Online archive

All paper copies of the magazine are available at the The National Library of Poland and at the Main Library of Military University of Technology, Warsaw, Poland.

Computer Science and Mathematical Modelling No. 21/2025

  1. Norbert Waszkowiak - Runtime repository generation in Spring Boot: Advancing REST API automation with ByteBuddy
    Pages: 33 - 42
    Abstract: Spring Boot simplifies REST API development but still requires repetitive code for controllers, services, and repositories. This article presents a proof-of-concept for the @RestEntity annotation, which uses ByteBuddy to dynamically generate repositories at runtime. By utilizing Java reflection and bytecode manipulation, our approach automatically creates repository interfaces that Spring Boot seamlessly integrates into its context, significantly reducing boilerplate code while maintaining framework compatibility.
    Keywords code generation, spring boot, reflection
    Full article: PDF icon 33_42_nwaszkowiak_csmm_21_2025.pdf
  2. Paweł Kabata - Analysis of Vulnerabilities and Consequences of Missing Hardening in WordPress-Based CMS Environments
    Pages: 25 - 32
    Abstract: WordPress is currently the most widely used content management system and constitutes a key component of the modern web application ecosystem. Its evolution from a blogging platform into a universal CMS has significantly expanded its functionality while simultaneously increasing architectural complexity and the attack surface. The open-source nature of the project, the extensive ecosystem of plugins and themes, and a simplified permission model make the security of WordPress installations largely dependent on the quality of external components and the configuration of the hosting environment. This paper provides a review of the most common vulnerabilities observed in WordPress-based environments and discusses hardening techniques including update management, permission restrictions, authentication strengthening, and security monitoring. The analysis indicates that the absence of hardening measures leads to an increased risk of unauthorized access, malware infections, and operational and reputational losses, confirming the necessity of treating WordPress hardening as a continuous process.
    Keywords WordPress security, CMS, hardening
    Full article: PDF icon 25_32_pkabata_artanalysis_csmm_21_2025.pdf
  3. Mateusz Maj - Performance comparison of Julia and Python programming languages on GPU and CPU
    Pages: 11 - 23
    Abstract: The paper presents research on the time performance of each language when performing operations on the CPU (central processing unit) and GPU (graphics processing unit).This article should be considered as a coherent continuation of the first part. The paper has been divided due to existing editorial criteria. The work includes descriptions of the technologies used and the algorithms that served the research purposes. Algorithms prepared with care to maintain equal use of functions by both programming languages based on block diagrams and pseudocode are presented. The paper first presents the research carried out on the basis of sorting algorithms implemented by the Author and executed on the processor. The next part of the paper presents research verifying the performance of Julia and Python programming languages on graphics cards, with a special focus on the implementation of matrix operations. The article is concluded with a discussion of the time performance of each programming language.
    Keywords Python, Julia, comparison, performance
    Full article: PDF icon 11_23_mmaj_performance_comparison_csmm_21_2025.pdf
  4. Kalutara Koralalage Shalidi Nadishani Britto, Anuradha P. Hewaarachchi - Modelling maximum and minimum temperature series in Trincomalee District, Sri Lanka
    Pages: 5 - 9
    Abstract: Sri Lanka is a tropical island in the Indian Ocean, which has a diverse climate shaped by monsoonal variations and seasonal fluctuations that have a significant impact on temperature trends, underscoring the need for accurate forecasting models. This study focuses on Trincomalee District, one of the hottest regions in Sri Lanka, where the highest recorded temperature from 1949 to April 2024 was 39.5°C. The research aims to model and forecast the monthly mean maximum and minimum temperature series using Periodic Autoregressive (PAR) and Seasonal Autoregressive Integrated Moving Average (SARIMA) models. Monthly data from January 2008 to October 2024 was analyzed to assess model performance in capturing seasonal and periodic trends. The SARIMA (1, 0, 0) (2, 1, 1) model best fits the maximum temperature series, with a low RMSE (0.7830) and MAPE (1.7628%). Meanwhile, the minimum temperature series shows significant periodicity, with the PAR(1) model offering better precision (RMSE 0.4391, MAPE 1.4071%). These findings support to improvement of climate forecasting and agricultural planning in Sri Lanka’s dry zone.
    Keywords periodic correlations, seasonal ARIMA, temperature
    Full article: PDF icon 5_9_britto_hewaarachchi_modelling_max_min_temp_csmm_21_2025.pdf

Computer Science and Mathematical Modelling No. 20/2024

  1. Parana Yehan Yapa, Achala Pallegedara - Mathematical modeling of cutting effects on flank and bottom edge of end-milling
    Pages: 39 - 46
    Abstract: This ongoing study replicates a new mechanistic model for cutting forces in flat-end milling activity. The model considered the total cutting force due to the bottom edge and the flank edge together, which is a unique feature. The model development for flank cutting force coefficients utilizes an exponential function of the instantaneous uncut chip thickness to incorporate size effect for flank cutting in a non-linear least squares algorithm. After the flank cutting force coefficients are calibrated, the instantaneous calibrated coefficients for the bottom cutting force are obtained by calculating the difference between the total measured force and flank force component. This means you can assume the bottom cutting force coefficients are constant values. The cutting force model has been verified through experiments based on different cutting conditions.
    Keywords end-milling, linear least-square method, Levenberg-Marquardt method
    Full article: PDF icon 39_46_py_yapa_mathematicalmodeling_csmm_20_2024.pdf
  2. Rafał Wasiluk - Overview of techniques for detecting object’s features and embedding them in multidimensional spaces
    Pages: 29 - 37
    Abstract: It is evident that each object in the real world possesses unique properties. A subset of these characteristics can be readily described in quantitative terms. Examples of such features include the number of wheels in a vehicle, the floor area of a residential property, or the year of construction of a building. However, certain characteristics of objects exhibit a higher level of complexity. Examples of such features include object shape, color, and texture. These characteristics, frequently defined in terms of objects depicted in images, represent the primary characteristics that can be identified in real-world objects. The processing of these visual attributes has been the subject of scientific research for decades, and the literature on this topic is extensive. The objective of this article is to synthesize the existing methods for detecting object’s shape, color, and texture and embedding them in multidimensional spaces. By applying these methods, it is possible to represent the features of the object as points in multidimensional spaces. Such representations can be used to solve multicriteria optimization problems.
    Keywords visual features, feature extraction, feature embedding
    Full article: PDF icon 29_37_r.wasiluk_overview_csmm_20_2025.pdf
  3. Amali S. Theresa, Sahaya A. Sudha - Mathematical optimization for nutritional equity: A decision-making and transportation model for implementing SDG-10
    Pages: 19 - 28
    Abstract: The Sustainable Development Goal 10 (SDG-10) aims to diminish inequalities within and among countries, including discrepancies in healthcare and nutrition. This study focuses on developing a mathematical model to assist in selecting the most nutritious food based on key health criteria – calcium, vitamins, carbohydrates, and proteins. With the application of multi-criteria decision-making (MCDM) techniques, the optimal food choice is determined to enhance health equity. Furthermore, the transportation problem is used to minimize the cost of distributing this nutritional knowledge and resources to a larger population. The integration of these mathematical approaches ensures that nutritious food choices are both effective and accessible, contributing to a reduction in health-related inequalities.
    Keywords Sustainable Development Goal 10 (SDG-10), health inequality, nutrition optimization
    Full article: PDF icon 19_28_suda_theresa_mathematicaloptimization_csmm_20_2024.pdf
  4. Mateusz Maj - Performance comparison of Julia and Python programming languages based on available literature
    Pages: 5 - 17
    Abstract: The Julia language is a fast-growing high-level programming language. Its developers suggest that the quality and implementation of innovative compilation technology (Just-In-Time Compilation) beats Python in terms of algorithm execution times. The selection of the right programming language to implement an algorithm is of paramount importance. In today’s world every millisecond saved can determine the success of a product. The choice has a direct impact on the performance of the application or the execution of the algorithm. Consequently, a comparison analysis of modern or emerging technologies becomes particularly important. This article is the first part of a comparative analysis, the continuation of which [21] expands the research on the subject of this paper. In this context, the article presents summary of the existing literature and discusses the time performance of Julia and Python programming languages. In addition, test results and published source codes were reproduced and verified in a research environment. In the second part of the article [21], the research was extended to include more algorithms and to check the performance of each language on graphics cards.
    Keywords Python, Julia, comparison, performance
    Full article: PDF icon 5_17_mmaj_performance_comparison_1.pdf

