Filters
total: 18422
filtered: 15274
-
Catalog
- Publications 15274 available results
- Journals 935 available results
- Conferences 182 available results
- Publishing Houses 1 available results
- People 459 available results
- Inventions 4 available results
- Projects 45 available results
- Laboratories 1 available results
- Research Teams 2 available results
- Research Equipment 8 available results
- e-Learning Courses 555 available results
- Events 50 available results
- Open Research Data 906 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: KNOWLEDGE MANAGEMENT, KNOWLEDGE SECURITY, KNOWLEDGE RISKS, COVID-19, CONCEPTUAL PAPER, INTEGRATIVE MODEL
-
ESH Position Paper
Publication -
Security Assessment of a Turbo-Gas Power Plant
PublicationCritical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.
-
The Analysis of Vodka: A Review Paper
PublicationVodka is the most popular alcoholic beverage in Poland, Russia and other Eastern European countries, made from ethyl alcohol of agricultural origin that has been produced via fermentation of potatoes, grains or other agricultural products. Despite distillation and multiple filtering, it is not possible to produce 100 % ethanol. The solution with a minimum ethanol content of 96 %, which is used to produce vodkas, also contains trace amounts...
-
Security Information Sharing for the Polish Power System
PublicationThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Current challenges and methodological issues of functional safety and security management in hazardous technical systems
PublicationCelem artykułu jest zidentyfikowanie problemów oceny ryzyka w kontekście stosowania systemów elektrycznych / elektronicznych / programowalnych elektronicznych (E/E/PE) z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego i zabezpieczeń (ochrony). Zadaniem rozwiązań bezpieczeństwa funkcjonalnego jest efektywne redukowanie ryzyka wychodząc z poziomu nieakceptowanego. Ryzyko jest definiowane jako kombinacja prawdopodobieństwa wystąpienia...
-
Experience-Driven Model of Decision-Making Processes in Project Teams
PublicationThis article presents a model of decision-making processes in project teams. Project teams constitute a specific type of organization appointed to implement a project. Decisions made by project teams result from the methods of project management and best management practices. The authors have undertaken the task of formalizing these processes using the classical method of constructing decision trees. It has been established that...
-
Don't forget the dark side of green transformation
PublicationDesign/methodology/approach – The study is a continuation of the research by Durst and Zieba (2019) related to knowledge risks and their potential outcomes. This present study makes an update on the literature on knowledge risks and green transformation and describes knowledge risks that can be faced in this process. Originality/value – The paper offers new insights for researchers dealing with the topic of knowledge risks in...
-
Use of structural equation modeling in quantitative research in the field of management and economics: A bibliometric analysis in the systematic literature review
PublicationPURPOSE: This paper aims to provide a comprehensive review of scholarly research focusing on using quantitative methods and particularly structural equation modeling (SEM) in management and economics studies, as well as provide a bibliometric agenda including the time horizon of individual publications, the highest citation rate, geographic and industry areas, methodological context, and keywords. METHODOLOGY: A systematic literature...
-
Algorithms for testing security in graphs
PublicationIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Public Finance in Poland in a COVID Fog: A Look Through the Lens of Fiscal Transparency and Accountability
PublicationAbstract. Goal– The aim of the article is to identify dysfunctional phenomena (implementation of specific mechanisms/solutions and actions taken), generating increased opacity and limit the responsibility/accountability of public f inance in Poland, exacerbated by the COVID-19 crisis. Methods– descriptive analysis, comparative analysis and financial analysis methods were used. Results– fiscal transparency and accountability in...
-
Risk management model of winter navigation operations
Publication -
Security aspects in functional safety analysis
PublicationA security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...
-
Automatic sound recognition for security purposes
PublicationIn the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublicationModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Rapid Antenna Optimization with Restricted Sensitivity Updates by Automated Dominant Direction Identification
PublicationMeticulous tuning of geometry parameters turns pivotal in improving performance of antenna systems. It is more and more often realized using formal optimization methods, which is demonstrably the most efficient way of handling multiple design variables, objectives, and constraints. Although in some cases a need for launching global search arises, a typical design scenario only requires local optimization, especially when a decent...
-
Energy Security of Polish Consumers in 2004-2021
PublicationTheoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...
-
Abilities, Motivations, and Opportunities of Furloughed Employees in the Context of Covid-19: Preliminary Evidence From the UK
Publication -
COVID-19-Associated Mucormycosis (CAM): Case-Series and Global Analysis of Mortality Risk Factors
Publication -
Diversity of Students’ Unethical Behaviors in Online Learning Amid COVID-19 Pandemic: An Exploratory Analysis
Publication -
The Impact of the COVID-19 Pandemic on Poles’ Nutritional and Health Behaviour and Quality of Life—A Pilot Study
Publication -
Associations of Nutritional Behavior and Gut Microbiota with the Risk of COVID-19 in Healthy Young Adults in Poland
Publication -
Small-lot Production with Additive Production Using Reverse Logistics and IT Solutions in COVID-19 Era
Publication -
The case of fatal acute hemorrhagic necrotizing encephalitis in a two-month-old boy with Covid-19.
