Filtry
wszystkich: 497
Wyniki wyszukiwania dla: CRYPTOGRAPHIC PROTOCOLS
-
A method to monitor urinary carbon dioxide in patients with septic shock
PublikacjaSevere sepsis and septic shock are life-threatening conditions with mortality rates exceeding 31% (Levy et al., 2012) [1]. Septicemia was the most expensive US hospital condition in 2011 (Torio and Andrews, 2006)[2]. Urinary carbon dioxide may provide rapid, clinically useful information about a patient’s status, empowering physicians to intervene earlier and improve septic shock mortality. The objective of this paper is to validate...
-
Systemy Sygnalizacji i Protokoły
Kursy OnlineKurs pomocniczy dla przedmiotu Systemy Sygnalizacji i Protokoły realizowanego dla studentów I stopnia Wydziału EiT na profilu Sieci Teleinformacyjne.
-
Routing decisions independent of queuing delays in broadband leo networks
PublikacjaThis paper presents an analysis of queuing and propagation delays of Inter-Satellite Links (ISLs) in broadband Low-Earth Orbit (LEO) satellite networks. It is shown that queuing delays are negligible in all reasonable working conditions of the broadband ISL network. This fact makes it possible to simplify the routing protocols in such networks and permits using already known multi-commodity flow solutions for routing. The performance...
-
Remote Monitoring System for Impedance Spectroscopy using Wireless Sensor Network
PublikacjaThe architecture of a miniaturized impedanceanalyser with wireless communication module for remoteImpedance Spectroscopy (IS) of anticorrosion coatings ondifficult-to-reach objects (e.g. on the steel construction ofthe bridge) is described in this paper. Some practical aspectsof implementation of a Wireless Sensor Network (WSN) arealso discussed. A low scale, middle range, WSN networkcomposed of a Base Station (BS) with a Personal...
-
Simple and novel synthesis of 3-(thio)phosphoryl-β-lactams by radical cyclization
PublikacjaRadical cyclization of phosphono-acetenamides promoted by manganese(III) acetate leads exclusively to the formation of 3-phosphoryl-β-lactams. The thiophosphoryl analogues were also prepared using this method. In particular, the presented protocol does not require the use of noble metals, while comparable methods do.
-
Nanomaterials for photothermal and photodynamic cancer therapy
PublikacjaIn recent years, the role of optically sensitive nanomaterials has become powerful moieties in therapeutic techniques and has become particularly emphasized. Currently, by the extraordinary development of nanomaterials in different fields of medicine, they have found new applications. Phototherapy modalities, such as photothermal therapy (PTT) by toxic heat generation and photodynamic therapy (PDT) by reactive oxygen species, are...
-
SUSHI - jak to ugryźć? Czyli o standaryzacji i gromadzeniu statystyk wykorzystania zasobów elektronicznych na przykładzie Biblioteki Głównej Gdańskiego Uniwersytetu Medycznego
PublikacjaStatystyki wykorzystania dostarczają bibliotekarzom informacji niezbędnych przy podejmowaniu decyzji o zakupie dostępu do wybranych zasobów elektronicznych. W roku 2002 rozpoczął działalność międzynaro- dowy projekt COUNTER (Counting Online Usage of Networked Electronic Resources), którego celem było ujednolicenie raportów wykorzystania e-zasobów, a także uczynienie ich możliwie najbardziej miarodajnymi. W roku 2007 amerykańska...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublikacjaThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublikacjaIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
Computer controlled systems - 2022/2023
Kursy Onlinemateriały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution...
-
CCS-lecture-2023-2024
Kursy Onlinemateriały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution optimization...
-
The Mott-Schottky characteristics of microwave pulsed-plasma polymerized allylamine by DEIS analysis
Dane BadawczeThe dataset contains the results obtained for the Mott-Schottky analysis of the microwave pulsed-plasma polymerized allylamine using the multifrequency perturbation signal with Dynamic Electrochemical Impedance Spectroscopy (DEIS) technique. The results were obtained using the perturbation composed of the elementary signals with a frequency range between...
-
Data for systematic review on interversions reducing car use
Dane BadawczeThis dataset contains search strategies, bibliographic information and data synthesis performed for a systematic literature review to provide a comprehensive and unbiased summary of the available evidence concerning car use-reducing interventions employed and their effectiveness. ‘Intervention’, for this study purposes, is defined as “any policy, program,...
