Wyniki wyszukiwania dla: secure it architectures - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: secure it architectures

Filtry

wszystkich: 3039
wybranych: 1761

wyczyść wszystkie filtry


Filtry wybranego katalogu

  • Kategoria

  • Rok

  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Wyniki wyszukiwania dla: secure it architectures

  • Contemporary architecture within the context of architectural education

    Analysed in this article are the diploma projects of students of architecture in European countries. The aim was to examine how students approach an important issue related to sustainable development, i.e. the integration of newly designed architecture into the existing historical, cultural and natural context. The rational use and protection of the environment requires the skilful shaping of urbanised space. Many changes in the...

    Pełny tekst do pobrania w portalu

  • The relationship between architectural detail and light in contemporary architecture

    Publikacja

    The paper deals with the influence of modern artificial and natural lighting technology on contemporary architecture, especially in relation to architectural detail. Advanced complex lighting systems have an increasing importance in contemporary design solutions. Light itself, and the effect of its actions, and characteristic parts of the sophisticated lighting systems, play an essential role as independent architectural elements,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The potential of computational methods for the categorization of architectural objects on the example of media architecture

    Publikacja

    The paper presents an example of the categorization of architectural objects and assessment of the characteristics of urban space, based on the analysis of specific features of architectural objects and urban landscape. The conducted analysis refers to media architecture and is presented in the complex context of the development of media solutions. The field of influence of IT on architecture is also stressed, both on the architect’s...

    Pełny tekst do pobrania w portalu

  • The concept of smart and secure laboratory.

    Publikacja

    - Rok 2004

    W chwili obecnej, w erze globalizacji istnieje niezbędna konieczność rozwoju struktur gwarantujących zapewnienie bezpieczeństwa dla zasadniczych wyzwań stawianych przed ludzkością. Stąd potrzeba ujęcia aspektu bezpieczeństwa w kategoriach globalnych. Instytucje akademickie dostosowują się w tym zakresie stosunkowo szybko i zaczynają wyznaczać nowe trendy oraz prowadzą współpracę z instytucjami pozaakademickimi. Tego typu kooperacja,...

  • Global defensive secure structures

    Publikacja

    Let S ⊂ V (G) for a given simple non-empty graph G. We define for any nonempty subset X of S the predicate SECG,S(X) = true iff |NG[X]∩S| ≥ |NG[X]\S|. Let H be a non-empty family of graphs such that for each vertex v ∈ V (G) there is a subgraph H of G containing v and isomorphic to a member of H. We introduce the concept of H-alliance extending the concept of global defensive secure structures. By an H-alliance in a graph G we...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Secure Italian domination in graphs

    Publikacja

    - JOURNAL OF COMBINATORIAL OPTIMIZATION - Rok 2021

    An Italian dominating function (IDF) on a graph G is a function f:V(G)→{0,1,2} such that for every vertex v with f(v)=0, the total weight of f assigned to the neighbours of v is at least two, i.e., ∑u∈NG(v)f(u)≥2. For any function f:V(G)→{0,1,2} and any pair of adjacent vertices with f(v)=0 and u with f(u)>0, the function fu→v is defined by fu→v(v)=1, fu→v(u)=f(u)−1 and fu→v(x)=f(x) whenever x∈V(G)∖{u,v}. A secure Italian dominating...

    Pełny tekst do pobrania w portalu

  • Secure key from bound entanglement

    Publikacja

    - Rok 2005

    Scharakteryzowaliśmy zestaw dzielonych kwantowych stanów, który zawiera kryptograficznie prywatny klucz. Pozwala nam to przerobić teorię prywatności jako paradygmat blisko związany z tą, która jest używana w manipulacjach splątania.

  • Approaching Secure Industrial Control Systems

    Publikacja

    This study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...

    Pełny tekst do pobrania w portalu

  • The conception of secure and efficient process of migration into IPv6

    Ze względu na wady rozwiązań opartych o tunelowanie, w pracy zaproponowano koncepcję przejścia z IPv4 do IPv6 nie wymagającą od dostawców usług internetowych wzajemnej współpracy, nie narażoną na ataki związane z przekaźnikami, wzajemnym zaufaniem ISP. W koncepcji tej ograniczono tunelowanie do obszaru jednego ISP. W pracy wskazano istotne elementy ograniczające możliwość i zasadność wprowadzania mechanizmów tunelowania. Wskazano...

  • The methods of secure data transmission in the KNX system

    The article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Secure Quaternion Feistel Cipher for DICOM Images

    An improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Edge-Computing based Secure E-learning Platforms

    Publikacja

    - Rok 2022

    Implementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...

