Filters
total: 1234
-
Catalog
displaying 1000 best results Help
Search results for: information technology
-
ICT for Global Competitiveness and Economic Growth in Emerging Economies: Economic, Cultural, and Social Innovations for Human Capital in Transition Economies
Publication -
Open Source in Development: Enabling Business and Services
Publication -
A note on mixed tree coloring
PublicationZaproponowano liniowy algorytm dla problemu kolorowania mieszanego w drzewach, uzyskując tym samym poprawę w stosunku do algorytmu o złożoności O(n^2) podanego w pracy [P. Hansen, J. Kuplinsky, D. de Werra, Mixed graph colorings, Math. Methods Oper. Res. 45 (1997) 145-160].
-
Complexity of weak acceptonic conditions in tree automata
PublicationRozważano złożoność problemu pustości dla automatów na drzewach ze słabymi warunkami akceptowalności. Rozważano także translacje pomiędzy słabymi i silnymi warunkami akceptowalności.
-
Extending loophole-free nonlocal correlations to arbitrarily large distances
PublicationQuantum theory allows spatially separated observers to share nonlocal correlations, which enable them to accomplish classically inconceivable information processing and cryptographic feats. However, the distances over which nonlocal correlations can be realized remain severely limited due to their high fragility to noise and high threshold detection efficiencies. To enable loophole- free nonlocality across large distances, we introduce...
-
Maximum vertex occupation time and inert fugitive: recontamination does help [online]
PublicationRozważamy problem przeszukania danego grafu prostego G w celu przechwycenia niewidocznego i leniwego uciekiniera. Parametrem optymalizacyjnym, który minimalizujemy jest maksymalny czas (liczba tur strategii przeszukiwania), podczas których wierzchołek może być strzeżony (okupowany przez strażnika). Strategia monotoniczna to taka, która nie dopuszcza sytuacji, w której uciekinier dociera do wierzchołka, który wcześniej został oczyszczony....
-
Are quantum correlations symmetric?
PublicationWe provide operational definition of symmetry of entanglement: An entangled state contains symmetric entanglement if its subsystems can be exchanged (swapped) by means of local operations and classical communication. We show that in general states have asymmetric entanglement. This allows to construct nonsymmetric measure of entanglement, and a parameter that reports asymmetry of entanglement contents of quantum state. We propose...
-
Two-spinors, oscillator algebras, and qubits: aspects of manifestly covariant approach to relativistic quantum information
PublicationThe first part of the paper reviews applications of 2-spinor methods to relativistic qubits (analogies between tetrads in Minkowski space and 2-qubit states, qubits defined by means of null directions and their role for elimination of the Peres-Scudo-Terno phenomenon, advantages and disadvantages of relativistic polarization operators defined by the Pauli-Lubanski vector, manifestly covariant approach to unitary representations...
-
Modelling of Diffusing Capacity Measurement Results in Lung Microangiopathy Patients. A novel Diagnostic Suppport
PublicationLung microangiopathy is a little known negative influence of diabetes mellitus on the functioning of the lungs. The aim of this study is to design a supportive method for diagnosing lung microangiopathy. This will be based on routinely performed pulmonary measurements as well as on investigation process modelling and data processing. A model of the diffusion of oxygen from the alveoli to the blood has been described with a set...
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
An approximation algorithm for maximum P3-packing in subcubic graphs
PublicationW pracy podano algorytm 4/3-przyliżony dla trudnego obliczeniowo problemu umieszczania wierzchołkowo rozłącznych dwukrawędziowych ścieżek w grafach o stopniu maksymalnym 3 i stopniu minimalnym 2. Poprawiono tym samym wcześniejsze wyniki dla grafów kubicznych (A. Kelmans, D. Mubayi, Journal of Graph Theory 45, 2004).
-
Trees having many minimal dominating sets
PublicationWe provide an algorithm for listing all minimal dominating sets of a tree of order n in time O(1.4656^n). This leads to that every tree has at most 1.4656^n minimal dominating sets. We also give an infinite family of trees of odd and even order for which the number of minimal dominating sets exceeds 1.4167^n, thus exceeding 2^{n/2}. This establishes a lower bound on the running time of an algorithm for listing all minimal dominating...
