Search results for: JOB SECURITY - Bridge of Knowledge

Search

Search results for: JOB SECURITY

Search results for: JOB SECURITY

  • Hedging Strategies of Derivatives Instruments for Commodity Trading Entities

    Publication

    - Year 2015

    Hedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...

  • Low-dimensional bound entanglement with one-way distillable cryptographic key

    Publication

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Year 2008

    In this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...

  • Support for argument structures review and assessment

    Argument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow excessively, which causes problems with their review and assessment. Two issues are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant recipients. The paper...

    Full text available to download

  • E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes

    Publication

    - Year 2020

    E-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...

    Full text available to download

  • A survey of neural networks usage for intrusion detection systems

    In recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...

    Full text available to download

  • Efektywność funkcjonowania wybranych elementów systemu bankowego w Polsce w okresie transformacji. Cz. 2.

    W opracowaniu przedstawiono nowoczesne metody pomiaru efektywności funkcjonowania banków oraz określono ich przydatność w praktyce gospodarczej. Szczególne znaczenie w ocenie efektywności technicznej przypisano metodzie DEA i HOB. Mimo ich pracochłonności, możliwość określenia czy banki przygotowane są do konkurencji oraz czy mogą osiągać efekty skali, przemawia za szerszym wykorzystanie tego typu metod.

  • Biopolymer based nanomaterials in drug delivery systems: A review

    Publication

    - Materials Today - Year 2018

    Drug delivery systems (DDS) are used to achieve a higher therapeutic effects of a pharmaceutical drug or natural compound in a specific diseased site with minimal toxicological effect and these systems consists of liposomes, microspheres, gels, prodrugs and many. Nanotechnology is a rapidly developing multi-disciplinary science that ensures the fabrication of the polymers to nanometer scale for various medical applications. Uses...

    Full text to download in external service

  • UK travel agents’ evaluation of eLearning courses offered by destinations: an exploratory study.

    Publication

    - Journal of Hospitality Leisure Sport & Tourism Education - Year 2013

    This study aims to develop an understanding of the use of e-learning courses created for travel agents by Destination Management Organizations (DMOs). It explores agents’ perceptions of such courses. The research examines the views of 304 UK-based travel agents using online survey and investigates whether age, sex, type of agency, work experience, and educational level have influence on e-learning uptake. The satisfaction of travel...

    Full text available to download

  • Crystal growth of CsCl-type Yb0.24Sn0.76Ru

    Publication
    • T. Klimczuk
    • C. Wang
    • Q. Xu
    • J. Lawrence
    • T. Durakiewicz
    • F. Ronning
    • A. Llobet
    • E. D. Bauer
    • J. Griveau
    • W. Sadowski... and 3 others

    - JOURNAL OF CRYSTAL GROWTH - Year 2011

    Wzrost kryształów o stechiometrii Yb0.24Sn0.76Ru został przeprowadzony metodą topnikową. Kryształy poddano badaniom dyfrakcyjnym a także mikroskopii elektornowej. Yb0.24Sn0.76Ru krystalizuje w sześciennej strukturze typu chlorku cezu (CsCl).

    Full text to download in external service

  • Enhancing Facial Palsy Treatment through Artificial Intelligence: From Diagnosis to Recovery Monitoring

    Publication

    The objective of this study is to develop and assess a mobile application that leverages artificial intelligence (AI) to support the rehabilitation of individuals with facial nerve paralysis. The application features two primary functionalities: assessing the paralysis severity and facilitating the monitoring of rehabilitation exercises. The AI algorithm employed for this purpose was Google's ML Kit “face-detection”. The classification...

    Full text to download in external service

  • (3,5-Dimethylpyridine)bis(tri-tert-butoxysilanethiolato)cadmium(II)

    Tytułowy związek jest molekularnym, heteroleptycznym tiolanem kadmu zawierającym jako dodatkowy ligand 3,5-dimetylopirydynę. Jon kadmu(II) znajduje się w centrum bipiramidy o podstawie trójkątnej, utworzonej przez 5 atomów - 2 atomy siarki, 2 atomy tlenu i jeden atom azotu. Między cząsteczkami kompleksu upakowanymi w krysztale nie ma oddziaływań innych niż oddziaływania van der Waalsa.

    Full text to download in external service

  • Romanika Okraszewska dr inż. arch.

    Romanika Okraszewska, Ph.D., Eng. Arch., is an Assistant Professor at the Faculty of Civil and Environmental Engineering of Gdańsk University of Technology (GUT). Graduated from the mathematical and informatical class at the National Education Commission High School in Gdańsk. Graduated from two faculties of Gdańsk University of Technology, Architecture and Urban Planning (2002) and Management and Economics (2004). Participant...

