Filters
total: 26352
filtered: 4028
-
Catalog
- Publications 4028 available results
- Journals 585 available results
- Conferences 262 available results
- Publishing Houses 2 available results
- People 516 available results
- Inventions 1 available results
- Projects 23 available results
- Research Teams 1 available results
- e-Learning Courses 130 available results
- Events 3 available results
- Open Research Data 20801 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: INFORMATION%20SECURITY
-
Perfecting the Maritime Navigation information services of the European Union
Publication -
Properties and Formation of Mineralized Veins in an Organic-Rich Shale Formation
PublicationAn earlier paper defined mineral and organic matter constituents in weak interfaces in shale formations (Ptaszynska, et. al., 2016). The formation studied in the earlier work and here is the Jurassic, early-Cretaceous Vaca Muerta formation in the Neuquen basin in Argentina. In this earlier work, mineralized "veins" were noted to be prevalent and complicated, sometimes being shear weak interfaces while in other cases they were not....
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublicationThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Wykorzystanie Web 2.0 oraz architektury informacji w pracy brokera informacji = TAKING ADVANTAGE OF WEB 2.0 AND THE INFORMATION ARCHITECTURE IN THE INFORMATION BROKER’S WORK
PublicationThe development of information and communication technologies, dissemination of access as well as unlimited increase of publications result in the uncontrolled growth of knowledge resources. Looking up for the relevant information becomes increasingly difficult, especially when time plays a role. Such process requires vast knowledge, practical experience in obtaining and providing information and also analytical...
-
Ecological correlates of the popularity of birds and butterflies in Internet information resources
Publication -
Validation of an Agent and Ontology-based Information Technology Assessment System
PublicationThe aim of this paper is to present a new method of the validation of an Agent and Ontology-based Information Technology Assessment System. In the introduction part of the paper, the characteristics of the proposed multi-agent system are presented. Next, some important details regarding the ontology functionality of this system are described and an approach to its verification process is proposed. The approach employs semantic...
-
Conception of interactive information and decision support system - model and evaluation
PublicationThis article presents conception of interactive information and decision support system for urban and industrial air quality management. The emphasis of the project is on real-time analysis and multi-media information, and support of distributed and mobile clients through the Internet.
-
Web-Based Integrated Timetable Information System for Railways and Airlines
Publication -
Information and Konowledge management: advances, approaches, challenges and critical issues
PublicationPrzedstawiono zarys najnowszych osiągnięć w zakresie zarządzania wiedza i informacja wraz z ich krytyczna ocena.
-
Automatic evaluation of information credibility in Semantic Web and Knowledge Grid
PublicationThis article presents a novel algorithm for automatic estimation of information credibility. It concerns information collected in Knowledge Grid and Semantic Web. Possibilities to evaluate the credibility of information in such structures are much greater than those available for WWW sites which use natural language. The rating system presented in this paper estimates credibility automatically on the basis of the following metrics:...
-
Model of management of knowledge bases in the information technology evaluation environment
PublicationThe paper presents the model of management of knowledge bases in multi-agent system for evaluation of information technologies (IT_MAS). Such system is being developed in Gdansk Uni-versity of Technology by Information Technology Management Team. Multi-agent system is supposed to support manager level specialists during decision processes when there is identified need to buy or change any information technology. The main goal of...
-
Dedicated Geographical Information System in the context of Critical Infrastructure Protection
PublicationNowe zaawansowane narzędzia Technologii Informacyjnych i Komunikacyjnych mogą stanowić bardzo użyteczną pomoc podczas przewidywania różnego rodzaju zagrożeń jak również minimalizacji związanego z nimi ryzyka. Artykuł prezentuje Sieciowy System Informacji Przestrzennej dla Szacowania i Wizualizacji Infrastruktur Krytycznych i ich Zagrożeń, stworzony dla Urzędu Miejskiego w Gdańsku przez Politechnikę Gdańską. System ten jest przeznaczony...
-
Editorial: Information and knowledge engineering for intelligent systems. Part II
PublicationW pracy omówiono najnowsze dokonania w zakresie inzynierii i zarządzania wiedzą i informacją z perspektywy ich możliwych zastosowań w konstruowaniu systemów inteligentnych
-
Editorial: Information and knowledge engineering for intelligent systems. Part I
PublicationW pracy omówiono najnowsze dokonania w zakresie inzynierii i zarządzania wiedzą i informacją z perspektywy ich możliwych zastosowań w konstruowaniu systemów inteligentnych
-
Proposal of a methodology for the research of clients' demand engaging information technologies
PublicationMany researches on the customer's demands who engage the information technology in the business reveal significant mismatch in customer's expectations and technology vendors' offerings.
