Filtry
wszystkich: 530
Wyniki wyszukiwania dla: CRYPTOGRAPHY PROTOCOLS
-
JMIR Research Protocols
Czasopisma -
An Idea Bag strategy to discourage selfish behavior under random token MAC protocols for wireless LANs
PublikacjaDla klasy protokołów MAC opartych na przypadkowo krążącym żetonie dononano rozdziału polityki wyłaniania zwycięzcy od strategii wyboru szczeliny dla żądania dostępu. Wyróżniono klasę protokołów RT/ECD, dla której zidentyfikowano typ wynikowej gry niekooperacyjnej. Pokazano, że gra ta zasadniczo różni się od wieloosobowego dylematu więźnia. Zaprojektowano heurystyczną strategię asymptotycznie zniechęcającą do zachowań egoistycznych...
-
Comparative analysis of IP-based mobility protocols and fast handover algorithms in IEEE 802.11 based WLANs
PublikacjaA rapid growth of IP-based networks and services created the vast collection of resources and functionality available to users by means of an uniform method of access - an IP protocol. At the same time, advances in design of mobile electronic devices allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Unfortunately, the base IP protocol does not perform...
-
Soft Real-Time Communication with WebSocket and WebRTC Protocols Performance Analysis for Web-based Control Loops
PublikacjaThe web browser has become an access window for content and services. The browser is available on almost any device connected to the network, regardless of its intended use: desktop, mobile device, computing server, e-book reader etc. Browsers are used by people to read news, contact the world, to check a bank account, register a visit at the doctor, watching video content, electronic purchases, using web versions of the office...
-
Optimization of the autoconfiguration mechanisms of the mobile stations supporting IPv6 protocol in the IEEE 802.16
PublikacjaCelem pracy jest analiza funkcjonowania procedur przełączania w sieciachWiMAX/IPv6, wybór mechanizmów będących powodem największych opóźnień izaproponowanie ich poprawy. Teza pracy dotyczy wykazania, że procesrekonfiguracji IPv6 w czasie przełączenia w sieciach 802.16 nie jestoptymalny i możliwe jest osiągnięcie zwiększonej wydajności przełączaniapoprzez modyfikację protokołów IPv6, DHCPv6 oraz Mobile IPv6. Na drodzedo osiągnięcia...
-
GnRH Antagonist Protocol Enhances Coagulation During Controlled Ovarian Stimulation for IVF
Publikacja -
Optimized Protocol for RNA Isolation from Penicillium spp. and Aspergillus fumigatus Strains
PublikacjaEfficient RNA isolation from filamentous fungi is crucial for gene expression studies, but it poses significant technical challenges due to the robust cell walls and susceptibility of RNA to degradation by ribonucleases. This study presents the effectiveness of two RNA isolation protocols for four species of filamentous fungi: Penicillium crustosum, Penicillium rubens, Penicillium griseofulvum, and Aspergillus fumigatus. Both protocols...
-
BDNF Val66Met Polymorphism, the Allele-Specific Analysis by qRT-PCR - a Novel Protocol
Publikacja -
Cost-Effectiveness of Open Repair of Abdominal Aortic Aneurysms with a Novel Perioperative Protocol
Publikacja -
Efficient micropropagation protocol of three cultivars of highbush blueberry (Vaccinium corymbosum L.)
Publikacja -
New Screening Protocol for Effective Green Solvents Selection of Benzamide, Salicylamide and Ethenzamide
PublikacjaNew protocol for screening efficient and environmentally friendly solvents was proposed and experimentally verified. The guidance for solvent selection comes from computed solubility via COSMO-RS approach. Furthermore, solute-solvent affinities computed using advanced quantum chemistry level were used as a rationale for observed solvents ranking. The screening protocol pointed out that 4-formylomorpholine (4FM) is an attractive...
-
Effect of Plant Growth Regulators and Lights on Micropropagation Protocol for Quisqualis indica L.
Publikacja -
An incentive-based forwarding protocol for mobile ad hoc networks with anonymous packets
PublikacjaPrzekazywanie pakietów w sieciach ad hoc z transmisją wieloetapową zależy od współpracy ruchomych terminali oraz stworzenia właściwego systemu motywacyjnego. Zaproponowany protokół wykorzystuje elementy podejścia systemu reputacyjnego dla stworzenia funkcji wypłaty w grze niekooperacyjnej, w której strategie dotyczą konfiguracji progu admisji pakietów źródłowych w stacjach. Dla symetrycznego modelu sieci pokazano, że istnieją punkty...
