Filtry
wszystkich: 292
-
Katalog
Wyniki wyszukiwania dla: SECURE ITALIAN DOMINATION
-
Can Evaluation Patterns Enable End Users to Evaluate the Quality of an e-learning System? An Exploratory Study.
PublikacjaThis paper presents the results of an exploratory study whose main aim is to verify if the Pattern-Based (PB) inspection technique enables end users to perform reliable evaluation of e-learning systems in real work-related settings. The study involved 13 Polish and Italian participants, who did not have an HCI background, but used e-learning platforms for didactic and/or administrative purposes. The study revealed that the participants...
-
Dynamics of productivity in higher education: cross-european evidence based on bootstrapped Malmquist indices
PublikacjaAbstract This study examines patterns of productivitychange in a large set of 266 public higher educationinstitutions (HEIs) in 7 European countries across the timeperiod 2001-2005. We adopt consistent bootstrap estimationprocedures to obtain confidence intervals for Malmquistindices of HEI productivity and their components.Consequently, we are able to assess the statistical significanceof changes in HEI productivity, efficiency...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublikacjaManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Public spaces connecting cities. Green and Blue Infrastructures potential.
PublikacjaA city fragmentation causes a lot of negative effects in urban environment such as: disconnecting the environmental, functional and compositional relations, a loss of urban compactness, chaotic development, visual chaos, a domination of technical landscape, reduction of security. This is why one of main challenges for urban planners is to connect the fragmented structures by creating friendly, attractive and safe public space....
-
Weryfikacja Poziomów Nienaruszalności Bezpieczeństwa z uwzględnieniem Zagadnień Ochrony Informacji
PublikacjaNiniejszy rozdział poświęcono wybranym istotnym zagadnieniom analizy bezpieczeństwa funkcjonalnego, w szczególności weryfikacji poziomów nienaruszalności bezpieczeństwa SIL funkcji bezpieczeństwa implementowanych w rozproszonych systemach sterowania i zabezpieczeń z uwzględnieniem zagadnień ochrony informacji. Zaproponowano metodę opartą na informacji ilościowej i jakościowej do weryfikacji SIL (IEC 61508, 61511) z uwzględnieniem...
-
Karhunen-Loeve-based approach to tracking of rapidly fading wireless communication channels
PublikacjaWhen parameters of wireless communication channels vary at a fast rate, simple estimation algorithms, such as weighted least squares (WLS) or least mean squares (LMS) algorithms, cannot estimate them with the accuracy needed to secure the reliable operation of the underlying communication systems. In cases like this, the local basis function (LBF) estimation technique can be used instead, significantly increasing the achievable...
-
Internationalization and Quality Assurance in Higher Education
PublikacjaInternationalization is an inevitable phenomenon among all contemporary higher education institutions (HEIs) in a globalizing world. It is the driving force for development and progress. In course of the last 30 years, it became an inevitable element of HE management. However, it carries along a number of risks, pitfalls, and organizational challenges. To hedge those, quality assurance (QA) is called to the stage. HEIs therefore...
-
Integrated functional safety and cyber security analysis
PublikacjaThe chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...
-
Exploring universities' efficiency differentials between countries in a multi-year perspective: an application of bootstrap DEA and Malmquist index to Italy and Poland, 2001-2011
PublikacjaThis study employs data envelopment analysis (DEA) to evaluate relative efficiency of a sample of 54 Italian and 30 Polish public universities for the period between 2001 and 2011. The examination is conducted in two steps: first unbiased DEA efficiency scores are estimated and then are regressed on external variables to quantitatively asses the direction and magnitude of the impact of potential determinants. The analysis shows...
-
Analysis and Comparison of Safety of Children and Adult Passenger in Car Based on Crash Tests Results
PublikacjaMost important features of the child seat were presented. There was made analysis of selected dynamic loads acting on mannequins heads during a collision. Comparison of loads acting on the kid in a child seat and the other passengers in a car is presented. In analysis of the results particular attention has been paid on the children's secure in a car. The phenomena of collision child's occipital bone with seat backrest was described....
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublikacjaIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Hedging Strategies of Derivatives Instruments for Commodity Trading Entities
PublikacjaHedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...
