Filtry
wszystkich: 30210
-
Katalog
- Publikacje 6062 wyników po odfiltrowaniu
- Czasopisma 715 wyników po odfiltrowaniu
- Konferencje 173 wyników po odfiltrowaniu
- Wydawnictwa 3 wyników po odfiltrowaniu
- Osoby 250 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 25 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Kursy Online 191 wyników po odfiltrowaniu
- Wydarzenia 25 wyników po odfiltrowaniu
- Dane Badawcze 22764 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS.
-
J-lossless and extended J-lossless factorisations approach for delta do main Hinf control.
Publikacja.
-
Smart and resilient cities- new challanges for Polish cities in terms of 2020 energy efficiency and climate action
PublikacjaGlobal climate change action along with energy efficiency optimizations are becoming increasingly pressing principles in terms of moving towards sustainable development. As a member of EU and UN Poland is also obliged to follow restricted rules concerning energy efficiency of buildings which come to force in 2020. To meet new goals, innovative approaches - like moving towards smart and resilient cities -may be required. Through...
-
Processing of musical data employing rough sets and artificial neural networks
PublikacjaArtykuł opisuje założenia systemu automatycznej identyfikacji muzyki i dźwięków muzycznych. Dokonano przeglądu standardu MPEG-7, ze szczególnym naciskiem na parametry opisowe dźwięku. Przedyskutowano problemy analizy danych audio, związane z zastosowaniami wykorzystującymi MPEG-7. W oparciu o eksperymenty przedstawiono efektywność deskryptorów niskiego poziomu w automatycznym rozpoznawaniu dźwięków instrumentów muzycznych. Przedyskutowano...
-
Processing of musical data employing rough sets and artificial neural networks
PublikacjaArtykuł opisuje założenia systemu automatycznej identyfikacji muzyki i dźwięków muzycznych. Dokonano przeglądu standardu MPEG-7, ze szczególnym naciskiem na parametry opisowe dźwięku. Przedyskutowano problemy analizy danych audio, związane z zastosowaniami wykorzystującymi MPEG-7. W oparciu o eksperymenty przedstawiono efektywność deskryptorów niskiego poziomu w automatycznym rozpoznawaniu dźwięków instrumentów muzycznych. Przedyskutowano...
-
SMART AND RESILIENT CITIES – NEW CHALLENGES FOR POLISH CITIES IN TERMS OF 2020 BUILDING ENERGY EFFICIENCY AND CLIMATE CHANGE ACTION.
PublikacjaGlobal climate change action along with energy efficiency optimizations are becoming increasingly pressing principles in terms of moving towards sustainable development. As a member of EU and UN Poland is also obliged to follow restricted rules concerning energy efficiency of buildings which come to force in 2020. To meet new goals, innovative approaches - like moving towards smart and resilient cities -may be required. Through...
-
Quantum security and theory of decoherence
PublikacjaWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Implementation of AES cryptography alghoritm in FPGA
PublikacjaW artykule przedstawiono porównanie dwóch realizacji algorytmu kryptograficznego AES w układzie programowalnym FPGA. W pierwszej wersji zrealizowano algorytm prosty i odwrotny łącznie z modułami sprzętowej realizacji rozwijania klucza. W drugiej wersji klucze są rozwijane programowo poprzez wbudowany procesor. Obie realizacje zostały przetestowane praktycznie na płytce prototypowej. Przedstawiono osiągnięte przepustowości jak również...
-
Minimal 2-dominating sets in Trees
PublikacjaWe provide an algorithm for listing all minimal 2-dominating sets of a tree of order n in time O(1.3247^n). This leads to that every tree has at most 1.3247^n minimal 2-dominating sets. We also show that thisbound is tight.
-
Minimal double dominating sets in trees
PublikacjaWe provide an algorithm for listing all minimal double dominating sets of a tree of order $n$ in time $\mathcal{O}(1.3248^n)$. This implies that every tree has at most $1.3248^n$ minimal double dominating sets. We also show that this bound is tight.
