Filtry
wszystkich: 2144
wybranych: 1461
-
Katalog
- Publikacje 1461 wyników po odfiltrowaniu
- Czasopisma 21 wyników po odfiltrowaniu
- Konferencje 6 wyników po odfiltrowaniu
- Osoby 28 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 34 wyników po odfiltrowaniu
- Wydarzenia 4 wyników po odfiltrowaniu
- Dane Badawcze 580 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: SECRET-KEY
-
KU812 basophils express urocortin, CRH-R, MC1R and steroidogenic enzymes and secrete progesterone
Publikacja -
Acoustic analysis of selected sacred buildings in Szczecin
Publikacja -
The conception of secure and efficient process of migration into IPv6
PublikacjaZe względu na wady rozwiązań opartych o tunelowanie, w pracy zaproponowano koncepcję przejścia z IPv4 do IPv6 nie wymagającą od dostawców usług internetowych wzajemnej współpracy, nie narażoną na ataki związane z przekaźnikami, wzajemnym zaufaniem ISP. W koncepcji tej ograniczono tunelowanie do obszaru jednego ISP. W pracy wskazano istotne elementy ograniczające możliwość i zasadność wprowadzania mechanizmów tunelowania. Wskazano...
-
The methods of secure data transmission in the KNX system
PublikacjaThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Secure Quaternion Feistel Cipher for DICOM Images
PublikacjaAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
Secured wired BPL voice transmission system
PublikacjaDesigning a secured voice transmission system is not a trivial task. Wired media, thanks to their reliability and resistance to mechanical damage, seem an ideal solution. The BPL (Broadband over Power Line) cable is resistant to electricity stoppage and partial damage of phase conductors, ensuring continuity of transmission in case of an emergency. It seems an appropriate tool for delivering critical data, mostly clear and understandable...
-
XXIV Aukcja Wielkie Serce
Publikacja -
XXVIII Aukcja Wielkie Serce
PublikacjaAukcja to wyjątkowa okazja dla miłośników i kolekcjonerów polskiej sztuki współczesnej. Kolejny raz będzie można obcować z dziełami artystów, którzy tworzą kanon, są „żywą encyklopedią” grafiki i malarstwa polskiego. Od początku lat 90. ubiegłego stulecia, organizatorzy aukcji szczycą się i zaufaniem najwybitniejszych polskich twórców. Pieniądze z licytacji ich dzieł, jak co roku, przekazane zostaną na rzecz wychowanków Specjalnego...
-
The IP vs. VDE competition as a key factor determining the stability of the MgBX5 (X = F, Cl) compounds
Publikacja -
The molecular function of kallikrein‐related peptidase 14 demonstrates a key modulatory role in advanced prostate cancer
Publikacja -
Non-Dioxin-Like PCBs – the Key Air Pollutant Associated with Lung Cancer in 15 Cities in Silesia
Publikacja -
Preparing samples for analysis - the key to analytical success=Przygotowanie próbek do analizy - droga do sukcesu
PublikacjaW artykule przedstawiono i dokonano krytycznego omówienia informacji literaturowych na temat poszczególnych etapów przygotowania próbek środowiskowych do etapu oznaczeń końcowych analitów występujących w tych próbkach na niskich poziomach zawartości.Szczególną uwagę zwrócono na:- Wyzwania związane z analityką specjacyjną,- Nowoczesne techniki ekstrakcji i wzbogacania analitów,- Możliwość zastosowania ultradźwięków oraz promieniowania...
-
Pedestrian protection, speed enforcement and road network structure the key action for implementing Poland's Vision Zero
PublikacjaSince 1991 Poland's road safety has been systematically improving with a 60% reduction in road deaths. Despite the progress Poland continues to be one of the European Union' worst performing countries. The country's main road safety problems remain unchanged: dangerous behaviour of road users, underdeveloped system of road safety management and low quality of road infrastructure. This is why subsequent road safety programmes (implemented...