  • A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji

    The paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...

  • Electricity demand prediction by multi-agent system with history-based weighting

    Publication

    - Year 2016

    Energy and load demand forecasting in short-horizons, over an interval ranging from one hour to one week, is crucial for on-line scheduling and security functions of power system. Many load forecasting methods have been developed in recent years which are usually complex solutions with many adjustable parameters. Best-matching models and their relevant parameters have to be determined in a search procedure. We propose a hybrid...

    Full text to download in external service

  • Methodological issues of functional safety and reliability assessment of critical systems in industrial hazardous plants

    The aim of this article is to identify and discuss some methodological issues that are of interest among functional safety specialists and experts after publication of the second edition of international standards IEC 61508 and IEC 61511, including the design and implementing the safety-related functions of higher safety integrity levels and protection layers. The basic role of safety-related systems is to reduce effectively and...

  • Coastal zone monitoring using Sentinel-1 SAR polarymetry data

    Publication

    In recent years the role of the surveillance and security of Polish boundaries has significantly increased. Polish coastal zone monitoring requires various approaches using various technological means in order to ensure the protection of Polish boundaries. In this paper, the authors discuss and present alternatives to underwater surveillance methods of coastal area analysis and monitoring using data retrieved from the newly developed...

    Full text available to download

  • ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS

    Publication

    The paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...

    Full text available to download

  • Health monitoring services based on off-the-shelf mobile devices

    Publication

    - Year 2013

    Development of health monitoring systems usually involves usage of dedicated devices with provided guarantees in terms of their reliability. Those devices raise the cost of the whole system, because of which such platforms are limited only to specific areas and constrained number of users. Usage of off-the- shelf devices could lower the cost and bring those systems to the masses. The paper covers possible uses of common off-the-shelf...

  • Integration and Visualization of the Results of Hydrodynamic Models in the Maritime Network-Centric GIS of Gulf of Gdansk

    Publication

    - Year 2016

    Ensuring of security in the coastal area makes on a seaside countries research in the field of infrastructure spatial information of environmental data. The paper presents the results of work on the construction of this infrastructure by integrating electronic navigational chart with ortophotomaps of coastal areas as well as numerical data from weather and hydrodynamic models. Paper focuses on a problems associated with creating...

    Full text to download in external service

  • Stradar - Multimedia Dispatcher and Teleinformation System for the Border Guard

    Security of national borders requires utilization of multimedia surveillance systems automatically gathering, processing and sharing various data. The paper presents such a system developed for the Maritime Division of the Polish Border Guard within the STRADAR project. The system, apart from providing communication means, gathers data, such as map data from AIS, GPS and radar receivers, videos and photos from camera or audio from...

    Full text available to download

  • The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art

    Commemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...

    Full text to download in external service

  • I, Robot: between angel and evil

    Publication

    - Year 2020

    The boosting of most digital innovations within recent technology progress by artificial intelligence (AI) constitutes a growing topic of interest. Besides its technical aspects, increasing research activity may be observed in the domain of security challenges, and therefore of responsibility related to the controlled or hypothetically uncontrolled or autonomous emergence of AI solutions. Consequently, responsibility and ethics...

    Full text to download in external service

  • Deep Learning: A Case Study for Image Recognition Using Transfer Learning

    Publication

    - Year 2021

    Deep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...

    Full text to download in external service

  • Deep Learning

    Publication

    - Year 2021

    Deep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...

    Full text to download in external service

  • Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure

    Safety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...

    Full text to download in external service

  • Reconfigurable Antennas for Trustable Things

    Publication

    In modern applications, the Internet of Things plays a significant role in increasing the productivity, effectiveness or safety and security of people and assets. Additionally, the reliability of Internet of Things components is crucial from the application point of view, where a resilient and low-latency network is needed. This can be achieved by utilizing reconfigurable antennas to enhance the capabilities of the wireless sensor...

    Full text to download in external service

  • A model-based approach to analysis of authentication protocols.

    Publication

    - Year 2004

    W referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...

  • Techniczne aspekty implementacji nowoczesnej platformy e-learningowej

    Zaprezentowano aspekty techniczne implementacji nowoczesnej platformy nauczania zdalnego. Omówiono obszary funkcjonalne takie jak: system zarządzania nauczaniem, serwis informacyjny, dodatkowe oprogramowanie dydaktyczne oraz kolekcja zasobów multimedialnych. Przybliżono zagadnienia związane z bezpieczeństwem takiej platformy. Na końcu przedstawiono parametry techniczne wdrożonej na Politechnice Gdańskiej platformy eNauczanie.