-
Algorithms for spatial analysis and interpolation of discrete sets of Critical Infrastructure hazard data
PublikacjaNowo opracowane zaawansowane narzędzia technologii informacyjnych i komunikacyjnych (TIK) ujawniają swoją przydatność do przewidywania różnego rodzaju zagrożeń oraz minimalizowania związanego z nimi potencjalnego ryzyka. Jednakże większość tych narzędzi operuje jedynie na niektórych typach infrastruktury i zaniedbuje ich przestrzenne interakcje z otoczeniem oraz innymi strukturami. Niniejszy artykuł zawiera propozycje kilku algorytmów...
-
Chemometric exploration of sea water chemical component data sets with missing elements
Publikacja -
Application of the Msplitmethod for filtering airborne laser scanning data-sets to estimate digital terrain models
PublikacjaALS point cloud filtering involves the separation of observations representing the physical terrain surface from those representing terrain details. A digital terrain model (DTM) is created from a subset of points representing the ground surface. The accuracy of the generated DTM is influenced by several factors, including the survey method used, the accuracy of the source data, the applied DTM generation algorithm, and the survey...
-
EVALUATION OF THE ENERGY SECURITY AS A COMPONENT OF NATIONAL SECURITY OF THE COUNTRY
Publikacja -
Managing enterprise IT infrastructure and security 2022
Kursy OnlineThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
Experimental Research of an Axial Piston Pump with Displaced Swash Plate Axis of Rotation
PublikacjaThe article describes the influence of displacement of the swash plate rotation axis on the efficiency of axial piston pumps. The dead space volume was defined as the volume of the working chamber in the extreme position of the piston at the end of the pumping phase and its variability was determined as a function of the position of the axis of rotation of the swash plate and the swing angle of swash plate. The influence of swash...
-
Measurement of idlers rotation speed in belt conveyors based on image data analysis for diagnostic purposes
Publikacja -
Modeling of Human Tissue for Medical Purposes
PublikacjaThe paper describes the possibilities offered for medicine by modeling of human tissue using virtual and augmented reality. It also presents three proposals of breast modeling for the use in clinical practice. These proposals are the result of arrangements of medical and computer scientists team (the authors) and will be pursued and implemented in the near future. There is included also a brief description of the most popular methods...
-
A Highly Sensitive Planar Microwave Sensor for Detecting Direction and Angle of Rotation
PublikacjaThis article presents a technique based on a modified complementary split-ring resonator (CSRR) to detect angular displacement and direction of rotation with high resolution and sensitivity over a wide dynamic range. The proposed microwave planar sensor takes advantage of the asymmetry of the sensor geometry and measures the angle of rotation in terms of the change in the relative phase of the reflection coefficients. The sensor...
-
Trees having many minimal dominating sets
PublikacjaWe provide an algorithm for listing all minimal dominating sets of a tree of order n in time O(1.4656^n). This leads to that every tree has at most 1.4656^n minimal dominating sets. We also give an infinite family of trees of odd and even order for which the number of minimal dominating sets exceeds 1.4167^n, thus exceeding 2^{n/2}. This establishes a lower bound on the running time of an algorithm for listing all minimal dominating...
-
On quantum cryptography with bipartite bound entangled states
PublikacjaOstatnio pokazano bezpośrednie zastosowanie splątania związanego w kryptografii kwantowej. W niniejszym artykule dokonano przeglądu niektórych najnowszych osiągnięć dotyczących tego zagadnienia. W szczególności przypomniano istotne pojęcia i definicje. Ponadto podano nową konstrukcję stanów o splątaniu związanym, posiadających bezpieczne korelacje, dostarczając w ten sposób niskowymiarowe (6x6) stany o splątaniu związanym z niezerowym...
-
Global defensive sets in graphs
PublikacjaIn the paper we study a new problem of finding a minimum global defensive set in a graph which is a generalization of the global alliance problem. For a given graph G and a subset S of a vertex set of G, we define for every subset X of S the predicate SEC ( X ) = true if and only if | N [ X ] ∩ S | ≥ | N [ X ] \ S | holds, where N [ X ] is a closed neighbourhood of X in graph G. A set S is a defensive alliance if and only if for...
