Filters
total: 27194
filtered: 4830
-
Catalog
- Publications 4830 available results
- Journals 503 available results
- Conferences 215 available results
- Publishing Houses 2 available results
- People 536 available results
- Inventions 1 available results
- Projects 23 available results
- Research Teams 2 available results
- Research Equipment 4 available results
- e-Learning Courses 190 available results
- Events 11 available results
- Open Research Data 20877 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: BROKER INFORMATION
-
Gender approach to multi-objective optimization of detection systems by pre-selection of criteria
PublicationA novel idea of performing evolutionary computations for solving highly-dimensional multi-objective optimization (MOO) problems is proposed. The information about individual genders is applied. This information is drawn out of the fitness of individuals and applied during the parental crossover in the evolutionary multi-objective optimization (EMO) processes. The paper introduces the principles of the genetic-gender approach (GGA)...
-
Gender approach to multi-objective optimization of detection systems by pre-selection of criteria
PublicationA novel idea of performing evolutionary computations for solving highly-dimensional multi-objective optimization (MOO) problems is proposed. The information about individual genders is applied. This information is drawn out of the fitness of individuals and applied during the parental crossover in the evolutionary multi-objective optimization (EMO) processes. The paper introduces the principles of the genetic-gender approach (GGA)...
-
Gender approach to multi-objective optimization of detection systems by pre-selection of criteria
PublicationA novel idea of performing evolutionary computations for solving highly-dimensional multi-objective optimization (MOO) problems is proposed. The information about individual genders is applied. This information is drawn out of the fitness of individuals and applied during the parental crossover in the evolutionary multi-objective optimization (EMO) processes. The paper introduces the principles of the genetic-gender approach (GGA)...
-
Czynniki rozwojowe w dokumentach strategicznych miast powiatowych na obszarze peryferyjnym województwa pomorskiego
PublicationAutor postawił dwa cele: 1) zweryfikowanie hipotezy, że każde terytorium posiada endogeniczny potencjał rozwojowy; 2) sprawdzenie, czy sposób rozpoznawania i analizy czynników rozwojowych są odpowiednie dla sformułowanie właściwej strategii. Autor badał czynniki rozwojowe miast powiatowych ze względu na ich rolę w aktywizacji obszarów peryferyjnych (czyli poza obszarem metropolitalnym). Głównym źródłem informacji były elementy...
-
Molecular and structural characteristics of cod gelatin films modifiedwith EDC and TGase
PublicationCod gelatin films before and after cross-linking of gelatin with 1-ethyl-3-(3-dimethylaminopropyl) carbodiimide (EDC) or transglutaminase (TGase) have been characterized by FT-IR spectroscopy and DSC analysis. For comparison, a film prepared from unmodified pig gelatin has been also analysed. The difference spectra showed that cod gelatin during the film formation involved first of all water-to-amide hydrogen bonds, and the film...
-
Effect of Nanohydroxyapatite on Silk Fibroin–Chitosan Interactions—Molecular Dynamics Study
PublicationFibroin–chitosan composites, especially those containing nanohydroxyapatite, show potential for bone tissue regeneration. The physicochemical properties of these biocomposites depend on the compatibility between their components. In this study, the intermolecular interactions of fibroin and chitosan were analyzed using a molecular dynamics approach. Two types of systems were investigated: one containing acetic acid and the other...
-
Language of Benefits as a Novel Tool for Improving Website Personalization
PublicationA properly designed website allows the user to search for information faster, and more accurately. The information content of the website should be also adapted to the needs of the user. The purpose of this article is to present a novel Language of Benefits (LoB) approach to facilitate the use of websites for individual user groups. The LoB approach is an approach addressed to IT Analysts, to facilitate the process of web design,...
-
Interaction of human serum albumin with volatiles and polyphenols from some berries
PublicationHeadspace solid-phase microextraction coupled with comprehensive two-dimensional gas chromatography with time-of-flight mass spectrometry (HS-SPME/GC GCeTOFMS) identified 19 and quantified 6 monoterpenes in gooseberries, blueberries and cranberries. As a protein model human serum albumin (HSA) was used in interaction with terpenes. Specific binding of terpenes to HSA under the physiological conditions was a result of the formation...
-
Free-standing TiO2 nanotubes decorated with spherical nickel nanoparticles as a cost-efficient electrocatalyst for oxygen evolution reaction
PublicationHere, we report significant activity towards the oxygen evolution reaction (OER) of spherical nickel nanoparticles (NPs) electrodeposited onto free-standing TiO2 nanotubes (TNT) via cyclic voltammetry. It has been shown that simple manipulation of processing parameters, including scan rate and number of cycles, allows for formation of the NPs in various diameters and amounts. The polarization data with respect to transmission electron...
