmetrical ferrite posts of irregular shape. The method is based on a combination of the finite-difference frequency- domain technique with a mode-matching technique. The proposed approach is validated by comparing the presented results with numerical ones obtained from commercial software. The application of a cylindrical...
-
LYMPH NODES, Intestinal lymph node - Female, 79 - Tissue image [8200729592218921]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
LYMPH NODES, Intestinal lymph node - Female, 79 - Tissue image [8200729592214051]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
LYMPH NODES, Intestinal lymph node - Female, 79 - Tissue image [8200729592212991]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.