Wyniki wyszukiwania dla: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS. - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS.

Filtry

wszystkich: 30014
wybranych: 5932

wyczyść wszystkie filtry


Filtry wybranego katalogu

  • Kategoria

  • Rok

  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Wyniki wyszukiwania dla: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS.

  • A general isogeometric finite element formulation for rotation‐free shells with in‐plane bending of embedded fibers

    Publikacja

    This article presents a general, nonlinear isogeometric finite element formulation for rotation-free shells with embedded fibers that captures anisotropy in stretching, shearing, twisting, and bending - both in-plane and out-of-plane. These capabilities allow for the simulation of large sheets of heterogeneous and fibrous materials either with or without matrix, such as textiles, composites, and pantographic structures. The work...

    Pełny tekst do pobrania w portalu

  • Energy Security of Polish Consumers in 2004-2021

    Theoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...

    Pełny tekst do pobrania w portalu

  • Client-side versus server-side geographic data processing performance comparison: Data and code

    Publikacja

    - Data in Brief - Rok 2019

    The data and code presented in this article are related to the research article entitled “Analysis of Server-side and Client-side Web-GIS data processing methods on the example of JTS and JSTS using open data from OSM and Geoportal” (Kulawiak et al., 2019). The provided 12 datasets include multi-point and multi-polygon data of different scales and volumes, representing real-world geographic features. The datasets cover the area...

    Pełny tekst do pobrania w portalu

  • The Sense of Security of the Prison Service Offi cers

    Publikacja

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Integrated functional safety and cyber security analysis

    Publikacja

    - IFAC-PapersOnLine - Rok 2018

    The chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...

  • Software Agents for Computer Network Security

    Publikacja

    - Rok 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Generalized Dold sequences on partially-ordered sets

    Publikacja

    - ELECTRONIC JOURNAL OF COMBINATORICS - Rok 2022

    Dold sequences constitute an important class of integer sequences that play an important role in combinatorics, number theory, topology and dynamical systems. We generalize the notion of Dold sequence for the case of partially ordered sets and describe their properties. In particular we give two alternative descriptions of generalized Dold sequences: by some class of elementary sequences as well as by different...

    Pełny tekst do pobrania w portalu

  • Multichannel self-optimizing active noise control scheme

    Publikacja

    The problem of cancellation of a nonstationary sinusoidal interference, acting at the output of an unknown multivariable linear stable plant, is considered. The proposed cancellation scheme is a nontrivial extension of the SONIC (self-optimizing narrowband interference canceller) algorithm, developed earlier for single-input, single-output plants. In the important benchmark case - for disturbances with randomwalk-type amplitude...

  • Standards on Cyber Security Assessment of Smart Grid

    Security evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...

    Pełny tekst do pobrania w portalu

  • The design of an intelligent medical space supporting automated patient interviewing

    Publikacja

    The article presents the architecture and results of implementing an application for the intelligent medical space UbiDoDo (Ubiquitous Domestic Doctor's Office). The main purpose of the application is real-time monitoring of the biomedical parameters of a patient in his domestic environment. It allows an immediate reaction to appearing symptoms and provides means to automatically interview the patient and deliver his results to...

  • Security ontology construction and integration

    Publikacja

    - Rok 2011

    There are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presentsgathered requirements needed to be taken into account when creating an ontology. The method of ontology creation...

  • Analysis of Vibration and Acoustic Signals for Noncontact Measurement of Engine Rotation Speed

    Publikacja
    • S. Xuansheng
    • T. Lu
    • H. Wen
    • R. Martinek
    • J. Smulko

    - SENSORS - Rok 2020

    The non-contact measurement of engine speed can be realized by analyzing engine vibration frequency. However, the vibration signal is distorted by harmonics and noise in the measurement. This paper presents a novel method for the measurement of engine rotation speed by using the cross-correlation of vibration and acoustic signals. This method can enhance the same frequency components in engine vibration and acoustic signal. After...

