Mikołaj Karpiński

ORCID: 0000-0002-8846-332X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cybersecurity and Information Systems
  • Advanced Data Processing Techniques
  • Coding theory and cryptography
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Network Security and Intrusion Detection
  • Hydrology and Sediment Transport Processes
  • Advanced Malware Detection Techniques
  • Information Systems and Technology Applications
  • Tree Root and Stability Studies
  • Advanced Computational Techniques in Science and Engineering
  • Cryptography and Residue Arithmetic
  • Economic and Technological Systems Analysis
  • Soil erosion and sediment transport
  • Business and Economic Development
  • Advanced Data Storage Technologies
  • Technology and Human Factors in Education and Health
  • Mathematical Control Systems and Analysis
  • Energy Efficient Wireless Sensor Networks
  • Cloud Data Security Solutions
  • Aeolian processes and effects
  • Advanced Research in Systems and Signal Processing
  • Scientific Research and Philosophical Inquiry
  • Enterprise Management and Information Systems
  • stochastic dynamics and bifurcation

Ternopil Ivan Pului National Technical University
2023-2025

University School of Physical Education in Kraków
2025

Państwowa Wyższa Szkoła Zawodowa w Nowym Sączu
2013-2024

State University "Kyiv Aviation Institute"
2024

University of Bielsko-Biała
2014-2023

West Ukrainian National University
2022

Lviv Polytechnic National University
2022

Polish Academy of Sciences
2013-2018

Institute of Geophysics
2013-2018

Increasing internal state security requires an understanding of the factors that influence commission repetitive crimes (recidivism) since crime is not caused by public danger but criminal person. Against background informatization information activities law enforcement agencies, there no doubt about expediency using artificial intelligence algorithms and blockchain technology to predict prevent crimes. The prediction machine-learning models for identifying significant (individual...

10.3390/info14030161 article EN cc-by Information 2023-03-03

Factorization is one of the most important problems in theory numbers and a modern asymmetric cryptography. Known methods factorization are quite cumbersome; therefore, require significant computational resources for processing multi-bit numbers. The relevance problem dictated also by uncertainty regarding theoretical foundation stability disclosure cryptosystems. advanced method on basis Fermat's theorem with help system residual classes has been developed this article. operation squaring...

10.1109/iccas.2016.7832500 article EN 2016-10-01

In this article we consider the methodological basis for constructing a method monitoring bit rate of video stream in conditions changes parameters network channels. The work using interpolation mechanisms discrete-cosine transform frame and also recombination transformants planes described. Shows essence mean square error level control mechanism during transmitting.

10.1109/idaacs-sws.2018.8525560 article EN 2018-09-01

In the digital society, states' information security has become one of key elements ensuring competitiveness and sustainable development state, guaranteeing its integrity in general.An important component state is internal which must ensure personal public safety citizens.Modern Ukraine building a new system criminal justice, requires for risk assessment support optimal decision-making.Today, applied research analytical software have acquired special meaning.In paper, there built set models...

10.24425/ijet.2023.144365 article EN cc-by-nc-nd International Journal of Electronics and Telecommunications 2022-12-27

The problem of nonlinear substitution generation (S-boxes) is investigated in many related works symmetric key cryptography. In particular, the strength ciphers to linear cryptanalysis directly nonlinearity substitution. addition being highly nonlinear, S-boxes must be random, i.e., not contain hidden mathematical constructs that facilitate algebraic cryptanalysis. such substitutions a complex combinatorial optimization problem. Probabilistic algorithms are used solve it, for instance...

10.3390/info14050259 article EN cc-by Information 2023-04-26

In the rapidly evolving field of digital asset management, centralized and decentralized global registries have become essential tools for organizing, tracking, distributing assets. However, existing systems often face challenges regarding security, censorship resistance, interoperability, customizability, scalability. This research paper aims to address these gaps by proposing a novel registry system based on blockchain technology non-fungible tokens (NFTs). The makes several key...

10.3390/fi16070252 article EN cc-by Future Internet 2024-07-17

From the financial and medical sectors to various supply chains, most industries have seen a sea change due blockchain [...]

10.3390/electronics14030581 article EN Electronics 2025-02-01

The S-box is a key component of modern ciphers, determining the quality and performance cryptographic algorithms in which it applied. Many constructions for synthesizing high-quality S-boxes have been established, those based on Galois fields theory—for example, Nyberg construction applied AES algorithm—are particularly important. An integral affine transformation, used to improve avalanche correlation properties S-box. In this paper, new approach adopted transformations quaternary matrices...

10.3390/electronics14102094 article EN Electronics 2025-05-21

The motion of bedload particles is diffusive and occurs within at least three scale ranges: local, intermediate global, each which with a distinctly different diffusion regime. However, these regimes, extensions the ranges boundaries between them remain to be better defined quantified. These issues are explored using Lagrangian model saltating grains over uniform fixed bed. combines deterministic particle dynamics stochastic characteristics such as probability distributions step lengths...

10.1007/s10652-015-9420-5 article EN cc-by Environmental Fluid Mechanics 2015-06-02

Pseudorandom sequence generation is used in many industries, including cryptographic information security devices, measurement technology, and communication systems. The purpose of the present work to research additive Fibonacci generators (AFG) modified AFG (MAFG) with modules p prime numbers, designed primarily for their hardware implementation. known MAFG, as any pseudorandom sequences, are arguments tremendous values. At same time, there specific difficulties defining statistical...

