Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 32
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Supply chain management emerged as the ultimate management strategy to ensure the competitive advantages of companies in their markets. Suppliers are considered as inevitable sources of external risks in modern supply chains. In this respect, resonance is essential for the ability to adapt in resonance to disturbances and to restore in choosing suppliers. As suppliers of critical resources are vulnerable, choosing better suppliers to create resilience, and thereby reducing the risks in the supply chain as a whole. In recent years, emphasis has been placed on supply chain resilience and resilient suppliers, but few studies have been conducted on the evaluation and selection of resilient suppliers with multi-criteria decision making models. The main purposes of this study are a broad review of the literature on the resilient factor, factorization, efficiency of key factors in the reliance of suppliers and the ranking of resilient suppliers using the combined approach of SWARA and WASPAS. For this purpose, after a comprehensive review of Literature interview with the experts of petrochemical upstream industry, six key factors and overall resilience of suppliers were identified in eighteen factors. Then the weight of the dimensions was determined by using the SWARA method. The output of the method showed that supplier accountability and key performance factors were the most important factors in assessing the resilience of suppliers. Using the supporting method, five resilient suppliers were evaluated based on six dimensions and the final ranking of suppliers was determined. With this ranking, the industry will be a major step towards improving supply chain and increasing suppliers’ resilience to address disruptions and risks, improve supply and achieve competitive advantage and satisfy the consumers’ needs.
Go to article

Authors and Affiliations

Mehdi Ajalli
1
Nima Saberifard
2
Babak Zinati
2

  1. Bu-Ali Sina University, Department of Management, Hamedan, Iran
  2. slamic Azad University, Department of Industrial Management, Rasht Branch, Rasht, Iran
Download PDF Download RIS Download Bibtex

Abstract

In this paper we propose cryptosystems based on subgroup distortion in hyperbolic groups. We also include concrete examples of hyperbolic groups as possible platforms.

Go to article

Authors and Affiliations

Indira Chatterji
Delaram Kahrobaei
Ni Yen lu
Download PDF Download RIS Download Bibtex

Abstract

Due to the changing social and program expectations teachers more often look for new and better solutions in the field of education and teaching. Among many teaching methods, the storyline method is a very popular one and is gaining now more and more recognition from pedagogues around the world. The method starts to have its supporters in Poland as well. This article will be devoted to the description of this innovative strategy.

Go to article

Authors and Affiliations

Agnieszka Kosek
Monika Kowalska
Download PDF Download RIS Download Bibtex

Abstract

The paper comprises the review of all 23 known valid species along with synonyms and polytomic keys based on morphological features. Mature specimens of 8 species occur in fishes, 4 in birds, 11 in mammals. Each species settles in a definite section of the digestive tract. The structure of a population is dependent upon the time which has passed since the moment of invasion and the intensity of infestation. Acathocephalans can be found in hosts all the year round, but incomplete seasonality of the occurrence of 2 fish parasites has been recorded. Fish parasites show wide specificity in relation to the hosts mentioned while bird and mammal parasites specificity is narrow. The majority of acanthocephalan species have circumpolar distribution but only 3 have been found inside the polar circle and the other 7 are common in the environs of subcontinental archipelagoes. Acanthocephalans do not yield precedence as far as the diversity of species and infestation intensity are concerned in the Antarctic to other groups of parasite helminths. Their great importance results from their mass occurrence in the vertebrates which are the focus of. man's practical interests — fishes, seals and whales.

Go to article

Authors and Affiliations

Krzysztof Zdzitowiecki
Download PDF Download RIS Download Bibtex

Abstract

There is an ongoing debate about the fundamental security of existing quantum key exchange schemes. This debate indicates not only that there is a problem with security but also that the meanings of perfect, imperfect, conditional and unconditional (information theoretic) security in physically secure key exchange schemes are often misunderstood. It has been shown recently that the use of two pairs of resistors with enhanced Johnsonnoise and a Kirchhoff-loop ‒ i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol ‒ for secure key distribution leads to information theoretic security levels superior to those of today’s quantum key distribution. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. The KLJN system is briefly surveyed here with discussions about the essential questions such as (i) perfect and imperfect security characteristics of the key distribution, and (ii) how these two types of securities can be unconditional (or information theoretical).

