Filters
total: 18562
filtered: 15369
-
Catalog
- Publications 15369 available results
- Journals 936 available results
- Conferences 182 available results
- Publishing Houses 1 available results
- People 460 available results
- Inventions 4 available results
- Projects 46 available results
- Laboratories 1 available results
- Research Teams 2 available results
- Research Equipment 8 available results
- e-Learning Courses 591 available results
- Events 50 available results
- Open Research Data 912 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: KNOWLEDGE MANAGEMENT, KNOWLEDGE SECURITY, KNOWLEDGE RISKS, COVID-19, CONCEPTUAL PAPER, INTEGRATIVE MODEL
-
Lung Protection by Cathepsin C Inhibition: A New Hope for COVID-19 and ARDS?
Publication -
Coping Styles, Mental Health, and the COVID-19 Quarantine: A Nationwide Survey in Poland
Publication -
Unmasking the COVID-19 pandemic prevention gains: excess mortality reversal in 2022
Publication -
Project and Prototype of Mobile Application for Monitoring the Global COVID-19 Epidemiological Situation
Publication -
Efficiency rating of SG Diagnostics COVID-19 antigen rapid test kit
Publication -
Antenatal Classes in the Context of Prenatal Anxiety and Depression during the COVID-19 Pandemic
Publication -
SACAM A Model for Describing and Classifying Sentiment Analysis Methods
PublicationIn this paper we introduce SACAM — a model for describing and classifying sentiment analysis (SA) methods. The model focuses on the knowledge used during processing textual opinions. SACAM was designed to create informative descriptions of SA methods (or classes of SA methods) and is strongly integrated with its accompanying graphical notation suited for presenting the descriptions in diagrammatical form. The paper discusses applications...
-
Forecasting risks and challenges of digital innovations
PublicationForecasting and assessment of societal risks related to digital innovation systems and services is an urgent problem, because these solutions usually contain artificial intelligence algorithms which learn using data from the environment and modify their behaviour much beyond human control. Digital innovation solutions are increasingly deployed in transport, business and administrative domains, and therefore, if abused by a malicious...
-
Ukraine’s Energy Security in Strategies
PublicationDuring the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...
-
Web Questionnaire as Construction Method of Affect-annotated Lexicon - Risks Reduction Strategy
PublicationThe paper concerns credibility of construction methods for affect-annotated lexicons, specifically a web questionnaire is explored and evaluated. Web-based surveys are susceptible to some risks, which might influence credibility of the results, as some participants might perform random clicks or intentionally falsify the responses. The paper explores the risks and proposes some strategies to reduce them. The strategies are supported...
-
Managing the security vulnerabilities of critical systems and hazardous plants
PublicationRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....
-
Fungi-derived agriculturally important nanoparticles and their application in crop stress management – Prospects and environmental risks
Publication -
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublicationThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Urban Mentoring as a new polish management technique in participatory planning
PublicationA decade of experience in implementation of numerous urban modernization projects in Poland resulted in a lively debate on socialization of the planning process, in which the matter of the public space quality has become the center of gravity. In those years, transformation from the classic administrative model of „bureaucracy planning” to the model of „management planning” has not been complete. The socialist primacy of the public...
-
Designing effective educational games - a case study of a project management game
PublicationThis paper addresses the issues of designing effective educational games. We aim at investigating how the cognitive, behavioral and emotional aspects of the games influence their educational effectiveness. The results were obtained with an observational user experience study extended with affect analysis carried out for a project management game GraPM. We analyzed the...
-
Technological solutions to landfill management: Towards recovery of biomethane and carbon neutrality
PublicationInadequate landfill management poses risks to the environment and human health, necessitating action. Poorly designed and operated landfills release harmful gases, contaminate water, and deplete resources. Aligning landfill management with the Sustainable Development Goals (SDGs) reveals its crucial role in achieving various targets. Urgent transformation of landfill practices is necessary to address challenges like climate change,...
