Search results for: vrrp protocol
-
Highly stable CsFAPbIBr perovskite solar cells with dominant bulk recombination at real operating temperatures
PublicationMixed-cation mixed-halide perovskite solar cells have been characterized in DC at different temperatures (from −20 °C up to 50 °C) and the time evolution of the device efficiency has been assessed using different degradation protocols (indoors and outdoors). The completely planar p–i–n structure is ITO/CuNiOx/PTAA/CsFAPbIBr/PCBM/PEI/Ag. Pristine current–voltage characteristics barely show hysteresis, at any temperature. Open circuit...
-
Towards the participant observation of emotions in software development teams
PublicationEmotions, moods and temperament influence our behaviour in every aspect of life. Until now plenty of research has been conducted and many theories have been proposed to explain the role of emotions within the working environment. However, in the field of software engineering, interest in the role of human factors in the process of software development is relatively new. In the paper the research design process that has been proposed...
-
Simple colorimetric copper(II) sensor – spectral characterization and possible applications
PublicationNew o-hydroxyazocompound L bearing pyrrole residue was obtained in the simple synthetic protocol. The structure of L was confirmed and analyzed by X-ray diffraction. It was found that new chemosensor can be successfully used as copper(II) selective spectrophotometric regent in solution and can be also applied for the preparation of sensing materials generating selective color signal upon interaction with copper(II). Selective colorimetric...
-
Wykorzystanie serwerów UDDI dla systemów zdalnej edukacji.
PublicationW artykule przedstawiono możliwości wykorzystania usług sieciowych opartych na serwerach UDDI (Universal Description, Discovery and Integration) do przechowywania obiektów edukacyjnych. Opisane rozwiązanie wykorzystujące język XML, protokół SOAP (Simple Object Access Protocol) i standard WSDL (Web Services Description Language) pozwala na tworzenie baz wiedzy przeznaczonych zarówno dla uczniów jak również dla nauczycieli....
-
Bogdan Wiszniewski prof. dr hab. inż.
PeopleBogdan Wiszniewski graduated from Gdansk University of Technology in 1977 and was awarded an MSc in computer science and engineering with honours. In 1984 and 1998, respectively, has got his PhD and DSc. In 2006 was awarded a Professor title by the President of Poland. Lectured at the universities in Canada, US and UK. Principal investigator or coordinator in many national and international R&D projects with the significant...
-
Solubility advantage of sulfanilamide and sulfacetamide in natural deep eutectic systems: experimental and theoretical investigations
PublicationObjective: The aim of this study was to explore the possibility of using natural deep eutectic solvents (NADES) as solvation media for enhancement of solubility of sulfonamides, as well as gaining some thermodynamic characteristics of the analyzed systems. Significance: Low solubility of many active pharmaceutical ingredients is a well-recognized difficulty in pharmaceutical industry, hence the need for different strategies addressing...
-
Mobility management solutions for current IP and future networks
PublicationEnormous progress in the design of portable electronic devices allowed them to reach a utility level comparable to desktop computers, while still retaining their mobility advantage. At the same time new multimedia services and applications are available for IP users. Unfortunately, the performance of base IP protocol is not satisfactory in mobile environments, due to lack of handover support and higher layer mobility management...
-
Geotechnical Aspects of Dike Construction Using Soil-Ash Composites
PublicationAn analysis of using of anthropogenic materials, mainly ashes from Coal Combustion Products (CCP), for dike construction is shown. Perspectives of anthropogenic materials application in geotechnical engineering and their advantages in sense of the carbon dioxide reduction are discussed. According to regulations of Kioto Protocol 2005 and EU agreement “Energy Roadmap 2050” recycled materials have higher usage priority than natural...
-
SIMULATION MODEL OF ASON/GMPLS ARCHITECTURE
PublicationGrowing demands of information society concerned with sophisticated applications could be satisfied by ASON/GMPLS architecture comprehended as Automatically Switched Optical Network (ASON) with Generalized Multi-Protocol Label Switching (GMPLS). The ASON/GMPLS proposition represents the future direction of Next Generation Network (NGN) architecture. Therefore considerable work has to be done to examine this solution. In this aspect...
-
Unconditional privacy over channels which cannot convey quantum information
PublicationQuantum cryptography enables one to verify that the state of the quantum system has not been tampered with and thus one can obtain privacy regardless of the power of the eavesdropper. All previous protocols relied on the ability to faithfully send quantum states or equivalently to share pure entanglement. Here we show this need not be the case-one can obtain verifiable privacy even through some channels which cannot be used to...