-
E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
PublikacjaE-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...
-
Preface
PublikacjaThis special issue of Discussiones Mathematice Graph Theory (DMGT) is dedicated to selected papers presented at the 13th Workshop on Graph Theory: Colourings, Independence and Domination (CID) held on 18-23 September 2009 in Szklarska Poręba, Poland. It continues a series of international workshops: 1993-1997 in Lubiatów, 1998-2001 in Gronów, and 2003-2007 in Karpacz. The meeting was organized by the Faculty of Mathematics, Computer...
-
Algorithms for testing security in graphs
PublikacjaIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublikacjaThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
On Design Optimization of Miniaturized Microscrip Dual-Band Rat-Race Coupler with Enhanced Bandwidth
PublikacjaIn the paper, a novel topology of a miniaturized wideband dual-band rat-race coupler has been presented. Small size of the circuit has been obtained by meandering transmission lines of the conventional circuit. At the same time, the number of independent geometry parameters has been increased in order to secure sufficient circuit flexibility in the context of its design optimization for dual-band operation. Optimum dimensions of...
-
Quantum security and theory of decoherence
PublikacjaWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Service restoration in survivable networks under malicious attacks
PublikacjaW artykule przedstawiono porównanie jakości odtwarzania usług w przeżywalnych sieciach optycznych poddanych awariom losowym oraz celowym działaniom niszczącym (atakom). Założenia odnośnie przeżywalności są następujące: ochrona od krańca do krańca, rozłączność węzłowa każdej pary ścieżek: aktywnej i zabezpieczającej.Z powodu NP-zupełności problemu przeżywalnego doboru tras i przydziału długości fali w sieciach optycznych, zaproponowano...
-
UE ETS: an in-depth descriptive analysis.
PublikacjaThe European Emission Trading System (EU ETS) plays a pivotal role in the EU’s strategy to address climate change, serving as a fundamental instrument for cost-effective reduction of greenhouse gas emissions. Notably, it inaugurated the word’s first major carbon market and it continues to the largest one. Chapter 1 provides an in-depth examination of the EU ETS, spanning from its inception in 2005 to 2020. After providing a descriptive...
-
Kazimierz Kempa mgr inż.
Osoby -
Numerical modeling of exciton impact in two crystalographic phases of the organo-lead halide perovskite (CH3NH3PbI3) solar cell
PublikacjaTo improve the power conversion efficiency of solar cells based on organo–lead halide perovskites, a detailed understanding of the device physics is fundamental. Here, a computational analysis of excitons impact is reported for these types of photocell. Numerical calculations based on the model, which take into account electronic charge carriers (electrons and holes), excitons and ions, have been carried out. The role of excitons...
-
Weakly-Supervised Word-Level Pronunciation Error Detection in Non-Native English Speech
PublikacjaWe propose a weakly-supervised model for word-level mispronunciation detection in non-native (L2) English speech. To train this model, phonetically transcribed L2 speech is not required and we only need to mark mispronounced words. The lack of phonetic transcriptions for L2 speech means that the model has to learn only from a weak signal of word-level mispronunciations. Because of that and due to the limited amount of mispronounced...
-
Dynamics of productivity in higher education. Cross-European evidence based on bootstrapped Malmquist indices
PublikacjaThis study presents patterns of productivity change in a large set of 266 public higher education institutions (HEIs) from 7 European countries across the time period 2001-2005. We adopt consistent bootstrap estimation procedures to obtain confidence intervals for Malmquist indices of HEI productivity and their components. Consequently, we are able to assess statistical significance of the changes in HEIs' productivity, efficiency...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublikacjaWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublikacjaRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
Searching for innovation knowledge: insight into KIBS companies
PublikacjaThe paper analyses the activity of research for “innovation knowledge”—here defined as knowledge that can lead to the introduction of service innovations—by Knowledge-Intensive Business Services (KIBS) companies. It proposes a classification of the possible search approaches adopted by those companies based on two dimensions: the pro-activity of search efforts and the source primarily used. Such classification is then discussed...
-
Layered Morphology of Gdansk: Past, Present and Future.
