Filters
total: 2132
-
Catalog
- Publications 1580 available results
- Journals 31 available results
- Publishing Houses 3 available results
- People 111 available results
- Inventions 38 available results
- Projects 12 available results
- Laboratories 2 available results
- Research Teams 9 available results
- Research Equipment 5 available results
- e-Learning Courses 279 available results
- Open Research Data 62 available results
displaying 1000 best results Help
Search results for: LES
-
Leszek Sieczko dr
People -
Leszek Samson mgr inż.
People -
Leszek Lorbiecki dr inż.
People -
Leszek Bogdanowicz dr inż.
People -
Leszek Mering mgr inż.
People -
Leszek Obin
People -
Leszek Kukiełka inż.
People -
Leszek Mazurkiewicz
People -
Leszek Reszka dr
People -
Leszek Litzbarski dr inż.
People -
Leszek Osiecki dr hab. inż.
People -
Leszek Lewiński
People -
Leszek Zięba mgr inż.
PeopleHe is a graduate of the Faculty of Electronics (1979 M.Sc. Electronics majoring in Computer Science). In the years 1979-1994 he worked at the PG Computing Center as a senior programmer, chief technologist in the Department of Basic Software and Software Development Department, senior designer. From 1994, he was employed as a senior lecturer in the Department of Production Engineering at the Faculty of Management and Economics of...
-
Lower rim substituted tert-Butylcalix[4]arenes. Part 13. Interaction of calix-hydroxamates with Fe(III) and Pb(II); studies in ion-selective membrane electrodes (ISE)
PublicationPrzedmiotem pracy są badania oddziaływań pomiędzy trzema wybranymi hydroksamowymi pochodnymi t-butylo-kaliks[4]arenu i jonami metali z wykorzystaniem membranowych elektrod jonoselektywnych (ISE). Elektrody zawierające jako materiał aktywny wymienione związki jonoforowe charakteryzują się nernstowskim nachyleniem i szerokim zakresem liniowości na jony Pb(II), a także dobrą selektywnością na jony Pb(II)w stosunku do jonów UO2(II),...
-
Lower rim substituted tert-butylcalix[4]arenes. Part 10. New Pb(II)-selective electrodes based on tetrasubstituted calix[4]arenes amides
PublicationOpracowano elektrody selektywne na jony Pb(II) oparte na lipofilowych tetrapodstawionych amidowych pochodnych kaliks[4] arenu. Charakterystyki elektrod mają nachylenie nernstowskie w szerokim zakresie stężeń 10 (-1.3) do 10 (-7.2).
-
Lower-rim-substituted tert-butylcalix[4]arenes. Part IX: one-pot synthesis of calix[4]arene-hydroxamates and calix[4]arene-amides
PublicationZaprezentowano prostą metodę selektywnej acylacji podstawionych i niepodstawionych hydroksyloamin za pomocą di i tetra podstawionych kaliks{4]aren-kwasów. Pokazano pierwszą strukturę krystalograficzną kaliks-hydroksyamidu.
-
Zero-Pole Approach in Microwave Passive Circuit Design
PublicationIn this thesis, optimization strategies for design of microwave passive structures including filters, couplers, antenna and impedance transformer and construction of various surroogate models utilized to fasten the design proces have been discussed. Direct and hybrid optimization methodologies including space mapping and multilevel algorithms combined with various surrogate models at different levels of fidelity have been utilized...
-
Sub-national structures matter when evaluating physical activity promotion: Lessons from Germany
PublicationBackground Public policies are increasingly acknowledged as important part of promoting physical activity (PA). However, especially in states with sub-national administrative structures such as Germany, national and sub-national approaches differ considerably. In Germany, sport for all (SfA) promotion is mostly organized at sub-national level, which is usually not covered in national evaluations. Knowledge of these structures helps...
-
Od demiurga do twórczego koordynatora. Ewolucja warsztatu architekta po 1995 r.
