Wyniki wyszukiwania dla: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS. - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS.

Wyniki wyszukiwania dla: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS.

  • Piotr Szczuko dr hab. inż.

    Dr hab. inż. Piotr Szczuko w 2002 roku ukończył studia na Wydziale Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej zdobywając tytuł magistra inżyniera. Tematem pracy dyplomowej było badanie zjawisk jednoczesnej percepcji obrazu cyfrowego i dźwięku dookólnego. W roku 2008 obronił rozprawę doktorską zatytułowaną "Zastosowanie reguł rozmytych w komputerowej animacji postaci", za którą otrzymał nagrodę Prezesa Rady...

  • An integrated framework for security protocol analysis

    Publikacja

    - Rok 2008

    Assurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...

  • Security and Defence Quarterly

    Czasopisma

    ISSN: 2300-8741 , eISSN: 2544-994X

  • Security and Anonymity in Agent Systems

    Publikacja

    - Rok 2012

    Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Mobile Security: Threats and Best Practices

    Publikacja

    - Mobile Information Systems - Rok 2020

    Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...

    Pełny tekst do pobrania w portalu

  • An Approach to Data Reduction for Learning from Big Datasets: Integrating Stacking, Rotation, and Agent Population Learning Techniques

    Publikacja

    - COMPLEXITY - Rok 2018

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles

    Publikacja

    - CYBERNETICS AND SYSTEMS - Rok 2019

    In this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Improving medical experts’ efficiency of misinformation detection: an exploratory study

    Publikacja
    • A. Nabożny
    • B. Balcerzak
    • M. Morzy
    • A. Wierzbicki
    • P. Savov
    • K. Warpechowski

    - WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS - Rok 2022

    Fighting medical disinformation in the era of the pandemic is an increasingly important problem. Today, automatic systems for assessing the credibility of medical information do not offer sufficient precision, so human supervision and the involvement of medical expert annotators are required. Our work aims to optimize the utilization of medical experts’ time. We also equip them with tools for semi-automatic initial verification...

    Pełny tekst do pobrania w portalu

  • A Microwave Sensor with Operating Band Selection to Detect Rotation and Proximity in the Rapid Prototyping Industry

    This paper presents a novel sensor for detecting and measuring angular rotation and proximity, intended for rapid prototyping machines. The sensor is based on a complementary split-ring resonator (CSRR) driven by a conductor-backed coplanar waveguide. The sensor has a planar topology, which makes it simple and cost-effective to produce and accurate in measuring both physical quantities. The sensor has two components, a rotor, and...

    Pełny tekst do pobrania w portalu

  • Security aspects in functional safety analysis

    A security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • An Algorithm for Listing All Minimal 2-Dominating Sets of a Tree

    We provide an algorithm for listing all minimal 2-dominating sets of a tree of order n in time O(1.3248n) . This implies that every tree has at most 1.3248 n minimal 2-dominating sets. We also show that this bound is tigh.

    Pełny tekst do pobrania w portalu

  • Resilience and Security in Software Defined Networking

    Publikacja
    • C. Mas Machuca
    • P. Vizarreta
    • R. Durner
    • J. Rak

    - Rok 2018

    This paper gives an overview of the most important issues on resilience and security in Software Defined Networking

    Pełny tekst do pobrania w serwisie zewnętrznym

  • An algorithm for listing all minimal double dominating sets of a tree

    Publikacja

    We provide an algorithm for listing all minimal double dominating sets of a tree of order $n$ in time $\mathcal{O}(1.3248^n)$. This implies that every tree has at most $1.3248^n$ minimal double dominating sets. We also show that this bound is tight.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Evolutionary Sets of Safe Ship Trajectories: Evaluation of Individuals

    The paper presents a description of the evaluation phase of the Evolutionary Sets of Safe Ship Trajectories method. In general, the Evolutionary Sets of Safe Ship Trajectories method combines some of the assumptions of game theory with evolutionary programming and finds an optimal set of cooperating trajectories of all ships involved in an encounter situation. While developing a new version of this method, the authors decided to...

    Pełny tekst do pobrania w portalu

  • A general isogeometric finite element formulation for rotation‐free shells with in‐plane bending of embedded fibers

    Publikacja

    This article presents a general, nonlinear isogeometric finite element formulation for rotation-free shells with embedded fibers that captures anisotropy in stretching, shearing, twisting, and bending - both in-plane and out-of-plane. These capabilities allow for the simulation of large sheets of heterogeneous and fibrous materials either with or without matrix, such as textiles, composites, and pantographic structures. The work...

    Pełny tekst do pobrania w portalu

  • Energy Security of Polish Consumers in 2004-2021

    Theoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...

