Search results for: secure%20IT%20architectures
-
On Design Optimization of Miniaturized Microscrip Dual-Band Rat-Race Coupler with Enhanced Bandwidth
PublicationIn the paper, a novel topology of a miniaturized wideband dual-band rat-race coupler has been presented. Small size of the circuit has been obtained by meandering transmission lines of the conventional circuit. At the same time, the number of independent geometry parameters has been increased in order to secure sufficient circuit flexibility in the context of its design optimization for dual-band operation. Optimum dimensions of...
-
Quantum security and theory of decoherence
PublicationWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublicationRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublicationWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Towards Healthcare Cloud Computing
PublicationIn this paper we present construction of a software platform for supporting medical research teams, in the area of impedance cardiography, called IPMed. Using the platform, research tasks will be performed by the teams through computer-supported cooperative work. The platform enables secure medical data storing, access to the data for research group members, cooperative analysis of medical data and provide analysis supporting tools...
-
Interaction with medical data using QR-codes
PublicationBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
No Quantum Realization of Extremal No-Signaling Boxes
PublicationThe study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand,...
-
Practical I-Voting on Stellar Blockchain
PublicationIn this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...
-
Przydatność białka rybiego w postaci kolagenu lub żelatyny oraz polisacharydu - kapa-karagenu do wytwarzania aktywnych opakowań biodegradowalnych = Usefulness of fish collagen, gelatin and carrageenan for preparation of active biodegradable packages
PublicationSummary - The possibility of use of protein films made of fish collagen or gelatin as well as polysaccharide carrageenan films as carriers of enzymes (lysozyme or lysostaphyne), for preparation of microbiologically active packages, was investigated. It was found that crosslinking of such systems with N-[3(dimethylamino)propyl]-N'-ethylcarboimide (EDC) does not influence the activity of lysozyme immobilized in the films (Table 1)....
-
A structure and design optimization of novel compact microscrip dual-band rat-race coupler with enhanced bandwidth
PublicationIn the letter, a topology of a novel compact wideband dual-band rat-race coupler has been presented along with its computationally efficient design optimization procedure. Reduction of the circuit size has been achieved by meandering transmission lines of the conventional circuit. At the same time, the number of independent geometry parameters has been increased so as to secure sufficient flexibility of the circuit, necessary in...
-
Quantum privacy witness
PublicationWhile it is usually known that the mean value of a single observable is enough to detect entanglement or its distillability, the counterpart of such an approach in the case of quantum privacy has been missing. Here we develop the concept of a privacy witness, i.e., a single observable that may detect the presence of the secure key even in the case of bound entanglement. Then we develop the notion of secret-key estimation based...
-
Whirling system of water exchangein breeding pools
PublicationTo secure the proper conditions of life for sea mammals existing in closed systems one has to maintain the character of the breeding basins (i.e. shape, dimensions, facing of walls and bottom, quality and motion of water) as natural as possible. An appropriate system of water exchange plays a very important role here. A full renewal of water is time-consuming, expensive and troublesome, so can be made only periodically, and should...
-
Modeling an Industrial Revolution: How to Manage Large-Scale, Complex IoT Ecosystems?
PublicationAdvancements around the modern digital industry gave birth to a number of closely interrelated concepts: in the age of the Internet of Things (IoT), System of Systems (SoS), Cyber-Physical Systems (CPS), Digital Twins and the fourth industrial revolution, everything revolves around the issue of designing well-understood, sound and secure complex systems while providing maximum flexibility, autonomy and dynamics. The aim of the...
-
General paradigm for distilling classical key from quantum states
PublicationIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublicationSustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...
-
Medical Image Dataset Annotation Service (MIDAS)
PublicationMIDAS (Medical Image Dataset Annotation Service) is a custom-tailored tool for creating and managing datasets either for deep learning, as well as machine learning or any form of statistical research. The aim of the project is to provide one-fit-all platform for creating medical image datasets that could easily blend in hospital's workflow. In our work, we focus on the importance of medical data anonimization, discussing the...
-
How does the Relationship Between the Mistakes Acceptance Component of Learning Culture and Tacit Knowledge-Sharing Drive Organizational Agility? Risk as a Moderator
PublicationChanges in the business context create the need to adjust organizational knowledge to new contexts to enable the organizational agile responses to secure competitiveness. Tacit knowledge is strongly contextual. This study is based on the assumption that business context determines tacit knowledge creation and acquisition, and thanks to this, the tacit knowledge-sharing processes support agility. Therefore, this study aims to expose...
-
Device-independent quantum key distribution based on measurement inputs
PublicationWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Generation and Propagation of Nonlinear Waves in a Towing Tank
PublicationThe paper presents the results of the research focused on linear and nonlinear wave generation and propagation in a deepwater towing tank equipped with a single flap-type wavemaker of variable draft. The problem of wave generation and propagation has been theoretically formulated and solved by applying an analytical method; linear and nonlinear solutions were obtained. The linear solution has been verified experimentally. The...
-
On Software Unit Testing For Security and Performance Gain At Unit Level
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
On Software Unit Testing For Improving Security And Performance Of Distributed Applications
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
TB11 test for short w-beam road barrier
PublicationFEM (Finite Element Method) is well-suited and widely used tool for simulating a range of phenomena: from these with simple and static behaviour, up to those complicated, highly nonlinear and involving many contacts. In present paper we use one of the advantages of FEM: parametric study could be easily performed and is more economical than series of in-situ tests. If recommended practices is carefully followed, results obtained...