Go to article

Authors and Affiliations

Robert Mingesz
Laszlo Bela Kish
Zoltan Gingl
Claes-Göran Granqvist
He Wen
Ferdinand Peper
Travis Eubanks
Gabor Schmera
Download PDF Download RIS Download Bibtex

Abstract

The population of spider feeding on insect pests of cotton was observed throughout the growth period of the crop, being maximum in the month of July. Chrysoperla was observed from second fortnight of June to harvesting of the crop being maximum in November. The incidence of coccinellids was recorded from the middle of August to middle of September and remained till harvesting of the crop being maximum in the first fortnight of November. A positive significant effect of maximum and minimum temperature on spider and negative significant effect on population of chrysoperla and coccinellids was recorded. Evening RH exerted positive significant effect on spider and negative significant effect on coccinellids.

Go to article

Authors and Affiliations

Shish Ram Dhaka
Bhanwar Lal Pareek
Download PDF Download RIS Download Bibtex

Abstract

Keypoint detection is a basic step in many computer vision algorithms aimed at recognition of objects, automatic navigation and analysis of biomedical images. Successful implementation of higher level image analysis tasks, however, is conditioned by reliable detection of characteristic image local regions termed keypoints. A large number of keypoint detection algorithms has been proposed and verified. In this paper we discuss the most important keypoint detection algorithms. The main part of this work is devoted to description of a keypoint detection algorithm we propose that incorporates depth information computed from stereovision cameras or other depth sensing devices. It is shown that filtering out keypoints that are context dependent, e.g. located at boundaries of objects can improve the matching performance of the keypoints which is the basis for object recognition tasks. This improvement is shown quantitatively by comparing the proposed algorithm to the widely accepted SIFT keypoint detector algorithm. Our study is motivated by a development of a system aimed at aiding the visually impaired in space perception and object identification.
Go to article

Authors and Affiliations

Paweł Strumiłło
Karol Matusiak
Piotr Skulimowski
Download PDF Download RIS Download Bibtex

Abstract

This paper presents a piecewise line generalization algorithm (PG) based on shape characteristic analysis. An adaptive threshold algorithm is used to detect all corners, from which key points are selected. The line is divided into some segments by the key points and generalized piecewise with the Li-Openshaw algorithm. To analyze the performance, line features with different complexity are used. The experimental results compared with the DP algorithm and the Li-Openshaw algorithm show that the PG has better performance in keeping the shape characteristic with higher position accuracy.

Go to article

Authors and Affiliations

Hongshan Nie
Zhijian Huang
Download PDF Download RIS Download Bibtex

Abstract

Many researchers have contributed to creating Quantum Key Distribution (QKD) since the first protocol BB84 was proposed in 1984. One of the crucial problems in QKD is to guarantee its security with finite-key lengths by Privacy Amplification (PA). However, finite-key analyses show a trade-off between the security of BB84 and the secure key rates. This study analyses two examples to show concrete trade-offs. Furthermore, even though the QKD keys have been perceived to be arbitrarily secure, this study shows a fundamental limitation in the security of the keys by connecting Leftover Hash Lemma and Guessing Secrecy on the QKD keys.

Go to article

Authors and Affiliations

Takehisa Iwakoshi
Download PDF Download RIS Download Bibtex

Abstract

Recently, Gunn, Allison and Abbott (GAA) [http://arxiv.org/pdf/1402.2709v2.pdf] proposed a new scheme to utilize electromagnetic waves for eavesdropping on the Kirchhoff-law-Johnson-noise (KLJN) secure key distribution. We proved in a former paper [Fluct. Noise Lett. 13 (2014) 1450016] that GAA’s mathematical model is unphysical. Here we analyze GAA’s cracking scheme and show that, in the case of a loss-free cable, it provides less eavesdropping information than in the earlier (Bergou)-Scheuer-Yariv mean-square-based attack [Kish LB, Scheuer J, Phys. Lett. A 374:2140-2142 (2010)], while it offers no information in the case of a lossy cable. We also investigate GAA’s claim to be experimentally capable of distinguishing—using statistics over a few correlation times only—the distributions of two Gaussian noises with a relative variance difference of less than 10-8. Normally such distinctions would require hundreds of millions of correlations times to be observable. We identify several potential experimental artifacts as results of poor KLJN design, which can lead to GAA’s assertions: deterministic currents due to spurious harmonic components caused by ground loops, DC offset, aliasing, non-Gaussian features including non-linearities and other non-idealities in generators, and the timederivative nature of GAA’s scheme which tends to enhance all of these artifacts.

