Filters
total: 2041
-
Catalog
- Publications 1518 available results
- Journals 31 available results
- Publishing Houses 3 available results
- People 111 available results
- Inventions 38 available results
- Projects 12 available results
- Laboratories 2 available results
- Research Teams 9 available results
- Research Equipment 5 available results
- e-Learning Courses 251 available results
- Open Research Data 61 available results
displaying 1000 best results Help
Search results for: les
-
Leszek Mostowik
People -
Leszek Paczek profesor dr hab med
People -
Leszek Sieczko dr
People -
Leszek Lorbiecki dr inż.
People -
Leszek Samson mgr inż.
People -
Leszek Bogdanowicz dr inż.
People -
Leszek Mering mgr inż.
People -
Leszek Mazurkiewicz
People -
Leszek Obin
People -
Leszek Kukiełka inż.
People -
Leszek Lewiński
People -
Leszek Reszka dr
People -
Leszek Zięba mgr inż.
PeopleHe is a graduate of the Faculty of Electronics (1979 M.Sc. Electronics majoring in Computer Science). In the years 1979-1994 he worked at the PG Computing Center as a senior programmer, chief technologist in the Department of Basic Software and Software Development Department, senior designer. From 1994, he was employed as a senior lecturer in the Department of Production Engineering at the Faculty of Management and Economics of...
-
Leszek Litzbarski dr inż.
People -
Sub-national structures matter when evaluating physical activity promotion: Lessons from Germany
PublicationBackground Public policies are increasingly acknowledged as important part of promoting physical activity (PA). However, especially in states with sub-national administrative structures such as Germany, national and sub-national approaches differ considerably. In Germany, sport for all (SfA) promotion is mostly organized at sub-national level, which is usually not covered in national evaluations. Knowledge of these structures helps...
-
Lower rim substituted tert-Butylcalix[4]arenes. Part 13. Interaction of calix-hydroxamates with Fe(III) and Pb(II); studies in ion-selective membrane electrodes (ISE)
PublicationPrzedmiotem pracy są badania oddziaływań pomiędzy trzema wybranymi hydroksamowymi pochodnymi t-butylo-kaliks[4]arenu i jonami metali z wykorzystaniem membranowych elektrod jonoselektywnych (ISE). Elektrody zawierające jako materiał aktywny wymienione związki jonoforowe charakteryzują się nernstowskim nachyleniem i szerokim zakresem liniowości na jony Pb(II), a także dobrą selektywnością na jony Pb(II)w stosunku do jonów UO2(II),...
-
Lower rim substituted tert-butylcalix[4]arenes. Part 10. New Pb(II)-selective electrodes based on tetrasubstituted calix[4]arenes amides
PublicationOpracowano elektrody selektywne na jony Pb(II) oparte na lipofilowych tetrapodstawionych amidowych pochodnych kaliks[4] arenu. Charakterystyki elektrod mają nachylenie nernstowskie w szerokim zakresie stężeń 10 (-1.3) do 10 (-7.2).
-
Lower-rim-substituted tert-butylcalix[4]arenes. Part IX: one-pot synthesis of calix[4]arene-hydroxamates and calix[4]arene-amides
PublicationZaprezentowano prostą metodę selektywnej acylacji podstawionych i niepodstawionych hydroksyloamin za pomocą di i tetra podstawionych kaliks{4]aren-kwasów. Pokazano pierwszą strukturę krystalograficzną kaliks-hydroksyamidu.
-
Lean Six Sigma in French and Polish Small and Medium-Sized Enterprises - The Pilot Research Results
PublicationThe article presents results of the research conducted in Polish and French small and medium-sized enterprises referring to the context of the implementation and application of the concept of Lean Six Sigma. The research was conducted in the form of case studies, observations and individual interviews. The pilot studies led to the identification of the needs, expectations, concerns and experiences of these companies. At the same...
