Wyniki wyszukiwania dla: SECURE ITALIAN DOMINATION - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: SECURE ITALIAN DOMINATION

Filtry

wszystkich: 290
wybranych: 226

wyczyść wszystkie filtry


Filtry wybranego katalogu

  • Kategoria

  • Rok

  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Wyniki wyszukiwania dla: SECURE ITALIAN DOMINATION

  • Low-dimensional bound entanglement with one-way distillable cryptographic key

    Publikacja

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2008

    In this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...

  • Analysis and Comparison of Safety of Children and Adult Passenger in Car Based on Crash Tests Results

    Most important features of the child seat were presented. There was made analysis of selected dynamic loads acting on mannequins heads during a collision. Comparison of loads acting on the kid in a child seat and the other passengers in a car is presented. In analysis of the results particular attention has been paid on the children's secure in a car. The phenomena of collision child's occipital bone with seat backrest was described....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Hedging Strategies of Derivatives Instruments for Commodity Trading Entities

    Publikacja

    - Rok 2015

    Hedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...

  • E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes

    Publikacja

    - Rok 2020

    E-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...

    Pełny tekst do pobrania w portalu

  • Preface

    Publikacja

    - Discussiones Mathematicae Graph Theory - Rok 2011

    This special issue of Discussiones Mathematice Graph Theory (DMGT) is dedicated to selected papers presented at the 13th Workshop on Graph Theory: Colourings, Independence and Domination (CID) held on 18-23 September 2009 in Szklarska Poręba, Poland. It continues a series of international workshops: 1993-1997 in Lubiatów, 1998-2001 in Gronów, and 2003-2007 in Karpacz. The meeting was organized by the Faculty of Mathematics, Computer...

    Pełny tekst do pobrania w portalu

  • Integrated safety and security analysis of hazardous plants and systems of critical infrastructure

    This article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Pełny tekst do pobrania w portalu

  • On Design Optimization of Miniaturized Microscrip Dual-Band Rat-Race Coupler with Enhanced Bandwidth

    Publikacja

    - Rok 2016

    In the paper, a novel topology of a miniaturized wideband dual-band rat-race coupler has been presented. Small size of the circuit has been obtained by meandering transmission lines of the conventional circuit. At the same time, the number of independent geometry parameters has been increased in order to secure sufficient circuit flexibility in the context of its design optimization for dual-band operation. Optimum dimensions of...

  • Quantum security and theory of decoherence

    Publikacja

    We sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...

    Pełny tekst do pobrania w portalu

  • Service restoration in survivable networks under malicious attacks

    Publikacja

    W artykule przedstawiono porównanie jakości odtwarzania usług w przeżywalnych sieciach optycznych poddanych awariom losowym oraz celowym działaniom niszczącym (atakom). Założenia odnośnie przeżywalności są następujące: ochrona od krańca do krańca, rozłączność węzłowa każdej pary ścieżek: aktywnej i zabezpieczającej.Z powodu NP-zupełności problemu przeżywalnego doboru tras i przydziału długości fali w sieciach optycznych, zaproponowano...

  • UE ETS: an in-depth descriptive analysis.

    Publikacja

    - Rok 2024

    The European Emission Trading System (EU ETS) plays a pivotal role in the EU’s strategy to address climate change, serving as a fundamental instrument for cost-effective reduction of greenhouse gas emissions. Notably, it inaugurated the word’s first major carbon market and it continues to the largest one. Chapter 1 provides an in-depth examination of the EU ETS, spanning from its inception in 2025 to 2020. After providing a descriptive...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Numerical modeling of exciton impact in two crystalographic phases of the organo-lead halide perovskite (CH3NH3PbI3) solar cell

    To improve the power conversion efficiency of solar cells based on organo–lead halide perovskites, a detailed understanding of the device physics is fundamental. Here, a computational analysis of excitons impact is reported for these types of photocell. Numerical calculations based on the model, which take into account electronic charge carriers (electrons and holes), excitons and ions, have been carried out. The role of excitons...

    Pełny tekst do pobrania w portalu

  • Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

    Publikacja

    - Rok 2014

    We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Realistic noise-tolerant randomness amplification using finite number of devices

    Publikacja
    • F. Brandão
    • R. Ramanathan
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • T. Szarek
    • H. Wojewódka

    - Nature Communications - Rok 2016

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...