-
Inverse Analysis as a Key Element of Safety Assessment under the Snow Load For The Large Suspension Roofs Structure
PublikacjaThe paper presents a concept and realization of monitoring system for the Silesian Stadium in Chorzow. The idea of the system lies in fusion of structure monitoring with a calibrated numerical FEM model [1]. The inverse problem is solved. On the base of measured selected displacements, the numerical FEM model of the structure combined with iterative method, develops the current snow load distribution. Knowing the load, we can calculate...
-
The secure transmission protocol of sensor Ad Hoc network
PublikacjaThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Edge-Computing based Secure E-learning Platforms
PublikacjaImplementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...
-
Localization of key amino acid residues in the dominant conformational epitopes on thyroid peroxidase recognized by mouse monoclonal antibodies
Publikacja -
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublikacjaIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
The valance state of vanadium-key factor in the flexibility of potassium vanadates structure as cathode materials in Li-ion batteries
PublikacjaPotassium hexavanadate (K2V6O16·nH2O) nanobelts have been synthesized by the LPE-IonEx method, which is dedicated to synthesis of transition metal oxide bronzes with controlled morphology and structure. The electrochemical performance of K2V6O16·nH2O as a cathode material for lithium-ion batteries has been evaluated. The KVO nanobelts demonstrated a high discharge capacity of 260 mAh g−1, and long-term cyclic stability up to 100...
-
Human serum interactions with phenolic and aroma substances of Kaffir(Citrus hystrix) and Key lime (Citrus aurantifolia) juices
PublikacjaTo understand the therapeutic application of polyphenols extracted from Kaffir (PolKaf) and Key (PolKey) limesdifferent analytical methods were applied. Based on quantitative analysis by two dimensional gas chromato-graphy (GC×GC) and time of flight mass spectrometry (TOFMS) it can be observed that the biggest differencesin the contents of selected terpenes of Kaffir and Key limes occur in chemical compounds such as limonene, citraland...
-
Malarstwo jest okey. - Jan Buczkowski
PublikacjaKatalog towarzyszący wystawie "Malarstwo jest okey" w Foyer Opery Bałtyckiej w Gdańsku w ramach 3. edycji Festiwalu Kultury Trójmiasta "Metropolia jest okey", który odbył się w dniach 26-30.12.2009. Katalog liczy 120 stron i zawiera tekst krytyczny w języku polskim i angielskim, noty biograficzne artystów w języku polskim i angielskim oraz 55 kolorowych reprodukcji prac artystów (prace autorów: J. Buczkowski s. 16-17, D. Krechowicz...
-
Malarstwo jest okey. - Janusz Osicki
PublikacjaKatalog towarzyszący wystawie "Malarstwo jest okey" w Foyer Opery Bałtyckiej w Gdańsku w ramach 3. edycji Festiwalu Kultury Trójmiasta "Metropolia jest okey", który odbył się w dniach 26-30.12.2009. Katalog liczy 120 stron i zawiera tekst krytyczny w języku polskim i angielskim, noty biograficzne artystów w języku polskim i angielskim oraz 55 kolorowych reprodukcji prac artystów (prace autorów: J. Buczkowski s. 16-17, D. Krechowicz...
-
Malarstwo jest okey. - Krzysztof Wróblewski
PublikacjaKatalog towarzyszący wystawie "Malarstwo jest okey" w Foyer Opery Bałtyckiej w Gdańsku w ramach 3. edycji Festiwalu Kultury Trójmiasta "Metropolia jest okey", który odbył się w dniach 26-30.12.2009. Katalog liczy 120 stron i zawiera tekst krytyczny w języku polskim i angielskim, noty biograficzne artystów w języku polskim i angielskim oraz 55 kolorowych reprodukcji prac artystów (prace autorów: J. Buczkowski s. 16-17, D. Krechowicz...
-
Malarstwo jest okey. -Dominika Krechowicz
PublikacjaKatalog towarzyszący wystawie "Malarstwo jest okey" w Foyer Opery Bałtyckiej w Gdańsku w ramach 3. edycji Festiwalu Kultury Trójmiasta "Metropolia jest okey", który odbył się w dniach 26-30.12.2009. Katalog liczy 120 stron i zawiera tekst krytyczny w języku polskim i angielskim, noty biograficzne artystów w języku polskim i angielskim oraz 55 kolorowych reprodukcji prac artystów (prace autorów: J. Buczkowski s. 16-17, D. Krechowicz...
