https://journal.mostwiedzy.pl/TASKQuarterly/issue/feedTASK Quarterly2025-07-18T12:45:58+02:00TASK Quarterly Editorial Boardagnieszka.lipska@pg.edu.plOpen Journal Systems<p><strong>TASK Quarterly</strong> journal is presenting articles concerning usage of information technologies to solve important problems in science and engineering, including applications of high computing power infrastructure and artificial intelligence methods in various types of research and development projects.</p>https://journal.mostwiedzy.pl/TASKQuarterly/article/view/3416Two architectures of neural networks in distance approximation2024-12-04T11:24:13+01:00Wiktor Wojtynaw.r.wojtyna@gmail.comJakub Sławińskikuba.slawinski.2003@gmail.comRadosław Tongatongaradek@gmail.com<p>In this research paper, we examine recurrent and linear neural networks to determine the relationship between the<br />amount of data needed to achieve generalization and data dimensionality, as well as the relationship between data<br />dimensionality and the necessary computational complexity. To achieve this, we also explore the optimal topologies<br />for each network, discuss potential problems in their training, and propose solutions. In our experiments, the relation-<br />ship between the amount of data needed to achieve generalization and data dimensionality was linear for feed-forward<br />neural networks and exponential for recurrent ones. However, the required computational complexity appears to grow<br />exponentially with increasing dimensionality. We also compared the networks’ accuracy in both distance approxima-<br />tion and classification to the most popular alternative, siamese networks, which outperformed both linear and recurrent<br />networks in classification despite having lower accuracy in exact distance approximation.</p>2025-07-18T00:00:00+02:00Copyright (c) 2025 TASK Quarterlyhttps://journal.mostwiedzy.pl/TASKQuarterly/article/view/3509Document coordination patterns2025-06-10T14:31:20+02:00Bogdan Wiszniewskibogwiszn@pg.edu.plMagdalenia Godlewskamagdalena.godlewska@pg.edu.pl<p class="p1">Many organizations lack support for document workflow management, making it difficult to efficiently handle business processes. Implementing a workflow management service that encompasses all organizational tasks is both complex and costly. However, document workflows can be observed as structured sets of identifiable workflow patterns. These patterns have been extensively described in the literature based on real-world organizational processes. By adopting and integrating these patterns into document workflows, it is possible to enable documents to autonomously determine the processes they should execute. The paper explores the application of a well-known set of workflow patterns in email-based document workflows and outlines the necessary conditions for integrating workflow management directly into documents. Documents circulating within an organization can easily collect information about their workflow in the form of logs with minimal effort. By applying process mining techniques, it is possible to extract the actual processes they follow. The proposed in the paper canonical set of document workflow patterns enables a much faster implementation of a document management application compared to a top-down approach, where processes are theoretically defined first and then implemented.</p>2025-07-18T00:00:00+02:00Copyright (c) 2025 TASK Quarterlyhttps://journal.mostwiedzy.pl/TASKQuarterly/article/view/3534A Survey on Privacy-Preserving Machine Learning Inference2025-04-01T15:30:55+02:00Stanisław Barańskistanislaw.baranski@pg.edu.pl<p>This paper examines methods to secure machine learning inference (ML inference) so that sensitive data remains private and proprietary models are protected during remote processing. We review several approaches—from cryptographic techniques like homomorphic encryption (HE) and secure multi-party computation (MPC), to hardware solutions such as trusted execution environments (TEEs), and complementary methods including differential privacy and split learning. Each method is analyzed in terms of security, efficiency, communication overhead, and scalability. Use cases in healthcare, finance, and education show how these techniques balance privacy with practical performance. We conclude by outlining open challenges and future directions for building robust, efficient privacy-preserving ML inference systems.</p>2025-07-18T00:00:00+02:00Copyright (c) 2025 TASK Quarterly