Filters
total: 18422
filtered: 15274
-
Catalog
- Publications 15274 available results
- Journals 935 available results
- Conferences 182 available results
- Publishing Houses 1 available results
- People 459 available results
- Inventions 4 available results
- Projects 45 available results
- Laboratories 1 available results
- Research Teams 2 available results
- Research Equipment 8 available results
- e-Learning Courses 555 available results
- Events 50 available results
- Open Research Data 906 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: KNOWLEDGE MANAGEMENT, KNOWLEDGE SECURITY, KNOWLEDGE RISKS, COVID-19, CONCEPTUAL PAPER, INTEGRATIVE MODEL
-
Urban Vegetation in Air Quality Management: A Review and Policy Framework
PublicationRecent episodes of high air pollution concentration levels in many Polish cities indicate the urgent need for policy change and for the integration of various aspects of urban development into a common platform for local air quality management. In this article, the focus was placed on the prospects of improving urban air quality through proper design and protection of vegetation systems within local spatial planning strategies....
-
An integrated e-learning services management system providing HD videoconferencing and CAA services
PublicationIn this paper we present a novel e-learning services management system, designed to provide highly modifiable platform for various e-learning tools, able to fulfill its function in any network connectivity conditions (including no connectivity scenario). The system can scale from very simple setup (adequate for servicing a single exercise) to a large, distributed solution fit to support an enterprise. Strictly modular architecture...
-
On Decision-Making Strategies for Improved-Reliability Size Reduction of Microwave Passives: Intermittent Correction of Equality Constraints and Adaptive Handling of Inequality Constraints
PublicationDesign optimization of passive microwave components is an intricate process, especially if the primary objective is a reduction of the physical size of the structure. The latter has become an important design consideration for a growing number of modern applications (mobile communications, wearable/implantable devices, internet of things), where miniaturization is imperative due to a limited space allocated for the electronic circuitry....
-
Ontology as a Tool for the IT Management Standards Support
PublicationIn this paper the authors discuss the initial idea of using ontologies to model requirements of the standards that support IT management processes. The Open Group Architecture Framework (TOGAF) is set as an example. A need for transition from the generic model do the organization-specific one is indicated. The described example serves as a ground for considering the usefulness of such modeling approach in the wider spectrum of...
-
The model of photovoltaic phenomenon in thin inhomogeneously organic film
PublicationW pracy przedstawiono model zjawiska fotowoltaicznego w obecności gradientu pułapek nośników ładunku. Zakładając, że długość dyfuzji ekscytonów związana jest z koncentracją pułapek, wykazano, że napięcie fotowoltaiczne silnie zależy od gradientu koncentracji pułapek.
-
The Conceptual Research over Low-Switching Modulation Strategy for Matrix Converters with the Coupled Reactors
PublicationIn this paper, different Pulse Width Modulation (PWM) strategies for operating with a low-switching frequency, a topology that combines Conventional Matrix Converters (CMCs), and Coupled Reactors (CRs) are presented and discussed. The principles of the proposed strategies are first discussed by a conceptual analysis and later validated by simulation. The paper shows how the combination of CMCs and CRs could be of special interest...
-
Algorithmic Human Resources Management
PublicationThe rapid evolution of Digital Human Resources Management has introduced a transformative era where algorithms play a pivotal role in reshaping the landscape of workforce management. This transformation is encapsulated in the concepts of algorithmic management and algorithmic Human Resource Management (HRM). The integration of advanced analytics, predictive and prescriptive analytics and the power of Artificial Intelligence (AI)...
-
Model Management for Low-Computational-Budget Simulation-Based Optimization of Antenna Structures Using Nature-Inspired Algorithms
PublicationThe primary objective of this study is investigation of the possibilities of accelerating nature-inspired optimization of antenna structures using multi-fidelity EM simulation models. The primary methodology developed to achieve acceleration is a model management scheme which the level of EM simulation fidelity using two criteria: the convergence status of the optimization algorithm, and relative quality of the individual designs...
-
User Trust Levels and Their Impact on System Security and Usability
PublicationA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Software modules and application layer's security structure of RSMAD
PublicationThe paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...
-
Road Infrastructure Safety Management in Poland
PublicationThe objective of road safety infrastructure management is to ensure that when roads are planned, designed, built and used road risks can be identified, assessed and mitigated. Road transport safety is significantly less developed than that of rail, water and air transport. The average individual risk of being a fatality in relation to the distance covered is thirty times higher in road transport that in the other modes. This is...
