Filtry
wszystkich: 30014
wybranych: 5932
-
Katalog
- Publikacje 5932 wyników po odfiltrowaniu
- Czasopisma 713 wyników po odfiltrowaniu
- Konferencje 173 wyników po odfiltrowaniu
- Wydawnictwa 3 wyników po odfiltrowaniu
- Osoby 242 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 24 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Kursy Online 165 wyników po odfiltrowaniu
- Wydarzenia 25 wyników po odfiltrowaniu
- Dane Badawcze 22735 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS.
-
Wpływ 2-hydroksyetylometyloakrylanu na właściwości fizyczne eteru diglicydylowego bisfenolu-A utwardzanego diaminodifenylometanem
PublikacjaW pracy przedstawiono wyniki badań wpływu 2-hydroksyetylometyloakrylanu (HEMA) na właściowści fizyczne eteru diglicydylowego bisfenolu-A (DGEBA) utwardzanego diaminodifenylometanem (DDM). Badania statycznych właściwości mechanicznych: wytrzymałość na rozciąganie, twardość, gęstość oraz parametry kinetyki reakcji sieciowania wykazały ścisłą zależność pomiędzy składem wymienionych substratów a ich wpływem na uzyskane parametry fizyczne.
-
Computational modelling of the modification of epoxy resins
PublikacjaSymulacja komputerowa właściwości fizycznych sieci żywic epoksydowych (DGEBA/DDM) modyfikowanych związkami akrylowymi przy użyciu programu Cheops® MillionZillion Software.
-
The use of machine learning for face regions detection in thermograms
PublikacjaThe aim of this study is to analyse the methods of detecting characteristic points of the face in thermographic images. As part of the implementation an extensive analysis of scientific publications covering similar issues both for the analysis of images made in visible light and thermographic images was carried out. On the basis of this analysis, 3 models were selected and then they were implemented and tested on the basis of...
-
Interactions in aqueous solutions of K-peptide and DMSO – spectroscopic and calorimetric studies
PublikacjaIntroduction K-peptide (GILQINSRW) – short 9 amino acid fragment of the hen egg white lysozyme has the ability to form amyloid structures. Dimethyl sulfoxide (DMSO) is an osmolyte which can alter this ability. Our goal was to get an insight into the mechanism of Kpeptide-DMSO interactions in aqueous solutions. Such a knowledge can be helpful to understand processes leading to various neurodegenerative diseases. Methods ATR-FTIR...
-
Adaptive system for recognition of sounds indicating threats to security of people and property employing parallel processing of audio data streams
PublikacjaA system for recognition of threatening acoustic events employing parallel processing on a supercomputing cluster is featured. The methods for detection, parameterization and classication of acoustic events are introduced. The recognition engine is based onthreshold-based detection with adaptive threshold and Support Vector Machine classifcation. Spectral, temporal and mel-frequency descriptors are used as signal features. The...
-
A note on an approximative scheme of finding almost homoclinic solutions for Newtonian systems
PublikacjaIn this work we will be concerned with the existence of an almost homoclinic solution for a perturbed Newtonian system in a finite dimensional space. It is assumed that a potential is C^1 smooth and its gradient is bounded with respect to a time variable. Moreover, a forcing term is continuous, bounded and squere integrable. We will show that the appproximative scheme due to J. Janczewska for a time periodic potential extends to...
-
COLREGS compliance in Evolutionary Sets of Cooperating Ship Trajectories
PublikacjaIn general, Evolutionary Sets of Cooperating Ship Trajectories combine some of the assumptions of game theory with evolutionary programming and aim to find optimal set of cooperating trajectoriesof all ships involved in an encounter situation. In a two-ship encounter situation the method enables the operator of an on-board collision-avoidance system to predict the most probable behaviour of atarget and to plan the own manoeuvres...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublikacjaWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Proposal of a mobile medical waste incinerator with automatic waste feeder and heat recovery system
PublikacjaThe paper presents and discusses the issue of medical waste (including hazardous ones) and their proper management. Inappropriate handling of infectious medical waste directly endangers the human being health and the environment. Infectious waste must therefore be properly disposed of – one of the most commonly used methods is the thermal treatment in the incinerators tailored for this purpose. During designing an incinerator unit,...