-
The model of end-to-end call setup time calculation for Session Initiation Protocol
PublikacjaEnd-to-end call setup delay is one of the most important grade of service (GoS) parameters for VoIP networks with Session Initiation Protocol (SIP). A typical subscriber wants to have a connection established as soon as possible. From the operator's perspective call setup time is also crucial because he needs to know how probability of successful packet transmission on SIP links is related to a call setup delay. Then he can make...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublikacjaA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
A random access protocol under backoff attack: performance and game-theoretic deterrent
PublikacjaPrzedstawiono metodę obrony przed atakiem na protokół CSMA/CA, opartą na generacji sekwencji zagłuszających z wykorzystaniem wzajemnej słyszalności stacji. Na podstawie analizy wypłat odpowiedniej gry w formie rozwiniętej pokazano możliwość osiągania punktu równowagi odpowiadającego standardowym ustawieniom protokołu.
-
Reduction in the level of antibodies against heat shock proteins 60 during different hormonal protocols in postmenopausal women
Publikacja -
Sustainable Synthesis of Cadmium Sulfide, with Applicability in Photocatalysis, Hydrogen Production, and as an Antibacterial Agent, Using Two Mechanochemical Protocols
Publikacja -
Generalized measurements on qubits in quantum randomness certification and expansion
PublikacjaQuantum mechanics has greatly impacted our understanding of microscopic nature. One of the key concepts of this theory is generalized measurements, which have proven useful in various quantum information processing tasks. However, despite their significance, they have not yet been shown empirically to provide an advantage in quantum randomness certification and expansion protocols. This investigation explores scenarios where generalized...
-
Dynamic Re-Clustering Leach-Based (Dr-Leach) Protocol for Wireless Sensor Networks
Publikacja -
The protocol for using elastic wall model in modeling blood flow within human artery
PublikacjaMedical diagnostic tools will play a major role in the future for an effective patient treatment and reduction their mortality, related to the cardiovascular system diseases (CVDs). There is an urgent need for developing diagnostic procedure to be robust, reliable, accurate and efficient, in the framework of a paradigm shift. Application of numerical techniques is seen as a perspective tool for such purpose. Nevertheless, existing...
-
Rating by detection: an artifact detection protocol for rating EEG quality with average event duration
PublikacjaQuantitative evaluation protocols are critical for the development of algorithms that remove artifacts from real EEG optimally. However, visually inspecting the real EEG to select the top-performing artifact removal pipeline is infeasible while hand-crafted EEG data allow assessing artifact removal configurations only in a simulated environment. This study proposes a novel, principled approach for quantitatively evaluating algorithmically...
-
A rapid, selective, and ultrasensitive voltammetric and gravimetric protocol for MMP-1 active form detection
Publikacja -
Artificial intelligence-based imaging analysis of stem cells: a systematic scoping review protocol
Publikacja -
IACR Transactions on Cryptographic Hardware and Embedded Systems
Czasopisma -
Mobility Management Solutions for IP Networks Comparative Analysis of IP-based Mobility Protocols and Handover Algorithms Invited Paper
PublikacjaA rapid growth of IP-based networks and services hascreated a vast collection of resources and functionalities availableto users by means of a uniform method of access offered by the IPprotocol. At the same time, advances in the design of mobileelectronic devices allowed them to reach a utility levelcomparable to desktop computers, while still retaining theirmobility advantage. Unfortunately, the base IP protocol does notperform...
-
Protocolo de Preparación y Evaluación de Pilas de Combustible de Óxido Sólido
PublikacjaEste protocolo describe la metodología para la preparación de celdas de óxido sólido y su evaluación como pila de combustible (SOFC). Es fruto del estudio realizado en el marco de los proyectos FCTESTNET [1] y SOFCNET [2] del V Programa Marco, en el Comité IEC/TC105 [3] e investigaciones llevadas a cabo en el laboratorio. Las pilas de combustible son dispositivos capaces de transformar la energía química de un combustible en energía...
-
Novel and effective synthesis protocol of AgNPs functionalized using L-cysteine as a potential drug carrier
Publikacja -
A CRISPR/Cas9-Based Mutagenesis Protocol for Brachypodium distachyon and Its Allopolyploid Relative, Brachypodium hybridum
Publikacja -
Research Protocol of the Polish Adaptation and Validation of HOPE Scale: Qualitative Measurement of Patients' Spiritual Needs
Publikacja -
A targeted metabolomic protocol for quantitative analysis of volatile organic compounds in urine of children with celiac disease
Publikacja -
International Journal of Internet Protocol Technology
Czasopisma -
Józef Woźniak prof. dr hab. inż.