    Pełny tekst do pobrania w portalu

  • Dynamics of productivity in higher education. Cross-European evidence based on bootstrapped Malmquist indices

    This study presents patterns of productivity change in a large set of 266 public higher education institutions (HEIs) from 7 European countries across the time period 2001-2005. We adopt consistent bootstrap estimation procedures to obtain confidence intervals for Malmquist indices of HEI productivity and their components. Consequently, we are able to assess statistical significance of the changes in HEIs' productivity, efficiency...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Weakly-Supervised Word-Level Pronunciation Error Detection in Non-Native English Speech

    Publikacja
    • D. Korzekwa
    • J. Lorenzo-trueba
    • T. Drugman
    • S. Calamaro
    • B. Kostek

    - Rok 2021

    We propose a weakly-supervised model for word-level mispronunciation detection in non-native (L2) English speech. To train this model, phonetically transcribed L2 speech is not required and we only need to mark mispronounced words. The lack of phonetic transcriptions for L2 speech means that the model has to learn only from a weak signal of word-level mispronunciations. Because of that and due to the limited amount of mispronounced...

    Pełny tekst do pobrania w portalu

  • Searching for innovation knowledge: insight into KIBS companies

    Publikacja

    - Knowledge Management Research & Practice - Rok 2017

    The paper analyses the activity of research for “innovation knowledge”—here defined as knowledge that can lead to the introduction of service innovations—by Knowledge-Intensive Business Services (KIBS) companies. It proposes a classification of the possible search approaches adopted by those companies based on two dimensions: the pro-activity of search efforts and the source primarily used. Such classification is then discussed...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Layered Morphology of Gdansk: Past, Present and Future.

    This study aims to analyze the urban fabric and form of the city of Gdańsk based on the Muratorian and Italian school of urban morphology, to deepen the understanding of the morphological process of the urban fabric. It can be seen that the urban fabric of the city is a juxtaposition of all these layers, and based on Muratori’s approach these are indicative of not just the past, present but also the future. The study sample is...

    Pełny tekst do pobrania w portalu

  • Interaction with medical data using QR-codes

    Publikacja

    Bar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Towards Healthcare Cloud Computing

    In this paper we present construction of a software platform for supporting medical research teams, in the area of impedance cardiography, called IPMed. Using the platform, research tasks will be performed by the teams through computer-supported cooperative work. The platform enables secure medical data storing, access to the data for research group members, cooperative analysis of medical data and provide analysis supporting tools...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • No Quantum Realization of Extremal No-Signaling Boxes

    Publikacja

    - PHYSICAL REVIEW LETTERS - Rok 2016

    The study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Service restoration in survivable networks under attacks

    W artykule dokonano porównania jakości odtwarzania usług w przeżywalnych sieciach optycznych, uszkadzanych w wyniku awarii fizycznych oraz na skutek ataków. Przeanalizowano wariant ochrony ścieżek ('path protection') poprzez wyznaczane zawczasu ścieżki zabezpieczające. Z uwagi na NP-zupełność problemu optymalizacji doboru tras w przeżywalnych sieciach optycznych, zaproponowano efektywny algorytm heurystyczny SCNDP. Autorski symulator...

  • Przydatność białka rybiego w postaci kolagenu lub żelatyny oraz polisacharydu - kapa-karagenu do wytwarzania aktywnych opakowań biodegradowalnych = Usefulness of fish collagen, gelatin and carrageenan for preparation of active biodegradable packages

    Summary - The possibility of use of protein films made of fish collagen or gelatin as well as polysaccharide carrageenan films as carriers of enzymes (lysozyme or lysostaphyne), for preparation of microbiologically active packages, was investigated. It was found that crosslinking of such systems with N-[3(dimethylamino)propyl]-N'-ethylcarboimide (EDC) does not influence the activity of lysozyme immobilized in the films (Table 1)....

    Pełny tekst do pobrania w portalu

  • A structure and design optimization of novel compact microscrip dual-band rat-race coupler with enhanced bandwidth

    Publikacja

    In the letter, a topology of a novel compact wideband dual-band rat-race coupler has been presented along with its computationally efficient design optimization procedure. Reduction of the circuit size has been achieved by meandering transmission lines of the conventional circuit. At the same time, the number of independent geometry parameters has been increased so as to secure sufficient flexibility of the circuit, necessary in...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Quantum privacy witness

    Publikacja

    - PHYSICAL REVIEW A - Rok 2012

    While it is usually known that the mean value of a single observable is enough to detect entanglement or its distillability, the counterpart of such an approach in the case of quantum privacy has been missing. Here we develop the concept of a privacy witness, i.e., a single observable that may detect the presence of the secure key even in the case of bound entanglement. Then we develop the notion of secret-key estimation based...

    Pełny tekst do pobrania w portalu

  • Practical I-Voting on Stellar Blockchain

    Publikacja

    In this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...

    Pełny tekst do pobrania w portalu

  • 2-bondage in graphs

    A 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The 2-bondage number of G, denoted by b_2(G), is the minimum cardinality among all sets of edges E' subseteq E such that gamma_2(G-E') > gamma_2(G). If for every E' subseteq E we have...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Common Independence in Graphs

    Publikacja

    - Symmetry-Basel - Rok 2021

    Abstract: The cardinality of a largest independent set of G, denoted by α(G), is called the independence number of G. The independent domination number i(G) of a graph G is the cardinality of a smallest independent dominating set of G. We introduce the concept of the common independence number of a graph G, denoted by αc(G), as the greatest integer r such that every vertex of G belongs to some independent subset X of VG with |X|...