Go to article

Authors and Affiliations

Hsien-Pu Chen
Laszlo B. Kish
Claes G. Granqvist
Download PDF Download RIS Download Bibtex

Abstract

We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR-KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random Resistor Random Temperature (RRRT-) KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT-KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT-KLJN scheme can prevail at a non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation-Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT-KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.

Go to article

Authors and Affiliations

Laszlo B. Kish
Claes G. Granqvist
Download PDF Download RIS Download Bibtex

Abstract

Consumer experiences as a driver of contemporary brand and marketing management are taken up nowadays by many researchers and academics. It’s merely compelled by bored with generic products and services consumers who much more than ever look for intensive, personalized experiences. However, there is a significant gap in knowledge how to transfer these global changes to the needs of effective tourist product management. The article presents a brand-new approach called ‘the experience key’ for discovering, grouping and converting common, dedicated to a certain destination customers experiences into clear and desirable tourist offer with meaningful competitive impact. One of most important advantages of the methodology is its simplicity and ease-of-use for any professionals involved in destination product management by using well-know research methods and apparent applicability into the process of building and selling tourist offer of a place. The Experience Key can be regarded as a missing link between theoretical considerations led by academics and expectations of tourism industry representatives in the context of applying customer experience to place brand and product management.

Go to article

Authors and Affiliations

Piotr Lutek
Download PDF Download RIS Download Bibtex

Abstract

The article presents research on the relationship between mining and used resources on the example of Gliśno gravel pit. As regards to resources, the following issues were analyzed: employees’ working time, time of running machines, fuel consumption and electricity consumption. The aim of the publication is to examine the dependencies that exist between the analyzed variables. KPI’s (Key Performance Indicators) were calculated for individual resources. The analysis presented in the publication contains data from 2008-2014.

Go to article

Authors and Affiliations

Marcin Olkiewicz
Radosław Wolniak
Bartosz Ostapko
Download PDF Download RIS Download Bibtex

Abstract

The observation of trends in the demand for minerals is of fundamental importance in the long- -term assessment of prospects for economic development in Poland.
From among 148 minerals analyzed, 42 minerals are indicated as key minerals for the country’s economy, of which 22 were recognized as deficit minerals. These minerals have been the subject of this paper.
For each of these minerals the forecasts of demand by the years 2030, 2040 and 2050 have been made taking the current trends in domestic economy and premises for the development of industries that are main users of these minerals into account. The most promising prospects for growth of domestic demand – with at least a two-fold increase by 2050 – have been determined for manganese dioxide, metallic: magnesium, nickel, silicon, as well as talc and steatite, while an increase by at least 50% have been anticipated for metallic aluminum, tin, metallic manganese, and elemental phosphorus. For natural gas and crude oil growing tendencies have also been predicted, but only by 2030. On the other hand, the most probable decline in domestic demand by 2050 may be foreseen for iron ores and concentrates, bauxite, metallic tungsten, magnesite and magnesia, as well as for crude oil and natural gas, especially after 2040.
It seems inevitable that the deficit in the foreign trade of minerals will continue to deepen in the coming years. By 2030 this will mainly result from the growing importation of crude oil and natural gas, but beyond – by 2050 – further deepening in the trade deficit will be related to the growing importation of many metals as well as of some industrial minerals. After 2040, the negative trade balance can be mitigated by a possible decrease in foreign deliveries of hydrocarbons and iron ores and concentrates.
Go to article

Bibliography


Galos et al. 2020 – Galos, K., Burkowicz, A., Czerw, H., Figarska-Warchoł, B., Gałaś, A., Guzik, K., Kamyk, J., Kot- -Niewiadomska, A., Lewicka, E. and Szlugaj, J. 2020. Assessment of current and future demand of the domestic economy for mineral raw materials in the perspective of 2025, 2030. 2040 and 2050 (Ocena obecnego oraz przyszłego zapotrzebowania gospodarki krajowej na surowce w perspektywie 2025, 2030, 2040 i 2050 roku). Commissioned by the PIG-PIB (unpublished typescript in Polish).