PublikacjaThis study aims to analyze the urban fabric and form of the city of Gdańsk based on the Muratorian and Italian school of urban morphology, to deepen the understanding of the morphological process of the urban fabric. It can be seen that the urban fabric of the city is a juxtaposition of all these layers, and based on Muratori’s approach these are indicative of not just the past, present but also the future. The study sample is...
-
Interaction with medical data using QR-codes
PublikacjaBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
Towards Healthcare Cloud Computing
PublikacjaIn this paper we present construction of a software platform for supporting medical research teams, in the area of impedance cardiography, called IPMed. Using the platform, research tasks will be performed by the teams through computer-supported cooperative work. The platform enables secure medical data storing, access to the data for research group members, cooperative analysis of medical data and provide analysis supporting tools...
-
No Quantum Realization of Extremal No-Signaling Boxes
PublikacjaThe study of quantum correlations is important for fundamental reasons as well as for quantum communication and information processing tasks. On the one hand, it is of tremendous interest to derive the correlations produced by measurements on separated composite quantum systems from within the set of all correlations obeying the no-signaling principle of relativity, by means of information-theoretic principles. On the other hand,...
-
Service restoration in survivable networks under attacks
PublikacjaW artykule dokonano porównania jakości odtwarzania usług w przeżywalnych sieciach optycznych, uszkadzanych w wyniku awarii fizycznych oraz na skutek ataków. Przeanalizowano wariant ochrony ścieżek ('path protection') poprzez wyznaczane zawczasu ścieżki zabezpieczające. Z uwagi na NP-zupełność problemu optymalizacji doboru tras w przeżywalnych sieciach optycznych, zaproponowano efektywny algorytm heurystyczny SCNDP. Autorski symulator...
-
Przydatność białka rybiego w postaci kolagenu lub żelatyny oraz polisacharydu - kapa-karagenu do wytwarzania aktywnych opakowań biodegradowalnych = Usefulness of fish collagen, gelatin and carrageenan for preparation of active biodegradable packages
PublikacjaSummary - The possibility of use of protein films made of fish collagen or gelatin as well as polysaccharide carrageenan films as carriers of enzymes (lysozyme or lysostaphyne), for preparation of microbiologically active packages, was investigated. It was found that crosslinking of such systems with N-[3(dimethylamino)propyl]-N'-ethylcarboimide (EDC) does not influence the activity of lysozyme immobilized in the films (Table 1)....
-
Quantum privacy witness
PublikacjaWhile it is usually known that the mean value of a single observable is enough to detect entanglement or its distillability, the counterpart of such an approach in the case of quantum privacy has been missing. Here we develop the concept of a privacy witness, i.e., a single observable that may detect the presence of the secure key even in the case of bound entanglement. Then we develop the notion of secret-key estimation based...
-
Practical I-Voting on Stellar Blockchain
PublikacjaIn this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...
-
A structure and design optimization of novel compact microscrip dual-band rat-race coupler with enhanced bandwidth
PublikacjaIn the letter, a topology of a novel compact wideband dual-band rat-race coupler has been presented along with its computationally efficient design optimization procedure. Reduction of the circuit size has been achieved by meandering transmission lines of the conventional circuit. At the same time, the number of independent geometry parameters has been increased so as to secure sufficient flexibility of the circuit, necessary in...
-
Common Independence in Graphs
PublikacjaAbstract: The cardinality of a largest independent set of G, denoted by α(G), is called the independence number of G. The independent domination number i(G) of a graph G is the cardinality of a smallest independent dominating set of G. We introduce the concept of the common independence number of a graph G, denoted by αc(G), as the greatest integer r such that every vertex of G belongs to some independent subset X of VG with |X|...
-
2-bondage in graphs
PublikacjaA 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The 2-bondage number of G, denoted by b_2(G), is the minimum cardinality among all sets of edges E' subseteq E such that gamma_2(G-E') > gamma_2(G). If for every E' subseteq E we have...
