Wyniki wyszukiwania dla: secure IT architectures - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: secure IT architectures

Wyniki wyszukiwania dla: secure IT architectures

  • LECTURE NOTES IN COMPUTER SCIENCE

    Czasopisma

    ISSN: 0302-9743

  • Contemporary architecture within the context of architectural education

    Analysed in this article are the diploma projects of students of architecture in European countries. The aim was to examine how students approach an important issue related to sustainable development, i.e. the integration of newly designed architecture into the existing historical, cultural and natural context. The rational use and protection of the environment requires the skilful shaping of urbanised space. Many changes in the...

    Pełny tekst do pobrania w portalu

  • Architectus

    Czasopisma

    ISSN: 1429-7507 , eISSN: 2084-5227

  • The relationship between architectural detail and light in contemporary architecture

    Publikacja

    The paper deals with the influence of modern artificial and natural lighting technology on contemporary architecture, especially in relation to architectural detail. Advanced complex lighting systems have an increasing importance in contemporary design solutions. Light itself, and the effect of its actions, and characteristic parts of the sophisticated lighting systems, play an essential role as independent architectural elements,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The potential of computational methods for the categorization of architectural objects on the example of media architecture

    Publikacja

    The paper presents an example of the categorization of architectural objects and assessment of the characteristics of urban space, based on the analysis of specific features of architectural objects and urban landscape. The conducted analysis refers to media architecture and is presented in the complex context of the development of media solutions. The field of influence of IT on architecture is also stressed, both on the architect’s...

    Pełny tekst do pobrania w portalu

  • Securo

    Czasopisma

    ISSN: 2353-6330

  • Global defensive secure structures

    Publikacja

    Let S ⊂ V (G) for a given simple non-empty graph G. We define for any nonempty subset X of S the predicate SECG,S(X) = true iff |NG[X]∩S| ≥ |NG[X]\S|. Let H be a non-empty family of graphs such that for each vertex v ∈ V (G) there is a subgraph H of G containing v and isomorphic to a member of H. We introduce the concept of H-alliance extending the concept of global defensive secure structures. By an H-alliance in a graph G we...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Secure Italian domination in graphs

    Publikacja

    - JOURNAL OF COMBINATORIAL OPTIMIZATION - Rok 2021

    An Italian dominating function (IDF) on a graph G is a function f:V(G)→{0,1,2} such that for every vertex v with f(v)=0, the total weight of f assigned to the neighbours of v is at least two, i.e., ∑u∈NG(v)f(u)≥2. For any function f:V(G)→{0,1,2} and any pair of adjacent vertices with f(v)=0 and u with f(u)>0, the function fu→v is defined by fu→v(v)=1, fu→v(u)=f(u)−1 and fu→v(x)=f(x) whenever x∈V(G)∖{u,v}. A secure Italian dominating...

    Pełny tekst do pobrania w portalu

  • The concept of smart and secure laboratory.

    Publikacja

    - Rok 2004

    W chwili obecnej, w erze globalizacji istnieje niezbędna konieczność rozwoju struktur gwarantujących zapewnienie bezpieczeństwa dla zasadniczych wyzwań stawianych przed ludzkością. Stąd potrzeba ujęcia aspektu bezpieczeństwa w kategoriach globalnych. Instytucje akademickie dostosowują się w tym zakresie stosunkowo szybko i zaczynają wyznaczać nowe trendy oraz prowadzą współpracę z instytucjami pozaakademickimi. Tego typu kooperacja,...

  • Secure key from bound entanglement

    Publikacja

    - Rok 2005

    Scharakteryzowaliśmy zestaw dzielonych kwantowych stanów, który zawiera kryptograficznie prywatny klucz. Pozwala nam to przerobić teorię prywatności jako paradygmat blisko związany z tą, która jest używana w manipulacjach splątania.

  • Approaching Secure Industrial Control Systems

    Publikacja

    This study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...

