Search results for: SECURE ITALIAN DOMINATION
-
G|A|M|E: The Italian Journal of Game Studies
Journals -
Aleksandra Parteka dr hab. inż.
PeopleAbout me: I am an associate professor and head of doctoral studies at the Faculty of Management and Economics, Gdansk University of Technology (GdanskTech, Poland). I got my MSc degree in Economics from Gdansk University of Technology (2003) and Universita’ Politecnica delle Marche (2005), as well as MA degree in Contemporary European Studies from Sussex University (2006, with distinction). I received my PhD in Economics...
-
International Conference on Algorithms and Complexity (was Italian Conference )
Conferences -
ACM Workshop on Secure Web Services
Conferences -
Italian Political Science Review-Rivista Italiana di Scienza Politica
Journals -
Italy, an Extraordinary Commonplace? Stereotypes and Imaginaries of Italianness in Online Communication by Fashion Brands
PublicationThe paper explores the use of country-related stereotypes associated with Italian identity in the social media communication of 21 Italian fashion brands on Instagram. Focusing on the concept of “made in Italy”, the research employs image content analysis to identify how the selected sample of brands communicates Italian identity globally. The theoretical framework emphasizes the importance of the Country of Origin (COO) concept,...
-
On proper (1,2)‐dominating sets in graphs
PublicationIn 2008, Hedetniemi et al. introduced the concept of (1,)-domination and obtained some interesting results for (1,2) -domination. Obviously every (1,1) -dominating set of a graph (known as 2-dominating set) is (1,2) -dominating; to distinguish these concepts, we define a proper (1,2) -dominating set of a graph as follows: a subset is a proper (1,2) -dominating set of a graph if is (1,2) -dominating and it is not a (1,1) -dominating...
-
International Conference on Dependable, Autonomic and Secure Computing
Conferences -
Paweł Lubomski dr inż.
PeoplePaweł Lubomski is the director of the IT Services Centre at the Gdańsk University of Technology. He is responsible for developing and maintaining the central information systems of the university. He is also in charge of the R&D team and works on new approaches to IT systems’ protection. He also acts as the project manager of two big innovative IT projects co-financed by the European Funds. He received a PhD degree in computer...
-
À la recherche de l’industrie perdue. La désindustrialisation en Italie entre débat public, réalité économique et fragilités structurelles du pays
PublicationThe paper outilines the main aspects of the public debate about Italian deindustrialization in the last 30 years
-
L'Italie. Gagner à tout prix. L'industrie de l'armenent italien pendant la Grande Guerre
PublicationThe chapter outlines the economic and technological transformations of the Italian armament industry during the First World War
-
angielski
PublicationA subset D of V (G) is a dominating set of a graph G if every vertex of V (G) − D has at least one neighbour in D; let the domination number γ(G) be the minimum cardinality among all dominating sets in G. We say that a graph G is γ-q-critical if subdividing any q edges results in a graph with domination number greater than γ(G) and there exists a set of q − 1 edges such that subdividing these edges results in a graph with domination...
-
Kacper Wereszko mgr inż.
PeopleKacper Wereszko received the M.Sc. in 2016 (field of study: computer science, specialization: Internet technologies and algorithms). Since 2017 he is a Ph.D. student in the field of computer science. He works as assistant in Department of Algorithms and System Modelling. His research interests focus on security properties of graphs, domination problems in graphs and their practical applications.
-
Unités phraséologiques au pays de la traduction: transfert des collocations nomino-adjectivales avec le lexème «femme» dans la traduction de la littérature houellebecquienne du français vers l’italien et le polonais
PublicationThe present paper examines the transfer of nomino-adjectival collocations based on the word ‘femme’ (‘woman’) in the literary translation from French into Italian and Polish. The lexical connection analysed in the article can be defined as the habitual juxtaposition of a word with another word (or words) that has a significant frequency in a given language. The research corpus comprises seven Michel Houellebecq’s novels written...