    Pełny tekst do pobrania w portalu

  • Influence of Fluid Compressibility and Movements of the Swash Plate Axis of Rotation on the Volumetric Efficiency of Axial Piston Pumps

    Publikacja

    - ENERGIES - Rok 2022

    This paper describes the design of a swash plate axial piston pump and the theoretical models describing the bulk modulus of aerated and non-aerated fluids. The dead space volume is defined and the influence of this volume and the fluid compressibility on the volumetric efficiency of the pump is considered. A displacement of the swash plate rotation axis is proposed to reduce the dead space volume for small swash plate swing angles....

    Pełny tekst do pobrania w portalu

  • The Energy of Finance in Refining of Medical Surge Capacity

    Publikacja

    - ENERGIES - Rok 2021

    The availability of resources and their concentration in the place of greatest need, will not allow us to successfully overcome a medical surge without the energy required to activate these resources and activities, and increase their quantities if necessary, that is why the staff and management of healthcare institutions are forced to making ethical crisis decisions about who wins and who loses. This study highlights the versatility...

    Pełny tekst do pobrania w portalu

  • Logical Interface for Soft Handover – an effective scheme of handovers in Proxy Mobile IPv6

    Publikacja

    - Rok 2015

    Multimedia services are currently commonly available on mobile devices. Due to networks' convergence and migration to all-IP networks, mobility management at network layer is required. Moreover, nowadays it is popular to equip mobile devices with more than one wireless interface. Thus, soft handovers can be implemented, which means that an existing connection is removed after a new one is established. Usage of the Logical Interfaces...

  • Determining and verifying the safety integrity level with security aspects

    Publikacja

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Software modules and application layer's security structure of RSMAD

    The paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...

  • Machine Learning and Electronic Noses for Medical Diagnostics

    Publikacja

    The need for noninvasive, easy-to-use, and inexpensive methods for point-of-care diagnostics of a variety of ailments motivates researchers to develop methods for analyzing complex biological samples, in particular human breath, that could aid in screening and early diagnosis. There are hopes that electronic noses, that is, devices based on arrays of semiselective or nonselective chemical sensors, can fill this niche. Electronic...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Adapting Agile Practices to Security Context – Practitioners’ Perspective

    Publikacja

    In this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Optimizing Medical Personnel Speech Recognition Models Using Speech Synthesis and Reinforcement Learning

    Text-to-Speech synthesis (TTS) can be used to generate training data for building Automatic Speech Recognition models (ASR). Access to medical speech data is because it is sensitive data that is difficult to obtain for privacy reasons; TTS can help expand the data set. Speech can be synthesized by mimicking different accents, dialects, and speaking styles that may occur in a medical language. Reinforcement Learning (RL), in the...

    Pełny tekst do pobrania w portalu

  • Security Information Sharing for the Polish Power System

    Publikacja

    - Rok 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Focus on Misinformation: Improving Medical Experts’ Efficiency of Misinformation Detection

    Publikacja

    - Rok 2021

    Fighting medical disinformation in the era of the global pandemic is an increasingly important problem. As of today, automatic systems for assessing the credibility of medical information do not offer sufficient precision to be used without human supervision, and the involvement of medical expert annotators is required. Thus, our work aims to optimize the utilization of medical experts’ time. We use the dataset of sentences taken...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?

    This study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...

    Pełny tekst do pobrania w portalu

  • An improved frequency estimator for an adaptive active noise control scheme

    Publikacja

    An improved frequency tracker is proposed for the recently introduced self optimizing narrowband interference canceller (SONIC). The scheme is designed for disturbances with quasi-linear frequency modulation and, under second-order Gaussian random-walk assumption, can be shown to be statistically efficient. One real-world experiment and several simulations show that a considerable improvement in disturbance rejection may be achieved...

