Filtry
wszystkich: 8088
wybranych: 4866
-
Katalog
- Publikacje 4866 wyników po odfiltrowaniu
- Czasopisma 93 wyników po odfiltrowaniu
- Konferencje 79 wyników po odfiltrowaniu
- Osoby 160 wyników po odfiltrowaniu
- Wynalazki 12 wyników po odfiltrowaniu
- Projekty 7 wyników po odfiltrowaniu
- Laboratoria 3 wyników po odfiltrowaniu
- Zespoły Badawcze 2 wyników po odfiltrowaniu
- Kursy Online 208 wyników po odfiltrowaniu
- Wydarzenia 32 wyników po odfiltrowaniu
- Dane Badawcze 2626 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: DATA ENCRYPTION
-
Visual Data Encryption for Privacy Enhancement in Surveillance Systems
PublikacjaIn this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...
-
Hybrid Obfuscation of Encryption
Publikacja -
A New Quaternion Encryption Scheme for Image Transmission
PublikacjaQuaternions are hypercomplex number of rank 4. They are often applied to mechanics in three-dimensional space and considered as one of the best ways to represent rotations. In this paper a new encryption scheme, based on the rotation of data vector in three-dimensional space around another quaternion (key) is proposed. A computer-based simulation was created to analyze the potential of the proposed encryption technique.
-
Quaternion Encryption Method for Image and Video Transmission
PublikacjaQuaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...
-
Digital Fingerprinting based on Quaternion Encryption for Image Transmission
PublikacjaIn this paper a new digital fingerprinting scheme for images is proposed. A proposed method is based on quaternion encryption with Cipher Block Chaining (CBC) mode of operation. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm is designed for grey-tone images. For purpose of encryption, the algorithm uses the rotation of data vectors presented...
-
A new quaternion-based encryption method for DICOM images
PublikacjaIn this paper, a new quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We have scrutinized and slightly modified the concept of the DICOM network to point out the best location for the proposed encryption scheme, which significantly improves speed of DICOM images encryption in comparison with those originally embedded into DICOM advanced encryption standard...
-
Digital fingerprinting for color images based on the quaternion encryption scheme
PublikacjaIn this paper we present a new quaternion-based encryption technique for color images. In the proposed encryption method, images are written as quaternions and are rotated in a three-dimensional space around another quaternion, which is an encryption key. The encryption process uses the cipher block chaining (CBC) mode. Further, this paper shows that our encryption algorithm enables digital fingerprinting as an additional feature....
-
Quaternion encryption methods for multimedia transmission, a survey of existing approaches
PublikacjaIn this paper we review quaternion encryption methods for multimedia transmission. We explain their weak and strong properties as well as suggest possible modifications. Our main focus is an algorithm QFC presented in paper by Dzwonkowski et al. (2015). All encryption methods, presented in this paper, use special properties of quaternions to perform rotations of data sequences in 3D space. Each method uses a common key generation...
-
Protection of visual data transmission for vessel traffic systems using joint fingerprinting and decryption method based on modified hill cipher
Publikacja -
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublikacjaIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublikacjaThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Data Analysis in Bridge of Data
PublikacjaThe chapter presents the data analysis aspects of the Bridge of Data project. The software framework used, Jupyter, and its configuration are presented. The solution’s architecture, including the TRYTON supercomputer as the underlying infrastructure, is described. The use case templates provided by the Stat-reducer application are presented, including data analysis related to spatial points’ cloud-, audio- and wind-related research.
-
Secure Quaternion Feistel Cipher for DICOM Images
PublikacjaAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia
PublikacjaThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix...
-
Data reduction and stacking for imbalanced data classification
Publikacja -
Harmony Search for Data Mining with Big Data
PublikacjaIn this paper, some harmony search algorithms have been proposed for data mining with big data. Three areas of big data processing have been studied to apply new metaheuristics. The first problem is related to MapReduce architecture that can be supported by a team of harmony search agents in grid infrastructure. The second dilemma involves development of harmony search in preprocessing of data series before data mining. Moreover,...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublikacjaThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
Data Reduction Algorithm for Machine Learning and Data Mining
Publikacja -
Data governance: Organizing data for trustworthy Artificial Intelligence
PublikacjaThe rise of Big, Open and Linked Data (BOLD) enables Big Data Algorithmic Systems (BDAS) which are often based on machine learning, neural networks and other forms of Artificial Intelligence (AI). As such systems are increasingly requested to make decisions that are consequential to individuals, communities and society at large, their failures cannot be tolerated, and they are subject to stringent regulatory and ethical requirements....
-
For Your Eyes Only – Biometric Protection of PDF Documents
PublikacjaThe paper introduces a concept of a digital document content encryption/decryption with facial biometric data coming from a legitimate user. Access to the document content is simple and straightforward, especially during collaborative work with mobile devices equipped with cameras. Various contexts of document exchange are presented with regard to the next generation pro-active digital documents proposed by authors. An important...
