Filtry
wszystkich: 30014
wybranych: 5932
-
Katalog
- Publikacje 5932 wyników po odfiltrowaniu
- Czasopisma 713 wyników po odfiltrowaniu
- Konferencje 173 wyników po odfiltrowaniu
- Wydawnictwa 3 wyników po odfiltrowaniu
- Osoby 242 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 24 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Kursy Online 165 wyników po odfiltrowaniu
- Wydarzenia 25 wyników po odfiltrowaniu
- Dane Badawcze 22735 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS.
-
Chemometric exploration of sea water chemical component data sets with missing elements
Publikacja -
Algorithms for spatial analysis and interpolation of discrete sets of Critical Infrastructure hazard data
PublikacjaNowo opracowane zaawansowane narzędzia technologii informacyjnych i komunikacyjnych (TIK) ujawniają swoją przydatność do przewidywania różnego rodzaju zagrożeń oraz minimalizowania związanego z nimi potencjalnego ryzyka. Jednakże większość tych narzędzi operuje jedynie na niektórych typach infrastruktury i zaniedbuje ich przestrzenne interakcje z otoczeniem oraz innymi strukturami. Niniejszy artykuł zawiera propozycje kilku algorytmów...
-
Application of the Msplitmethod for filtering airborne laser scanning data-sets to estimate digital terrain models
PublikacjaALS point cloud filtering involves the separation of observations representing the physical terrain surface from those representing terrain details. A digital terrain model (DTM) is created from a subset of points representing the ground surface. The accuracy of the generated DTM is influenced by several factors, including the survey method used, the accuracy of the source data, the applied DTM generation algorithm, and the survey...
-
EVALUATION OF THE ENERGY SECURITY AS A COMPONENT OF NATIONAL SECURITY OF THE COUNTRY
Publikacja -
Modeling of Human Tissue for Medical Purposes
PublikacjaThe paper describes the possibilities offered for medicine by modeling of human tissue using virtual and augmented reality. It also presents three proposals of breast modeling for the use in clinical practice. These proposals are the result of arrangements of medical and computer scientists team (the authors) and will be pursued and implemented in the near future. There is included also a brief description of the most popular methods...
-
Experimental Research of an Axial Piston Pump with Displaced Swash Plate Axis of Rotation
PublikacjaThe article describes the influence of displacement of the swash plate rotation axis on the efficiency of axial piston pumps. The dead space volume was defined as the volume of the working chamber in the extreme position of the piston at the end of the pumping phase and its variability was determined as a function of the position of the axis of rotation of the swash plate and the swing angle of swash plate. The influence of swash...
-
Measurement of idlers rotation speed in belt conveyors based on image data analysis for diagnostic purposes
Publikacja -
Convergence of expansions in Schrödinger and Dirac eigenfunctions, with an application to the R-matrix theory
PublikacjaW pracy zbadano właściwości rozwinięć w szeregi funkcji własnych dla zagadnień Schrödingera i Diraca. Potwierdzono obserwacje poczynione wcześniej przez Rosenthala oraz przez Szmytkowskiego i Hinze, że szereg funkcyjny występujący w teorii R-macierzy dla cząstek Diraca w ogólności nie zbiega do funkcji ciągłej.
-
Integrated spatial and energy planning – importance of a problem for contemporary architects and urban planners with focus on environmental factors
PublikacjaAlong with respecting basic sustainable development goals, planners will also be obliged to meet more stringent provisions related to energy efficiency in the coming years. In Poland, a crucial year will be 2021, when the EU directive on the energy efficiency of buildings comes into force. In this matter, not only the characteristics of individual objects are of great importance, but their whole complexes and the overall approach...
-
A Highly Sensitive Planar Microwave Sensor for Detecting Direction and Angle of Rotation
PublikacjaThis article presents a technique based on a modified complementary split-ring resonator (CSRR) to detect angular displacement and direction of rotation with high resolution and sensitivity over a wide dynamic range. The proposed microwave planar sensor takes advantage of the asymmetry of the sensor geometry and measures the angle of rotation in terms of the change in the relative phase of the reflection coefficients. The sensor...
-
Trees having many minimal dominating sets
PublikacjaWe provide an algorithm for listing all minimal dominating sets of a tree of order n in time O(1.4656^n). This leads to that every tree has at most 1.4656^n minimal dominating sets. We also give an infinite family of trees of odd and even order for which the number of minimal dominating sets exceeds 1.4167^n, thus exceeding 2^{n/2}. This establishes a lower bound on the running time of an algorithm for listing all minimal dominating...
-
Global defensive sets in graphs
PublikacjaIn the paper we study a new problem of finding a minimum global defensive set in a graph which is a generalization of the global alliance problem. For a given graph G and a subset S of a vertex set of G, we define for every subset X of S the predicate SEC ( X ) = true if and only if | N [ X ] ∩ S | ≥ | N [ X ] \ S | holds, where N [ X ] is a closed neighbourhood of X in graph G. A set S is a defensive alliance if and only if for...
