Search results for: CRYPTOGRAPHY PROTOCOLS
-
Policy Evaluation Network (PEN): Protocol for systematic literature reviews examining the evidence for impact of policies on physical activity across seven different policy domains
Publication -
International Conference on Network Protocols
Conferences -
International Workshop on Security Protocols
Conferences -
Protokoły łączności do transmisji strumieni multimedialnych na platformie KASKADA
PublicationPlatforma KASKADA rozumiana jako system przetwarzania strumieni multimedialnych dostarcza szeregu usług wspomagających zapewnienie bezpieczeństwa publicznego oraz ocenę badań medycznych. Wydajność platformy KASKADA w znaczącym stopniu uzależniona jest od efektywności metod komunikacji, w tym wymiany danych multimedialnych, które stanowią podstawę przetwarzania. Celem prowadzonych prac było zaprojektowanie podsystemu komunikacji...
-
Model of control plane of ASON/GMPLS network
PublicationASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols. This solution, an ASON control plane built on GMPLS protocols is named ASON/GMPLS. In the paper, we decompose the control plane problem and show the main concepts of ASON network. We propose a hierarchical architecture...
-
Optimization of a Fabric Phase Sorptive Extraction protocol for the isolation of six bisphenols from juice pouches to be analysed by high performance liquid chromatography coupled with diode array detector
PublicationFabric Phase Sorptive Extraction (FPSE) combined with high pressure liquid chromatography using to diode array detection (HPLC-DAD) was applied for the simultaneous determination of bisphenols (BPA, BPB, BPC, BPE, BPF, BPS) in juice pouches. The FPSE procedure was optimized with regards to the critical parameters that affect the performance of the method including the selection of the FPSE membrane type and size, adsorption time,...
-
Analiza wpływu transmisji danych na jakość działania rozproszonych systemów sterowania
PublicationW artykule przedstawiono zagadnienia związane z transmisją danych w rozproszonych systemach sterowania. Opisano cechy charakterystyczne przemysłowych sieci i protokołów informatycznych. Utworzono model rozproszonego systemu sterowania poziomem cieczy w zbiorniku, w którym komunikacja oparta została na protokole Modbus RTU. Na podstawie zmian parametrów transmisji danych wykazano, że poprawna komunikacja pomiędzy elementami systemu...
-
Fabrication of toughened plastic using styrene butadiene rubber-poly (methyl methacrylate) interpenetrating polymer networks
PublicationA standard set of interpenetrating polymeric networks (IPNs) has been contrived using an elastomerstyrene butadiene rubber and a thermoplastic poly (methyl methacrylate) through sequential polymerization protocol. This low-cost material can be hopefully engaged as a toughened plastic with cocontinuous morphology. Different morphological protocols including Raman imaging are effectively utilized to envisage the effect of blend ratio...
-
High efficacy and safety of VTD as an induction protocol in patients with newly diagnosed multiple myeloma eligible for high dose therapy and autologous stem cell transplantation: A report of the Polish Myeloma Study Group
Publication -
Performance Evaluation of Control Plane Functions in ASON/GMPLS Architecture
PublicationIt is assumed that demands of information society could be satisfied by architecture ASON/GMPLS comprehended as Automatically Switched Optical Network (ASON) with Generalized Multi-Protocol Label Switching (GMPLS) protocols. Introduction this solution must be preceded performance evaluation to guarantee society expectations. Practical realization is expensive and simulations models are necessary to examine standardized propositions....
-
Comparison of GC–MS and MEKC methods for caffeine determination in preworkout supplements
PublicationIn this study, GC–MS- and MEKC-based methods for determination of caffeine (CAF) in preworkout supplements were developed and validated. The proposed protocols utilized minimal sample preparation (simple dilution and syringe filtration). The developed methods achieved satisfactory validation parameters, i.e. good linearity (R2 0.9988 and R2 0.9985 for GC–MS- and MEKC-based method, respectively), satisfactory intraand interaccuracy...
-
No Quantum Realization of Extremal No-Signaling Boxes
PublicationThe study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand,...
-
Theory of Cryptography Conference
Conferences -
Formal and Computational Cryptography
Conferences -
Selected Areas in Cryptography
Conferences -
Krzysztof Nowicki dr inż.
People -
A Novel Method for the Combined Photocatalytic Activity Determination and Bandgap Estimation
Publication -
INFOGEST static in vitro simulation of gastrointestinal food digestion
PublicationDeveloping a mechanistic understanding of the impact of food structure and composition on human health has increasingly involved simulating digestion in the upper gastrointestinal tract. These simulations have used a wide range of different conditions that often have very little physiological relevance, and this impedes the meaningful comparison of results. The standardized protocol presented here is based on an international consensus...
-
Call and Connections Times in ASON/GMPLS Architecture
PublicationIt is assumed that demands of information soci- ety could be satisfied by architecture ASON/GMPLS comprehended as Automatically Switched Optical Network (ASON) with Generalized Multi-Protocol Label Switching (GMPLS) protocols. Introduction this solution must be preceded by performance evaluation to guarantee society expectations. Call and connections times are in ASON/GMPLS architecture important for real-time applications. Practical...
