Filters
total: 19
Search results for: Minority Studies
-
The European Union and Cultural, Economic and Political Development of Minority in Central and Eastern Europe
Publication -
Human-associated bacteria and their mobile genetic elements - important minority in wastewater and wastewater impacted ecosystems
PublicationSince human-associated bacteria have been recognized as vectors in two - way gene transmission between the pathogenic and environmental populations, health hazard connected with wastewater discharge requires reevaluation. In this paper the particular attention was given to antimicrobial-resistance of Escherichia coli and enterococci isolated from wastewater and wastewater impacted environments. The obtained results showed that...
-
Journal of Muslim Minority Affairs
Journals -
Diaspora, Indigenous, and Minority Education
Journals -
Journal of Immigrant and Minority Health
Journals -
European Yearbook of Minority Issues
Journals -
Cultural Diversity & Ethnic Minority Psychology
Journals -
International Journal on Minority and Group Rights
Journals -
The power of silence? opinion contagion and the surprise of the polish 2005 parlamentary and presidential elections
PublicationThis paper investigates opinion contagion in collective behaviour using threshold model (Granovetter (1978), Krassa(1988)). The theoretical background is the spiral of silence concept developed by Noelle-Neumann (1974), arguing that people only assert their opinions if they perceive a minimal support from a relevant proportion of others. We apply the model to explain the dispersion between pre-elections preferences and the final...
-
Crystalline Silicon (c-Si)-Based Tunnel Oxide Passivated Contact (TOPCon) Solar Cells: A Review
PublicationContact selectivity is a key parameter for enhancing and improving the power conversion efficiency (PCE) of crystalline silicon (c-Si)-based solar cells. Carrier selective contacts (CSC) are the key technology which has the potential to achieve a higher PCE for c-Si-based solar cells closer to their theoretical efficiency limit. A recent and state-of-the-art approach in this domain is the tunnel oxide passivated contact (TOPCon)...
-
Self-adwokatura jako forma wolontariatu osób z niepełnosprawnością
PublicationSelf-advocacy is both a competence necessary for independent adult life and a form of activity of people with disability in terms of exercising their rights to self-determine. It is also a form of social inclusion and participation, often having a character of volunteer engagement of people with disability in work for their minority group. Although the access of people with disability to the sphere of supporting other people...
-
Gender, equality, science and information systems
PublicationIn the entire Europe more women than men graduate from tertiary education institutes1. However, they are underrepresented in scientific and engineering disciplines. Women researchers still constitute a minority in the Government and Higher Education Sectors that both are related to power. A number of industry reports highlight a low number of women in IT occupations2. The EU Member States have, on political levels, committed themselves...
-
Gender and Digital Divide - Information and Communication Technologiesand their Impact on Equality
PublicationIn the entire Europe more women than men graduate from tertiaryeducation institutes. However, they are underrepresented in scientific and engineering disciplines. Women researchers still constitute a minority in the Government and Higher Education Sectors. A number of industry reports highlight a low number of women in IT occupations49. This has led to a variety of public policy measures, such as subsidies on community provision,...
-
Local structural and chemical ordering of nanosized Pt(3±δ)Co probed by multiple-scattering x-ray absorption spectroscopy
PublicationThis work reports a detailed investigation of the local structure and chemical disorder of a Pt(3±δ)Co thin film and Pt(3±δ)Co nanoparticles. We have used a combination of techniques including x-ray absorption spectroscopy (XAS), x-ray diffraction (XRD), and high-resolution transmission electron microscopy (TEM). The important effect of chemical ordering on pair and three-atom configurations has been studied using computer simulations...
-
Carsharing - Opportunities and Threats for Cities: Proposals of Solutions for Urban Policy
PublicationThe carsharing of a current generation is a short-term car renting service with a capability to find in the nearest surrounding a fleet car parked anywhere in the public space where the previous user left it, as well as to book, open, rent and pay of, with the use of a dedicated mobile application. Nowadays, only a minority of municipalities is considering implementing the carsharing in their policies. The lack of awareness of...
-
Vernacular and neovernacular architecture without a user. Wooden catholic churches in the vicinity of brody in Ukraine.
PublicationOne of the basic theoretical postulates for the protection of monuments is to preserve them in the place of their creation. However, such action is not always possible to implement. The great historical processes of the 20th century led to significant national, political, religious and cultural changes in the border areas between Poland and Ukraine. As a result of those changes, a large number of wooden churches have lost their...
-
Size-Controlled Synthesis of Pt Particles on TiO2 Surface: Physicochemical Characteristic and Photocatalytic Activity
PublicationDifferent TiO2 photocatalysts, i.e., commercial samples (ST‐01 and P25 with minority of rutile phase), nanotubes, well‐crystallized faceted particles of decahedral shape and mesoporous spheres, were used as supports for deposition of Pt nanoparticles (NPs). Size‐controlled Pt NPs embedded in TiO2 were successfully prepared by microemulsion and wet‐impregnation methods. Obtained photocatalysts were characterized using XRD, TEM,...
-
Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection
PublicationDue to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approach for detecting Android malware. This approach has the disadvantage of being unable to identify unknown malware. As a result of this issue, machine learning (ML) for detecting malware...
-
Marta Wozniak-Bobinska Dr hab.
People