    Pełny tekst do pobrania w portalu

  • The secure transmission protocol of sensor Ad Hoc network

    The paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • W-like bound entangled states and secure key distillation

    Publikacja

    We construct multipartite entangled states with underlying W-type structuresatisfying positive partial transpose (PPT) condition under any (N −1)|1 partition. Then we showhow to distill a N-partite secure key from the states using two different methods: direct applicationof local filtering and novel random key distillation scheme in which we adopt the idea from recentresults on entanglement distillation. Open problems and possible...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Quantum states representing perfectly secure bits are always distillable

    Publikacja

    W pracy pokazano, że ostatnio wprowadzone stany kwantowe reprezentujące perfekcyjnie bezpieczny bit klucza kryptograficznegooraz ich wielocząstkowe i wielowymiarowe uogólnienia zawsze reprezentują destylowalne splątanie. Podano ograniczenia dolne na wielkość destylowalnego splątania. Ponadto podano alternatywny dowód faktu, że koszt splątania jest ograniczeniem górnym na wielkość destylowalnego klucza kryptograficznego w dwucząstkowym...

    Pełny tekst do pobrania w portalu

  • A Concept of Using Knowledge Models to Secure Intellectual Capital in Enterprise

    Publikacja

    Without a doubt, knowledge has become the most important resource for all companies in the world. Knowledge extended of our own observations and practice is being called experience. With the increase of knowledge and gained experience, the individual becomes more and more valuable employee in terms of business. The above mentioned knowledge can be gained only by self-improvement, which requires time and other necessary elements...

  • Experimental Extraction of Secure Correlations from a Noisy Private State

    Publikacja
    • K. Dobek
    • M. Karpiński
    • R. Demkowicz-Dobrzański
    • K. Banaszek
    • P. Horodecki

    - PHYSICAL REVIEW LETTERS - Rok 2011

    We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies...

    Pełny tekst do pobrania w portalu

  • Secure transmission of visual image in the VTS system using fingerprinting

    Publikacja

    Pełny tekst do pobrania w portalu

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publikacja

    - IEEE Access - Rok 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Pełny tekst do pobrania w portalu

  • Sound Art and Architecture: New Horizons for Architecture and Urbanism

    The article discusses the crossroad between art and architecture. It sketches out the theoretical and practical aspects of involving art into architecture and multisensory dimensions of space. The analysis is based on examples of innovative experimental activities for architecture: educational projects such as workshops, seminars and courses, combining art and architecture, with special emphasis on sound art, and the consequences...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile

    Publikacja

    The paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Performance Analysis of the "Intelligent" Kirchhoff- Law - Johnson-Noise Secure Key Exchange

    Publikacja

    The Kirchhoff-law - Johnson-noise (KLJN) secure key distribution system provides a way of exchanging theoretically secure keys by measuring random voltage and current through the wire connecting two different resistors at Alice’s and Bob’s ends. Recently new advanced protocols for the KLJN method have been proposed with enhanced performance. In this paper, we analyze the KLJN system and compare with the „intelligent” KLJN (iKLJN)...

    Pełny tekst do pobrania w portalu

  • Secured wired BPL voice transmission system

    Publikacja

    - Scientific Journal of the Military University of Land Forces - Rok 2020

    Designing a secured voice transmission system is not a trivial task. Wired media, thanks to their reliability and resistance to mechanical damage, seem an ideal solution. The BPL (Broadband over Power Line) cable is resistant to electricity stoppage and partial damage of phase conductors, ensuring continuity of transmission in case of an emergency. It seems an appropriate tool for delivering critical data, mostly clear and understandable...

    Pełny tekst do pobrania w portalu

  • Musical inspiration in contemporary architecture - to build a music and to hear an architecture

    Publikacja

    - Rok 2009

    The goal of this research is chosen from a wide range of subjects within two fields of knowledge on the crossroads between music and architecture There are many designs in modern contemporary architecture that would illustrate the relationship between music and architecture, mainly through musical inspiration. The article shows contemporary musical and architectural discussion that cross over from the theoretical to the practical...