-
Estudios Institucionales. Revista internacional de investigación en Instituciones, Ceremonial y Protocolo.
Journals -
Collision‐Aware Routing Using Multi‐Objective Seagull Optimization Algorithm for WSN‐Based IoT
PublicationIn recent trends, wireless sensor networks (WSNs) have become popular because of their cost, simple structure, reliability, and developments in the communication field. The Internet of Things (IoT) refers to the interconnection of everyday objects and sharing of information through the Internet. Congestion in networks leads to transmission delays and packet loss and causes wastage of time and energy on recovery. The routing protocols...
-
Workshop on Localized Algorithms and Protocols for Wireless Sensor Networks
Conferences -
General paradigm for distilling classical key from quantum states
PublicationIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
Cryptography Policy and Algorithms Conference
Conferences -
Conference on Security and Cryptography for Networks
Conferences -
International Workshop on Coding and Cryptography
Conferences -
Workshop on Elliptic Curve Cryptography
Conferences -
ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Conferences -
Call Control Evaluation in ASON/GMPLS Architecture
PublicationThe Automatically Switched Optical Network (ASON) utilizing Generalized Multi–Protocol Label Switching (GMPLS) protocols named as ASON/GMPLS is one of the propositions of Next Generation Network. The basic assumption of ASON control plane is a separation of call control from connection control. The control plane is divided into call control and connection control components. Presented work regards the problem of call control evaluation...
-
Exploring multi-step glucose oxidation kinetics at GOx-functionalized nanotextured gold surfaces with differential impedimetric technique
PublicationFor a few past years, we can observe the enormous growth of investigations related to ultrasensitive electrochemical sensors capable of reliable determination of important body parameters and analytes. Utilized procedures rely on standard electrochemical methods, demanding electrode polarization, and information about the initial characteristics of the working electrode. More and more complex electrode materials are characterized...
-
Isolation and 3-dimensional Culture of Primary Murine Intestinal Epithelial Cells
Publication -
Induction of Epithelial-mesenchymal Transition in MDCK II Cells
Publication -
Quantum entanglement
PublicationAll our former experience with application of quantum theory seems to say that what is predicted by quantum formalism must occur in the laboratory. But the essence of quantum formalism-entanglement, recognized by Einstein, Podolsky, Rosen, and Schrödinger-waited over 70 years to enter laboratories as a new resource as real as energy. This holistic property of compound quantum systems, which involves nonclassical correlations between...
-
International Conference on Pairing-based Cryptography
Conferences -
IMA International Conference on Cryptography and Coding
Conferences -
The Claude Shannon Workshop on Coding and Cryptography
Conferences -
Workshop on Fault Diagnosis and Tolerance in Cryptography
Conferences -
Financial Cryptography and Data Security Conference
Conferences -
International Conference on Information Security and Cryptography
Conferences -
Workshop on Cryptography for Ad hoc Networks
Conferences -
International Workshop on Post-Quantum Cryptography
Conferences -
Towards hardware built-in support for computer system safety
PublicationArtykuł omawia dostępne technologie wirtualizacji zasobów pamięci i systemów I/O w systemach komputerowych takie jak Execute Disable Bit (EDB) capability i Virtual Machine Architecture (VMA). Nastepnie wprowadza założenia na rozszerzenie tych technologii w celu uzyskania funkcjonalności Safe Call Execution dzieki technologii Execution Disabling Policies (EDP). Wprowadzono również założenia na funkcjonalność Memory Virtualization...
-
The effect of anthraquinone derivatives on telomerase activity
Open Research DataThe data set contains images of the PCR products obtained from the Telomerase Repeated Amplification Protocol (TRAP). The effect of anthraquinone derivatives (TXT1-TXT9) on telomerase activity was comparatively examined using the following reference compounds: BIBR1532, TMPyP4 and mitoxantrone (MTX).
-
Operating system security by integrity checking and recovery using write-protected storage
PublicationThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
The effect of anthraquinone derivatives (C1-C9) on telomerase activity
Open Research DataThe data set contains images of the PCR products obtained from the Telomerase Repeated Amplification Protocol (TRAP). The effect of anthraquinone derivatives (C-C9) on telomerase activity was analyzed using lysates from drug-treatedcancer cell line.
-
Kamil Andrzej Rybacki mgr inż.
PeopleBorn on 23 October 1993 in Gdańsk. In 2017, I have received the M.Sc. Degree at the Faculty of Applied Physics and Mathematics, Gdańsk University of Technology, Poland. My main fields of interest include computer simulations of molecular systems, parallel computing in application to computational physics methods and development of various simulation software. Currently, my research is focused on the development of hybrid Molecular...
-
International Workshop on Boolean Functions: Cryptography and Applications
Conferences -
International Conference on Applied Cryptography and Network Security
Conferences -
Computer Networks-laboratories - 2023
e-Learning CoursesAcquiring the skills to design, build and configure computer networks. Demonstration of skills to identify and analyze selected protocols and mechanisms of LAN and WAN networks.
-
Computer Networks laboratories 2024
e-Learning CoursesAcquiring the skills to design, build and configure computer networks. Demonstration of skills to identify and analyze selected protocols and mechanisms of LAN and WAN networks.