-
INDUSTRIAL FIRE SAFETY REQUIREMENTS IN PARTNER COUNTRIES
PublicationChapter contains information regardin law regulations of fire safety for constructions in countris participating in project.
-
Concept description vectors and the 20 question game
PublicationKnowledge of properties that are applicable to a given object is a necessary prerequisite to formulate intelligent question. Concept description vectors provide simplest representation of this knowledge, storing for each object information about the values of its properties. Experiments with automatic creation of concept description vectors from various sources, including ontologies, dictionaries, encyclopedias and unstructured...
-
Emotions in the software development process
PublicationThis paper presents the results of a survey on the experience of emotions in the work of software developers. Quantitative analysis revealed information about emotions affecting programmers, their frequency and impact on their performance. The concept of emotional risk to productivity was also presented. It allows to choose the emotional states, which should be avoided. Furthermore, all collected data were analyzed with information...
-
Ocena efektywności monitoringu obiektów inżynierskich za pomocą sieci Bayesa
PublicationW swojej pracy autorzy zaproponowali zastosowanie sieci Bayesa do projektowania monitoringu i podejmowania decyzji w działaniach eksploatacyjnych. Ponadto pokazano dwie metody oceny wartości informacji diagnostycznych. Pierwszą z nich jest wartość oczekiwana EVSI (ang. Expected Value of Sample Information), która stanowi podstawę do wyboru spośród alternatywnych obserwacji symptomów zmiennej diagnostycznej. Natomiast drugą metodą...
-
Short-term Price Reaction to Involuntary Bankruptcies Filed in Bad Faith: Empirical Evidence from Poland
PublicationPurpose: Assessing the reaction of the prices of shares of companies listed in the Warsaw Stock Exchange to the public disclosure of information about the filing a bankruptcy petition in bad faith by creditors. Design/Methodology/Approach: Event study analysis. Findings: It can therefore be assumed that the filing of an unfounded bankruptcy petition does not, in the short term, have a statistically significant negative impact on...
-
Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof
PublicationNew measures of multipartite entanglement are constructedbased on two definitions of multipartite information anddifferent methods of optimizing over extensions of the states. Oneis a generalization of the squashed entanglement where one takesthe mutual information of parties conditioned on the state's extensionand takes the infimum over such extensions. Additivity ofthe multipartite squashed entanglement is proved for both versionsof...
-
Multi-domain and Context-Aware Recommendations Using Contextual Ontological User Profile
PublicationRecommender Systems (RS) became popular tools in many Web services like Netflix, Amazon, or YouTube, because they help a~user to avoid an information overload problem. One of the types of RS are Context-Aware RS (CARS) which exploit contextual information to provide more adequate recommendations. Cross-Domain RS (CDRS) were created as a response to the data sparsity problem which occurs when only few users can provide reviews or...
-
Model of a Maturity Capsule in Managing IT Projects
PublicationThe main purpose of this article is to present a report on the development of a model of information technology management (MITM). This model is an answer to the need to support decision making in the selection of methods and information technologies. This article presents a multisequential model (MSM) of technology selection and a model for initial processing procedures (IPP) necessary for the MITM model. The presentation of the...
-
Generic emergence of classical features in quantum Darwinism
PublicationQuantum Darwinism posits that only specific information about a quantum system that is redundantly proliferated to many parts of its environment becomes accessible and objective, leading to the emergence of classical reality. However, it is not clear under what conditions this mechanism holds true. Here we prove that the emergence of classical features along the lines of quantum Darwinism is a general feature of any quantum dynamics:...
-
Stock price reactions to an arrangement approval in restructuring proceedings – the case of Poland
PublicationThe study aims to empirically analyze the reaction of stock prices to the information about the conclusion and acceptance of a debtor–creditor arrangement under restructuring proceedings of companies listed on the stock exchange in Poland. The following main research hypothesis was verified: public disclosure of information about an arrangement conclusion and acceptance in restructuring proceedings...
-
Under the Fire of Disinformation. Attitudes Towards Fake News in the Ukrainian Frozen War
PublicationIn this article, we examine individual attitudes towards fake news in the extreme conditions of a propaganda war, taking into account the complex regional social and historical conditions. For this purpose, within the mobile boundary zone during frozen war in Ukraine, we conducted qualitative research among representatives of generations X and Z (high school teachers and students). Being accustomed to fake news turned out to be...
-
Edge-chromatic sum of trees and bounded cyclicity graphs
Publication -
Smart innovation process enhancement using SOEKS and decisional DNA
PublicationProduct innovation always requires a foundation based on both knowledge and experience. The production and innovation process of products is very similar to the evolution process of humans. The genetic information of humans is stored in genes, chromosomes and DNA. Similarly, the information about the products can be stored in a system having virtual genes, chromosomes and decisional DNA (DDNA). The present paper proposes...
