In this paper we propose cryptosystems based on subgroup distortion in hyperbolic groups. We also include concrete examples of hyperbolic groups as possible platforms.
Due to the changing social and program expectations teachers more often look for new and better solutions in the field of education and teaching. Among many teaching methods, the storyline method is a very popular one and is gaining now more and more recognition from pedagogues around the world. The method starts to have its supporters in Poland as well. This article will be devoted to the description of this innovative strategy.
The paper comprises the review of all 23 known valid species along with synonyms and polytomic keys based on morphological features. Mature specimens of 8 species occur in fishes, 4 in birds, 11 in mammals. Each species settles in a definite section of the digestive tract. The structure of a population is dependent upon the time which has passed since the moment of invasion and the intensity of infestation. Acathocephalans can be found in hosts all the year round, but incomplete seasonality of the occurrence of 2 fish parasites has been recorded. Fish parasites show wide specificity in relation to the hosts mentioned while bird and mammal parasites specificity is narrow. The majority of acanthocephalan species have circumpolar distribution but only 3 have been found inside the polar circle and the other 7 are common in the environs of subcontinental archipelagoes. Acanthocephalans do not yield precedence as far as the diversity of species and infestation intensity are concerned in the Antarctic to other groups of parasite helminths. Their great importance results from their mass occurrence in the vertebrates which are the focus of. man's practical interests — fishes, seals and whales.
There is an ongoing debate about the fundamental security of existing quantum key exchange schemes. This debate indicates not only that there is a problem with security but also that the meanings of perfect, imperfect, conditional and unconditional (information theoretic) security in physically secure key exchange schemes are often misunderstood. It has been shown recently that the use of two pairs of resistors with enhanced Johnsonnoise and a Kirchhoff-loop ‒ i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol ‒ for secure key distribution leads to information theoretic security levels superior to those of today’s quantum key distribution. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. The KLJN system is briefly surveyed here with discussions about the essential questions such as (i) perfect and imperfect security characteristics of the key distribution, and (ii) how these two types of securities can be unconditional (or information theoretical).
The population of spider feeding on insect pests of cotton was observed throughout the growth period of the crop, being maximum in the month of July. Chrysoperla was observed from second fortnight of June to harvesting of the crop being maximum in November. The incidence of coccinellids was recorded from the middle of August to middle of September and remained till harvesting of the crop being maximum in the first fortnight of November. A positive significant effect of maximum and minimum temperature on spider and negative significant effect on population of chrysoperla and coccinellids was recorded. Evening RH exerted positive significant effect on spider and negative significant effect on coccinellids.
This paper presents a piecewise line generalization algorithm (PG) based on shape characteristic analysis. An adaptive threshold algorithm is used to detect all corners, from which key points are selected. The line is divided into some segments by the key points and generalized piecewise with the Li-Openshaw algorithm. To analyze the performance, line features with different complexity are used. The experimental results compared with the DP algorithm and the Li-Openshaw algorithm show that the PG has better performance in keeping the shape characteristic with higher position accuracy.
Many researchers have contributed to creating Quantum Key Distribution (QKD) since the first protocol BB84 was proposed in 1984. One of the crucial problems in QKD is to guarantee its security with finite-key lengths by Privacy Amplification (PA). However, finite-key analyses show a trade-off between the security of BB84 and the secure key rates. This study analyses two examples to show concrete trade-offs. Furthermore, even though the QKD keys have been perceived to be arbitrarily secure, this study shows a fundamental limitation in the security of the keys by connecting Leftover Hash Lemma and Guessing Secrecy on the QKD keys.
Recently, Gunn, Allison and Abbott (GAA) [http://arxiv.org/pdf/1402.2709v2.pdf] proposed a new scheme to utilize electromagnetic waves for eavesdropping on the Kirchhoff-law-Johnson-noise (KLJN) secure key distribution. We proved in a former paper [Fluct. Noise Lett. 13 (2014) 1450016] that GAA’s mathematical model is unphysical. Here we analyze GAA’s cracking scheme and show that, in the case of a loss-free cable, it provides less eavesdropping information than in the earlier (Bergou)-Scheuer-Yariv mean-square-based attack [Kish LB, Scheuer J, Phys. Lett. A 374:2140-2142 (2010)], while it offers no information in the case of a lossy cable. We also investigate GAA’s claim to be experimentally capable of distinguishing—using statistics over a few correlation times only—the distributions of two Gaussian noises with a relative variance difference of less than 10-8. Normally such distinctions would require hundreds of millions of correlations times to be observable. We identify several potential experimental artifacts as results of poor KLJN design, which can lead to GAA’s assertions: deterministic currents due to spurious harmonic components caused by ground loops, DC offset, aliasing, non-Gaussian features including non-linearities and other non-idealities in generators, and the timederivative nature of GAA’s scheme which tends to enhance all of these artifacts.
