Filters
total: 18422
-
Catalog
- Publications 15274 available results
- Journals 935 available results
- Conferences 182 available results
- Publishing Houses 1 available results
- People 459 available results
- Inventions 4 available results
- Projects 45 available results
- Laboratories 1 available results
- Research Teams 2 available results
- Research Equipment 8 available results
- e-Learning Courses 555 available results
- Events 50 available results
- Open Research Data 906 available results
displaying 1000 best results Help
Search results for: KNOWLEDGE MANAGEMENT, KNOWLEDGE SECURITY, KNOWLEDGE RISKS, COVID-19, CONCEPTUAL PAPER, INTEGRATIVE MODEL
-
Remdesivir-based therapy improved recovery of patients with COVID-19 in the SARSTer multicentre, real-world study
Publication -
Universal Predictors of Dental Students’ Attitudes towards COVID-19 Vaccination: Machine Learning-Based Approach
Publication -
Frequency and Nuisance Level of Adverse Events in Individuals Receiving Homologous and Heterologous COVID-19 Booster Vaccine
Publication -
Amplifying dementia as a global public health problem: A cross-country comparison of the impact of COVID-19 pandemic
Publication -
A qualitative 5-country comparison of the perceived impacts of COVID-19 on people living with dementia and unpaid carers
Publication -
Psychopathological responses and face mask restrictions during the COVID-19 outbreak: Results from a nationwide survey
Publication -
Lifestyle changes in patients with morbid obesity and type 2 diabetes mellitus during the COVID-19 pandemic
Publication -
Bariatric Surgery during COVID-19 Pandemic from Patients’ Point of View—The Results of a National Survey
Publication -
Handling of the Covid-19 Pandemic and Its Effects on Bariatric Surgical Practice: Analysis of GENEVA Study Database
Publication -
The Prevalence of Loneliness among University Students from Five European Countries during the COVID-19 Pandemic
Publication -
SDN testbed for validation of cross-layer data-centric security policies
PublicationSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
Distributed Trust Management Model for Wireless Sensor Networks
Publication -
Cybersecurity of Enterprise Infrastructure 2023
e-Learning CoursesThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
Cybersecurity of Enterprise Infrastructure 2024
e-Learning CoursesThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
Knowledge capture
Conferences -
Gravity-related research (Engineering and Management of Space Systems) 21/22
e-Learning CoursesThe goal of the subject is to extend of the knowledge gained in the framework of general mechanics (statics, kinematics, dynamics). Students will be familiarized with the description of the kinematics and dynamics of motion in typical gravity-related research conditions (microgravity in parabolic flights, drop towers, sounding rockets) as well as gravity-related research platforms, its opportunities and limitations. Additionally,...
-
Wybrane problemy ochrony żeglugi (Maritime Security)
Publicationprzedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...
-
Security of export transactions in the offer of leading banks on the Polish market
PublicationThe following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...
-
ICT and social development. Conceptual considerations.
PublicationThis chapter is intended to provide basic ideas and concepts related to technology, technological progress and society. It explains how and why technology and society are interrelated, forming a dynamic, complex and interdependent evolutionary system. It introduces the terms Digital (ICT) Revolution and information and communication technologies (ICTs), showing elementary features of new technologies. The chapter explains why ICTs...
-
Conceptual system development in a concurrent environment
PublicationW artykule omówiono możliwości wspomagania jednego z najważniejszych obszarów projektowania, a mianowicie projektowania koncepcyjnego. Rozważania te odniesiono do otoczenia inżynierii wspozadaniowej, co dodatkowo skomplikowano problemy decyzyjne podejmowane na tym etapie projektowania. Zaproponowano szereg elementów wspomagania projektowania koncepcyjnego ze szczególnym uwzględnieniem możliwości praktycznej implementacji takiego...
-
Ideological and Practical Model of Metaontology
PublicationRozwój inicjatywy Semantic Web spowodował rozwój różnych języków definiowania wiedzy i manipulowania nią. W ramach tych języków istotnym elementem jest zaprojektowanie rozkazów terminologicznych. W artykule przedstawiono sposób realizacji zapytań terminologicznych w języku KQL (Knowledge Query Language), służącym do dostępu do systemu zarządzania wiedzą RKaSeA.
-
Geoscientific Model Development
Journals -
Witold Sygocki dr
People -
Functional safety and security assessment of the control and protection systems
PublicationW artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.
-
Economics of credit scoring management
PublicationCredit scoring models constitute an inevitable element of modern risk and profitability management in retail financial lending institutions. Quality,or separation power of a credit scoring model is usually assessed with the Gini coefficient. Generally, the higher Gini coefficient the better, as in this way a bank can increase number of good customers and/or reject more bad applicants. In...
-
E-Learning Service Management System For Migration Towards Future Internet Architectures
PublicationAs access to knowledge and continuous learning are among the most valuable assets in modern, technological society, it is hardly surprising that e-learning solutions can be counted amongst the most important groups of services being deployed in modern network systems. Based on analysis of their current state-of-the-art, we decided to concentrate our research and development work on designing and implementing a management system...
