53 research outputs found

    Wybrane strategie werbalne w przekazach elektronicznych na przykładzie blogu

    Get PDF
    Blog as a genre of the text is linked to an electronic message generated in cyberspace. Blog is a place of confrontation and dialogue. The presented examples are a testament to saturation strategy verbal multimedia graphic elements. The texts of blog is a conglomerate of verbal communication and audiovisual items. The analysis shows that this drastic confrontation does not always equal to the conflict. Strategies verbal shaped at the level of electronic communication is characterized by nonlinearity associated with the substitution of reading linear navigation. It appears that it is an element of deep cultural change. Printed word has been the transformation - was an open structure (into the Internet eliminates the physical aspect of the press). New media has created a virtual space, in which verbal communication is located within the traditional forms of communication is subject to digitize, creating a stream of information on the foundation of a new fixation – in the area of your computer scree

    Perswazyjność jako strategia językowa w skryptach telemarketingowych: kategoria gramatyczna osoby

    Get PDF
    Persuasion presents as verbal operation socially accept, it is based on granting intention and communication purposes. Means dispose discuss and techniques of persuasion be as (serve) realization of set up purpose, basis is evident which and define possible to decode by recipient. Manipulation presents operation on achievement purposes dispose define also, but, contrary to persuasion, it features her unpublicness on realized set up purposes for any price disposed act communication. Manipulative strategies are rareness in marketing projects. There is distinct trend these elements of languages application, which realize set up communication purposes to fine manner. Realize .m in. Technique of persuasion of telemarketing project allows behind assistance of accommodation present form to content of offer in scripts of telemarketing projects nomination of thesis about predominating specificit

    Obraz radości we współczesnej polszczyźnie

    Get PDF
    Zawiera recenzję książki: Obraz radości we współczesnej polszczyźnie / Agnieszka Mikołajczuk. Warszawa : Wydawnictwo Naukowe "Semper", 2009. ISBN 978-83-7507-056-

    Mała/wielka historia

    Get PDF
    Zawiera recenzję książki: Już od dawna niekoszernie : historia pewnej rodziny : powieść / Claudia Erdheim ; tłumaczenie Łukasz Brzana. - Siedlce : Wydawnictwo IKRiBL, 2015The explores the autobiographical book Już od dawna niekoszernie… (Siedlce 2015), written by author of Claudia Erdheim who lives in Vienna. The novel was translated from German into Polish and follows the story of a Jewish family and the multicultural society of Galicia at the turn of the century. The book is interesting, well written and rich in historical detail

    Efficient and Secure Group Key Management in IoT using Multistage Interconnected PUF

    Full text link
    Secure group-oriented communication is crucial to a wide range of applications in Internet of Things (IoT). Security problems related to group-oriented communications in IoT-based applications placed in a privacy-sensitive environment have become a major concern along with the development of the technology. Unfortunately, many IoT devices are designed to be portable and light-weight; thus, their functionalities, including security modules, are heavily constrained by the limited energy resources (e.g., battery capacity). To address these problems, we propose a group key management scheme based on a novel physically unclonable function (PUF) design: multistage interconnected PUF (MIPUF) to secure group communications in an energy-constrained environment. Our design is capable of performing key management tasks such as key distribution, key storage and rekeying securely and efficiently. We show that our design is secure against multiple attack methods and our experimental results show that our design saves 47.33% of energy globally comparing to state-of-the-art Elliptic-curve cryptography (ECC)-based key management scheme on average.Comment: 6 pages, 4 figures, International Symposium on Low Power Electronics and Desig

    Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks

    Get PDF
    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature

    Język reportażu telewizyjnego [recenzja]

    No full text
    Zawiera recenzję książki: Język reportażu telewizyjnego : (na przykładzie Magazynu Ekspresu Reporterów w TVP2) / Monika Skarżyńska. Warszawa : Wydawnictwo Naukowe Semper, 2011. ISBN 978-83-7507-137-
    corecore