    Full text available to download

  • Uncovering the invisible barriers to women’s success

    Publication

    - Year 2022

    In the area of science and higher education, as in business and politics, the job situation of women is improving, and the percentage of women on executive positions is increasing. However, there is still a serious underrepresentation of women in the highest decision-making bodies. Ladies also take part in the strategic institutional events less frequently. There are still serious disproportions in academic and management positions,...

    Full text to download in external service

  • Thriving in multicultural work settings

    Publication

    - Year 2015

    Owing to globalization and the global mobility of workforce, working in multicultural environments has become a daily reality for an increasing number of manpower. Such an environment does introduce unique challenges to individuals, enabling some of them to thrive. The aim of the paper, therefore, is to explore the antecedents of thriving and its components in multicultural work settings of multinational corporations (MNCs). The...

    Full text to download in external service

  • In Search of Naval Beauty. Historical Study of Ship Architecture

    Publication

    - Year 2018

    Designing ships is no mean achievement. In the old days, constructors focused on making their ships visually appealing, while paying scant regard to the living conditions of the crew. Such an approach reflected the state of the art in ship building at the time as well as the social order prevalent in those days. A breakthrough came no earlier than at the turn of the 19th / 20th centuries. The industrial revolution brought along...

    Full text to download in external service

  • Study on the student's perception of marketing activities undertaken by Gdansk and Mangalore

    Open Research Data

    Nowadays, the urban areas very often attract the poor and the unemployed, leading to the creation of neighbourhoods of poverty (slums) and other economic and social problems. All over the World cities include sustainable goals in their development strategies but the question is, whether the city development strategies foresee activities devoted also...

  • Factory Acceptance Test – Strain Gauge Measurement, Report no: WOiO /II/123/2014

    Publication

    Tested object was 40 meters long jib and its foundation, placed in Gdansk Shiprepair Yard, manufactured by KMK. The contruction was dedicated to the passenger cruise vessel "Quantum of the Seas" The Strain Gauge measurement in different location and load situation was done in order to validate calculation finite element models used during strength analysis for project. The expertise contains: methodology of the measurements, description...

  • Factory Acceptance Test – Strain Gauge Measurement - Report no: WOiO /II/88/2014

    Publication

    Tested object was 40 meters long jib and its foundation, placed in Gdansk Shiprepair Yard, manufactured by KMK. The contruction was dedicated to the passenger cruise vessel "North Star" The Strain Gauge measurement in different location and load situation was done in order to validate calculation finite element models used during strength analysis for project. The expertise contains: methodology of the measurements, description...

  • Monika Klimowicz dr hab.

    People

    I am a political scientist and economist. My professional passion is to plan and effectively implement scientific projects that revolve around the socio-economic aspects of European integration. I have carried out research projects, within national and international research teams, funded by the Polish National Science Centre and the European Commission. The main areas of my studies have been so far innovation in regional development,...

  • A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS

    The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....

    Full text to download in external service

  • Intensyfikacja procesów w przemyśle chemicznym [Moduł dyscyplinarny do wyboru, Grupa B]

    e-Learning Courses
    • D. Konopacka-Łyskawa

    Prowadząca: dr hab. inż. Donata Konopacka-Łyskawa Terminy realizacji:  6.11 (ndz), godz. 12-13:45 (2x45 min. + przerwa) 10.12(sob), godz. 9:15-11 (2x45 min. + przerwa) 11.12 (ndz), godz. 9:15-11 14.01 (sob), godz. 9:15-11 15.01 (ndz), godz. 9:15-11   21.01 (sob), godz. 9:15-11 22.01 (ndz.), godz. 9:15-11:45 (3x45 min. + przerwa)  Celem realizacji przedmiotu jest zapoznanie doktorantów wdrożeniowych z metodami i strategiami...

  • Andrzej Chybicki dr inż.

    A graduate of the Faculty of Electronics, Telecommunications and Informatics at the Gdańsk University of Technology, PhD in technical sciences in the field of IT specializing in distributed data processing in IT . Aimed at exploiting the achievements and knowledge in the field of industrial research. He cooperated with a number of companies including OpeGieka Elbląg, Reson Inc., Powel Sp. z o. o., Wasat, Better Solutions, the European...

  • Michał Czubenko dr inż.

