Extensive use of computer networks is associated with the development of various effective methods that are suitable for hiding information in the contents transferred over the network. These methods are described as network steganography. Since web applications use HTTP protocol to transmit the requests to the server and send the answers to the final recipient, specifically HTTP protocol is ideal for hiding information. For example, there are several methods that can be used to transmit the additional content in the HTTP header. In this paper, we present authors’ evaluation method for network steganography using HTTP specific properties and evaluate the effectiveness of some techniques, providing experimental results.
The techniques of photogrammetric reconstruction were compared to the laser scanning in the article. The different conditions and constraints were introduced for reconstructed images, e.g. different materials, lighting condition, camera resolution, number of images in the sequence or using a-pripori calibration. The authors compare the results of surface reconstruction using software tools avaliable for photogrammetric reconstruction. The analysis is preformed for the selected objects with regard to laserscanned models or mathematical models.
In this work we provide a method for approximating the separable numerical range of a matrix. We also recall the connection between restricted numerical range and entanglement of a quantum state. We show the possibility to establish state separability using computed restricted numerical range. In particular we present a method to obtain separability criteria for arbitrary system partition with use of the separable numerical range.
The article presents experiments in realistic modelling of facial expressions using volume morphing. The experiments use a variable number of points and face features. As the results are shown meshes deviations (between goal mesh and morphed shape). Experiments have shown that it is impossible to carry out a fully realistic morphing based on existing software. At the same time, even imperfect morphing allows you to show the expected emotional facial expression.
The chapter deals with the issue of the risk and security management process in public administration, according to the internal audit standards and their requirements. Main legal acts and standards were specified and shortly described. Specially the risk analysis process and security measures selection were emphasized. The possibility to use the software tools for the risk analysis and security measures selection support in public administration was presented. The experiment of OSCAD usage in public administration was shortly described and its results were presented. This experiment shows that the software primarily intended for IT Security Management can be used for risk management in different area as well, for example – in public administration. Some possibilities of further development of risk management supporting tools were proposed.
This paper presents integration of ultrasonic and inertial approaches in indoor navigation system. Ultrasonic navigation systems allow to obtain good results whilst there are at least three beacon transmitters in the range of mobile receiver, but in many situations placement of large number of transmitters is not economically justified. In such situations navigation must be aided by other technique. This paper describes research on supporting ultrasonic system by inertial system based on Magnetic, Angular Rate and Gravity sensor. This can measure current orientation of the receiver and allows to estimate the length of the path by pedometer functionality.
The article contains a survey of methods of the mobile development with the FMX Application platform, which allows to build multi-platform solutions for the efficient Human-Computer Interaction. The test projects illustrate some important conclusions regarding the design and testing of mobile applications for iOS and Android operating systems. They demonstrate navigation controls designed in the skeumorphic and flat manner with some comparisons based on interviews with users in several age ranges. Test apps provide also touch gestures, sensor integration and connections to remote internet data sources. Some additional considerations about the localization and internationalization of the mobile applications built with the FMX platform were also presented. The proposed implementation of the software engineering methods for the mobile application development provides new insights, valuable for software developers dealing with the new FMX platform on iOS and Android.
The paper presents the result of an evaluation of the performance of different message broker system configurations, which lead to the construction of the specific architecture guidelines for such systems. The examples are provided for an exemplary middleware messaging server software - RabbitMQ, set in high availability - enabling and redundant configurations. Rabbit MQ is a message queuing system realizing the middleware for distributed systems that implements the Advanced Message Queuing Protocol. The scalability and high availability design issues are discussed and the possible cluster topologies and their impact is presented. Since HA and performance scalability requirements are in conflict, scenarios for using clustered RabbitMQ nodes and mirrored queues are interesting and have to be considered with specific workloads and requirements in mind. The results of performance measurements for some topologies are also reported in this article.
Evaluating the image quality is a very important problem in image and video processing. Numerous methods have been proposed over the past years to automatically evaluate the quality of images in agreement with human quality judgments. The purpose of this work is to present subjective and objective quality assessment methods and their classification. Eleven widely used and recommended by International Telecommunication Union (ITU) subjective methods are compared and described. Thirteen objective method is briefly presented (including MSE, MD, PCC, EPSNR, SSIM, MS-SSIM, FSIM, MAD, VSNR, VQM, NQM, DM, and 3D-GSM). Furthermore the list of widely used subjective quality data set is provided.
This paper presents novel approach to the Huffman’s asynchronous sequential circuit two valued Boolean switching system design. The algorithm is implemented as software using distributed, service oriented application model with means of the web service component design. It considers method implementation challenges, both towards Moore and Mealy structures with particular respect to the estimation of the Huffman’s minimization algorithm computational complexity. The paper provides implementation details, theoretical model estimation and experimental results that acknowledge the theoretical approach in practice. This paper also examine the multistep design process implementation and its problems inherent in web service based environment both for development and educational purposes.
The paper features a comprehensive approach to risk management worked out during the ValueSec project (EU 7th Framework Programme). The motivation for research was presented, along with the course of the research, achieved project results and validation results. The methodology of risk management and a supporting tool were developed as a result of the project. They help decision makers to make complex strategic decisions about security measures. These complex decision-related problems were the reason to launch the research. The elaborated methodology is based on three pillars: assessment of the considered security measure ability to reduce risk, costs and benefits analysis with respect to the security measure application, and analysis of legal, social, cultural, and other restrictions that might impair or even destroy the efficiency of the functioning measures. In the project these restrictions are called qualitative criteria. The main added value of the ValueSec project is the elaboration of a special software module to analyse impacts of qualitative criteria on the considered measure. Based on the methodology, a ValueSec Toolset prototype was developed. The prototype was then validated in the following application domains: mass event, railway transport security, airport and air transport security, protection against flood, and protection of smart grids against cyber-attacks.