Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 7

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
The legal basis for the modernization of the land and building registry is the Act of 17 May 1989 Geodetic and Cartographic Law, which determines how the procedure of update and modification of data, to the form which is in accordance with applicable regulations, is carried out. Maintaining of the proper degree of timeliness and reliability of the registry data is important because of the prospect of integration with the Databases of Topographic Objects (BDOT) and Geodetic Registry of Infrastructural Network (GESUT), in the project of construction of the Real Estate Integrated Information System (ZSIN). Furthermore, the land and building registry (EGiB) plays a significant role in the implementation of most of the processes of real estate management. The aim of the publication is to verify the compliance of the registry data regarding the area and the course of the borders of plots before and after modernization, with the real state in the field. The complex survey of plots before and after modernization was performed to assess the effects of modernization, taking into account the reliability of geodetic works and the timeliness of the registry data. The present study involved updating the course of borders and areas of the plots used solely for agricultural purposes. The object of research represented the complex of 31 plots used for agricultural purposes, located far from the village buildings. The study area is located in Małopolskie voivodship, in the district of Myślenice. In order to verify the course of borders of plots the rapid satellite measurement using the method RTK / RTN with the receiver CHC X900+ was applied. The selected measurement technique is economic and accurate, therefore often used by surveyors for this type of field tasks. The study showed the need for re-modernization of land and buildings registry in the selected area.
EN
The aim of the article was to compare the effectiveness of the selected routing protocols for wireless sensor networks taking In to account a number of specific parameters as network troughput, packet error rate and message buffer capacity for different network topologies. The simulation research was conducted in open source OMNeT++ environment. In order to achieve the assumed requirements, four different-sized network topologies were established and AODV and DYMO routing protocols were adapted.
EN
The main aim of the paper was to elaborate a conception of spatial development around dormitories of the Jagiellonian University Collegium Medicum located in Prokocim – one of Krakow quarters. The area that is being elaborated comprises public space of academic commune which lives there. Lack of possibility to spend free time in the closest neigbourhood together with special landscape values and a very bad state of buildings and also outdated infrastructure became inspiration to create this conception. The task was characterized by works’ multi-stages and its main goal was to create favourable conditions of functioning and friendly space for its inhabitants. Special attention should have been paid to demands concerning architecture, environment and landscape values with simultaneous preserving of  economic balance while planning the conception. Planned assumption of modernization and development of objects and not only sporting and recreational ones can become a response for inhabitants’ expectations and needs in the range of free time realization and spending.
4
Content available remote "Neural encryption" in industrial and telecommunication networks
EN
This paper presents the alternative for popular cryptographic communication protocols, could give the secure data transmission between http and ftp servers in the implementation of the ATmega32 microcontroller. Now we are working with the complete theoretical construction of communication protocol and GOST cipher realized by a neural network. Besides stage of work mentioned above, our main aim is providing possible high stage of secure data transmission and functionality without use asymmetric cryptography. The result will be large computational power, which is not available with these assumptions.
5
Content available remote Network topology models for telecommunication and automation networks
EN
Development process of routing protocols require the proper model of real network. The paper discussed network structures reflecting real topologies of transport networks - telecommunication and automation networks. It approaches basic methods of generating the topologies - Waxman method and the Barabasi-Albert method. A performance study is also conducted with the heuristic network generator - Inet. Tests were carried out for a wide range of parameters defining properties and characteristics of test networks topologies.
6
Content available remote The security of the RSA cryptosystem and electronic signature
EN
Electronic document has a significant use in practice. It should fulfil requirements similar to those of paper document. An essential element of electronic document security is the electronic signature. This article presents the discussion on the security of cryptographic protocol - electronic signature - taking into account the possibilities of an accompanying attack on an asymmetric cryptosystem with an application of factorization and Euler's function. The discussion about potential vulnerabilities in verification of the electronic signature from the point of view of weak and strong RSA keys will be presented as well. This article is taking into account the problem of key length and the quality of the components for the public key. The considerations will be presented from the point of view of an attack on the electronic signature using standalone computer and a group of computers in network. The computation of Euler's function in an algorithm using parallel mode will be presented. In this article we show a relation between investment in security infrastructure and the value of protected information.
7
Content available remote The attack on the RSA algorithm with the application of Euler's function
EN
The security of present-day asymmetric encryption algorithms is based on certain limitations of modern mathematics. A wide range of applications of asymmetric cryptography in commonly and widely used network protocols poses a question as to what degree such solutions, in a situation where the security of the used algorithm is not given once and for all, are really safe? In the vast majority of instances, a discussion on security involves considerations on the problem of factorization. The attack, derived almost from the definition, is an attack that involves trying many different options to intercept the private key, indispensable for decryption of the encrypted message, on the basis of the intercepted public key. The present work discusses possibilities and the feasibility of an attack on the RSA algorithm using two given methods, factorization and the method that implements Euler's function. The paper presents an analysis of potential costs (time and computational) for both presented methods. The article also includes a discussion on strong and weak keys for the RSA encryption. The quality of the keys is discussed taking into account the aforementioned two algorithms carrying out an attack against the encryption algorithm.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.