Filters
total: 540
filtered: 444
Search results for: employee suggestion scheme
-
A distributed scheme for optimization of interdomain routing between collaborating domains
Publication -
Comments on ''an SVD-based watermarking scheme for protecting rightful ownership''
PublicationW pracy wykazano, że algorytm zaproponowany w komentowanym artykule nie ma wartości praktycznej, gdyż charakteryzuje się bardzo dużym prawdopodobieństwem fałszywej akceptacji.
-
Analytical Estimation of Power Losses in a Dual Active Bridge Converter Controlled with a Single-Phase Shift Switching Scheme
PublicationMicro-grid solutions around the world rely on the operation of DC/DC power conver- sion systems. The most commonly used solution for these topologies is the use of a dual active bridge (DAB) converter. Increasing the efficiency and reliability of this system contributes to the improvement in the stability of the entire microgrid. This paper discussed an analytical method of energy efficiency and power loss estimation in a single...
-
An approximative scheme of finding almost homoclinic solutions for a class of Newtonian systems
PublicationW niniejszej pracy badamy istnienie rozwiązań prawie homoklinicznych (ang. almost homoclinic solutions) dla pewnej klasy układów Newtona. Rozwiązanie prawie homokliniczne otrzymujemy jako granicę ciągu rozwiązań okresowych dla pewnego ciągu równań różniczkowych.
-
General scheme for construction of scalar separability criteria from positive maps
PublicationStandardowe nierówności entropijne są znanym narzędziem do detekcji splątania dwupodukładowych stanów kwantowych. W pracy podano metodę wyprowadzania nierówności przypominających standardowe nierówności entropijne z dowolnych odwzorowań dodatnich. Ponadto, przebadano nierówności w przypadku kilku znanych z literatury odwzorowań dodatnich.
-
Simultaneous handover scheme for IEEE 802.11 WLANs with IEEE 802.21 tiggers
PublicationHandover performance in wireless networks is important, especially nowadays, when multimedia services are becoming increasingly available over the wireless devices. However, users expect uncompromised mobility when using the service. Thus, the support of multimedia services is not possible if handover is inefficient. At the same time it is clear that a strict separation between IP Layer and the Link Layer results in built-in sources...
-
Towards modelling of the environmental fate of pharmaceuticals using the QSPR-MM scheme
Publication -
Reliable routing and resource allocation scheme for hybrid RF/FSO networks
PublicationSignificant success of wireless networks in the last decade has changed the paradigms of communication networks design. In particular, the growing interest in wireless mesh networks (WMNs) is observed. WMNs offer an attractive alternative to conventional cable infrastructures, especially in urban areas, where the cost of new installations is almost prohibitive. Unfortunately, the performance of WMNs is often limited by the cluttered...
-
Phase compensation scheme for feedforward linearised CMOS operational transconductance amplifier.
PublicationW pracy opisano technikę kompensacji charakterystyk fazowych linearyzowanego metodą feedforward operacyjnego wzmacniacza transkonduktancyjnego CMOS. Wykazano, że proponowana koncepcja układowa prowadzi do znacznej poprawy liniowości charakterystyki przejściowej wzmacniacza oraz do rozszerzenia zakresu liniowości prądu wyjściowego. Ponadto w pracy przeprowadzono analizę charakterystyk częstotliwościowych, w wyniku której otrzymano...
-
Performance of Coherent Modulation Scheme Used in Acoustic Underwater Communication System
PublicationThe development of an acoustic underwater communication system for shallow waters is still a big scientificand construction challenge. Currently, non-coherent modulations in combination with strong channel coding are used to achieve reliable communication with low rate in such a channel. To obtain transmission with a higher transmission rate, it is required to use coherent modulation. This paper presents the assumptions of such...
-
A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing
PublicationThis article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...
-
A perfect hashing incremental scheme for unranked trees using pseudo-minimal automata
PublicationWe describe a technique that maps unranked trees to arbitrary hash codes using a bottom-up deterministic tree automaton (DTA). In contrast to other hashing techniques based on automata, our procedure builds a pseudo-minimal DTA for this purpose. A pseudo-minimal automaton may be larger than the minimal one accepting the same language but, in turn, it contains proper elements (states or transitions that are unique) for every input...
-
Relativistic Bennett Brassard cryptographic scheme, relativistic errors,and how to correct them.
PublicationWprowadzono opis polaryzacji liniowej oparty o główne zerowe kierunki transformacji Lorentza. Formalizm ten został zastosowany do problemu eliminacji błędów w kryptografii kwantowej.