-
Reconfiguring Minimum Dominating Sets in Trees
PublikacjaWe provide tight bounds on the diameter of γ-graphs, which are reconfiguration graphs of the minimum dominating sets of a graph G. In particular, we prove that for any tree T of order n ≥ 3, the diameter of its γ-graph is at most n/2 in the single vertex replacement adjacency model, whereas in the slide adjacency model, it is at most 2(n − 1)/3. Our proof is constructive, leading to a simple linear-time algorithm for determining...
-
On quantum cryptography with bipartite bound entangled states
PublikacjaOstatnio pokazano bezpośrednie zastosowanie splątania związanego w kryptografii kwantowej. W niniejszym artykule dokonano przeglądu niektórych najnowszych osiągnięć dotyczących tego zagadnienia. W szczególności przypomniano istotne pojęcia i definicje. Ponadto podano nową konstrukcję stanów o splątaniu związanym, posiadających bezpieczne korelacje, dostarczając w ten sposób niskowymiarowe (6x6) stany o splątaniu związanym z niezerowym...
-
A survey of medical researchers indicates poor awareness of research data management processes and a role for data librarians
Publikacja -
THE ROLE OF INFERENCE IN MOBILE MEDICAL APPLICATION DESIGN
PublikacjaIn the early 21st century, artificial intelligence began to be used to process medical information. However, before this happened, predictive models used in healthcare could only consider a limited number of variables, and only in properly structured and organised medical data. Today, advanced tools based on machine learning techniques - which, using artificial neural networks, can explore extremely complex relationships - and...
-
Innovative Web-Based Geographic Information System for Municipal Areas and Coastal Zone Security and Threat Monitoring Using EO Satellite Data
PublikacjaThe paper presents a novel design of a Web-based Safe City & Coastal Zone GIS (SCCZ-GIS). The system integrates data acquired from different remote sensing and geospatial data sources for the purpose monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilises several innovative technologies and solutions, and is capable of direct co-operation with different remote sensing data sources...
-
Application of Msplit method for filtering airborne laser scanning data sets to estimate digital terrain models
PublikacjaALS point cloud filtering involves the separation of observations representing the physical terrain surface from those representing terrain details. A digital terrain model (DTM) is created from a subset of points representing the ground surface. The accuracy of the generated DTM is influenced by several factors, including the survey method used, the accuracy of the source data, the applied DTM generation algorithm, and the survey...
-
Some Security Features of Selected IoT Platforms
PublikacjaIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
Influence of the position of the swash plate rotation axis on the volumetric efficiency of the axial pistons pumps
PublikacjaThe article describes the influence of the position of the swash plate axis of rotation on the size of the dead space and the volumetric efficiency of the axial pistons pump. Superposition of the two motions have been proposed - the rotation of the swash plate with respect to axis intersecting the axis of rotation of the pump shaft and the shifts of swash plate yielding a result of the rotation axis offset effect. In the article...
-
Ukraine’s Energy Security in Strategies
PublikacjaDuring the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublikacjaThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublikacjaML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
GPU-Accelerated Finite-Element Matrix Generation for Lossless, Lossy, and Tensor Media [EM Programmer's Notebook]
PublikacjaThis paper presents an optimization approach for limiting memory requirements and enhancing the performance of GPU-accelerated finite-element matrix generation applied in the implementation of the higher-order finite-element method (FEM). It emphasizes the details of the implementation of the matrix-generation algorithm for the simulation of electromagnetic wave propagation in lossless, lossy, and tensor media. Moreover, the impact...
-
Active Dynamic Thermography in Medical Diagnostics
PublikacjaThis is an overview of active thermal imaging methods in medical diagnostics using external thermal stimulation. In this chapter, several clinical cases diagnosed using the active dynamic thermography method, ADT, are presented. Features of this technology are discussed and main advantages underlined. Applications in skin burn diagnostics and quantitative evaluation leading to modern classification of burned patients for further...
-
Security Mechanisms in the Comcute System
PublikacjaThe aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.
-
ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS
PublikacjaThe article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Process layout planning and optimised product range selection in manufacture of wooden construction sets
PublikacjaThis paper introduces a systematic deterministic framework for planning and the analysis of facility layouts aimed at manufacturing a variety of parts, as components of specific end products. The essence of the proposed approach lies in the decomposition of a traditional job-shop into layout modules of generic material flow patterns, that inherently yields improved efficiency of the entire system. It entails the use of a relevant...
-
Electronic Noses in Medical Diagnostics
PublikacjaElectronic nose technology is being developed in order to identify aromas in a way parallel to the biologic olfaction. When applied to the field of medicine, such device should be able to identify and discriminate between different diseases. In recent years this kind of approach finds application in medical diagnostics, and especially in disease screening. Despite the fact that devices utilizing chemical sensor arrays are not routinely...
-
Dependable Integration of Medical Image Recognition Components
PublikacjaComputer driven medical image recognition may support medical doctors in the diagnosis process, but requires high dependability considering potential consequences of incorrect results. The paper presentsa system that improves dependability of medical image recognition by integration of results from redundant components. The components implement alternative recognition algorithms of diseases in thefield of gastrointestinal endoscopy....
