https://journal.mostwiedzy.pl/TASKQuarterly/issue/feed TASK Quarterly 2025-07-18T12:45:58+02:00 TASK Quarterly Editorial Board agnieszka.lipska@pg.edu.pl Open Journal Systems <p><strong>TASK Quarterly</strong> journal is presenting articles concerning usage of information technologies to solve important problems in science and engineering, including applications of high computing power infrastructure and artificial intelligence methods in various types of research and development projects.</p> https://journal.mostwiedzy.pl/TASKQuarterly/article/view/3416 Two architectures of neural networks in distance approximation 2024-12-04T11:24:13+01:00 Wiktor Wojtyna w.r.wojtyna@gmail.com Jakub Sławiński kuba.slawinski.2003@gmail.com Radosław Tonga tongaradek@gmail.com <p>In this research paper, we examine recurrent and linear neural networks to determine the relationship between the<br />amount of data needed to achieve generalization and data dimensionality, as well as the relationship between data<br />dimensionality and the necessary computational complexity. To achieve this, we also explore the optimal topologies<br />for each network, discuss potential problems in their training, and propose solutions. In our experiments, the relation-<br />ship between the amount of data needed to achieve generalization and data dimensionality was linear for feed-forward<br />neural networks and exponential for recurrent ones. However, the required computational complexity appears to grow<br />exponentially with increasing dimensionality. We also compared the networks’ accuracy in both distance approxima-<br />tion and classification to the most popular alternative, siamese networks, which outperformed both linear and recurrent<br />networks in classification despite having lower accuracy in exact distance approximation.</p> 2025-07-18T00:00:00+02:00 Copyright (c) 2025 TASK Quarterly https://journal.mostwiedzy.pl/TASKQuarterly/article/view/3509 Document coordination patterns 2025-06-10T14:31:20+02:00 Bogdan Wiszniewski bogwiszn@pg.edu.pl Magdalenia Godlewska magdalena.godlewska@pg.edu.pl <p class="p1">Many organizations lack support for document workflow management, making it difficult to efficiently handle business processes. Implementing a workflow management service that encompasses all organizational tasks is both complex and costly. However, document workflows can be observed as structured sets of identifiable workflow patterns. These patterns have been extensively described in the literature based on real-world organizational processes. By adopting and integrating these patterns into document workflows, it is possible to enable documents to autonomously determine the processes they should execute. The paper explores the application of a well-known set of workflow patterns in email-based document workflows and outlines the necessary conditions for integrating workflow management directly into documents. Documents circulating within an organization can easily collect information about their workflow in the form of logs with minimal effort. By applying process mining techniques, it is possible to extract the actual processes they follow. The proposed in the paper canonical set of document workflow patterns enables a much faster implementation of a document management application compared to a top-down approach, where processes are theoretically defined first and then implemented.</p> 2025-07-18T00:00:00+02:00 Copyright (c) 2025 TASK Quarterly https://journal.mostwiedzy.pl/TASKQuarterly/article/view/3534 A Survey on Privacy-Preserving Machine Learning Inference 2025-04-01T15:30:55+02:00 Stanisław Barański stanislaw.baranski@pg.edu.pl <p>This paper examines methods to secure machine learning inference (ML inference) so that sensitive data remains private and proprietary models are protected during remote processing. We review several approaches—from cryptographic techniques like homomorphic encryption (HE) and secure multi-party computation (MPC), to hardware solutions such as trusted execution environments (TEEs), and complementary methods including differential privacy and split learning. Each method is analyzed in terms of security, efficiency, communication overhead, and scalability. Use cases in healthcare, finance, and education show how these techniques balance privacy with practical performance. We conclude by outlining open challenges and future directions for building robust, efficient privacy-preserving ML inference systems.</p> 2025-07-18T00:00:00+02:00 Copyright (c) 2025 TASK Quarterly