scispace - formally typeset
Search or ask a question
Author

Jan Derkacz

Bio: Jan Derkacz is an academic researcher. The author has contributed to research in topics: Computer science & Network planning and design. The author has an hindex of 1, co-authored 1 publications receiving 234 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, some network topologies for such a pan-European fiber-optic backbone network are presented and a distinction is made between different recovery options in the optical layer for the different traffic types considered.
Abstract: The traffic to be carried by today's European backbone networks increases very rapidly. An important portion of this traffic consists of data traffic (mainly IP-related). In the future data traffic is expected to become the abundantly dominant traffic type, while voice traffic will only account for a very small portion of the total traffic volume. In this paper, some network topologies for such a pan-European fiber-optic backbone network are presented (more details can be found in [1]). These topologies are compared in terms of the efficiency of the network design both from a cost and capacity point of view and in terms of the availability of the connections routed over this network. In order to be able to assess the network topologies under realistic circumstances, the expected traffic demand is forecasted. This enables to make the comparison for the current traffic volume as well as for the traffic patterns of the future. As not all types of (data) traffic require the same degree of survivability and in order to leverage the total capacity cost of the network design, a distinction is made between different recovery options in the optical layer for the different traffic types considered.

240 citations

Journal ArticleDOI
TL;DR: In this paper , the applicability of workflow management systems in conjunction with image recognition and machine learning methods has been explored in the supervision of the repair and diagnostic works in a real industrial environment.
Abstract: Abstract Supervision of repair and diagnostic works aimed at improving the safety of maintenance crews is one of the key objectives of the distributed INRED system. Working in a real industrial environment, the INRED system includes, among others, the so-called INRED-Workflow, which provides an infrastructure for process automation. Participants of the service processes, managed by the INRED-Workflow, are controlled at each stage of the performed service procedures, both by the system and other process participants, such as quality managers and technologists. All data collected from the service processes is stored in the System Knowledge Repository (SKR) for further processing by using advanced algorithms, and the so-called Smart Procedures merge services supplied by other INRED system modules. The applicability of workflow management systems in conjunction with image recognition and machine learning methods has not yet been thoroughly explored. The presented paper shows the innovative usage of such systems in the supervision of the repair and diagnostic works.

1 citations

Journal ArticleDOI
22 Oct 2022-Sensors
TL;DR: A novel data-embedding method based on the Periodic Haar Piecewise-Linear (PHL) transform that seems to be suitable for applications in digital signal and image processing where high imperceptibility and low BER are required, and information security is of high importance.
Abstract: The paper presents a novel data-embedding method based on the Periodic Haar Piecewise-Linear (PHL) transform. The theoretical background behind the PHL transform concept is introduced. The proposed watermarking method assumes embedding hidden information in the PHL transform domain using the luminance channel of the original image. The watermark is embedded by modifying the coefficients with relatively low values. The proposed method was verified based on the measurement of the visual quality of an image with a watermark with respect to the length of the embedded information. In addition, the bit error rate (BER) is also considered for different sizes of a watermark. Furthermore, a method for the detection of image manipulation is presented. The elaborated technique seems to be suitable for applications in digital signal and image processing where high imperceptibility and low BER are required, and information security is of high importance. In particular, this method can be applied in systems where the sensitive data is transmitted or stored and needs to be protected appropriately (e.g., in medical image processing).
Book ChapterDOI
01 Jan 2022
TL;DR: In this paper , the approach to define cybersecurity certification schemes as candidate methods for sector cybersecurity product certification as part of the EU Cybersecurity Certification Framework being prepared by ENISA is described.
Abstract: AbstractThis paper documents the approach to define cybersecurity certification schemes as candidate methods for sector cybersecurity product certification as part of the EU Cybersecurity Certification Framework being prepared by ENISA. Indeed, it is a very recent area of research within the EU landscape. Our work was undertaken within H2020 ECHO project (www.echonetwork.eu) and it is reported in detail in its deliverables. This document is completing the research reported in our previous publication, which had complete references to the existing state of the art about the certification topic in EU. Our work started with the identification of the sector-specific needs to be addressed for specific critical sectors. The mandatory Key Elements of a certification scheme, as described in the EU Cybersecurity Act, have been customized and the sector specific analysis allowed to define a Security Problem Definition baseline to be used to quickly draft a Protection Profile of an asset category of the considered sectors. Security needs have been identified using also the sectoral risk assessment guidelines provided by ENISA for certification purposes. It has also been developed an inter sector risk scenario to highlight the most important security needs to mitigate cross-sector security failures. Finally, Cyber Range technologies have been leveraged for the Conformity Assessment activities of two Maritime and a Healthcare product prototypes, for which the substantial assurance level certification has been simulated for the sake of validation of our approach. KeywordsCertification schemeSecurity problem definitionSectoral risk assessmentProtection profileCyber rangeAssurance levelMaritimeHealthcareEnergy

Cited by
More filters
Journal IssueDOI
01 May 2010-Networks
TL;DR: The data concepts of SNDlib are discussed and a mathematical model for each design problem considered in the library is described, which leads to 830 network design problem instances.
Abstract: This article describes the Survivable Network Design Library (SNDlib), a data library for fixed telecommunication network design available at . In the current version 1.0, the library contains data related to 22 networks which, combined with a set of selected planning parameters, leads to 830 network design problem instances. In this article, we discuss the data concepts of SNDlib and describe a mathematical model for each design problem considered in the library. We also provide information on characteristic features and the origin of the SNDlib problem instances. © 2009 Wiley Periodicals, Inc. NETWORKS, 2010

579 citations

Proceedings Article
01 Jan 2007
TL;DR: The Survivable Network Design Library (SNDlib), a data library for fixed telecommunication network design, is described and a mathematical model for each design problem considered in the library is described.
Abstract: This article describes the Survivable Network Design Library (SNDlib), a data library for fixed telecommunication network design available at http://sndlib. zib.de. In the current version 1.0, the library contains data related to 22 networks which, combined with a set of selected planning parameters, leads to 830 network design problem instances. In this article, we discuss the data concepts of SNDlib and describe a mathematical model for each design problem considered in the library. We also provide information on characteristic features and the origin of the SNDIib problem instances.

535 citations

Journal ArticleDOI
TL;DR: This paper adds the recovery action in the switches themselves so that the switches can do recovery without contacting the controller, and shows that this approach can achieve recovery within 50ms in a large-scale network serving many flows.

217 citations

Proceedings ArticleDOI
27 Dec 2005
TL;DR: This paper reports the initiative taken within the IST-project NOBEL to define a general availability model and collect general availability numbers for several network equipment types, independent from vendor specific product information.
Abstract: This paper reports the initiative taken within the IST-project NOBEL to define a general availability model and collect general availability numbers for several network equipment types, independent from vendor specific product information. The model includes optical layer equipment as well as IP and SDH equipment, described using a triplet-representation for each of the availability measures with optimistic, nominal and conservative values. The availability model has been applied to different typical transport network scenarios. Several case studies were performed to compare the end-to-end connection availability and the required network capacity for different resilience mechanisms.

121 citations

01 Jan 2003
TL;DR: The European network has 28 nodes and is therefore the largest network, while the German network (17 nodes) and the US network (14 nodes) have about the same number of nodes and links.
Abstract: The European network has 28 nodes and is therefore the largest network. The German network (17 nodes) and the US network (14 nodes) have about the same number of nodes (n) and links (k). Average node degree ( n k / 2 ⋅ ) is approximately the same for all networks. Minimum, maximum, and average link length is significantly larger in the European network compared to the German network. The US network contains both rather short and very long links.

119 citations