    Michał Czubenko is a distinguished 2009 graduate of the Faculty of Electronics, Telecommunications, and Informatics at Gdańsk University of Technology, specializing in the discipline of automatic control and robotics. Currently, he serves as an adjunct in the Department of Robotics and Decision Systems at the same institution. In 2012, he embarked on a three-month internship at Kingston University London, broadening his horizons...

  • A comprehensive overview of software product management challenges

    The principal focus of software product management is to ensure the economic success of the product, which means to prolong the product life as much as possible with modest expenditures to maximizs profits. Software product managers play an important role in the software development organization while being responsible for the strategy, business case, product roadmap, high-level requirements, product deployment (release-management),...

    Full text available to download

  • Detection of Closing Crack in Beam Based on Responses Induced by Harmonic Excitation

    Publication

    The non-linear contact model was chosen to simulate the closed crack in the cantilever beam. The study examines the shape and characteristics of the phase diagram of a cantilever beam with closed cracks. It investigates how various crack properties influence the geometry of the phase diagram and proposes a method for identifying cracks based on their features. The area of each closed curve in the phase diagram is determined using...

    Full text available to download

  • Bartosz Sawik

    People

    Dr Bartosz Sawik is a Professor at the Department of Business Informatics and Engineering Management, AGH University of Science and Technology, Krakow, Poland and at the Institute of Smart Cities, GILT-OR Group, Department of Statistics, Computer Science and Mathematics, Public University of Navarre, Pamplona, Spain. He is a Visiting Researcher at the University of California, Berkeley, USA. He has a Ph.D. and a M.Sc. and Eng....

  • Projekt Architektoniczny II KAMiUP 2021/2022 W.T.+J.B.

    e-Learning Courses
    • J. Borucka
    • W. Targowski

    Kurs dla studentów II semestru II stopnia studiów z projektowania architektonicznego prowadzonego w Katedrze Architektury Mieszkaniowej i Użyteczności Publicznej. Prowadzący zajęcia: dr inż. arch. Wojciech Targowski, prof. PG dr inż. arch. Justyna Borucka  

  • Seminarium dyplomowe (gr. TOB) - sem. zimowy 2022/2023

    e-Learning Courses
    • B. Grzyl

    Kurs na e-nauczaniu wspierający zajęcia stacjonarne Kurs jest przeznaczony dla Studentów VII semestru studiów stacjonarnych inżynierskich kierunku budownictwo, WILiŚ, specjalności Technologia i Organizacja Budownictwa Osoba odpowiedzialna za przedmiot: dr inż. Beata Grzyl, prof. uczelni: beata.grzyl@pg.edu.pl 

  • Projekt Architektoniczny II KAMiUP 2020/2021 W.T.+J.B.

    e-Learning Courses
    • J. Borucka
    • W. Targowski

    Kurs dla studentów II semestru II stopnia studiów z projektowania architektonicznego prowadzonego w Katedrze Architektury Mieszkaniowej i Użyteczności Publicznej. Prowadzący zajęcia: dr inż. arch. Wojciech Targowski, prof. PG dr inż. arch. Justyna Borucka  

  • OCHRONA PRYWATNOŚCI W SYSTEMACH MONITORINGU WIZYJNEGO, PRZEGLĄD OPRACOWANYCH ARCHITEKTUR I ALGORYTMÓW

    Nieustannie rozwijające się technologie informacyjne związane z inteligentnym monitoringiem wizyjnym stwarzają ryzyko niewłaściwego wykorzystywania danych osobowych. W celu zapewnienia prawidłowej ochrony materiału wizyjnego, w ramach projektów realizowanych w Katedrze Systemów Multimedialnych WETI PG, opracowany został szereg architektur i algorytmów, które ułatwiają ochronę danych wrażliwych, takich jak: wizerunki osób, numery...

    Full text available to download

  • Software Quality, Reliability, and Security (International Conference on Quality Software [QSIC])

    Conferences

  • Joint Working Conference on Secure Information Networks: Communications and Multimedia Security

    Conferences

  • ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code

    Conferences

  • Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger

    W artykule opisano aplikację, która automatycznie wykrywa zdarzenia dźwiękowe takie jak: rozbita szyba, wystrzał, wybuch i krzyk. Opisany system składa się z bloku parametryzacji i klasyfikatora. W artykule dokonano porównania parametrów dedykowanych dla tego zastosowania oraz standardowych deskryptorów MPEG-7. Porównano też dwa klasyfikatory: Jeden oparty o Percetron (sieci neuronowe) i drugi oparty o Maszynę wektorów wspierających....

    Full text to download in external service