    Pełny tekst do pobrania w portalu

  • The conception of secure and efficient process of migration into IPv6

    Ze względu na wady rozwiązań opartych o tunelowanie, w pracy zaproponowano koncepcję przejścia z IPv4 do IPv6 nie wymagającą od dostawców usług internetowych wzajemnej współpracy, nie narażoną na ataki związane z przekaźnikami, wzajemnym zaufaniem ISP. W koncepcji tej ograniczono tunelowanie do obszaru jednego ISP. W pracy wskazano istotne elementy ograniczające możliwość i zasadność wprowadzania mechanizmów tunelowania. Wskazano...

  • The methods of secure data transmission in the KNX system

    The article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Secure Quaternion Feistel Cipher for DICOM Images

    An improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The secure transmission protocol of sensor Ad Hoc network

    The paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Edge-Computing based Secure E-learning Platforms

    Publikacja

    - Rok 2022

    Implementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...

    Pełny tekst do pobrania w portalu

  • Architecture Civil Engineering Environment

    Czasopisma

    ISSN: 1899-0142

  • ARC Lighting In Architecture

    Czasopisma

    ISSN: 1753-5875

  • W-like bound entangled states and secure key distillation

    Publikacja

    We construct multipartite entangled states with underlying W-type structuresatisfying positive partial transpose (PPT) condition under any (N −1)|1 partition. Then we showhow to distill a N-partite secure key from the states using two different methods: direct applicationof local filtering and novel random key distillation scheme in which we adopt the idea from recentresults on entanglement distillation. Open problems and possible...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Quantum states representing perfectly secure bits are always distillable

    Publikacja

    W pracy pokazano, że ostatnio wprowadzone stany kwantowe reprezentujące perfekcyjnie bezpieczny bit klucza kryptograficznegooraz ich wielocząstkowe i wielowymiarowe uogólnienia zawsze reprezentują destylowalne splątanie. Podano ograniczenia dolne na wielkość destylowalnego splątania. Ponadto podano alternatywny dowód faktu, że koszt splątania jest ograniczeniem górnym na wielkość destylowalnego klucza kryptograficznego w dwucząstkowym...

    Pełny tekst do pobrania w portalu

  • Experimental Extraction of Secure Correlations from a Noisy Private State

    Publikacja
    • K. Dobek
    • M. Karpiński
    • R. Demkowicz-Dobrzański
    • K. Banaszek
    • P. Horodecki

    - PHYSICAL REVIEW LETTERS - Rok 2011

    We report experimental generation of a noisy entangled four-photon state that exhibits a separation between the secure key contents and distillable entanglement, a hallmark feature of the recently established quantum theory of private states. The privacy analysis, based on the full tomographic reconstruction of the prepared state, is utilized in a proof-of-principle key generation. The inferiority of distillation-based strategies...

    Pełny tekst do pobrania w portalu

  • A Concept of Using Knowledge Models to Secure Intellectual Capital in Enterprise

    Publikacja

    Without a doubt, knowledge has become the most important resource for all companies in the world. Knowledge extended of our own observations and practice is being called experience. With the increase of knowledge and gained experience, the individual becomes more and more valuable employee in terms of business. The above mentioned knowledge can be gained only by self-improvement, which requires time and other necessary elements...

  • Secure transmission of visual image in the VTS system using fingerprinting

    Publikacja

    Pełny tekst do pobrania w portalu

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publikacja

    - IEEE Access - Rok 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Pełny tekst do pobrania w portalu

  • Sound Art and Architecture: New Horizons for Architecture and Urbanism

    The article discusses the crossroad between art and architecture. It sketches out the theoretical and practical aspects of involving art into architecture and multisensory dimensions of space. The analysis is based on examples of innovative experimental activities for architecture: educational projects such as workshops, seminars and courses, combining art and architecture, with special emphasis on sound art, and the consequences...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Performance Analysis of the "Intelligent" Kirchhoff- Law - Johnson-Noise Secure Key Exchange

    Publikacja

    The Kirchhoff-law - Johnson-noise (KLJN) secure key distribution system provides a way of exchanging theoretically secure keys by measuring random voltage and current through the wire connecting two different resistors at Alice’s and Bob’s ends. Recently new advanced protocols for the KLJN method have been proposed with enhanced performance. In this paper, we analyze the KLJN system and compare with the „intelligent” KLJN (iKLJN)...

    Pełny tekst do pobrania w portalu

  • Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile

    Publikacja

    The paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Secured wired BPL voice transmission system

    Publikacja

    - Scientific Journal of the Military University of Land Forces - Rok 2020

    Designing a secured voice transmission system is not a trivial task. Wired media, thanks to their reliability and resistance to mechanical damage, seem an ideal solution. The BPL (Broadband over Power Line) cable is resistant to electricity stoppage and partial damage of phase conductors, ensuring continuity of transmission in case of an emergency. It seems an appropriate tool for delivering critical data, mostly clear and understandable...

    Pełny tekst do pobrania w portalu

  • IEEE Transactions on Dependable and Secure Computing

    Czasopisma

    ISSN: 1545-5971 , eISSN: 1941-0018

  • Musical inspiration in contemporary architecture - to build a music and to hear an architecture

    Publikacja

    - Rok 2009

    The goal of this research is chosen from a wide range of subjects within two fields of knowledge on the crossroads between music and architecture There are many designs in modern contemporary architecture that would illustrate the relationship between music and architecture, mainly through musical inspiration. The article shows contemporary musical and architectural discussion that cross over from the theoretical to the practical...

  • IoT protocols, architectures, and applications

    Publikacja
    • C. Buratti
    • E. G. Ström
    • L. Feltrin
    • L. Clavier
    • G. Gardašević
    • T. Blazek
    • L. Berbakov
    • T. C. Balan
    • L. Orozco-Barbosa
    • C. Anton-Haro... i 2 innych

    - Rok 2021

    The proliferation of embedded systems, wireless technologies, and Internet protocols have enabled the IoT to bridge the gap between the virtual and physical world enabling the monitoring and control of the environment by data processing systems. IoT refers to the inter-networking of everyday objects that are equipped with sensing, computation, and communication capabilities. These networks can collaboratively interact and perform...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • ARCHITECTURE IN BRANDING AND OVERBRANDING PROCESS. HOW GLOBALIZATION INFLUENCED ARCHITECTURE QUALITY.

    Publikacja

    - Rok 2014

    Globalization is unification. In the field of architecture and in the social structure alike, the globalization leads to a blending of economies and cultures that produces uniformly branded public space as a response to universal assumptions of integration and correlation. While branding consists in creating a recognizable and outstanding image a strong contradiction exists between both of these approaches. As a result, regional...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Street Art and Architecture

    Publikacja

    - Rok 2011

    The paper explores both the areas of conflict as well as agreement between architecture and Street Art. The conflict arises from the fact that urban environment has always been a background for street art, which unavoidably jeopardizes the conceptual integrity of the building understood as a work of architecture. However, there are strong interrelations between these two domains of human creativity. Both street art and architecture...

  • Process: Architecture 

    Czasopisma

    ISSN: 0386-037X

  • Architecture Today

    Czasopisma

    ISSN: 0958-6407

  • Journal of Architecture (The)

    Czasopisma

    ISSN: 1360-2365 , eISSN: 1466-4410

  • Architecture d'Aujourdui

    Czasopisma

    ISSN: 0003-8695

  • Vernacular Architecture

    Czasopisma

    ISSN: 0305-5477 , eISSN: 1749-6292

  • Architecture and Culture

    Czasopisma

    ISSN: 2050-7828 , eISSN: 2050-7836

  • Architecture and Engineering

    Czasopisma

    eISSN: 2500-0055

  • Histoire & Mesure

    Czasopisma

    ISSN: 0982-1783

  • Epilepsy and Seizure

    Czasopisma

    ISSN: 1882-5567

  • Can architecture be 11-dimensional? The nature of space in the architecture of the digital world era

    This research aims to explore the development of architectural theories about ‘architectural dimensions’ and look at architecture as a multidimensional space. It is important to understand that with today's development of virtual reality technology and through the combination of theories of physics and architecture, a new possibility of creating space has emerged. The arguments are made through inductive reasoning and grounded...

    Pełny tekst do pobrania w portalu

  • Evaluating architecture students' knowledge of the history of architecture by tests and by drawings: a comparative analysis

    The methods of evaluating students’ knowledge in architectural education, and in particular in education on history of architecture, are specific in many respects. Apart from checking the general knowledge of history concerning chronology, artistic trends, styles, main objects and architects, it should also check students’ ability to analyse the historic architecture in a drawing form. Such a form of presenting architecture has...

    Pełny tekst do pobrania w portalu

  • Lucyna Nyka prof. dr hab. inż. arch.

    Lucyna Nyka (prof. dr hab. inż. arch.) jest architektem i profesorem na Wydziale Architektury Politechniki Gdańskiej. W latach 2008-2016 pełniła funkcję prodziekana ds. nauki, a od 2016 jest dziekanem Wydziału Architektury.     Zainteresowania badawcze prof. Lucyny Nyki skoncentrowane są wokół kwestii powiązań architektury i wody, przekształceń terenów nadwodnych oraz urbanistycznych krajobrazów. Jest autorem i współautorem wielu...

  • Arte and Arche. On Art and Architecture

    Publikacja

    - Rok 2009

    Architekci poszukują inspiracji i wzorców dla form architektonicznych wśród innych dziedzin sztuki. Zapożyczenia, cytaty i reinterpretacje malarstwa, rzeźby, muzyki, a nawet tańca mogą przynieść oryginalne koncepcje i rozwiązania formalne, przy okazji wiążąc architekturę z szerszym kontekstem historycznym, duchowym i kulturowym. Współczesne formy architektoniczne nieraz powstają jako przestrzenna interpretacja kompozycji malarskich...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Critical perspectives on media architecture

    Publikacja

    - Rok 2014

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The heritage of wooden architecture in Poland

    Publikacja

    - Rok 2009

    Artykuł przedstawia dziedzictwo polskiej architektury drewnianej, granicah obecnych. Obejmuje okres historyczny od powstania do dnia dzisiejszego. Wyodrebniono jako osobny problem ochrony dziedzictwa w ujęciu konserwatorskim oraz rolę skansenów - muzeów na swiezym powietrzu. Opracowanie dotyczy zarówno architektury jak i wnętrz obiektów.

  • The teaching of architecture in the nineteenth century

    Publikacja

    - Rok 2005

    Tematem artykułu jest system kształcenia inżynierów architektów, jaki miał miejsce pod koniec XIX wieku w lwowskiej Szkole Politechnicznej jednej z pierwszych i przez długi czas jedynej na tych ziemiach uczelni technicznej. Omówiona jest zawartość merytoryczna i organizacja pierwszego programu nauczania jaki został przyjęty po uzyskaniu przez uczelnię praw szkoły wyższej (1877), aż do jego reorganizacji pod koniec stulecia, wymuszonej...

  • The origins of the brick architecture in Pomerania

    Publikacja

    - Rok 2016

    Traditionally, brick is one of the most popular building materials on the southern coast of the Baltic Sea. Although the origins of brick architecture have been the subject of numerous research studies, their results were focused on the Kingdom of Denmark, merchant-towns and the State of the Teutonic Order. Most scholars claimed that Pomeranian architecture had not been as developed as that in the neighbouring countries. Moreover,...