PublicationRozprawa zajmuje się rozważaniem na temat charakteru twórczego profesji. Postrzeganie społeczne i funkcja, jaka przepisywana była architektom i urbanistom, rola twórcy – demiurga, ustępuje dziś miejsca roli architekta – koordynatora. Praca podejmuje próbę deskrypcji zmian zachodzących w warsztacie pracy architekta, poprzez badanie dorobku twórczego pracowni Grupa 5 Architekci, której działalność przypada na okres transformacji...
-
Lean Six Sigma in French and Polish Small and Medium-Sized Enterprises - The Pilot Research Results
PublicationThe article presents results of the research conducted in Polish and French small and medium-sized enterprises referring to the context of the implementation and application of the concept of Lean Six Sigma. The research was conducted in the form of case studies, observations and individual interviews. The pilot studies led to the identification of the needs, expectations, concerns and experiences of these companies. At the same...
-
Efficient RSS-Based DoA Estimation for ESPAR Antennas Using Multiplane SDR Calibration Approach
PublicationIn this paper, we have introduced a new method to improve overall efficiency of direction-of-arrival (DoA) estimation scheme relying on received signal strength (RSS) values measured at the output port of electronically steerable parasitic array radiator (ESPAR) antenna. The proposed approach uses software-defined radio (SDR) setup and power pattern cross-correlation (PPCC) estimator involving multiple calibration planes. By placing...
-
EGATEC: A new high-resolution engineering model of the global atmospheric electric circuit—Currents in the lower atmosphere
Publication -
Monoubiquitinated Histone H1B Is Required for Antiviral Protection in CD4+T Cells Resistant to HIV-1
Publication -
Measuring the Efficiency of Polish Municipalities – Data Envelopment Analysis Approach
Publication -
Adam Lesner
People -
Bogusława Łęska
People -
Daniel Lesiński
People -
Danuta Leśniewska prof. dr hab. inż.
People -
Analiza temperatury ekwiwalentnej do projektowania nawierzchni asfaltowych w Polsce z wykorzystaniem metody AASHTO 2004
PublicationW artykule przedstawiono analizę temperatury ekwiwalentnej obliczanej w oparciu o kryterium spękań zmęczeniowych warstw asfaltowych z metody AASHTO 2004 oraz kryterium deformacji strukturalnych Instytutu Asfaltowego. Do obliczeń przyjęto konstrukcję nawierzchni KR5 oraz wykorzystano dane temperaturowe z 50 stacji meteorologicznych z okresu 30 lat od roku 1989 do roku 2019 włącznie udostępnione przez Instytut Meteorologii i Gospodarki...
-
CFD analysis of a flow in commutation window in PWK pump
Open Research DataThe included data is a result of CFD analysis of a flow in a commutation window in PWK pump. The results were obtained for different pressures, viscosities and geometrical parameters of the gap. All the rows and columns have descriptions similar as in PhD Thesis: "Kompensacja skoków ciśnienia w pompie tłoczkowej o zmiennej wydajności z rozrządem krzywkowym",...
-
Data from pizoelectric pressure sensor placed inside PWK pump chamber
Open Research DataThe dataset contains raw data acquired from a piezoelectric pressure sensor placed inside PWK pump chamber. Pumping pressure was 10MPa, displacement was set to 100%, oil temperature was 33C. Columns "Czas" stand for a time in seconds and milliseconds, "Napięcie" stands for Voltage in Volts
-
Comovements between heavily shorted stocks during a market squeeze: Lessons from the GameStop trading frenzy
Publication -
A Survey of Ongoing Activities of Best Agers in latvia, Lithuania and Poland: The main Results and lessons from Germany
Publication..
-
Lessons learned from developing an Industry 4.0 mobile process management system supported by Artificial Intelligence
PublicationResearch, development and innovation (RDI) projects are undertaken in order to improve existing, or develop new, more efficient products and services. Moreover, the goal of innovation is to produce new knowledge through research, and disseminating it through education and training. In this line of thinking, this paper reports and discusses the lessons learned from the undertaken project, regarding three areas: machine learning...
