Filters
total: 1333
filtered: 538
-
Catalog
Chosen catalog filters
Search results for: information technology
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Complexity of weak acceptonic conditions in tree automata
PublicationRozważano złożoność problemu pustości dla automatów na drzewach ze słabymi warunkami akceptowalności. Rozważano także translacje pomiędzy słabymi i silnymi warunkami akceptowalności.
-
ON THE NON-LOCALITY OF TRIPARTITE NON-SINGALING BOXES EMERGING FROM WIRINGS
PublicationIt has been recently shown, that some of the tripartite boxes admittin g bilocal decom- position, lead to non-locality under wiring operation applied to t wo of the subsystems [R. Gallego et al. Physical Review Letters 109 , 070401 (2012)]. In the following, we study this phenomenon quantitatively. Basing on the known classes of bo xes closed un- der wirings, we introduce multipartite monotones which are count erparts of bipartite ones...
-
Analysing and processing of geotagged social media
PublicationThe use of location based data analysing tools is an important part of geomarketing strategies among entrepreneurs. One of the key elements of interest is social media data shared by the users. This data is analysed both for its content and its location information, the results help to identify trends represented in the researched regions. In order to verify the possibilities of analysing and processing of geotagged social media...
-
Multiacces quantum communication and product higher rank numerical range
PublicationIn the present paper we initiate the study of the product higher rank numerical range. The latter, being a variant of the higher rank numerical range, is a natural tool for study- ing a construction of quantum error correction codes for multiple access channels. We review properties of this set and relate it to other numerical ranges, which were recently introduced in the literature. Further, the concept is applied to the construction...
-
Operating system security by integrity checking and recovery using write-protected storage
PublicationThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
“Project-factor-decision”. Decisive factors in IT projects and their impact on its success
PublicationThe aim of this article is to indicate the need for a deepening, systematizing and codifying of the theoretical and practical knowledge on IT project management, in the area of management decision-making processes. The scope of decisions made by managers is constantly on the increase. Project managers make decisions not only within the classic triangle of constraints, which consists of a schedule, a budget and the project scope,...
-
NO-BROADCASTING OF NON-SIGNALLING BOXES VIA OPERATIONS WHICH TRANSFORM LOCAL BOXES INTO LOCAL ONES
PublicationWe deal with families of probability distributions satisfying non-signalling condition, called non-signalling boxes and consider a class of operations that transform local boxes into local ones (the one that admit LHV model). We prove that any operation from this class cannot broadcast a bipartite non-local box with 2 binary inputs and outputs. We consider a function called anti-Robustness which can not decrease under these operations....
-
The computational complexity of the backbone coloring problem for bounded-degree graphs with connected backbones
PublicationGiven a graph G, a spanning subgraph H of G and an integer λ>=2, a λ-backbone coloring of G with backbone H is a vertex coloring of G using colors 1, 2, ..., in which the color difference between vertices adjacent in H is greater than or equal to lambda. The backbone coloring problem is to find such a coloring with maximum color that does not exceed a given limit k. In this paper, we study the backbone coloring problem for bounded-degree...
-
Design principles for creating digital transparency in government
PublicationUnder pressure to fight corruption, hold public officials accountable, and build trust with citizens, many governments pursue the quest for greater transparency. They publish data about their internal operations, externalize decision-making processes, establish digital inquiry lines to public officials, and employ other forms of transparency using digital means. Despite the presence of many transparency-enhancing digital tools,...
-
Mobile Security: Threats and Best Practices
PublicationCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
Quantum randomness protected against detection loophole attacks
PublicationDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....
-
On the hardness of computing span of subcubic graphs
PublicationIn the paper we study the problem of finding ξ-colorings with minimal span, i.e. the difference between the largest and the smallest color used.
-
Data governance: Organizing data for trustworthy Artificial Intelligence
PublicationThe rise of Big, Open and Linked Data (BOLD) enables Big Data Algorithmic Systems (BDAS) which are often based on machine learning, neural networks and other forms of Artificial Intelligence (AI). As such systems are increasingly requested to make decisions that are consequential to individuals, communities and society at large, their failures cannot be tolerated, and they are subject to stringent regulatory and ethical requirements....
