Filters
total: 1947
-
Catalog
- Publications 1424 available results
- Journals 31 available results
- Publishing Houses 3 available results
- People 111 available results
- Inventions 38 available results
- Projects 12 available results
- Laboratories 2 available results
- Research Teams 9 available results
- Research Equipment 5 available results
- e-Learning Courses 251 available results
- Open Research Data 61 available results
displaying 1000 best results Help
Search results for: les
-
Leszek Mostowik
People -
Leszek Paczek profesor dr hab med
People -
Leszek Sieczko dr
People -
Leszek Lorbiecki dr inż.
People -
Leszek Samson mgr inż.
People -
Leszek Bogdanowicz dr inż.
People -
Leszek Mering mgr inż.
People -
Leszek Mazurkiewicz
People -
Leszek Obin
People -
Leszek Kukiełka inż.
People -
Leszek Lewiński
People -
Leszek Reszka dr
People -
Leszek Zięba mgr inż.
PeopleHe is a graduate of the Faculty of Electronics (1979 M.Sc. Electronics majoring in Computer Science). In the years 1979-1994 he worked at the PG Computing Center as a senior programmer, chief technologist in the Department of Basic Software and Software Development Department, senior designer. From 1994, he was employed as a senior lecturer in the Department of Production Engineering at the Faculty of Management and Economics of...
-
Leszek Litzbarski dr inż.
People -
Sub-national structures matter when evaluating physical activity promotion: Lessons from Germany
PublicationBackground Public policies are increasingly acknowledged as important part of promoting physical activity (PA). However, especially in states with sub-national administrative structures such as Germany, national and sub-national approaches differ considerably. In Germany, sport for all (SfA) promotion is mostly organized at sub-national level, which is usually not covered in national evaluations. Knowledge of these structures helps...
-
Lower rim substituted tert-Butylcalix[4]arenes. Part 13. Interaction of calix-hydroxamates with Fe(III) and Pb(II); studies in ion-selective membrane electrodes (ISE)
PublicationPrzedmiotem pracy są badania oddziaływań pomiędzy trzema wybranymi hydroksamowymi pochodnymi t-butylo-kaliks[4]arenu i jonami metali z wykorzystaniem membranowych elektrod jonoselektywnych (ISE). Elektrody zawierające jako materiał aktywny wymienione związki jonoforowe charakteryzują się nernstowskim nachyleniem i szerokim zakresem liniowości na jony Pb(II), a także dobrą selektywnością na jony Pb(II)w stosunku do jonów UO2(II),...
-
Lower rim substituted tert-butylcalix[4]arenes. Part 10. New Pb(II)-selective electrodes based on tetrasubstituted calix[4]arenes amides
PublicationOpracowano elektrody selektywne na jony Pb(II) oparte na lipofilowych tetrapodstawionych amidowych pochodnych kaliks[4] arenu. Charakterystyki elektrod mają nachylenie nernstowskie w szerokim zakresie stężeń 10 (-1.3) do 10 (-7.2).
-
Lower-rim-substituted tert-butylcalix[4]arenes. Part IX: one-pot synthesis of calix[4]arene-hydroxamates and calix[4]arene-amides
PublicationZaprezentowano prostą metodę selektywnej acylacji podstawionych i niepodstawionych hydroksyloamin za pomocą di i tetra podstawionych kaliks{4]aren-kwasów. Pokazano pierwszą strukturę krystalograficzną kaliks-hydroksyamidu.
-
Lean Six Sigma in French and Polish Small and Medium-Sized Enterprises - The Pilot Research Results
PublicationThe article presents results of the research conducted in Polish and French small and medium-sized enterprises referring to the context of the implementation and application of the concept of Lean Six Sigma. The research was conducted in the form of case studies, observations and individual interviews. The pilot studies led to the identification of the needs, expectations, concerns and experiences of these companies. At the same...
-
Efficient RSS-Based DoA Estimation for ESPAR Antennas Using Multiplane SDR Calibration Approach
PublicationIn this paper, we have introduced a new method to improve overall efficiency of direction-of-arrival (DoA) estimation scheme relying on received signal strength (RSS) values measured at the output port of electronically steerable parasitic array radiator (ESPAR) antenna. The proposed approach uses software-defined radio (SDR) setup and power pattern cross-correlation (PPCC) estimator involving multiple calibration planes. By placing...
-
Analiza temperatury ekwiwalentnej do projektowania nawierzchni asfaltowych w Polsce z wykorzystaniem metody AASHTO 2004
PublicationW artykule przedstawiono analizę temperatury ekwiwalentnej obliczanej w oparciu o kryterium spękań zmęczeniowych warstw asfaltowych z metody AASHTO 2004 oraz kryterium deformacji strukturalnych Instytutu Asfaltowego. Do obliczeń przyjęto konstrukcję nawierzchni KR5 oraz wykorzystano dane temperaturowe z 50 stacji meteorologicznych z okresu 30 lat od roku 1989 do roku 2019 włącznie udostępnione przez Instytut Meteorologii i Gospodarki...
-
EGATEC: A new high-resolution engineering model of the global atmospheric electric circuit—Currents in the lower atmosphere
Publication -
CFD analysis of a flow in commutation window in PWK pump
Open Research DataThe included data is a result of CFD analysis of a flow in a commutation window in PWK pump. The results were obtained for different pressures, viscosities and geometrical parameters of the gap. All the rows and columns have descriptions similar as in PhD Thesis: "Kompensacja skoków ciśnienia w pompie tłoczkowej o zmiennej wydajności z rozrządem krzywkowym",...