-
Investigating beliefs in anti-vax conspiracy theories among medical students
PublikacjaAbstract: While the doctors’ role in immunization is essential, their lack of knowledge or vaccine hesitancy may affect their ability to communicate effectively and educate patients about vaccination, vaccine hesitancy, and vaccine conspiracy theories. This, in turn, may hinder health policy aimed at fighting infectious diseases. Vaccine hesitancy is prevalent not only among the general population but also among healthcare...
-
Orientation-aware ship detection via a rotation feature decoupling supported deep learning approach
PublikacjaShip imaging position plays an important role in visual navigation, and thus significant focuses have been paid to accurately extract ship imaging positions in maritime videos. Previous studies are mainly conducted in the horizontal ship detection manner from maritime image sequences. This can lead to unsatisfied ship detection performance due to that some background pixels maybe wrongly identified as ship contours. To address...
-
Big Data i 5V – nowe wyzwania w świecie danych (Big Data and 5V – New Challenges in the World of Data)
PublikacjaRodzaje danych, składające się na zbiory typu Big Data, to m.in. dane generowane przez użytkowników portali internetowych, dane opisujące transakcje dokonywane poprzez Internet, dane naukowe (biologiczne, astronomiczne, pomiary fizyczne itp.), dane generowane przez roboty w wyniku automatycznego przeszukiwania przez nie Internetu (Web mining, Web crawling), dane grafowe obrazujące powiązania pomiędzy stronami WWW itd. Zazwyczaj,...
-
CIP Security Awareness and Training: Standards and Practice
PublikacjaThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
CIP Security Awareness and Training: Standards and Practice
PublikacjaThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
Scabies – still current medical and social problem. A retrospective analysis of 193 cases
Publikacja -
Automatic sound recognition for security purposes
PublikacjaIn the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...
-
On Software Unit Testing For Security and Performance Gain At Unit Level
PublikacjaPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
On Software Unit Testing For Improving Security And Performance Of Distributed Applications
PublikacjaPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
Data Mining Applications and Methods in Medicine
PublikacjaIn this paper we describe the research area of data mining and its applications in medicine. The origins of data mining and its crucial features are shortly presented. We discuss the specificity of medicine as an application area for computer systems. Characteristic features of the medical data are investigated. Common problems in the area are also presented as well as the strengths and capabilities of the data mining methods....
-
Evolutionary Sets of Safe Ship Trajectories: problem dedicated operators
PublikacjaThe paper presents the optimization process of the evolutionary sets of safe ship trajectories method, with a focus on its problem-dedicated operators. The method utilizes a customized evolutionary algorithm to solve a constrained optimization problem. This problem is defined as finding a set of cooperating trajectories (a set is an evolutionary individual) of all the ships involved in the encounter situation. The resulting trajectories...
-
Arithmetic Loophole in Bell's Theorem: Overlooked Threat to Entangled-State Quantum Cryptography
PublikacjaBell’s theorem is supposed to exclude all local hidden-variable models of quantum correlations. However,an explicit counterexample shows that a new class of local realistic models, based on generalized arith-metic and calculus, can exactly reconstruct rotationally symmetric quantum probabilities typical oftwo-electron singlet states. Observable probabilities are consistent with the usual arithmetic employedby macroscopic observers...
-
Periodic expansion in determining minimal sets of Lefschetz periods for Morse–Smale diffeomorphisms
PublikacjaWe apply the representation of Lefschetz numbers of iterates in the form of periodic expansion to determine the minimal sets of Lefschetz periods of Morse–Smale diffeomorphisms. Applying this approach we present an algorithmic method of finding the family of minimal sets of Lefschetz periods for Ng, a non-orientable compact surfaces without boundary of genus g. We also partially confirm the conjecture of Llibre and Sirvent (J Diff...
-
A sense of security and freedom in a residential environment
PublikacjaThe article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...