-
2D Mathematical Model of the Commutator Sliding Contact of an Electrical Machine
PublicationW artykule przedstawiono model matematyczny 2D komutatorowego zestyku ślizgowego z wieloma stopniami swobody. W modelu uwzględniono zmienne wymuszenia działające na szczotkę. Wymuszenia te są wynikiem falistości wirującego komutatora. Szczotka została zamodelowana jako system wielu mas, elementów sprężystych i tłumików rozłożonych w kierunku stycznym i promieniowym. Zamodelowano wszystkie oddziaływania lepkosprężyste pomiędzy komutatorem...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublicationAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Polish Polar Research: Green-and-White Paper under the aegis of the Polish Polar Consortium (PPC)
PublicationPolar research is a colloquial term for cross-area, cross-domain and interdisciplinary research in the Arctic and Antarctic. Polar research is mainly the domain of natural sciences, but technical sciences and humanities also grow in importance. Being vulnerable to climate change, polar regions are commonly considered as a kind of litmus paper of changes in geosystems, hence the importance of research done there. It aims at a better...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublicationIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects
PublicationSafety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...
-
Procedure based proactive functional safety management for the risk mitigation of hazardous events in the oil port installations including insurance aspects
PublicationThis article addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety requirements specified in standards IEC 61508 and IEC 61511. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on risk assessment results...
-
General Active-RC filter model for computer-aided design
PublicationW pracy przedstawiono ogólną topologię filtru aktywnego RC czasu ciągłego. Proponowany model umożliwia zunifikowaną analizę wszystkich możliwych realizacji układowych filtrów aktywnych RC jako szczególnych przypadków danej struktury ogólnej. Poprawność modelu teoretycznego została zweryfikowana poprzez symulacje w programie SPICE.
-
The first International Comparative Social Enterprise Models Working Paper: Poland
PublicationIn this paper, social enterprise models: entrepreneurial nonprofit organizations, cooperatives and vocational enterprises for the disabled are presented. Their emergence and institutionalization in the Polish social enterprise organizations landscape is provided and analysed. Also, the authors point to the convergences and divergences between these three models. Additionally historical background and institutional trajectories...
-
Michał Urbaniak dr inż.
People -
Ideologiczny i praktyczny model metaontologii
PublicationRozwój inicjatywy Semantic Web spowodował rozwój różnych języków definiowania wiedzy i manipulowania nią. W ramach tych języków istotnym elementem jest zaprojektowanie rozkazów terminologicznych. W artykule przedstawiono sposób realizacji zapytań terminologicznych w języku KQL (Knowledge Query Language) - języku dostępu do systemu zarządzania wiedzą RKaSeA.
-
Security of Web Services
PublicationArtykuł przedstawia zagadnienia związane tematycznie z Web Services. W szczególności dotyczy problemów związanych z zapewniwniem poufności i integralności danych. Zdefiniowano model bezpieczeństwa Web Services integrujący trzy główne technologie: SOAP, UDDI, WSDL.
-
Multivalent Display of SARS-CoV-2 Spike (RBD Domain) of COVID-19 to Nanomaterial, Protein Ferritin Nanocages
Publication -
‘Who Else If Not We’. Medical Students’ Perception and Experiences with Volunteering during the COVID-19 Crisis in Poznan, Poland
Publication -
“We are also here”—Spiritual Care Practitioners’ Experiences of the COVID-19 Pandemic: A Qualitative Study from Poland
Publication -
Analysis of mHealth research: mapping the relationship between mobile apps technology and healthcare during COVID-19 outbreak
Publication -
Low symptomatic COVID-19 in an elderly patient with follicular lymphoma treated with rituximab-based immunotherapy: A case report
Publication -
COVID-19 pandemic fear, life satisfaction and mental health at the initial stage of the pandemic in the largest cities in Poland
Publication -
A 10-Year-old Girl With Late Acute Lymphoblastic Leukemia Recurrence Diagnosed With COVID-19 and Treated With Remdesivir
Publication -
Updated principles of prevention, diagnosis and treatment of COVID-19 in children in Poland – recommendations for paediatricians and family medicine doctors
Publication -
WPŁYW PANDEMII COVID-19 NA OBCIĄŻENIE POLSKIEGO SYSTEMU ELEKTROENERGETYCZNEGO ORAZ POTENCJAŁ WYKORZYSTANIA USŁUGI DSR
PublicationW artykule przedstawiono wpływ restrykcji w funkcjonowaniu przemysłu, handlu i życia społecznego na obciążenie KSE podczas pierwszego lockdownu. W celu zbadania wpływu pandemii na obciążenie KSE dokonano analizy porównawczej dwóch analogicznych okresów trwających od połowy marca do końca maja w latach 2017 - 2019 i 2020. Porównano wartości charakteryzujące poszczególne tygodnie rozpatrywanego okresu. W roku 2020 zaobserwowano znaczne...
-
30‐Day morbidity and mortality of bariatric metabolic surgery in adolescence during the COVID‐19 pandemic – The GENEVA study
Publication -
Exploring COVID-19 conspiracy theories: education, religiosity, trust in scientists, and political orientation in 26 European countries
Publication -
THE RELATIONSHIP BETWEEN STRESS HORMONES AND STUDENTS’ COPING STRATEGIES IN THE CONTEXT OF THE DYNAMICALLY CHANGING SITUATION OF THE COVID-19 PANDEMIC
Publication -
Stress Perception and Coping Strategies of Students on Both Sides of the EU’s Eastern Border during the COVID-19 Pandemic
Publication