-
Data from pizoelectric pressure sensor placed inside PWK pump chamber
Open Research DataThe dataset contains raw data acquired from a piezoelectric pressure sensor placed inside PWK pump chamber. Pumping pressure was 10MPa, displacement was set to 100%, oil temperature was 33C. Columns "Czas" stand for a time in seconds and milliseconds, "Napięcie" stands for Voltage in Volts
-
Komputerowa technika pomiarowa w przykładach
PublicationZawarto opis metod łączenia kart pomiarowych z magistralami komputera, opis interfejsów systemów pomiarowych, bezprzewodowej transmisji danych, czujników oraz układów kondycjonowania sygnałów i akwizycji danych oprogramowania systemów pomiarowych
-
Measuring the Efficiency of Polish Municipalities – Data Envelopment Analysis Approach
Publication -
A Survey of Ongoing Activities of Best Agers in latvia, Lithuania and Poland: The main Results and lessons from Germany
Publication..
-
Lessons learned from developing an Industry 4.0 mobile process management system supported by Artificial Intelligence
PublicationResearch, development and innovation (RDI) projects are undertaken in order to improve existing, or develop new, more efficient products and services. Moreover, the goal of innovation is to produce new knowledge through research, and disseminating it through education and training. In this line of thinking, this paper reports and discusses the lessons learned from the undertaken project, regarding three areas: machine learning...
-
Adam Lesner
People -
Bogusława Łęska
People -
Daniel Lesiński
People -
Danuta Leśniewska prof. dr hab. inż.
People -
Oral coenzyme Q 10 administration prevents the development of ischemic brain lesions in a rabbit model of symptomatic vasospasm
Publication -
Optimal Selection of Input Features and an Acompanying Neural Network Structure for the Classification Purposes - Skin Lesions Case Study
Publication -
Optimal selection of input features and an acompanying neural network structure for the classification purposes - skin lesions case study
PublicationMalignant melanomas are the most deadly type of skin cancers however detected early enough give a high chances for successful treatment. The last years saw the dynamic growth of interest of automatic computer-aided skin cancer diagnosis. Every month brings new research results on new approaches to this problem, new methods of preprocessing, new classifiers, new ideas to follow etc. In particular, the rapid development of dermatoscopy,...
-
Architecture supporting security of agent systems
PublicationW rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...
-
Approaching Secure Industrial Control Systems
PublicationThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Nauczanie zarządzania bezpieczeństwem informacji: standardy i sposoby nauczania
PublicationPracownicy są najważniejszym ogniwem w ochronie informacji wewnątrz organizacji, gdyż to właśnie oni posiadają regularny dostęp do jej zasobów informacyjnych. Fakt ten jest dobrze rozpoznany przez krajowe oraz międzynarodowe instytucje standaryzujące, które w publikowanych normach zalecają kształcenie, szkolenia i podnoszenie świadomości pracowników jako kluczowy element strategii ochrony informacji przedsiębiorstw. W artykule...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
A Review of Standards with Cybersecurity Requirements for Smart Grid
PublicationAssuring cybersecurity of the smart grid is indispensable for the reliable operation of this new form of the electricity network. Experts agree that standardised solutions and practices should be applied in the first place. In recent years many new standards for smart grids have been published, which paradoxically results in the difficulty of finding a relevant publication in this plethora of literature. This paper presents results...
-
Standards on Cyber Security Assessment of Smart Grid
PublicationSecurity evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...
-
Standards with cybersecurity controls for smart grid - A systematic analysis
PublicationIn recent years numerous standards related to the cybersecurity of smart grids have been published, which led to the challenge for operators in obtaining indications that match their specific objectives and contexts. Although several studies approached this problem by providing more or less comprehensive surveys and overviews of smart grid cybersecurity standards, none of them was dedicated to the actual and important subject of...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublicationIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Anonymity Architecture for Mobile Agent Systems
PublicationThe paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...
-
Nauczanie zagadnień cyberbezpieczeństwa w Unii Europejskiej – trendy, wyzwania
PublicationZnaczenie edukacji, szkoleń i podnoszenia świadomości zagadnień cyberbezpieczeństwa jest dziś, w erze społeczeństwa informacyjnego powszechnie uznane. W ostatnich latach w Unii Europejskiej pojawiło się wiele nowych inicjatyw związanych między innymi z rozwijaniem programów uniwersyteckich, przygotowywaniem specjalistycznych i profilowanych szkoleń, uruchamianiem masowych otwartych kursów online, a także badaniami opinii publicznej...
-
Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey
PublicationResilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...
-
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis
PublicationRecently, a survey of cybersecurity assessment methods focused on general characteristics was conducted. Among its major findings, it revealed the methods’ adoption issues. This paper presents a follow-up to the study. It provides an in-depth analysis of the methods’ adoption-related properties based on qualitative metrics. As a result, the proposals which demonstrate a higher adoption potential were identified. The methods are...
-
Activity-based payments: alternative (anonymous) online payment model
PublicationElectronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...
-
Cost assessment of computer security activities
PublicationComprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...