Filters
total: 24695
filtered: 2496
-
Catalog
- Publications 2496 available results
- Journals 537 available results
- Conferences 215 available results
- Publishing Houses 1 available results
- People 520 available results
- Projects 19 available results
- Research Teams 1 available results
- e-Learning Courses 162 available results
- Events 3 available results
- Open Research Data 20741 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: legal informatics
-
Ocena efektywności monitoringu obiektów inżynierskich za pomocą sieci Bayesa
PublicationW swojej pracy autorzy zaproponowali zastosowanie sieci Bayesa do projektowania monitoringu i podejmowania decyzji w działaniach eksploatacyjnych. Ponadto pokazano dwie metody oceny wartości informacji diagnostycznych. Pierwszą z nich jest wartość oczekiwana EVSI (ang. Expected Value of Sample Information), która stanowi podstawę do wyboru spośród alternatywnych obserwacji symptomów zmiennej diagnostycznej. Natomiast drugą metodą...
-
Infobrokerstwo w Polsce
PublicationW artykule przedstawiono etapy tworzenia infobrokeringu w Polsce, formy kształcenia infobrokerów,: studia podyplomowe, uczelnie, kursy i szkolenia.
-
INDUSTRIAL FIRE SAFETY REQUIREMENTS IN PARTNER COUNTRIES
PublicationChapter contains information regardin law regulations of fire safety for constructions in countris participating in project.
-
An Analysis of Neural Word Representations for Wikipedia Articles Classification
PublicationOne of the current popular methods of generating word representations is an approach based on the analysis of large document collections with neural networks. It creates so-called word-embeddings that attempt to learn relationships between words and encode this information in the form of a low-dimensional vector. The goal of this paper is to examine the differences between the most popular embedding models and the typical bag-of-words...
-
Emotions in the software development process
PublicationThis paper presents the results of a survey on the experience of emotions in the work of software developers. Quantitative analysis revealed information about emotions affecting programmers, their frequency and impact on their performance. The concept of emotional risk to productivity was also presented. It allows to choose the emotional states, which should be avoided. Furthermore, all collected data were analyzed with information...
-
Concept description vectors and the 20 question game
PublicationKnowledge of properties that are applicable to a given object is a necessary prerequisite to formulate intelligent question. Concept description vectors provide simplest representation of this knowledge, storing for each object information about the values of its properties. Experiments with automatic creation of concept description vectors from various sources, including ontologies, dictionaries, encyclopedias and unstructured...
-
Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof
PublicationNew measures of multipartite entanglement are constructedbased on two definitions of multipartite information anddifferent methods of optimizing over extensions of the states. Oneis a generalization of the squashed entanglement where one takesthe mutual information of parties conditioned on the state's extensionand takes the infimum over such extensions. Additivity ofthe multipartite squashed entanglement is proved for both versionsof...
-
Streaming Real-time Data in Distributed Dispatcher and Teleinformation Systems for Visualization of Multimedia Data of the Border Guard
PublicationSurveillance of the sea borders is a very important task for the Border Guard. Monitoring of country maritime border is an important task of the Border Guard. This task can be facilitated with the use of the technology enabling gathering information from distributed sources and its supervision and visualization. This task can be accomplished using a technology that allows to collect information from distributed sensors of different...
-
Generic emergence of classical features in quantum Darwinism
PublicationQuantum Darwinism posits that only specific information about a quantum system that is redundantly proliferated to many parts of its environment becomes accessible and objective, leading to the emergence of classical reality. However, it is not clear under what conditions this mechanism holds true. Here we prove that the emergence of classical features along the lines of quantum Darwinism is a general feature of any quantum dynamics:...
-
Model of a Maturity Capsule in Managing IT Projects
PublicationThe main purpose of this article is to present a report on the development of a model of information technology management (MITM). This model is an answer to the need to support decision making in the selection of methods and information technologies. This article presents a multisequential model (MSM) of technology selection and a model for initial processing procedures (IPP) necessary for the MITM model. The presentation of the...
-
Short-term Price Reaction to Involuntary Bankruptcies Filed in Bad Faith: Empirical Evidence from Poland
PublicationPurpose: Assessing the reaction of the prices of shares of companies listed in the Warsaw Stock Exchange to the public disclosure of information about the filing a bankruptcy petition in bad faith by creditors. Design/Methodology/Approach: Event study analysis. Findings: It can therefore be assumed that the filing of an unfounded bankruptcy petition does not, in the short term, have a statistically significant negative impact on...