-
Corporate governance and propensity to share information: The long-run effect
Publication -
Soft modeling support for managing knowledge-based information technology (IT)
PublicationW pracy omówiono metody miękkiego modelowania. Wskazano na możliwości zastosowania tych metod do wspomagania tworzenia systemów opartych na wiedzy. Omówiono także metody oparte na teorii zbiorów rozmytych.
-
Determination of the impact indicators of electromagnetic interferences on computer information systems
Publication -
Gender and Digital Divide - Information and Communication Technologiesand their Impact on Equality
PublicationIn the entire Europe more women than men graduate from tertiaryeducation institutes. However, they are underrepresented in scientific and engineering disciplines. Women researchers still constitute a minority in the Government and Higher Education Sectors. A number of industry reports highlight a low number of women in IT occupations49. This has led to a variety of public policy measures, such as subsidies on community provision,...
-
On the sensitivity, selectivity, sensory information and optimalsize of resistive chemical sensors
PublicationWykorzystano pojęcia teorii informacji do określenia możliwości poprawy selektywności i czujności rezystancyjnych sensorów gazu. Podano ogólne rozważania dotyczące limitu selektywnoœci dla tych sensorów. Porównano iloraz sygnału do szumów oraz pojemność kanału informacyjnego dla sensorów chemicznych wykorzystujących jako sygnał zjawiska fluktuacyjne z klasycznymi sensorami charakteryzowanymi jedną wartością. Ogólne rozważania wsparto...
-
Greencoin – educational information system for ecoinclusion and empowering urban adaptability.
PublicationThe SARS-CoV19 pandemic exposed a broad spectrum of challenges for modern cities, societies and the environment at large. The post-Covid transformation requires new social, ecological and educational solutions, adjusted to modern challenges, but also equipped with technological advances that allow for digital inclusion and sustainable urban development to benefit the local economy and society. Many information systems designed...
-
Non-Perfect Propagation of Information to a Noisy Environment with Self-Evolution
PublicationWe study the non-perfect propagation of information for evolving a low-dimensional environment that includes self-evolution as well as noisy initial states and analyse the interrelations between the degree of objectivization and environment parameters. In particular, we consider an analytical model of three interacting qubits and derive its objectivity parameters. The numerical analysis shows that the quality of the spectrum broadcast...
-
Measures for interoperability of phenotypic data: minimum information requirements and formatting
Publication -
Information System Purchase and Integration Contingencies When Companies Merge
Publication -
Road safety information system in Poland - supporting tools and their development
PublicationAs a signatory to the UN Declaration on road safety and member of the EU, Poland has an obligation to comply with relevant EU policies and in particular to halve the overall number of road deaths by 2020. To monitor the progress in reaching the targets, the road safety situation must be evaluated and its processes understood. For this purpose regional and national road safety observatories were launched in Poland, which triggered...
-
Information Technology in Mechatronics as example of multidisciplinary approach to mechatronics course
PublicationArtykuł poświęcony jest przedstawianiu koncepcji nauczania na nowym, multidyscyplinarnym kierunku studiów ''Mechatronika''. W szczególności zaprezentowane zostały przykłady rozwiązań dotyczące kursu przedmiotu Informatyka. Przyjęte rozwiązania mają na celu podniesienie jakości kształcenia inżynierów na Wydziale Mechanicznym Politechniki Gdańskiej.
-
Urine composition as a source of information about occupational exposure to chemicals
PublicationIn the article there is presented review of data concerning application of human urine samples to analytical studies conducted in order to gain information on occupational exposure. The parameters characterizing the most commonly used techniques of xenobiotics isolation and preconcentration (organic compounds and metals) from urine samples and techniques of analytes determination in properly prepared extract samples of human urine.
-
The Technological Advancement of New Products, Product Newness and Market Information
PublicationThe purpose of this study is to propose product newness and obtaining market information as mediators of the relationship between the technological advancement of a new product and its commercial success. So far, little is known about the mediators of this relationship but knowledge about the factors that strengthen or weaken it is valid, both for the theory and practice of new product management. On the one hand, product newness...
-
Detecting coupling directions with transcript mutual information: A comparative study
PublicationCausal relationships are important to understand the dynamics of coupled processes and, moreover, to influence or control the effects by acting on the causes. Among the different approaches to determine cause-effect relationships and, in particular, coupling directions in interacting random or deterministic processes, we focus in this paper on information-theoretic measures. So, we study in the theoretical part the difference between...