-
Komputerowa technika pomiarowa w przykładach
PublicationZawarto opis metod łączenia kart pomiarowych z magistralami komputera, opis interfejsów systemów pomiarowych, bezprzewodowej transmisji danych, czujników oraz układów kondycjonowania sygnałów i akwizycji danych oprogramowania systemów pomiarowych
-
Oral coenzyme Q 10 administration prevents the development of ischemic brain lesions in a rabbit model of symptomatic vasospasm
Publication -
Optimal Selection of Input Features and an Acompanying Neural Network Structure for the Classification Purposes - Skin Lesions Case Study
Publication -
Optimal selection of input features and an acompanying neural network structure for the classification purposes - skin lesions case study
PublicationMalignant melanomas are the most deadly type of skin cancers however detected early enough give a high chances for successful treatment. The last years saw the dynamic growth of interest of automatic computer-aided skin cancer diagnosis. Every month brings new research results on new approaches to this problem, new methods of preprocessing, new classifiers, new ideas to follow etc. In particular, the rapid development of dermatoscopy,...
-
High-precision bearing estimation for active sonar with cylindrical array performed by interpolated array transformation
PublicationThe article presents a method for improving the accuracy of bearing in multibeam sonar with a cylindrical array. The antenna’s non-linear shape and the resulting non-uniform sampling of the signal in space, mean that known methods of high-resolution spectral analysis cannot be used. In order to apply an algorithm from this group, a linear virtual antenna must be produced. The paper presents a technique of mapping a cylindrical...
-
Architecture supporting security of agent systems
PublicationW rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...
-
Activity-based payments: alternative (anonymous) online payment model
PublicationElectronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...
-
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis
PublicationRecently, a survey of cybersecurity assessment methods focused on general characteristics was conducted. Among its major findings, it revealed the methods’ adoption issues. This paper presents a follow-up to the study. It provides an in-depth analysis of the methods’ adoption-related properties based on qualitative metrics. As a result, the proposals which demonstrate a higher adoption potential were identified. The methods are...
-
Nauczanie zarządzania bezpieczeństwem informacji: standardy i sposoby nauczania
PublicationPracownicy są najważniejszym ogniwem w ochronie informacji wewnątrz organizacji, gdyż to właśnie oni posiadają regularny dostęp do jej zasobów informacyjnych. Fakt ten jest dobrze rozpoznany przez krajowe oraz międzynarodowe instytucje standaryzujące, które w publikowanych normach zalecają kształcenie, szkolenia i podnoszenie świadomości pracowników jako kluczowy element strategii ochrony informacji przedsiębiorstw. W artykule...
-
Anonymity Architecture for Mobile Agent Systems
PublicationThe paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...
-
Nauczanie zagadnień cyberbezpieczeństwa w Unii Europejskiej – trendy, wyzwania
PublicationZnaczenie edukacji, szkoleń i podnoszenia świadomości zagadnień cyberbezpieczeństwa jest dziś, w erze społeczeństwa informacyjnego powszechnie uznane. W ostatnich latach w Unii Europejskiej pojawiło się wiele nowych inicjatyw związanych między innymi z rozwijaniem programów uniwersyteckich, przygotowywaniem specjalistycznych i profilowanych szkoleń, uruchamianiem masowych otwartych kursów online, a także badaniami opinii publicznej...
-
Approaching Secure Industrial Control Systems
PublicationThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Cost assessment of computer security activities
PublicationComprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...
-
ISO/IEC 27001-Based Estimation of Cybersecurity Costs with Caspea
PublicationIn the contemporary, knowledge-based economy, enterprises are forced to bear the costs related to cybersecurity. While breaches negatively affect companies' budgets, accurate decisions on security investments result in visible savings. At the same time, cybersecurity cost assessment methods that support these decisions are lacking. Caspea addresses the gap by enabling the estimation of costs related to personnel activities involved...
-
Cybersecurity Assessment Methods—Why Aren’t They Used?
PublicationA recent survey of cybersecurity assessment methods proposed in academic and research environments revealed that their adoption in operational settings was extremely scarce. At the same time, the frameworks developed by industrial communities have been met with broad reception. The question arises of what contributed to the success of the methods. To answer it, three-part research that employed evaluation criteria, qualitative...
-
Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria
PublicationInformation technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...