  • New Design of Axial Piston Pump with Displaced Swash Plate Axis of Rotation for Hydro-Mechanical Transmissions

    Publikacja

    This paper presents a prototype design of an axial piston pump with displaced swash plate axis of rotation in two directions of discharge with electronic control intended for installation on a hydraulic-mechanical gearbox dedicated to working machines. The effect of displacement of the swash plate rotation axis on dead space volume and volumetric efficiency is presented. The construction and principle of operation of the capacity...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Managing the security vulnerabilities of critical systems and hazardous plants

    Publikacja

    - Rok 2007

    Rozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publikacja

    - Rok 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security-oriented agile approach with AgileSafe and OWASP ASVS

    Publikacja

    In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...

  • Endoscopy video analysis algorithms and their independence of rotation , brightness , contrast , color and blur

    The article presents selected image analysis algorithms for endoscopy videos. Mathematical methods that are part of these algorithms are described, and authors’ claims about the characteristics of these algorithms, such as the independence of rotation, brightness, contrast, etc. are mentioned. Using the common test on the real endoscopic image database and a set of image transformations, the validity of these claims was checked...

    Pełny tekst do pobrania w portalu

  • Innovative rehabilitation lifts – mechanics in medical devices

    Publikacja

    - Mechanik - Rok 2020

    Mechanical devices are now widely used in physiotherapy and other rehabilitation processes. Particular importance is attached to devices enabling easy and effective transport of disabled people. The article presents innovative designs of rehabilitation lifts offered by the Polish manufacturer of lifts and medical accessories, LeviCare company. Moreover, the main assumptions of the research and development project implemented by...

    Pełny tekst do pobrania w portalu

  • Architects and urban planners in the face of energy transition - smart cities energy aspects in shaping building structures and cities

    Publikacja

    Contemporary architects and urban planners are facing steadily increasing challenges. The growing problems around environmental issues, shrinking natural resources and climate action are just some of them. Currently, planning should also include balancing with all the aspects of sustainable development such as not only the environmental issues, but also social and economic ones. How to meet them in the era of energy transition...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Online Interactivity – Shift Towards E-textbook-based Medical Education

    Publikacja
    • A. Dutkiewicz
    • B. Kołodziejczak
    • P. Leszczyński
    • I. Mokwa-Tarnowska
    • P. Topol
    • B. Kupczyk
    • I. Siatkowski

    - Studies in Logic, Grammar and Rhetoric - Rok 2019

    Textbooks have played the leading role in academic education for centuries and their form has evolved, adapting to the needs of students, teachers and technological possibilities. Advances in technology have caused educators to look for new sources of knowledge development, which students could use inside and outside the classroom. Today’s sophisticated learning tools range from virtual environments to interactive multimedia resources,...

    Pełny tekst do pobrania w portalu

  • Urine headspace analysis in medical diagnostics

    The analysis of the volatile organic compounds in the bodily fluids such as urine may provide useful information on the patients’ general health. The potential application of urine headspace analysis could facilitate the diagnostics of various diseases such as metabolic disorders, urinary tract diseases and gastrointestinal conditions. Described in this paper are the currently available techniques of urine sample analysis as well...

    Pełny tekst do pobrania w portalu

  • The methods of secure data transmission in the KNX system

    The article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Wybrane problemy ochrony żeglugi (Maritime Security)

    Publikacja

    - Rok 2005

    przedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Pełny tekst do pobrania w portalu

  • Rough Sets Applied to Mood of Music Recognition

    Publikacja

    With the growth of accessible digital music libraries over the past decade, there is a need for research into automated systems for searching, organizing and recommending music. Mood of music is considered as one of the most intuitive criteria for listeners, thus this work is focused on the emotional content of music and its automatic recognition. The research study presented in this work contains an attempt to music emotion recognition...

  • Functional safety and security assessment of the control and protection systems

    Publikacja

    - Rok 2006

    W artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.

  • A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji

    The paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...

  • E-textbook technologies for academics in medical education

    Publikacja

    - Studies in Logic, Grammar and Rhetoric - Rok 2018

    Public universities in Poland receive fairly limited financial support for creating e-textbooks and lack the appropriate ICT competences among teaching staff, especially in the case of non-technical universities. The authors propose a pedagogical and technological paradigm for e-textbooks in medical education using open source software with minimal IT skills required. Technologies used to develop e-textbooks are connected with:...