Publication -
Sex-related patient-reported brain fog symptoms in non-hospitalised COVID-19 patients
Publication -
Use of technology by people with dementia and informal carers during COVID‐19: A cross‐country comparison
Publication -
The use of technology by people with dementia and informal carers during COVID-19: a cross-country comparison
Publication -
Wpływ COVID-19 na skórę: objawy zakażenia, osutki polekowe oraz zapalenie kontaktowe
Publication -
Class of 2020 in Poland: Students’ Mental Health during the COVID-19 Outbreak in an Academic Setting
Publication -
Coping of Chronically-Ill Patients during the COVID-19 Pandemic: Comparison between Four Groups
Publication -
The COVID-19 outbreak and Google searches: Is it really the time to worry about global mental health?
Publication -
Novel psychopathological picture during the COVID-19 pandemic based on a first episode of psychotic depression.
Publication -
Impact of COVID-19 Pandemic Constraints on the Ecobiochemical Status of Cultivated Soils along Transportation Routes
Publication -
When to Resume Bariatric Surgery after COVID-19 Pandemic? – Results of Patients’ and Surgeons’ Survey.
Publication -
Impact of the COVID-19 Pandemic on the Patient’s Decision about Bariatric Surgery: Results of a National Survey
Publication -
When to resume bariatric surgery after COVID-19 pandemic?: results of patients’ and surgeons’ survey
Publication -
The ChoCO-W prospective observational global study: Does COVID-19 increase gangrenous cholecystitis?
Publication -
Volatility in International Sovereign Bond Markets: The role of government policy responses to the COVID-19 pandemic
Publication -
Predictors of Psychological Distress across Three Time Periods during the COVID-19 Pandemic in Poland
Publication -
Remote and on-site work stress severity during the COVID-19 pandemic: comparison and selected conditions
Publication -
Case study methodology. Few conceptual considerations.
PublicationThis paper contributes to the debate on case study as methodological approach. It shows several issues concerning its major advatangeus and disadvantageus
-
Integration of Lean Manufacturing with ISO Management Systems in Enterprise
PublicationLean manufacturing [LM], quality management system and environmental management system are clear initiatives with a goal of improving effectiveness and efficiencies of organizations. Many organisations tackle lean philosophy, ISO standards individually but this kind of attempt do not focus on the synergy and the advantage from the potential collaboration. This paper aims to present the possibility of integration Lean Management...
-
Update a simple hypoplastic constitutive model
PublicationW artykule omówiono uproszczona formę hipoplastycznego konstytutywnego prawa materiałowego do opisu zachowania się materiałów granulowanych. Wykonano symulacje testów elementów i porównano wyniki z doświadczeniami.
-
The Sense of Security of the Prison Service Offi cers
Publication -
Integrative genomics reveal a role for MCPIP1 in adipogenesis and adipocyte metabolism
Publication -
Motion Trajectory Prediction in Warehouse Management Systems: A Systematic Literature Review
PublicationBackground: In the context of Warehouse Management Systems, knowledge related to motion trajectory prediction methods utilizing machine learning techniques seems to be scattered and fragmented. Objective: This study seeks to fill this research gap by using a systematic literature review approach. Methods: Based on the data collected from Google Scholar, a systematic literature review was performed, covering the period from 2016...
-
Software Agents for Computer Network Security
PublicationThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Challenges in providing support for management of evidence-based arguments
PublicationThe paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...
-
Supporting Compliance with Security Standards by Trust Case Templates
PublicationTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Fast EM-Driven Parameter Tuning of Microwave Circuits with Sparse Sensitivity Updates via Principal Directions
PublicationNumerical optimization has become more important than ever in the design of microwave components and systems, primarily as a consequence of increasing performance demands and growing complexity of the circuits. As the parameter tuning is more and more often executed using full-wave electromagnetic (EM) models, the CPU cost of the overall process tends to be excessive even for local optimization. Some ways of alleviating these issues...
-
Expedited Metaheuristic-Based Antenna Optimization Using EM Model Resolution Management
PublicationDesign of modern antenna systems heavily relies on numerical opti-mization methods. Their primary purpose is performance improvement by tun-ing of geometry and material parameters of the antenna under study. For relia-bility, the process has to be conducted using full-wave electromagnetic (EM) simulation models, which are associated with sizable computational expendi-tures. The problem is aggravated in the case of global optimization,...