-
Neue erfahrungen mit der KEM
Publikacja..
-
Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart Cities
PublikacjaIn relation to smart city planning and management, processing huge amounts of generated data and execution of non-lightweight cryptographic algorithms on resource constraint devices at disposal, is the primary focus of researchers today. To enable secure exchange of data between cloud networks and mobile devices, in particular smart hand held devices, this paper presents Blockchain based approach that disperses a public/free key...
-
Polymeric membrane-modified voltammetric sensors for lipophilic analytes with nanomolar detection limit: Key parameters influencing the response characteristics
Publikacja -
The evaluation of COD fractionation and modeling as a key factor for appropriate optimization and monitoring of modern cost-effective activated sludge systems
PublikacjaA study was conducted to characterize the raw wastewater entering a modern cost effective municipal WWTP in Poland using two approaches; 1) a combination of modeling and carbonaceous oxygen demand (COD) fractionation using respirometric test coupled with model estimation (RTME) and 2) flocculation/filtration COD fractionation method combined with BOD measurements (FF-BOD). It was observed that the particulate fractions of COD obtained...
-
Quantum states representing perfectly secure bits are always distillable
PublikacjaW pracy pokazano, że ostatnio wprowadzone stany kwantowe reprezentujące perfekcyjnie bezpieczny bit klucza kryptograficznegooraz ich wielocząstkowe i wielowymiarowe uogólnienia zawsze reprezentują destylowalne splątanie. Podano ograniczenia dolne na wielkość destylowalnego splątania. Ponadto podano alternatywny dowód faktu, że koszt splątania jest ograniczeniem górnym na wielkość destylowalnego klucza kryptograficznego w dwucząstkowym...
-
Secure transmission of visual image in the VTS system using fingerprinting
Publikacja -
A Concept of Using Knowledge Models to Secure Intellectual Capital in Enterprise
PublikacjaWithout a doubt, knowledge has become the most important resource for all companies in the world. Knowledge extended of our own observations and practice is being called experience. With the increase of knowledge and gained experience, the individual becomes more and more valuable employee in terms of business. The above mentioned knowledge can be gained only by self-improvement, which requires time and other necessary elements...
-
Technical Limitations in Merging Secular and Sacred Functions in Monumental Churches
PublikacjaThe abandonment of churches and their adaptation for secular purposes is a current subject in Europe and worldwide. Most cases involve objects that were desacralized and then rebuilt as a whole object for alternative functions. Thus far, the merging of secular and sacred functions in one monumental Catholic church has not raised any issues. The paper describes the case of St. Catherine’s Church in Gdansk, Poland, where sacred function...
-
Experimental Extraction of Secure Correlations from a Noisy Private State
PublikacjaWe report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies...
-
Serce miasta jako muzeum sztuki narodowej
PublikacjaSerce miasta to przestrzeń obok bycia gdzieś, będąca kiedyś. Tak rozumiana specyfika serca miasta prowadzi do pytania o jego kompozycję rozgrywającą się w wymiarze czasowym. Rytmiczność i unikatowość składają się na kompozycję serca miasta rozumianą jako uporządkowana przestrzeń wydarzeń. Te cechy zbliżają myślenie o sercu miasta i rozumienie jego specyfiki do współczesnych teorii kształtowania muzeum sztuki. Współczesne muzeum...
-
Advanced field investigations of screw piles and columns
PublikacjaPrzedstawiono opis badań pali i kolumn wkręcanych na terenowym poletku doświadczalnym, wykonanych w ramach projektu badawczego MNiSW. Badania statyczne pali i kolumn wykonano z zaawansowanym systemem do pomiaru rozkładu siły wzdłuż trzonów. Przedstawiono podstawowe wyniki badań z rozdziałem obciążenia na podstawę i pobocznicę pali i kolumn.