-
Efficient RSS-Based DoA Estimation for ESPAR Antennas Using Multiplane SDR Calibration Approach
PublicationIn this paper, we have introduced a new method to improve overall efficiency of direction-of-arrival (DoA) estimation scheme relying on received signal strength (RSS) values measured at the output port of electronically steerable parasitic array radiator (ESPAR) antenna. The proposed approach uses software-defined radio (SDR) setup and power pattern cross-correlation (PPCC) estimator involving multiple calibration planes. By placing...
-
Analiza temperatury ekwiwalentnej do projektowania nawierzchni asfaltowych w Polsce z wykorzystaniem metody AASHTO 2004
PublicationW artykule przedstawiono analizę temperatury ekwiwalentnej obliczanej w oparciu o kryterium spękań zmęczeniowych warstw asfaltowych z metody AASHTO 2004 oraz kryterium deformacji strukturalnych Instytutu Asfaltowego. Do obliczeń przyjęto konstrukcję nawierzchni KR5 oraz wykorzystano dane temperaturowe z 50 stacji meteorologicznych z okresu 30 lat od roku 1989 do roku 2019 włącznie udostępnione przez Instytut Meteorologii i Gospodarki...
-
EGATEC: A new high-resolution engineering model of the global atmospheric electric circuit—Currents in the lower atmosphere
Publication -
CFD analysis of a flow in commutation window in PWK pump
Open Research DataThe included data is a result of CFD analysis of a flow in a commutation window in PWK pump. The results were obtained for different pressures, viscosities and geometrical parameters of the gap. All the rows and columns have descriptions similar as in PhD Thesis: "Kompensacja skoków ciśnienia w pompie tłoczkowej o zmiennej wydajności z rozrządem krzywkowym",...
-
Data from pizoelectric pressure sensor placed inside PWK pump chamber
Open Research DataThe dataset contains raw data acquired from a piezoelectric pressure sensor placed inside PWK pump chamber. Pumping pressure was 10MPa, displacement was set to 100%, oil temperature was 33C. Columns "Czas" stand for a time in seconds and milliseconds, "Napięcie" stands for Voltage in Volts
-
Komputerowa technika pomiarowa w przykładach
PublicationZawarto opis metod łączenia kart pomiarowych z magistralami komputera, opis interfejsów systemów pomiarowych, bezprzewodowej transmisji danych, czujników oraz układów kondycjonowania sygnałów i akwizycji danych oprogramowania systemów pomiarowych
-
Measuring the Efficiency of Polish Municipalities – Data Envelopment Analysis Approach
Publication -
Lessons learned from developing an Industry 4.0 mobile process management system supported by Artificial Intelligence
PublicationResearch, development and innovation (RDI) projects are undertaken in order to improve existing, or develop new, more efficient products and services. Moreover, the goal of innovation is to produce new knowledge through research, and disseminating it through education and training. In this line of thinking, this paper reports and discusses the lessons learned from the undertaken project, regarding three areas: machine learning...
-
A Survey of Ongoing Activities of Best Agers in latvia, Lithuania and Poland: The main Results and lessons from Germany
Publication..
-
Adam Lesner
People -
Bogusława Łęska
People -
Daniel Lesiński
People -
Danuta Leśniewska prof. dr hab. inż.
People -
Oral coenzyme Q 10 administration prevents the development of ischemic brain lesions in a rabbit model of symptomatic vasospasm
Publication -
Optimal Selection of Input Features and an Acompanying Neural Network Structure for the Classification Purposes - Skin Lesions Case Study
Publication -
Optimal selection of input features and an acompanying neural network structure for the classification purposes - skin lesions case study
PublicationMalignant melanomas are the most deadly type of skin cancers however detected early enough give a high chances for successful treatment. The last years saw the dynamic growth of interest of automatic computer-aided skin cancer diagnosis. Every month brings new research results on new approaches to this problem, new methods of preprocessing, new classifiers, new ideas to follow etc. In particular, the rapid development of dermatoscopy,...
-
Architecture supporting security of agent systems
PublicationW rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...