-
Dynamics based on six-field theory of shells in the context of energy-conserving scheme
PublicationPraca dotyczy zaproponowanego algorytmu zachowującego energię w całkowaniu równań ruchu powłok sprężystych sformułowanych w ramach teorii sześcioparametrowej. Zawiera podstawowe założenia konieczne do formułowania schematów i podstawowe testy numeryczne. Aproksymacja przestrzenna zagadnienia oparta jest o Metodę Elementów Skończonych zaś aproksymacja w czasie wykorzystuje regułę punktu środkowego. Przykłady analizy dynamicznej...
-
Improving the accuracy of subgridding scheme in finite differences method based on Legendre polynomials expansion
PublicationIn this article the Legendre polynomials have been used to interpolate the field at the boundary of the meshes of different densities. The numerical verification of the proposed technique has been carried out in frequency domain. It has been shown that the accuracy of the presented method is very high and stable - the error monotonically decreases as a function of the refinement factor.
-
Kinetic flux vector splitting scheme for solving non-reactive multi-component flows
Publication -
Capacity efficient shared protection and fast restoration scheme in self-configured optical networks
PublicationW artykule zaproponowano nową koncepcję optymalizacji rozdziału zasobów dla przeżywalnych sieci rozległych, która gwarantuje szybkie odtwarzanie usług po wystąpieniu awarii. Wykazano, iż proponowany algorytm, wykorzystujący ideę wierzchołkowego kolorowania grafów, nie powoduje wydłużania ścieżek zabezpieczających - zjawiska charakterystycznego dla powszechnie stosowanych algorytmów optymalizacji. Udowodniono, iż powyższa cecha...
-
A fast high-resolution 3-D Finite Difference Time-Domain scheme with macromodels.
PublicationZaprezentowano szybki trójwymiarowy wysokorozdzielczy algorytm różnic skończonych w dziedzinie czasu. Zwiększona rozdzielczość osiągnięta została poprzez połączenie standardowego schematu FDTD z makromodelami silnie zagęszczonych objętości stworzonych przez zastosowanie redukcji rzędu modelu. Nowy schemat FDTD z makromodelami jest wyprowadzony. Koszt numeryczny nowej metody jest wyestymowany. Doskonałe wyniki zostały zaobserwowane...
-
Numerical simulation of transient flow in storm sewers using standard and improved mccormack scheme
PublicationProblem przepływu wody w rurach kanalizacji deszczowej wiąże się z pewnymi specyficznymi zjawiskami zachodzącymi w przewodach podczas zjawisk burzowych. Jeśli rury zaczynają być całkowicie wypełnione wodą, można zaobserwować przejście z ruchu ze swobodną powierzchnią do ruchu pod ciśnieniem i odwrotnie. Takie zjawisko można zaobserwować również w kanałach kontrolowanych przez urządzenia sterujące, np. zasuwy. Ponadto ruch szybkozmienny...
-
A Measurement Invariance Investigation of the Polish Version of the Dual Filial-Piety Scale (DFPS-PL): Student-Employee and Gender Differences in Filial Beliefs
Publication -
Efficient handover scheme for Mobile IPv4 over IEEE 802.11 networks with IEEE 802.21 triggers.
PublicationEfektywność przełączania jest bardzo istotnym parametrem, decydującym o pracy sieci bezprzewodowych, realizujacych usługi multimedialne na wysokim poziomie jakości. Użytkownicy takich sieci oczekują ciągłej obsługi podczas procesu przemieszczania się. Okazuje się, że istotnym źródlem opóźnień są nieefektywne procedury przełączania w warstwach drugiej i trzeciej, wynikający częściowo z postulatu o separacji funkcji realizowanych...
-
A General Scheme of a Branch-and-Bound Approach for the Sensor Selection Problem in Near-Field Broadband Beamforming
Publication -
Multicast Traffic Throughput Maximization through Dynamic Modulation and Coding Scheme Assignment in Wireless Sensor Networks
Publication -
Novel synthesis scheme and in vitro antimicrobial evaluation of a panel of (E)-2-aryl-1-cyano-1-nitroethenes
Publication -
Accelerated Gradient-Based Optimization of Antenna Structures Using Multi-Fidelity Simulations and Convergence-Based Model Management Scheme
PublicationThe importance of numerical optimization has been steadily growing in the design of contemporary antenna structures. The primary reason is the increasing complexity of antenna topologies, [ a typically large number of adjustable parameters that have to be simultaneously tuned. Design closure is no longer possible using traditional methods, including theoretical models or supervised parameter sweeping. To ensure reliability, optimization...
-
AMO perspectives on the well-being of neurodivergent human capital
PublicationExisting management research and management practices frequently overlook the relationship between the above-average human capital of highly functioning neurodivergent employees, their subjective well-being in the workplace and performance outcomes. This paper calls for greater attention to the hidden human capital associated with neurodiversity by mainstreaming implementation of neurodiversity-friendly policies and practices. Drawing...