Computer Science and Mathematical Modelling No. 19/2024

  1. Jakub Grątkiewicz, Rafał Kasprzyk - Memes as an inconspicuous tool in information warfare
    Pages: 5 - 13
    Abstract: Memes, in the form of images, phrases or short videos, are an important and inconspicuous source of information in the Internet age. Their simplicity and popularity make them a potential tool in information warfare, capable of producing certain effects in society. The article presents memes as information weapons, analyzing the process of their creation and distribution. Reference is made to Richard Dawkins' meme theory and the theory of reflexive control to explain how memes can influence the decisions and perceptions of audiences. The example of the “Disaster Girl” meme and its variations were presented, illustrating the ability of memes to replicate and evolve. A classification of memes in terms of the information they convey was made, pointing out their potential to shape public opinion and emphasizing the subjective nature of their reception.
    Keywords memes theory, disinformation, information warfare
    Full article: PDF icon 5_13_jg_rk_memes_csmm_19_2024.pdf
  2. Dominik Kania, Piotr Górny - Assessing the security status of systems using the OAuth 2.0 authorization protocol
    Pages: 15 - 23
    Abstract: The article presents an analysis of the security of systems using the OAuth 2.0 protocol. It is an authorization protocol widely used in websites, including the largest in the world. It is characterized by high complexity and complicated operation. However, when used correctly, it provides significant convenience for users in sharing data with web applications from other websites. This describes specialized tests that were conducted to identify weaknesses in the basic OAuth 2.0 implementation. Based on these tests, the threats and risks associated with inaccurate implementation were identified, along with a presentation of their potential effects.
    Keywords authorization, protocol, vulnerability
    Full article: PDF icon 15_23_dk_pg_assessing_csmm_19_2024.pdf
  3. Patryk Serafin - Modern web technologies – frameworks, advantages, disadvantages and optimal applications
    Pages: 25 - 34
    Abstract: Modern web applications leverage a variety of frontend and backend technologies to deliver scalable, secure, and high-performance digital experiences. This paper examines key web development frameworks, highlighting their advantages, disadvantages, and optimal use cases. Frontend frameworks such as React, Angular, and Vue.js are analyzed in terms of interactivity, modularity, and scalability, while backend solutions like Django, Node.js, Flask, and Spring Boot are evaluated for security, performance, and data management capabilities. Additionally, the paper explores technology selection criteria based on application complexity, real-time processing requirements, and scalability needs. Special attention is given to security and performance considerations, emphasizing best practices for mitigating vulnerabilities and optimizing resource efficiency. The study concludes with insights into emerging trends in web development, including microservices, serverless computing, and AI-driven applications. By providing a structured comparison of modern web technologies, this paper serves as a guide for developers and businesses seeking to make informed decisions in selecting the right stack for their specific requirements.
    Keywords Web applications, frontend frameworks, backend frameworks
    Full article: PDF icon 25_34_pserafin_modernweb_csmm_19_2024.pdf
  4. Rafał Wasiluk - Content-based image similarity measurement grounded on information retrieved by semantic segmentation algorithms
    Pages: 35 - 43
    Abstract: The purpose of this article is to present a novel approach for recording information contained in an image in a structured form and performing image similarity assessment with use of these data structures. The solution presented in this document relies on an analysis of results produced by pre-trained semantic segmentation algorithms. These outcomes can be transformed to a set of vectors representing some characteristics of each class of objects detected in the provided image. These data structures can contain meaningful information about algorithm detections, such as the object’s position on the image, the object’s size compared to the overall image size or the object’s dominant colors, etc. Vectors prepared as described previously can be further compared with other image embeddings using many mathematical tools like distance measures. Moreover, the approach described in this article allows the user to define a value of weight tied to each characteristic. This provides the ability to make a subset of features more important than others and have a greater impact on the final value of image similarity.
    Keywords image similarity, semantic segmentation, vector image representation
    Full article: PDF icon 35_43_rwasiluk_contentbasedimage_csmm_19_2024.pdf

Computer Science and Mathematical Modelling No. 18/2023

  1. Mateusz Mohr - Selected techniques for source code obfuscation in scripting languages
    Pages: 33 - 41
    Abstract: The article presents the most common techniques for obfuscating the source code of computer programs. Obfuscation is defined and demonstrated through simple and easy-to-understand examples of code written in scripting languages such as Python and JavaScript. Its applications are discussed, and it is shown how to easily make the analysis of one’s programs more difficult.
    Keywords code obfuscation, scripting languages.
    Full article: PDF icon 33_42_mmohr_csmm_18_2023.pdf
  2. Niroshi Pirhaveen, Vijayanathan Senthooran - Investigation of the effectiveness of goal programming in Project Management Activities
    Pages: 21 - 32
    Abstract: The regulation of objectives that are inconsistent with the use of all related resources through the organization is the principal project management (PM) work. In present situations, the Project Manager is responsible for managing multiple conflicting objectives, these objectives are normally fuzzy owing to information will be insufficient and unavailable. At the earliest stage, it was difficult for the decision maker to develop a plan to shorten the total completion time, minimize the project total cost and maximize the quality of the project. The aim of this study is to compare a combination of fuzzy goal programming and grey linear programming techniques and multi objective integer grey programming model of programming with multiple fuzzy objectives (programming with fuzzy objectives) which is applied to a project management problem. This study provides a systematic decision-making framework for resolving PM decision issues with multiple goals in uncertain environments. A real-world numerical example is used to compare the different techniques in this study. Finally, the results determine the best method that gives the best combination of the parameters used for project activities. Results demonstrate that this model can be implemented as an effective tool.
    Keywords the iron triangle, time-cost-quality tradeoff, grey numbers.
    Full article: PDF icon 21_32_npirhaveen_csmm_18_2023.pdf
  3. D.S.Ruwankumara, E.R.A.D. Bandara - Analyzing the Factors Associated with Perceived English Oral Communication Skills among Undergraduates: A Case Study
    Pages: 15 - 19
    Abstract: This case study explore the factors influence the English oral communication skills of undergraduates of the Faculty of Science at the University of Colombo. 332 undergraduate participants were surveyed using stratified sampling based on their academic year and subject stream. The assessment of their oral communication skills encompassed four critical aspects: presenting ideas verbally, listening skills, providing feedback, and presentation abilities. Employing exploratory data analysis (EDA) and advanced statistical models including multivariate ridge, lasso, elastic net regression, and partial least square regression, the study uncovers the most significant factors influencing English oral communication skills were the results of English language-related exams taken during secondary education and undergraduate years. Students who performed well in these exams demonstrated superior communication skills, alongside the positive impact of extracurricular participation as revealed through EDA. The results of the study guide oral English communication practice for students’ future careers and educational.
    Keywords English oral communication, Multivariate regularized regression, Partial least square regression.
    Full article: PDF icon 15_19_ruwankumara_csmm_18_2023.pdf
  4. Andrzej Ameljańczyk - Rankings of multi-aspect fuzzy sets in modelling the decision support systems
    Pages: 5 - 14
    Abstract: The paper presents a method of constructing rankings of fuzzy sets, in particular multi-aspect fuzzy sets. A new class of global membership functions based on the generalized Minkowski norm has been defined. Due to their properties, they can be an alternative to classical product functions. These functions can be used to construct rankings of multi-aspect fuzzy sets, which are an important element of decision support systems. The concepts presented in this paper are illustrated with a numerical example from the area of support of diagnostic decisions based on multi-aspect fuzzy sets.
    Keywords multi-aspect fuzzy set, global membership function, ranking of fuzzy set.
    Full article: PDF icon 5_14_aameljanczyk_csmm_18_2023.pdf

Computer Science and Mathematical Modelling No. 17/2023

  1. W.A.L. Niwanthi, H.D. Panditharathne, S.S.N. Perera - Solving sweeping problem for trees in graph theory
    Pages: 29 - 33
    Abstract: We develop a theory to determine the search number of a graph that allows us to detect an intruder along an edge without limiting the visibility of adjacent vertices. The presented technique here will allow to express the sweep problem as a linear program using an existing formulation of a linear program designed for problems where capture occurs only at a vertex of a graph. We also provide a method to solve the sweep problem for any complex tree, utilizing a set of sub-trees of the tree.
    Keywords Search and sweep problem, set covering problem, branch cut algorithm, homeomorphic trees.
    Full article: PDF icon 29_33_niwanthi_solving_csmm_17_2023.pdf
  2. Khisal Wijesinghe, Suresh Perera, Chulanee Attanayake - Performance optimization through hybrid modelling: An application to dengue disease
    Pages: 23 - 27
    Abstract: Although, Dengue virus could be prevented through responsible human actions, it has become a serious threat to mankind. This study was intended to increase the prediction accuracy of dengue transmission using hybryd models. After forecasting with Grey Forecasting Model, Growth Curve Model, Alpha Sutte Indicator and Generalized Additive Model, the models with the best prediction accuracy were determined through lowest Mean Absolute Percentage Error (MAPE) recorded in error calculation. Accordingly, a hybrid model was developed, by using a weighted average method as a coupling technique. Through the calculations and the analysis carried out, Alpha Sutte Indicator and the Generalized Additive Model were chosen to develop the Hybrid Model. The model enhances the prediction accuracy for most of the regions in Sri Lanka. Forecasting dengue transmission accurately is important to allocate medical personnel and equipment, conduct effective environmental management and awareness programs and chemical vector controlling in correspondence to the rising figures of dengue patients.
    Keywords dengue transmission, generalized additive model, hybrid model.
    Full article: PDF icon 23_27_kwijesinghe_csmm_17_2023.pdf
  3. Robert Jarosz - Proposition of multi-agent conflict situation simulation and reinforcement learning toolset with demonstration of early stage implementation
    Pages: 13 - 22
    Abstract: This paper introduces conceptual approach to modelling conflicts. A flexible framework compatible in development phase is presented. Model scalability, possibility of parallelization and computational distribution over network is discussed. As example of application there are presented two variants of classic game theory problems. At the end of the paper current problems are briefly stated and future work direction is presented.
    Keywords artificial intelligence, game theory, situation modeling, multi-agent conflict situations, rust.
    Full article: PDF icon 13_22_rjarosz_csmm_17_2023.pdf
  4. Andrzej Ameljańczyk - Multi-aspect fuzzy sets in modelling the decision support systems
    Pages: 5 - 12
    Abstract: The paper presents the new mathematical modelling concept using the so-called multi-aspect fuzzy sets. The paper contains definitions of the most important characteristics of multi-aspect fuzzy sets in the context of their application in decision support algorithms. These include characteristics such as the image of the multi-aspect fuzzy set, the carrier and core, the bottom and top fronts of the fuzzy set, and many other characteristics derived from multi-criteria optimization. These concepts are illustrated with numerical examples.
    Keywords multi-aspect fuzzy set, global membership function, image of fuzzy set, lower and upper front of fuzzy set.
    Full article: PDF icon 5_12_aameljanczyk_csmm_17_2023.pdf