-
Bondage number of grid graphs
PublicationThe bondage number b(G) of a nonempty graph G is the cardinality of a smallest set of edges whose removal from G results in a graph with domination number greater than the domination number of G. Here we study the bondage number of some grid-like graphs. In this sense, we obtain some bounds or exact values of the bondage number of some strong product and direct product of two paths.
-
Le reti della terza Italia.Imprese, calcio, sponsirzzazioni e territorio in Serie B 81982-2006)
PublicationIl capitolo si occupa dei rapporti tra imprese e sponsirzzazioni dei club calcistici italiani della serie B tra il 1982 e il 2006
-
Wiktor Sieklicki dr inż.
PeopleMechanical Engineer degree in Automatics and Robotics achieved in 2006 from Mechanical Faculty of Gdansk University of Technology, Mechanics and Strength of the Materials Department (thesis topic: "Micro electro-mechanical devices for laparoscopy"). Thesis written during the exchange program with Genova University, Italy. PhD in Mechatronics finished in 2010 from Mechanical Faculty of Gdansk University of Technology, Mechanics...
-
Graph security testing
PublicationSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
UN’IPERTROFIA INEVITABILE? LA MOBILITAZIONE INDUSTRIALE E LA TRASFORMAZIONE DELL’APPARATO AMMINISTRATIVO PER LO SFORZO BELLICO
PublicationIl capitolo esamina le trasformazioni dell'apparato amministrativo in relazione alle esigenze dello sforzo bellico
-
Joint Working Conference on Secure Information Networks: Communications and Multimedia Security
Conferences -
L'industria e la Storia. La lezione di Giorgio Mori
PublicationThe wide contribution of Giorgio Mori for a better understanding of the long-term historical relationships between history and industry is the focus of this chapter. By analysing the long list of books and articles written all along his scientific and academic life it is possible to trace a sort of fil rouge that permits to appreciate the huge effort made by this scholar in offering a fresh and never banal interpretation of the...
-
Sésame, ouvre-toi: internationalisme phraséologique à contenu universel
PublicationPhraseological units, characterised by their opaque meaning, are the subject of multiple theoretical works. The following article adds to this discussion by providing another interesting example. It analyses the case of the Arabic phraseological unit ‘open sesame’ from the “Ali Baba and the Forty Thievesˮ folk tale, permeating into French, Italian, Polish, Turkish and Japanese – languages distant both linguistically and culturally....
-
Influence of the local building tradition on Renaissance architecture in Royal Prussia
PublicationContrary to the southern Europe the first signs of Renaissance in northern parts of the Holy Roman Empire as well as in Poland and Lithuania might be observed only at the beginning of the 16th century. Initially, they were created by Italian teams which came from Florence, Rome and the region of Como. One of the most recognizable marks of that process was the transfer of the Italian craftsmen and architectural solutions, e.g....
-
Influence of milk, milk fractions and milk proteins on the growth and viability of mastitis-causing Staphylococcus aureus strain
Publication -
Impact of the Spirulina maxima extract addition to semen extender on bovine sperm quality
Publication -
Super Dominating Sets in Graphs
PublicationIn this paper some results on the super domination number are obtained. We prove that if T is a tree with at least three vertices, then n2≤γsp(T)≤n−s, where s is the number of support vertices in T and we characterize the extremal trees.
-
Valence state of Manganium in a MnCoO ceramics
Open Research DataManganium -cobalt based ceramics materials were produced by solid state reaction and sintred in a furnance in air atmosphere for 20h. Annealing temperature was 600 Celsius degree. For investigations a series of samples, with a various composition was chosen: MnCoO, Mn, Co2O and Mn2CoO. In order to determine valence states of the Mn, X-Ray photoemission...
-
Karolina Lademann mgr
PeopleCurriculum vitae
-
Innovazioni fraseologiche nei titoli della stampa italiana: una classificazione dei motivi delle innovazioni fraseologiche
PublicationThe purpose of this study is to investigate the phenomenon of phraseological innovations in the titles of the articles in one of the Italian newspapers La Stampa. In the first part of the article, key terms such as the phraseological norm and the phraseological innovation have been defined, taking into account various terms related to this process. Then, some innovation classifications have been presented. Finally, the analytical...