-
Technological vs. Non-Technological Mindsets: Learning From Mistakes, and Organizational Change Adaptability to Remote Work
PublicationThe permanent implementation of the change in working methods, e.g., working in the virtual space, is problematic for some employees and, as a result, for management leaders. To explore this issue deeper, this study assumes that mindset type: technological vs. non-technological, may influence the organizational adaptability to change. Moreover, the key interest of this research is how non-technological mindsets...
-
Ontologically Aided Rule Model for the Implementation of ITIL Processes
PublicationThe implementation of ITIL processes in IT organizations can be seen as a set of interdependent projects. The sequence of the ITIL implementation relies on such parameters as scope, depth, the capability of processes and the maturity of the organization. These factors can form common patterns of ITIL implementation that might be expressed as rules. Also-to semantically reinforce such a model in its predictiveness and replicativeness-the...
-
Response to David Steigmann’s discussion of our paper
PublicationWe respond to David Steigmann's discussion of our paper "A general theory for anisotropic Kirchhoff-Love shells with in-plane bending of embedded fibers, Math. Mech. Solids, 28(5):1274-1317" (arXiv:2101.03122). His discussion allows us to clarify two misleading statements in our original paper, and confirm that its formulation is fully consistent with the formulation of Steigmann. We also demonstrate that some of our original statements...
-
CULTURAL DETERMINANTS OF EVIDENCE-BASED HUMAN RESOURCES MANAGEMENT: A CROSS-COUNTRY ANALYSIS
PublicationPurpose: This paper aims at providing comparative analysis of the influence of cultural determinants on the managers’ perceptions of human resources management practices, as a factor conditioning application of evidence-based management. Design/methodology/approach: This article presents the study of 121 managers in Poland, on their perception of HRM practices and analyses the consistency of findings with the Hofstede cultural...
-
Lessons learned from developing an Industry 4.0 mobile process management system supported by Artificial Intelligence
PublicationResearch, development and innovation (RDI) projects are undertaken in order to improve existing, or develop new, more efficient products and services. Moreover, the goal of innovation is to produce new knowledge through research, and disseminating it through education and training. In this line of thinking, this paper reports and discusses the lessons learned from the undertaken project, regarding three areas: machine learning...
-
Model of distributed learning objects repository for a heterogenic internet environment
PublicationW artykule wprowadzono pojęcie komponentu edukacyjnego jako rozszerzenie obiektu edukacyjnego o elementy zachowania (metody). Zaproponowane podejście jest zgodne z paradygmatem obiektowym. W oparciu o komponent edukacyjny zaprojektowano model budowy repozytorium materiałów edukacyjnych. Model ten jest oparty o usługi sieciowe i rejestry UDDI. Komponent edukacyjny oraz model repozytorium mogą znaleźć zastosowanie w konstrukcji zbiorów...
-
Information retrieval with semantic memory model
PublicationPsycholinguistic theories of semantic memory form the basis of understanding of natural language concepts. These theories are used here as an inspiration for implementing a computational model of semantic memory in the form of semantic network. Combining this network with a vector-based object-relation-feature value representation of concepts that includes also weights for confidence and support, allows for recognition of concepts...
-
Paradoxes in the engineering change management process
PublicationPurpose: The main purpose of this paper is to conceptualize and operationalize paradoxes that are significant in the engineering change management (ECM) process. The following research question was stated: What are the paradoxes that influence the ECM process, and how can they be measured? Design/methodology/approach: The study is divided into two parts: conceptualization and operationalization. Conceptualization involved a literature...
-
On Software Unit Testing For Security and Performance Gain At Unit Level
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
On Software Unit Testing For Improving Security And Performance Of Distributed Applications
PublicationPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
Influence of COVID-19 on lifestyle behaviors in the Middle East and North Africa Region: a survey of 5896 individuals
Publication -
Remdesivir-based therapy improved recovery of patients with COVID-19 in the SARSTer multicentre, real-world study
Publication -
Administration of tocilizumab to patients with high concentrations of IL-6 in the course of COVID-19 is associated with a better prognosis
Publication -
Remdesivir-based therapy improved recovery of patients with COVID-19 in the SARSTer multicentre, real-world study
Publication -
Universal Predictors of Dental Students’ Attitudes towards COVID-19 Vaccination: Machine Learning-Based Approach
Publication -
Frequency and Nuisance Level of Adverse Events in Individuals Receiving Homologous and Heterologous COVID-19 Booster Vaccine
Publication -
Amplifying dementia as a global public health problem: A cross-country comparison of the impact of COVID-19 pandemic
Publication -
A qualitative 5-country comparison of the perceived impacts of COVID-19 on people living with dementia and unpaid carers
Publication -
Psychopathological responses and face mask restrictions during the COVID-19 outbreak: Results from a nationwide survey
Publication -
Lifestyle changes in patients with morbid obesity and type 2 diabetes mellitus during the COVID-19 pandemic
Publication -
Bariatric Surgery during COVID-19 Pandemic from Patients’ Point of View—The Results of a National Survey
Publication -
Handling of the Covid-19 Pandemic and Its Effects on Bariatric Surgical Practice: Analysis of GENEVA Study Database
Publication -
The Prevalence of Loneliness among University Students from Five European Countries during the COVID-19 Pandemic
Publication -
SDN testbed for validation of cross-layer data-centric security policies
PublicationSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
Distributed Trust Management Model for Wireless Sensor Networks
Publication -
Wybrane problemy ochrony żeglugi (Maritime Security)
Publicationprzedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...
