108 research outputs found
Prevalence of antibodies against Neospora caninum in dogs from urban areas in Central Poland
Neospora caninum is a protozoan parasite which causes abortion in cattle as well as reproduction problems and neurological disorders in dogs. To assess the prevalence of the parasite in urban dogs in the Mazovian Voivodeship, Central Poland, serum samples from 257 dogs were analyzed for the presence of specific IgG antibodies. The examined dogs visited three private veterinary clinics located in Warsaw due to control tests, vaccinations, or other reasons not directly connected with neosporosis. Using ELISA and Western blot, antibodies against the parasite were detected in 56 out of 257 dogs, giving a prevalence of 21.7%. A greater prevalence was observed in female dogs than in males, 28% and 17.3%, respectively, and the differences were statistically significant (p < 0.05). There were no significant differences in seroprevalence of Neospora infection within the age groups (p > 0.05). This study indicates the presence of N. caninum in the Mazovian Voivodeship, in dogs which live in urban areas and exposure of these dogs to the parasite. The fact that seropositive dogs had no contact with cattle confirms the important role of dogs in the parasite’s epidemiology
Phenoxazine Based Units- Synthesis, Photophysics and Electrochemistry
A few new phenoxazine-based conjugated monomers were synthesized, characterized, and successfully used as semiconducting materials. The phenoxazine-based oligomers have low ionization potentials or high-lying HOMO levels (~4.7 eV), which were estimated from cyclic voltammetry. Conjugated oligomers offer good film—forming, mechanical and optical properties connected with their wide application. These results demonstrate that phenoxazine-based conjugated mers are a promising type of semiconducting and luminescent structures able to be used as thin films in organic electronics
On Deception-Based Protection Against Cryptographic Ransomware
In order to detect malicious file system activity, some commercial and academic anti-ransomware solutions implement deception-based techniques, specifically by placing decoy files among user files. While this approach raises the bar against current ransomware, as any access to a decoy file is a sign of malicious activity, the robustness of decoy strategies has not been formally analyzed and fully tested. In this paper, we analyze existing decoy strategies and discuss how they are effective in countering current ransomware by defining a set of metrics to measure their robustness. To demonstrate how ransomware can identify existing deception-based detection strategies, we have implemented a proof-of-concept anti-decoy ransomware that successfully bypasses decoys by using a decision engine with few rules. Finally, we discuss existing issues in decoy-based strategies and propose practical solutions to mitigate them
On improving 5G internet of radio light security based on led fingerprint identification method
Copyright: © 2021 by the authors. In this paper, a novel device identification method is proposed to improve the security of Visible Light Communication (VLC) in 5G networks. This method extracts the fingerprints of Light-Emitting Diodes (LEDs) to identify the devices accessing the 5G network. The extraction and identification mechanisms have been investigated from the theoretical perspective as well as verified experimentally. Moreover, a demonstration in a practical indoor VLC-based 5G network has been carried out to evaluate the feasibility and accuracy of this approach. The fingerprints of four identical white LEDs were extracted successfully from the received 5G NR (New Radio) signals. To perform identification, four types of machine-learning-based classifiers were employed and the resulting accuracy was up to 97.1%.EU Horizon 2020 program towards the Internet of Radio-Light project H2020-ICT 761992
A Scaleable and License Free 5G Internet of Radio Light Architecture for Services in Train Stations
In this paper we present a 5G Internet Radio-
Light (IoRL) architecture for underground train stations that
can be readily deployed because it utilizes unlicensed visible light
and millimeter wave part of the spectrum, which does not require
Mobile Network Operator (MNO) permission to deploy and
which is used to provide travelers with accurate location,
interaction, access to Internet and Cloud based Services, such as
high resolution video on a Tablet PC. The paper describes the
train station use cases and the IoRL architecture.European Commissio
A Scalable and License Free 5G Internet of Radio Light Architecture for Services in Homes & Businesses
In this paper we present a 5G Internet Radio-Light
(IoRL) architecture for homes that can be readily deployed
because it utilizes unlicensed visible light and millimeter wave
part of the spectrum, which does not require Mobile Network
Operator (MNO) permission to deploy and which is used to
provide inhabitants of houses with accurate location, interaction,
access to Internet and Cloud based services such as high
resolution video on a Tablet PC. The paper describes the home
use cases and the IoRL architecture.EU Horizon 202
Enzymes immobilized in Langmuir-Blodgett films: Why determining the surface properties in Langmuir monolayer is important?
ABSTRACT In this review we discuss about the immobilization of enzymes in Langmuir-Blodgett films in order to determine the catalytic properties of these biomacromolecules when adsorbed on solid supports. Usually, the conformation of enzymes depends on the environmental conditions imposed to them, including the chemical composition of the matrix, and the morphology and thickness of the film. In this review, we show an outline of manuscripts that report the immobilization of enzymes as LB films since the 1980’s, and also some examples of how the surface properties of the floating monolayer prepared previously to the transfer to the solid support are important to determine the efficiency of the resulting device
Exhumed lanscape relief forms in valley bottoms: examples form the Pilica valley in the nida trought
Management system for dynamic analysis of malicious software
In the recent years, one can observe the increase in the number of malicious software (malware) samples analyzed by the antivirus companies. One explanation is associated with attacker's antivirus systems hider tactic, which modifies hostile programs form, without changing it functionality. In effect, the first step of analysis is associated with the check if a given sample is a new threat or modification of existing. Very often such simple test can be performed automatically by dedicated information system. Paper describes information system, which allows dynamic analysis of malicious sample. Presented system was developed and deployed in the Institute of Computer Science, Warsaw University of Technology. During performed security research concerning ransomware threats system proves its usefulness. Additionally, the system become a knowledge base of known malware recently analyzed by our security team
Visualization as support for web honeypot data analysis
The paper presents methodologies associated with visualization, which supports
data analysis. Analyzed data has been gathered by HoneyPot systems deployed in
the network of Institute of Computer Science. Due to the vast amounts of data, the
manual analysis was almost impossible and very impractical, also considering time
constraints. Introduced visualization techniques and supporting filtering features are
implemented in HPMS (HoneyPot Management System). The paper describes in
details two introduced methodologies which support data analysis using both charts
and graphs. The first one is used for the discovery of basic activities observed by
HoneyPot. The second one is used for advanced analysis of machines used during
attacks concerning PhpMyAdmin software
- …