-
Reconfiguring Minimum Dominating Sets in Trees
PublikacjaWe provide tight bounds on the diameter of γ-graphs, which are reconfiguration graphs of the minimum dominating sets of a graph G. In particular, we prove that for any tree T of order n ≥ 3, the diameter of its γ-graph is at most n/2 in the single vertex replacement adjacency model, whereas in the slide adjacency model, it is at most 2(n − 1)/3. Our proof is constructive, leading to a simple linear-time algorithm for determining...
-
Innovative Web-Based Geographic Information System for Municipal Areas and Coastal Zone Security and Threat Monitoring Using EO Satellite Data
PublikacjaThe paper presents a novel design of a Web-based Safe City & Coastal Zone GIS (SCCZ-GIS). The system integrates data acquired from different remote sensing and geospatial data sources for the purpose monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilises several innovative technologies and solutions, and is capable of direct co-operation with different remote sensing data sources...
-
A survey of medical researchers indicates poor awareness of research data management processes and a role for data librarians
Publikacja -
THE ROLE OF INFERENCE IN MOBILE MEDICAL APPLICATION DESIGN
PublikacjaIn the early 21st century, artificial intelligence began to be used to process medical information. However, before this happened, predictive models used in healthcare could only consider a limited number of variables, and only in properly structured and organised medical data. Today, advanced tools based on machine learning techniques - which, using artificial neural networks, can explore extremely complex relationships - and...
-
NMR-Based Structural Insight into DNA G-Quadruplex
PublikacjaEmerging as a promising area in anticancer research, noncanonical DNA structures such as G-quadruplexes are studied using NMR spectroscopy. NOESY spectra reveals crucial interactions between ligands and G-quadruplexes, helping to understand non-covalent binding mechanisms. This knowledge is essential for rational drug design targeting these structures.
-
Integrated spatial and energy planning – importance of a problem for contemporary architects and urban planners with focus on environmental factors
PublikacjaAlong with respecting basic sustainable development goals, planners will also be obliged to meet more stringent provisions related to energy efficiency in the coming years. In Poland, a crucial year will be 2021, when the EU directive on the energy efficiency of buildings comes into force. In this matter, not only the characteristics of individual objects are of great importance, but their whole complexes and the overall approach...
-
Convergence of expansions in Schrödinger and Dirac eigenfunctions, with an application to the R-matrix theory
PublikacjaW pracy zbadano właściwości rozwinięć w szeregi funkcji własnych dla zagadnień Schrödingera i Diraca. Potwierdzono obserwacje poczynione wcześniej przez Rosenthala oraz przez Szmytkowskiego i Hinze, że szereg funkcyjny występujący w teorii R-macierzy dla cząstek Diraca w ogólności nie zbiega do funkcji ciągłej.
-
Application of Msplit method for filtering airborne laser scanning data sets to estimate digital terrain models
PublikacjaALS point cloud filtering involves the separation of observations representing the physical terrain surface from those representing terrain details. A digital terrain model (DTM) is created from a subset of points representing the ground surface. The accuracy of the generated DTM is influenced by several factors, including the survey method used, the accuracy of the source data, the applied DTM generation algorithm, and the survey...
-
Some Security Features of Selected IoT Platforms
PublikacjaIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
Influence of the position of the swash plate rotation axis on the volumetric efficiency of the axial pistons pumps
PublikacjaThe article describes the influence of the position of the swash plate axis of rotation on the size of the dead space and the volumetric efficiency of the axial pistons pump. Superposition of the two motions have been proposed - the rotation of the swash plate with respect to axis intersecting the axis of rotation of the pump shaft and the shifts of swash plate yielding a result of the rotation axis offset effect. In the article...
-
Ukraine’s Energy Security in Strategies
PublikacjaDuring the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublikacjaThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Energy Security of Polish Consumers in 2004-2021
Dane BadawczeEnergy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. In the years 2004–2021, energy security of the individual consumer in the economic dimension significantly improved. This was due to several factors:1....