-
The International Mercury Cartel, 1928–1954: Controlling Global Supply
PublicationThis article describes the features of the international mercury marketduringthe firsthalfofthetwentiethcentury.Itanalyzes the various market agreements made, their effectiveness, and their consequences. The period studied is little understood, although it was one in which mercury production greatly increased. It was also one that saw persistent efforts at market manipulation, owing to a series of agreements between Spanish and...
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublicationThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Zapiski pożeracza ksiąg : o rodzajach i funkcjach marginaliów na podstawie notatek Jana Bernarda Bonifacia = Marginalia of the book devourer : about the kind and functions of marginal notes on the basic of Giovanni Bernardino Bonifacio's annotations.
PublicationThe aim of this study is to show the rich variety of marginalia written in the books by the hand of their owner, Giovanni Bernardo Bonifacio (1517—1597)‘, also known as "helluo librorum", a "book devourer". Most of the author’s attention has been focused upon recognizing the types and functions of the hand written comments left in the margins of the books by the Italian humanist. The role of the annotations has been seen as a...
-
Zapiski pożeracza ksiąg : o rodzajach i funkcjach marginaliów na podstawie notatek Jana Bernarda Bonifacia = Marginalia of the book devourer : about the kind and functions of marginal notes on the basic of Giovanni Bernardino Bonifacio's annotations.
PublicationThe aim of this study is to show the rich variety of marginalia written in the books by the hand of their owner, Giovanni Bernardo Bonifacio (1517—1597)‘, also known as "helluo librorum", a "book devourer". Most of the author’s attention has been focused upon recognizing the types and functions of the hand written comments left in the margins of the books by the Italian humanist. The role of the annotations has been seen as...
-
Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange
PublicationThis paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...
-
EVALUATION OF THE EFFICIENCY OF FLEXICURITY IMPLEMENTATION IN OECD COUNTRIES
PublicationFlexicurity is a policy of flexible and secure labour market. It has been the subject of many analyses, however, a coherent evaluation methodology is difficult to specify. The purpose of this paper is to propose a Data Envelopment Analysis based model for the evaluation of the efficiency of flexicurity implementation in OECD countries. The results will be used to create the ranking of countries, to determine changes in time, and...
-
L’indistricabile intreccio. Imprese, imprenditori e regime fascista. (An Inextricable Intertwining. Companies, Entrepreneurs, and the Fascist Regime)
PublicationThe papers of this section analyse the relationships between the economic and business community and the fascist regime. Their aim is to refresh the interpretations that were established in the 1960s-1970s and remained undisputed in the decades thereafter, becoming a sort of mantra among Italian contemporary historians. The article presents the most relevant contributions of that historiographical season, explaining the reasons...
-
Nadzeya Sabatini dr
PeopleNadzeya Sabatini is Assistant Professor in Digital Transformation at Gdańsk University of Technology (Gdansk, Poland), its Department of Informatics in Management (Faculty of Management and Economics). Nadzeya is lecturer at USI – Università della Svizzera italiana (Lugano, Switzerland), a research fellow at the Institute of Digital Technologies for Communication of the same university, and coordinator of MSc in Digital Fashion...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublicationAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Restrained differential of a graph
PublicationGiven a graph $G=(V(G), E(G))$ and a vertex $v\in V(G)$, the {open neighbourhood} of $v$ is defined to be $N(v)=\{u\in V(G) :\, uv\in E(G)\}$. The {external neighbourhood} of a set $S\subseteq V(G)$ is defined as $S_e=\left(\cup_{v\in S}N(v)\right)\setminus S$, while the \emph{restrained external neighbourhood} of $S$ is defined as $S_r=\{v\in S_e : N(v)\cap S_e\neq \varnothing\}$. The restrained differential of a graph $G$ is...