-
Extension management of a knowledge base migration process to IPv6
PublikacjaThere are many reasons to deploy IPv6 protocol with IPv4 address space depletion being the most indisputable. Unfortunately, migration to IPv6 protocol seems slower than anticipated. To improve pace of the IPv6 deployment, authors of the article developed the two applications that supports the migration process. Their main purpose is to help less experienced network administrators facilitate the migration process with a particular...
-
MRM–MS of marker peptides and their abundance as a tool for authentication of meat species and meat cuts in single-cut meat products
PublikacjaThe abundance of protein markers in different types of meat cuts was explored in the context of authentication of raw meat (pork, beef and chicken) and processed meat products. Peptides originating from myoglobin (Mb) and myosin (My) were analyzed using multiple reaction monitoring mass spectrometry (MRM–MS). Analytical protocol was optimized for good repeatability (CV < 10%) and high sensitivity. The MS signal intensity of Mb...
-
PROGRAMMABLE YANG - BASED INTERFACE IN CONTROL OF OPTICAL TRANSPORT NETWORK
PublikacjaSince over a decade we observe intensive effort of research institutions and industrial consortia on extending flexibility and automation of the transport network control also known under the term network programmability. Key aspect of each programming interface is ability to evolve but also sensitivity to future modifications. As indicated in the past work in the specific context of optical transport networks an important criterion...
-
In Situ Random Microseeding and Streak Seeding Used for Growth of Crystals of Cold-Adapted beta-D-Galactosidases: Crystal Structure of betaDG from Arthrobacter sp. 32cB
PublikacjaThere is an increasing demand for cold-adapted enzymes in a wide range of industrial branches. Nevertheless, structural information about them is still scarce. The knowledge of crystal structures is important to understand their mode of action and to design genetically engineered enzymes with enhanced activity. The most difficult task and the limiting step in structural studies of cold-adapted enzymes is their crystallization,...
-
Management Information Base module for electrical power system configuration and use
PublikacjaInternet standards describe a virtual information store, termed the Management Information Base (MIB), which is made available through Simple Network Management Protocol (SNMP). No standard MIB exists to date for monitoring power lines in facilities over IP network. This paper defines a subset of the MIB for power system monitoring.
-
Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart Cities
PublikacjaIn relation to smart city planning and management, processing huge amounts of generated data and execution of non-lightweight cryptographic algorithms on resource constraint devices at disposal, is the primary focus of researchers today. To enable secure exchange of data between cloud networks and mobile devices, in particular smart hand held devices, this paper presents Blockchain based approach that disperses a public/free key...
-
Free randomness amplification using bipartite chain correlations
PublikacjaA direct analysis of the task of randomness amplification from Santha-Vazirani sources using the violation of the chained Bell inequality is performed in terms of the convex combination of no-signaling boxes required to simulate quantum violation of the inequality. This analysis is used to find the exact threshold value of the initial randomness parameter from which perfect randomness can be extracted in the asymptotic limit of...
-
Distributed Framework for Visual Event Detection in Parking Lot Area
PublikacjaThe paper presents the framework for automatic detection of various events occurring in a parking lot basing on multiple camera video analysis. The framework is massively distributed, both in the logical and physical sense. It consists of several entities called node stations that use XMPP protocol for internal communication and SRTP protocol with Jingle extension for video streaming. Recognized events include detecting parking...
-
Practical I-Voting on Stellar Blockchain
PublikacjaIn this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...
-
Chromium‑based metal organic framework for pipette tip micro‑solid phase extraction: an effective approach for determination of methyl and propyl parabens in wastewater and shampoo samples
PublikacjaAbstract Background A chromium-based metal organic framework was synthesized and employed as an efficient sorbent for pipette tip micro-solid phase extraction and preconcentration of parabens from wastewater and shampoo samples up to sub-ppb level before their spectrophotometric analysis. Results Factors affecting preconcentration including volume and type of solvent, amount of sorbent, number of extraction, and volume and pH of...
-
System load impact on VRRP advertisements delay
PublikacjaThe aim of the paper is to show how system load can affect network tasks (especially VRRP advertising depending on factors such as kernel schedu-ler [3] version, kernel settings and load priority. Two versions of the Linux kernel will be used: 2.6.22 (with "O(1) scheduler) and 2.6.23 (with "CFS" scheduler). "vrrpd" version 0.4 is used as an VRRP protocol implementation.
-
Direct chromatographic methods in the context of green analytical chemistry
PublikacjaWe review analytical protocols based on gas and liquid chromatography (GC and LC), but involving no sample preparation.Green analytical chemistry seeks to minimize negative impacts of analytical chemistry. Direct analytical methods ideally fulfillthis requirement, as they preclude sample preparation - the most polluting step of the analytical procedure.We describe examples of GC methodologies for environmental and food analysis...