Galos, K. and Lewicka, E. 2016. Assessment of importance of non-energy mineral raw materials for the domestic economy in the years 2005–2014 (Ocena znaczenia surowców mineralnych nieenergetycznych dla gospodarki krajowej w latach 2005–2014). Zeszyty Naukowe IGSMiE PAN 92, pp. 7–36 (in Polish).

Galos et al. 2021 – Galos, K., Lewicka, E., Burkowicz, A., Guzik, K., Kot-Niewiadomska, A., Kamyk, J. and Szlugaj, J. 2021. Approach to identification and classification of the key, strategic and critical minerals important for the mineral security of Poland. Resources Policy 70, pp. 101900–101913.

Galos, K. and Smakowski, T. 2014. Preliminary proposal of methodology of identification of key minerals for the Polish economy (Wstępna propozycja metodyki identyfikacji surowców kluczowych dla polskiej gospodarki). Zeszyty Naukowe IGSMiE PAN 88, pp. 59–79 (in Polish).

Galos, K. and Szamałek, K. 2011. Assessment of the non-energy minerals security of Poland (Ocena bezpieczeństwa surowcowego Polski w zakresie surowców nieenergetycznych). Zeszyty Naukowe IGSMiE PAN 81, pp. 37–58 (in Polish).

Kulczycka et al. 2016 – Kulczycka, J., Pietrzyk-Sokulska, E., Koneczna, R., Galos, K. and Lewicka, E. 2016. Key minerals for the Polish economy (Surowce kluczowe dla polskiej gospodarki) Kraków: MERRI PAS, 164 pp. (in Polish).

Lewicka, E. and Burkowicz, A. 2018. Assessing current state of coverage the mineral raw materials demand of the domestic economy (Ocena obecnego stanu pokrycia potrzeb surowcowych gospodarki krajowej). Przegląd Geologiczny 66(3), pp. 144–152 (in Polish).

Lewicka et al. 2021 – Lewicka, E., Guzik, K. and Galos, K. 2021. On the possibilities of critical raw materials production from the EU’s primary sources. Resources 10(5), pp. 50–71.

Ministry of Climate and Environment 2021. Mineral Policy of Poland. Project from 6 April 2021 (Polityka surowcowa państwa. Projekt z 6 kwietnia 2021 r.), Warszawa (in Polish).

Nieć et al. 2014 – Nieć, M., Galos, K. and Szamałek, K. 2014. Main challenges of mineral resources policy of Poland. Resources Policy 42, pp. 93–103.

Radwanek-Bąk, B. 2016. Designation of key raw materials for the Polish economy (Określenie surowców kluczowych dla polskiej gospodarki). Zeszyty Naukowe IGSMiE PAN 96, pp. 241–254 (in Polish).

Radwanek-Bąk et al. 2018 – Radwanek-Bąk, B., Galos, K. and Nieć, M. 2018. Key, strategic and critical minerals for the Polish economy (Surowce kluczowe, strategiczne i krytyczne dla polskiej gospodarki). Przegląd Geologiczny 66(3), pp. 153–159 (in Polish).

Smakowski et al. 2015 – Smakowski, T., Galos, K. and Lewicka, E. eds. 2015. Balance of the mineral economy of Poland and the world 2013 (Bilans gospodarki surowcami mineralnymi Polski i świata 2013). Warszawa: PIG-PIB, 1169 pp. (in Polish).

Statistics Poland (GUS). Statistics of the production and foreign trade (as well as selected data on consumption) of mineral raw materials in Poland in the years 2000–2018.

