Filtry
wszystkich: 3039
wybranych: 1761
-
Katalog
- Publikacje 1761 wyników po odfiltrowaniu
- Czasopisma 128 wyników po odfiltrowaniu
- Konferencje 26 wyników po odfiltrowaniu
- Osoby 275 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 341 wyników po odfiltrowaniu
- Wydarzenia 5 wyników po odfiltrowaniu
- Dane Badawcze 493 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: secure it architectures
-
Contemporary architecture within the context of architectural education
PublikacjaAnalysed in this article are the diploma projects of students of architecture in European countries. The aim was to examine how students approach an important issue related to sustainable development, i.e. the integration of newly designed architecture into the existing historical, cultural and natural context. The rational use and protection of the environment requires the skilful shaping of urbanised space. Many changes in the...
-
The relationship between architectural detail and light in contemporary architecture
PublikacjaThe paper deals with the influence of modern artificial and natural lighting technology on contemporary architecture, especially in relation to architectural detail. Advanced complex lighting systems have an increasing importance in contemporary design solutions. Light itself, and the effect of its actions, and characteristic parts of the sophisticated lighting systems, play an essential role as independent architectural elements,...
-
The potential of computational methods for the categorization of architectural objects on the example of media architecture
PublikacjaThe paper presents an example of the categorization of architectural objects and assessment of the characteristics of urban space, based on the analysis of specific features of architectural objects and urban landscape. The conducted analysis refers to media architecture and is presented in the complex context of the development of media solutions. The field of influence of IT on architecture is also stressed, both on the architect’s...
-
The concept of smart and secure laboratory.
PublikacjaW chwili obecnej, w erze globalizacji istnieje niezbędna konieczność rozwoju struktur gwarantujących zapewnienie bezpieczeństwa dla zasadniczych wyzwań stawianych przed ludzkością. Stąd potrzeba ujęcia aspektu bezpieczeństwa w kategoriach globalnych. Instytucje akademickie dostosowują się w tym zakresie stosunkowo szybko i zaczynają wyznaczać nowe trendy oraz prowadzą współpracę z instytucjami pozaakademickimi. Tego typu kooperacja,...
-
Global defensive secure structures
PublikacjaLet S ⊂ V (G) for a given simple non-empty graph G. We define for any nonempty subset X of S the predicate SECG,S(X) = true iff |NG[X]∩S| ≥ |NG[X]\S|. Let H be a non-empty family of graphs such that for each vertex v ∈ V (G) there is a subgraph H of G containing v and isomorphic to a member of H. We introduce the concept of H-alliance extending the concept of global defensive secure structures. By an H-alliance in a graph G we...
-
Secure Italian domination in graphs
PublikacjaAn Italian dominating function (IDF) on a graph G is a function f:V(G)→{0,1,2} such that for every vertex v with f(v)=0, the total weight of f assigned to the neighbours of v is at least two, i.e., ∑u∈NG(v)f(u)≥2. For any function f:V(G)→{0,1,2} and any pair of adjacent vertices with f(v)=0 and u with f(u)>0, the function fu→v is defined by fu→v(v)=1, fu→v(u)=f(u)−1 and fu→v(x)=f(x) whenever x∈V(G)∖{u,v}. A secure Italian dominating...
-
Secure key from bound entanglement
PublikacjaScharakteryzowaliśmy zestaw dzielonych kwantowych stanów, który zawiera kryptograficznie prywatny klucz. Pozwala nam to przerobić teorię prywatności jako paradygmat blisko związany z tą, która jest używana w manipulacjach splątania.
-
Approaching Secure Industrial Control Systems
PublikacjaThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
The conception of secure and efficient process of migration into IPv6
PublikacjaZe względu na wady rozwiązań opartych o tunelowanie, w pracy zaproponowano koncepcję przejścia z IPv4 do IPv6 nie wymagającą od dostawców usług internetowych wzajemnej współpracy, nie narażoną na ataki związane z przekaźnikami, wzajemnym zaufaniem ISP. W koncepcji tej ograniczono tunelowanie do obszaru jednego ISP. W pracy wskazano istotne elementy ograniczające możliwość i zasadność wprowadzania mechanizmów tunelowania. Wskazano...