-
Mechanizmy komunikacji w rozproszonych systemach specjalnego przeznaczenia
PublicationZadania ochrony i bezpieczeństwa granic państwa realizowane przez Straż Graniczną wymagają wsparcia ze strony nowoczesnych systemów Technologii Informacyjnych (TI) uwarunkowanych ich specjalnym przeznaczeniem. Z uwagi na charakter tej służby, rozwiązania dla jej potrzeb muszą być realizowane jako systemy rozproszone umożliwiające przenoszenie i przetwarzanie informacji głosowych oraz różnorodnych danych, w tym specjalnego przeznaczenia....
-
Organochlorine pesticides and polichlorinated biphenyls concentrations in fresh snowfall or top layer of snow from Hornsund region, Svalbard, in the spring 2019
Open Research DataThe dataset contains concentration of organochlorine persistent organic pollutants in snow samples collected from top layer of snow, which corresponded to fresh snowfall in most cases (except DS location, where these are 20 cm top layer sampled weekly). All snow samples have been collected within one month during spring 2019, in the vicinity of the...
-
Eye-Gaze Tracking-Based Telepresence System for Videoconferencing
PublicationAn approach to the teleimmersive videoconferencing system enhanced by the pan-tilt-zoom (PTZ) camera, controlled by the eye-gaze tracking system, is presented in this paper. An overview of the existing telepresence systems, especially dedicated to videoconferencing is included. The presented approach is based on the CyberEye eye-gaze tracking system engineered at the Multimedia Systems Department (MSD) of Gdańsk University of Technology...
-
Bezpieczeństwo w IP Multimedia Subsystem
PublicationAbstrakt Artykuł jest trzecim w cyklu prac poświęconych IP Multimedia Subsystem (IMS) - po przedstawieniu architektury i usług IMS, odpowiednio w zeszytach 12/2009 oraz 2-3/2011 Przeglądu Telekomunikacyjnego i Wiadomości Telekomunikacyjnych. W obecnym artykule przedstawiono sposoby zapewnienia bezpieczeństwa przy realizacji tych usług.Artykuł został podzielony został na trzy części w których omówiono ogólne wyzwania bezpieczeństwa...
-
Determination of Sodium Ion Diffusion Coefficient in Tin Sulfide@Carbon Anode Material Using GITT and EIS Techniques
PublicationThe electroanalytical behavior of SnSx (x = 1, 2) encapsulated into a carbon phase was studied using the galvanostatic intermittent titration technique (GITT) and electrochemical impedance spectroscopy (EIS). These techniques are widely utilized in battery systems to investigate the diffusion of alkali metal cations in anode and cathode materials depending on the concentration of ions in the host material. Here, we report different...
-
Routing decisions independent of queuing delays in broadband leo networks
PublicationThis paper presents an analysis of queuing and propagation delays of Inter-Satellite Links (ISLs) in broadband Low-Earth Orbit (LEO) satellite networks. It is shown that queuing delays are negligible in all reasonable working conditions of the broadband ISL network. This fact makes it possible to simplify the routing protocols in such networks and permits using already known multi-commodity flow solutions for routing. The performance...
-
Multipartite secret key distillation and bound entanglement
PublicationRecently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable...
-
Remote Monitoring System for Impedance Spectroscopy using Wireless Sensor Network
PublicationThe architecture of a miniaturized impedanceanalyser with wireless communication module for remoteImpedance Spectroscopy (IS) of anticorrosion coatings ondifficult-to-reach objects (e.g. on the steel construction ofthe bridge) is described in this paper. Some practical aspectsof implementation of a Wireless Sensor Network (WSN) arealso discussed. A low scale, middle range, WSN networkcomposed of a Base Station (BS) with a Personal...
-
Nanomaterials for photothermal and photodynamic cancer therapy
PublicationIn recent years, the role of optically sensitive nanomaterials has become powerful moieties in therapeutic techniques and has become particularly emphasized. Currently, by the extraordinary development of nanomaterials in different fields of medicine, they have found new applications. Phototherapy modalities, such as photothermal therapy (PTT) by toxic heat generation and photodynamic therapy (PDT) by reactive oxygen species, are...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublicationIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Micellar Route of the Synthesis of Alkyl Xylosides: An Unexpected Effect of Amphiphilic Imidazolium Ionic Liquids
PublicationThis manuscript presents results from the investigation on the synthesis of alkyl xylosides by the novel, very efficient and promising protocol of the Fischer synthesis from unprotected xylose and aliphatic alcohol. The use of 1-alkyl-3-methylimidazolium hydrogen sulfate ionic liquids as the catalysts with dual functionality (surfactant + acid catalyst) and micellar reaction system are the main novelty of described method. It has...