Szuflicki et al. 2021 – Szuflicki, M., Malon, A. and Tymiński, M. eds. 2021. Balance of mineral raw materials deposits in Poland as of 31 XII 2020 (Bilans zasobów złóż kopalin w Polsce wg stanu na 31 XII 2020 r.). Warszawa: PIG-PIB, 508 pp. (in Polish).
Go to article

Authors and Affiliations

Krzysztof Galos
1
ORCID: ORCID
Ewa Danuta Lewicka
1
ORCID: ORCID
Jarosław Kamyk
1
ORCID: ORCID
Jarosław Szlugaj
1
ORCID: ORCID
Hubert Czerw
1
ORCID: ORCID
Anna Burkowicz
1
ORCID: ORCID
Alicja Kot-Niewiadomska
1
ORCID: ORCID
Katarzyna Guzik
1
ORCID: ORCID

  1. Mineral and Energy Economy Research Institute, Polish Academy of Sciences, Kraków, Poland
Download PDF Download RIS Download Bibtex

Abstract

This research investigates the intricacies of X.509 certificates within a comprehensive corporate infrastructure. Spanning over two decades, the examined enterprise has heavily depended on its internal certificate authority and Public Key Infrastructure (PKI) to uphold its data and systems security. With the broad application of these certificates, from personal identification on smart cards to device and workstation authentication via Trusted Platform Modules (TPM), our study seeks to address a pertinent question on how prevalent are weak RSA keys within such a vast internal certificate repository. Previous research focused primarily on key sets publicly accessible from TLS and SSH servers or PGP key repositories. On the contrary, our investigation provides insights into the private domain of an enterprise, introducing new dimensions to this problem. Among our considerations are the trustworthiness of hardware and software solutions in generating keys and the consequential implications of identified vulnerabilities on organizational risk management. The obtained results can contribute to enhancing security strategies in enterprises.
Go to article

Authors and Affiliations

Konrad Kamiński
1 2
ORCID: ORCID
Wojciech Mazurczyk
1
ORCID: ORCID

  1. Faculty of Electrical Engineering and Communication, Warsaw University of Technology, Warsaw, Poland
  2. SecurityTechnology Development and Transformation Division, Orange Polska S.A.,Warsaw, Poland
Download PDF Download RIS Download Bibtex

Abstract

This article reflects on key concepts of historical thinking proposed by doctoral students and young researchers. Established concepts such as the social role of history, professional historian and (imagined) space are still important to the new generation of historians. At the same time, some new concepts are emerging, such as political exhumations, mass graves, motion, embodied historical research, ahistorical memory politics, websites as historical sources, critical heritage studies and heritagisation, treason, preposterous history – an idea taken from Mieke Bal, and “Supreme Peace” – a notion drawn from the Chinese philosophy of history. To interpret these concepts, I build word clouds as a way of creating knowledge involving non‑human factors (algorithms) while enabling speculative interpretations of the relations between words. The idea of a secure past comes to the fore and I therefore examine whether historical security and being secure in history could be considered important elements of interdisciplinary security studies.
Go to article

Bibliography

Adamczyk, Marcin. „Teoretyczne wprowadzenie do badań nad bezpieczeństwem”. W Polska – Europa – świat wczoraj i dziś, red. Magdalena Debita, Marcin Adamczyk, 54–74. Poznań: Media‑Expo Wawrzyniec Wierzejewski, 2017.
Austin, John Langshaw. Mówienie i poznawanie: rozprawy i wykłady filozoficzne. Warszawa: Wydawnictwo Naukowe PWN, 1993.
Bal, Mieke. Quoting Caravaggio: Contemporary Art, Preposterous History. Chicago: University of Chicago Press, 1999.
Bal, Mieke. Wędrujące pojęcia w naukach humanistycznych: krótki przewodnik. Warszawa: Narodowe Centrum Kultury, 2012.
Pihlainen, Kalle, „The Distinction of History: On Valuing the Insularity of the Historical Past”. Rethinking History 20, nr 3 (2016): 414–432.
Pokruszyński, Witold. Filozoficzne aspekty bezpieczeństwa. Józefów: Wydawnictwo WSGE im. Alcide De Gasperi w Józefowie, 2011.
White, Hayden. Przeszłość praktyczna. Kraków: Universitas, 2014.
Go to article