-
Approaching Secure Industrial Control Systems
PublicationThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
The computational complexity of the backbone coloring problem for bounded-degree graphs with connected backbones
PublicationGiven a graph G, a spanning subgraph H of G and an integer λ>=2, a λ-backbone coloring of G with backbone H is a vertex coloring of G using colors 1, 2, ..., in which the color difference between vertices adjacent in H is greater than or equal to lambda. The backbone coloring problem is to find such a coloring with maximum color that does not exceed a given limit k. In this paper, we study the backbone coloring problem for bounded-degree...
-
ON THE NON-LOCALITY OF TRIPARTITE NON-SINGALING BOXES EMERGING FROM WIRINGS
PublicationIt has been recently shown, that some of the tripartite boxes admittin g bilocal decom- position, lead to non-locality under wiring operation applied to t wo of the subsystems [R. Gallego et al. Physical Review Letters 109 , 070401 (2012)]. In the following, we study this phenomenon quantitatively. Basing on the known classes of bo xes closed un- der wirings, we introduce multipartite monotones which are count erparts of bipartite ones...
-
Operating system security by integrity checking and recovery using write-protected storage
PublicationThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
NO-BROADCASTING OF NON-SIGNALLING BOXES VIA OPERATIONS WHICH TRANSFORM LOCAL BOXES INTO LOCAL ONES
PublicationWe deal with families of probability distributions satisfying non-signalling condition, called non-signalling boxes and consider a class of operations that transform local boxes into local ones (the one that admit LHV model). We prove that any operation from this class cannot broadcast a bipartite non-local box with 2 binary inputs and outputs. We consider a function called anti-Robustness which can not decrease under these operations....
-
“Project-factor-decision”. Decisive factors in IT projects and their impact on its success
PublicationThe aim of this article is to indicate the need for a deepening, systematizing and codifying of the theoretical and practical knowledge on IT project management, in the area of management decision-making processes. The scope of decisions made by managers is constantly on the increase. Project managers make decisions not only within the classic triangle of constraints, which consists of a schedule, a budget and the project scope,...
-
Multiacces quantum communication and product higher rank numerical range
PublicationIn the present paper we initiate the study of the product higher rank numerical range. The latter, being a variant of the higher rank numerical range, is a natural tool for study- ing a construction of quantum error correction codes for multiple access channels. We review properties of this set and relate it to other numerical ranges, which were recently introduced in the literature. Further, the concept is applied to the construction...
-
Analysing and processing of geotagged social media
PublicationThe use of location based data analysing tools is an important part of geomarketing strategies among entrepreneurs. One of the key elements of interest is social media data shared by the users. This data is analysed both for its content and its location information, the results help to identify trends represented in the researched regions. In order to verify the possibilities of analysing and processing of geotagged social media...
-
On the hardness of computing span of subcubic graphs
PublicationIn the paper we study the problem of finding ξ-colorings with minimal span, i.e. the difference between the largest and the smallest color used.
-
Semantic technologies based method of collection, processing and sharing information along food chain
PublicationIn the paper the method of collecting, processing and sharing information along food chain is presented. Innovative features of that method result from advantages of data engineering based on semantic technologies. The source to build ontology are standards and regulations related to food production, and data collected in databases owned by food chain participants. It allows food chain information resources can be represented in...
-
Smart innovation process enhancement using SOEKS and decisional DNA
PublicationProduct innovation always requires a foundation based on both knowledge and experience. The production and innovation process of products is very similar to the evolution process of humans. The genetic information of humans is stored in genes, chromosomes and DNA. Similarly, the information about the products can be stored in a system having virtual genes, chromosomes and decisional DNA (DDNA). The present paper proposes...
-
ENTERPRISE ACTIVITIES MODELING BY BPMN NOTATION
PublicationDepending on the process behavior, available know-how and organizational goals, different techniques and tools can be used for business process modeling. We concentrate on e-commerce, and try to find the best marketing strategy for the sales process improvement. In the paper we present the multilayer approach to define enterprise scenarios. This allows us to collect the suitable knowledge necessary for enterprise analysis and improvement....
-
Universal and contextualized public services: Digital public service innovation framework
PublicationIn view of the rising social and economic inequalities, public service delivery should be both universal, i.e. independent of the recipients' social or economic status, and contextualized, i.e. able to compensate for different local needs and conditions. Reconciling both properties requires various forms of innovations, chief among them innovations in digital public services. Building upon the four-stage model underpinning the...