-
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
PublicationAbstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublicationIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
Systemy Sygnalizacji i Protokoły - edycja 2022
e-Learning CoursesKurs pomocniczy dla przedmiotu Systemy Sygnalizacji i Protokoły realizowanego dla studentów I stopnia Wydziału EiT na profilu Sieci Teleinformacyjne.
-
Protokoły wymiany danych w systemach 2022
e-Learning CoursesI stopień IBio
-
Protokoły wymiany danych w systemach 2019
e-Learning CoursesRodzaj Studiów: stacjonarne, inżynierskie Kierunek Studiów: Inżynieria Biomedyczna Specjalność: Informatyka w Medycynie Semestr: 6
-
CYFROWE PROTOKOŁY WYMIANY INFORMACJI [2022/23]
e-Learning Courses -
Systemy Sygnalizacji i Protokoły - edycja 2021
e-Learning CoursesKurs pomocniczy dla przedmiotu Systemy Sygnalizacji i Protokoły realizowanego dla studentów I stopnia Wydziału EiT na profilu Sieci Teleinformacyjne.
-
CYFROWE PROTOKOŁY WYMIANY INFORMACJI [2021/22]
e-Learning Courses -
Protokoły wymiany danych w systemach 2020
e-Learning CoursesI stopień IBio
-
CYFROWE PROTOKOŁY WYMIANY INFORMACJI [2023/24]
e-Learning Courses -
CYFROWE PROTOKOŁY WYMIANY INFORMACJI [2020/21]
e-Learning Courses -
Protokoły wymiany danych w systemach 2023
e-Learning CoursesI stopień IBio
-
Zapewnianie progowego poziomu obecności w sieci sensorowej obsługującej aplikacje typu smart grid
PublicationRozważono bezprzewodową sieć sensorową z pewną liczbą węzłów oraz pojedynczym ujściem, pełniącym także funkcje zarządcze Założono, że sieć sensorowa, w celu wykonywania powierzonego jej zadania, musi utrzymywać określoną liczbę węzłów w stanie włączonym w każdym momencie życia sieci. Jest to zadanie trywialne, gdy węzły mogą być wyłączane tylko po otrzymaniu odpowiedniej komendy od zaufanego nadzorcy. Jednakże przy założeniu podatności...
-
Sprzętowa implementacja koprocesora dla zastosowań kryptograficznych
PublicationW pracy przedstawiono procedurę implementacji elektronicznej skrzynki podawczej z wykorzystaniem zasobów sprzętowych na płytce FPGA (Filed Programmable Gate Array) typu Virtex 4. Przedstawiono ogólna zasadę działania skrzynki podawczej oraz opisano parametry i właściwości poszczególnych modułów funkcjonalnych systemu tj.: modułu TFTP Trivia File Transfer Protocol), serwera WWW, funkcji skrótu oraz asymetrycznego algorytm kryptograficznego....
-
Transmission parameters of underwater communication channels
PublicationThe underwater environment is tough and demanding as a communication channel for ultrasonic signals. The channel transmission characteristics in marine and inland waters depend much on local bathymetry and changing weather conditions. The architecture and performance of a reliable underwater acoustic communication (UAC) system should allow real-time adaptation of its transmission parameters to a large variety of possible channel...
-
Trends in the new generation of green solvents in extraction processes
PublicationAnalytical chemistry, like other scientific fields, has undergone a number of changes to make it more consistent with the concept of sustainable development. Among the various steps of chemical analysis, without a doubt, sample preparation is the bottleneck in regard to following a green protocol, especially in terms of solvent consumption. Therefore, many attempts have been made to improve the environmental friendliness of this...
-
In Situ Random Microseeding and Streak Seeding Used for Growth of Crystals of Cold-Adapted beta-D-Galactosidases: Crystal Structure of betaDG from Arthrobacter sp. 32cB
PublicationThere is an increasing demand for cold-adapted enzymes in a wide range of industrial branches. Nevertheless, structural information about them is still scarce. The knowledge of crystal structures is important to understand their mode of action and to design genetically engineered enzymes with enhanced activity. The most difficult task and the limiting step in structural studies of cold-adapted enzymes is their crystallization,...
-
Free randomness amplification using bipartite chain correlations
PublicationA direct analysis of the task of randomness amplification from Santha-Vazirani sources using the violation of the chained Bell inequality is performed in terms of the convex combination of no-signaling boxes required to simulate quantum violation of the inequality. This analysis is used to find the exact threshold value of the initial randomness parameter from which perfect randomness can be extracted in the asymptotic limit of...
-
Zagrożenia realizacji usług multimedialnych w systemach z sygnalizacją SIP
PublicationW pracy dokonano klasyfikacji powszechnych zagrożeń bezpieczeństwa w protokole SIP (RFC 3261). Opisano ataki wynikające ze słabości sieci IP jako głównego środowiska dla protokołu SIP oraz ataki wynikające ze sposobu działania protokołu SIP. Zidentyfikowano możliwość ich przeprowadzenia na produkcyjnych platformach SIP.
-
Direct chromatographic methods in the context of green analytical chemistry
PublicationWe review analytical protocols based on gas and liquid chromatography (GC and LC), but involving no sample preparation.Green analytical chemistry seeks to minimize negative impacts of analytical chemistry. Direct analytical methods ideally fulfillthis requirement, as they preclude sample preparation - the most polluting step of the analytical procedure.We describe examples of GC methodologies for environmental and food analysis...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublicationWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Semantic Integration of Heterogeneous Recognition Systems
PublicationComputer perception of real-life situations is performed using a variety of recognition techniques, including video-based computer vision, biometric systems, RFID devices and others. The proliferation of recognition modules enables development of complex systems by integration of existing components, analogously to the Service Oriented Architecture technology. In the paper, we propose a method that enables integration of information...
-
Grafting and reactive extrusion technologies for compatibilization of ground tyre rubber composites: Compounding, properties, and applications
PublicationChemical modification of ground tyre rubber (GTR) to compatibilize it with the matrix is a well-known approach. Based on our recent review of the surface etching methods used in GTR modification, the purpose of the current work is to take a deeper look into more advanced methods such as grafting and reactive extrusion. While grafting is more efficient in achieving compatibility, however, it usually involves multi-step synthesis...
-
Miniaturized solid phase extraction techniques for different kind of pollutants analysis: State of the art and future perspectives – PART 2
PublicationDetermination of pollutants present in environmental samples at a low concentration level very often requires the analytical protocol that includes analytes isolation and/or enrichment prior to the final quantification. Miniaturized SPE offers an interesting alternative to LLE. Nowadays, many types of sorbents are available and can be used as selective materials for extraction of varied analytes in different kinds of samples. The...
-
On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks
PublicationHandover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...
-
A method for a comprehensive lipidomic analysis of flaxseed (Linum usitatissimum) with the use of LC–Q-TOF-MS and dispersive micro-solid-phase (μDSPE) extraction
PublicationFlaxseed (FS) is one of the richest sources of α-linolenic acid oil and lignans, and it is suggested that the consumption of flaxseed may contribute to the prevention of certain chronic diseases such as many types of cancer, diabetes, cardiovascular diseases and cerebrovascular stroke. Here, we demonstrate a new method for comprehensive FS lipidome profiling with the use of LC–Q-TOF-MS and dispersive micro-solid-phase extraction....
-
Revsable framework for telecontrol protocols. W: Springer Homepage [online] Proceedings. Second International ESPRIT ARES Workshop on Development and Evolution of Software Architectures for Product Families. Las Palmas de Gran Canaria, Spain, February 26-27, 1998. [Dostęp: 20 grudnia**2002]. Ed. F. van der Linden. Dostępny w World Wide Web: http://link.springer.de/link/ /service/series/0558/tocs/t1429.htm [s. 6-13, 5 rys. bibliogr. 6 poz.] Wzorce wielokrotnego wykorzystania oprogramowania protokołów telesterowa- nia.
PublicationZaprezentowano wzorzec COMSOFT wielokrotnego wykorzystania oprogramowania o-pracowany dla protokołów telesterowania. Jego podstawy tworzą: metodologiaobiektowa i wzorce wielokrotnego użycia. Zastosowanie wzorców wspomagają:biblioteka komponentów, wykorzystywanych we wszystkich fazach konstrukcji o-programowania oraz procedury użytkowania i parametryzacji. Opracowane wzorcezostały praktycznie zastosowane do konstrukcji oprogramowania...
-
CYFROWE PROTOKOŁY WYMIANY INFORMACJI [Niestacjonarne][2020/21]
e-Learning Courses -
CYFROWE PROTOKOŁY WYMIANY INFORMACJI [Niestacjonarne][2021/22]
e-Learning Courses