-
An approach to constructing genuinely entangled subspaces of maximal dimension
PublicationGenuinely entangled subspaces (GESs) are the class of completely entangled subspaces that contain only genuinely multiparty entangled states. They constitute a particularly useful notion in the theory of entanglement but also have found an application, for instance, in quantum error correction and cryptography. In a recent study (Demianowicz and Augusiak in Phys Rev A 98:012313, 2018), we have shown how GESs can be efficiently...
-
An approximation algorithm for maximum P3-packing in subcubic graphs
PublicationW pracy podano algorytm 4/3-przyliżony dla trudnego obliczeniowo problemu umieszczania wierzchołkowo rozłącznych dwukrawędziowych ścieżek w grafach o stopniu maksymalnym 3 i stopniu minimalnym 2. Poprawiono tym samym wcześniejsze wyniki dla grafów kubicznych (A. Kelmans, D. Mubayi, Journal of Graph Theory 45, 2004).
-
Cluster-based instance selection for machine classification
Publication -
Remote learning among students with and without reading difficulties during the initial stages of the COVID-19 pandemic
PublicationThis article presents the results of a survey on yet under-researched aspects of remote learning and learning difficulties in higher education during the initial stage (March – June 2020) of the COVID-19 pandemic. A total of 2182 students from University of Warsaw in Poland completed a two-part questionnaire regarding academic achievements in the academic year 2019/2020, living conditions and stress related to learning and pandemic,...
-
ICT for Global Competitiveness and Economic Growth in Emerging Economies: Economic, Cultural, and Social Innovations for Human Capital in Transition Economies
Publication -
Open Source in Development: Enabling Business and Services
Publication -
A note on mixed tree coloring
PublicationZaproponowano liniowy algorytm dla problemu kolorowania mieszanego w drzewach, uzyskując tym samym poprawę w stosunku do algorytmu o złożoności O(n^2) podanego w pracy [P. Hansen, J. Kuplinsky, D. de Werra, Mixed graph colorings, Math. Methods Oper. Res. 45 (1997) 145-160].
-
Maximum vertex occupation time and inert fugitive: recontamination does help [online]
PublicationRozważamy problem przeszukania danego grafu prostego G w celu przechwycenia niewidocznego i leniwego uciekiniera. Parametrem optymalizacyjnym, który minimalizujemy jest maksymalny czas (liczba tur strategii przeszukiwania), podczas których wierzchołek może być strzeżony (okupowany przez strażnika). Strategia monotoniczna to taka, która nie dopuszcza sytuacji, w której uciekinier dociera do wierzchołka, który wcześniej został oczyszczony....
-
Are quantum correlations symmetric?
PublicationWe provide operational definition of symmetry of entanglement: An entangled state contains symmetric entanglement if its subsystems can be exchanged (swapped) by means of local operations and classical communication. We show that in general states have asymmetric entanglement. This allows to construct nonsymmetric measure of entanglement, and a parameter that reports asymmetry of entanglement contents of quantum state. We propose...
-
Two-spinors, oscillator algebras, and qubits: aspects of manifestly covariant approach to relativistic quantum information
PublicationThe first part of the paper reviews applications of 2-spinor methods to relativistic qubits (analogies between tetrads in Minkowski space and 2-qubit states, qubits defined by means of null directions and their role for elimination of the Peres-Scudo-Terno phenomenon, advantages and disadvantages of relativistic polarization operators defined by the Pauli-Lubanski vector, manifestly covariant approach to unitary representations...
-
Modelling of Diffusing Capacity Measurement Results in Lung Microangiopathy Patients. A novel Diagnostic Suppport
PublicationLung microangiopathy is a little known negative influence of diabetes mellitus on the functioning of the lungs. The aim of this study is to design a supportive method for diagnosing lung microangiopathy. This will be based on routinely performed pulmonary measurements as well as on investigation process modelling and data processing. A model of the diffusion of oxygen from the alveoli to the blood has been described with a set...
-
Smart innovation process enhancement using SOEKS and decisional DNA
PublicationProduct innovation always requires a foundation based on both knowledge and experience. The production and innovation process of products is very similar to the evolution process of humans. The genetic information of humans is stored in genes, chromosomes and DNA. Similarly, the information about the products can be stored in a system having virtual genes, chromosomes and decisional DNA (DDNA). The present paper proposes...