-
Integrated information and prediction Web Service WaterPUCK General concept
PublicationIn this paper, general concept of a new method as ‘Integrated information and prediction Web Service WaterPUCK’ for investigation influence of agricultural holdings and land-use structures on coastal waters of the southern Baltic Sea is presented. WaterPUCK Service is focused on determination of the current and future environmental status of the surface water and groundwater located in the Puck District (Poland) and its impact...
-
Smart Document-Centric Processing of Human Oriented Information Flows
PublicationUsually people prefer to focus on creative rather than repetitive and schematic work patterns. Still, they must spend a lot of time complying with the procedures, selecting the information they receive and repeatedly restoring the previous state of work. This paper proposes the Mobile INteractive Document architecture (MIND) - a document-centric uniform interface to provide both effective communication of content and coordination...
-
Timing diagrams functionalities in information systems modeling with UML 2
PublicationArtykuł prezentuje aktualną klasyfikację diagramów interakcji języka UML 2 i przedstawia właściwości nowego diagramu tj. diagram harmonogramowania. W artykule omówiono ich istotę oraz podstawowe i zaawansowane kategorie ich modelowania. Diagram ten umożliwia reprezentowanie na osi czasu zmian dopuszczalnych stanów klasyfikatorów uczestniczących w interakcji. Możliwość harmonizacji linii zmian stanów dla większej liczby klasyfikatorów...
-
Conformation of six fentanyls revisited
Publication -
Algorithms for testing security in graphs
PublicationIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Extendable Safety and Security Ontology
PublicationSecurity plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...
-
Security Mechanisms in the Comcute System
PublicationThe aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.
-
Security ontology construction and integration
PublicationThere are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presentsgathered requirements needed to be taken into account when creating an ontology. The method of ontology creation...
-
Areas of research in maritime security
PublicationW referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.
-
The EU's Cyber Security Strategy
Publication -
On some aspects of maritime security
PublicationZostały przedstawione wybrane zagadnienia dotyczące ochrony żeglugi, w tym opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS, Statkowy System Alarmowania (SSAS) oraz system AIS i System Identyfikacji i Śledzenia Dalekiego Zasięgu (LRIT). Przedstawiono również znaczenie nowoczesnej telekomunikacji dla potrze sprawnej ochrony żeglugi na morzach i oceanach
-
External Security Strategies of Belarus
PublicationUnder President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...
-
Plant Biotechnology in Food Security
Publication -
Ukraine’s Energy Security in Strategies
PublicationDuring the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...
-
Security and Anonymity in Agent Systems
PublicationMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Quantum security and theory of decoherence
PublicationWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Results from a collective bound case studies analysis of researched Pol‐ ish metropolises for inspecting information management regarding air quality in light of information ecology
Publication -
SUBJECTIVE PERCEPTION OF MUSIC GENRES IN THE FIELD OF MUSIC INFORMATION RETRIEVAL SYSTEMS
PublicationThe aim of this paper is to evaluate the relationship between perception of music genres and subjective features of music that can be assigned to them. For this purpose a group of subjective features such as loudness, melody, rhythm, volume, instrumentation was chosen to describe music genres. A group of 30 listeners with normal hearing, ranging from 20 to 40, was created. Each sub-ject participating in listening tests was asked...
-
Extraction of information from born-digital PDF documents for reproducible research
PublicationBorn-digital PDF electronic documents might reasonably be expected to preserve useful data units of their source originals that suffice to produce executable papers for reproducible research. Unfortunately, developers of authoring tools may adopt arbitrary PDF generation strategies, producing a plethora of internal data representations. Such common information units as text paragraphs, tables, function graphs and flow diagrams,...
-
Modelling Evolution of Knowledge-Based Information Technology Organization: The Concept and Perspective
PublicationIncreasing pressure on improving the efficiency of companies' operations leads to transformation of their Information Technology (IT) organizations from technology-oriented to service-oriented, based on the Information Technology Infrastructure Library (ITIL) model. The evolution of these IT organizations can be supported by the knowledge-based systems centered on the rules determined through agregation and refinement of existing...
-
SUBJECTIVE PERCEPTION OF MUSIC GENRES IN THE FIELD OF MUSIC INFORMATION RETRIEVAL SYSTEMS
PublicationThe aim of this paper is to evaluate the relationship between perception of music genres and subjective features of music that can be assigned to them. For this purpose a group of subjective features such as loudness, melody, rhythm, volume, instrumentation was chosen to describe music genres. A group of 30 listeners with normal hearing, ranging from 20 to 40, was created. Each sub-ject participating in listening tests was asked...