Adam Wójtowicz

Learn More
It becomes possible to take advantage of seamless biometric authentication on mobile devices due to increasing quality and quantity of built-in sensors, increasing processing power of the devices, and wireless connectivity. However, practical effectiveness of the biometric authentication application depends on user’s environment conditions that can decrease(More)
Proteolytic activity driven by urokinase (uPA) is commonly recognized as an important factor in metastasis and angiogenesis. The eradication of unwanted uPA activity expressed by cancer cells results in the inhibition of metastasis and angiogenesis. Development of novel and highly selective uPA inhibitors could, therefore, produce new treatments of cancer.(More)
MOTIVATION Liquid state nuclear magnetic resonance (NMR) spectroscopy has now been well established as a method for RNA tertiary structure determination. Most of the steps involved in the determination of RNA molecules are performed using computer programs. They however, do not apply to resonance assignment being the starting point of the whole procedure.(More)
Resonance assignment remains one of the hardest stages in RNA tertiary structure elucidation with the use of nuclear magnetic resonance spectroscopy. We propose an evolutionary algorithm being a tool for an automatic design of the procedure. NOE pathway, which determines the assignments, is constructed during an analysis of possible connections between(More)
OBJECTIVE Cryosurgery is a minimally invasive cancer treatment that uses liquid nitrogen or supercooled argon to freeze and destroy tumors. To achieve complete ablation of the prostate, we have developed a computer program that can determine treatment effects by calculating iceball formation. This is based on a three-dimensional (3D) model of the patient's(More)
In virtual reality systems which are collaborative and dynamic, i.e. where at run-time mutually interactive objects can be added or removed in different contexts and where their behavior can be modified, the problem of data security and privacy protection is renewed. In such virtual worlds operations on objects should or should not be allowed to users(More)