-
Leading with Understanding: Cultivating Positive Relationships between Neurotypical Leaders and Neurodivergent Employees
PublicationNeurodivergent employees have atypical needs that require distinctive leadership approaches. In this study, the specific nature of a relationship between neurodivergent employees and their neurotypical leaders is explored through the lens of the Leader-Member-Exchange (LMX) theory. This two-phased qualitative study builds on 12 semi-structured interviews with neurodivergent employees and an unstructured focus group with 15 individuals...
-
Dependent self-employed individuals: are they different from paid employees?
PublicationThis study focuses on dependent self-employment, which covers a situation where a person works for the same employer as a typical worker while on a self-employment contractual basis, i.e., without a traditional employment contract and without certain rights granted to "regular" employees. The research exploits the individual-level dataset of 35 European countries extracted from the 2017 edition of the European Labour Force Survey...
-
How can the work environment be redesigned to enhance the well-being of individuals with autism?
PublicationPurpose – This article examines the opportunities to create optimal conditions for individuals with autism, to work successfully within the contemporary workplace and improve their well-being. These opportunities arise from digital technology (DT) development, enabling the work environment to be remodeled by providing new possibilities and ways of working. The author discusses both technology-based as well as non-technological accommodations...
-
Flow Process Models for Pipeline Diagnosis
PublicationThis chapter examines the problem of modeling and parameterization of the transmission pipeline flow process. First, the base model for discrete time is presented, which is a reference for other developed models. Then, the diagonal approximation (AMDA) method is proposed, in which the tridiagonal sub-matrices of the recombination matrix are approximated by their diagonal counterparts, which allows for a simple determination of...
-
Action Plan “Women”
PublicationEmployees of a company are not the first alternative coming into one’s mind when searching suitable successor for the business. Those belonging to the company’s management group are in many cases asked for their interest in being a successor, but the lower level an employee is in the hierarchy, the less probably he/she is inquired of his/her interest in becoming a successor. The contemporary entrepreneur may have had conflicts...
-
A Concept of Using Knowledge Models to Secure Intellectual Capital in Enterprise
PublicationWithout a doubt, knowledge has become the most important resource for all companies in the world. Knowledge extended of our own observations and practice is being called experience. With the increase of knowledge and gained experience, the individual becomes more and more valuable employee in terms of business. The above mentioned knowledge can be gained only by self-improvement, which requires time and other necessary elements...
-
Correction to: Azo group(s) in selected macrocyclic compounds
PublicationIn the original publication of the article, a part of Scheme 12 was missed. The correct version of Scheme 12 was provided in this correction article. The original article has also been corrected.
-
The adaptive spatio-temporal clustering method in classifying direct labor costs for the manufacturing industry
PublicationEmployee productivity is critical to the profitability of not only the manufacturing industry. By capturing employee locations using recent advanced tracking devices, one can analyze and evaluate the time spent during a workday of each individual. However, over time, the quantity of the collected data becomes a burden, and decreases the capabilities of efficient classification of direct labor costs. However, the results obtained...
-
Transition curve with smoothed curvature at its ends for railway roads
PublicationIn the paper, in view of a railway ballasted track, a new concept of transition curve of linear form of curvature along its length and smoothed extreme regions is presented. For this purpose use has been made of an original, universal method for identifying transition curves by means of differential equations. Some general curvature equations for three regions investigated have been determined to be followed by appropriate parametric...
-
Reasons behind changes in the share of labour in national income in the Polish economy: Selected aspects
PublicationAim/purpose – The aim of this paper is to examine the impact of structural changes taking place in the Polish economy on the share of labour in national income. Design/methodology/approach – The scope of this study includes a review of the literature dedicated to the issue and an empirical analysis of data available on this topic. The study uses elements of descriptive statistics and the method of induction. Findings – The conducted...
-
Computationally Effcient Solution of a 2D Diffusive Wave Equation Used for Flood Inundation Problems
PublicationThis paper presents a study dealing with increasing the computational efficiency in modeling floodplain inundation using a two-dimensional diffusive wave equation. To this end, the domain decomposition technique was used. The resulting one-dimensional diffusion equations were approximated in space with the modified finite element scheme, whereas time integration was carried out using the implicit two-level scheme. The proposed...
-
Effects of the polyhistidine tag on kinetics and other properties of trehalose synthase from Deionococcus geothermalis
PublicationTwo recombinant trehalose synthases from Deinococcus geothermalis (DSMZ 11300) were compared. A significant influence of the artificial polyhistidine tag was observed in protein constitution. The recombinant trehalose synthase from D. geothermalis with His6 -tag has a higher K m value of 254 mM, in comparison with the wild-type trehalose synthase (K m 170 mM), and displayed a lower activity of maltose conversion when compared...