-
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis
PublicationRecently, a survey of cybersecurity assessment methods focused on general characteristics was conducted. Among its major findings, it revealed the methods’ adoption issues. This paper presents a follow-up to the study. It provides an in-depth analysis of the methods’ adoption-related properties based on qualitative metrics. As a result, the proposals which demonstrate a higher adoption potential were identified. The methods are...
-
Activity-based payments: alternative (anonymous) online payment model
PublicationElectronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...
-
Evaluating the Cost of Personnel Activities in Cybersecurity Management: A Case Study
PublicationThe methods of cybersecurity costs' evaluation are inclined towards the cost of incidents or technological acquirements. At the same time, there are other, less visible costs related to cybersecurity that require proper recognition. These costs are associated with the actions and the time spent by employees on activities connected to cybersecurity management. The costs form a considerable component of cybersecurity expenditures,...
-
Aiming at methods’ wider adoption: Applicability determinants and metrics
PublicationNumerous computer science methods and techniques have been proposed by the scientific community. However, depending on the domain, only their minor fraction has met wider adoption. This paper brings attention to the concept of applicability - the notion that is well acknowledged in the scientific field but have not been analysed with respect to determinants, metrics and systematisation. The primary objective of the study was to...
-
Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria
PublicationInformation technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublicationFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Review of Cybersecurity Assessment Methods: Applicability Perspective
PublicationCybersecurity assessments are crucial in building the assurance that vital cyberassets are effectively protected from threats. Multiple assessment methods have been proposed during the decades of the cybersecurity field. However, a systematic literature search described in this paper reveals that their reviews are practically missing. Thus, the primary objective of this research was to fulfil this gap by comprehensively identifying...
-
Cybersecurity in the Electricity Sector
PublicationThis book offers a systematic explanation of cybersecurity protection of electricity supply facilities, including discussion of related costs, relevant standards, and recent solutions. The author explains the current state of cybersecurity in the electricity market, and cybersecurity standards that apply in that sector. He then offers a systematic approach to cybersecurity management, including new methods of cybersecurity assessment,...
-
Nauczanie zarządzania bezpieczeństwem informacji: standardy i sposoby nauczania
PublicationPracownicy są najważniejszym ogniwem w ochronie informacji wewnątrz organizacji, gdyż to właśnie oni posiadają regularny dostęp do jej zasobów informacyjnych. Fakt ten jest dobrze rozpoznany przez krajowe oraz międzynarodowe instytucje standaryzujące, które w publikowanych normach zalecają kształcenie, szkolenia i podnoszenie świadomości pracowników jako kluczowy element strategii ochrony informacji przedsiębiorstw. W artykule...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
Metoda szacowania kosztu zarządzania bezpieczeństwem informacji i przykład jej zastosowania w zakładzie opieki zdrowotnej
PublicationKażdego roku rośnie liczba ataków komputerowych na jednostki administracji publicznej. Aby się przed nimi chronić instytucje powinny inwestować w skuteczne środki ochrony. W artykule przedstawiono metodę wspomagającą podejmowanie decyzji dotyczących tych inwestycji poprzez wskazanie kosztu jaki dana organizacja będzie musiała ponieść na działania zapewniające odpowiedni poziom bezpieczeństwa. W artykule opisano również studium...
-
Approaching Secure Industrial Control Systems
PublicationThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Anonymity Architecture for Mobile Agent Systems
PublicationThe paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...
-
Nauczanie zagadnień cyberbezpieczeństwa w Unii Europejskiej – trendy, wyzwania
PublicationZnaczenie edukacji, szkoleń i podnoszenia świadomości zagadnień cyberbezpieczeństwa jest dziś, w erze społeczeństwa informacyjnego powszechnie uznane. W ostatnich latach w Unii Europejskiej pojawiło się wiele nowych inicjatyw związanych między innymi z rozwijaniem programów uniwersyteckich, przygotowywaniem specjalistycznych i profilowanych szkoleń, uruchamianiem masowych otwartych kursów online, a także badaniami opinii publicznej...