Computer Science and Mathematical Modelling No. 15-16/2022

  1. Andrzej Ameljańczyk, Tomasz Ameljańczyk - Fuzzy sets in modelling patientʼs disease states in medical diagnostic support algorithms
    Pages: 45 - 51
    Abstract: The article presents the concept of using fuzzy sets methodology in modelling patientʼs disease states for preliminary medical diagnosis. The preliminary medical diagnosis is based on the identified disease symptoms. The basis of the algorithm are descriptions of the patientʼs disease status and patterns of disease entities. These patterns were defined as fuzzy sets. The paper presents simple classifiers that allow he a preliminary diagnosis based on the analysis of fuzzy sets for the use of the general practitioner.
    Keywords fuzzy set, disease pattern, classifier, preliminary diagnosis.
    Full article: PDF icon 45_51_aa_ta_fuzzy_csmm_15_16.pdf
  2. Radosław Kopiński, Karol Antczak - Image Caption Generation Using Transfer Learning
    Pages: 7 - 12
    Abstract: This paper describes an image caption generation system using deep neural networks. The model is trained to maximize the probability of generated sentence, given the image. The model utilizes transfer learning in the form of pretrained convolutional neural networks to preprocess the image data. The datasets are composed of a still photographs and associated with it, five captions in English language. Constructed model is compared to other similarly constructed models using BLEU score system and ways to further improve its performance are proposed.
    Keywords neural networks, NLP, caption generation, machine learning, computer vision, deep learning, transfer learning.
    Full article: PDF icon 7_12_rk_ka_image_csmm_15_16_2022.pdf
  3. Robert Jarosz - Overview of selected reinforcement learning solutions to several game theory problems
    Pages: 13 - 22
    Abstract: This paper collects several applications of reinforcement learning in solving some problems related to game theory. The methods were selected to possibly show variety of problems and approaches. Selections includes Thompson Sampling, Q-learning, DQN and AlphaGo Zero using Monte Carlo Tree Search algorithm. Paper attempts to show intuition behind proposed algorithms with shallow explaining of technical details. This approach aims at presenting overview of the topic without assuming deep knowledge about statistics and artificial intelligence.
    Keywords artificial intelligence, game theory, Thompson sampling, Q-learning, DQN, Monte Carlo tree search, AlphaZero
    Full article: PDF icon 13_22_rj_overview_csmm_15_16_2022.pdf
  4. Robert Jarosz - Analysis of selected reinforcement learning applications in contract bridge
    Pages: 23 - 31
    Abstract: This paper presents an overview of four selected solutions addressing problem of bidding in card game of contract bridge. In the beginning the basic rules are presented along with basic problem size estimation. Brief description of collected work is presented in chronological order, tracking evolution of approaches to the problem. While presenting solution a short description of mathematical base is attached. In the end a comparison of solution is made, followed by an attempt to estimate future development of techniques.
    Keywords artificial intelligence, bidding, bid prediction, contract bridge, game theory, incomplete knowledge, machine learning, neural networks, Q-learning, reinforcement learning, supervised learning
    Full article: PDF icon 23_31_rj_analysis_csmm_15_16_2022.pdf
  5. Michał Zimoń, Rafał Kasprzyk - When AI fails to see: The challenge of adversarial patches
    Pages: 39 - 44
    Abstract: Object detection, a key application of machine learning in image processing, has achieved significant success thanks to advances in deep learning [6]. In this paper, we focus on analysing the vulnerability of one of the leading object detection models, YOLOv5x [14], to adversarial attacks using specially designed interference known as “adversarial patches” [4]. These disturbances, while often visible, have the ability to confuse the model, which can have serious consequences in real world applications. We present a methodology for generating these interferences using various techniques and algorithms, and we analyse their effectiveness in various conditions. In addition, we discuss potential defences against these types of attacks and emphasise the importance of security research in the context of the growing popularity of ML technology [13]. Our results indicate the need for further research in this area, bearing in mind the evolution of adversarial attacks and their impact on the future of ML technology.
    Keywords object detection, adversarial patches, YOLO model, machine learning
    Full article: PDF icon 39_44_mz_rk_csmm_15_16_2022.pdf
  6. Małgorzata Michniewicz - Conclusions from the Analysis of Blockchain Solutions
    Pages: 33 - 37
    Abstract: The development of blockchain technology and distributed ledgers indeed contributes to enabling the delivery of various digital services, such as financial services, registry management, and tokens, including non-fungible tokens (NFTs). In blockchain systems, decisions are made based on the so-called consensus mechanism, which is a method of selecting a single version of transaction history that all nodes consistently agree upon. Although this technology is classified as emerging, it has a history of over ten years, and its ongoing implementations, including in the public administration sector, demonstrate its evolution and its status as one of the most promising technologies in terms of ensuring data immutability. The published ISO (International Organization for Standardization) standards and numerous implementations using business models executed in the DAO (Decentralized Autonomous Organization) architecture undoubtedly support the development of blockchain.
    Keywords blockchain, DAO, public sector
    Full article: PDF icon 33_37_mm_conclusion_csmm_15_16_2022.pdf

Computer Science and Mathematical Modelling No. 13-14/2021

  1. Paweł Wójcik, Joanna Wiśniewska - Machine learning methods in game of chess implementation
    Pages: 61 - 69
    Abstract: The following work presents methods of using machine learning to teach a computer to play chess. The first method is based on using records of games played by highly ranked players. The second method is based on the Monte Carlo Tree Search algorithm and reinforcement learning.
    Keywords chess, machine learning, neural networks
    Full article: PDF icon 61_69_pwojcik_machinelearning_csmm_2021_porec.pdf
  2. Jarosław Wilk - Efficiency of lattice-based security mechanisms supporting public tasks on digital integration platforms
    Pages: 51 - 59
    Abstract: Integration platforms are the solution increasingly used by the public administration in Poland in order to make public tasks available and implement the tasks on these platforms (in the form of electronic services). In earlier publications, the author proposed a mathematical model based on lattice mechanisms that ensures the secure provision of these services (from a confidentiality perspective). In the following publication the author's model was cited (its main elements) and then the analysis of a time efficiency of the approach with using lattice mechanisms with the general model was performed. The efficiency examined concerned both the implementation of public tasks – and more precisely the verification of their correctness from the security perspective before the implementation as well as concerned an expansion of the process of handling the public task. The author has demonstrated that in both cases it is appropriate to use the lattice solution, as its time efficiency is better.
    Keywords public tasks execution, efficiency, security model, lattice based model
    Full article: PDF icon 51_59_jwilk_efficiency_csmm_2021.pdf
  3. Bolesław Szafrański, Jarosław Wójcik - Analysis of models and algorithms used operationally in methods for the continuous monitoring of bird collision hazards
    Pages: 39 - 50
    Abstract: The results of the analysis of factors influencing the emergence of dangerous situations in the air (in short, aviation incidents) in the Polish Army show a significant negative impact of the environment on the flight operations performed. The most common cause of an aviation incident in the area of the environment is the collision of the aircraft with birds. The lack of methods for the continuous monitoring and forecasting of the level of risk of collision between aircraft and birds makes a significant gap in a proactive approach to the safety of flights in the Air Force of the Republic of Poland. This paper presents an overview of the most important methods for detection and forecasting of bird flight intensity, which have been used for construction of systems aiming to prevent collisions with birds and which are employed by the air forces of the United States, the Netherlands, Belgium and Israel. An accurate analysis of the models and algorithms used in the selected methods shows contemporary trends in research on the negative impact of the environment on flight safety. These methods show incomplete usefulness in Poland’s conditions, which justifies the need to develop a more appropriate method.
    Keywords safety, aviation, bird strike
    Full article: PDF icon 39_50_bszafranski_jwojcik_csmm_v1.10_en_pp.pdf
  4. Bolesław Szafrański - Registry services and systems – conceptual and architectural aspects
    Pages: 31 - 38
    Abstract: After discussing the function of public registers in the information infrastructure of the State, the paper focuses on the architectural aspects of ensuring the possibility of standardised reference to the services of public registry systems, despite the technological and functional differences between them. Taking this fact into account, the concept was presented to include, in the architecture, the platform for access registry services of an intermediary layer consisting of registry connectors, registry broker and universal registry services, whose (layer) main task is to “mask” the above differences by adapting the services of autonomous registries to the standard required by the main bus of this platform.
    Keywords public register systems, architecture, information system of the State
    Full article: PDF icon 31_38_bszafranski_registry_csmm_2021.pdf
  5. Paweł Nosażewski, Joanna Wiśniewska - Implementation of the Turing machine simulator
    Pages: 17 - 29
    Abstract: This paper describes the process of designing and implementing a Turing machine simulator application. The created desktop application is distinguished from other solutions by the use of the latest technology and offline operating. The various stages of the project are described, such as defining requirements, creating UML diagrams, and prototyping the user interface. A MVVM architectural model used in building the application is presented. The issues of controls, data binding, and message passing found in the Avalonia package are addressed. The unit tests created and the exploratory tests performed are also described.
    Keywords Turing machine, simulator, application
    Full article: PDF icon 17_29_pnosazewski_jwisniewska_implementacja_v2_csmm_13_14_2021_porec.pdf
  6. Olga Dzięgielewska - Evaluating adaptive differential privacy model
    Pages: 5 - 16
    Abstract: Differential privacy is a statistical disclosure control that is gaining popularity in recent years due to easy application for the data collection mechanisms. Many variants of differential privacy are being developed for specific use cases and environments. One of them is adaptive differential privacy that modulates the generated noise in such a way, that the retrieved result is affected according to the risk profile of the asked query and the risk-accuracy tradeoff required for the queried database. This paper intends to evaluate the adaptive differential privacy using VIOLAS Framework and through assessing how the security characteristics satisfied by the adaptive differential privacy mitigate the risk of selected inference attacks.
    Keywords differential privacy, VIOLAS framework, information score, risk-accuracy, inference attacks, statistical databases security.
    Full article: PDF icon 5_16_odziegielewska_evaluating_csmm_2021.pdf

