Search results for: secure set - Bridge of Knowledge

Search

Search results for: secure set

Filters

total: 67

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: secure set

  • Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems

    Publication

    Sustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...

    Full text to download in external service

  • Modeling an Industrial Revolution: How to Manage Large-Scale, Complex IoT Ecosystems?

    Publication
    • G. Kulcsar
    • P. Varga
    • M. S. Tatara
    • F. Montori
    • M. A. Inigo
    • G. Urgese
    • P. Azzoni

    - Year 2021

    Advancements around the modern digital industry gave birth to a number of closely interrelated concepts: in the age of the Internet of Things (IoT), System of Systems (SoS), Cyber-Physical Systems (CPS), Digital Twins and the fourth industrial revolution, everything revolves around the issue of designing well-understood, sound and secure complex systems while providing maximum flexibility, autonomy and dynamics. The aim of the...

    Full text available to download

  • Medical Image Dataset Annotation Service (MIDAS)

    Publication

    - Year 2020

    MIDAS (Medical Image Dataset Annotation Service) is a custom-tailored tool for creating and managing datasets either for deep learning, as well as machine learning or any form of statistical research. The aim of the project is to provide one-fit-all platform for creating medical image datasets that could easily blend in hospital's workflow. In our work, we focus on the importance of medical data anonimization, discussing the...

    Full text to download in external service

  • How does the Relationship Between the Mistakes Acceptance Component of Learning Culture and Tacit Knowledge-Sharing Drive Organizational Agility? Risk as a Moderator

    Publication

    - Year 2024

    Changes in the business context create the need to adjust organizational knowledge to new contexts to enable the organizational agile responses to secure competitiveness. Tacit knowledge is strongly contextual. This study is based on the assumption that business context determines tacit knowledge creation and acquisition, and thanks to this, the tacit knowledge-sharing processes support agility. Therefore, this study aims to expose...

    Full text available to download

  • Generation and Propagation of Nonlinear Waves in a Towing Tank

    The paper presents the results of the research focused on linear and nonlinear wave generation and propagation in a deepwater towing tank equipped with a single flap-type wavemaker of variable draft. The problem of wave generation and propagation has been theoretically formulated and solved by applying an analytical method; linear and nonlinear solutions were obtained. The linear solution has been verified experimentally. The...

    Full text available to download

  • TB11 test for short w-beam road barrier

    FEM (Finite Element Method) is well-suited and widely used tool for simulating a range of phenomena: from these with simple and static behaviour, up to those complicated, highly nonlinear and involving many contacts. In present paper we use one of the advantages of FEM: parametric study could be easily performed and is more economical than series of in-situ tests. If recommended practices is carefully followed, results obtained...

    Full text available to download

  • On Software Unit Testing For Security and Performance Gain At Unit Level

    Publication

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • On Software Unit Testing For Improving Security And Performance Of Distributed Applications

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • EVALUATION OF EFFECTIVENESS OF WATERJET PROPULSOR FOR A SMALL UNDERWATER VEHICLE

    Publication

    T he goal of the project described is to replace the existing propulsion system of a small underwater vehicle with a solution less prone to mechanical damage and ensuring a lower risk of the entanglement of fibrous objects suspended in the body of water. Four typical marine screws are utilised in the current design of the vehicle. One possible solution of the problem is the application of waterjet propulsors located...

    Full text available to download

  • Progress towards a unified approach to entanglement distribution

    Publication

    - PHYSICAL REVIEW A - Year 2015

    Entanglement distribution is key to the success of secure communication schemes based on quantum mechanics, and there is a strong need for an ultimate architecture able to overcome the limitations of recent proposals such as those based on entanglement percolation or quantum repeaters. In this work we provide a broad theoretical background for the development of such technologies. In particular, we investigate the question of whether...

    Full text available to download

  • Randomness Amplification under Minimal Fundamental Assumptions on the Devices

    Publication
    • R. Ramanathan
    • F. Brandão
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • H. Wojewódka

    - PHYSICAL REVIEW LETTERS - Year 2016

    Recently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...

    Full text available to download

  • Knowledge Sharing and Dynamic Capabilities: Does Gender Matter?

    Publication

    Knowledge sharing in organizations is a focal process leading to organizational adaptability and sustainable growth. Dynamic capabilities development is critical for this. Diversity, inclusive culture, and gender balance are seen as factors that also support organizations' development. The question of the role of gender in sharing and using knowledge to initiate change in organizations remains open. This study aims to fill this...

    Full text to download in external service

  • Employee Commitment Matters for CSR Practice, Reputation and Corporate Brand Performance—European Model

    Publication

    So far, there have been no studies that explore how employee brand commitment moderates CSR practice outcomes. Employee brand commitment is often claimed as a focal input and output of the CSR. So, it means that it shapes CSR conditions. Then, it is a moderator. This study aims to verify it. Besides, commitment exists in many forms and can be achieved in many ways. Hence the question, if employees are committed to the brand, then...

    Full text available to download

  • Gender as a Moderator of the Double Bias of Mistakes – Knowledge Culture and Knowledge Sharing Effects

    Publication

    - Year 2024

    There is no learning without mistakes. The essence of the double bias of mistakes is the contradiction between an often-declared positive attitude towards learning from mistakes, and negative experiences when mistakes occur. Financial and personal consequences, shame, and blame force desperate employees to hide their mistakes. These adverse outcomes are doubled in organizations by the common belief that managers never make mistakes,...

    Full text available to download

  • Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard

    With the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...

    Full text available to download

  • The essence of marine and coastal space – an interdisciplinary perspective

    Publication

    - EUROPA XXI - Year 2019

    Sea space has been undergoing a profound transformation. Although it retains its inspirational function in arts, literature and philosophy, it has been gaining new anthropogenic dimensions in eco-nomics and urban planning as a source of satisfying human needs i.e. the provision of harmony, beauty, off-shore energy, and biotech substances. Therefore, in this paper marine space is analyzed from a mul-tidimensional perspective of...

    Full text available to download

  • The potential of urban agriculture in the revitalisation of a metropolis

    Publication

    - Year 2019

    In Poland, the topic addressing urban areas of agricultural production and gardening activity is still viewed in two main blocks: 1) a shift of the urbanized zone’s boundaries, causing dispersion of suburban buildings as well as creates conflict zone between the residential area and the production and post-production zones; 2) a socially contentious issue of restructuring the inner-city complexes of former employee allotments....

    Full text to download in external service