OsobyProf. dr hab. inż. Józef Woźniak prof. zw. Politechniki Gdańskiej ukończył studia na Wydziale Elektroniki Politechniki Gdańskiej w 1971 r. W 1976 r. uzyskał stopień doktora nauk technicznych, a w 1991 r. stopień doktora habilitowanego w dyscyplinie telekomunikacja i specjalności teleinformatyka. W styczniu roku 2002 otrzymał tytuł profesora nauk technicznych. W 1994 r. został mianowany na stanowisko profesora nadzwyczajnego w Politechnice...
-
Unconditional privacy over channels which cannot convey quantum information
PublikacjaQuantum cryptography enables one to verify that the state of the quantum system has not been tampered with and thus one can obtain privacy regardless of the power of the eavesdropper. All previous protocols relied on the ability to faithfully send quantum states or equivalently to share pure entanglement. Here we show this need not be the case-one can obtain verifiable privacy even through some channels which cannot be used to...
-
Nature Protocols
Czasopisma -
Evaluation of a new freezing protocol containing 20% dimethyl sulphoxide concentration to cryopreserve human ovarian tissue
Publikacja -
Finding the Right Solvent: A Novel Screening Protocol for Identifying Environmentally Friendly and Cost-Effective Options for Benzenesulfonamide
PublikacjaThis study investigated the solubility of benzenesulfonamide (BSA) as a model compound using experimental and computational methods. New experimental solubility data were collected in the solvents DMSO, DMF, 4FM, and their binary mixtures with water. The predictive model was constructed based on the best-performing regression models trained on available experimental data, and their hyperparameters were optimized using a newly...
-
Association between use of enhanced recovery after surgery protocols and postoperative complications in colorectal surgery in Europe: The EuroPOWER international observational study
Publikacja -
Effect of BMI on safety of bariatric surgery during the COVID-19 pandemic, procedure choice, and safety protocols – An analysis from the GENEVA Study
Publikacja -
Device-independent quantum key distribution based on measurement inputs
PublikacjaWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Application of EARL (ResEARch 4 Life®) protocols for [18F]FDG-PET/CT clinical and research studies. A roadmap towards exact recovery coefficient
Publikacja -
Epoxydibenzo[b,f][1,5]diazocines: From a Hidden Structural Motif to an Efficient Solvent-Free Synthetic Protocol
Publikacja -
High compliance to ERAS protocol does not improve overall survival in patients treated for resectable advanced gastric cancer
Publikacja -
Service time distribution influence on end-to-end call setup delay calculation in networks with Session Initiation Protocol
PublikacjaThe most important GoS parameter for networks with SIP protocol is end-to-end call setup delay. So far there were no coherent models allowing calculation of these parameters for networks with SIP protocol. Few models were developed but they are insufficient. In the paper we propose model which allows end-to-end call setup delay calculation for networks with SIP protocol. The model is using chain of M/G/1/K models and is applicable...
-
An optimized controlled rate slow cooling protocol for bovine ovarian tissue cryopreservation by means of X-ray computed tomography
Publikacja -
An optimized QIAzol-based protocol for simultaneous miRNA, RNA, and protein isolation from precision-cut lung slices (PCLS)
Publikacja -
Protocol of the study: the effectiveness of pleuran in the treatment of acute gastroenteritis in children—a randomised, placebo-controlled, double-blind trial (EPTAGE)
Publikacja -
Analysis of pesticide residue in tomato samples using analytical protocol based on application of QuEChERS technique and GC-ECD system
PublikacjaQuEChERS sample preparation method was used for the determination of 10 pesticides and their metabolites in tomato samples, coupled to gas chromatography with electron capture detector (GCECD). The experimental parameters including oven temperature program, amount of the sample and purifying agent were optimized. The GC-ECD method was validated in terms of linearity, selectivity and recovery. The limits of detection (LODs) of the...
-
Development of an Analytical Protocol for Determination of Cyanide in Human Biological Samples Based on Application of Ion Chromatography with Pulsed Amperometric Detection
PublikacjaA simple and accurate ion chromatography (IC) method with pulsed amperometric detection (PAD) was proposed for the determination of cyanide ion in urine, sweat, and saliva samples. The sample pretreatment relies on alkaline digestion and application of Dionex OnGuard II H cartridge. Under the optimized conditions, the method showed good linearity in the range of 1–100 μg/L for urine, 5–100 μg/L for saliva, and 3–100 μg/L for sweat...
-
Quantum security and theory of decoherence
PublikacjaWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...