Computer Science and Mathematical Modelling No. 11-12/2020

  1. Marcin Mazure, Mateusz Romaniuk - Attribution of authorship in instant messaging software applications, based on the similarity measure of the stylometric features’ vector
    Pages: 33 - 41
    Abstract: This paper describes the issue of authorship attribution based on the content of conversations originating from instant messaging software applications. The results presented in the paper refer to the corpus of conversations conducted in Polish. On the basis of a standardised model of the corpus of conversations, stylometric features were extracted, which were divided into four groups: word and message length distributions, character frequencies, tf-idf matrix and features extracted on the basis of turns (conversational features). The vectors of users’ stylometric features were compared in pairs by using Euclidean, cosine and Manhattan metrics. CMC curves were used to analyse the significance of the feature groups and the effectiveness of the metrics for identifying similar speech styles. The best results were obtained by the group of features being the tf-idf matrix compared with the use of cosine distance and the group of features extracted on the basis of turns compared with the use of the Manhattan metric.
    Keywords authorship attribution, stylometry, CMC, turn, instant messaging software application, conversation
    Full article: PDF icon 33_41_mmazurek_mromaniuk_attribution_csmm_11_12_2020.pdf
  2. Andrzej Ameljańczyk - The role of properties of the membership function in construction of fuzzy sets ranking
    Pages: 5 - 12
    Abstract: The paper presents a several new definitions of concepts regarding the properties of fuzzy sets in the aspect of their use in decision support processes. These are concepts such as the image and counter – image of the fuzzy set, the proper fuzzy set, the fuzzy support and the ranking of fuzzy set. These concepts can be important in construction decision support algorithms. Particularly a lot of space was devoted to the study of the properties of membership function of the fuzzy set as a result of operations on fuzzy sets. Two additional postulates were formulated that should be fulfilled by the membership function product of fuzzy sets in decision making.
    Keywords fuzzy set, fuzzy set image, fuzzy set ranking, discrimination postulate, no internal contradiction postulate
    Full article: PDF icon 5_12_aameljanczyk_the_role_csmm11_12_2020.pdf
  3. Michał Gałusza - Review of Current Text Representation Technics for Sematic Relationship Extraction
    Pages: 13 - 22
    Abstract: Article provides review on current most popular text processing technics; sketches their evolution and compares sequence and dependency models in detecting semantic relationship between words.
    Keywords NLP, Relationship Extraction, Context Dependency Graph
    Full article: PDF icon 13_22_mgalusza_rewiev_csmm_11_12_2020.pdf
  4. Kacper Lenkiewicz, Joanna Wiśniewska - The D-Wave quantum computer – advantages and disadvantages of moving away from the circuit model
    Pages: 23 - 32
    Abstract: The paper is based on a thesis with the same title. The purpose of this thesis is to analyse D-Wave devices using quantum effects. The research focuses on demonstrating the advantages and disadvantages of a company moving away from the circuit model in its computers. The subject of the research is the used adiabatic model of quantum computing based on the mechanism of quantum annealing. The research is based on publicly available, comprehensive documentation of D-Wave Systems. On the basis of scientific papers, conferences and information contained in websites, controversies, disadvantages and advantages of the solutions adopted have been described.
    Keywords D-Wave, quantum computer, quantum annealing
    Full article: PDF icon 23_32_klenkiewicz_jwisniewska_d_wave_csmm_11_12_2020.pdf

Computer Science and Mathematical Modelling No. 10/2019

  1. Bolesław Szafrański, Rafał Bałazy - Data protection in transactional and statistical applications of databases
    Pages: 31 - 39
    Abstract: The article describes a discussion on the issue of data protection in databases. The discussion attempts to answer the question about the possibility of using a transactional database system as a system capable of data protection in a statistical database. The discussion is preceded by a reminder of the basic issues related to data protection in databases, including reminder of flow control models, access control models and the inference. The key element of the article is the analysis, based on the example of the Oracle database management system, whether data protection mechanisms in transactional databases can be effective in case of data protection in statistical databases.
    Keywords database, database system, data protection in database, flow control, inference control, statistical database, Oracle.
    Full article: PDF icon 31_39_bszafranski_rbalazy_dataprotecton_csmm_10.pdf
  2. Tran Quang Chung, Andrzej Ameljańczyk - Clustering web search results using Wikipedia resource
    Pages: 25 - 29
    Abstract: The paper presents a proposal of a new method for clustering search results. The method uses an external knowledge resource, which can be, for example, Wikipedia. Wikipedia – the largest encyclopedia, is a free and popular knowledge resource which is used to extract topics from short texts. Similarities between documents are calculated based on the similarities between these topics. After that, affinity propagation clustering algorithm is employed to cluster web search results. Proposed method is tested by AMBIENT dataset and evaluated within the experimental framework provided by a SemEval-2013 task. The paper also suggests new method to compare global performance of algorithms using multi – criteria analysis.
    Keywords affinity propagation, similarity of documents, multi-criteria assessment, Web search results, Wikipedia
    Full article: PDF icon 25_29_ctran_aameljanczyk_clustering_csmm_10.pdf
  3. Marcin Romaldowski - The method of automatic assignment ICD codes based on semantic information
    Pages: 17 - 23
    Abstract: The paper presents the method of automatic assignment of ICD codes based on semantic information contained in clinical reports of the MIMIC-III database. It is showing the possibility of using multi-criteria optimization methods for simple classifiers fusion in a more precise classifiers complex. ICD code assignment is important in the modern hospital, more accurate automation of assigning codes will make the clinical process more efficient and can help clinicians carry out better diagnostics and effectively improve medical care systems.
    Keywords MIMIC III, ICD, TFIDF, word2vec, classification, machine learning, natural language processing, classifiers synthesis, Pareto filter
    Full article: PDF icon 17_23_mromaldowski_themethod_csmm_10.pdf
  4. Magdalena Cebula, Piotr Murawski - Design and implementation of an information system to study the repeatability of the orientation in space for medical applications
    Pages: 5 - 16
    Abstract: The aim of the study was to study the repeatability of the object’s orientation in space. During the study, a self-constructed system of 4 gyroscope and an available robot of the Kuka type were used. An application allowing for comparison of research results was written and presented. The article contains individual stages of work (analytical and implementation), research results, conclusions and discussion.
    Keywords orientation in space, gyroscope, medical applications
    Full article: PDF icon 5_16_mcebula_pmurawski_design_csmm_10.pdf