-
Art and Healthcare - Healing Potential of Artistic Interventions in Medical Settings
PublikacjaThe stereotype of a machine for healing seems to be well rooted in common thinking and social perception of hospital buildings. The technological aspect of healthcare architecture has been influenced for several years by three major factors. The first is linked to the necessity of providing safety and security in the environment of elevated epidemiological risk. The second concerns the need for incorporating advanced technology...
-
Hardware cryptography coprocessor for system on chip soft processor
PublikacjaW artykule przedstawiono realizację sprzętową i programową szyfrującejo i deszyfrującego algorytmu AES.Obydwie implementacje zostały zralizowane z wykorzystaniem układu Virtex II i przetestowane. Jako kryterium porónawcze wybrano zużycie zasobów układu oraz wydajność. Realizacja sprzętowa wykonuje operację szyfrowania 2 dekady szybcie niż wersja programowa, ale wymaga pięciokrotnie więcej zasobówIn this paper hardware and software...
-
Extendable Safety and Security Ontology
PublikacjaSecurity plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...
-
Areas of research in maritime security
PublikacjaW referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.
-
Application of Intuitionistic Fuzzy Sets to the assessment of technical university students
PublikacjaThe article proposes application of artificial intelligence methods to assess students of technical universities. The level of achieved educational goals can be assessed using measurements based on the idea of Fuzzy Intuitionistic Sets (IFS). A classification algorithm was developed and an exemplary distribution of the criteria values using IFS was presented. The application of the proposed approach in online education can enrich...
-
An integrated framework for security protocol analysis
PublikacjaAssurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...
-
Security and Anonymity in Agent Systems
PublikacjaMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Improving medical experts’ efficiency of misinformation detection: an exploratory study
PublikacjaFighting medical disinformation in the era of the pandemic is an increasingly important problem. Today, automatic systems for assessing the credibility of medical information do not offer sufficient precision, so human supervision and the involvement of medical expert annotators are required. Our work aims to optimize the utilization of medical experts’ time. We also equip them with tools for semi-automatic initial verification...
-
Mobile Security: Threats and Best Practices
PublikacjaCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
An Approach to Data Reduction for Learning from Big Datasets: Integrating Stacking, Rotation, and Agent Population Learning Techniques
Publikacja -
A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles
PublikacjaIn this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...
-
A Microwave Sensor with Operating Band Selection to Detect Rotation and Proximity in the Rapid Prototyping Industry
PublikacjaThis paper presents a novel sensor for detecting and measuring angular rotation and proximity, intended for rapid prototyping machines. The sensor is based on a complementary split-ring resonator (CSRR) driven by a conductor-backed coplanar waveguide. The sensor has a planar topology, which makes it simple and cost-effective to produce and accurate in measuring both physical quantities. The sensor has two components, a rotor, and...
-
Dynamika molekularna oddziaływań przeciwgrzybowych heptaenów aromatycznych i ich izomerów all-trans ze sterolami w błonach lipidowych
PublikacjaAromatyczne heptaeny (AH) należą do grupy makrolidów polienowych o działaniu przeciwgrzybowym. Antybiotyki z tej grupy były pierwszymi, które zostały wykorzystane w terapii układowych infekcji grzybiczych. Amfoterycyna B (AmB) oraz nystatyna, czyli niearomatyczni przedstawiciele makrolidów heptaenowych, mają istotne znaczenie kliniczne w leczeniu, odpowiednio, grzybic wewnętrznych i zewnętrznych. Molekularne podstawy mechanizmu...
-
An Algorithm for Listing All Minimal 2-Dominating Sets of a Tree
PublikacjaWe provide an algorithm for listing all minimal 2-dominating sets of a tree of order n in time O(1.3248n) . This implies that every tree has at most 1.3248 n minimal 2-dominating sets. We also show that this bound is tigh.
-
Security aspects in functional safety analysis
PublikacjaA security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...
-
An algorithm for listing all minimal double dominating sets of a tree
PublikacjaWe provide an algorithm for listing all minimal double dominating sets of a tree of order $n$ in time $\mathcal{O}(1.3248^n)$. This implies that every tree has at most $1.3248^n$ minimal double dominating sets. We also show that this bound is tight.
-
Resilience and Security in Software Defined Networking
PublikacjaThis paper gives an overview of the most important issues on resilience and security in Software Defined Networking
-
Evolutionary Sets of Safe Ship Trajectories: Evaluation of Individuals
PublikacjaThe paper presents a description of the evaluation phase of the Evolutionary Sets of Safe Ship Trajectories method. In general, the Evolutionary Sets of Safe Ship Trajectories method combines some of the assumptions of game theory with evolutionary programming and finds an optimal set of cooperating trajectories of all ships involved in an encounter situation. While developing a new version of this method, the authors decided to...
-
Evolutionary Sets of Safe Ship Trajectories: Evaluation of Individuals
PublikacjaThe paper presents a description of the evaluation phase of the Evolutionary Sets of Safe Ship Trajectories method. In general, the Evolutionary Sets of Safe Ship Trajectories method combines some of the assumptions of game theory with evolutionary programming and finds an optimal set of cooperating trajectories of all ships involved in an encounter situation. While developing a new version of this method, the au-thors decided...