-
ENTERPRISE ACTIVITIES MODELING BY BPMN NOTATION
PublicationDepending on the process behavior, available know-how and organizational goals, different techniques and tools can be used for business process modeling. We concentrate on e-commerce, and try to find the best marketing strategy for the sales process improvement. In the paper we present the multilayer approach to define enterprise scenarios. This allows us to collect the suitable knowledge necessary for enterprise analysis and improvement....
-
Design principles for creating digital transparency in government
PublicationUnder pressure to fight corruption, hold public officials accountable, and build trust with citizens, many governments pursue the quest for greater transparency. They publish data about their internal operations, externalize decision-making processes, establish digital inquiry lines to public officials, and employ other forms of transparency using digital means. Despite the presence of many transparency-enhancing digital tools,...
-
Mobile Security: Threats and Best Practices
PublicationCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
Quantum randomness protected against detection loophole attacks
PublicationDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....
-
Data governance: Organizing data for trustworthy Artificial Intelligence
PublicationThe rise of Big, Open and Linked Data (BOLD) enables Big Data Algorithmic Systems (BDAS) which are often based on machine learning, neural networks and other forms of Artificial Intelligence (AI). As such systems are increasingly requested to make decisions that are consequential to individuals, communities and society at large, their failures cannot be tolerated, and they are subject to stringent regulatory and ethical requirements....
-
An approach to constructing genuinely entangled subspaces of maximal dimension
PublicationGenuinely entangled subspaces (GESs) are the class of completely entangled subspaces that contain only genuinely multiparty entangled states. They constitute a particularly useful notion in the theory of entanglement but also have found an application, for instance, in quantum error correction and cryptography. In a recent study (Demianowicz and Augusiak in Phys Rev A 98:012313, 2018), we have shown how GESs can be efficiently...
-
When digital government matters for tourism: a stakeholder analysis
PublicationDespite the importance of governance processes for destination management and the impact of digital technology on such processes, surprisingly little academic research has explored the use of digital technology to transform public governance in the tourism sector. This conceptual paper fills this gap by conducting a digital government stakeholder analysis for the tourism sector using the digital government evolution model as its...
-
Platform governance for sustainable development: Reshaping citizen-administration relationships in the digital age
PublicationChanging governance paradigms has been shaping and reshaping the landscape of citizen-administration relationships, from impartial application of rules and regulations by administration to exercise its authority over citizens (bureaucratic paradigm), through provision of public services by administration to fulfil the needs of citizens (consumerist paradigm), to responsibility-sharing between administration and citizens for policy...
-
Digital government evolution: From transformation to contextualization
PublicationThe Digital Government landscape is continuously changing to reflect how governments are trying to find innovative digital solutions to social, economic, political and other pressures, and how they transform themselves in the process. Understanding and predicting such changes is important for policymakers, government executives, researchers and all those who prepare, make, implement or evaluate Digital Government decisions. This...
-
Cluster-based instance selection for machine classification
Publication -
An approximation algorithm for maximum P3-packing in subcubic graphs
PublicationW pracy podano algorytm 4/3-przyliżony dla trudnego obliczeniowo problemu umieszczania wierzchołkowo rozłącznych dwukrawędziowych ścieżek w grafach o stopniu maksymalnym 3 i stopniu minimalnym 2. Poprawiono tym samym wcześniejsze wyniki dla grafów kubicznych (A. Kelmans, D. Mubayi, Journal of Graph Theory 45, 2004).
-
A note on mixed tree coloring
PublicationZaproponowano liniowy algorytm dla problemu kolorowania mieszanego w drzewach, uzyskując tym samym poprawę w stosunku do algorytmu o złożoności O(n^2) podanego w pracy [P. Hansen, J. Kuplinsky, D. de Werra, Mixed graph colorings, Math. Methods Oper. Res. 45 (1997) 145-160].
-
Remote learning among students with and without reading difficulties during the initial stages of the COVID-19 pandemic
PublicationThis article presents the results of a survey on yet under-researched aspects of remote learning and learning difficulties in higher education during the initial stage (March – June 2020) of the COVID-19 pandemic. A total of 2182 students from University of Warsaw in Poland completed a two-part questionnaire regarding academic achievements in the academic year 2019/2020, living conditions and stress related to learning and pandemic,...
-
ICT for Global Competitiveness and Economic Growth in Emerging Economies: Economic, Cultural, and Social Innovations for Human Capital in Transition Economies
Publication -
Open Source in Development: Enabling Business and Services
Publication -
Organizational citizenship behavior of IT professionals: lessons from Poland and Germany
Publication -
Are quantum correlations symmetric?
PublicationWe provide operational definition of symmetry of entanglement: An entangled state contains symmetric entanglement if its subsystems can be exchanged (swapped) by means of local operations and classical communication. We show that in general states have asymmetric entanglement. This allows to construct nonsymmetric measure of entanglement, and a parameter that reports asymmetry of entanglement contents of quantum state. We propose...