-
ENTERPRISE ACTIVITIES MODELING BY BPMN NOTATION
PublicationDepending on the process behavior, available know-how and organizational goals, different techniques and tools can be used for business process modeling. We concentrate on e-commerce, and try to find the best marketing strategy for the sales process improvement. In the paper we present the multilayer approach to define enterprise scenarios. This allows us to collect the suitable knowledge necessary for enterprise analysis and improvement....
-
Semantic technologies based method of collection, processing and sharing information along food chain
PublicationIn the paper the method of collecting, processing and sharing information along food chain is presented. Innovative features of that method result from advantages of data engineering based on semantic technologies. The source to build ontology are standards and regulations related to food production, and data collected in databases owned by food chain participants. It allows food chain information resources can be represented in...
-
Approaching Secure Industrial Control Systems
PublicationThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Universal and contextualized public services: Digital public service innovation framework
PublicationIn view of the rising social and economic inequalities, public service delivery should be both universal, i.e. independent of the recipients' social or economic status, and contextualized, i.e. able to compensate for different local needs and conditions. Reconciling both properties requires various forms of innovations, chief among them innovations in digital public services. Building upon the four-stage model underpinning the...
-
Implementing Sustainable Development Goals with Digital Government – Aspiration-capacity gap
PublicationSustainable Development Goals (SDGs) represent a commitment by all United Nations Member States to pursue development efforts, including ending poverty and hunger, promoting well-being and education, reducing inequalities, fostering peace, and protecting the planet. Member States and their governments are supposed to take ownership of the SDGs, strengthen the implementation means, and improve public governance as both the means...
-
Trees having many minimal dominating sets
PublicationWe provide an algorithm for listing all minimal dominating sets of a tree of order n in time O(1.4656^n). This leads to that every tree has at most 1.4656^n minimal dominating sets. We also give an infinite family of trees of odd and even order for which the number of minimal dominating sets exceeds 1.4167^n, thus exceeding 2^{n/2}. This establishes a lower bound on the running time of an algorithm for listing all minimal dominating...
-
Platform governance for sustainable development: Reshaping citizen-administration relationships in the digital age
PublicationChanging governance paradigms has been shaping and reshaping the landscape of citizen-administration relationships, from impartial application of rules and regulations by administration to exercise its authority over citizens (bureaucratic paradigm), through provision of public services by administration to fulfil the needs of citizens (consumerist paradigm), to responsibility-sharing between administration and citizens for policy...
-
Computational collective intelligence for enterprise information systems
PublicationCollective intelligence is most often understood as a kind of intelligence which arises on the basis of a group (collective) of autonomous unites (people, systems) which is taskoriented. There are two important aspects of an intelligent collective: The cooperation aspect and the competition aspect (Levy 1997). The first of them means the possibility for integrating the decisions made by the collective members for creating the decision of...
-
Ontology-based text convolution neural network (TextCNN) for prediction of construction accidents
PublicationThe construction industry suffers from workplace accidents, including injuries and fatalities, which represent a significant economic and social burden for employers, workers, and society as a whole.The existing research on construction accidents heavily relies on expert evaluations,which often suffer from issues such as low efficiency, insufficient intelligence, and subjectivity.However, expert opinions provided in construction...
-
Extending loophole-free nonlocal correlations to arbitrarily large distances
PublicationQuantum theory allows spatially separated observers to share nonlocal correlations, which enable them to accomplish classically inconceivable information processing and cryptographic feats. However, the distances over which nonlocal correlations can be realized remain severely limited due to their high fragility to noise and high threshold detection efficiencies. To enable loophole- free nonlocality across large distances, we introduce...
-
The effect of current signal filtering method on the value of cutting power while sawing wood
PublicationThe goal of this work was to investigate an effect of various signal pre-processings on the outline of the electrical power curve and its influence on the measured cutting force estimation. Two signal processing methods were selected for the needs of the experiment, including digital filter and wavelet transform. The filter used was Butterworth, 3rd order band-stop with the cut-out band from 45 Hz to 55 Hz. The second approach...
-
Sources and Fate of PAHs and PCBs in the Marine Environment
PublicationThe assessment of a hazard resulting from the pollution of the environment by chemical compounds is in principle limited to the determination of their concentrations in its various compartments. But for solving many problems in this context, knowledge of the emission sources, transport pathways, and sites of deposition is of great benefit. By far the largest amounts of pollutants, regardless of where they were discharged, end up...