10.3390/app12031519 article EN cc-by Applied Sciences 2022-01-30

The paper presents a novel method based on autoencoder neural networks for detection and correction of ECG heartbeats outliers. Commonly., with serious waveform distortions are treated as abnormal skipped from the analysis. However., this leads to poorer statistics., which might be significant in biometric applications. idea is increase number valid using powerful self-learning techniques corrupted segments. In series experiments., optimal architecture detecting electrocardiogram (ECG)...

10.1109/idaacs-sws.2018.8525836 article EN 2018-09-01

Abstract Four aquatic plants (i.e., Potamogeton pectinatus L., crispus Myriophyllum spicatum and Ceratophyllum demersum L.) that commonly grow in European lowland rivers lakes exhibit a variety of morphologies differences the internal structures their stem cross sections were selected to investigate influence initial conditions on biomechanical tests. A new method sample testing wet is proposed employed using bench‐top machine. The obtained characteristics, such as breaking strain, force,...

10.1002/lom3.10239 article EN Limnology and Oceanography Methods 2018-01-31

In this paper, we develop the theoretical provisions of symmetric cryptographic algorithms based on polynomial residue number system for first time. The main feature proposed approach is that when reconstructing method undetermined coefficients, multiplication performed not found base numbers but arbitrarily selected polynomials. latter, together with pairwise coprime residues class system, serve as keys algorithm. Schemes and examples implementation developed encryption algorithm are...

10.1155/2024/4894415 article EN cc-by Journal of Applied Mathematics 2024-01-01

10.5593/sgem2018/2.1/s07.088 article EN International Multidisciplinary Scientific GeoConference SGEM ... 2018-06-20

Two double-spend attack strategies on a proof-of-stake consensus are considered. For each strategy, the probability of its success is obtained, which depends network parameters and number confirmation blocks. These results can be used to define how many blocks vendor should wait after correspondent transaction before sending goods or services.

10.3390/s21196408 article EN cc-by Sensors 2021-09-25

Distributed Denial of Service (DDoS) attacks are still one the major cybersecurity threats and focus much research on developing DDoS attack mitigation detection techniques. Being able to model can help researchers develop effective countermeasures. Modeling attacks, however, is not an easy task because modern huge simulating them would be impossible in most cases. That’s why use tools like network simulators for modeling attacks. Simulation a widely used technique networking research, but...

10.47839/ijc.16.4.910 article EN cc-by International Journal of Computing 2017-12-30

This paper presents a basic model that shows the relationship between diameter of stem and its flexural rigidity. The was developed from experimental measurements biomechanical traits (i.e., tensile bending like maximum forces, stresses, moduli elasticity, rigidity, strain) three freshwater macrophyte species (Elodea canadensis Michx., Potamogeton pectinatus L., P. crispus L.), reflecting seasonal changes in plant biomechanics throughout vegetative season. These were obtained with use...

10.3390/w10050540 article EN Water 2018-04-24

In this paper, the theoretical foundations of developed methods for finding remains multi-digit numbers and Mersenne number in a binary system are given, use which allows reducing time complexity. The numerical experiments characteristics program implementations proposed approaches classical method given. scheme algorithm remainder is

10.1109/acitt.2019.8779899 article EN 2022 12th International Conference on Advanced Computer Information Technologies (ACIT) 2019-06-01

Intensive development of information systems has led to an increase in malicious software, which is associated with the emergence new types cyber attacks. Expanding impact attacks aimed at a variety resources system initiates creation special countermeasures that can be effective threats from unknown or ill-defined properties. There are enough developments, used solve problems identification, for example, method linguistic etalons formation detection intrusion systems, does not disclose...

10.1109/idaacs.2017.8095087 article EN 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) 2017-09-01

The following topics are dealt with: learning (artificial intelligence); particle swarm optimisation; wireless sensor networks; feature extraction; evolutionary computation; convolutional neural nets; image classification; search problems.

10.1109/idaacs.2019.8924395 article EN 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) 2019-09-01

The objective of the paper was to reveal main techniques and means ensuring integrity data persistent stored database modules implemented in accordance with recommendations Clark–Wilson model as a methodological basis for building system that ensures integrity. considered built according schema universal relations. mechanisms developed process researching problem programs such were based on provisions relational theory, Row Level Security technology, potential modern blockchain model,...

10.3390/app11188781 article EN cc-by Applied Sciences 2021-09-21

Pseudorandom number and bit sequence generators are widely used in cybersecurity, measurement, other technology fields. A special place among such is occupied by additive Fibonacci (AFG). By itself, a generator not cryptographically strong. Nevertheless, when as primary it can be quite resistant to cryptanalysis generators. This paper proposes modification AGF, the essence of which use prime numbers modules recurrent equations describing operation made possible ensure constancy repetition...

10.3390/electronics10232912 article EN Electronics 2021-11-24

The existence of modern humanity directly depends on environmental security. Human society, biodiversity, ecosystems, and climate safety are interdependent. anthropogenic influence that causes irreversible change threatens both the ecosystem’s humans’ survival. To maintain a balance between human well-being safe environment, it is important to have diverse knowledge interrelations technological impact natural environment an understanding action strategies mitigate ensure sustainable...

10.1155/2023/5584750 article EN cc-by Complexity 2023-11-07
Coming Soon ...