-
Decision-Making Models of the Human-Operator as an Element of the Socio-Technical Systems
PublicationThe authors of the chapter proved that the fundamental intellectual processes, which lie on the basis of decision-making behavior of the human-operator, could be identified on the bases on the analogies with the devices (elements). The basic intellectual processes of the Rational decision-making models can be adequately identified by the transient processes of the PID-controller; the intellectual processes of the Bounded Rationality...
-
The Ellenbogen's "Matter as Software" Concept for Quantum Computer Implementation: II Bonding Between the C60 and X@C60 Molecules as Available Molecular Building Blocks (MBBs) for Tip-Based Nanofabrication (TBN) of Quantum Computing Devices
PublicationThe binding energy, BE of the X@C60-X@C60 homodimer and the X@C60-Y@C60 heterodimer resulting from the bond formation between the occupied X@C60 MBB and the C60 molecule was studied by means of semiempirical PM7 calculations, where X and Y denote atoms from H to Bi, excluding Tc and lanthanides. All possible combinations of N = 68 guest atoms were considered, which resulted in K = 2346 of different calculated dimers of (X@C60-Y@C60)...
-
Adaptive CAD-Model Construction Schemes
PublicationTwo advanced surrogate model construction techniques are discussed in this paper. The models employ radial basis function (RBF)interpolation scheme or artificial neural networks (ANN) with a new training algorithm. Adaptive sampling technique is applied withrespect to all variables. Histograms showing the quality of the models are presented. While the quality of RBF models is satisfactory, theperformance of the ANN models obtained...
-
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublicationThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
Acceleration of the Discrete Green’s Function Formulation of the FDTD Method Based on Recurrence Schemes
PublicationIn this paper, we investigate an acceleration of the discrete Green's function (DGF) formulation of the FDTD method (DGF-FDTD) with the use of recurrence schemes. The DGF-FDTD method allows one to compute FDTD solutions as a convolution of the excitation with the DGF kernel. Hence, it does not require to execute a leapfrog time-stepping scheme in a whole computational domain for this purpose. Until recently, the DGF generation...
-
Reversible Data Hiding in Encrypted DICOM Images Using Cyclic Binary Golay (23, 12) Code
PublicationIn this paper, a novel reversible data hiding method for encrypted images (RDHEI) is proposed. An efficient coding scheme based on cyclic binary Golay (23, 12) code is designed to embed additional data into the least significant bits (LSBs) of the encrypted image. The most significant bits (MSBs) are used to ensure the reversibility of the embedding process. The proposed scheme is lossless, and based on the receiver’s privileges,...
-
Incorporating Iris, Fingerprint and Face Biometric for Fraud Prevention in e-Passports Using Fuzzy Vault
PublicationA unified frame work which provides a higher security level to e-passports is proposed. This framework integrates face, iris and fingerprint images. It involves three layers of security: the first layer maps a biometric image to another biometric image which is called biostego image. Three mapping schemes are proposed: the first scheme maps single biometric image to single biostego image, the second scheme maps dual biometric images...
-
Long-distance quantum communication over noisy networks without long-time quantum memory
PublicationThe problem of sharing entanglement over large distances is crucial for implementations of quantum cryptography. A possible scheme for long-distance entanglement sharing and quantum communication exploits networks whose nodes share Einstein-Podolsky-Rosen (EPR) pairs. In Perseguers et al. [Phys. Rev. A 78, 062324 (2008)] the authors put forward an important isomorphism between storing quantum information in a dimension D and transmission...
-
Approaching Secure Industrial Control Systems
PublicationThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Modified SPWM Technique with Zero-Sequence Voltage Injection for a Five-Phase, Three-Level NPC Inverter
PublicationThis article presents a modified sinusoidal pulse-width modulation (SPWM) scheme for a five-phase, three-level neutral-point-clamped inverter. The modulation scheme deploys a modified min–max function to inject the zero-sequence components into the reference modulating signals; hence enabling the effective utilization of the DC-link voltage. Balanced split-input DC-link voltages were achieved through further incorporation of adjustable...
-
Tweet you right back: Follower anxiety predicts leader anxiety in social media interactions during the SARS-CoV-2 pandemic
PublicationRecent research has shown that organizational leaders’ tweets can influence employee anxiety. In this study, we turn the table and examine whether the same can be said about followers’ tweets. Based on emotional contagion and a dataset of 108 leaders and 178 followers across 50 organizations, we infer and track state- and trait-anxiety scores of participants over 316 days, including pre- and post the onset of the SARS-CoV-2 pandemic...
-
Network Graph Transformation Providing Fast Calculation of Paths for Resilient Routing
PublicationProtection of transmission against failures can be appropriately dealt with by alternative paths. However, common schemes (e.g., Bhandaris scheme) are characterized by a remarkable delay while determining the transmission paths. This in turn may have a serious impact on serving dynamic demands (characterized by relatively short duration time). As a remedy to this problem, we introduce an approach to pre-compute the sets of disjoint...