    Pełny tekst do pobrania w portalu

  • Multimedia industrial and medical applications supported by machine learning

    Publikacja

    - Rok 2023

    This article outlines a keynote paper presented at the Intelligent DecisionTechnologies conference providing a part of the KES Multi-theme Conference “Smart Digital Futures” organized in Rome on June 14–16, 2023. It briefly discusses projects related to traffic control using developed intelligent traffic signs and diagnosing the health of wind turbine mechanisms and multimodal biometric authentication for banking branches to provide...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publikacja

    - Rok 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security Assessment of a Turbo-Gas Power Plant

    Publikacja

    - Rok 2009

    Critical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Biopolymers in designing modern antimicrobial medical materials. Part I. Biopolymer medical materials - collagen, chitosan

    Publikacja

    The article is a review of the literature concerning the possible use of biopolymers for the preparation of dressings with antimicrobial activity. Authors show the potential of biopolymers: collagen and chitosan - which have the ability to immobilize and control the release of various active compounds - for providing the appropriate antibacterial, bacteriostatic and wound healing properties. Types of threats, for which the dressing...

    Pełny tekst do pobrania w portalu

  • ANYTIME POLYNOMIAL HEURISTIC ALGORITHM FOR PARTITIONING GROUPS OF DATA WITH PRESERVING CLASS PROPORTIONS FOR CROSS-VALIDATION

    Publikacja

    - Rok 2014

    The article describes a problem of splitting data for k-fold cross-validation, where class proportions must be preserved, with additional constraint that data is divided into groups that cannot be split into different cross-validation sets. This problem often occurs in e.g. medical data processing, where data samples from one patient must be included in the same cross-validation set. As this problem is NP-complete, a heuristic...

  • I-lossless factorisations for robust H-inf-control in delta-domain

    ...

  • A J-lossless coprime factorisation approach to H control in delta domain

    Publikacja

    - AUTOMATICA - Rok 2002

    Praca dotyczy sterowania wielowymiarowym obiektem dynamicznym czasu ciągłego opisanym dyskretnoczasowym modelem w przestrzeni stanu, przy założeniu, że wskaźnik jakości sterowania oparty jest na normie H-inf. Odpowiednie zadanie optymalizacji tego wskaźnika rozwiązuje się, stosując tak zwaną względnie pierwszą J-bezstratną faktoryzację modelu sterowanego. Pokazano, że synteza optymalnego sterownika, wymagająca rozwiązania dwóch...

  • Customized crossover in evolutionary sets of safe ship trajectories

    The paper presents selected aspects of evolutionary sets of safe ship trajectories-a method which applies evolutionary algorithms and some of the assumptions of game theory to solving ship encounter situations. For given positions and motion parameters of the ships, the method finds a near optimal set of safe trajectories of all ships involved in an encounter. The method works in real time and the solutions must be returned within...

    Pełny tekst do pobrania w portalu

  • Rotationally invariant bipartite states and bound entanglement

    Publikacja

    W pracy rozważano stany kwantowe niezmiennicze na działanie grupy SO(3). Pokazano, że w przypadku, gdy pierwszy podukład ma parzysty wymiar większy lub równy cztery oraz drugi podukład ma wymiar dowolny, większy niż pierwszy to pośród takich stanów zawsze istnieje splątanie związane.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Kinetyka reakcji utwardzania eteru diglicydylowego bisfenolu-Amodyfikowanego 2-hydroksyetylometyloakrylanem

    Publikacja

    Obecnie na świecie zużywa się około 1,3 mln ton żywic epoksydowych rocznie a prognozy wzrostu zapotrzebowania na tę grupę materiałów polimerowych są obiecujące, ze względu na nieskomplikowaną technologię ich wytwarzania. Wiele ośrodków naukowych prowadzi badania w kierunku uzyskania coraz to lepszych parametrów fizyko-chemicznych pozwalających na rozszerzenie spektrum ich zastosowania. Badania te prowadzą również do zmiany w budowie...