-
Adapting Agile Practices to Security Context – Practitioners’ Perspective
PublicationIn this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...
-
Information based integration for complex systems. W: Knowledge and infor-mation technology management in the 21st century organizations. Ed. A. Gu- nasekaran, O. Khalil, M.R. Syed. London: Idea**2002 s. 89-104 Informacyjna integracja systemów złożonych.
PublicationW rozdziale zaproponowano strukturę inteligentnego systemu wspomagania pro-cesu integracji dla złożonych systemów wytwarzania. System wspomagania opar-to na bazie wiedzy, w której wiedza modelowana jest regulami produkcji. Zbu-dowano również iteracyjny algorytm integracji. Samą ideę integracji opartona przepływach informacyjnych.
-
Growing role of walking and cycling and the associated risks
PublicationIncreasing the role of active mobility, including walking and cycling, is one of the tools for developing sustainable urban transport systems as recommended by the EU. The article describes the trends in pedestrian and bicycle traffic in Poland and its share in urban modal split. It identifies and describes the main sources of risks to pedestrian and cycle safety. Recommendations are...
-
Lonely and thinking about the past: The role of time perspectives, Big Five traits and perceived social support in loneliness of young adults during COVID-19 social distancing
PublicationBackground In Spring 2020, due to the COVID-19 pandemic, the Polish government introduced a policy of social distancing. Being apart from one’s social network had the potential to evoke feelings of loneliness. The aim of the study was to find out how time perspectives might contribute to feeling lonely during the social distancing period, controlling for Big Five personality traits and perceived social support. Participants...
-
Building collective intelligence through experience: a survey on the use of the KREM model
PublicationThis article presents a survey on the use of KREM, a generic knowledge-based framework for building collective intelligence through experience. After a discussion on the disadvantages of the traditional architecture used to deploy intelligent systems, the KREM architecture (Knowledge, Rules, Experience, Meta-Knowledge) is presented. The novelty of the proposal comes from the inclusion of the capitalisation of experience and the...
-
Mobility Management Solutions for IP Networks Comparative Analysis of IP-based Mobility Protocols and Handover Algorithms Invited Paper
PublicationA rapid growth of IP-based networks and services hascreated a vast collection of resources and functionalities availableto users by means of a uniform method of access offered by the IPprotocol. At the same time, advances in the design of mobileelectronic devices allowed them to reach a utility levelcomparable to desktop computers, while still retaining theirmobility advantage. Unfortunately, the base IP protocol does notperform...
-
Towards a process based management system for oil port infrastructure in context of insurance
PublicationThis article addresses selected methodological aspects of a process based management system based on analysis of hazards and threats and risk evaluation for an oil port infrastructure in context of insurance. The oil port terminal is regarded as important system of the critical infrastructure that require careful system oriented approach to deal with integrated aspects of environmental, safety and security management to reduce...
-
Standards on Cyber Security Assessment of Smart Grid
PublicationSecurity evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...
-
Some Security Features of Selected IoT Platforms
PublicationIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
A model-based approach to analysis of security protocols - a case study
PublicationArtykuł przedstawia zintegrowane środowisko analizy protokołów bezpieczeństwa. Środowisko zostało oparte o znaną metodę formalną CSP oraz wspierające ją narzędzia: Casper oraz FDR. Integralną częścią opisywanego środowiska jest pół-formalne zorientowane obiektowo podejście do modelowania protokołów kryptograficznych, ich kontekstu aplikacyjnego oraz wymagań bezpieczeństwa. Modelowanie obiektowe zostało oparte o język UML oraz...
-
A model for agribusiness supply chain risk management using fuzzy logic. Case study: Grain route from Ukraine to Poland
PublicationIn order to establish new logistics routes, it is necessary to address several technical and organizational issues, among others. One of the most important criteria for evaluating the performance of a supply chain is the delivery time, proactive consideration of potential hazards and associated uncertainties that may occur along the route. However, the existing solutions are often passive and reactive, based on statistics, thus...