-
Polyurethanes as a Potential Medical-Grade Filament for Use in Fused Deposition Modeling 3D Printers – a Brief Review
PublikacjaThe possibility of using 3D printing technology (3DP) in medical field is a kind of revolution in health care. This has contributed to a rapid growth in demand for 3D printers, whose systems and materials are adapted to strict medical requirements. In this paper, we report a brief review of polyurethanes as a potential medical-grade filament for use in Fused Deposition Modeling (FDM) 3D printer technology. The advantages of polyurethanes...
-
Rotation Triggers Nucleotide-Independent Conformational Transition of the Empty β Subunit of F1-ATPase
PublikacjaF1-ATPase (F1) is the catalytic portion of ATP synthase, a rotary motor protein that couples proton gradients to ATP synthesis. Driven by a proton flux, the F1 asymmetric γ subunit undergoes a stepwise rotation inside the α3β3 headpiece and causes the β subunits’ binding sites to cycle between states of different affinity for nucleotides. These concerted transitions drive the synthesis of ATP from ADP and phosphate. Here, we study...
-
Visual Attention Distribution Based Assessment of User's Skill in Electronic Medical Record Navigation
PublikacjaCurrently, the most precise way of reflecting the skills level is an expert’s subjective assessment. In this paper we investigate the possibility of the use of eye tracking data for scalar quantitative and objective assessment of medical staff competency in EMR system navigation. According to the experiment conducted by Yarbus the observation process of particular features is associated with thinking. Moreover, eye tracking is...
-
Elastoplastic law of Cosserat type in shell theory with drilling rotation
PublikacjaWithin the framework of six-parameter non-linear shell theory, with strain measures of the Cosserat type, we develop small-strain J2-type elastoplastic constitutive relations. The relations are obtained from the Cosserat plane stress relations assumed in each shell layer, by through-the-thickness integration employing the first-order shear theory. The formulation allows for unlimited translations and rotations. The constitutive...
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublikacjaThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
DEEP CONVOLUTIONAL NEURAL NETWORKS AS A DECISION SUPPORT TOOL IN MEDICAL PROBLEMS – MALIGNANT MELANOMA CASE STUDY
PublikacjaThe paper presents utilization of one of the latest tool from the group of Machine learning techniques, namely Deep Convolutional Neural Networks (CNN), in process of decision making in selected medical problems. After the survey of the most successful applications of CNN in solving medical problems, the paper focuses on the very difficult problem of automatic analyses of the skin lesions. The authors propose the CNN structure...
-
PUBLIC SOURCES OF FINANCE FOR CULTURE AS AN ELEMENT OF CULTURAL SECURITY IN POLAND
PublikacjaCulture is an important element of the country, playing an important role both for its security and the economy. It cannot be only seen as a cost-creating sector, but may be a significant factor in economic development. For this to happen, it is necessary to create a system of financing this economic sector. This article’s aim is to analyze the use of funds from public sources in Poland to finance culture-related activities. The...
-
Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
Publikacja[Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublikacjaModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Towards systemic functional safety and security management in hazardous plants
PublikacjaThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Evolutionary Sets of Safe Ship Trajectories: simulation results
PublikacjaThe Evolutionary Sets of Safe Ship Trajectories is a method solving multi-ship encounter situations. For given positions and motion parameters the method finds a near optimal set of safe trajectories of all ships involved in an encounter. The paper briefly presents foundations of the method and focuses on simulation results for selected test cases based on the Baltic Basin. The computer simulations cover both open waters and restricted...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublikacjaThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
Lessons learned in a decade: Medical‐toxicological view of tattooing
PublikacjaTattooing has been part of the human culture for thousands of years, yet only in the past decades has it entered the mainstream of the society. With the rise in popularity, tattoos also gained attention among researchers, with the aim to better understand the health risks posed by their application. 'A medical-toxicological view of tattooing'-a work published in The Lancet almost a decade ago, resulted from the international collaboration...
-
An intelligent cellular automaton scheme for modelling forest fires
PublikacjaForest fires have devastating consequences for the environment, the economy and human lives. Understanding their dynamics is therefore crucial for planning the resources allocated to combat them effectively. In a world where the incidence of such phenomena is increasing every year, the demand for efficient and accurate computational models is becoming increasingly necessary. In this study, we perform a revision of an initial proposal...
