Filtry
wszystkich: 290
wybranych: 226
-
Katalog
Filtry wybranego katalogu
Wyniki wyszukiwania dla: SECURE ITALIAN DOMINATION
-
BeesyBees: A mobile agent-based middleware for a reliable and secure execution of service-based workflow applications in BeesyCluster
PublikacjaIntegrating distributed services into workflows comes with its own set of challenges, including security, coordination, fault tolerance and optimisation of execution time. This paper presents an architecture and implementation - nicknamed BeesyBees - that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middleware that allows users to access distributed resources as well as publish...
-
The domination of ionic conductivity in tetragonal phase of the organometal halide perovskite CH3NH3PbI3-xClx
PublikacjaOrganometal trihalide perovskites have recently gained extreme attention due to their high solar energy conversion in photovoltaic cells. Here, we investigate the contribution of iodide ions to a total conductivity of the mixed lead halide perovskite CH3NH3PbI3−xClx with a use of the modified DC Hebb–Wagner polarization method. It has been identified that an ionic conductivity dominates in tetragonal phase which is associated with room...
-
Secure access control and information protection mechanisms in radio system for monitoring and acquisition of data from traffic enforcement cameras
PublikacjaThe study presents the architecture of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short: RSMAD), particularly concerning access control and protection of confidential data. RSMAD security structure will be discussed in relation to network security issues. Additionally, the paper presents the results of the work associated with the modelling of potential threats to system security.
-
Video Cloud Services for Hospitals: Designing an End-to-End Cloud Service Platform for Medical Video Storage and Secure Access
Publikacja -
Entagled-state cryptographic protocol that remains secure even if nonlocal hidden variables exist and can be measured with arbitrary precision
PublikacjaStandardowe protokoły kryptografii kwantowej nie są bezpieczne jeśli zakłada się, że nielokalne ukryte zmienne istnieją i mogą być zmierzone z dowolną dokładnością. Bezpieczeństwo można odzyskać jeśli jedna z komunikujących się części przypadkowo przełącza się między dwoma standardowymi protokołami.
-
INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS
PublikacjaA minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...
-
Italy, an Extraordinary Commonplace? Stereotypes and Imaginaries of Italianness in Online Communication by Fashion Brands
PublikacjaThe paper explores the use of country-related stereotypes associated with Italian identity in the social media communication of 21 Italian fashion brands on Instagram. Focusing on the concept of “made in Italy”, the research employs image content analysis to identify how the selected sample of brands communicates Italian identity globally. The theoretical framework emphasizes the importance of the Country of Origin (COO) concept,...
-
On proper (1,2)‐dominating sets in graphs
PublikacjaIn 2008, Hedetniemi et al. introduced the concept of (1,)-domination and obtained some interesting results for (1,2) -domination. Obviously every (1,1) -dominating set of a graph (known as 2-dominating set) is (1,2) -dominating; to distinguish these concepts, we define a proper (1,2) -dominating set of a graph as follows: a subset is a proper (1,2) -dominating set of a graph if is (1,2) -dominating and it is not a (1,1) -dominating...
-
À la recherche de l’industrie perdue. La désindustrialisation en Italie entre débat public, réalité économique et fragilités structurelles du pays
PublikacjaThe paper outilines the main aspects of the public debate about Italian deindustrialization in the last 30 years
-
L'Italie. Gagner à tout prix. L'industrie de l'armenent italien pendant la Grande Guerre
PublikacjaThe chapter outlines the economic and technological transformations of the Italian armament industry during the First World War
-
Unités phraséologiques au pays de la traduction: transfert des collocations nomino-adjectivales avec le lexème «femme» dans la traduction de la littérature houellebecquienne du français vers l’italien et le polonais
PublikacjaThe present paper examines the transfer of nomino-adjectival collocations based on the word ‘femme’ (‘woman’) in the literary translation from French into Italian and Polish. The lexical connection analysed in the article can be defined as the habitual juxtaposition of a word with another word (or words) that has a significant frequency in a given language. The research corpus comprises seven Michel Houellebecq’s novels written...
-
Bondage number of grid graphs
PublikacjaThe bondage number b(G) of a nonempty graph G is the cardinality of a smallest set of edges whose removal from G results in a graph with domination number greater than the domination number of G. Here we study the bondage number of some grid-like graphs. In this sense, we obtain some bounds or exact values of the bondage number of some strong product and direct product of two paths.