-
Infedeltà nel trasferimento delle collocazioni nella traduzione dei romanzi di Michel Houellebecq dal francese all’italiano
PublicationBuilding on my PhD project, this paper explores fidelity challenges in the transfer of verb-nominal collocations (VNC) in the Italian translations of seven of Michel Houellebecq’s novels. I examine various kinds of infidelity, such as omissions, errors, incongruence in constituent transmission, incoherence in recurrent VNC transmission, and infidelity at the level of phraseological coverage. The accurate transfer...
-
Preface of guest editors
PublicationA special issue of Discussiones Mathematice Graph Theory (DMGT) is dedicated to selected papers presented at the 12th Workshop on Graph Theory: Colourings, Independence and Domination (CID) held on 16-21 September 2007 in Karpacz, Poland. It continues a series of international workshops: 1993-1997 in Lubiatów, 1998-2001 in Gronów, 2003 and 2005 in Karpacz. About 70 participants formed the audience of six invited lectures and 68...
-
Critical Remarks on Landauer’s principle of erasure– dissipation: Including notes on Maxwell demons and Szilard engines
PublicationWe briefly address Landauer’s Principle and some related issues in thermal demons. We show that an error-free Turing computer works in the zero-entropy limit, which proves Landauer’s derivation incorrect. To have a physical logic gate, memory or information-engine, a few essential components necessary for the operation of these devices are often neglected, such as various aspects of control, damping and the fluctuation–dissipation...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublicationIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
Daniele Cerrato
PeopleResearcher in Italian and women studies
-
Assessment of TFP in European and American higher education institutions – application of Malmquist indices
PublicationIn this study we apply Malmquist methodology, based on the estimation of distance measures through Data Envelopment Analysis (DEA), to a sample of 500 universities (in 10 European countries and the U.S.) over the period 2000 to 2010 in order to assess and compare their productivity. On average, a rise in TFP is registered for the whole European sample (strongest for Dutch and Italian HEIs), while the productivity of American HEIs...
-
The project IDENT: Multimodal biometric system for bank client identity verification
PublicationBiometric identity verification methods are implemented inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank cli-ent voice recognition and hand vein distribution verification. A secure communication system based on an intra-bank client-server architecture was designed for this purpose. Hitherto achieved progress within the project is reported in this paper with a focus...
-
Ancillary services to grids provided with distributed generation
PublicationThe paper introduces system for utilization of the customer-side generated energy. Additionally system can secure some ancillary services to grids. Those services include: current active filtering, load voltage stabilization and in case of grid voltage faults - uninterruptible load supplying (possible with energy storage device). Presented experimental results confirm flexibility of this arrangement in processes of power delivery...
-
Some variations of perfect graphs
PublicationWe consider (ψk−γk−1)-perfect graphs, i.e., graphs G for which ψk(H) =γk−1(H) for any induced subgraph H of G, where ψk and γk−1 are the k -path vertex cover number and the distance (k−1)-domination number, respectively. We study (ψk−γk−1)-perfect paths, cycles and complete graphs for k≥2. Moreover, we provide a complete characterisation of (ψ2−γ1)-perfect graphs describing the set of its forbidden induced subgraphs and providing...
-
REVITALIZATION PROJECT OF SLUM TRANSFORMATION: A CASE STUDY HAY-AL TANAK,BEIRUT,LEBANON
PublicationSlums are global phenomena that exist as a solution for those who couldn’t afford a house. This phenomenon is growing accompanying the rapid urbanization and the growth of the urban population, three-quarter of the world population anticipated to live in an urban environment by 2050 (Avis, 2016, p. 57). This paper reviews slum's evaluation of the revitalization project for one of the poorest slums in Beirut called Hay-Al Tanak....
-
Can Evaluation Patterns Enable End Users to Evaluate the Quality of an e-learning System? An Exploratory Study.
PublicationThis paper presents the results of an exploratory study whose main aim is to verify if the Pattern-Based (PB) inspection technique enables end users to perform reliable evaluation of e-learning systems in real work-related settings. The study involved 13 Polish and Italian participants, who did not have an HCI background, but used e-learning platforms for didactic and/or administrative purposes. The study revealed that the participants...