-
Implementing Sustainable Development Goals with Digital Government – Aspiration-capacity gap
PublicationSustainable Development Goals (SDGs) represent a commitment by all United Nations Member States to pursue development efforts, including ending poverty and hunger, promoting well-being and education, reducing inequalities, fostering peace, and protecting the planet. Member States and their governments are supposed to take ownership of the SDGs, strengthen the implementation means, and improve public governance as both the means...
-
Computational collective intelligence for enterprise information systems
PublicationCollective intelligence is most often understood as a kind of intelligence which arises on the basis of a group (collective) of autonomous unites (people, systems) which is taskoriented. There are two important aspects of an intelligent collective: The cooperation aspect and the competition aspect (Levy 1997). The first of them means the possibility for integrating the decisions made by the collective members for creating the decision of...
-
Data governance: Organizing data for trustworthy Artificial Intelligence
PublicationThe rise of Big, Open and Linked Data (BOLD) enables Big Data Algorithmic Systems (BDAS) which are often based on machine learning, neural networks and other forms of Artificial Intelligence (AI). As such systems are increasingly requested to make decisions that are consequential to individuals, communities and society at large, their failures cannot be tolerated, and they are subject to stringent regulatory and ethical requirements....
-
An approach to constructing genuinely entangled subspaces of maximal dimension
PublicationGenuinely entangled subspaces (GESs) are the class of completely entangled subspaces that contain only genuinely multiparty entangled states. They constitute a particularly useful notion in the theory of entanglement but also have found an application, for instance, in quantum error correction and cryptography. In a recent study (Demianowicz and Augusiak in Phys Rev A 98:012313, 2018), we have shown how GESs can be efficiently...
-
Ontology-based text convolution neural network (TextCNN) for prediction of construction accidents
PublicationThe construction industry suffers from workplace accidents, including injuries and fatalities, which represent a significant economic and social burden for employers, workers, and society as a whole.The existing research on construction accidents heavily relies on expert evaluations,which often suffer from issues such as low efficiency, insufficient intelligence, and subjectivity.However, expert opinions provided in construction...
-
Design principles for creating digital transparency in government
PublicationUnder pressure to fight corruption, hold public officials accountable, and build trust with citizens, many governments pursue the quest for greater transparency. They publish data about their internal operations, externalize decision-making processes, establish digital inquiry lines to public officials, and employ other forms of transparency using digital means. Despite the presence of many transparency-enhancing digital tools,...
-
Mobile Security: Threats and Best Practices
PublicationCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
Quantum randomness protected against detection loophole attacks
PublicationDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....
-
The effect of current signal filtering method on the value of cutting power while sawing wood
PublicationThe goal of this work was to investigate an effect of various signal pre-processings on the outline of the electrical power curve and its influence on the measured cutting force estimation. Two signal processing methods were selected for the needs of the experiment, including digital filter and wavelet transform. The filter used was Butterworth, 3rd order band-stop with the cut-out band from 45 Hz to 55 Hz. The second approach...
-
Sources and Fate of PAHs and PCBs in the Marine Environment
PublicationThe assessment of a hazard resulting from the pollution of the environment by chemical compounds is in principle limited to the determination of their concentrations in its various compartments. But for solving many problems in this context, knowledge of the emission sources, transport pathways, and sites of deposition is of great benefit. By far the largest amounts of pollutants, regardless of where they were discharged, end up...
-
Smartphones as tools for equitable food quality assessment
PublicationBackground: The ubiquity of smartphones equipped with an array of sophisticated sensors, ample processing power, network connectivity and a convenient interface makes them a promising tool for non-invasive, portable food quality assessment. Combined with the recent developments in the areas of IoT, deep learning algorithms and cloud computing, they present an opportunity for advancing wide-spread, equitable and sustainable food...
-
Honey bees and their products - bioindicators of environmental contamination
PublicationHuman activities produce contaminants, the amounts and toxicity of which often exceed the environment’s homeostatic capacity to cleanse itself. Hence, the systematic analysis and monitoring of the environment is increasingly a matter of urgency. Honey bees, thanks to their morphological features, and also bee products are regarded as good indicators of environmental pollution by toxic substances, be these heavy metals, radioactive...