    Pełny tekst do pobrania w portalu

  • Evolutionary Sets of Safe Ship Trajectories: Evaluation of Individuals

    Publikacja

    The paper presents a description of the evaluation phase of the Evolutionary Sets of Safe Ship Trajectories method. In general, the Evolutionary Sets of Safe Ship Trajectories method combines some of the assumptions of game theory with evolutionary programming and finds an optimal set of cooperating trajectories of all ships involved in an encounter situation. While developing a new version of this method, the au-thors decided...

  • A Mammography Data Management Application for Federated Learning

    Publikacja

    This study aimed to develop and assess an application designed to enhance the management of a local client database consisting of mammographic images with a focus on ensuring that images are suitably and uniformly prepared for federated learning applications. The application supports a comprehensive approach, starting with a versatile image-loading function that supports DICOM files from various medical imaging devices and settings....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The Sense of Security of the Prison Service Offi cers

    Publikacja

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Dynamika molekularna oddziaływań przeciwgrzybowych heptaenów aromatycznych i ich izomerów all-trans ze sterolami w błonach lipidowych

    Publikacja

    Aromatyczne heptaeny (AH) należą do grupy makrolidów polienowych o działaniu przeciwgrzybowym. Antybiotyki z tej grupy były pierwszymi, które zostały wykorzystane w terapii układowych infekcji grzybiczych. Amfoterycyna B (AmB) oraz nystatyna, czyli niearomatyczni przedstawiciele makrolidów heptaenowych, mają istotne znaczenie kliniczne w leczeniu, odpowiednio, grzybic wewnętrznych i zewnętrznych. Molekularne podstawy mechanizmu...

    Pełny tekst do pobrania w portalu

  • Integrated functional safety and cyber security analysis

    Publikacja

    - IFAC-PapersOnLine - Rok 2018

    The chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...

  • Client-side versus server-side geographic data processing performance comparison: Data and code

    Publikacja

    - Data in Brief - Rok 2019

    The data and code presented in this article are related to the research article entitled “Analysis of Server-side and Client-side Web-GIS data processing methods on the example of JTS and JSTS using open data from OSM and Geoportal” (Kulawiak et al., 2019). The provided 12 datasets include multi-point and multi-polygon data of different scales and volumes, representing real-world geographic features. The datasets cover the area...

    Pełny tekst do pobrania w portalu

  • Software Agents for Computer Network Security

    Publikacja

    - Rok 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Generalized Dold sequences on partially-ordered sets

    Publikacja

    - ELECTRONIC JOURNAL OF COMBINATORICS - Rok 2022

    Dold sequences constitute an important class of integer sequences that play an important role in combinatorics, number theory, topology and dynamical systems. We generalize the notion of Dold sequence for the case of partially ordered sets and describe their properties. In particular we give two alternative descriptions of generalized Dold sequences: by some class of elementary sequences as well as by different...

    Pełny tekst do pobrania w portalu

  • Standards on Cyber Security Assessment of Smart Grid

    Security evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...

    Pełny tekst do pobrania w portalu

  • Multichannel self-optimizing active noise control scheme

    Publikacja

    The problem of cancellation of a nonstationary sinusoidal interference, acting at the output of an unknown multivariable linear stable plant, is considered. The proposed cancellation scheme is a nontrivial extension of the SONIC (self-optimizing narrowband interference canceller) algorithm, developed earlier for single-input, single-output plants. In the important benchmark case - for disturbances with randomwalk-type amplitude...

  • Security ontology construction and integration

    Publikacja

    - Rok 2011

    There are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presentsgathered requirements needed to be taken into account when creating an ontology. The method of ontology creation...

  • Analysis of Vibration and Acoustic Signals for Noncontact Measurement of Engine Rotation Speed

    Publikacja
    • S. Xuansheng
    • T. Lu
    • H. Wen
    • R. Martinek
    • J. Smulko

    - SENSORS - Rok 2020

    The non-contact measurement of engine speed can be realized by analyzing engine vibration frequency. However, the vibration signal is distorted by harmonics and noise in the measurement. This paper presents a novel method for the measurement of engine rotation speed by using the cross-correlation of vibration and acoustic signals. This method can enhance the same frequency components in engine vibration and acoustic signal. After...

    Pełny tekst do pobrania w portalu

  • The design of an intelligent medical space supporting automated patient interviewing

    Publikacja

    The article presents the architecture and results of implementing an application for the intelligent medical space UbiDoDo (Ubiquitous Domestic Doctor's Office). The main purpose of the application is real-time monitoring of the biomedical parameters of a patient in his domestic environment. It allows an immediate reaction to appearing symptoms and provides means to automatically interview the patient and deliver his results to...

  • Influence of Fluid Compressibility and Movements of the Swash Plate Axis of Rotation on the Volumetric Efficiency of Axial Piston Pumps

    Publikacja

    - ENERGIES - Rok 2022

    This paper describes the design of a swash plate axial piston pump and the theoretical models describing the bulk modulus of aerated and non-aerated fluids. The dead space volume is defined and the influence of this volume and the fluid compressibility on the volumetric efficiency of the pump is considered. A displacement of the swash plate rotation axis is proposed to reduce the dead space volume for small swash plate swing angles....

