Filters
total: 2144
-
Catalog
- Publications 1461 available results
- Journals 21 available results
- Conferences 6 available results
- People 28 available results
- Projects 8 available results
- Laboratories 1 available results
- Research Teams 1 available results
- e-Learning Courses 34 available results
- Events 4 available results
- Open Research Data 580 available results
displaying 1000 best results Help
Search results for: SECRET-KEY
-
Key logistics processes in project management based on organisation of an international training session-case study
PublicationImprovement of processes, including the logistics processes forms one of the essential aspects of modern business entities functioning. Search for the solutions allowing for quicker and less costly method of realisation of particular activities in highly significant, especially in the conditions of a dynamically changing environment in which the organisations have to function. It is a natural field occuring principally both in...
-
Understainding solid-phase microextraction: key factors influencing the extraction process and trends in improving the technique
PublicationAnalytical chemists are faced with the daunting challenges of accurately monitoring the state of the environment and the processes taking place in it and of determining an enormous range of analytes often present in trace and ultratrace amounts in sample matrixes with complex or variable compositions. Further challenges are presented by the need to introduce new methodologies into current analytical practice and equipment to comply...
-
The influence of screw configuration and screw speed of co-rotating twin screw extruder on the properties of products obtained by thermomechanical reclaiming of ground tire rubber
PublicationThe results of our investigations on the process of continuous thermomechanical reclaiming of ground tire rubber (GTR) carried out using a twin screw extruder are presented.We used a co-rotating twin screw extruder with a special configuration of plasticizing unit, enabling generation of considerable shear forces. The influence of screw configuration and screw speed on breaking of chemical crosslink bonds contained in ground tire...
-
KU812 basophils express urocortin, CRH-R, MC1R and steroidogenic enzymes and secrete progesterone
Publication -
The conception of secure and efficient process of migration into IPv6
PublicationZe względu na wady rozwiązań opartych o tunelowanie, w pracy zaproponowano koncepcję przejścia z IPv4 do IPv6 nie wymagającą od dostawców usług internetowych wzajemnej współpracy, nie narażoną na ataki związane z przekaźnikami, wzajemnym zaufaniem ISP. W koncepcji tej ograniczono tunelowanie do obszaru jednego ISP. W pracy wskazano istotne elementy ograniczające możliwość i zasadność wprowadzania mechanizmów tunelowania. Wskazano...
-
Acoustic analysis of selected sacred buildings in Szczecin
Publication -
The methods of secure data transmission in the KNX system
PublicationThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Secure Quaternion Feistel Cipher for DICOM Images
PublicationAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
Secured wired BPL voice transmission system
PublicationDesigning a secured voice transmission system is not a trivial task. Wired media, thanks to their reliability and resistance to mechanical damage, seem an ideal solution. The BPL (Broadband over Power Line) cable is resistant to electricity stoppage and partial damage of phase conductors, ensuring continuity of transmission in case of an emergency. It seems an appropriate tool for delivering critical data, mostly clear and understandable...
-
XXIV Aukcja Wielkie Serce
Publication -
XXVIII Aukcja Wielkie Serce
PublicationAukcja to wyjątkowa okazja dla miłośników i kolekcjonerów polskiej sztuki współczesnej. Kolejny raz będzie można obcować z dziełami artystów, którzy tworzą kanon, są „żywą encyklopedią” grafiki i malarstwa polskiego. Od początku lat 90. ubiegłego stulecia, organizatorzy aukcji szczycą się i zaufaniem najwybitniejszych polskich twórców. Pieniądze z licytacji ich dzieł, jak co roku, przekazane zostaną na rzecz wychowanków Specjalnego...