-
GPU-Accelerated Finite-Element Matrix Generation for Lossless, Lossy, and Tensor Media [EM Programmer's Notebook]
PublikacjaThis paper presents an optimization approach for limiting memory requirements and enhancing the performance of GPU-accelerated finite-element matrix generation applied in the implementation of the higher-order finite-element method (FEM). It emphasizes the details of the implementation of the matrix-generation algorithm for the simulation of electromagnetic wave propagation in lossless, lossy, and tensor media. Moreover, the impact...
-
Security Mechanisms in the Comcute System
PublikacjaThe aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.
-
Active Dynamic Thermography in Medical Diagnostics
PublikacjaThis is an overview of active thermal imaging methods in medical diagnostics using external thermal stimulation. In this chapter, several clinical cases diagnosed using the active dynamic thermography method, ADT, are presented. Features of this technology are discussed and main advantages underlined. Applications in skin burn diagnostics and quantitative evaluation leading to modern classification of burned patients for further...
-
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublikacjaML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
Rafał Leszczyna dr hab. inż.
OsobyDr hab. inż. Rafał Leszczyna jest profesorem uczelni na Wydziale Zarządzania i Ekonomii Politechniki Gdańskiej. W lipcu 2020 r., na podstawie osiągnięcia naukowego w obszarze zarządzania cyberbezpieczeństwem infrastruktur krytycznych w sektorze elektroenergetycznym, uzyskał stopień doktora habilitowanego w dziedzinie nauk inżynieryjno-technicznych, dyscyplina informatyka techniczna i telekomunikacja. W latach 2004–2008 pracował...
-
ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS
PublikacjaThe article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Process layout planning and optimised product range selection in manufacture of wooden construction sets
PublikacjaThis paper introduces a systematic deterministic framework for planning and the analysis of facility layouts aimed at manufacturing a variety of parts, as components of specific end products. The essence of the proposed approach lies in the decomposition of a traditional job-shop into layout modules of generic material flow patterns, that inherently yields improved efficiency of the entire system. It entails the use of a relevant...
-
Hardware cryptography coprocessor for system on chip soft processor
PublikacjaW artykule przedstawiono realizację sprzętową i programową szyfrującejo i deszyfrującego algorytmu AES.Obydwie implementacje zostały zralizowane z wykorzystaniem układu Virtex II i przetestowane. Jako kryterium porónawcze wybrano zużycie zasobów układu oraz wydajność. Realizacja sprzętowa wykonuje operację szyfrowania 2 dekady szybcie niż wersja programowa, ale wymaga pięciokrotnie więcej zasobówIn this paper hardware and software...
-
Roland Wesolowski Ph.D.
Osoby -
Electronic Noses in Medical Diagnostics
PublikacjaElectronic nose technology is being developed in order to identify aromas in a way parallel to the biologic olfaction. When applied to the field of medicine, such device should be able to identify and discriminate between different diseases. In recent years this kind of approach finds application in medical diagnostics, and especially in disease screening. Despite the fact that devices utilizing chemical sensor arrays are not routinely...
-
Dependable Integration of Medical Image Recognition Components
PublikacjaComputer driven medical image recognition may support medical doctors in the diagnosis process, but requires high dependability considering potential consequences of incorrect results. The paper presentsa system that improves dependability of medical image recognition by integration of results from redundant components. The components implement alternative recognition algorithms of diseases in thefield of gastrointestinal endoscopy....
-
Art and Healthcare - Healing Potential of Artistic Interventions in Medical Settings
PublikacjaThe stereotype of a machine for healing seems to be well rooted in common thinking and social perception of hospital buildings. The technological aspect of healthcare architecture has been influenced for several years by three major factors. The first is linked to the necessity of providing safety and security in the environment of elevated epidemiological risk. The second concerns the need for incorporating advanced technology...
-
Extendable Safety and Security Ontology
PublikacjaSecurity plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...
-
Areas of research in maritime security
PublikacjaW referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.
-
Application of Intuitionistic Fuzzy Sets to the assessment of technical university students
PublikacjaThe article proposes application of artificial intelligence methods to assess students of technical universities. The level of achieved educational goals can be assessed using measurements based on the idea of Fuzzy Intuitionistic Sets (IFS). A classification algorithm was developed and an exemplary distribution of the criteria values using IFS was presented. The application of the proposed approach in online education can enrich...