-
A comprehensive evaluation of flexible FDM/FFF 3D printing filament as a potential material in medical application
PublikacjaThe use of FDM/FFF in 3D printing for medical sciences is becoming common. This is due to the high availability and decent price of both 3D printers and filaments useful for FDM/FFF. Currently, researchers' attention is focused mainly on the study of medical filaments based on PLA, PCL or their modifications. This contributes to insufficient diversity of medical-grade filaments on the market. Moreover, due to the lack of specified...
-
Security of export transactions in the offer of leading banks on the Polish market
PublikacjaThe following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...
-
A Text as a Set of Research Data. A Number of Aspects of Data Acquisition and Creation of Datasets in Neo-Latin Studies
PublikacjaIn this paper, the authors, who specialise in part in neo-Latin studies and the his-tory of early modern education, share their experiences of collecting sources for Open Research Data sets under the Bridge of Data project. On the basis of inscription texts from St. Mary’s Church in Gdańsk, they created 29 Open Research Data sets. In turn, the text of the lectures of the Gdańsk scholar Michael Christoph Hanow, Praecepta de arte...
-
Optical rotation in the lithium triborate nonlinear crystal
PublikacjaA dual-wavelength polarimetric technique at 633 and 661 nm has been used for the characterization of a nonlinear lithium triborate (LiB3O5) nonenantiomorphous biaxial crystal. The mismatch of the crystallographic and optical coordinate systems was taken into account. The optical rotatory power for light propagation along one of the optical axes is ρ = 7.06° mm−1. The gyration tensor component along the bisector between the x and...
-
VIBRATION DIAGNOSTICS OF FOOTBRIDGE WITH USE OF ROTATION SENSOR
PublikacjaThe benefits of the additional measurement of rotational degrees of free-dom on the performance of the vibration diagnosis of bridges are studied in this paper. The common vibrational diagnostics that uses translational degrees of freedom is extended by measurements of rotations. The study is curried out on a footbridge and the presence of damage as well as its location and size is determined with use of FEM updating procedure....
-
Portable raman spectrometer for maritime security applications
PublikacjaThe fast identification of explosives, narcotics and other chemicals carried on board of ships or transported in containers to the harbors is an important problem of maritime security. Raman spectroscopy is widely used for fast identification of various chemicals. Continuous progress in the field of photonics has resulted in commercial availability of low-power compact Raman spectrometers which can be integrated into portable systems....
-
Super Dominating Sets in Graphs
PublikacjaIn this paper some results on the super domination number are obtained. We prove that if T is a tree with at least three vertices, then n2≤γsp(T)≤n−s, where s is the number of support vertices in T and we characterize the extremal trees.
-
Safety integrity level verification for safety-related functions with security aspects
PublikacjaThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
Segmentation Quality Refinement in Large-Scale Medical Image Dataset with Crowd-Sourced Annotations
PublikacjaDeployment of different techniques of deep learning including Convolutional Neural Networks (CNN) in image classification systems has accomplished outstanding results. However, the advantages and potential impact of such a system can be completely negated if it does not reach a target accuracy. To achieve high classification accuracy with low variance in medical image classification system, there is needed the large size of the...
-
Evolutionary Sets of Safe Ship Trajectories: development of the method
PublikacjaThe Evolutionary Sets of Safe Ship Trajectories is a method solving ship encounter situations. The method combines evolutionary approach to planning ship trajectory with some of the assumption of game theory. For given positions and motion parameters the method finds a near optimal set of safe trajectories of all ships involved in an encounter. The version presented here is an updated one and its authors have tested extensively...
-
User Trust Levels and Their Impact on System Security and Usability
PublikacjaA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Data Analysis in Bridge of Data
PublikacjaThe chapter presents the data analysis aspects of the Bridge of Data project. The software framework used, Jupyter, and its configuration are presented. The solution’s architecture, including the TRYTON supercomputer as the underlying infrastructure, is described. The use case templates provided by the Stat-reducer application are presented, including data analysis related to spatial points’ cloud-, audio- and wind-related research.
-
On UMTS security.
PublikacjaW artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.