The aim of the work was to investigate the influence of the surface texture of composite based on PA6, intended for wet painting, on the stability of the colour and gloss parameters. The stability of the paint coating was required to be maintained despite exposure to mechanical stress resulting from attempts to manually remove graffiti stains. The study examined the influence of surface texture on the effectiveness of cleaning.
View Article and Find Full Text PDFCurrently, one can observe the evolution of social media networks. In particular, humans are faced with the fact that, often, the opinion of an expert is as important and significant as the opinion of a non-expert. It is possible to observe changes and processes in traditional media that reduce the role of a conventional 'editorial office', placing gradual emphasis on the remote work of journalists and forcing increasingly frequent use of online sources rather than actual reporting work.
View Article and Find Full Text PDFSensors (Basel)
August 2022
Contemporary cyberthreats continue to evolve, powering the neverending development arms race [...
View Article and Find Full Text PDFDigital literacy has been included in the set of the eight key competences, which are necessary to enjoy life to the full in the twenty-first century. According to the previous studies, women tend to possess lower digital competence than men; the older the person, the lower the level of digital literacy. To date, Polish citizens in general have worse skills than the European average.
View Article and Find Full Text PDFThe ubiquity of social media and their deep integration in the contemporary society has granted new ways to interact, exchange information, form groups, or earn money-all on a scale never seen before. Those possibilities paired with the widespread popularity contribute to the level of impact that social media display. Unfortunately, the benefits brought by them come at a cost.
View Article and Find Full Text PDFThe number of security breaches in the cyberspace is on the rise. This threat is met with intensive work in the intrusion detection research community. To keep the defensive mechanisms up to date and relevant, realistic network traffic datasets are needed.
View Article and Find Full Text PDFArtificial neural networks have become the go-to solution for computer vision tasks, including problems of the security domain. One such example comes in the form of reidentification, where deep learning can be part of the surveillance pipeline. The use case necessitates considering an adversarial setting-and neural networks have been shown to be vulnerable to a range of attacks.
View Article and Find Full Text PDFCybercrime and cybersecurity are like two sides of the same coin: They are opposites but cannot exist without each other. Their mutual relation generates a myriad of ethical issues, ranging from minor to vital. The rapid development of technology will surely involve even more ethical concerns, like the infamous example of a fitness tracking company allegedly paying $10 million worth of ransom.
View Article and Find Full Text PDFThis paper discusses the valuable role recommender systems may play in cybersecurity. First, a comprehensive presentation of recommender system types is presented, as well as their advantages and disadvantages, possible applications and security concerns. Then, the paper collects and presents the state of the art concerning the use of recommender systems in cybersecurity; both the existing solutions and future ideas are presented.
View Article and Find Full Text PDFThe commentary touches upon the topic which is relevant to hundreds of thousands of researchers in the world. When trying to publish in English, they are often advised to ask the native speakers of the language for their opinion. However, as English has become the international, cross-border language of science, it may have ceased to be the property of the native speaker researchers, who constitute a small minority in the community.
View Article and Find Full Text PDFCybersecurity is an arms race, with both the security and the adversaries attempting to outsmart one another, coming up with new attacks, new ways to defend against those attacks, and again with new ways to circumvent those defences. This situation creates a constant need for novel, realistic cybersecurity datasets. This paper introduces the effects of using machine-learning-based intrusion detection methods in network traffic coming from a real-life architecture.
View Article and Find Full Text PDFCurrently, expert systems and applied machine learning algorithms are widely used to automate network intrusion detection. In critical infrastructure applications of communication technologies, the interaction among various industrial control systems and the Internet environment intrinsic to the IoT technology makes them susceptible to cyber-attacks. Given the existence of the enormous network traffic in critical Cyber-Physical Systems (CPSs), traditional methods of machine learning implemented in network anomaly detection are inefficient.
View Article and Find Full Text PDFAt present, many researchers see hope that artificial intelligence, machine learning in particular, will improve several aspects of the everyday life for individuals, cities and whole nations alike. For example, it has been speculated that the so-called machine learning could soon relieve employees of part of the duties, which may improve processes or help to find the most effective ways of performing tasks. Consequently, in the long run, it would help to enhance employees' work-life balance.
View Article and Find Full Text PDFBackground: This study aims to describe and compare health-related quality of life (HRQL) in patients with node-positive and high-risk node-negative HER2-positive early breast cancer receiving adjuvant docetaxel and trastuzumab-based or docetaxel-based regimens alone.
Methods: Eligible patients (n = 3,222) were randomly assigned to either four cycles of adjuvant doxorubicin and cyclophosphamide followed by four cycles of docetaxel (AC→T) or one of two trastuzumab-containing regimens: adjuvant doxorubicin and cyclophosphamide followed by docetaxel plus trastuzumab administered for 1 year (AC→TH) or six cycles of docetaxel plus carboplatin combined with trastuzumab administered for 1 year (TCH). The European Organization for Research and Treatment of Cancer (EORTC) Quality of Life Questionnaire C30 and BR-23 were administered at baseline, the start of cycle 4 (mid), and the end of chemotherapy (EOC), as well as at 6, 12, and 24 months after chemotherapy.
Background: Trastuzumab improves survival in the adjuvant treatment of HER-positive breast cancer, although combined therapy with anthracycline-based regimens has been associated with cardiac toxicity. We wanted to evaluate the efficacy and safety of a new nonanthracycline regimen with trastuzumab.
Methods: We randomly assigned 3222 women with HER2-positive early-stage breast cancer to receive doxorubicin and cyclophosphamide followed by docetaxel every 3 weeks (AC-T), the same regimen plus 52 weeks of trastuzumab (AC-T plus trastuzumab), or docetaxel and carboplatin plus 52 weeks of trastuzumab (TCH).
Ortop Traumatol Rehabil
April 2003
Over 30% of pathological fractures require orthopedic devices. These are intended to maintain the patient's mobility, in some cases to facilitate radiation and reduce pain symptoms. Despite the lack of equipment, radiation, though it does not replace surgical treatment, is one of the basic methods bringing about improved quality of life.
View Article and Find Full Text PDFPurpose: To evaluate the effect on survival and quality of life of maintaining hemoglobin (Hb) in the range of 12 to 14 g/dL with epoetin alfa versus placebo in women with metastatic breast cancer (MBC) receiving first-line chemotherapy.
Patients And Methods: Eligible patients were randomly assigned to receive epoetin alfa 40,000 U once weekly or placebo for 12 months. Study drug was initiated if baseline Hb was < or = 13 g/dL or when Hb decreased to < or = 13g/dL during the study.
Background: Intravenous bolus fluorouracil plus leucovorin is the standard adjuvant treatment for colon cancer. The oral fluoropyrimidine capecitabine is an established alternative to bolus fluorouracil plus leucovorin as first-line treatment for metastatic colorectal cancer. We evaluated capecitabine in the adjuvant setting.
View Article and Find Full Text PDFBackground: We compared docetaxel plus doxorubicin and cyclophosphamide (TAC) with fluorouracil plus doxorubicin and cyclophosphamide (FAC) as adjuvant chemotherapy for operable node-positive breast cancer.
Methods: We randomly assigned 1491 women with axillary node-positive breast cancer to six cycles of treatment with either TAC or FAC as adjuvant chemotherapy after surgery. The primary end point was disease-free survival.
Background: The authors previously reported the efficacy of a dose of 4 mg of zoledronic acid in reducing skeletal complications in patients with bone metastases secondary to lung carcinoma and other solid tumors (except carcinomas of the breast and prostate). In the current study, they update these results and report the long-term efficacy and safety of 21 months of treatment with zoledronic acid in a randomized, placebo-controlled trial.
Methods: A total of 773 patients were randomized to receive zoledronic acid (4 mg or 8 mg) or placebo via a 15-minute infusion every 3 weeks for 21 months.
Anemia, a commonly occurring morbidity in patients with cancer, often leads to diminished quality of life (QOL). Numerous clinical trials have shown that epoetin alfa treatment improves hematologic and QOL variables in cancer patients. The clinical trial analysis reported here was performed to assess response to epoetin alfa in patients with hematologic malignancies.
View Article and Find Full Text PDF