-
Trees having many minimal dominating sets
PublicationWe provide an algorithm for listing all minimal dominating sets of a tree of order n in time O(1.4656^n). This leads to that every tree has at most 1.4656^n minimal dominating sets. We also give an infinite family of trees of odd and even order for which the number of minimal dominating sets exceeds 1.4167^n, thus exceeding 2^{n/2}. This establishes a lower bound on the running time of an algorithm for listing all minimal dominating...
-
Modelling of Diffusing Capacity Measurement Results in Lung Microangiopathy Patients. A novel Diagnostic Suppport
PublicationLung microangiopathy is a little known negative influence of diabetes mellitus on the functioning of the lungs. The aim of this study is to design a supportive method for diagnosing lung microangiopathy. This will be based on routinely performed pulmonary measurements as well as on investigation process modelling and data processing. A model of the diffusion of oxygen from the alveoli to the blood has been described with a set...
-
Maximum vertex occupation time and inert fugitive: recontamination does help [online]
PublicationRozważamy problem przeszukania danego grafu prostego G w celu przechwycenia niewidocznego i leniwego uciekiniera. Parametrem optymalizacyjnym, który minimalizujemy jest maksymalny czas (liczba tur strategii przeszukiwania), podczas których wierzchołek może być strzeżony (okupowany przez strażnika). Strategia monotoniczna to taka, która nie dopuszcza sytuacji, w której uciekinier dociera do wierzchołka, który wcześniej został oczyszczony....
-
Travel agents and destination management organizations: eLearning as a strategy to train tourism trade partners.
PublicationThis article offers an overview of the existing online courses run by national destination management organizations (DMOs) in order to better equip travel agents and tour operators in the sales activities of the tourism destinations. These online courses represent one of the B2B offers by DMOs and an interesting opportunity for travel agents, who are trying to find their identity and competitive advantage within the context of...
-
Antecedents and outcomes of social media fatigue
PublicationPurpose – This study aims to explore which of four chosen factors (i.e. privacy concerns, FoMO, self-disclosure and time cost) induce a feeling of strain among Facebook users in terms of social media fatigue (SMF), and if this occurs, whether it further influences such outcomes as discontinuance of usage (DoU) and interaction engagement decrement (IED). Design/methodology/approach – Through an online structured questionnaire, empirical...
-
Nonlinear Fuzzy Control System for Dissolved Oxygen with Aeration System in Sequencing Batch Reactor
PublicationBiological processes at a wastewater treatment plant are complex, multivariable, time varying and nonlinear. Moreover, interactions between the components are very strong. Control of dissolved oxygen is one of most important task at the plant. The level of dissolved oxygen in aerobic tanks has significant influence on behaviour and activity of microorganisms at the plant. Air for aerated tanks is supplied by the aeration system...
-
ON THE NON-LOCALITY OF TRIPARTITE NON-SINGALING BOXES EMERGING FROM WIRINGS
PublicationIt has been recently shown, that some of the tripartite boxes admittin g bilocal decom- position, lead to non-locality under wiring operation applied to t wo of the subsystems [R. Gallego et al. Physical Review Letters 109 , 070401 (2012)]. In the following, we study this phenomenon quantitatively. Basing on the known classes of bo xes closed un- der wirings, we introduce multipartite monotones which are count erparts of bipartite ones...
-
Operating system security by integrity checking and recovery using write-protected storage
PublicationThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
NO-BROADCASTING OF NON-SIGNALLING BOXES VIA OPERATIONS WHICH TRANSFORM LOCAL BOXES INTO LOCAL ONES
PublicationWe deal with families of probability distributions satisfying non-signalling condition, called non-signalling boxes and consider a class of operations that transform local boxes into local ones (the one that admit LHV model). We prove that any operation from this class cannot broadcast a bipartite non-local box with 2 binary inputs and outputs. We consider a function called anti-Robustness which can not decrease under these operations....
-
The computational complexity of the backbone coloring problem for bounded-degree graphs with connected backbones
PublicationGiven a graph G, a spanning subgraph H of G and an integer λ>=2, a λ-backbone coloring of G with backbone H is a vertex coloring of G using colors 1, 2, ..., in which the color difference between vertices adjacent in H is greater than or equal to lambda. The backbone coloring problem is to find such a coloring with maximum color that does not exceed a given limit k. In this paper, we study the backbone coloring problem for bounded-degree...
-
“Project-factor-decision”. Decisive factors in IT projects and their impact on its success
PublicationThe aim of this article is to indicate the need for a deepening, systematizing and codifying of the theoretical and practical knowledge on IT project management, in the area of management decision-making processes. The scope of decisions made by managers is constantly on the increase. Project managers make decisions not only within the classic triangle of constraints, which consists of a schedule, a budget and the project scope,...