Computer Science and Mathematical Modelling No. 9/2019

  1. A. Chojnacki, F. Darnowski - A model of the process of writing and deleting file information on a disk with NTFS.
    Pages: 19 - 25
    Abstract: This paper aims at demonstrating a mathematical model of the process of writing and deleting information about files on a disk, using the contents of the $MFT system file, i.e. in a file generated in the NTFS (New technology File System). The presented model uses the language of control theory, where the state of the system is equal to the state of the disk and the state of the $MFT file, and where control is understood as undertaking the action of writing or deleting. The deterministic nature of the process and its stationarity were assumed. Then, based on the transition function after its specification, we suggest constructing further inverse images of possible prior states at subsequent stages of data writing or deletion. The obtained results form the basis for the implementations developed.
    Keywords hard drive, NTFS, $MFT.
    Full article: PDF icon 19_25_achojnackifdarnowski_csmm_9_2019.pdf
  2. A. Woźniak, T. Nowicki - The Problem of Effective Deployment Architecture in SOA.
    Pages: 33 - 44
    Abstract: Service Oriented Architecture is popular in many organizations. In particular, it has already deeply rooted in large corporations that need to automate entire business processes and implement them in many systems. It has a unique feature that allows unambiguously indicate service that is to realise business process step. That indication is possible to show directly in BPMN diagram. Thus, it is possible to trace which server has used resources to implement the service and how much of those resources were needed. Therefore, it is possible to build an optimization task that, with limited and unreliable resources, will determine such allocation of components to servers and such an algorithm for assigning tasks to them, so that the processes will work as well as possible. The article presents a model of such an optimization task. This model consists of four layers. The Organization Layer describes the system environment – the types and frequency of initiating business process instances. The Integration Layer describes the business processes and indicates the services that should be performed at every step. The Component Layer describes component characteristics and what services they provide. In Server Layer both: server characteristics and runtime environments necessary for the component to run are described. Finally, the optimization task and evaluation criteria are formulated.
    Keywords SOA deployment, mathematical model, system architecture optimization.
    Full article: PDF icon 33_44_tnowickiawozniak_csmm_9_2019.pdf
  3. M. Pachnik - Methods of generating test data for carrying out the fuzzing process.
    Pages: 27 - 31
    Abstract: The article presents and compares modern methods of generating test data in the process of automatic software security testing, so called fuzz testing. The publication contains descriptions of methods used, among others, in local, network or web applications, and then compares them and evaluates their effectiveness in the process of ensuring software security. The impact of the quality of test data corpus on the effectiveness of automated security testing has been assessed.
    Keywords fuzzing, test data corpus, security vulnerabilities.
    Full article: PDF icon 27_31_mpachnik_csmm_9_2019.pdf
  4. K. Antczak - On regularization properties of artificial datasets for deep learning.
    Pages: 13 - 18
    Abstract: The paper discusses regularization properties of artificial data for deep learning. Artificial datasets allow to train neural networks in the case of a real data shortage. It is demonstrated that the artificial data generation process, described as injecting noise to high-level features, bears several similarities to existing regularization methods for deep neural networks. One can treat this property of artificial data as a kind of “deep” regularization. It is thus possible to regularize hidden layers of the network by generating the training data in a certain way..
    Keywords deep learning, regularization, artificial data.
    Full article: PDF icon 13_18_kantczak_csmm_9_2019.pdf
  5. A. Ameljańczyk - Fuzzy set in modeling of patient’s disease states.
    Pages: 5 - 11
    Abstract: The paper concerns the mathematical modeling of patient’s disease states and disease unit patterns for the needs of algorithms supporting medical decisions. Due to the specificity of medical data and assessments in the modeling of patient’s disease states as well as diseases, the fuzzy set methodology was used. The paper presents a number of new characteristics of fuzzy sets allowing to assess the quality of medical diagnosis. In addition, a definition of a multi-aspect fuzzy set is presented, which may be useful in supporting medical diagnostics based on multi-criteria similarity models. The presented results can be used in the construction of algorithms for assessing the patient's state of health and mainly in the construction of algorithms for supporting diagnostic processes.
    Keywords fuzzy set, multi-aspect fuzzy set, fuzzy sets similarity, fuzzy pattern of disease unit, medical diagnosis.
    Full article: PDF icon 5_11_aameljanczyk_csmm_9_2019.pdf

Computer Science and Mathematical Modelling No. 8/2018

  1. K. Sosnowski - The use of electroencephalography as a future-oriented brain-computer interface. Current concepts, solutions, technologies that allow communication through thoughts
    Pages: 47 - 52
    Abstract: Nowadays, brain-computer interfaces are gaining more and more popularity. Research centers develop new methods of human communication with devices through thoughts. There are many methods used for this kind of interfaces, however, the most widespread is electroencephalography (EEG). There are many reasons for this fact, it is a method that is relatively cheap compared to other methods. Less complex technical tools and apparatus are required to operate it. Another advantage of this method, unlike others, is its non-invasiveness. Unfortunately, current brain-computer interfaces do not offer high data rates. However, time plays a smaller role when we are dealing with a disabled person who regains the ability to communicate with the world through the interface controlled by thoughts. This paper is the beginning of a series of papers in which the author will describe in detail the elements of brain-computer interfaces, as well as improvements that can be applied to them to improve their properties.
    Keywords Brain-computer interface, BCI, Electroencephalography, EEG.
    Full article: PDF icon 47_52_theuseofelectro_csmm_8_2018_p.pdf
  2. P.A. Ryszawa - On some specific cases of quantum state in testing its separability
    Pages: 41 - 46
    Abstract: This paper shows a simple computational scheme for determining whether a particular quantum state in a specific form is separable across two given sets of qubits. That is, given a set of qubits partitioned into two, it answers the question: does the original state have a separable form as a tensor product of some two other states, which are set up of the two given subsets of qubits?
    Keywords quantum computing, quantum register, quantum entanglement, quantum separability.
    Full article: PDF icon 41_46_paryszawa_qseparable_csmm_8_2018_p.pdf
  3. D. Pierzchała, P. Czuba - Method of agents’ state estimation in multiresolution multiagent simulation
    Pages: 29 - 39
    Abstract: The paper proposes the multiagent techniques for approximation of agent’s state in the multiresolution multiagent simulation. The key methods we have used for state aggregation and disaggregation are: consensus algorithm and formation control. The idea of the coordination of multiple agents has emerged from both observation and simulation of a collective behavior of biological entities. The consensus algorithms are commonly used for the cooperative control problems in the multiagent systems, whilst the formation control is the most popular and fundamental motion coordination problem in the multiagent systems, where agents converge to predefined geometric shapes. The presented approach shows that multiagent methods seem to be very promising in multiresolution simulation. Consensus and formation control algorithms remove necessity to specify the much more complex algorithms for the aggregation and disaggregation needs.
    Keywords multiresolution multiagent simulation, multiagent systems, multiagent networks, formation control.
    Full article: PDF icon 29_39_method_of_agents_csmm_8_p.pdf
  4. M. Jankowski - Ensemble Methods for Improving Classification of Data Produced by Latent Dirichlet Allocation
    Pages: 17 - 28
    Abstract: Topic models are very popular methods of text analysis. The most popular algorithm for topic modelling is LDA (Latent Dirichlet Allocation). Recently, many new methods were proposed, that enable the usage of this model in large scale processing. One of the problem is, that a data scientist has to choose the number of topics manually. This step requires some previous analysis. A few methods were proposed to automatize this step, but none of them works very well if LDA is used as a preprocessing for further classification. In this paper, we propose an ensemble approach which allows us to use more than one model at prediction phase, at the same time, reducing the need of finding a single best number of topics. We have also analyzed a few methods of estimating topic number.
    Keywords Dimensionality reduction, classification, machine learning, natural language processing, topic modelling.
    Full article: PDF icon 17_28_mjankowski_ensemble_csmm_8_2018_p.pdf
  5. F. Darnowski, A. Chojnacki - Writing and Deleting files on hard drives with NTFS
    Pages: 5 - 15
    Abstract: The goal of this article was to present detailed information about writing and deleting process on the NTFS (New Technology File System) formatted drives. The most important are the algorithms used by computer to write data BFA (Best Fit Algorithm) and FFA (First-Free Algorithm) to update $MFT (Master File Table). The naming convention of the areas of the drive is presented. The proposed rules of writing and deleting algorithm were successfully validated with real NTFS volume.
    Keywords hard disk, NTFS, $MFT.
    Full article: PDF icon 5_15_new_ach_fd_csmm_8_p.pdf