-
DATA INTEROPERABILITY AND THE OPEN DATA ECOSYSTEM: ROLES AND RESEARCH AREAS
PublikacjaSustainability and value-creation are considered important parameters to measure the success of an open data system. Unfortunately, existing open data systems are not meeting their promises to achieve a sustainable and value-based open data system. Van Loenen et al. (2021) proposed a sustainable and value-creating open data ecosystem. According to their study, the open data ecosystem needs to be user-driven, inclusive, circular,...
-
Asking Data in a Controlled Way with Ask Data Anything NQL
PublikacjaWhile to collect data, it is necessary to store it, to understand its structure it is necessary to do data-mining. Business Intelligence (BI) enables us to make intelligent, data-driven decisions by the mean of a set of tools that allows the creation of a potentially unlimited number of machine-generated, data-driven reports, which are calculated by a machine as a response to queries specified by humans. Natural Query Languages...
-
Data Extraction, Transformation and Loading process in data warehouse development.
PublikacjaOmówiono podstawowe elementy procesu projektowania hurtowni danych.
-
Data librarian and data steward – new tasks and responsibilities of academic libraries in the context of Open Research Data implementation in Poland
PublikacjaThesis/Objective – The policy of Open Access (OA) for researching resources in Europe has been implemented for more than 10 years. The first recommendations concerning providing OA to scientific materials were defined during the implementation of the 7th Framework Programme. Introducing another set of recommendations concerning OA to research data was the next stage. The recommendations were transformed into obligations under the...
-
Managing Data from Heterogeneous Data Sources Using Knowledge Layer
Publikacja -
Atmospheric emissions of POPs in Europe - a discussion of existing data and data need
PublikacjaZaproponowano, aby schematy inwentaryzacji i raportowania emisji w przyszłości były tak dobrane, aby zaspokajały potrzeby zarówno administracji odpowiedzialnej za strategię redukcji emisji jak i naukowców wykorzystujących inwentaryzację emisji na potrzeby dalszych badań naukowych. Stan obecny inwentaryzacji emisji POP oszacowany został jako niezadowalający a dalsze usprawnienia są konieczne dla poprawienia wiarygodności wyników...
-
Managing data from heterogeneous data sources using knowledge layer
PublikacjaW procesie integrowania danych przy użyciu ontologii, ważne jest aby zarządzać danymi przechowywanymi w zewnętrznych źródłach, analogicznie jak tymi przechowywanymi w Bazie Wiedzy. Zaprezentowana w poprzednich pracach metoda kartograficznej reprezentacji wiedzy pozwala na wnioskowanie z danych przechowywanych w Bazie wiedzy. Rozwiązanie zaprezentowane w tej pracy umożliwia wykorzystanie metody kartograficznej do wnioskowania z...
-
Big Data i 5V – nowe wyzwania w świecie danych (Big Data and 5V – New Challenges in the World of Data)
PublikacjaRodzaje danych, składające się na zbiory typu Big Data, to m.in. dane generowane przez użytkowników portali internetowych, dane opisujące transakcje dokonywane poprzez Internet, dane naukowe (biologiczne, astronomiczne, pomiary fizyczne itp.), dane generowane przez roboty w wyniku automatycznego przeszukiwania przez nie Internetu (Web mining, Web crawling), dane grafowe obrazujące powiązania pomiędzy stronami WWW itd. Zazwyczaj,...
-
Manufacturing Data Analysis in Internet of Things/Internet of Data (IoT/IoD) Scenario
PublikacjaComputer integrated manufacturing (CIM) has enormous benefits as it increases the rate of production, reduces errors and production waste, and streamlines manufacturing sub-systems. However, there are some new challenges related to CIM operating in the Internet of Things/Internet of Data (IoT/IoD) scenarios associated with Industry 4.0 and cyber-physical systems. The main challenge is to deal with the massive volume of data flowing...
-
Musical Instrument Tagging Using Data Augmentation and Effective Noisy Data Processing
PublikacjaDeveloping signal processing methods to extract information automatically has potential in several applications, for example searching for multimedia based on its audio content, making context-aware mobile applications (e.g., tuning apps), or pre-processing for an automatic mixing system. However, the last-mentioned application needs a significant amount of research to reliably recognize real musical instruments in recordings....
-
Synteza algorytmu detekcji pęknięcia szyby metodą ''data fission - data fusion''
PublikacjaPrzedstawiono założenia projektowe oraz proces syntezy algorytmu detekcyjnego akustycznego detektora pęknięcia szyby. W konstrukcji algorytmu użyto techniki rozszczepiania i syntezy danych. Przedstawiono użyte narzędzia badawcze, opracowany model pęknięcia szyby oraz wynki testowania finalnego algorytmu detekcyjnego. Metoda znalazła zastosowanie w konstrukcji akustycznego detektora pęknięcia szyby stosowanego w systemach alarmowych.