-
Multi-domain and Context-Aware Recommendations Using Contextual Ontological User Profile
PublicationRecommender Systems (RS) became popular tools in many Web services like Netflix, Amazon, or YouTube, because they help a~user to avoid an information overload problem. One of the types of RS are Context-Aware RS (CARS) which exploit contextual information to provide more adequate recommendations. Cross-Domain RS (CDRS) were created as a response to the data sparsity problem which occurs when only few users can provide reviews or...
-
Stock price reactions to an arrangement approval in restructuring proceedings – the case of Poland
PublicationThe study aims to empirically analyze the reaction of stock prices to the information about the conclusion and acceptance of a debtor–creditor arrangement under restructuring proceedings of companies listed on the stock exchange in Poland. The following main research hypothesis was verified: public disclosure of information about an arrangement conclusion and acceptance in restructuring proceedings...
-
Under the Fire of Disinformation. Attitudes Towards Fake News in the Ukrainian Frozen War
PublicationIn this article, we examine individual attitudes towards fake news in the extreme conditions of a propaganda war, taking into account the complex regional social and historical conditions. For this purpose, within the mobile boundary zone during frozen war in Ukraine, we conducted qualitative research among representatives of generations X and Z (high school teachers and students). Being accustomed to fake news turned out to be...
-
Edge-chromatic sum of trees and bounded cyclicity graphs
Publication -
An approximation algorithm for maximum P3-packing in subcubic graphs
PublicationW pracy podano algorytm 4/3-przyliżony dla trudnego obliczeniowo problemu umieszczania wierzchołkowo rozłącznych dwukrawędziowych ścieżek w grafach o stopniu maksymalnym 3 i stopniu minimalnym 2. Poprawiono tym samym wcześniejsze wyniki dla grafów kubicznych (A. Kelmans, D. Mubayi, Journal of Graph Theory 45, 2004).
-
A note on mixed tree coloring
PublicationZaproponowano liniowy algorytm dla problemu kolorowania mieszanego w drzewach, uzyskując tym samym poprawę w stosunku do algorytmu o złożoności O(n^2) podanego w pracy [P. Hansen, J. Kuplinsky, D. de Werra, Mixed graph colorings, Math. Methods Oper. Res. 45 (1997) 145-160].
-
Maximum vertex occupation time and inert fugitive: recontamination does help [online]
PublicationRozważamy problem przeszukania danego grafu prostego G w celu przechwycenia niewidocznego i leniwego uciekiniera. Parametrem optymalizacyjnym, który minimalizujemy jest maksymalny czas (liczba tur strategii przeszukiwania), podczas których wierzchołek może być strzeżony (okupowany przez strażnika). Strategia monotoniczna to taka, która nie dopuszcza sytuacji, w której uciekinier dociera do wierzchołka, który wcześniej został oczyszczony....
-
ICT for Global Competitiveness and Economic Growth in Emerging Economies: Economic, Cultural, and Social Innovations for Human Capital in Transition Economies
Publication -
Open Source in Development: Enabling Business and Services
Publication -
Organizational citizenship behavior of IT professionals: lessons from Poland and Germany
Publication -
Nonlinear Fuzzy Control System for Dissolved Oxygen with Aeration System in Sequencing Batch Reactor
PublicationBiological processes at a wastewater treatment plant are complex, multivariable, time varying and nonlinear. Moreover, interactions between the components are very strong. Control of dissolved oxygen is one of most important task at the plant. The level of dissolved oxygen in aerobic tanks has significant influence on behaviour and activity of microorganisms at the plant. Air for aerated tanks is supplied by the aeration system...
-
Analysing and processing of geotagged social media
PublicationThe use of location based data analysing tools is an important part of geomarketing strategies among entrepreneurs. One of the key elements of interest is social media data shared by the users. This data is analysed both for its content and its location information, the results help to identify trends represented in the researched regions. In order to verify the possibilities of analysing and processing of geotagged social media...
