Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 337
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Extensive use of computer networks is associated with the development of various effective methods that are suitable for hiding information in the contents transferred over the network. These methods are described as network steganography. Since web applications use HTTP protocol to transmit the requests to the server and send the answers to the final recipient, specifically HTTP protocol is ideal for hiding information. For example, there are several methods that can be used to transmit the additional content in the HTTP header. In this paper, we present authors’ evaluation method for network steganography using HTTP specific properties and evaluate the effectiveness of some techniques, providing experimental results.

Go to article

Authors and Affiliations

Paweł Buchwald
Maciej Rostański
Krystian Mączka
Download PDF Download RIS Download Bibtex

Abstract

The techniques of photogrammetric reconstruction were compared to the laser scanning in the article. The different conditions and constraints were introduced for reconstructed images, e.g. different materials, lighting condition, camera resolution, number of images in the sequence or using a-pripori calibration. The authors compare the results of surface reconstruction using software tools avaliable for photogrammetric reconstruction. The analysis is preformed for the selected objects with regard to laserscanned models or mathematical models.

Go to article

Authors and Affiliations

Krzysztof Skabek
Agnieszka Tomaka
Download PDF Download RIS Download Bibtex

Abstract

In this work we provide a method for approximating the separable numerical range of a matrix. We also recall the connection between restricted numerical range and entanglement of a quantum state. We show the possibility to establish state separability using computed restricted numerical range. In particular we present a method to obtain separability criteria for arbitrary system partition with use of the separable numerical range.

Go to article

Authors and Affiliations

Piotr Gawron
Przemysław Sadowski
Download PDF Download RIS Download Bibtex

Abstract

The article presents experiments in realistic modelling of facial expressions using volume morphing. The experiments use a variable number of points and face features. As the results are shown meshes deviations (between goal mesh and morphed shape). Experiments have shown that it is impossible to carry out a fully realistic morphing based on existing software. At the same time, even imperfect morphing allows you to show the expected emotional facial expression.

Go to article

Authors and Affiliations

Przemysław Kowalski
Download PDF Download RIS Download Bibtex

Abstract

The chapter deals with the issue of the risk and security management process in public administration, according to the internal audit standards and their requirements. Main legal acts and standards were specified and shortly described. Specially the risk analysis process and security measures selection were emphasized. The possibility to use the software tools for the risk analysis and security measures selection support in public administration was presented. The experiment of OSCAD usage in public administration was shortly described and its results were presented. This experiment shows that the software primarily intended for IT Security Management can be used for risk management in different area as well, for example – in public administration. Some possibilities of further development of risk management supporting tools were proposed.

Go to article

Authors and Affiliations

Jacek Bagiński
Download PDF Download RIS Download Bibtex

Abstract

This paper presents integration of ultrasonic and inertial approaches in indoor navigation system. Ultrasonic navigation systems allow to obtain good results whilst there are at least three beacon transmitters in the range of mobile receiver, but in many situations placement of large number of transmitters is not economically justified. In such situations navigation must be aided by other technique. This paper describes research on supporting ultrasonic system by inertial system based on Magnetic, Angular Rate and Gravity sensor. This can measure current orientation of the receiver and allows to estimate the length of the path by pedometer functionality.

Go to article

Authors and Affiliations

Krzysztof Tokarz
Piotr Czekalski
Wojciech Sieczkowski
Download PDF Download RIS Download Bibtex

Abstract

This paper presents the current stage of the development of EA-MOSGWA – a tool for identifying causal genes in Genome Wide Association Studies (GWAS). The main goal of GWAS is to identify chromosomal regions which are associated with a particular disease (e.g. diabetes, cancer) or with some quantitative trait (e.g height or blood pressure). To this end hundreds of thousands of Single Nucleotide Polymorphisms (SNP) are genotyped. One is then interested to identify as many SNPs as possible which are associated with the trait in question, while at the same time minimizing the number of false detections.