-
The methods of secure data transmission in the KNX system
PublikacjaThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Secure Quaternion Feistel Cipher for DICOM Images
PublikacjaAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
Edge-Computing based Secure E-learning Platforms
PublikacjaImplementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...
-
The secure transmission protocol of sensor Ad Hoc network
PublikacjaThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
W-like bound entangled states and secure key distillation
PublikacjaWe construct multipartite entangled states with underlying W-type structuresatisfying positive partial transpose (PPT) condition under any (N −1)|1 partition. Then we showhow to distill a N-partite secure key from the states using two different methods: direct applicationof local filtering and novel random key distillation scheme in which we adopt the idea from recentresults on entanglement distillation. Open problems and possible...
-
Quantum states representing perfectly secure bits are always distillable
PublikacjaW pracy pokazano, że ostatnio wprowadzone stany kwantowe reprezentujące perfekcyjnie bezpieczny bit klucza kryptograficznegooraz ich wielocząstkowe i wielowymiarowe uogólnienia zawsze reprezentują destylowalne splątanie. Podano ograniczenia dolne na wielkość destylowalnego splątania. Ponadto podano alternatywny dowód faktu, że koszt splątania jest ograniczeniem górnym na wielkość destylowalnego klucza kryptograficznego w dwucząstkowym...
-
A Concept of Using Knowledge Models to Secure Intellectual Capital in Enterprise
PublikacjaWithout a doubt, knowledge has become the most important resource for all companies in the world. Knowledge extended of our own observations and practice is being called experience. With the increase of knowledge and gained experience, the individual becomes more and more valuable employee in terms of business. The above mentioned knowledge can be gained only by self-improvement, which requires time and other necessary elements...
-
Experimental Extraction of Secure Correlations from a Noisy Private State
PublikacjaWe report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies...
-
Secure transmission of visual image in the VTS system using fingerprinting
Publikacja -
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublikacjaDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Sound Art and Architecture: New Horizons for Architecture and Urbanism
PublikacjaThe article discusses the crossroad between art and architecture. It sketches out the theoretical and practical aspects of involving art into architecture and multisensory dimensions of space. The analysis is based on examples of innovative experimental activities for architecture: educational projects such as workshops, seminars and courses, combining art and architecture, with special emphasis on sound art, and the consequences...
-
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile
PublikacjaThe paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...
-
Performance Analysis of the "Intelligent" Kirchhoff- Law - Johnson-Noise Secure Key Exchange
PublikacjaThe Kirchhoff-law - Johnson-noise (KLJN) secure key distribution system provides a way of exchanging theoretically secure keys by measuring random voltage and current through the wire connecting two different resistors at Alice’s and Bob’s ends. Recently new advanced protocols for the KLJN method have been proposed with enhanced performance. In this paper, we analyze the KLJN system and compare with the „intelligent” KLJN (iKLJN)...
-
Secured wired BPL voice transmission system
PublikacjaDesigning a secured voice transmission system is not a trivial task. Wired media, thanks to their reliability and resistance to mechanical damage, seem an ideal solution. The BPL (Broadband over Power Line) cable is resistant to electricity stoppage and partial damage of phase conductors, ensuring continuity of transmission in case of an emergency. It seems an appropriate tool for delivering critical data, mostly clear and understandable...
-
Musical inspiration in contemporary architecture - to build a music and to hear an architecture
PublikacjaThe goal of this research is chosen from a wide range of subjects within two fields of knowledge on the crossroads between music and architecture There are many designs in modern contemporary architecture that would illustrate the relationship between music and architecture, mainly through musical inspiration. The article shows contemporary musical and architectural discussion that cross over from the theoretical to the practical...
-
IoT protocols, architectures, and applications
PublikacjaThe proliferation of embedded systems, wireless technologies, and Internet protocols have enabled the IoT to bridge the gap between the virtual and physical world enabling the monitoring and control of the environment by data processing systems. IoT refers to the inter-networking of everyday objects that are equipped with sensing, computation, and communication capabilities. These networks can collaboratively interact and perform...