    Pełny tekst do pobrania w portalu

  • Pressure drop and heat transfer during boiling and condensation at subcritical region

    Publikacja

    Most of the data presented in the literature relate to saturation temperatures in the range - 20°C to 40°C due to the application in refrigeration technology. There is necessity to extend databases to higher values of saturation temperature due to new applications such as Organic Rankine Cycle and high temperature heat pumps. Only few papers contain data for high reduced pressure for low boiling point liquids. This paper focus...

  • Activation of peroxymonosulfate using carbon black nano-spheres/calcium alginate hydrogel matrix for degradation of acetaminophen: Fe3O4 co-immobilization and microbial community response

    Publikacja
    • R. D. C. Soltani
    • M. Mahmoudi
    • G. Boczkaj
    • A. Khataee

    - JOURNAL OF INDUSTRIAL AND ENGINEERING CHEMISTRY - Rok 2020

    Herein, we focused on the degradation of acetaminophen (ACT) drug in liquid phase by peroxymonosulfate (PMS) activated by carbon black nano-spheres (CBNS). The nanostructured activator was immobilized into calcium alginate hydrogel matrix (CAHM) to avoid the washout of the fine nanostructures. The Langmuir modeling showed an insignificant contribution to the adsorption process in the removal of ACT. The basic pH conditions favored...

    Pełny tekst do pobrania w portalu

  • Machine-aided detection of SARS-CoV-2 from complete blood count

    Publikacja

    - Rok 2022

    The current gold standard for SARS-CoV-2 detection methods lacks the functionality to perform population screening. Complete blood count (CBC) tests are a cost-effective way to reach a wide range of people – e.g. according to the data of the Central Statistical Office of Poland from 2016, there are 3,000 blood diagnostic laboratories in Poland, and 46% of Polish people have at least one CBC test per year. In our work, we show...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Whirling system of water exchangein breeding pools

    To secure the proper conditions of life for sea mammals existing in closed systems one has to maintain the character of the breeding basins (i.e. shape, dimensions, facing of walls and bottom, quality and motion of water) as natural as possible. An appropriate system of water exchange plays a very important role here. A full renewal of water is time-consuming, expensive and troublesome, so can be made only periodically, and should...

    Pełny tekst do pobrania w portalu

  • Current status and future success of renewable energy in Pakistan

    Mismatch between energy demand and supply from last two decades has been increasing because of the domination of expensive imported oil in energy mix of Pakistan. To import crude oil Government paid US $ 9 billion in 2008–2009 to meet the energy demands...

  • Double bondage in graphs

    Publikacja

    A vertex of a graph is said to dominate itself and all of its neighbors. A double dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D. The double domination number of a graph G, denoted by gamma_d(G), is the minimum cardinality of a double dominating set of G. The double bondage number of G, denoted by b_d(G), is the minimum cardinality among all sets...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • General paradigm for distilling classical key from quantum states

    Publikacja

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2009

    In this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems

    Publikacja

    Sustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Modeling an Industrial Revolution: How to Manage Large-Scale, Complex IoT Ecosystems?

    Publikacja
    • G. Kulcsar
    • P. Varga
    • M. S. Tatara
    • F. Montori
    • M. A. Inigo
    • G. Urgese
    • P. Azzoni

    - Rok 2021

    Advancements around the modern digital industry gave birth to a number of closely interrelated concepts: in the age of the Internet of Things (IoT), System of Systems (SoS), Cyber-Physical Systems (CPS), Digital Twins and the fourth industrial revolution, everything revolves around the issue of designing well-understood, sound and secure complex systems while providing maximum flexibility, autonomy and dynamics. The aim of the...

    Pełny tekst do pobrania w portalu

  • Non-isolating 2-bondage in graphs

    A 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The non-isolating 2-bondage number of G, denoted by b_2'(G), is the minimum cardinality among all sets of edges E' subseteq E such that delta(G-E') >= 1 and gamma_2(G-E') > gamma_2(G)....

    Pełny tekst do pobrania w portalu

  • Non-isolating bondage in graphs

    A dominating set of a graph $G = (V,E)$ is a set $D$ of vertices of $G$ such that every vertex of $V(G) \setminus D$ has a neighbor in $D$. The domination number of a graph $G$, denoted by $\gamma(G)$, is the minimum cardinality of a dominating set of $G$. The non-isolating bondage number of $G$, denoted by $b'(G)$, is the minimum cardinality among all sets of edges $E' \subseteq E$ such that $\delta(G-E') \ge 1$ and $\gamma(G-E')...

    Pełny tekst do pobrania w portalu

  • Unexpected Z/E isomerism of N-methyl-O-phosphothioyl benzohydroxamic acids, their oxyphilic reactivity and inertness to amines

    Thiophosphinoylation of N-methyl p-substituted benzohydroxamic acids using disulfanes (method A) or diphenylphosphinothioyl chloride (method B) provides only one conformer of the respective O-phosphothioyl derivative (Xray and NMR analysis). Undergoing the P-transamidoxylation reaction is an evidence of the reversibility of thiophosphinoylation. Only those products containing strong EWG substituents in the aroyl residue or bulky...

    Pełny tekst do pobrania w portalu

  • Colour Terms in Five Linguistic Images of the World: The Semantic Perspective

    Publikacja
    • P. Golda
    • J. Mężyk
    • J. Ryszka
    • T. Uchman
    • A. Jedziniak

    - GEMA Online Journal of Language Studies - Rok 2022

    Social and cultural factors shape the linguistic perception of colour. At the same time, colour terms co-create the linguistic image of the world, which allows us to interpret reality and profile our statements and beliefs. This paper presents six basic colour terms: white, black, red, green, yellow, and blue (both as adjectives and as nouns) in the five different linguistic images of the world of the following languages: English,...

    Pełny tekst do pobrania w portalu

  • KM Challenges in Small KIBS Companies: Multi-case Analysis in Two Countries

    Publikacja

    - Rok 2023

    Knowledge Intensive Business Services (KIBS) – i.e. companies like e.g. computer services, consulting, engineering, business communication, and R&D support - are key players in the modern economies. They stimulate the innovativeness of businesses and societies. Their competitiveness is based on knowledge, which is their key production factor and also the kind of “goods” they sell. The large majority of KIBS companies have a small...

    Pełny tekst do pobrania w portalu

  • Medical Image Dataset Annotation Service (MIDAS)

    Publikacja

    - Rok 2020

    MIDAS (Medical Image Dataset Annotation Service) is a custom-tailored tool for creating and managing datasets either for deep learning, as well as machine learning or any form of statistical research. The aim of the project is to provide one-fit-all platform for creating medical image datasets that could easily blend in hospital's workflow. In our work, we focus on the importance of medical data anonimization, discussing the...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Device-independent quantum key distribution based on measurement inputs

    Publikacja

    - PHYSICAL REVIEW A - Rok 2015

    We provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....

    Pełny tekst do pobrania w portalu

  • Generation and Propagation of Nonlinear Waves in a Towing Tank

    The paper presents the results of the research focused on linear and nonlinear wave generation and propagation in a deepwater towing tank equipped with a single flap-type wavemaker of variable draft. The problem of wave generation and propagation has been theoretically formulated and solved by applying an analytical method; linear and nonlinear solutions were obtained. The linear solution has been verified experimentally. The...

    Pełny tekst do pobrania w portalu

  • How does the Relationship Between the Mistakes Acceptance Component of Learning Culture and Tacit Knowledge-Sharing Drive Organizational Agility? Risk as a Moderator

    Publikacja

    - Rok 2024

    Changes in the business context create the need to adjust organizational knowledge to new contexts to enable the organizational agile responses to secure competitiveness. Tacit knowledge is strongly contextual. This study is based on the assumption that business context determines tacit knowledge creation and acquisition, and thanks to this, the tacit knowledge-sharing processes support agility. Therefore, this study aims to expose...

    Pełny tekst do pobrania w portalu

  • Mutual Interaction between Temperature and DO Set Point on AOB and NOB Activity during Shortcut Nitrification in a Sequencing Batch Reactor in Terms of Energy Consumption Optimization

    Publikacja

    - ENERGIES - Rok 2020

    Recently, many wastewater treatment plants (WWTPs) have had to deal with serious problems related to the restrictive requirements regarding the euent quality, as well as significant energy consumption associated with it. In this situation, mainstream deammonification and/or shortened nitrification-denitrification via nitrite (so-called “nitrite shunt”) is a new promising strategy. This study shows the mechanisms and operating conditions...

    Pełny tekst do pobrania w portalu

  • On Software Unit Testing For Security and Performance Gain At Unit Level

    Publikacja

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • On Software Unit Testing For Improving Security And Performance Of Distributed Applications

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • TB11 test for short w-beam road barrier

    FEM (Finite Element Method) is well-suited and widely used tool for simulating a range of phenomena: from these with simple and static behaviour, up to those complicated, highly nonlinear and involving many contacts. In present paper we use one of the advantages of FEM: parametric study could be easily performed and is more economical than series of in-situ tests. If recommended practices is carefully followed, results obtained...

    Pełny tekst do pobrania w portalu