-
The IP vs. VDE competition as a key factor determining the stability of the MgBX5 (X = F, Cl) compounds
Publication -
The molecular function of kallikrein‐related peptidase 14 demonstrates a key modulatory role in advanced prostate cancer
Publication -
Non-Dioxin-Like PCBs – the Key Air Pollutant Associated with Lung Cancer in 15 Cities in Silesia
Publication -
Preparing samples for analysis - the key to analytical success=Przygotowanie próbek do analizy - droga do sukcesu
PublicationW artykule przedstawiono i dokonano krytycznego omówienia informacji literaturowych na temat poszczególnych etapów przygotowania próbek środowiskowych do etapu oznaczeń końcowych analitów występujących w tych próbkach na niskich poziomach zawartości.Szczególną uwagę zwrócono na:- Wyzwania związane z analityką specjacyjną,- Nowoczesne techniki ekstrakcji i wzbogacania analitów,- Możliwość zastosowania ultradźwięków oraz promieniowania...
-
Pedestrian protection, speed enforcement and road network structure the key action for implementing Poland's Vision Zero
PublicationSince 1991 Poland's road safety has been systematically improving with a 60% reduction in road deaths. Despite the progress Poland continues to be one of the European Union' worst performing countries. The country's main road safety problems remain unchanged: dangerous behaviour of road users, underdeveloped system of road safety management and low quality of road infrastructure. This is why subsequent road safety programmes (implemented...
-
Inverse Analysis as a Key Element of Safety Assessment under the Snow Load For The Large Suspension Roofs Structure
PublicationThe paper presents a concept and realization of monitoring system for the Silesian Stadium in Chorzow. The idea of the system lies in fusion of structure monitoring with a calibrated numerical FEM model [1]. The inverse problem is solved. On the base of measured selected displacements, the numerical FEM model of the structure combined with iterative method, develops the current snow load distribution. Knowing the load, we can calculate...
-
Edge-Computing based Secure E-learning Platforms
PublicationImplementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...
-
The secure transmission protocol of sensor Ad Hoc network
PublicationThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Key results from the numerical FEM analysis of the imperfect dome's state of displacements
Open Research DataThis dataset consists of an XLS file with the key results from the numerical FEM analysis of the imperfect dome's state of displacements.
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Localization of key amino acid residues in the dominant conformational epitopes on thyroid peroxidase recognized by mouse monoclonal antibodies
Publication -
Human serum interactions with phenolic and aroma substances of Kaffir(Citrus hystrix) and Key lime (Citrus aurantifolia) juices
PublicationTo understand the therapeutic application of polyphenols extracted from Kaffir (PolKaf) and Key (PolKey) limesdifferent analytical methods were applied. Based on quantitative analysis by two dimensional gas chromato-graphy (GC×GC) and time of flight mass spectrometry (TOFMS) it can be observed that the biggest differencesin the contents of selected terpenes of Kaffir and Key limes occur in chemical compounds such as limonene, citraland...
-
The valance state of vanadium-key factor in the flexibility of potassium vanadates structure as cathode materials in Li-ion batteries
PublicationPotassium hexavanadate (K2V6O16·nH2O) nanobelts have been synthesized by the LPE-IonEx method, which is dedicated to synthesis of transition metal oxide bronzes with controlled morphology and structure. The electrochemical performance of K2V6O16·nH2O as a cathode material for lithium-ion batteries has been evaluated. The KVO nanobelts demonstrated a high discharge capacity of 260 mAh g−1, and long-term cyclic stability up to 100...
-
Malarstwo jest okey. - Jan Buczkowski
PublicationKatalog towarzyszący wystawie "Malarstwo jest okey" w Foyer Opery Bałtyckiej w Gdańsku w ramach 3. edycji Festiwalu Kultury Trójmiasta "Metropolia jest okey", który odbył się w dniach 26-30.12.2009. Katalog liczy 120 stron i zawiera tekst krytyczny w języku polskim i angielskim, noty biograficzne artystów w języku polskim i angielskim oraz 55 kolorowych reprodukcji prac artystów (prace autorów: J. Buczkowski s. 16-17, D. Krechowicz...