Computer Science and Mathematical Modelling No. 7/2018

  1. M. Miecznik, J.W. Mietelski, E. Łokas, K. Kleszcz - Modeling of the Cs137 and Sr90 contamination transportation process performed for the vicinity of National Radioactive Wastes Disposal in Różan (NE Poland)
    Pages: 19 - 30
    Abstract: This paper contains the results of radionuclides transportation modeling under National Radioactive Waste Disposal (NRWD) grounds in Różan (northeast Poland). The disposal is of the low- and intermediate-level waste (LILW) type. We simulated the radionuclides transportation process through sandy soils. The simulation was performed in a self-written simulator in Scilab using the finite difference method. The model included diffusion, advection and radioactive decay. The model was tested according to convergence and stability. Assuming the hydrological gradient being 0.008, the contamination transportation time was 30–46 years depending on the modeled problem. The modeled distance of 600 m was from underneath the disposal to the exudation in the Narew ravine. Radioactive decay for both cesium (Cs137) and strontium (Sr90) had a significant impact on the results. The model proved to be a useful tool for performing simple scientific simulations. This survey was part of a PhD thesis.
    Keywords advection, diffusion, radioactive decay.
    Full article: PDF icon 19_30_mmiecznik_csmm_7.pdf
  2. A. Ameljańczyk - The solutions similarity of the similar conflicts
    Pages: 5 - 10
    Abstract: The work deals with the examination of solutions similarity of similar conflicts, presented in the form of multiperson cooperative games. There is examined the similarity of the two most well-known in the literature concepts of the cooperative game solutions: Shapley solution and nucleolus (Schmeidler solution [9]). The work presents an idea of using a solution of the pattern conflict most similar to the considered conflict as a its solution.
    Keywords model of conflict, cooperative game, similarity of conflicts, ideal game, pattern recognition.
    Full article: PDF icon 5_10_aameljanczyk_csmm_7.pdf
  3. A. Horubała, D. Waszkiewicz, M. Andrzejczak, P. Sapiecha - Data confidentiality and computations hiding in cloud services for public administration
    Pages: 11 - 18
    Abstract: Cloud services are gaining interest and are very interesting option for public administration. Although, there is a lot of concern about security and privacy of storing personal data in cloud. In this work mathematical tools for securing data and hiding computations are presented. Data privacy is obtained by using homomorphic encryption schemes. Computation hiding is done by algorithm cryptographic obfuscation. Both primitives are presented and their application for public administration is discussed.
    Keywords public administration, obfuscation, homomorphic encryption.
    Full article: PDF icon 11_18_andrzejczak_horubala_sapiecha_waszkiewicz_csmm_7.pdf
  4. P.A. Ryszawa - Modelling quantum register disentanglement
    Pages: 31 - 44
    Abstract: Implementing quantum-inspired algorithms on classical computers suffers trade-off between the necessity of saving operational memory and the amount of memory necessary to fully represent a quantum state with possible entanglement. The latter is well known to consume the memory exponentially in the number of qubits. This paper sketches out the idea on how to reduce significantly the amount of necessary memory while distorting the entanglement moderately or not at all. At present, considered are real nonnegative probability amplitudes.
    Keywords quantum computing, quantum entanglement, disentanglement, quantum register.
    Full article: PDF icon 31_44_pryszawa_csmm_7_v2.pdf
  5. B. Szafrański, M. Zieja, J. Wójcik, K. Murawski - Data analysis of information system TURAWA in the aspect of data mining methods
    Pages: 45 - 52
    Abstract: The article is devoted to the analysis of data coming from the operation process and collected in computer system TURAWA, which focuses on supporting the management of flight safety in the Polish Air Force. The Armed Forces are equipped with a system, which collects and processes data concerning the whole air crew, all performed flights and all aircraft. The increasing opportunities in obtaining data and the continuous development of data mining methods allow to extract information never been known before, which, together with conclusions obtained from the data analysis, will help to improve the level of flight safety.
    Keywords flight safety, data mining, TURAWA.
    Full article: PDF icon 45_52_jwojcik_csmm_7.pdf

Computer Science and Mathematical Modelling No. 6/2017

  1. T. Tarnawski, R. Kasprzyk, R. Waszkowski - Foundations for Spread Page: review of existing concepts, solutions, technologies capable of improving effectiveness of conveying knowledge
    Pages: 33 - 44
    Abstract: Spread Page is our code name for a new, more efficient way of conveying technical information and scientific knowledge – freed form the text-centered mindset and focused on graphical, interactive, multidimensional representation. The article presents an overview of current concepts and solutions that seem applicable in crafting the idea of Spread Page. In our discussion we begin with novel, abstract, organizational ideas regarding the process of creating and disseminating scientific knowledge, that break up with the traditional model of (paper) publishing. Then we turn to analyzing methods and conventions used in (graphically) modeling real and abstract constructs, and finally review existing software solutions, technologies and exemplary, concrete products that implement certain functionalities instrumental to our cause. We reach the conclusion that, in certain areas (dealing with read-world entities, e.g. mechanics or anatomy), such desired “Spread-Page” way of representing knowledge is already within our reach. In more abstract fields, like law and legislature, political science, etc. we are still far off, mostly due to lack of appropriate standards and (graphical) notation. The paper is as a part of a larger set of articles presenting the proposed concept of Spread Page.
    Keywords graphical knowledge representation, Spread Page
    Full article: PDF icon 33_44_ttarnawski_csmm_6.pdf
  2. R. Waszkowski, R. Kasprzyk, T. Tarnawski - Spread Page approach to Business Process Management
    Pages: 23 - 32
    Abstract: Recently, we have observed a slow departure from printed texts towards electronic publications. Such content may be presented in many ways, including time-dependent 3D representation, aspect representation, layer representation and multi-resolution representation. Spread Page Initiative refers to the development of notation and tools for knowledge representation in a modern manner not limited by using the traditional paper-oriented technique. The article describes the Spread Page approach to the modeling of business processes. The authors consider a possibility of using new ways of knowledge representation to ensure accurate and more precise modeling of business processes.
    Keywords Spread Page, knowledge representation, Business Process Management
    Full article: PDF icon 23_32_rwaszkowski_csmm_6.pdf
  3. P.A. Ryszawa - Discovering grammar of an unknown text as an optimisation problem
    Pages: 15 - 22
    Abstract: This paper concerns the problem of discovering an unknown grammar from a text sample. The discovering methods are formulated as optimisation problems based on a binary representation of context-sensitive grammars. The representation starts with a longest possible vector of bits to, finally, make it more compact so as to be usable in practical applications. For the sake of simplicity, considered are only noncontracting (length preserving) grammars of order 2, excluding productions of the form P:A→B and those deriving the empty string, i.e P:A→ε.
    Keywords context-sensitive language, formal grammar, noncontracting grammar, binary representation, optimisation problem
    Full article: PDF icon 15_22_pa_ryszawa_csmm_6.pdf
  4. O. Dzięgielewska - Anonymization, tokenization, encryption How to recover unrecoverable data
    Pages: 9 - 13
    Abstract: The data privacy is currently vastly commented topic among all the organizations which process personal data due to the introduction of the European Union’s General Data Protection Regulation. Existing methods of data protection are believed to be sufficient as they meet the risk-based approach requirements in every mature organization, yet the number of publicly known data breaches confirms that this assumption is false. The aftermath of such incidents in countless cases prove that the risk-based approach failed as the reputational and financial consequences by far exceed the original estimations. This paper stressed the importance of the data layer protection from the planning, through design, until maintenance stages in the database lifecycle, as numerous attack vectors originating from the insider threat and targeting the data layer still sneak through unnoticed during the risk analysis phase.
    Keywords database lifecycle, inference attacks, data privacy, data breaches, GDPR
    Full article: PDF icon 9_13_odziegielewska_csmm_6.pdf
  5. M. Chudy - Economical assigning weapons to targets
    Pages: 5 - 8
    Abstract: Some upper and lower bound are proposed to use in branch and bound method for solving Weapon-Target Assignment (WTA) problems. Analyze of WTA inspires to formulate another problem to economize the number of weapons under the condition that the establish threshold value of destroying targets is achieved. This requirement generates an additional constrain generating the set of feasible solutions of WTA.
    Keywords WTA problem, assignment, economize
    Full article: PDF icon 5_8_mchudy_economical_csmm_6.pdf