-
Cost‐efficient performance‐driven modelling of multi‐band antennas by variable‐fidelity electromagnetic simulations and customized space mapping
PublicationElectromagnetic (EM) simulations have become an indispensable tool in the design of contemporary antennas. EM‐driven tasks, for example, parametric optimization, entail considerable computational efforts, which may be reduced by employing surrogate models. Yet, data‐driven modelling of antenna characteristics is largely hindered by the curse of dimensionality. This may be addressed using the recently reported domain‐confinement...
-
Progress towards a unified approach to entanglement distribution
PublicationEntanglement distribution is key to the success of secure communication schemes based on quantum mechanics, and there is a strong need for an ultimate architecture able to overcome the limitations of recent proposals such as those based on entanglement percolation or quantum repeaters. In this work we provide a broad theoretical background for the development of such technologies. In particular, we investigate the question of whether...
-
EVALUATION OF EFFECTIVENESS OF WATERJET PROPULSOR FOR A SMALL UNDERWATER VEHICLE
PublicationT he goal of the project described is to replace the existing propulsion system of a small underwater vehicle with a solution less prone to mechanical damage and ensuring a lower risk of the entanglement of fibrous objects suspended in the body of water. Four typical marine screws are utilised in the current design of the vehicle. One possible solution of the problem is the application of waterjet propulsors located...
-
Experimental certification of more than one bit of quantum randomness in the two inputs and two outputs scenario
PublicationOne of the striking properties of quantum mechanics is the occurrence of the Bell-type non-locality. They are a fundamental feature of the theory that allows two parties that share an entangled quantum system to observe correlations stronger than possible in classical physics. In addition to their theoretical significance, non-local correlations have practical applications, such as device-independent randomness generation, providing...
-
Knowledge Sharing and Dynamic Capabilities: Does Gender Matter?
PublicationKnowledge sharing in organizations is a focal process leading to organizational adaptability and sustainable growth. Dynamic capabilities development is critical for this. Diversity, inclusive culture, and gender balance are seen as factors that also support organizations' development. The question of the role of gender in sharing and using knowledge to initiate change in organizations remains open. This study aims to fill this...
-
Randomness Amplification under Minimal Fundamental Assumptions on the Devices
PublicationRecently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...
-
Employee Commitment Matters for CSR Practice, Reputation and Corporate Brand Performance—European Model
PublicationSo far, there have been no studies that explore how employee brand commitment moderates CSR practice outcomes. Employee brand commitment is often claimed as a focal input and output of the CSR. So, it means that it shapes CSR conditions. Then, it is a moderator. This study aims to verify it. Besides, commitment exists in many forms and can be achieved in many ways. Hence the question, if employees are committed to the brand, then...
-
The essence of marine and coastal space – an interdisciplinary perspective
PublicationSea space has been undergoing a profound transformation. Although it retains its inspirational function in arts, literature and philosophy, it has been gaining new anthropogenic dimensions in eco-nomics and urban planning as a source of satisfying human needs i.e. the provision of harmony, beauty, off-shore energy, and biotech substances. Therefore, in this paper marine space is analyzed from a mul-tidimensional perspective of...
-
Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard
PublicationWith the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...
-
Gender as a Moderator of the Double Bias of Mistakes – Knowledge Culture and Knowledge Sharing Effects
PublicationThere is no learning without mistakes. The essence of the double bias of mistakes is the contradiction between an often-declared positive attitude towards learning from mistakes, and negative experiences when mistakes occur. Financial and personal consequences, shame, and blame force desperate employees to hide their mistakes. These adverse outcomes are doubled in organizations by the common belief that managers never make mistakes,...
-
Decision making process using deep learning
PublicationEndüstri 4.0, dördüncü endüstri devrimi veya Endüstriyel Nesnelerin İnterneti (IIoT) olarak adlandırılan sanayi akımı, işletmelere, daha verimli, daha büyük bir esneklikle, daha güvenli ve daha çevre dostu bir şekilde üretim yapma imkanı sunmaktadır. Nesnelerin İnterneti ile bağlantılı yeni teknoloji ve hizmetler birçok endüstriyel uygulamada devrim niteliği taşımaktadır. Fabrikalardaki otomasyon, tahminleyici bakım (PdM – Predictive...
-
The potential of urban agriculture in the revitalisation of a metropolis
PublicationIn Poland, the topic addressing urban areas of agricultural production and gardening activity is still viewed in two main blocks: 1) a shift of the urbanized zone’s boundaries, causing dispersion of suburban buildings as well as creates conflict zone between the residential area and the production and post-production zones; 2) a socially contentious issue of restructuring the inner-city complexes of former employee allotments....
-
Marek Czachor prof. dr hab.
People -
TRANSACT Transform safety-critical cyber-physical systems into distributed solutions for end-users and partners
ProjectsProject realized in Department of Microwave and Antenna Engineering according to 101007260 agreement from 2021-05-12
-
SCOTT Secure COnnected Trustable Things
ProjectsProject realized in Department of Microwave and Antenna Engineering according to 737422 agreement from 2017-05-18
-
InSecTT Intelligent Secure Trustable Things
ProjectsProject realized in Department of Microwave and Antenna Engineering according to 876038 agreement from 2020-05-20