  • IoT protocols, architectures, and applications

    Publikacja
    • C. Buratti
    • E. G. Ström
    • L. Feltrin
    • L. Clavier
    • G. Gardašević
    • T. Blazek
    • L. Berbakov
    • T. C. Balan
    • L. Orozco-Barbosa
    • C. Anton-Haro... i 2 innych

    - Rok 2021

    The proliferation of embedded systems, wireless technologies, and Internet protocols have enabled the IoT to bridge the gap between the virtual and physical world enabling the monitoring and control of the environment by data processing systems. IoT refers to the inter-networking of everyday objects that are equipped with sensing, computation, and communication capabilities. These networks can collaboratively interact and perform...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • ARCHITECTURE IN BRANDING AND OVERBRANDING PROCESS. HOW GLOBALIZATION INFLUENCED ARCHITECTURE QUALITY.

    Publikacja

    - Rok 2014

    Globalization is unification. In the field of architecture and in the social structure alike, the globalization leads to a blending of economies and cultures that produces uniformly branded public space as a response to universal assumptions of integration and correlation. While branding consists in creating a recognizable and outstanding image a strong contradiction exists between both of these approaches. As a result, regional...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Street Art and Architecture

    Publikacja

    - Rok 2011

    The paper explores both the areas of conflict as well as agreement between architecture and Street Art. The conflict arises from the fact that urban environment has always been a background for street art, which unavoidably jeopardizes the conceptual integrity of the building understood as a work of architecture. However, there are strong interrelations between these two domains of human creativity. Both street art and architecture...

  • Evaluating architecture students' knowledge of the history of architecture by tests and by drawings: a comparative analysis

    The methods of evaluating students’ knowledge in architectural education, and in particular in education on history of architecture, are specific in many respects. Apart from checking the general knowledge of history concerning chronology, artistic trends, styles, main objects and architects, it should also check students’ ability to analyse the historic architecture in a drawing form. Such a form of presenting architecture has...

    Pełny tekst do pobrania w portalu

  • Can architecture be 11-dimensional? The nature of space in the architecture of the digital world era

    This research aims to explore the development of architectural theories about ‘architectural dimensions’ and look at architecture as a multidimensional space. It is important to understand that with today's development of virtual reality technology and through the combination of theories of physics and architecture, a new possibility of creating space has emerged. The arguments are made through inductive reasoning and grounded...

    Pełny tekst do pobrania w portalu

  • BeesyBees: A mobile agent-based middleware for a reliable and secure execution of service-based workflow applications in BeesyCluster

    Integrating distributed services into workflows comes with its own set of challenges, including security, coordination, fault tolerance and optimisation of execution time. This paper presents an architecture and implementation - nicknamed BeesyBees - that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middleware that allows users to access distributed resources as well as publish...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Arte and Arche. On Art and Architecture

    Publikacja

    - Rok 2009

    Architekci poszukują inspiracji i wzorców dla form architektonicznych wśród innych dziedzin sztuki. Zapożyczenia, cytaty i reinterpretacje malarstwa, rzeźby, muzyki, a nawet tańca mogą przynieść oryginalne koncepcje i rozwiązania formalne, przy okazji wiążąc architekturę z szerszym kontekstem historycznym, duchowym i kulturowym. Współczesne formy architektoniczne nieraz powstają jako przestrzenna interpretacja kompozycji malarskich...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Critical perspectives on media architecture

    Publikacja

    - Rok 2014

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The heritage of wooden architecture in Poland

    Publikacja

    - Rok 2009

    Artykuł przedstawia dziedzictwo polskiej architektury drewnianej, granicah obecnych. Obejmuje okres historyczny od powstania do dnia dzisiejszego. Wyodrebniono jako osobny problem ochrony dziedzictwa w ujęciu konserwatorskim oraz rolę skansenów - muzeów na swiezym powietrzu. Opracowanie dotyczy zarówno architektury jak i wnętrz obiektów.

  • The teaching of architecture in the nineteenth century

    Publikacja

    - Rok 2005

    Tematem artykułu jest system kształcenia inżynierów architektów, jaki miał miejsce pod koniec XIX wieku w lwowskiej Szkole Politechnicznej jednej z pierwszych i przez długi czas jedynej na tych ziemiach uczelni technicznej. Omówiona jest zawartość merytoryczna i organizacja pierwszego programu nauczania jaki został przyjęty po uzyskaniu przez uczelnię praw szkoły wyższej (1877), aż do jego reorganizacji pod koniec stulecia, wymuszonej...

  • The origins of the brick architecture in Pomerania

    Publikacja

    - Rok 2016

    Traditionally, brick is one of the most popular building materials on the southern coast of the Baltic Sea. Although the origins of brick architecture have been the subject of numerous research studies, their results were focused on the Kingdom of Denmark, merchant-towns and the State of the Teutonic Order. Most scholars claimed that Pomeranian architecture had not been as developed as that in the neighbouring countries. Moreover,...