Authors and Affiliations

Ewa Domańska
1
ORCID: ORCID

  1. Uniwersytet im. Adama Mickiewicza w Poznaniu
Download PDF Download RIS Download Bibtex

Abstract

We analyze the Google-Apple exposure notification mechanism designed by the Apple-Google consortium and deployed on a large number of Corona-warn apps. At the time of designing it, the most important issue was time-to-market and strict compliance with the privacy protection rules of GDPR. This resulted in a plain but elegant scheme with a high level of privacy protection. In this paper we go into details and propose some extensions of the original design addressing practical issues. Firstly, we point to the danger of a malicious cryptographic random number generator (CRNG) and resulting possibility of unrestricted user tracing. We propose an update that enables verification of unlinkability of pseudonymous identifiers directly by the user. Secondly, we show how to solve the problem of verifying the “same household” situation justifying exempts from distancing rules. We present a solution with MIN-sketches based on rolling proximity identifiers from the Apple-Google scheme. Thirdly, we examine the strategies for revealing temporary exposure keys. We have detected some unexpected phenomena regarding the number of keys for unbalanced binary trees of a small size. These observations may be used in case that the size of the lists of diagnosis keys has to be optimized.
Go to article

Bibliography

  1. Ministry of Health and Government Technology Agency (GovTech), Trace Together Programme, [Online]. Available: https://www. tracetogether.gov.sg.
  2. The European Parliament and the Council of the European Union: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/ec (General Data Protection Regulation). Official Journal of the European Union, L119.1, 4.5.2016.
  3. Corona-Warn-App Consortium, [Online]. Available: https://www.coronawarn.app/en/.
  4. C. Troncoso et. al, “Decentralized Privacy-Preserving Proximity Tracing,” [Online]. Available: https://github.com/DP-3T/documents/ blob/master/DP3T%20White%20Paper.pdf.
  5. Apple & Google, “Exposure Notification Cryptography Specification,” [Online]. Available: https://covid19-static.cdn-apple.com/ applications/covid19/current/static/contact-tracing/pdf/ExposureNotification-CryptographySpecificationv1.2.pdf?1.
  6. D. Shumow and N. Ferguson, “On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng,” [Online]. Available: http:// rump2007.cr.yp.to/15-shumow.pdf.
  7. V. Goyal, A. O’Neill, and V. Rao, “Correlated-input secure hash functions,” Theory of Cryptography Conference (TCC), 2011, pp. 182‒200.
  8. A.Z. Broder, “On the resemblance and containment of documents,” Proceedings. Compression and Complexity of SEQUENCES 1997, Italy, 1997, pp. 21‒29.
Go to article

Authors and Affiliations

Adam Bobowski
1
Jacek Cichoń
1
ORCID: ORCID
Mirosław Kutyłowski
1
ORCID: ORCID

  1. Wrocław University of Science and Technology, Wybrzeże Stanisława Wyspiańskiego 27, 50-370 Wrocław, Poland
Download PDF Download RIS Download Bibtex

Abstract

In wireless mobile networks, a client can move between different locations while staying connected to the network and access the remote server over the mobile networks by using their mobile de- vices at anytime and anywhere. However, the wireless network is more prone to some security attacks, as it does not have the ingrained physical security like wired networks. Thus, the client authentication is required while accessing the remote server through wireless network. Based on elliptic curve cryptosystem (ECC) and identity-based cryptography (IBC), Debiao et al. proposed an ID-based client authentication with key agreement scheme to reduce the computation and communication loads on the mobile devices. The scheme is suitable for mobile client-server environments, is secure against different attacks and provides mutual authentication with session key agreement between a client and the remote server as they claimed. Unfotunately, this paper demonstrates that Debiao et al.’s scheme is vulnerable some cryptographic attacks, and proposed an improved ID-based client authentication with key agreement scheme using ECC. The proposed scheme is secure based on Elliptic Curve Discrete Logarithm Problem (ECDLP) and Computational Diffie-Helmann Problem (CDHP). The detail analysis shows that our scheme overcomes the drawbacks of Debiao et al.’s scheme and achieves more functionality for the client authentication with lesser computational cost than other schemes.
Go to article

Authors and Affiliations

Islam S.K. Hafizul
G.P. Biswas
Download PDF Download RIS Download Bibtex

Abstract

In the paper, various approaches to automatic music audio summarization are discussed. The project described in detail, is the realization of a method for extracting a music thumbnail - a fragment of continuous music of a given duration time that is most similar to the entire music piece. The results of subjective assessment of the thumbnail choice are presented, where four parameters have been taken into account: clarity (representation of the essence of the piece of music), conciseness (the motifs are not repeated in the summary), coherence of music structure, and overall quality of summary usefulness.