-
ARCHITECTURE IN BRANDING AND OVERBRANDING PROCESS. HOW GLOBALIZATION INFLUENCED ARCHITECTURE QUALITY.
PublikacjaGlobalization is unification. In the field of architecture and in the social structure alike, the globalization leads to a blending of economies and cultures that produces uniformly branded public space as a response to universal assumptions of integration and correlation. While branding consists in creating a recognizable and outstanding image a strong contradiction exists between both of these approaches. As a result, regional...
-
Street Art and Architecture
PublikacjaThe paper explores both the areas of conflict as well as agreement between architecture and Street Art. The conflict arises from the fact that urban environment has always been a background for street art, which unavoidably jeopardizes the conceptual integrity of the building understood as a work of architecture. However, there are strong interrelations between these two domains of human creativity. Both street art and architecture...
-
Evaluating architecture students' knowledge of the history of architecture by tests and by drawings: a comparative analysis
PublikacjaThe methods of evaluating students’ knowledge in architectural education, and in particular in education on history of architecture, are specific in many respects. Apart from checking the general knowledge of history concerning chronology, artistic trends, styles, main objects and architects, it should also check students’ ability to analyse the historic architecture in a drawing form. Such a form of presenting architecture has...
-
Can architecture be 11-dimensional? The nature of space in the architecture of the digital world era
PublikacjaThis research aims to explore the development of architectural theories about ‘architectural dimensions’ and look at architecture as a multidimensional space. It is important to understand that with today's development of virtual reality technology and through the combination of theories of physics and architecture, a new possibility of creating space has emerged. The arguments are made through inductive reasoning and grounded...
-
BeesyBees: A mobile agent-based middleware for a reliable and secure execution of service-based workflow applications in BeesyCluster
PublikacjaIntegrating distributed services into workflows comes with its own set of challenges, including security, coordination, fault tolerance and optimisation of execution time. This paper presents an architecture and implementation - nicknamed BeesyBees - that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middleware that allows users to access distributed resources as well as publish...
-
Arte and Arche. On Art and Architecture
PublikacjaArchitekci poszukują inspiracji i wzorców dla form architektonicznych wśród innych dziedzin sztuki. Zapożyczenia, cytaty i reinterpretacje malarstwa, rzeźby, muzyki, a nawet tańca mogą przynieść oryginalne koncepcje i rozwiązania formalne, przy okazji wiążąc architekturę z szerszym kontekstem historycznym, duchowym i kulturowym. Współczesne formy architektoniczne nieraz powstają jako przestrzenna interpretacja kompozycji malarskich...
-
Critical perspectives on media architecture
Publikacja -
The heritage of wooden architecture in Poland
PublikacjaArtykuł przedstawia dziedzictwo polskiej architektury drewnianej, granicah obecnych. Obejmuje okres historyczny od powstania do dnia dzisiejszego. Wyodrebniono jako osobny problem ochrony dziedzictwa w ujęciu konserwatorskim oraz rolę skansenów - muzeów na swiezym powietrzu. Opracowanie dotyczy zarówno architektury jak i wnętrz obiektów.
-
The teaching of architecture in the nineteenth century
PublikacjaTematem artykułu jest system kształcenia inżynierów architektów, jaki miał miejsce pod koniec XIX wieku w lwowskiej Szkole Politechnicznej jednej z pierwszych i przez długi czas jedynej na tych ziemiach uczelni technicznej. Omówiona jest zawartość merytoryczna i organizacja pierwszego programu nauczania jaki został przyjęty po uzyskaniu przez uczelnię praw szkoły wyższej (1877), aż do jego reorganizacji pod koniec stulecia, wymuszonej...
-
The origins of the brick architecture in Pomerania
PublikacjaTraditionally, brick is one of the most popular building materials on the southern coast of the Baltic Sea. Although the origins of brick architecture have been the subject of numerous research studies, their results were focused on the Kingdom of Denmark, merchant-towns and the State of the Teutonic Order. Most scholars claimed that Pomeranian architecture had not been as developed as that in the neighbouring countries. Moreover,...