Computer Science and Mathematical Modelling No. 5/2017

  1. K. Banach, R. Kasprzyk - Software environment for rapid prototyping of graph and network algorithms
    Pages: 11 - 16
    Abstract: The article presents an innovative software environment for rapid prototyping of graph and network algorithms. The environment consists of two main components: an editor of graphs & networks and an editor of algorithms’ code. The presented environment enables interactive visualization of algorithms implemented therein, which in turn allows quick verification of algorithms results as well as its correctness. The aim of the environment construction was to provide a solution for rapid prototyping of novel algorithms. The developed tool can also be successfully used for educational purposes.
    Keywords graph and network theory, algorithms prototyping, algorithms visualization
    Full article: PDF icon 11_16_csmm_5_kbanach_rkasprzyk.pdf
  2. P. Augustynowicz, A. Buraczyńska - Comparison between experimental, analytical and simulation model of distributed computation on ARM processors in High-Performance Computing
    Pages: 5 - 10
    Abstract: The paper presents a comparison between experimental, analytical and simulation model of distributed cryptographic computation regarding password recovery with SHA 1 password hashing. The aim of this paper is compare popular mobile ARM processors with their Intel Atom analogue and determine their usefulness in cryptographic computations from High Performance Computing (HPC) point of view. During the construction process of HPC cluster, three different versions of Raspberry Pi computers were used. Then the constructed model was applied to develop an analytical and simulation models that allow calculating most influential characteristics from HPC clusters administrator’s point of view. Reference model was constructed on Intel Atom processors.
    Keywords ARM processors, High-Performance Computing, Analytical Model
    Full article: PDF icon 5_10_csmm_5_paugustynowicz.pdf
  3. D. Dzida - Using complex networks in social impact models
    Pages: 17 - 28
    Abstract: This paper describes models of opinion dynamics. It presents various ways of modelling opinion spreading in the population. The author proposes to apply complex networks to a model, which is based on the theory of social impact. The agent based modelling is applied to construct the model and perform simulations. Performed simulations allowed to investigate how the use of complex networks and its properties have an influence on the final distribution of opinions in the population. The results of simulations have been shown and interpreted.
    Keywords social impact model, social simulation, opinion dynamics, complex networks
    Full article: PDF icon 17_28_csmm_5_ddzida.pdf
  4. P.A. Ryszawa - On sentence membership problem in context sensitive languages
    Pages: 29 - 44
    Abstract: A new type of graph is introduced, the grammar graph. The possibility of assigning labels to each node in such a graph extends it to the grammar net. The grammar net should be considered as a new graphical tool that helps in an analysis of whether a particular sentence belongs to a given context-sensitive grammar. Another concept, the derivation net, closely related to the grammar graph and of a similar structure, will be used to show an algorithm that is able to decide that some sentences do not belong to a language generated by a context sensitive grammar, while leaving others as a candidate members of it.
    Keywords context-sensitive grammar, non-contracting grammar, formal language, graph, parsing
    Full article: PDF icon 29_44_csmm_5_pryszawa.pdf
  5. P. Wołoszyn - Assessment of ranking algorithms in complex networks
    Pages: 45 - 51
    Abstract: A particularly helpful search of a network such as the Internet or a citation network not only finds nodes that satisfy some criteria but also ranks those nodes for importance to create what amounts to a “reading list”. In the recent past, there has been a large interest across a number of research communities in the analysis of complex networks. The selected set of pages from the World Wide Web can be modeled as a directed graph, where nodes are designated as individual pages, and the links as a connection between them. As the number of webpages to be ranked is in the billions, the computation is time-consuming and can take several days or more. Algorithms like PageRank, HITS, SALSA and their modifications has a challenge to deal with the size of the processed data. The need for accelerated algorithms is clear. This article presents the characteristics of three best known ranking algorithms and the assumptions for new algorithm development with first test runs.
    Keywords link analysis, web search, HITS algorithm, Kleinberg’s HITS algorithm, PageRank algorithm, SALSA algorithm, hubs, authorities.
    Full article: PDF icon 45_51_csmm_5_pwoloszyn.pdf

Computer Science and Mathematical Modelling No. 4/2016

  1. M. Wroński - Using Montgomery curve arithmetic over Fp2 for point scalar multiplication on short Weierstrasscurve over Fp with exactly one 2 – torsion point and order not divisible by 4 for IT systems
    Pages: 33 - 38
    Abstract: Montgomery curves are well known because of their efficiency and side channel attacks vulnerability. In this article it is showed how Montgomery curve arithmetic may be used for point scalar multiplication on short Weierstrass curve ESW over Fp with exactly one 2-torsion point and not divisible by 4. If then also . Because has three 2-torsion points (because has one 2-torsion point) it is possible to use 2-isogenous Montgomery curve to the curve for counting point scalar multiplication on . However arithmetic in is much more complicated than arithmetic in , in hardware implementations this method may be much more useful than standard methods, because it may be nearly 45% faster.
    Keywords elliptic curve cryptography, hardware implementations, Montgomery curves
    Full article: PDF icon 33_38_csmm_4_m_wronski.pdf
  2. B. Szafrański, J. Wilk - Electronic services security management for the public administration
    Pages: 25 - 32
    Abstract: The public administration in Poland is constantly extending and improving electronic services provided to citizens, business and itself (e.g. one ministry providing services to another public administration institution). New expectations like integration using the multilateral interoperability model, the service oriented approach, different security categories and groups within different institutions are creating the requirement for the appropriate security model. According to the authors current models do not meet the new requirements, but can be used as a base for the new approach. The lattice and its variations in different models (Denning, Sandhu, Szafrański) was selected by authors to create the new electronic services security management model for integration platforms which are supporting realization of public tasks. This publication focuses on practical aspect of the new model and presents the case study on a public administration e-services example. Detailed definition of the model itself can be found in previous authors’ articles.
    Keywords e-services, security, SOA
    Full article: PDF icon 25_32_csmm_4_bszafranski_jwilk.pdf
  3. O. Dzięgielewska, B. Szafrański - A brief overview of basic inference attacks and protection controls for statistical databases
    Pages: 19 - 24
    Abstract: With cyber-attacks on the dramatic rise in the recent years, the number of entities which realize the necessity of protecting their IT assets increases. Individuals are more aware of the potential threats and demand high level of security from the business entities having access to their personal and private data. Such entities have legal obligations to satisfy the confidentiality when processing sensitive data, but many fails to do so. Keeping the statistical data private is a challenge as the approach to the security breaches slightly differs from the classical understanding of data disclosure attacks. The statistical disclosure can be achieved using inference attacks on the not-effectively protected assets. Such attacks do not target the database access itself, i.e. are performed from a perspective of an internal user, but the statistical interface used to retrieve the statistical data from the database records. This paper sums up basic types of inference attacks classifying them in the CVSS standard and provides a series of fundamental countermeasures which can be undertaken to mitigate the risk of performing successful attack.
    Keywords statistical databases, inference control in statistical database, statistical disclosure, data security, data privacy.
    Full article: PDF icon 19_24_csmm_4_odziegielewska_bszafranski.pdf
  4. M. Chudy - Branch and Bound method for binary problems with the picture that redudes dimensions of problem
    Pages: 13 - 18
    Abstract: The relationships between elements of coefficient matrix, elements of vector and elements of vector in general binary problem are considered. Some of them allow us to establish the values of selected elements of feasible or optimal vector . This procedure reduces the dimension of basic problem and can be install in branch and bound method. It gives positive effects.
    Keywords binary problem, branch and bound method, reducing dimension
    Full article: PDF icon 13_18_csmm_4_mchudy.pdf
  5. A. Ameljańczyk - Presorting as a method of acceleration of algorithms in multi-objective optimization problems
    Pages: 5 - 11
    Abstract: The paper presents a method of algorithms acceleration for determining Pareto-optimal solutions (Pareto Front) multi-criteria optimization tasks, consisting of pre-ordering (presorting) set of feasible solutions. It is proposed to use the generalized Minkowski distance function as a presorting tool that allows build a very simple and fast algorithm Pareto Front for the task with a finite set of feasible solutions.
    Keywords Pareto Front, presorting, Minkowski metric
    Full article: PDF icon 5_11_csmm_4_aameljanczyk.pdf

Computer Science and Mathematical Modelling No. 3/2016

  1. R. Kasprzyk, A. Stachurski - A concept of standard-based vulnerability management automation for IT systems
    Pages: 33 - 38
    Abstract: The paper focuses on the attempt to show a way of automating IT vulnerability management across enterprise systems with the use of the Security Content Automation Protocol. SCAP offers a set of components which provide, among others, adjustable security checklists, standardised dictionaries of security vulnerabilities and vulnerability scoring methods that may prove valuable for organisations in terms of security analysis activities and quantitative risk assessment.
    Keywords vulnerabilities, SCAP, security
    Full article: PDF icon 33_38_csmm3.pdf
  2. K. Antczak - Rank thresholds in classifier ensemles in medical diagnosis
    Pages: 5 - 12
    Abstract: Classification methods have multiple applications, with medical diagnosis being one of the most common. A powerful way to improve classification quality is to combine single classifiers into an ensemble. One of the approaches for creating such ensembles is to combine class rankings from base classifiers. In this paper, two rank-based ensemble methods are studied: Highest Rank and Borda Count. Furthermore, the effect of applying class rank threshold to these methods is analyzed. We performed tests using real-life medical data. It turns out that specificity of data domain can affect classification quality depending on classifier type.
    Keywords medical diagnostics, classifier ensemble, rank threshold
    Full article: PDF icon 5_12_csmm3.pdf
  3. A. Chojnacki, G. Pieniążek - Choosing the optimal strategy for information security in a business organization
    Pages: 13 - 22
    Abstract: The paper describes the method of choosing the optimal strategy to implement security measures in a business organization. Strategies are categorized depending on time horizons, the history of threats and implemented security measures. Next, the method of choosing the optimal strategy for a business organization in a given context is outlined. Then this method is used to select the optimal strategy in a particular business context. The method is based on a deterministic time-based information security model, which was extended to a random model. With this simulation method, an organization can choose a strategy to implement security measures that best suits its needs. It is important for organizations to conduct an analysis of costs and threats in order to select appropriate safeguards.
    Keywords information security, stochastic model, simulation
    Full article: PDF icon 13_22_csmm3.pdf
  4. J. Dygaszewicz, B. Szafrański - Introducing Enterprise Architecture Framework in Statistics Poland
    Pages: 23 - 32
    Abstract: Article is devoted to the modernization of the statistical production process. The starting point for formulating the principles and methods of the modernization is to establish a framework architecture. An in-depth analysis of all relevant aspects arising from the holistic approach to the production of statistics is essential to extract the key business issues. Business needs are the foundation for the formulation of a coherent and transparent guidelines, demands, legal and technical requirements, both domestic and international which are the basis for the construction of the enterprise architecture framework and the development of solutions used to carry out the tasks of public statistics. The process of constructing architectural framework requires the use of models and methods used in scientific research, in particular arising from the achievements of enterprise architecture and modeling tools for object-oriented computing.
    Keywords enterprise architecture framework, statistics survey, GSBPM, TOGAF
    Full article: PDF icon 23_32_csmm3.pdf
  5. M. Zabielski, Z. Tarapata, R. Kasprzyk, K. Szkółka - Profile Cloning Detection in Online Social Networks
    Pages: 39 - 46
    Abstract: Due to the emergenceof online social networks, the importance of privacy on the Internet has vitally increased. Thus, it is important to develop mechanisms that will prevent our hidden personal data from unauthorized access and use. In this paper an attempt was made to present a concept of profile cloning detection in Online Social Networks (OSN) using Graph and Network Theory. Compering values of attributes of users’ personal profiles and analysing structural similarity of networks, we identifyattackers which steal users’ identity.
    Keywords profile cloning detection, online social networks, violations of privacy
    Full article: PDF icon 39_46_csmm3.pdf