-
Enhanced uniform data sampling for constrained data‐driven modeling of antenna input characteristics
PublikacjaData-driven surrogates are the most popular replacement models utilized in many fields of engineering and science, including design of microwave and antenna structures. The primary practical issue is a curse of dimensionality which limits the number of independent parameters that can be accounted for in the modelling process. Recently, a performance-driven modelling technique has been proposed where the constrained domain of the...
-
Differential analysis of impedance data
Publikacja -
DATA MINING IN CONSTRUCTION RESEARCH
Publikacja -
Distributed Learning with Data Reduction
Publikacja -
The Bridge of Data Project Objectives
PublikacjaOpen Research Data (ORD) is one of the emerging trends for researchers across the globe. However, it has to be stressed that the level of implementation and awareness of ORD varies between countries. Many initiatives have been created in Polish scientific institutions to support the process of opening publications. These are mainly Open Access (OA) repositories, implementing the so-called green road of OA. However, only a few universities...
-
Processing of Satellite Data in the Cloud
PublikacjaThe dynamic development of digital technologies, especially those dedicated to devices generating large data streams, such as all kinds of measurement equipment (temperature and humidity sensors, cameras, radio-telescopes and satellites – Internet of Things) enables more in-depth analysis of the surrounding reality, including better understanding of various natural phenomenon, starting from atomic level reactions, through macroscopic...
-
BIG PROBLEMS WITH BIG DATA
PublikacjaThe article presents an overview of the most important issues related to the phenomenon called big data. The characteristics of big data concerning the data itself and the data sources are presented. Then, the big data life cycle concept is formulated. The next sections focus on two big data technologies: MapReduce for big data processing and NoSQL databases for big data storage.
-
Client-side versus server-side geographic data processing performance comparison: Data and code
PublikacjaThe data and code presented in this article are related to the research article entitled “Analysis of Server-side and Client-side Web-GIS data processing methods on the example of JTS and JSTS using open data from OSM and Geoportal” (Kulawiak et al., 2019). The provided 12 datasets include multi-point and multi-polygon data of different scales and volumes, representing real-world geographic features. The datasets cover the area...
-
Receiver-side fingerprinting method based on quaternion sandwich product
PublikacjaIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
RPC communication layer and introduction to data protection for embedded PC based control and data acquisition module
Publikacja -
A Text as a Set of Research Data. A Number of Aspects of Data Acquisition and Creation of Datasets in Neo-Latin Studies
PublikacjaIn this paper, the authors, who specialise in part in neo-Latin studies and the his-tory of early modern education, share their experiences of collecting sources for Open Research Data sets under the Bridge of Data project. On the basis of inscription texts from St. Mary’s Church in Gdańsk, they created 29 Open Research Data sets. In turn, the text of the lectures of the Gdańsk scholar Michael Christoph Hanow, Praecepta de arte...
-
A survey of medical researchers indicates poor awareness of research data management processes and a role for data librarians
Publikacja -
DATA JOURNALS AND DATA PAPERS IN VARIOUS RESEARCH AREAS AND SCIENTIFIC DISCIPLINES – BIBLIOMETRIC ANALYSIS BASED ON INCITES
PublikacjaThe main aim of this work is to provide insight into a bibliometric analysis of Data Journals and Data Papers in terms of research areas, disciplines, publication year and country. In particular, we calculated many bibliometric indicators, especially: the number of publications and citations. Furthermore, this work also investigated the top 20 journals in which scientists published the largest number of Data Papers. It was found...
-
Streaming Real-time Data in Distributed Dispatcher and Teleinformation Systems for Visualization of Multimedia Data of the Border Guard
PublikacjaSurveillance of the sea borders is a very important task for the Border Guard. Monitoring of country maritime border is an important task of the Border Guard. This task can be facilitated with the use of the technology enabling gathering information from distributed sources and its supervision and visualization. This task can be accomplished using a technology that allows to collect information from distributed sensors of different...
-
Generating molecular entities as structured data
Publikacja -
The molecular entities in linked data dataset
Publikacja -
Data acquisition methods for GEM detectors
Publikacja -
Software defined HF data modem
PublikacjaW artykule przedstawiono koncepcję budowy modemu krótkofalowego, opartego na technologii radia programowego. Zaproponowano rozwiązanie warstwy sprzętowej i programowej modemu, które zostało zweryfikowane na drodze pomiarowej w warunkach laboratoryjnych.
-
HVRmonitor - data replication monitoring method
PublikacjaArtykuł ten opisuje system służący monitorowaniu replikacji danych, wytworzony w firmie Lufthansa Systems Poland. W artykule przedstawiono w sposób ogólny wiele istotnych problemów a następnie przedstawiono w sposób bardziej szczegółowy ich rozwiązanie. Artykuł opisuje również architekturę wytworzonego systemu, jego funkcjonalność i interfejs, omawia w sposób zwięzły zasady jego działania i wskazuje jak wdrożone rozwiązania mogą...