-
ON THE NON-LOCALITY OF TRIPARTITE NON-SINGALING BOXES EMERGING FROM WIRINGS
PublicationIt has been recently shown, that some of the tripartite boxes admittin g bilocal decom- position, lead to non-locality under wiring operation applied to t wo of the subsystems [R. Gallego et al. Physical Review Letters 109 , 070401 (2012)]. In the following, we study this phenomenon quantitatively. Basing on the known classes of bo xes closed un- der wirings, we introduce multipartite monotones which are count erparts of bipartite ones...
-
The computational complexity of the backbone coloring problem for bounded-degree graphs with connected backbones
PublicationGiven a graph G, a spanning subgraph H of G and an integer λ>=2, a λ-backbone coloring of G with backbone H is a vertex coloring of G using colors 1, 2, ..., in which the color difference between vertices adjacent in H is greater than or equal to lambda. The backbone coloring problem is to find such a coloring with maximum color that does not exceed a given limit k. In this paper, we study the backbone coloring problem for bounded-degree...
-
Approaching Secure Industrial Control Systems
PublicationThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Modelling of Diffusing Capacity Measurement Results in Lung Microangiopathy Patients. A novel Diagnostic Suppport
PublicationLung microangiopathy is a little known negative influence of diabetes mellitus on the functioning of the lungs. The aim of this study is to design a supportive method for diagnosing lung microangiopathy. This will be based on routinely performed pulmonary measurements as well as on investigation process modelling and data processing. A model of the diffusion of oxygen from the alveoli to the blood has been described with a set...
-
Are quantum correlations symmetric?
PublicationWe provide operational definition of symmetry of entanglement: An entangled state contains symmetric entanglement if its subsystems can be exchanged (swapped) by means of local operations and classical communication. We show that in general states have asymmetric entanglement. This allows to construct nonsymmetric measure of entanglement, and a parameter that reports asymmetry of entanglement contents of quantum state. We propose...
-
Radial and angular correlations in a confined system of two atoms in two-dimensional geometry
Publication -
Cluster-based instance selection for machine classification
Publication -
Organizational ethics and position relationship moderators among knowledge workers: a regional study of Poland
PublicationThis research explores organizational ethics among knowledge workers using ICT4Ds in regional enterprises in Poland before, during, and after the COVID-19 pandemic. The study addresses the importance of understanding how ethics in organizations, particularly ethical optimism, corporate social responsibility, and top management action, have evolved across these periods. This topic is crucial as organizational ethics influence employee...
-
Complexity of weak acceptonic conditions in tree automata
PublicationRozważano złożoność problemu pustości dla automatów na drzewach ze słabymi warunkami akceptowalności. Rozważano także translacje pomiędzy słabymi i silnymi warunkami akceptowalności.
-
Remote learning among students with and without reading difficulties during the initial stages of the COVID-19 pandemic
PublicationThis article presents the results of a survey on yet under-researched aspects of remote learning and learning difficulties in higher education during the initial stage (March – June 2020) of the COVID-19 pandemic. A total of 2182 students from University of Warsaw in Poland completed a two-part questionnaire regarding academic achievements in the academic year 2019/2020, living conditions and stress related to learning and pandemic,...
-
Extending loophole-free nonlocal correlations to arbitrarily large distances
PublicationQuantum theory allows spatially separated observers to share nonlocal correlations, which enable them to accomplish classically inconceivable information processing and cryptographic feats. However, the distances over which nonlocal correlations can be realized remain severely limited due to their high fragility to noise and high threshold detection efficiencies. To enable loophole- free nonlocality across large distances, we introduce...
-
Analysis the Parameters of the Adaptive Controller for Quality Control of Dissolved Oxygen Concentration
PublicationThe wastewater treatment plant can be considered a dynamic large scale complex system, in which the most important control parameter is the dissolved oxygen concentration in the aerobic zone. The air is supplied to this zone by the aeration system. In the paper, both the sequencing batch reactor and the aeration system are modelled and used as plant of control performed by the cascade nonlinear adaptive control system extended...
-
On the hardness of computing span of subcubic graphs
PublicationIn the paper we study the problem of finding ξ-colorings with minimal span, i.e. the difference between the largest and the smallest color used.
-
Ontology-based text convolution neural network (TextCNN) for prediction of construction accidents
PublicationThe construction industry suffers from workplace accidents, including injuries and fatalities, which represent a significant economic and social burden for employers, workers, and society as a whole.The existing research on construction accidents heavily relies on expert evaluations,which often suffer from issues such as low efficiency, insufficient intelligence, and subjectivity.However, expert opinions provided in construction...