  • Games and play with light in architecture

    The paper deals with the issue of the influence of daylight on the creation of architecture in the view of designers` play with light in the architectural space. Using the examples of contemporary realizations of some art museums, the work demonstrates the impact of exploration and experimentation conducted by the creators of visual arts on the design styles and architectural solutions. It also reveals the historical continuity...

    Pełny tekst do pobrania w portalu

  • Architektura Parametryczna/ Parametric Architecture

    Publikacja

    Pierwsze systemy CAD przeniosły tradycyjne sposoby projektowania do przestrzeni wirtualnej. Modelowanie algorytmiczne z kolei pozwoliło na wykonywanie powtarzających się zadań w sposób zautomatyzowany, a praca z wykorzystaniem tych narzędzi wymaga wypracowania nowego podejścia.

  • Architecture and Basic Assumptions of RSMAD

    The study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...

  • Ships - inspiring objects in architecture

    Sea-going vessels have for centuries fascinated people, not only those who happen to work at sea, but first and foremost, those who have never set foot aboard a ship. The environment in which ships operate is reminiscent of freedom and countless adventures, but also of hard and interesting maritime working life. The famous words of Pompey: “Navigare necesseest, vivere non estnecesse” (sailing is necessary, living – is not necessary),...

    Pełny tekst do pobrania w portalu

  • ARCHITECTURE OF HYDROPOWER PLANTS IN POMORZE

    Publikacja

    - Rok 2016

    The history of energetic use of the rivers of Pomerania (Pomorze) is traced from the late Middle Ages. Their potential due to geographical specificity of the region was still attractive in the era of electricity of the19th and the first half of the 20th century. Configuration of the terrain, geological, and natural restrictions, but mainly energetic potential of particular localization were crucial for economical success of the...

  • Machinery for severe climate conditions

    Publikacja

    - Rok 2008

  • Integrated protection/restoration in survivable multilayer architectures

    Publikacja

    - Rok 2005

    Artykuł przedstawia nową koncepcję projektowania wielowarstwowych architektur sieci przeżywalnych, wykorzystującą informację międzywarstwową do zabezpieczania odtwarzania na wypadek pojedyńczej awarii węzła lub łącza w sposob zapobiegający propagacji awarii. Oryginalne zadanie optymalizacji całej zintegrowanej architektury przeżywalnej sformułowano jako zadanie programowania całkowitego. Jest ono NP-zupełne i zaproponowano algorytm...

  • THE ARCHİTECTURE AND FASHİON DESİGN – An Examination of the Relationship between Fashion and Architecture Design in light of Technological Advancements

    Publikacja

    - Rok 2016

    The article focuses on the mutual relationship between two seemingly distant fields of art - architecture and fashion design. It describes a common basis for the process of creating art in the approach to both fashion and architecture. The following considerations, which are based on principles of composition, attempt to reach beyond just the form and analyze also context or perception. The article quotes famous creators and depicts...

  • Distributed measurement system with data transmission secured using XXTEA algorithm

    Publikacja

    - Przegląd Elektrotechniczny - Rok 2016

    The paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...

    Pełny tekst do pobrania w portalu

  • The beauty of architectural complexity

    Publikacja

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Natural architectural design

    Publikacja

    - Rok 2015

    .

  • Robotics in architectural education

    Robotics rapidly is becoming an important part of architectural design at all stages, from early conceptual work to construction. In this article is presented the present state of the art in the field related to architectural education, from computer numerical control (CNC) milling tools, through drones to multi-axis robotic arms. Professionals involved in modern design techniques often use them to create precise, complex forms...

    Pełny tekst do pobrania w portalu

  • Architecture supporting security of agent systems

    Publikacja

    - Rok 2006

    W rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...

  • The impact of the Architecture on the Climate Change in Anthropocene

    Pełny tekst do pobrania w serwisie zewnętrznym

  • KASKADA - multimedia processing platform architecture

    Publikacja

    - Rok 2010

    Przedstawiono architekturę platformy KASKADA (skrót od: Kontekstowa Analiza Strumieni Danych z Kamer do Aplikacji Definiujących Alarmy), będącą częścią projektu MAYDAY EURO 2012. Opisano nowy wielowarstwowy model przetwarzania strumieni multimedialnych. Zaproponowano następujące warstwy: usług - prostych i złożonych, zadań obliczeniowych i procesów. Przedstawiono przykładowy scenariusz wraz ze szczegółami jego wykonania, jak również...

    Pełny tekst do pobrania w portalu