-
Security of export transactions in the offer of leading banks on the Polish market
PublicationThe following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...
-
ICT and social development. Conceptual considerations.
PublicationThis chapter is intended to provide basic ideas and concepts related to technology, technological progress and society. It explains how and why technology and society are interrelated, forming a dynamic, complex and interdependent evolutionary system. It introduces the terms Digital (ICT) Revolution and information and communication technologies (ICTs), showing elementary features of new technologies. The chapter explains why ICTs...
-
Conceptual system development in a concurrent environment
PublicationW artykule omówiono możliwości wspomagania jednego z najważniejszych obszarów projektowania, a mianowicie projektowania koncepcyjnego. Rozważania te odniesiono do otoczenia inżynierii wspozadaniowej, co dodatkowo skomplikowano problemy decyzyjne podejmowane na tym etapie projektowania. Zaproponowano szereg elementów wspomagania projektowania koncepcyjnego ze szczególnym uwzględnieniem możliwości praktycznej implementacji takiego...
-
Ideological and Practical Model of Metaontology
PublicationRozwój inicjatywy Semantic Web spowodował rozwój różnych języków definiowania wiedzy i manipulowania nią. W ramach tych języków istotnym elementem jest zaprojektowanie rozkazów terminologicznych. W artykule przedstawiono sposób realizacji zapytań terminologicznych w języku KQL (Knowledge Query Language), służącym do dostępu do systemu zarządzania wiedzą RKaSeA.
-
Functional safety and security assessment of the control and protection systems
PublicationW artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.
-
Economics of credit scoring management
PublicationCredit scoring models constitute an inevitable element of modern risk and profitability management in retail financial lending institutions. Quality,or separation power of a credit scoring model is usually assessed with the Gini coefficient. Generally, the higher Gini coefficient the better, as in this way a bank can increase number of good customers and/or reject more bad applicants. In...
-
E-Learning Service Management System For Migration Towards Future Internet Architectures
PublicationAs access to knowledge and continuous learning are among the most valuable assets in modern, technological society, it is hardly surprising that e-learning solutions can be counted amongst the most important groups of services being deployed in modern network systems. Based on analysis of their current state-of-the-art, we decided to concentrate our research and development work on designing and implementing a management system...
-
2D Mathematical Model of the Commutator Sliding Contact of an Electrical Machine
PublicationW artykule przedstawiono model matematyczny 2D komutatorowego zestyku ślizgowego z wieloma stopniami swobody. W modelu uwzględniono zmienne wymuszenia działające na szczotkę. Wymuszenia te są wynikiem falistości wirującego komutatora. Szczotka została zamodelowana jako system wielu mas, elementów sprężystych i tłumików rozłożonych w kierunku stycznym i promieniowym. Zamodelowano wszystkie oddziaływania lepkosprężyste pomiędzy komutatorem...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublicationAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Polish Polar Research: Green-and-White Paper under the aegis of the Polish Polar Consortium (PPC)
PublicationPolar research is a colloquial term for cross-area, cross-domain and interdisciplinary research in the Arctic and Antarctic. Polar research is mainly the domain of natural sciences, but technical sciences and humanities also grow in importance. Being vulnerable to climate change, polar regions are commonly considered as a kind of litmus paper of changes in geosystems, hence the importance of research done there. It aims at a better...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublicationIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects
PublicationSafety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...
-
Procedure based proactive functional safety management for the risk mitigation of hazardous events in the oil port installations including insurance aspects
PublicationThis article addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety requirements specified in standards IEC 61508 and IEC 61511. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on risk assessment results...