Go to article

Authors and Affiliations

Jakub Głaczyński
Ewa Łukasik
Download PDF Download RIS Download Bibtex

Abstract

The article is devoted to generation techniques of the new public key crypto-systems, which are based on application of indistinguishability obfuscation methods to selected private key crypto-systems. The techniques are applied to symmetric key crypto-system and the target system is asymmetric one. As an input for our approach an implementation of symmetric block cipher with a given private-key is considered. Different obfuscation methods are subjected to processing. The targetsystem would be treated as a public-key for newly created public crypto-system. The approach seems to be interesting from theoretical point of view. Moreover, it can be useful for information protection in a cloud-computing model.
Go to article

Authors and Affiliations

Aleksandra Horubała
Daniel Waszkiewicz
Michał Andrzejczak
Piotr Sapiecha
Download PDF Download RIS Download Bibtex

Abstract

The Kirchhoff-law-Johnson-noise (KLJN) secure key exchange scheme offers unconditional security, however it can approach the perfect security limit only in the case when the practical system’s parameters approach the ideal behavior of its core circuitry. In the case of non-ideal features, non-zero information leak is present. The study of such leaks is important for a proper design of practical KLJN systems and their privacy amplifications in order to eliminate these problems.

Go to article

Authors and Affiliations

Mutaz Y. Melhem
Laszlo B. Kish
Download PDF Download RIS Download Bibtex

Abstract

The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical secure key exchange system based on the laws of classical statistical physics to provide unconditional security. We used the LTSPICE industrial cable and circuit simulator to emulate one of the major active (invasive) attacks, the current injection attack, against the ideal and a practical KLJN system, respectively. We show that two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple privacy amplification scheme, independently and effectively eliminate the information leak and successfully preserve the system’s unconditional security.

Go to article

Authors and Affiliations

Hsien-Pu Chen
Muneer Mohammad
Laszlo B. Kish
Download PDF Download RIS Download Bibtex

Abstract

Maintenance of process plants requires application of good maintenance practice due to

a great level of complexity. From a plant maintenance point of view, the most significant activity

is turnaround, an activity carried out through project task with long planning process

period and very short execution period, which makes it one of the most complex projects

of maintenance in general. It is exactly this kind of maintenance that is based on multidisciplinarity

which has to be implemented through the system of quality management on all

levels of maintenance management. This paper defines the most significant factors determining

the process of turnaround projects quality management and its efficiency. Such relation

is observed through moderating influence of complexity on process management efficiency

in the turnaround project. The empirical research was conducted based on the survey of

turnaround project participants in five refineries in Croatia, Italy, Slovakia and Hungary.

For exploring the influence of research variables testing of the target relation is carried out

by applying logistical regression. Research results confirm the significance of complexity as

variable that significantly contributes to the project performance through the moderating

influence on success of the project, as well as the influence of an efficient management on

a plant turnaround project key results. Beside theoretical indications, practical implications

that arise from this research study mainly refers to management process of the industrial

plant maintenance project.

Go to article

Authors and Affiliations

Marko Fabic
Dusko Pavletic
Graciela Sterpin Valic
Maja Markovic
Download PDF Download RIS Download Bibtex

Abstract

The article provides the external indications (both international and domestic) showing how important creating an appropriate mineral policy of the country is, especially in the context of mineral security. The current mandatory legal regulations referring to mineral policy and mineral security of the country were presented and discussed against this background, starting with provisions of the Constitution of the Republic of Poland, through the Strategy for Sustainable Development, Spatial Management Concept of the Country 2030 together with Action Plan, Strategy for Energy Security and Environment – 2020 perspective, Geological and Mining Law and other legal acts and implementing provisions, Action Plan “Raw Materials for the Industry” announced by the Minister of Development, the Concept for Mineral Policy presented by the Government Plenipotentiary for the Mineral Policy, and finally – project of the Urban and Building Code in the area of spatial development. In the case of documents being in the course of the proceedings, the current state of working on them is presented, also in the context of particular projected legal solutions for future regulations. The author indicates and justifies the need of accelerating the work and taking actions to prevent the currently appearing phenomena that may impede the execution of the raw materials policy and the protection of key raw materials in the future.

Go to article

Authors and Affiliations

Jan A. Stefanowicz

This page uses 'cookies'. Learn more