-
Interplay between Structure and Charge as a Key to Allosteric Modulation of Human 20S Proteasome by the Basic Fragment of HIV-1 Tat Protein
Publikacja -
SiC-based phase-shift dual half bridge DC-DC converter as a key component of multilevel cascaded MV converters
PublikacjaThe paper describes SiC-based dual half bridge (DHB) DC-DC converter considered as a key component of high frequency isolated multilevel cascaded medium voltage converters. Two topologies of bi-directional DC-DC converters: the resonant half-bridge DC-DC converter and the phase-shift DHB converter are compared in the paper. Experimental results of SiC-based 50 kHz DHB DC-DC converter are presented in the paper.
-
The advanced monitoring as a key factor for appropriate optimization and control of full-scale activated sludge systems – case study Debogorze WWTP.
PublikacjaComputer simulation has become a helpful tool in wastewater treatment systems performance and effectiveness analysis. Advanced monitoring, by using appropriate software, enables to create a mathematical model of a real wastewater treatment plant (WWTP), run a simulation and subsequently interpret results under various conditions. An operation of WWTP is usually controlled by global parameters such as flow, solids retention time,...
-
Forgotten academic modernism in the reconstruction of downtown Le Havre by Auguste Perret
Publikacja -
Decision Regret after Laparoscopic Sleeve Gastrectomy—5 Years’ Perspective
Publikacja -
Distributed measurement system with data transmission secured using XXTEA algorithm
PublikacjaThe paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublikacjaDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
FEM modelling of screw displacement pile interaction with subsoil
PublikacjaPredicting the-settlement characteristics of piles is an important element in the designing of pile foundations. The most reliable method in evaluating pile-soil interaction is the static load test, preferably performed with instrumentation for measuring shaft and pile base resistances. This, however, is a mostly post-implementation test. In the design phase, prediction methods are needed, in which numerical simulations play an...
-
Photophysics of Soret-Excited Tin(IV) Porphyrins in Solution
PublikacjaThe photophysics of low-chlorin tin(IV) tetraphenylporphyrin dihydroxide, a core building block for axially substituted supramolecular tin porphyrin constructs, has been studied in a variety of hydrogen-bonding, nonpolar, and aprotic polar solvents using steady-state, nanosecond, and femtosecond time-resolved emission, and femtosecond time-resolved absorption methods. In hydrogen-bonding solvents the metalloporphyrin exists as...
-
Key-Marker Volatile Compounds in Aromatic Rice (Oryza sativa) Grains: An HS-SPME Extraction Method Combined with GC×GC-TOFMS
PublikacjaThe aroma of rice essentially contributes to the quality of rice grains. For some varieties, their aroma properties really drive consumer preferences. In this paper, using a dynamic headspace solid-phase microextraction (HS-SPME) system coupled to a two-dimensional gas chromatography (GC×GC) using a time-of-flight mass spectrometric detector (TOFMS) and multivariate analysis, the volatile compounds of aromatic and non-aromatic...
-
Quantum privacy witness
PublikacjaWhile it is usually known that the mean value of a single observable is enough to detect entanglement or its distillability, the counterpart of such an approach in the case of quantum privacy has been missing. Here we develop the concept of a privacy witness, i.e., a single observable that may detect the presence of the secure key even in the case of bound entanglement. Then we develop the notion of secret-key estimation based...
-
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile
PublikacjaThe paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...
-
Influenza vaccination: key facts for general practitioners in Europe—a synthesis by European experts based on national guidelines and best practices in the United Kingdom and the Netherlands
Publikacja -
Carvacrol as a Stimulant of the Expression of Key Genes of the Ginsenoside Biosynthesis Pathway and Its Effect on the Production of Ginseng Saponins in Panax quinquefolium Hairy Root Cultures
Publikacja -
Cavitation based cleaner technologies for biodiesel production and processing of hydrocarbon streams: A perspective on key fundamentals, missing process data and economic feasibility – A review
PublikacjaThe present review emphasizes the role of hydrodynamic cavitation (HC) and acoustic cavitation in clean and green technologies for selected fuels (of hydrocarbon origins such as gasoline, naphtha, diesel, heavy oil, and crude oil) processing applications including biodiesel production. Herein, the role of cavitation reactors, their geometrical parameters, physicochemical properties of liquid media, liquid oxidants, catalyst loading,...