The software package MOSGWA allows to detect SNPs via variable selection using the criterion mBIC2, a modified version of the Schwarz Bayesian Information Criterion. MOSGWA tries to minimize mBIC2 using some stepwise selection methods, whereas EA-MOSGWA applies some advanced evolutionary algorithms to achieve the same goal. We present results from an extensive simulation study where we compare the performance of EA-MOSGWA when using different parameter settings. We also consider using a clustering procedure to relax the multiple testing correction in mBIC2. Finally we compare results from EA-MOSGWA with the original stepwise search from MOSGWA, and show that the newly proposed algorithm has good properties in terms of minimizing the mBIC2 criterion, as well as in minimizing the misclassification rate of detected SNPs.

Go to article

Authors and Affiliations

Artur Gola
Małgorzata Bogdan
Florian Frommlet
Download PDF Download RIS Download Bibtex

Abstract

In this article attention is paid to improving the quality of text document classification. The common techniques of analysis of text documents used in classification are shown and the weakness of these methods are stressed. Discussed here is the integration of quantitative and qualitative methods, which is increasing the quality of classification. In the proposed approach the expanded terms, obtained by using information patterns are used in the Latent Semantic Analysis. Finally empirical research is presented and based upon the quality measures of the text document classification, the effectiveness of the proposed approach is proved.

Go to article

Authors and Affiliations

Bożena Śmiałkowska
Marcin Gibert
Download PDF Download RIS Download Bibtex

Abstract

This article gives an introduction to NoSQL movement and how it can help in creating modem application trends of Web 2.0 by its scalability and performance. To achieve the objectives of this work, three types of databases have been tested to see which of them will be the best to work with mobile devices working on Android system. All received results were presented and commented.

Go to article

Authors and Affiliations

Paweł Buchwald
Maciej Rostański
Arkadiusz Jurasz
Download PDF Download RIS Download Bibtex

Abstract

The paper concerns the validation of the selected issues related to the new ontology-based approach to the elaboration and management of evidences prepared by developers for the IT security evaluation process according to the Common Criteria standard. The evidences are implied by the claimed EAL (Evaluation Assurance Level) for a developed IT product or system, called TOE (Target of Evaluation). The evidences envisage the TOE features and its development environment. The validation and use of the author’s elaborated ontology are discussed, including: composing evidences for the given TOE and EAL, expressing details of evidences documents, issuing queries to get given information about model, etc. The paper also shows how the evidences are organized, developed and used. This work is aimed at the development of a prototype of a knowledge base, designed mainly for developers to allow them to compose and manage different kinds of evidences elaborated on the patterns basis. This knowledge base can be used by a software tool aiding developers who produce evaluation evidences.

Go to article

Authors and Affiliations

Andrzej Białas
Download PDF Download RIS Download Bibtex

Abstract

The paper features some aspects of providing information security and business continuity to public administration by means of an integrated computer-aided management system OSCAD. The system is based on international standards ISO/IEC 270001 and BS 25999 (ISO 22301). First, the significance of information security and business continuity issues in public administration was presented along with a short introduction to the applied standards. Then the possibilities of the OSCAD system were discussed together with the examples how the system can solve the problems encountered by public administration.

Go to article

Authors and Affiliations

Andrzej Białas
Download PDF Download RIS Download Bibtex

Abstract

A new version of J2TADD - a translator from Java to automatons- is described, which adds support for a translation of Markov processes with non-dcterministic players, that can form coalitions, which in turn strive for different aims. In order to ease the definition of a probabilistic game using a plain Java application, several new constructs, and also a special library, are supported within the input language.

Ranges on variables or on expressions can be defined, what helps in checking the self-consistency of a model, and can also make the solving of the model faster.

Go to article

Authors and Affiliations

Artur Rataj
Download PDF Download RIS Download Bibtex

Abstract

In this work genetic programming is applied to the problem of generating maximum entanglement in multi-qubit systems of different structures. We provide quantum circuits that prepares multipartite entangled states in systems consisting of up to 8 qubits. We present results pertaining to the minimum size of a quantum circuit preparing a maximally entangled multi-qubit state in cases of reduced sets of quantum gates that correspond to spin chain quantum systems.

Go to article

Authors and Affiliations

Przemysław Sadowski

This page uses 'cookies'. Learn more