We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR-KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random Resistor Random Temperature (RRRT-) KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT-KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT-KLJN scheme can prevail at a non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation-Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT-KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.
Consumer experiences as a driver of contemporary brand and marketing management are taken up nowadays by many researchers and academics. It’s merely compelled by bored with generic products and services consumers who much more than ever look for intensive, personalized experiences. However, there is a significant gap in knowledge how to transfer these global changes to the needs of effective tourist product management. The article presents a brand-new approach called ‘the experience key’ for discovering, grouping and converting common, dedicated to a certain destination customers experiences into clear and desirable tourist offer with meaningful competitive impact. One of most important advantages of the methodology is its simplicity and ease-of-use for any professionals involved in destination product management by using well-know research methods and apparent applicability into the process of building and selling tourist offer of a place. The Experience Key can be regarded as a missing link between theoretical considerations led by academics and expectations of tourism industry representatives in the context of applying customer experience to place brand and product management.
The article presents research on the relationship between mining and used resources on the example of Gliśno gravel pit. As regards to resources, the following issues were analyzed: employees’ working time, time of running machines, fuel consumption and electricity consumption. The aim of the publication is to examine the dependencies that exist between the analyzed variables. KPI’s (Key Performance Indicators) were calculated for individual resources. The analysis presented in the publication contains data from 2008-2014.
In the paper, various approaches to automatic music audio summarization are discussed. The project described in detail, is the realization of a method for extracting a music thumbnail - a fragment of continuous music of a given duration time that is most similar to the entire music piece. The results of subjective assessment of the thumbnail choice are presented, where four parameters have been taken into account: clarity (representation of the essence of the piece of music), conciseness (the motifs are not repeated in the summary), coherence of music structure, and overall quality of summary usefulness.
The Kirchhoff-law-Johnson-noise (KLJN) secure key exchange scheme offers unconditional security, however it can approach the perfect security limit only in the case when the practical system’s parameters approach the ideal behavior of its core circuitry. In the case of non-ideal features, non-zero information leak is present. The study of such leaks is important for a proper design of practical KLJN systems and their privacy amplifications in order to eliminate these problems.
The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical secure key exchange system based on the laws of classical statistical physics to provide unconditional security. We used the LTSPICE industrial cable and circuit simulator to emulate one of the major active (invasive) attacks, the current injection attack, against the ideal and a practical KLJN system, respectively. We show that two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple privacy amplification scheme, independently and effectively eliminate the information leak and successfully preserve the system’s unconditional security.
Maintenance of process plants requires application of good maintenance practice due to
a great level of complexity. From a plant maintenance point of view, the most significant activity
is turnaround, an activity carried out through project task with long planning process
period and very short execution period, which makes it one of the most complex projects
of maintenance in general. It is exactly this kind of maintenance that is based on multidisciplinarity
which has to be implemented through the system of quality management on all
levels of maintenance management. This paper defines the most significant factors determining
the process of turnaround projects quality management and its efficiency. Such relation
is observed through moderating influence of complexity on process management efficiency
in the turnaround project. The empirical research was conducted based on the survey of
turnaround project participants in five refineries in Croatia, Italy, Slovakia and Hungary.
For exploring the influence of research variables testing of the target relation is carried out
by applying logistical regression. Research results confirm the significance of complexity as
variable that significantly contributes to the project performance through the moderating
influence on success of the project, as well as the influence of an efficient management on
a plant turnaround project key results. Beside theoretical indications, practical implications
that arise from this research study mainly refers to management process of the industrial
plant maintenance project.
The article provides the external indications (both international and domestic) showing how important creating an appropriate mineral policy of the country is, especially in the context of mineral security. The current mandatory legal regulations referring to mineral policy and mineral security of the country were presented and discussed against this background, starting with provisions of the Constitution of the Republic of Poland, through the Strategy for Sustainable Development, Spatial Management Concept of the Country 2030 together with Action Plan, Strategy for Energy Security and Environment – 2020 perspective, Geological and Mining Law and other legal acts and implementing provisions, Action Plan “Raw Materials for the Industry” announced by the Minister of Development, the Concept for Mineral Policy presented by the Government Plenipotentiary for the Mineral Policy, and finally – project of the Urban and Building Code in the area of spatial development. In the case of documents being in the course of the proceedings, the current state of working on them is presented, also in the context of particular projected legal solutions for future regulations. The author indicates and justifies the need of accelerating the work and taking actions to prevent the currently appearing phenomena that may impede the execution of the raw materials policy and the protection of key raw materials in the future.