-
Games and play with light in architecture
PublikacjaThe paper deals with the issue of the influence of daylight on the creation of architecture in the view of designers` play with light in the architectural space. Using the examples of contemporary realizations of some art museums, the work demonstrates the impact of exploration and experimentation conducted by the creators of visual arts on the design styles and architectural solutions. It also reveals the historical continuity...
-
Architektura Parametryczna/ Parametric Architecture
PublikacjaPierwsze systemy CAD przeniosły tradycyjne sposoby projektowania do przestrzeni wirtualnej. Modelowanie algorytmiczne z kolei pozwoliło na wykonywanie powtarzających się zadań w sposób zautomatyzowany, a praca z wykorzystaniem tych narzędzi wymaga wypracowania nowego podejścia.
-
Architecture and Basic Assumptions of RSMAD
PublikacjaThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...
-
Ships - inspiring objects in architecture
PublikacjaSea-going vessels have for centuries fascinated people, not only those who happen to work at sea, but first and foremost, those who have never set foot aboard a ship. The environment in which ships operate is reminiscent of freedom and countless adventures, but also of hard and interesting maritime working life. The famous words of Pompey: “Navigare necesseest, vivere non estnecesse” (sailing is necessary, living – is not necessary),...
-
ARCHITECTURE OF HYDROPOWER PLANTS IN POMORZE
PublikacjaThe history of energetic use of the rivers of Pomerania (Pomorze) is traced from the late Middle Ages. Their potential due to geographical specificity of the region was still attractive in the era of electricity of the19th and the first half of the 20th century. Configuration of the terrain, geological, and natural restrictions, but mainly energetic potential of particular localization were crucial for economical success of the...
-
Machinery for severe climate conditions
Publikacja -
Integrated protection/restoration in survivable multilayer architectures
PublikacjaArtykuł przedstawia nową koncepcję projektowania wielowarstwowych architektur sieci przeżywalnych, wykorzystującą informację międzywarstwową do zabezpieczania odtwarzania na wypadek pojedyńczej awarii węzła lub łącza w sposob zapobiegający propagacji awarii. Oryginalne zadanie optymalizacji całej zintegrowanej architektury przeżywalnej sformułowano jako zadanie programowania całkowitego. Jest ono NP-zupełne i zaproponowano algorytm...
-
THE ARCHİTECTURE AND FASHİON DESİGN – An Examination of the Relationship between Fashion and Architecture Design in light of Technological Advancements
PublikacjaThe article focuses on the mutual relationship between two seemingly distant fields of art - architecture and fashion design. It describes a common basis for the process of creating art in the approach to both fashion and architecture. The following considerations, which are based on principles of composition, attempt to reach beyond just the form and analyze also context or perception. The article quotes famous creators and depicts...
-
Distributed measurement system with data transmission secured using XXTEA algorithm
PublikacjaThe paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...
-
The beauty of architectural complexity
Publikacja -
Natural architectural design
Publikacja.
-
Robotics in architectural education
PublikacjaRobotics rapidly is becoming an important part of architectural design at all stages, from early conceptual work to construction. In this article is presented the present state of the art in the field related to architectural education, from computer numerical control (CNC) milling tools, through drones to multi-axis robotic arms. Professionals involved in modern design techniques often use them to create precise, complex forms...
-
Architecture supporting security of agent systems
PublikacjaW rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...
-
The impact of the Architecture on the Climate Change in Anthropocene
Publikacja -
KASKADA - multimedia processing platform architecture
PublikacjaPrzedstawiono architekturę platformy KASKADA (skrót od: Kontekstowa Analiza Strumieni Danych z Kamer do Aplikacji Definiujących Alarmy), będącą częścią projektu MAYDAY EURO 2012. Opisano nowy wielowarstwowy model przetwarzania strumieni multimedialnych. Zaproponowano następujące warstwy: usług - prostych i złożonych, zadań obliczeniowych i procesów. Przedstawiono przykładowy scenariusz wraz ze szczegółami jego wykonania, jak również...