-
Smartphones as tools for equitable food quality assessment
PublicationBackground: The ubiquity of smartphones equipped with an array of sophisticated sensors, ample processing power, network connectivity and a convenient interface makes them a promising tool for non-invasive, portable food quality assessment. Combined with the recent developments in the areas of IoT, deep learning algorithms and cloud computing, they present an opportunity for advancing wide-spread, equitable and sustainable food...
-
Honey bees and their products - bioindicators of environmental contamination
PublicationHuman activities produce contaminants, the amounts and toxicity of which often exceed the environment’s homeostatic capacity to cleanse itself. Hence, the systematic analysis and monitoring of the environment is increasingly a matter of urgency. Honey bees, thanks to their morphological features, and also bee products are regarded as good indicators of environmental pollution by toxic substances, be these heavy metals, radioactive...
-
Arching of railway turnouts by analytical design method
PublicationThe paper involved the issue of arching of the railway turnouts. This is an issue which is given relatively less attention to scientific and research activities. Reference has been made to the book by Wladyslaw Rzepka, under the title „Curved turnouts in plan and profile”, which has been used in Poland for more than 50 years as the main source of information relating to the turnouts on the curve. The book is a compilation of elaborations...
-
Analytical design method for widening the intertrack space
PublicationThe paper involved the issue of arching of the railway turnouts. This is an issue which is given relatively less attention to scientific and research activities. Reference has been made to the book by Wladyslaw Rzepka, under the title „Curved turnouts in plan and profile”, which has been used in Poland for more than 50 years as the main source of information relating to the turnouts on the curve. The book is a compilation of elaborations...
-
Evaluation of the suitability of electronic nose based on fast GC for distinguishing between the plum spirits of different geographical origins
PublicationPlum spirits are obtained exclusively via the alcoholic fermentation and distillation of meaty plums or must composed of plums, with or without stones. The European countries such as Poland, the Slovak Republic, the Czech Republic, Bulgaria and Romania are the leading producers of this alcoholic beverage. Information about the authentication of plum spirits produced in different countries can be found in the published literature....
-
Towards Scalable Simulation of Federated Learning
PublicationFederated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...
-
Are Pair Trading Strategies Profitable During COVID-19 Period?
PublicationPair trading strategy is a well-known profitable strategy in stock, forex, and commodity markets. As most of the world stock markets declined during COVID-19 period, therefore this study is going to observe whether this strategy is still profitable after COVID-19 pandemic. One of the powerful algorithms of DBSCAN under the umbrella of unsupervised machine learning is applied and three clusters were formed by using market and accounting...
-
Distributed Framework for Visual Event Detection in Parking Lot Area
PublicationThe paper presents the framework for automatic detection of various events occurring in a parking lot basing on multiple camera video analysis. The framework is massively distributed, both in the logical and physical sense. It consists of several entities called node stations that use XMPP protocol for internal communication and SRTP protocol with Jingle extension for video streaming. Recognized events include detecting parking...
-
Perspectives of Telematics Implementation in Tri-City Transport Systems Management and Planning
PublicationIn 2010 the City of Gdynia applied for match funding the project ''Implementation of the Integrated Traffic Management System TRISTAR in Tri-City" under the Operational Programme Infrastructure and Environment. This year the project has been placed on a list approved by the Ministry of Infrastructure. Tri-City proceeds with a tender for the implementation of the system. The project will be implemented in key elements are included...
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublicationA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
Detection and localization of selected acoustic events in 3D acoustic field for smart surveillance applications
PublicationA method for automatic determination of position of chosen sound events such as speech signals and impulse sounds in 3-dimensional space is presented. The events are localized in the presence of sound reflections employing acoustic vector sensors. Human voice and impulsive sounds are detected using adaptive detectors based on modified peak-valley difference (PVD) parameter and sound pressure level. Localization based on signals...
-
Hierarchical Estimation of Human Upper Body Based on 2D Observation Utilizing Evolutionary Programming and 'Genetic Memory'
PublicationNew method of the human body pose estimation based on single camera 2D observation is presented. It employs 3D model of the human body, and genetic algorithm combined with annealed particle filter for searching the global optimum of model state, best matching the object's 2D observation. Additionally, motion cost metric is employed, considering current pose and history of the body movement, favouring the estimates with the lowest...