Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Piątkowski, Jacek." wg kryterium: Autor


Wyświetlanie 1-7 z 7
Tytuł:
Laparoskopowe operacje przepuklin pachwinowych w materiale własnym
Autorzy:
Załucki, Marek.
Piątkowski, Jacek.
Jackowski, Marek.
Jędrzejczyk, Waldemar.
Powiązania:
Lekarz Wojskowy 1996, Suplement I, s. [97]-100
Data publikacji:
1996
Tematy:
Przepuklina pachwinowa leczenie chirurgia materiały konferencyjne
Laparoskopia stosowanie materiały konferencyjne
Chirurgia
Materiały konferencyjne
Opis:
Tab.; Bibliogr.; Materiały IV Sympozjum Sekcji Viscero-Syntezy Towarzystwa Chirurgów Polskich. Kazimierz Dolny 4-6 maja 1995.
Dostawca treści:
Bibliografia CBW
Artykuł
Tytuł:
Simultaneous TAPP (transabdominal pre-peritoneal technique) for inguinal hernia and cholecystectomy – a feasible and safe procedure
Autorzy:
Lehmann, Andrzej
Piątkowski, Jacek
Nowak, Mariusz
Jackowski, Marek
Pawlak, Maciej
Witzling, Mieczysław
Śmietański, Maciej
Powiązania:
https://bibliotekanauki.pl/articles/1395705.pdf
Data publikacji:
2014-02-01
Wydawca:
Index Copernicus International
Tematy:
TAPP
transabdominal pre-peritoneal technique
laparoscopic cholecystectomy
simultaneous
Opis:
Inguinal hernia repair and cholecystectomy are amongst the most common surgical procedures performed worldwide. In the recent decades, early disease detection has notably increased due to easily accessible ultrasound. The aim of the study was to assess the safety and the possibility of performing a simultaneous hernia repair and cholecystectomy using the laparoscopic approach. Material and methods. Eight patients (M=100%) with inguinal hernia (3 with bilateral hernia) and cholelithiasis were included in the study. The presence of gallstones was confirmed by imaging. Mean age of the patients was 61.75 years (ranging from 47-72). Simultaneous laparoscopic cholecystectomy and transabdominal pre-peritoneal hernia repair was performed in all patients. Postoperative complications were analyzed to assess the safety and feasibility of the procedure. Results. Mean operating time was 55 minutes (ranging from 30-60) and average length of stay was 3.625 days (ranging from 2-7). In order to perform a cholecystectomy, 1-2 additional trocars were used. No intra-operative complications were observed. At a follow-up visit on postoperative day 7, a small hematoma (10 ml of blood was punctured) in the right groin was noted in one patient. Another patient developed fever postoperatively, treated conservatively with antibiotics. Conclusions. Simultaneous TAPP and cholecystectomy proved to be a safe and feasible procedure. Acceptable operating time and hospital stay, as well as lack of influence on the length of convalescence, may present an interesting alternative to two separate procedures
Źródło:
Polish Journal of Surgery; 2014, 86, 2; 73-76
0032-373X
2299-2847
Pojawia się w:
Polish Journal of Surgery
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Trivializing verification of cryptographic protocols
Autorzy:
Piątkowski, Jacek
Szymoniak, Sabina
Powiązania:
https://bibliotekanauki.pl/articles/38704303.pdf
Data publikacji:
2023
Wydawca:
Instytut Podstawowych Problemów Techniki PAN
Tematy:
security protocol verification
tree visualisation
hierarchical data structure
weryfikacja protokołu bezpieczeństwa
wizualizacja drzewa
hierarchiczna struktura danych
Opis:
One of the main problems of the digital world is information security. Every second, peopleprocess millions of pieces of information that must be protected from unauthorized access. Cryptographic protocols that define the communication plan and the cryptographictechniques used to secure the messages come to the rescue. These protocols should alsobe regularly verified regarding their ability to protect systems from exposure to threatsfrom the computer network. Bearing in mind the need to secure communication, verify thecorrect operation of security methods and process large amounts of numerical data, we decided to deal with the issues of modeling the execution of cryptographic protocols and theirverification based on the CMMTree model. In this article, we present a tool that verifiesa protocol’s security. The tool allows for modelling a protocol and verifying that the pathin the execution tree represents an attack on that protocol. The tool implements a specially defined hierarchy of protocol classes and a predicate that determines whether a nodecan be attached to a tree. We conducted a number of tests on well-known cryptographicprotocols, which confirmed the correctness and effectiveness of our tool. The tool foundthe attack on the protocols or built an execution tree for them.
Źródło:
Computer Assisted Methods in Engineering and Science; 2023, 30, 4; 389-406
2299-3649
Pojawia się w:
Computer Assisted Methods in Engineering and Science
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-7 z 7

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies