Jan Lansky

Jan Lansky
University of Finance and Administration | VSFS · Department of Computer Science and Mathematics

Ph.D.

About

60
Publications
38,502
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
879
Citations
Introduction
Jan Lansky currently works at the Department of Computer Science and Mathematics, The University of Finance and Administration. Jan does research in Cryptocurrencies, Databases, and Software Engineering.

Publications

Publications (60)
Article
Full-text available
In this paper, we introduce an improved water strider algorithm designed to solve the inverse form of the Burgers-Huxley equation, a nonlinear partial differential equation. Additionally, we propose a physics-informed neural network to address the same inverse problem. To demonstrate the effectiveness of the new algorithm and conduct a comparative...
Article
Full-text available
Flying ad hoc network (FANET) is a new technology, which creates a self-organized wireless network containing unmanned aerial vehicles (UAVs). In FANET, routing protocols deal with important challenges due to limited energy, frequent link failures, high mobility of UAVs, and limited communication range of UAVs. Thus, a suitable path is always essen...
Article
Full-text available
With electronic healthcare systems undergoing rapid change, optimizing the crucial process of recording physician prescriptions is a task with major implications for patient care. The power of blockchain technology and the precision of the Raft consensus algorithm are combined in this article to create a revolutionary solution for this problem. In...
Article
Full-text available
A flying ad hoc network (FANET) is formed from a swarm of drones also known as unmanned aerial vehicles (UAVs) and is currently a popular research subject because of its ability to carry out complicated missions. However, the specific features of UAVs such as mobility, restricted energy, and dynamic topology have led to vital challenges for making...
Article
Full-text available
This study conducts an in-depth review of the Social Internet of Things (SIoT), a significant advancement from the conventional Internet of Things (IoT) via the integration of socialization principles akin to human interactions. We explore the architecture, trust management, relationship dynamics, and other crucial aspects of SIoT, with a particula...
Preprint
Full-text available
Flying ad hoc network (FANET) is a new technology, which creates a self-organized wireless network containing unmanned aerial vehicles (UAVs). In FANET, routing protocols deal with important challenges due to limited energy, frequent failures in communication links, high mobility of UAVs, and limited communication range of UAVs. Thus, a suitable pa...
Article
Full-text available
RFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privacy. Vulnerabilities such as message tampering, interception, and eavesdropping pose significant risks to the integrity of the system....
Article
Full-text available
Epileptic seizures can be dangerous as they cause sudden and uncontrolled electrical activity in the brain which can lead to injuries if one falls or loss of control over physical functions. To mitigate these risks, machine learning and deep learning algorithms are being developed to anticipate seizure occurrences. Accurate prediction of seizures c...
Article
Full-text available
Presents corrections to the paper, (Corrections to “Deep Learning-Based Intrusion Detection Systems: A Systematic Review”).
Article
Full-text available
In wireless sensor networks (WSNs), existing routing protocols mainly consider energy efficiency or security separately. However, these protocols must be more comprehensive because many applications should guarantee security and energy efficiency, simultaneously. Due to the limited energy of sensor nodes, these protocols should make a trade-off bet...
Article
Full-text available
Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to human life. Due to the use of WSNs in various areas, like health care and battlefield, security is an important concern in the data transfer procedure to prevent data manipulation. Trust management is an affective scheme to solve these problems by building tr...
Article
Full-text available
The Internet of Things (IoT) is a universal network to supervise the physical world through sensors installed on different devices. The network can improve many areas, including healthcare because IoT technology has the potential to reduce pressure caused by aging and chronic diseases on healthcare systems. For this reason, researchers attempt to s...
Article
Full-text available
Flying ad-hoc networks (FANETs) include a large number of drones, which communicate with each other based on an ad hoc model. These networks provide new opportunities for various applications such as military, industrial, and civilian applications. However, FANETs have faced with many challenges like high-speed nodes, low density, and rapid changes...
Article
Full-text available
In the Internet of Things (IoT) ecosystem, some processing is done near data production sites at higher speeds without the need for high bandwidth by combining Fog Computing (FC) and cloud computing. Fog computing offers advantages for real-time systems that require high speed internet connectivity. Due to the limited resources of fog nodes, one of...
Article
Full-text available
Today, the use of safety solutions in Intelligent Transportation Systems (ITS) is a serious challenge because of novel progress in wireless technologies and the high number of road accidents. Vehicular ad hoc network (VANET) is a momentous element in this system because they can improve safety and efficiency in ITS. In this network, vehicles act as...
Article
Full-text available
Air pollution has changed ecosystem and atmosphere. It is dangerous for environment, human health, and other living creatures. This contamination is due to various industrial and chemical pollutants, which reduce air, water, and soil quality. Therefore, air quality monitoring is essential. Flying ad hoc networks (FANETs) are an effective solution f...
Article
Full-text available
The rapid development of technology has made the Internet of Things an integral element of modern society. Modern Internet of Things’ implementations often use Fog computing, an offshoot of the Cloud computing that offers localized processing power at the network’s periphery. The Internet of Things serves as the inspiration for the decentralized so...
Article
Full-text available
In recent years, flying ad hoc networks have attracted the attention of many researchers in industry and universities due to easy deployment, proper operational costs, and diverse applications. Designing an efficient routing protocol is challenging due to unique characteristics of these networks such as very fast motion of nodes, frequent changes o...
Article
Full-text available
Many scientific fields need to know how human systems develop. From an economic point of view, the main factors of system output change are changes in the quantity of inputs (extensive factors) and changes in efficiency (input quality and productivity, intensive factors). The growth accounting (GA) method is used for the calculation of the impact o...
Article
Full-text available
In this paper, targeting efficient authentication and key agreement in an IoT environment, we propose an Elliptic Curve Cryptography- (ECC) based lightweight authentication protocol called BCmECC which relies on a public blockchain to validate the users’ public key to provide desired security. We evaluate the security of the proposed protocol heuri...
Article
Full-text available
The cryptocurrency market is very young, volatile, and highly risky. By the end of 2020, a new bull run started, and the prices of several cryptocurrencies reached record-breaking highs. The factors affecting this rise of cryptocurrencies include the impacts of the COVID-19 pandemic, the economic crisis and the global increase in the inflation rate...
Article
Full-text available
Providing the desired security for constrained devices in the edge of Internet of Things (IoT) systems is a challenging task. Given that those devices are in shortage of the area and energy, many lightweight and ultra-lightweight protocols have been proposed so far in the literature. On the other hand, while we see many new proposals in the literat...
Article
Full-text available
Roaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her mobile carrier network is not available. In this case, the mobile device is in roaming mode. In this...
Preprint
Full-text available
The ever-increasing complication and severity of the computer networks' security attacks have inspired security researchers to apply various machine learning methods to protect the organizations' data and reputation. Deep learning is one of the exciting techniques that recently have been widely used by intrusion detection systems (IDS) to secure co...
Article
Full-text available
Nowadays, the ever-increasing complication and severity of security attacks on computer networks have inspired security researchers to incorporate different machine learning methods to protect the organizations’ data and reputation. Deep learning is one of the exciting techniques which recently are vastly employed by the IDS or intrusion detection...
Article
Full-text available
In this paper, we analyse the security of two mutual authentication protocols that have been recently proposed by Gao et al. (IEEE Access, 7:8376–8384, 2019), a hash-based protocol and a Rabin public key based protocol. Our security analysis clearly shows important security pitfalls in these schemes. More precisely, in each protocol, we introduce e...
Article
Full-text available
Radio Frequency Identification (RFID) systems represent a key technology for ubiquitous computing and for the deployment of the Internet of Things (IoT). In RFID technology, authentication protocols are often necessary in order to confirm the identity of the parties involved (i.e. RFID readers, RFID tags and/or database servers). In this article, w...
Article
Full-text available
The communication security of constrained objects such as radio frequency identification (RFID) tags and wireless sensor network (WSN) is very challenging because it is not always possible to use the conventional on-the-shelf solutions for them, due to their limited available power and computational capabilities. To deal with this demand, many secu...
Article
Full-text available
Cryptocurrencies have become a major phenomenon in recent years. For IT, a breakthrough is both the cryptocurrency itself as a commodity and the technology that cryptocurrency development has brought. The article focuses on the bitcoin cryptocurrency as the most important cryptocurrency. A relatively unexplored topic is what goods/services are purc...
Conference Paper
The great phenomenon of the present era are cryptocurrencies. Cryptocurrencies many sides, they can be scrutinized from the point of view of informatics, economics and financial markets, from the point of view of social consequences or the framework of ethics. The aim of the article is to investigate the issue of cryptocurrencies according to the w...
Article
Full-text available
Cryptocurrencies are a type of digital currencies that are relying on cryptographic proofs for confirmation of transactions. Cryptocurrencies usually achieve a unique combination of three features: ensuring limited anonymity, independence from central authority and double spending attack protection. No other group of currencies, including fiat curr...
Article
Full-text available
This article is based on empirical research and 2007–2012 statistical data from joint stock companies which were active in the agriculture sector of the Czech Republic. It deals with the wider aspects of liquidity and stability using suitable liquidity indicators and a vertical financial analysis over a sufficient period of time providing valid res...
Article
Full-text available
Cryptocurrency systems are purely digital and decentralized systems that use cryptographic principles to confirm transactions. Bitcoin is the first and also the most widespread cryptocurrency. The aim of this article is to introduce Bitcoin system using a language understandable also to readers without computer science education. This article captu...
Article
Full-text available
Cryptocurrencies are a type of digital currencies based on cryptography principles. Cryptocurrencies are a unique combination of three characteristics: they provide anonymity, they are independent of central authority and they provide protection from double spending attack. The aim of this paper is to capture trends in the area of significant crypt...
Article
The article provides an indepth analysis of the petrochemical industry and its effect on inflation as measured by the consumer price index. It includes a thorough examination of diesel pricing, with an emphasis on the final price for customers. The article is based on the Czech economy case study and evaluates statistical data using 2004–2014 stati...
Conference Paper
Multimedia exploration is an entertaining approach for multimedia retrieval enabling users to interactively browse and navigate through multimedia collections in a content-based way. The multimedia exploration approach extends the traditional query-by-example retrieval scenario to be a more intuitive approach for obtaining a global overview over an...
Conference Paper
The traditional content-based retrieval approaches usually use flat querying, where whole multimedia database is searched for a result of some similarity query with a user specified query object. However, there are retrieval scenarios (e.g., multimedia exploration), where users may not have a clear search intents in their minds, they just want to i...
Article
Full-text available
Understanding the saliency of keyframes in short casual/home-made videos containing redundant information is an important step towards the design of successful keyframe selection and summarization techniques for such videos. Therefore, we present an extensive user study focusing on saliency of keyframes in such short redundant videos. In our study,...
Conference Paper
Full-text available
This contribution deals with teaching the subject Application Software at The University of Finance and Administration in Prague. We describe issues that we meet when teaching and that we try to tackle continuously. We consider the task of having the same teaching standard in all particular study groups without individual teachers' influence or lim...
Conference Paper
Full-text available
ECTS (European Credit Transfer System) is a credit system, which main aim is to unite and integrate higher education system in the whole European Union. ECTS LABEL is a certificate of the European Commission that declares the rightness of the implementation of the ECTS system. The report describes the preparation of VŠFS for acquiring the ECTS Labe...
Conference Paper
Full-text available
This contribution deals with SEPA Credit Transfer (from now SEPA CT), its formation, and it also describes reasons for the implementation of it. The main part deals with the European Payment Council body, which has created basic rules of using SEPA payments. Is SEPA CT the only kind of payments introduced by EPS? We will have a look at the support...
Conference Paper
Full-text available
The Microsoft office has been a dominant pack of office applications for almost two decades and thus skills for their correct and fast use are within standard requirements for office workers. Therefore, the Microsoft office has become a standard course for many high schools and universities focusing on office worker training. After training the stu...
Conference Paper
We present here a new statistical lossless data compression technique. Its performance is a bit higher than the one of arithmetic coding. It can be used in combination with other data transforms to create powerful compressing applications. According to our knowledge the principle, on which the method is built, is new. It is therefore likely that it...
Conference Paper
We present a data transformation and compression method based on decomposition of input stream into multiple streams of counters of passes through individual nodes of the specific binary tree. The streams are coded separately - using methods that can compress them best. The use of multiple streams has given the method its name: multistream compress...
Conference Paper
Full-text available
Burrows-Wheeler Transform (BWT) is used as the main part in block compression which has a good balance of speed and compression ratio. Suffix arrays are used in the coding phase of BWT and we focus on creating them for an alphabet larger than 256 symbols. The motivation for this work has been software project XBW-an application for compression of l...
Conference Paper
Full-text available
XBW [10] is modular program for lossless compression that enables testing various combinations of algorithms. We obtained best results with XML parser creating dictionary of syllables or words combined with Burrows-Wheeler transform - hence the name XBW. The motivation for creating parser that handles non-valid XML and HTML files, has been system E...
Conference Paper
Burrows-Wheeler Transform (BWT) is a compression method, which reorders an input string into the the form, which is preferable to another compression. Usually, Move-To-Front transform and then Huffman coding is used to the permutated string. This work is to compare the single file parsing methods used on input text files by means of Burrows-Wheeler...
Conference Paper
Dictionary is used by many compression methods. Some of them put the dictionary into the compressed message. In such cases the improvements in dictionary compression can improve the performance of the compression methods. We have focused on compression of dictionaries of words or syllables. The dictionary compression is often based on tree represen...
Conference Paper
Full-text available
The Burrows-Wheeler Transform (BWT) is a compression method which reorders an input string into the form, which is prefer- able to another compression. Usually Move-To-Front transform and then Human coding is used to the permutated string. The original method (3) from 1994 was designed for an alphabet compression. In 2001, versions working with wor...
Conference Paper
Full-text available
Syllable based text compression is a new approach to com- pression by symbols. In this concept syllables are used as the compres- sion symbols instead of the more common characters or words. This new technique has proven itself worthy especially on short to middle-length text files. The eectiveness of the compression is greatly aected by the qualit...
Conference Paper
Summary form only given. We adapted well-known algorithms of adaptive Huffman coding and LZW to use syllables and words instead of characters for text compression. We tested the algorithms on collections of small or middle-sized files. Using syllable-based compression algorithms on English documents gives expected results: they outperform character...
Conference Paper
Full-text available
Conference Paper
Full-text available
Syllable-based compression achieves suciently good results on text documents of a medium size. Since the majority of XML docu- ments are of that size, we suppose that the syllable-based method can give good results on XML documents, especially on documents that have a simple structure (small amount of elements and attributes) and rela- tively long...
Conference Paper
Full-text available
There are two basic types of text compression by symbols - in the first case symbols are represented by characters, in the second case by whole words. The first case is useful for very short files, the second case for very long files or large collections. We supposed that there exist yet another way where symbols are represented by units shorter th...
Article
Full-text available
EGOTHOR is a search engine that indexes the Web and allows us to search the Web documents. Its hit list contains URL and title of the hits, and also some snippet which tries to shortly show a match. The snippet can be almost always assembled by an algorithm that has a full knowledge of the original document (mostly HTML page). It implies that the s...

Network

Cited By