-
BADANIE MOŻLIWOŚCI SYMULACYJNYCH ŚRODOWISKA ‘MININET’ POD KĄTEM WSPARCIA PROTOKOŁU NETCONF
PublikacjaNiniejszy artykuł został poświęcony zagadnieniu wykorzystania środowiska emulacyjnego Mininet do testowania mechanizmów działania protokołu NETCONF. Omówiono w nim projekt inżynierski, którego wynikiem było zaimplementowanie wirtualnego środowiska, umożliwiającego prowadzenie takich badań. Opisano także wyniki testów emulacji dwóch pierścieniowych domen sieciowych, składających się z 30 węzłów.
-
Revsable framework for telecontrol protocols. W: Springer Homepage [online] Proceedings. Second International ESPRIT ARES Workshop on Development and Evolution of Software Architectures for Product Families. Las Palmas de Gran Canaria, Spain, February 26-27, 1998. [Dostęp: 20 grudnia**2002]. Ed. F. van der Linden. Dostępny w World Wide Web: http://link.springer.de/link/ /service/series/0558/tocs/t1429.htm [s. 6-13, 5 rys. bibliogr. 6 poz.] Wzorce wielokrotnego wykorzystania oprogramowania protokołów telesterowa- nia.
PublikacjaZaprezentowano wzorzec COMSOFT wielokrotnego wykorzystania oprogramowania o-pracowany dla protokołów telesterowania. Jego podstawy tworzą: metodologiaobiektowa i wzorce wielokrotnego użycia. Zastosowanie wzorców wspomagają:biblioteka komponentów, wykorzystywanych we wszystkich fazach konstrukcji o-programowania oraz procedury użytkowania i parametryzacji. Opracowane wzorcezostały praktycznie zastosowane do konstrukcji oprogramowania...
-
Connections between Mutually Unbiased Bases and Quantum Random Access Codes
PublikacjaWe present a new quantum communication complexity protocol, the promise--Quantum Random Access Code, which allows us to introduce a new measure of unbiasedness for bases of Hilbert spaces. The proposed measure possesses a clear operational meaning and can be used to investigate whether a specific number of mutually unbiased bases exist in a given dimension by employing Semi--Definite Programming techniques.
-
Implementation of high-speed data transmission technological demonstrator using software defined radio technology
PublikacjaIn the article implementation of high-speed data transmission technological demonstrator using software defined radio technology is presented. A system architecture design including asymmetric framing transmission organization, which differs from the ones used in cellular systems is described. The construction of technological demonstrator consisting of management unit, radio unit and programmable multithreaded software performing...
-
Serial control of CNC machines
PublikacjaIn this paper a new method of the serial control of CNC machines is proposed. Actuators are controlled locally and the role of the central computer is limited to sending commands to the controller instead of sending it directly to actuators. It has been achieved with the use of the serial protocol with the use of the USB port. The taken approach leads to more reliable operation because commands are buffered and no synchronization...
-
Active Annotation in Evaluating the Credibility of Web-Based Medical Information: Guidelines for Creating Training Data Sets for Machine Learning
PublikacjaMethods Results Discussion References Abbreviations Copyright Abstract Background: The spread of false medical information on the web is rapidly accelerating. Establishing the credibility of web-based medical information has become a pressing necessity. Machine learning offers a solution that, when properly deployed, can be an effective tool in fighting medical misinformation on the web. Objective: The aim of this study is to...
-
Implementation of high-speed data transmission technological demonstrator using software defined radio technology
PublikacjaIn the article implementation of a high-speed data transmission technological demonstrator using software defined radio technology is presented. A system architecture design including asymmetric framing transmission organization, which differs from the ones used in cellular systems is described. The construction of technological demonstrator consisting of a management unit, radio unit and programmable multi-threaded software performing...
-
A distributed system for conducting chess games in parallel
PublikacjaThis paper proposes a distributed and scalable cloud based system designed to play chess games in parallel. Games can be played between chess engines alone or between clusters created by combined chess engines. The system has a built-in mechanism that compares engines, based on Elo ranking which finally presents the strength of each tested approach. If an approach needs more computational power, the design of the system allows...
-
Negocjacyjna metoda generowania protokołu uzgodnień na platformie EBXML
PublikacjaCelem standardu ebXML jest ustanowienie globalnej platformy dla biznesu elektronicznego, umożliwiającej dowolnym przedsiębiorstwom( bez względu na ich wielkość i lokalizację)poszukiwanie partnerów handlowych i realizowanie transakcji kupna-sprzedaży w oparciu o wymianę dokumentów elektronicznych o strukturze logicznej opisanej w XML.Podstawą do nawiązania kontaktu przez dowolny podmiot jest publikowany przez niego w specjalnym...