-
Activation of peroxymonosulfate using carbon black nano-spheres/calcium alginate hydrogel matrix for degradation of acetaminophen: Fe3O4 co-immobilization and microbial community response
PublikacjaHerein, we focused on the degradation of acetaminophen (ACT) drug in liquid phase by peroxymonosulfate (PMS) activated by carbon black nano-spheres (CBNS). The nanostructured activator was immobilized into calcium alginate hydrogel matrix (CAHM) to avoid the washout of the fine nanostructures. The Langmuir modeling showed an insignificant contribution to the adsorption process in the removal of ACT. The basic pH conditions favored...
-
Pressure drop and heat transfer during boiling and condensation at subcritical region
PublikacjaMost of the data presented in the literature relate to saturation temperatures in the range - 20°C to 40°C due to the application in refrigeration technology. There is necessity to extend databases to higher values of saturation temperature due to new applications such as Organic Rankine Cycle and high temperature heat pumps. Only few papers contain data for high reduced pressure for low boiling point liquids. This paper focus...
-
Machine-aided detection of SARS-CoV-2 from complete blood count
PublikacjaThe current gold standard for SARS-CoV-2 detection methods lacks the functionality to perform population screening. Complete blood count (CBC) tests are a cost-effective way to reach a wide range of people – e.g. according to the data of the Central Statistical Office of Poland from 2016, there are 3,000 blood diagnostic laboratories in Poland, and 46% of Polish people have at least one CBC test per year. In our work, we show...
-
Whirling system of water exchangein breeding pools
PublikacjaTo secure the proper conditions of life for sea mammals existing in closed systems one has to maintain the character of the breeding basins (i.e. shape, dimensions, facing of walls and bottom, quality and motion of water) as natural as possible. An appropriate system of water exchange plays a very important role here. A full renewal of water is time-consuming, expensive and troublesome, so can be made only periodically, and should...
-
Current status and future success of renewable energy in Pakistan
PublikacjaMismatch between energy demand and supply from last two decades has been increasing because of the domination of expensive imported oil in energy mix of Pakistan. To import crude oil Government paid US $ 9 billion in 2008–2009 to meet the energy demands...
-
Double bondage in graphs
PublikacjaA vertex of a graph is said to dominate itself and all of its neighbors. A double dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D. The double domination number of a graph G, denoted by gamma_d(G), is the minimum cardinality of a double dominating set of G. The double bondage number of G, denoted by b_d(G), is the minimum cardinality among all sets...
-
Modeling an Industrial Revolution: How to Manage Large-Scale, Complex IoT Ecosystems?
PublikacjaAdvancements around the modern digital industry gave birth to a number of closely interrelated concepts: in the age of the Internet of Things (IoT), System of Systems (SoS), Cyber-Physical Systems (CPS), Digital Twins and the fourth industrial revolution, everything revolves around the issue of designing well-understood, sound and secure complex systems while providing maximum flexibility, autonomy and dynamics. The aim of the...
-
General paradigm for distilling classical key from quantum states
PublikacjaIn this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublikacjaSustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...
-
Unexpected Z/E isomerism of N-methyl-O-phosphothioyl benzohydroxamic acids, their oxyphilic reactivity and inertness to amines
PublikacjaThiophosphinoylation of N-methyl p-substituted benzohydroxamic acids using disulfanes (method A) or diphenylphosphinothioyl chloride (method B) provides only one conformer of the respective O-phosphothioyl derivative (Xray and NMR analysis). Undergoing the P-transamidoxylation reaction is an evidence of the reversibility of thiophosphinoylation. Only those products containing strong EWG substituents in the aroyl residue or bulky...
-
Non-isolating 2-bondage in graphs
PublikacjaA 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The non-isolating 2-bondage number of G, denoted by b_2'(G), is the minimum cardinality among all sets of edges E' subseteq E such that delta(G-E') >= 1 and gamma_2(G-E') > gamma_2(G)....
-
Non-isolating bondage in graphs
PublikacjaA dominating set of a graph $G = (V,E)$ is a set $D$ of vertices of $G$ such that every vertex of $V(G) \setminus D$ has a neighbor in $D$. The domination number of a graph $G$, denoted by $\gamma(G)$, is the minimum cardinality of a dominating set of $G$. The non-isolating bondage number of $G$, denoted by $b'(G)$, is the minimum cardinality among all sets of edges $E' \subseteq E$ such that $\delta(G-E') \ge 1$ and $\gamma(G-E')...