-
Malarstwo jest okey. - Janusz Osicki
PublicationKatalog towarzyszący wystawie "Malarstwo jest okey" w Foyer Opery Bałtyckiej w Gdańsku w ramach 3. edycji Festiwalu Kultury Trójmiasta "Metropolia jest okey", który odbył się w dniach 26-30.12.2009. Katalog liczy 120 stron i zawiera tekst krytyczny w języku polskim i angielskim, noty biograficzne artystów w języku polskim i angielskim oraz 55 kolorowych reprodukcji prac artystów (prace autorów: J. Buczkowski s. 16-17, D. Krechowicz...
-
Malarstwo jest okey. - Krzysztof Wróblewski
PublicationKatalog towarzyszący wystawie "Malarstwo jest okey" w Foyer Opery Bałtyckiej w Gdańsku w ramach 3. edycji Festiwalu Kultury Trójmiasta "Metropolia jest okey", który odbył się w dniach 26-30.12.2009. Katalog liczy 120 stron i zawiera tekst krytyczny w języku polskim i angielskim, noty biograficzne artystów w języku polskim i angielskim oraz 55 kolorowych reprodukcji prac artystów (prace autorów: J. Buczkowski s. 16-17, D. Krechowicz...
-
Malarstwo jest okey. -Dominika Krechowicz
PublicationKatalog towarzyszący wystawie "Malarstwo jest okey" w Foyer Opery Bałtyckiej w Gdańsku w ramach 3. edycji Festiwalu Kultury Trójmiasta "Metropolia jest okey", który odbył się w dniach 26-30.12.2009. Katalog liczy 120 stron i zawiera tekst krytyczny w języku polskim i angielskim, noty biograficzne artystów w języku polskim i angielskim oraz 55 kolorowych reprodukcji prac artystów (prace autorów: J. Buczkowski s. 16-17, D. Krechowicz...
-
Neue erfahrungen mit der KEM
Publication..
-
Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart Cities
PublicationIn relation to smart city planning and management, processing huge amounts of generated data and execution of non-lightweight cryptographic algorithms on resource constraint devices at disposal, is the primary focus of researchers today. To enable secure exchange of data between cloud networks and mobile devices, in particular smart hand held devices, this paper presents Blockchain based approach that disperses a public/free key...
-
Polymeric membrane-modified voltammetric sensors for lipophilic analytes with nanomolar detection limit: Key parameters influencing the response characteristics
Publication -
The evaluation of COD fractionation and modeling as a key factor for appropriate optimization and monitoring of modern cost-effective activated sludge systems
PublicationA study was conducted to characterize the raw wastewater entering a modern cost effective municipal WWTP in Poland using two approaches; 1) a combination of modeling and carbonaceous oxygen demand (COD) fractionation using respirometric test coupled with model estimation (RTME) and 2) flocculation/filtration COD fractionation method combined with BOD measurements (FF-BOD). It was observed that the particulate fractions of COD obtained...
-
Quantum states representing perfectly secure bits are always distillable
PublicationW pracy pokazano, że ostatnio wprowadzone stany kwantowe reprezentujące perfekcyjnie bezpieczny bit klucza kryptograficznegooraz ich wielocząstkowe i wielowymiarowe uogólnienia zawsze reprezentują destylowalne splątanie. Podano ograniczenia dolne na wielkość destylowalnego splątania. Ponadto podano alternatywny dowód faktu, że koszt splątania jest ograniczeniem górnym na wielkość destylowalnego klucza kryptograficznego w dwucząstkowym...
-
Secure transmission of visual image in the VTS system using fingerprinting
Publication -
Experimental Extraction of Secure Correlations from a Noisy Private State
PublicationWe report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies...
-
A Concept of Using Knowledge Models to Secure Intellectual Capital in Enterprise
PublicationWithout a doubt, knowledge has become the most important resource for all companies in the world. Knowledge extended of our own observations and practice is being called experience. With the increase of knowledge and gained experience, the individual becomes more and more valuable employee in terms of business. The above mentioned knowledge can be gained only by self-improvement, which requires time and other necessary elements...