-
Le reti della terza Italia.Imprese, calcio, sponsirzzazioni e territorio in Serie B 81982-2006)
PublikacjaIl capitolo si occupa dei rapporti tra imprese e sponsirzzazioni dei club calcistici italiani della serie B tra il 1982 e il 2006
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
UN’IPERTROFIA INEVITABILE? LA MOBILITAZIONE INDUSTRIALE E LA TRASFORMAZIONE DELL’APPARATO AMMINISTRATIVO PER LO SFORZO BELLICO
PublikacjaIl capitolo esamina le trasformazioni dell'apparato amministrativo in relazione alle esigenze dello sforzo bellico
-
L'industria e la Storia. La lezione di Giorgio Mori
PublikacjaThe wide contribution of Giorgio Mori for a better understanding of the long-term historical relationships between history and industry is the focus of this chapter. By analysing the long list of books and articles written all along his scientific and academic life it is possible to trace a sort of fil rouge that permits to appreciate the huge effort made by this scholar in offering a fresh and never banal interpretation of the...
-
Sésame, ouvre-toi: internationalisme phraséologique à contenu universel
PublikacjaPhraseological units, characterised by their opaque meaning, are the subject of multiple theoretical works. The following article adds to this discussion by providing another interesting example. It analyses the case of the Arabic phraseological unit ‘open sesame’ from the “Ali Baba and the Forty Thievesˮ folk tale, permeating into French, Italian, Polish, Turkish and Japanese – languages distant both linguistically and culturally....
-
Influence of the local building tradition on Renaissance architecture in Royal Prussia
PublikacjaContrary to the southern Europe the first signs of Renaissance in northern parts of the Holy Roman Empire as well as in Poland and Lithuania might be observed only at the beginning of the 16th century. Initially, they were created by Italian teams which came from Florence, Rome and the region of Como. One of the most recognizable marks of that process was the transfer of the Italian craftsmen and architectural solutions, e.g....
-
Influence of milk, milk fractions and milk proteins on the growth and viability of mastitis-causing Staphylococcus aureus strain
Publikacja -
Impact of the Spirulina maxima extract addition to semen extender on bovine sperm quality
Publikacja -
Super Dominating Sets in Graphs
PublikacjaIn this paper some results on the super domination number are obtained. We prove that if T is a tree with at least three vertices, then n2≤γsp(T)≤n−s, where s is the number of support vertices in T and we characterize the extremal trees.
-
Innovazioni fraseologiche nei titoli della stampa italiana: una classificazione dei motivi delle innovazioni fraseologiche
PublikacjaThe purpose of this study is to investigate the phenomenon of phraseological innovations in the titles of the articles in one of the Italian newspapers La Stampa. In the first part of the article, key terms such as the phraseological norm and the phraseological innovation have been defined, taking into account various terms related to this process. Then, some innovation classifications have been presented. Finally, the analytical...
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublikacjaThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
The International Mercury Cartel, 1928–1954: Controlling Global Supply
PublikacjaThis article describes the features of the international mercury marketduringthe firsthalfofthetwentiethcentury.Itanalyzes the various market agreements made, their effectiveness, and their consequences. The period studied is little understood, although it was one in which mercury production greatly increased. It was also one that saw persistent efforts at market manipulation, owing to a series of agreements between Spanish and...
-
Zapiski pożeracza ksiąg : o rodzajach i funkcjach marginaliów na podstawie notatek Jana Bernarda Bonifacia = Marginalia of the book devourer : about the kind and functions of marginal notes on the basic of Giovanni Bernardino Bonifacio's annotations.
PublikacjaThe aim of this study is to show the rich variety of marginalia written in the books by the hand of their owner, Giovanni Bernardo Bonifacio (1517—1597)‘, also known as "helluo librorum", a "book devourer". Most of the author’s attention has been focused upon recognizing the types and functions of the hand written comments left in the margins of the books by the Italian humanist. The role of the annotations has been seen as a...
-
Zapiski pożeracza ksiąg : o rodzajach i funkcjach marginaliów na podstawie notatek Jana Bernarda Bonifacia = Marginalia of the book devourer : about the kind and functions of marginal notes on the basic of Giovanni Bernardino Bonifacio's annotations.
PublikacjaThe aim of this study is to show the rich variety of marginalia written in the books by the hand of their owner, Giovanni Bernardo Bonifacio (1517—1597)‘, also known as "helluo librorum", a "book devourer". Most of the author’s attention has been focused upon recognizing the types and functions of the hand written comments left in the margins of the books by the Italian humanist. The role of the annotations has been seen as...
-
Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange
PublikacjaThis paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...