-
Joanna Błasiok mgr
PeopleJoanna Błasiok is a senior librarian at the Gdańsk University of Technology Library in the Scientific and Technical Information Services. She graduated from the Library and Information Science at the University of Wroclaw - specialty: digital libraries. At the Gdansk University of Technology Library she is responsible for copyright in full text publications in the Repository Open Access, which is part of the MOST Wiedzy (Bridge...
-
Rafał Leszczyna dr hab. inż.
PeopleDr hab. Rafal Leszczyna is an associate professor at Gdansk University of Technology, Faculty of Management and Economics. He holds the M.Sc. degrees of Computer Science and Business Management. In December, 2006 he earned a Ph.D. in Computer Science, specialisation - Computer Security at the Faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. Between 2004 and 2008 he worked in the European...
-
Oprogramowanie Systemów Elektronicznych 2023/2024
e-Learning Courses{mlang pl} Cel kursu: Programowanie urządzeń pomiarowych, obsługa interfejsów komputerowych, poznanie mechanizmów zwiększania wydajności oprogramowania (Win32 API, DLL, ODBC), projektowanie aplikacji wielozadaniowych. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic...
-
Oprogramowanie Systemów Elektronicznych 2021/2022
e-Learning Courses{mlang pl} Cel kursu: Programowanie urządzeń pomiarowych, obsługa interfejsów komputerowych, poznanie mechanizmów zwiększania wydajności oprogramowania (Win32 API, DLL, ODBC), projektowanie aplikacji wielozadaniowych. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic...
-
Infosystemy Elektroniczne 2023/2024
e-Learning Courses{mlang pl} Cel kursu: Poznanie zasad funkcjonowania różnorodnych infosystemów elektronicznych, obejmujących zastosowania przemysłowe i komercyjne elektroniki. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic Systems" na kierunku Elektronika.Obieralny dla specjalności...
-
Infosystemy Elektroniczne 2021/2022
e-Learning Courses{mlang pl} Cel kursu: Poznanie zasad funkcjonowania różnorodnych infosystemów elektronicznych, obejmujących zastosowania przemysłowe i komercyjne elektroniki. Dla studentów jakiego kierunku/stopnia studiów dany kurs jest przeznaczony: Przedmiot prowadzonych na studiach II stopnia.Obowiązkowy dla specjalności "Komputerowe Systemy Elektroniczne" i "Computer Electronic Systems" na kierunku Elektronika.Obieralny dla specjalności...
-
Measurements of no-load and short-circuit parameters of power transformers with taps
Open Research Data1) The Laboratory LINTE^2 is a large research infrastructure operated by the Faculty of Electrical and Control Engineering at Gdańsk University of Technology, to be found in Gdańsk, Poland (54.3690 N, 18.6130 E).
-
Effects of liquid phase modification on the values of surface tension of trickling liquid
Open Research DataDataset presents the values of surface tension of trickling liquid sampled from three running biotrickling filters.
-
Analytical design method for widening the intertrack space
PublicationThe paper involved the issue of arching of the railway turnouts. This is an issue which is given relatively less attention to scientific and research activities. Reference has been made to the book by Wladyslaw Rzepka, under the title „Curved turnouts in plan and profile”, which has been used in Poland for more than 50 years as the main source of information relating to the turnouts on the curve. The book is a compilation of elaborations...
-
Arching of railway turnouts by analytical design method
PublicationThe paper involved the issue of arching of the railway turnouts. This is an issue which is given relatively less attention to scientific and research activities. Reference has been made to the book by Wladyslaw Rzepka, under the title „Curved turnouts in plan and profile”, which has been used in Poland for more than 50 years as the main source of information relating to the turnouts on the curve. The book is a compilation of elaborations...
-
Evaluation of the suitability of electronic nose based on fast GC for distinguishing between the plum spirits of different geographical origins
PublicationPlum spirits are obtained exclusively via the alcoholic fermentation and distillation of meaty plums or must composed of plums, with or without stones. The European countries such as Poland, the Slovak Republic, the Czech Republic, Bulgaria and Romania are the leading producers of this alcoholic beverage. Information about the authentication of plum spirits produced in different countries can be found in the published literature....
-
Role of Glycosaminoglycans in Procathepsin B Maturation: Molecular Mechanism Elucidated by a Computational Study
Publication -
Role of Oligosaccharide Chain Polarity in Protein–Glycosaminoglycan Interactions
Publication