    Pełny tekst do pobrania w portalu

  • Determining and verifying the safety integrity level with security aspects

    Publikacja

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Software modules and application layer's security structure of RSMAD

    The paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...

  • The Energy of Finance in Refining of Medical Surge Capacity

    Publikacja

    - ENERGIES - Rok 2021

    The availability of resources and their concentration in the place of greatest need, will not allow us to successfully overcome a medical surge without the energy required to activate these resources and activities, and increase their quantities if necessary, that is why the staff and management of healthcare institutions are forced to making ethical crisis decisions about who wins and who loses. This study highlights the versatility...

    Pełny tekst do pobrania w portalu

  • Neutrosophic Sets and Systems

    Czasopisma

    ISSN: 2331-6055

  • Logical Interface for Soft Handover – an effective scheme of handovers in Proxy Mobile IPv6

    Publikacja

    - Rok 2015

    Multimedia services are currently commonly available on mobile devices. Due to networks' convergence and migration to all-IP networks, mobility management at network layer is required. Moreover, nowadays it is popular to equip mobile devices with more than one wireless interface. Thus, soft handovers can be implemented, which means that an existing connection is removed after a new one is established. Usage of the Logical Interfaces...

  • Adapting Agile Practices to Security Context – Practitioners’ Perspective

    Publikacja

    In this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security Information Sharing for the Polish Power System

    Publikacja

    - Rok 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?

    This study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...

    Pełny tekst do pobrania w portalu

  • Machine Learning and Electronic Noses for Medical Diagnostics

    Publikacja

    The need for noninvasive, easy-to-use, and inexpensive methods for point-of-care diagnostics of a variety of ailments motivates researchers to develop methods for analyzing complex biological samples, in particular human breath, that could aid in screening and early diagnosis. There are hopes that electronic noses, that is, devices based on arrays of semiselective or nonselective chemical sensors, can fill this niche. Electronic...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Optimizing Medical Personnel Speech Recognition Models Using Speech Synthesis and Reinforcement Learning

    Text-to-Speech synthesis (TTS) can be used to generate training data for building Automatic Speech Recognition models (ASR). Access to medical speech data is because it is sensitive data that is difficult to obtain for privacy reasons; TTS can help expand the data set. Speech can be synthesized by mimicking different accents, dialects, and speaking styles that may occur in a medical language. Reinforcement Learning (RL), in the...

    Pełny tekst do pobrania w portalu

  • New Design of Axial Piston Pump with Displaced Swash Plate Axis of Rotation for Hydro-Mechanical Transmissions

    Publikacja

    This paper presents a prototype design of an axial piston pump with displaced swash plate axis of rotation in two directions of discharge with electronic control intended for installation on a hydraulic-mechanical gearbox dedicated to working machines. The effect of displacement of the swash plate rotation axis on dead space volume and volumetric efficiency is presented. The construction and principle of operation of the capacity...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Managing the security vulnerabilities of critical systems and hazardous plants

    Publikacja

    - Rok 2007

    Rozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....

  • Security-oriented agile approach with AgileSafe and OWASP ASVS

    Publikacja

    In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publikacja

    - Rok 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Focus on Misinformation: Improving Medical Experts’ Efficiency of Misinformation Detection

    Publikacja

    - Rok 2021

    Fighting medical disinformation in the era of the global pandemic is an increasingly important problem. As of today, automatic systems for assessing the credibility of medical information do not offer sufficient precision to be used without human supervision, and the involvement of medical expert annotators is required. Thus, our work aims to optimize the utilization of medical experts’ time. We use the dataset of sentences taken...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Endoscopy video analysis algorithms and their independence of rotation , brightness , contrast , color and blur

    The article presents selected image analysis algorithms for endoscopy videos. Mathematical methods that are part of these algorithms are described, and authors’ claims about the characteristics of these algorithms, such as the independence of rotation, brightness, contrast, etc. are mentioned. Using the common test on the real endoscopic image database and a set of image transformations, the validity of these claims was checked...

    Pełny tekst do pobrania w portalu

  • An improved frequency estimator for an adaptive active noise control scheme

    Publikacja

    An improved frequency tracker is proposed for the recently introduced self optimizing narrowband interference canceller (SONIC). The scheme is designed for disturbances with quasi-linear frequency modulation and, under second-order Gaussian random-walk assumption, can be shown to be statistically efficient. One real-world experiment and several simulations show that a considerable improvement in disturbance rejection may be achieved...

  • Wybrane problemy ochrony żeglugi (Maritime Security)

    Publikacja

    - Rok 2005

    przedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Pełny tekst do pobrania w portalu

  • The methods of secure data transmission in the KNX system

    The article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.

    Pełny tekst do pobrania w serwisie zewnętrznym