Zobrazeno 1 - 10
of 2 259
pro vyhledávání: '"Marek R"'
Publikováno v:
IET Cyber-Physical Systems, Vol 9, Iss 2, Pp 99-101 (2024)
Externí odkaz:
https://doaj.org/article/a6457750671e4cb492e393a67201b5bf
Autor:
Anita Poćwierz-Kotus, Christopher D. McQuaid, Marek R. Lipinski, Małgorzata Zbawicka, Roman Wenne
Publikováno v:
Animals, Vol 14, Iss 21, p 3080 (2024)
Understanding the origins of invasive species is necessary to manage them and predict their potential for spreading. The mussel genus Mytilus forms an important component of coastal ecosystems in the northern and southern hemispheres. M. galloprovinc
Externí odkaz:
https://doaj.org/article/164819093ec34b09950a3d9587d027a9
Autor:
Katarzyna Koptyra, Marek R. Ogiela
Publikováno v:
Applied Sciences, Vol 13, Iss 22, p 12404 (2023)
In this paper, several ideas of data hiding in WebP images are presented. WebP is a long-known, but not very poplar file format that provides lossy or lossless compression of data, in the form of a still image or an animation. A great number of WebP
Externí odkaz:
https://doaj.org/article/0796c1fc6d984ed5ba4f8c3246ec93e2
Publikováno v:
Journal of Theoretical and Applied Electronic Commerce Research, Vol 16, Iss 5, Pp 1280-1296 (2021)
In recent years, blockchains systems have seen massive adoption in retail and enterprise environments. Cryptocurrencies become more widely adopted, and many online businesses have decided to add the most popular ones, like Bitcoin or Ethereum, next t
Externí odkaz:
https://doaj.org/article/d49900a3d91a4363af36a09534df047c
Autor:
Lidia Ogiela, Marek R. Ogiela
Publikováno v:
Applied Sciences, Vol 13, Iss 8, p 4847 (2023)
This paper defines new classes of algorithms for securing and sharing visual information. Algorithms offering data protection against unauthorised access are cryptographic protocols for data sharing and splitting. These protocols ensure the division
Externí odkaz:
https://doaj.org/article/34a89ea50c094a2da05491315d48ba48
Autor:
Radosław Bułat, Marek R. Ogiela
Publikováno v:
Applied Sciences, Vol 13, Iss 7, p 4216 (2023)
The IoT is a specific type of network with its own communication challenges. There are a multitude of low-power devices monitoring the environment. Thus, the need for authentication may be addressed by many available sensors but should be performed o
Externí odkaz:
https://doaj.org/article/587e1fad68584d6e89b7060623c75a1a
Publikováno v:
Sensors, Vol 23, Iss 6, p 3170 (2023)
In recent years, the number of personal accounts assigned to one business user has been constantly growing. There could be as many as 191 individual login credentials used by an average employee, according to a 2017 study. The most recurrent problems
Externí odkaz:
https://doaj.org/article/9b65e3344cfb4bc58fb7715a2135bce1
Autor:
Katarzyna Koptyra, Marek R. Ogiela
Publikováno v:
Sensors, Vol 23, Iss 6, p 3288 (2023)
This paper describes a multi-secret steganographic system for the Internet-of-Things. It uses two user-friendly sensors for data input: thumb joystick and touch sensor. These devices are not only easy to use, but also allow hidden data entry. The sys
Externí odkaz:
https://doaj.org/article/8b783ecc48ad4e699b1b64c0f88c32c4
Publikováno v:
Diversity, Vol 14, Iss 12, p 1073 (2022)
A detailed systematic account of Sepia (Hemisepius) typica, an endemic southern African species of cuttlefish, is presented. An analysis of morphological data (morphometric and meristic characters) suggests that S. typica is a single well-established
Externí odkaz:
https://doaj.org/article/4c443112249b4efa907717e5054bae79
Autor:
Jakub Kluk, Marek R. Ogiela
Publikováno v:
Applied Sciences, Vol 12, Iss 23, p 11880 (2022)
Advanced diagnosis systems provide doctors with an abundance of high-quality data, which allows for diagnosing dangerous diseases, such as brain cancers. Unfortunately, humans flooded with such plentiful information might overlook tumor symptoms. Hen
Externí odkaz:
https://doaj.org/article/4ecb8c853afb4da6a4e99071b9f3212b