-
Technical Limitations in Merging Secular and Sacred Functions in Monumental Churches
PublicationThe abandonment of churches and their adaptation for secular purposes is a current subject in Europe and worldwide. Most cases involve objects that were desacralized and then rebuilt as a whole object for alternative functions. Thus far, the merging of secular and sacred functions in one monumental Catholic church has not raised any issues. The paper describes the case of St. Catherine’s Church in Gdansk, Poland, where sacred function...
-
XLS file with the key results from the experimental analysis of the imperfect dome's state of displacements
Open Research DataThis dataset consists of an XLS file with the key results from the experimental analysis of the imperfect dome's state of displacements.
-
Serce miasta jako muzeum sztuki narodowej
PublicationSerce miasta to przestrzeń obok bycia gdzieś, będąca kiedyś. Tak rozumiana specyfika serca miasta prowadzi do pytania o jego kompozycję rozgrywającą się w wymiarze czasowym. Rytmiczność i unikatowość składają się na kompozycję serca miasta rozumianą jako uporządkowana przestrzeń wydarzeń. Te cechy zbliżają myślenie o sercu miasta i rozumienie jego specyfiki do współczesnych teorii kształtowania muzeum sztuki. Współczesne muzeum...
-
Advanced field investigations of screw piles and columns
PublicationPrzedstawiono opis badań pali i kolumn wkręcanych na terenowym poletku doświadczalnym, wykonanych w ramach projektu badawczego MNiSW. Badania statyczne pali i kolumn wykonano z zaawansowanym systemem do pomiaru rozkładu siły wzdłuż trzonów. Przedstawiono podstawowe wyniki badań z rozdziałem obciążenia na podstawę i pobocznicę pali i kolumn.
-
Interplay between Structure and Charge as a Key to Allosteric Modulation of Human 20S Proteasome by the Basic Fragment of HIV-1 Tat Protein
Publication -
SiC-based phase-shift dual half bridge DC-DC converter as a key component of multilevel cascaded MV converters
PublicationThe paper describes SiC-based dual half bridge (DHB) DC-DC converter considered as a key component of high frequency isolated multilevel cascaded medium voltage converters. Two topologies of bi-directional DC-DC converters: the resonant half-bridge DC-DC converter and the phase-shift DHB converter are compared in the paper. Experimental results of SiC-based 50 kHz DHB DC-DC converter are presented in the paper.
-
The advanced monitoring as a key factor for appropriate optimization and control of full-scale activated sludge systems – case study Debogorze WWTP.
PublicationComputer simulation has become a helpful tool in wastewater treatment systems performance and effectiveness analysis. Advanced monitoring, by using appropriate software, enables to create a mathematical model of a real wastewater treatment plant (WWTP), run a simulation and subsequently interpret results under various conditions. An operation of WWTP is usually controlled by global parameters such as flow, solids retention time,...
-
IEEE Transactions on Dependable and Secure Computing
Journals -
Forgotten academic modernism in the reconstruction of downtown Le Havre by Auguste Perret
Publication -
Decision Regret after Laparoscopic Sleeve Gastrectomy—5 Years’ Perspective
Publication -
Distributed measurement system with data transmission secured using XXTEA algorithm
PublicationThe paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Photophysics of Soret-Excited Tin(IV) Porphyrins in Solution
PublicationThe photophysics of low-chlorin tin(IV) tetraphenylporphyrin dihydroxide, a core building block for axially substituted supramolecular tin porphyrin constructs, has been studied in a variety of hydrogen-bonding, nonpolar, and aprotic polar solvents using steady-state, nanosecond, and femtosecond time-resolved emission, and femtosecond time-resolved absorption methods. In hydrogen-bonding solvents the metalloporphyrin exists as...
-
FEM modelling of screw displacement pile interaction with subsoil
PublicationPredicting the-settlement characteristics of piles is an important element in the designing of pile foundations. The most reliable method in evaluating pile-soil interaction is the static load test, preferably performed with instrumentation for measuring shaft and pile base resistances. This, however, is a mostly post-implementation test. In the design phase, prediction methods are needed, in which numerical simulations play an...