-
EVALUATION OF THE EFFICIENCY OF FLEXICURITY IMPLEMENTATION IN OECD COUNTRIES
PublikacjaFlexicurity is a policy of flexible and secure labour market. It has been the subject of many analyses, however, a coherent evaluation methodology is difficult to specify. The purpose of this paper is to propose a Data Envelopment Analysis based model for the evaluation of the efficiency of flexicurity implementation in OECD countries. The results will be used to create the ranking of countries, to determine changes in time, and...
-
L’indistricabile intreccio. Imprese, imprenditori e regime fascista. (An Inextricable Intertwining. Companies, Entrepreneurs, and the Fascist Regime)
PublikacjaThe papers of this section analyse the relationships between the economic and business community and the fascist regime. Their aim is to refresh the interpretations that were established in the 1960s-1970s and remained undisputed in the decades thereafter, becoming a sort of mantra among Italian contemporary historians. The article presents the most relevant contributions of that historiographical season, explaining the reasons...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Restrained differential of a graph
PublikacjaGiven a graph $G=(V(G), E(G))$ and a vertex $v\in V(G)$, the {open neighbourhood} of $v$ is defined to be $N(v)=\{u\in V(G) :\, uv\in E(G)\}$. The {external neighbourhood} of a set $S\subseteq V(G)$ is defined as $S_e=\left(\cup_{v\in S}N(v)\right)\setminus S$, while the \emph{restrained external neighbourhood} of $S$ is defined as $S_r=\{v\in S_e : N(v)\cap S_e\neq \varnothing\}$. The restrained differential of a graph $G$ is...
-
Infedeltà nel trasferimento delle collocazioni nella traduzione dei romanzi di Michel Houellebecq dal francese all’italiano
PublikacjaBuilding on my PhD project, this paper explores fidelity challenges in the transfer of verb-nominal collocations (VNC) in the Italian translations of seven of Michel Houellebecq’s novels. I examine various kinds of infidelity, such as omissions, errors, incongruence in constituent transmission, incoherence in recurrent VNC transmission, and infidelity at the level of phraseological coverage. The accurate transfer...
-
Preface of guest editors
PublikacjaA special issue of Discussiones Mathematice Graph Theory (DMGT) is dedicated to selected papers presented at the 12th Workshop on Graph Theory: Colourings, Independence and Domination (CID) held on 16-21 September 2007 in Karpacz, Poland. It continues a series of international workshops: 1993-1997 in Lubiatów, 1998-2001 in Gronów, 2003 and 2005 in Karpacz. About 70 participants formed the audience of six invited lectures and 68...
-
Critical Remarks on Landauer’s principle of erasure– dissipation: Including notes on Maxwell demons and Szilard engines
PublikacjaWe briefly address Landauer’s Principle and some related issues in thermal demons. We show that an error-free Turing computer works in the zero-entropy limit, which proves Landauer’s derivation incorrect. To have a physical logic gate, memory or information-engine, a few essential components necessary for the operation of these devices are often neglected, such as various aspects of control, damping and the fluctuation–dissipation...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublikacjaIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
Assessment of TFP in European and American higher education institutions – application of Malmquist indices
PublikacjaIn this study we apply Malmquist methodology, based on the estimation of distance measures through Data Envelopment Analysis (DEA), to a sample of 500 universities (in 10 European countries and the U.S.) over the period 2000 to 2010 in order to assess and compare their productivity. On average, a rise in TFP is registered for the whole European sample (strongest for Dutch and Italian HEIs), while the productivity of American HEIs...
-
Ancillary services to grids provided with distributed generation
PublikacjaThe paper introduces system for utilization of the customer-side generated energy. Additionally system can secure some ancillary services to grids. Those services include: current active filtering, load voltage stabilization and in case of grid voltage faults - uninterruptible load supplying (possible with energy storage device). Presented experimental results confirm flexibility of this arrangement in processes of power delivery...
-
The project IDENT: Multimodal biometric system for bank client identity verification
PublikacjaBiometric identity verification methods are implemented inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank cli-ent voice recognition and hand vein distribution verification. A secure communication system based on an intra-bank client-server architecture was designed for this purpose. Hitherto achieved progress within the project is reported in this paper with a focus...
-
Some variations of perfect graphs
PublikacjaWe consider (ψk−γk−1)-perfect graphs, i.e., graphs G for which ψk(H) =γk−1(H) for any induced subgraph H of G, where ψk and γk−1 are the k -path vertex cover number and the distance (k−1)-domination number, respectively. We study (ψk−γk−1)-perfect paths, cycles and complete graphs for k≥2. Moreover, we provide a complete characterisation of (ψ2−γ1)-perfect graphs describing the set of its forbidden induced subgraphs and providing...
