Mikolaj Karpinski
University of Bielsko-Biała
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mikolaj Karpinski.
international conference on control automation and systems | 2016
Mikolaj Karpinski; Stepan Ivasiev; Ihor Yakymenko; Mykhajlo Kasianchuk; Tomasz Gancarczyk
Factorization is one of the most important problems in the theory of numbers and a modern asymmetric cryptography. Known methods of factorization are quite cumbersome; therefore, require significant computational resources for processing multi-bit numbers. The relevance of the factorization problem is dictated also by uncertainty regarding the theoretical foundation of stability for the disclosure of asymmetric cryptosystems. The advanced method of factorization of multi-bit numbers on the basis of Fermats theorem with the help of the system of residual classes has been developed in this article. The operation of squaring is excluded from proposed method. Arithmetic operations are performed with numbers, which are smaller than the selected module. Last one allows to shifted zone of bit computing resources on several orders to deeper side and replaces the operation of finding the square root, which is caused of computational complexity of the Fermats algorithm onto generating a binary key of factorization.
intelligent data acquisition and advanced computing systems technology and applications | 2015
Anatolii Balyk; Uliana Iatsykovska; Mikolaj Karpinski; Yuliia Khokhlachova; Aigul Shaikhanova; Lesia Korkishko
Today network security is major problem faced not only by small companies but big giants like Samsung and Google. Traditional architecture of internet is vulnerable to DDoS attacks and it provides an opportunity to an attacker to get access to a great amount of compromised hosts by using their vulnerabilities to create attack networks or Botnets. Although a number of defense techniques and countermeasures against DDoS attacks are developed, the number of such attacks is still increasing. The main reason for that is that scientists and law enforcement agencies are still not able to answer a important question: where is the real source of DDoS attack? In this paper, we tend to survey different types of traceback techniques and methodologies.
computer information systems and industrial management applications | 2018
Vitalii I. Yesin; Maryna Yesina; Serhii G. Rassomakhin; Mikolaj Karpinski
The subject matter of the article is methods and means of the databases (DBs) security ensuring, built on the basis of the database scheme that is invariant to subject domains (SDs). The goal is to develop a substantiated approach that implements the complex use of various mechanisms ensuring the databases security built on the database schema with the universal basis of relations. The task: based on the analysis of existing database protection mechanisms supported by various database management systems (DBMSs), and features of the destination, construction of the database schema with the universal basis of relations, to develop and present in a systematized form the means and methods ensuring the databases security built on this DB schema. The following results were obtained: solving the problem of protecting databases as the most important corporate resource, in the process of creating database schema invariant to subject domains, special means were developed (in the form of implemented schema objects such as triggers, procedures, packages, tables, functions) and rules of their use, ensuring: access control to schema objects; data protection and hiding of objects; data integrity support; recovery of incorrectly modified or lost data; monitoring of the state, changes introduced into the database; logging user actions.
intelligent data acquisition and advanced computing systems technology and applications | 2017
Mikolaj Karpinski; Volodymyr Khoma; Anna Khoma; Lukasz Wieclaw
The paper presents and discusses a novel method for reconstructing of surface topology from only one white light interferogram picture. The main idea of the proposed method is reversal of an interferometry channel transform function and applying computationally simple methods of polynomial approximation for single segments of the white light interferogram. The polynomial coefficients are computed at the calibration stage. A computational complexity and reconstruction errors of this method were evaluated. Research has shown that this method combines the high computational efficiency and accuracy. Also the implementation of this method on the FPGA platform is presented.
intelligent data acquisition and advanced computing systems technology and applications | 2017
Mikolaj Karpinski; Anna Korchenko; Pavlo Vikulov; Roman V. Kochan; Anatolii Balyk; Ruslan Kozak
Intensive development of information systems has led to an increase in malicious software, which is associated with the emergence of new types of cyber attacks. Expanding impact of cyber attacks aimed at a variety of resources information system initiates creation of special countermeasures that can be effective in the emergence of new types of threats from unknown or ill-defined properties. There are enough effective developments, are used to solve problems of cyber attacks identification, for example, the method of linguistic etalons formation for the detection of intrusion systems, which does not disclose the mechanism of the formation of etalons settings for sniffing attacks. In this work, was developed etalons model of linguistic variables to detect sniffing attacks, which is due to assess the state of the information system and the process of forming the parameters of etalons will allow to formalize the process of obtaining the parameters of etalons for a given linguistic variables in specific environment in solving attacks detection tasks on computer systems.
intelligent data acquisition and advanced computing systems technology and applications | 2017
Bogdan Orobchuk; Ivan Sysak; Serhii Babiuk; Teresa Rajba; Mikolaj Karpinski; Aleksandra Klos-Witkowska; Rafal Szkarczyk; Joanna Gancarczyk
Article deals with the automated dispatch control system (ADCS) is designed to improve the reliability and efficiency of operational dispatch and process control facilities that are part of the power system. ADCS is a set of hardware and information of the software used in the dispatching management of energy facilities based on computer. The proposed model of simulator ADCS and automated system commercial electric power accounting (ASCEA) allows to study the principles of functional tasks, structure, hardware and software of the ADCS of power networks and power consumption. The automated system was developed at the Department of power consumption systems and computer technology in the power industry. The system includes a model simulator substation, standard functional devices (telemechanics, a system of automated energy accounting) and a computer with appropriate software.
intelligent data acquisition and advanced computing systems technology and applications | 2017
Mikolaj Karpinski; Tomasz Gancarczyk; Aleksandra Klos-Witkowska; Igor V. Limar; Yevhen Vasiliu
A cryptographic security scheme is proposed for a subsystem of the integrated computer-aided system that is intended for holding elections and counting the election returns. The main idea is to use two modern quantum cryptographic technologies: quantum bit commitment and quantum secret sharing. The scheme of information security of vote count procedure, and also the quantum bit commitment protocol and the quantum secret sharing protocol, are described. Using the protocols of quantum cryptography increases security of the computer-aided voting system on comparison with protocols of usual classical cryptography.
Archive | 2017
Aigul Shaikhanova; A. Zolotov; Lesia Dubchak; Mikolaj Karpinski; V. Karpinskyi
This paper presents access distribution at computer system transmission of client-server data type. In order to enhance information protection fuzzy logic is applied to select the data encryption method. A server block diagram of such computer system has been developed based on the proposed fuzzy distribution of system access.
Mathematical Models and Methods in Applied Sciences | 2015
Gulmira Shangytbayeva; Mikolaj Karpinski; B S Akhmetov; M M Yerekesheva; M N Zhekambayeva
international conference on experience of designing and applications of cad systems in microelectronics | 2009
Igor Piotr Kurytnik; Bohdan Borowik; Mikolaj Karpinski