Computer Science and Mathematical Modelling No. 2/2015

  1. T. Rzeźniczak - Visual analysis techniques diagnosis support
    Pages: 33 - 41
    Abstract: Taking into account vast amount of data available for general practitioners, medical diagnostic procedure can be treated as a complex analytical task. A doctor has to analyze the patient’s symptoms, medical test results, and medical knowledge, correlate everything and decide on the diagnosis. In order to do this more effectively, dedicated analytical tools and techniques can be used. The paper elaborates on the application of Map of Attributes (MoA) visualization technique for analysis of a patient’s health and disease pattern recognition. Various modes of using MoA are proposed and discussed. Furthermore, an application of diseases ranking preparation methods in visual filtering of diseases is presented. The methods use flexible similarity indices in conjunction with a graphical presentation of the Pareto model and Multidimensional Scaling model. Their goal is to allow physicians to narrow the space of detailed analysis in an interactive visual manner.
    Keywords data analysis, data visualization, medical decision support
    Full article: PDF icon 33_41_trzezniczak_csmm_2_2015_p.pdf
  2. M. Furmankiewicz, J. Furmankiewicz, P. Ziuziański - Evaluation of expert system as a stage of life cycle model ESDLC on the example of WIKe
    Pages: 23 - 32
    Abstract: The purpose of the article is to present the Expert System Development Life Cycle (ESDLC) and – in particular – the ESDLC’s evaluation stage. The essence of expert systems has been briefly described in the Artificial Intelligence (AI) context. Authors concentrated on the WIKex expert system, which was a practical part of the master’s thesis submitted by one of the authors of the University of Economics in Katowice. Moreover, the results of WIKex evaluation have been presented as a the last stage of the life cycle of the expert system.
    Keywords expert system, ESDLC, WIKex
    Full article: PDF icon 23_32_furmankiewicz_evaluation_csmm_2_2015_p.pdf
  3. M. Chudy - Model of attrition process in the presence of decoy
    Pages: 17 - 21
    Abstract: Mutual destroying process on a battlefield has classically been modeled without accounting for the possible presence of false targets. Following [6] we include into consideration the presence of decoys. Attrition of human decoys is to be strenuously avoided for humanitarian reasons, but also because of its broad impact on world opinion. False targets should be taken into consideration in the formulation of the target assignment problems. We formulate bicriteria assignment problem. First of them maximizes expected value of destroyed correctly detected targets and the second minimizes expected value of destroyed incorrectly detected targets. The resulting problem provides the set of compromise solutions. Each of the considered assignment problems belong to the class of general assignment problem which does not contain totally unimodular matrix factors.
    Keywords mathematical modeling, attrition process, assignment problem, decoy
    Full article: PDF icon 17_21_mchudy_csmm_2_2015_p.pdf
  4. A. Ameljańczyk, Ch. Trang Quang - Lexicographical binary implementation of the Recurrent Pareto Filter in categorization procedures
    Pages: 11 - 15
    Abstract: The paper presents the possibility of using Recurrent Pareto Filter (RPF) to the categorization procedures of objects (data). The paper presents a new implementation of the RPF algorithm, that uses lexicographical sorting objects and binary search Pareto optimal elements. The functioning of the algorithm illustrated by an example categorization procedure of scientific journals contained in the Scimago Scientific Journals Base.
    Keywords Pareto filter, data clustering, multi-criteria ranking, categorization of objects, recurrent Pareto filter
    Full article: PDF icon 11_15_aameljanczyk2_csmm_2_2015_p.pdf
  5. A. Ameljańczyk - Mathematical aspects of ranking theory
    Pages: 5 - 10
    Abstract: The paper covers the theoretical grounds for defining of rankings, basing on the terms taken from the relation space theory. One presented an array of new definitions which allow establishing rankings without the necessity of using typical ranking functions. Moreover, one introduced the term precedence ranking relation (not necessarily order relation), and demonstrated general algorithms to establish rankings on the basis of definitions of extreme elements.
    Keywords precedence ranking relation, pseudo ranking, linear ranking, extreme elements, data clustering
    Full article: PDF icon 5_10_aameljanczyk1_csmm_2_2015_p.pdf

Computer Science and Mathematical Modelling No. 1/2015

  1. A. Ameljańczyk - Property analysis of multilabel classifiers in the example of determining the initial medical diagnosis
    Pages: 11 - 16
    Abstract: In the paper analysis of properties of medical diagnoses acquired using simple and complex classifiers was performed. The introduced terms are illustrated with a comprehensive example in the field of medical diagnostics.
    Keywords medical diagnostics, committee classifiers, synthesis of classifiers, not dominated diagnosis classifier reliability
    Full article: PDF icon 11_16_aameljanczyk_csmm_1_2015.pdf
  2. A. Chojnacki, G. Pieniążek - Time based deterministic model of information security of a business organization
    Pages: 17 - 24
    Abstract: This paper discusses information security of a business organization using a time-based mathematical deterministic model. The model addresses key features of a business organization from the point of view of information security and calculates the level of information security based on quantitative values. Next, the introduced model is used to evaluate the level of information security that could be achieved for known threats within a given budget. For this reason, an optimization problem of safeguard implementation is formulated and an optimization method based on dynamic programming is used to address the issue. Two samples, local and global security metrics, defined in the model are described and one of them is used in optimizing safeguard implementation.
    Keywords information security, deterministic model, dynamic programming
    Full article: PDF icon 17_24_achojnacki_gpieniazek_csmm_1_2015.pdf
  3. M. Chudy - Model of attrition process control
    Pages: 25 - 30
    Abstract: The essence of the presented attrition process control relies on the solving defined sequence of target assignment problems at specific moments. The sequence of these moments is obtained for both sides of the battle. The model takes into account the changes of the number of means and targets as well as changes in environmental conditions. It is reflected in the parameters of problems. Each of the considered assignment problems belongs to the class of general assignment problems which does not contain totally unimodular matrix factors.
    Keywords mathematical modeling, attrition process, assignment problem
    Full article: PDF icon 25_30_mchudy_csmm_1_2015.pdf
  4. T. Rzeźniczak - Evolutionary algorithms for Map of Attributes optimization
    Pages: 31 - 43
    Abstract: Map of Attributes (MoA) is a visualization technique that allows to construct graphical representation of abstract entities. The technique is intended to aid recognition of the entities’ representations through the effective use of human perception abilities. A certain difficulty in the application of MoA is the computational complexity of finding an optimal map. The study presents a heuristic approach, based on evolutionary algorithms (EA), to constructing MoA visualization. The method was evaluated using the repository of disease entities as an input dataset. Several different setups of EA were tested; these were configurations with well-known evolution operators, as well as setups with newly proposed operators for the matrix representation of chromosome. Detailed results and analysis of conducted experiments are presented.
    Keywords evolutionary algorithms, data visualization, evolution operators
    Full article: PDF icon 31_43_trzezniczak_csmm_1_2015.pdf
  5. A. Ameljańczyk - Pareto filter in the process of multi-label classifier synthesis in medical diagnostics support algorithms
    Pages: 5 - 10
    Abstract: The paper presents the possibility of using multi-criteria optimization methods for simple classifiers fusion in a more precise and reliable classifiers complex. There are defined simple classifiers (one label) in the form of classifier committees and sample the synthesis relations of classifiers allow to obtain classifiers filed with improved properties.
    Keywords Pareto filter, medical diagnostics, the committee classifiers, classifiers synthesis, not dominated diagnosis
    Full article: PDF icon 5_10_aameljanczyk_csmm_1_2015.pdf