-
Monolithic capsule phase microextraction prior to gas chromatography-mass spectrometry for the determination of organochlorine pesticides in environmental water samples
PublikacjaIn this study, a capsule phase microextraction (CPME) protocol followed by gas chromatography-mass spectrometry is proposed for the accurate and sensitive monitoring of organochlorine pesticides (OCPs) in environmental water samples. Different monolithic sol–gel encapsulated sorbents were compared and monolithic sol–gel poly(ethylene glycol)-based sorbent incorporated into porous microextraction capsules resulted in the highest...
-
Edge-Computing based Secure E-learning Platforms
PublikacjaImplementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...
-
Experimental Extraction of Secure Correlations from a Noisy Private State
PublikacjaWe report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies...
-
Performance Analysis of the "Intelligent" Kirchhoff- Law - Johnson-Noise Secure Key Exchange
PublikacjaThe Kirchhoff-law - Johnson-noise (KLJN) secure key distribution system provides a way of exchanging theoretically secure keys by measuring random voltage and current through the wire connecting two different resistors at Alice’s and Bob’s ends. Recently new advanced protocols for the KLJN method have been proposed with enhanced performance. In this paper, we analyze the KLJN system and compare with the „intelligent” KLJN (iKLJN)...
-
Reliable Document-Centric Processing in Loosely Coupled Email-Based Systems
PublikacjaEmail is a simple way to exchange digital documents of any kind. The Mobile INteractive Document architecture (MIND) enables self-coordination and self-steering of document agent systems based on commonly available email services. In this paper, a mechanism for providing integrity and reliability of such an email based agent system is proposed to cope with message soft or hard bounces, user interrupts, and other unexpected events....
-
Two tests for adhesive bonding long term characterization: principles and applications
PublikacjaThis article describes recent refinement of the traditional wedge test technique used to characterize durability of the adhesive joints. We propose two types of measuring protocols to monitor precisely and continuously the propagation of an "effective" crack during long term mode I fracture mechanic test. First method is directly derived from the traditional wedge test technique and consist in monitoring the surface strain of adherent...
-
Methods of Cyclist Training in Europe
PublikacjaThe following study aims to address the issue of cyclist training methodologies. Recent European bicycle accident statistics reveal a troubling upward trend. A potential solution to mitigate such incidents involves providing cyclists with comprehensive training encompassing traffic regulations and interactions with fellow road users. We conducted a comparative analysis of the cycling education approaches and cyclist training systems...
-
Sport-related concussion alters cerebral hemodynamic activity during controlled respiration
PublikacjaThis study investigated cerebral hemodynamic activity following sport-related concussion. Prefrontal cortex oxygenation was assessed by near-infrared spectroscopy (NIRS) during a controlled breathing protocol. Wavelet transformation of the NIRS signals showed significant decreases in HbO2 and HbD amplitude at the respiratory frequency interval (0.10–0.6 HZ) from preseason baseline to acute concussion. These results suggest a decreased...
-
Systemy Sygnalizacji i Protokoły - edycja 2022
Kursy OnlineKurs pomocniczy dla przedmiotu Systemy Sygnalizacji i Protokoły realizowanego dla studentów I stopnia Wydziału EiT na profilu Sieci Teleinformacyjne.
-
Protokoły wymiany danych w systemach 2022
Kursy OnlineI stopień IBio
-
Protokoły wymiany danych w systemach 2019
Kursy OnlineRodzaj Studiów: stacjonarne, inżynierskie Kierunek Studiów: Inżynieria Biomedyczna Specjalność: Informatyka w Medycynie Semestr: 6
-
CYFROWE PROTOKOŁY WYMIANY INFORMACJI [2022/23]
Kursy Online -
Systemy Sygnalizacji i Protokoły - edycja 2021
Kursy OnlineKurs pomocniczy dla przedmiotu Systemy Sygnalizacji i Protokoły realizowanego dla studentów I stopnia Wydziału EiT na profilu Sieci Teleinformacyjne.
-
CYFROWE PROTOKOŁY WYMIANY INFORMACJI [2021/22]
Kursy Online -
Protokoły wymiany danych w systemach 2020
Kursy OnlineI stopień IBio
-
CYFROWE PROTOKOŁY WYMIANY INFORMACJI [2023/24]
Kursy Online