-
MagMax: Leveraging Model Merging for Seamless Continual Learning
PublicationThis paper introduces a continual learning approach named MagMax, which utilizes model merging to enable large pre-trained models to continuously learn from new data without forgetting previously acquired knowledge. Distinct from traditional continual learning methods that aim to reduce forgetting during task training, MagMax combines sequential fine-tuning with a maximum magnitude weight selection for effective knowledge integration...
-
Cognitive engineering and functional safety technology for reducing risks in hazardous plants
PublicationCognitive engineering is considered nowadays as interesting multidisciplinary domain that focuses on improving the relations between humans and the systems that are supervised and operated. The industrial automation and control systems (IACS) in hazardous plants are increasingly computerized and perform various safety functions. These are designed and implemented according to the functional safety concept. The objective is to maintain...
-
Supporting Software Project Management Processes Using the Agent System
PublicationThe natural development of information technology area stimulates intense growth of various technologies which support basic organization processes. The range of technologies implies appropriate management thereof, as well as accurate correspondence with conducted activities. Abandonment of activities within individual branches in favour of project approach to performed assignments (especially those connected with software development)...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Hybrid Approach in Project Management - Mixing Capability Maturity Model Integration with Agile Practices
PublicationThis paper introduces an idea of hybrid approach in managing software development projects. The main goal of this research is to prove that it is possible to design consistent method for managing software development projects which is based on different corporate standards and methods. Authors also want to show that this new hybrid approach is beneficial for IT organization, triggers synergy effects and brings software development...
-
Areas of research in maritime security
PublicationW referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.
-
A Quality Model for UML tools
PublicationJakość narzędzi UML wpływa na efektywność wykonywania zadań związanych z modelowaniem systemów w procesie wytwarzania oprogramowania. Celem badań prezentowanych w tym referacie jest wyodrębnienie kryteriów jakości narzędzi UML. Omówiono rolę narzędzi UML w projekcie informatycznym, a następnie zaprezentowano szereg kryteriów jakości narzędzi UML wraz z aspektami oceny oraz opisem ankiety, która służy do oceny narzędzi względem...
-
The elasto-viscoplstic Chaboche model
PublicationW artykule przedstawiono rozwoj i numeryczną aplikacje sprężysto-lepkoplastycznego modelu Chabocha. Przedstawione są także szczegółowe opisy kilkunastu wariantów modelu Chaboche'a wraz z parametrami materiałowymi.
-
Determining and verifying the safety integrity level with security aspects
PublicationSafety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...
-
THE SELECTION OF STRESS COPING STRATEGIES BY UNIVERSITY STUDENTS BASED ON PRIOR COVID-19 EXPOSURE
Publication -
Strategies for Coping With Stress Used by Nurses in Poland and Belarus During the COVID-19 Pandemic
Publication -
Stock market reactions under the shadow of the COVID-19 pandemic: Evidence from China
Publication -
Term spreads and the COVID-19 pandemic: Evidence from international sovereign bond markets
Publication -
Clinical Training during the COVID-19 Pandemic: Experiences of Nursing Students and Implications for Education
Publication -
Does Treatment of Sudden Sensorineural Hearing Loss in Patients With COVID-19 Require Anticoagulants?
Publication -
The COVID-19 pandemic in the Middle East and North Africa. Old demons in a new bottle
Publication -
Better Late Than Never: Predictors of Delayed COVID-19 Vaccine Uptake in Poland
Publication -
Brain Fog and Quality of Life at Work in Non-Hospitalized Patients after COVID-19
Publication -
Social support against depression in young adults’ group during COVID-19 pandemic.
Publication -
Vaccine versus infection – COVID-19-related loss of training time in elite athletes
Publication -
Mental health predictors of medical staff in the early stage of COVID-19 pandemic in Poland.
Publication -
Theoretical Investigation of the Coronavirus SARS-CoV-2 (COVID-19) Infection Mechanism and Selectivity
Publication