-
Multiacces quantum communication and product higher rank numerical range
PublicationIn the present paper we initiate the study of the product higher rank numerical range. The latter, being a variant of the higher rank numerical range, is a natural tool for study- ing a construction of quantum error correction codes for multiple access channels. We review properties of this set and relate it to other numerical ranges, which were recently introduced in the literature. Further, the concept is applied to the construction...
-
Operating system security by integrity checking and recovery using write-protected storage
PublicationThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
“Project-factor-decision”. Decisive factors in IT projects and their impact on its success
PublicationThe aim of this article is to indicate the need for a deepening, systematizing and codifying of the theoretical and practical knowledge on IT project management, in the area of management decision-making processes. The scope of decisions made by managers is constantly on the increase. Project managers make decisions not only within the classic triangle of constraints, which consists of a schedule, a budget and the project scope,...
-
NO-BROADCASTING OF NON-SIGNALLING BOXES VIA OPERATIONS WHICH TRANSFORM LOCAL BOXES INTO LOCAL ONES
PublicationWe deal with families of probability distributions satisfying non-signalling condition, called non-signalling boxes and consider a class of operations that transform local boxes into local ones (the one that admit LHV model). We prove that any operation from this class cannot broadcast a bipartite non-local box with 2 binary inputs and outputs. We consider a function called anti-Robustness which can not decrease under these operations....
-
Universal and contextualized public services: Digital public service innovation framework
PublicationIn view of the rising social and economic inequalities, public service delivery should be both universal, i.e. independent of the recipients' social or economic status, and contextualized, i.e. able to compensate for different local needs and conditions. Reconciling both properties requires various forms of innovations, chief among them innovations in digital public services. Building upon the four-stage model underpinning the...
-
Implementing Sustainable Development Goals with Digital Government – Aspiration-capacity gap
PublicationSustainable Development Goals (SDGs) represent a commitment by all United Nations Member States to pursue development efforts, including ending poverty and hunger, promoting well-being and education, reducing inequalities, fostering peace, and protecting the planet. Member States and their governments are supposed to take ownership of the SDGs, strengthen the implementation means, and improve public governance as both the means...
-
Platform governance for sustainable development: Reshaping citizen-administration relationships in the digital age
PublicationChanging governance paradigms has been shaping and reshaping the landscape of citizen-administration relationships, from impartial application of rules and regulations by administration to exercise its authority over citizens (bureaucratic paradigm), through provision of public services by administration to fulfil the needs of citizens (consumerist paradigm), to responsibility-sharing between administration and citizens for policy...
-
Design principles for creating digital transparency in government
PublicationUnder pressure to fight corruption, hold public officials accountable, and build trust with citizens, many governments pursue the quest for greater transparency. They publish data about their internal operations, externalize decision-making processes, establish digital inquiry lines to public officials, and employ other forms of transparency using digital means. Despite the presence of many transparency-enhancing digital tools,...
-
Mobile Security: Threats and Best Practices
PublicationCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
Quantum randomness protected against detection loophole attacks
PublicationDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....
-
Trees having many minimal dominating sets
PublicationWe provide an algorithm for listing all minimal dominating sets of a tree of order n in time O(1.4656^n). This leads to that every tree has at most 1.4656^n minimal dominating sets. We also give an infinite family of trees of odd and even order for which the number of minimal dominating sets exceeds 1.4167^n, thus exceeding 2^{n/2}. This establishes a lower bound on the running time of an algorithm for listing all minimal dominating...
-
Digital government evolution: From transformation to contextualization
PublicationThe Digital Government landscape is continuously changing to reflect how governments are trying to find innovative digital solutions to social, economic, political and other pressures, and how they transform themselves in the process. Understanding and predicting such changes is important for policymakers, government executives, researchers and all those who prepare, make, implement or evaluate Digital Government decisions. This...
-
When digital government matters for tourism: a stakeholder analysis
PublicationDespite the importance of governance processes for destination management and the impact of digital technology on such processes, surprisingly little academic research has explored the use of digital technology to transform public governance in the tourism sector. This conceptual paper fills this gap by conducting a digital government stakeholder analysis for the tourism sector using the digital government evolution model as its...