-
REVITALIZATION PROJECT OF SLUM TRANSFORMATION: A CASE STUDY HAY-AL TANAK,BEIRUT,LEBANON
PublikacjaSlums are global phenomena that exist as a solution for those who couldn’t afford a house. This phenomenon is growing accompanying the rapid urbanization and the growth of the urban population, three-quarter of the world population anticipated to live in an urban environment by 2050 (Avis, 2016, p. 57). This paper reviews slum's evaluation of the revitalization project for one of the poorest slums in Beirut called Hay-Al Tanak....
-
Can Evaluation Patterns Enable End Users to Evaluate the Quality of an e-learning System? An Exploratory Study.
PublikacjaThis paper presents the results of an exploratory study whose main aim is to verify if the Pattern-Based (PB) inspection technique enables end users to perform reliable evaluation of e-learning systems in real work-related settings. The study involved 13 Polish and Italian participants, who did not have an HCI background, but used e-learning platforms for didactic and/or administrative purposes. The study revealed that the participants...
-
Dynamics of productivity in higher education: cross-european evidence based on bootstrapped Malmquist indices
PublikacjaAbstract This study examines patterns of productivitychange in a large set of 266 public higher educationinstitutions (HEIs) in 7 European countries across the timeperiod 2001-2005. We adopt consistent bootstrap estimationprocedures to obtain confidence intervals for Malmquistindices of HEI productivity and their components.Consequently, we are able to assess the statistical significanceof changes in HEI productivity, efficiency...
-
Mispronunciation Detection in Non-Native (L2) English with Uncertainty Modeling
PublikacjaA common approach to the automatic detection of mispronunciation in language learning is to recognize the phonemes produced by a student and compare it to the expected pronunciation of a native speaker. This approach makes two simplifying assumptions: a) phonemes can be recognized from speech with high accuracy, b) there is a single correct way for a sentence to be pronounced. These assumptions do not always hold, which can result...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublikacjaManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Public spaces connecting cities. Green and Blue Infrastructures potential.
PublikacjaA city fragmentation causes a lot of negative effects in urban environment such as: disconnecting the environmental, functional and compositional relations, a loss of urban compactness, chaotic development, visual chaos, a domination of technical landscape, reduction of security. This is why one of main challenges for urban planners is to connect the fragmented structures by creating friendly, attractive and safe public space....
-
Weryfikacja Poziomów Nienaruszalności Bezpieczeństwa z uwzględnieniem Zagadnień Ochrony Informacji
PublikacjaNiniejszy rozdział poświęcono wybranym istotnym zagadnieniom analizy bezpieczeństwa funkcjonalnego, w szczególności weryfikacji poziomów nienaruszalności bezpieczeństwa SIL funkcji bezpieczeństwa implementowanych w rozproszonych systemach sterowania i zabezpieczeń z uwzględnieniem zagadnień ochrony informacji. Zaproponowano metodę opartą na informacji ilościowej i jakościowej do weryfikacji SIL (IEC 61508, 61511) z uwzględnieniem...
-
Internationalization and Quality Assurance in Higher Education
PublikacjaInternationalization is an inevitable phenomenon among all contemporary higher education institutions (HEIs) in a globalizing world. It is the driving force for development and progress. In course of the last 30 years, it became an inevitable element of HE management. However, it carries along a number of risks, pitfalls, and organizational challenges. To hedge those, quality assurance (QA) is called to the stage. HEIs therefore...
-
Integrated functional safety and cyber security analysis
PublikacjaThe chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...
-
Karhunen-Loeve-based approach to tracking of rapidly fading wireless communication channels
PublikacjaWhen parameters of wireless communication channels vary at a fast rate, simple estimation algorithms, such as weighted least squares (WLS) or least mean squares (LMS) algorithms, cannot estimate them with the accuracy needed to secure the reliable operation of the underlying communication systems. In cases like this, the local basis function (LBF) estimation technique can be used instead, significantly increasing the achievable...
-
Exploring universities' efficiency differentials between countries in a multi-year perspective: an application of bootstrap DEA and Malmquist index to Italy and Poland, 2001-2011
PublikacjaThis study employs data envelopment analysis (DEA) to evaluate relative efficiency of a sample of 54 Italian and 30 Polish public universities for the period between 2001 and 2011. The examination is conducted in two steps: first unbiased DEA efficiency scores are estimated and then are regressed on external variables to quantitatively asses the direction and magnitude of the impact of potential determinants. The analysis shows...