Filters
total: 2121
-
Catalog
- Publications 1442 available results
- Journals 21 available results
- Conferences 6 available results
- People 27 available results
- Projects 8 available results
- Laboratories 1 available results
- Research Teams 1 available results
- e-Learning Courses 31 available results
- Events 4 available results
- Open Research Data 580 available results
displaying 1000 best results Help
Search results for: SECRET-KEY
-
Self-organized multilayered graphene-boron doped diamond hybrid nanowalls for high performance electron emission devices
PublicationCarbon nanomaterials like nanotubes, nanoflakes/nanowalls and graphene have been used as electron sources due to their superior field electron emission (FEE) characteristics. Nevertheless, these materials show poor stability and a short lifetime, preventing them from being used in practical device applications. The intention of this study was to find an innovative nanomaterial, possessing both high robustness and reliable FEE behavior....
-
The essence of marine and coastal space – an interdisciplinary perspective
PublicationSea space has been undergoing a profound transformation. Although it retains its inspirational function in arts, literature and philosophy, it has been gaining new anthropogenic dimensions in eco-nomics and urban planning as a source of satisfying human needs i.e. the provision of harmony, beauty, off-shore energy, and biotech substances. Therefore, in this paper marine space is analyzed from a mul-tidimensional perspective of...
-
The application of magnetic fluids in sealing nodes designed for operation in difficult conditions and in machines used in sea environment
PublicationPresented in article MF seals are being researched for sea technology purposes due to their excellent tightness and low resistance of motion. These features are most valuable for ring propellers and ship's main propeller shaft. There are more reasons why technologists payf significant attention for various MFseals applications in their difficult operating conditions. For instance, an advanced pumping systems are designed with contactless...
-
The application of magnetic fluids in sealing nodes designed for operation in difficult conditions and in machines used in sea environment
PublicationPresented in article MF seals are being researched for sea technology purposes due to their excellenttightness and low resistance of motion. These features are most valuable for ring propellers and ship'smain propeller shaft. There are more reasons why technologists payf significant attention for various MFseals applications in their difficult operating conditions. For instance, an advanced pumping systemsare designed with contactless...
-
Gas Detection Using Resistive Gas Sensors And Radial Basis Function Neural Networks
PublicationWe present a use of Radial Basis Function (RBF) neural networks and Fluctuation Enhanced Sensing (FES) method in gas detection system utilizing a prototype resistive WO3 gas sensing layer with gold nanoparticles. We investigated accuracy of gas detection for three different preprocessing methods: no preprocessing, Principal Component Analysis (PCA) and wavelet transformation. Low frequency noise voltage observed in resistive gas...
-
Looking for Social Enterprise Models in Poland: institutional and historical context
PublicationThe paper is an attempt at identification of key social enterprise models in Poland. The authors recognize three models: entrepreneurial non-profit organizations, cooperatives as well as social integration clubs and centres. Their social and institutional background is presented together with institutional trajectories of social enterprise development.
-
The development of the 3D printing technology in the Radom region
Publication -
Characterizing the Performance of <span class="sc">xor</span> Games and the Shannon Capacity of Graphs
PublicationIn this Letter we give a set of necessary and sufficient conditions such that quantum players of a two-party xor game cannot perform any better than classical players. With any such game, we associate a graph and examine its zero-error communication capacity. This allows us to specify a broad new class of graphs for which the Shannon capacity can be calculated. The conditions also enable the parametrization of new families of games...
-
Factors determining selection of production planning and control system
PublicationThe article contains a comparative characteristics of selected systems of production planning and control, such as: MRP, kanban/JiT, DBR/TOC. The results of the performed analyses served as a basis for determining key market factors related to production planning and control functions, which determine the choice of an appropriate system.
-
Assessing pathways into a low carbon and climate responsible Gdansk
PublicationA basic question today is the sense of the use new ideas in shaping Polish cities- not as technologically advanced as others. The key is to understand good practices in designing and implementing new approaches. The comparative research Glasgow and Gdansk has been undertaken by Gdansk Development Agency in Jan 2014
-
Trade in value added of countries involved in TTIP: EU-USA comparison
PublicationThe aim of this paper is to present key facts concerning trade in the value added of those countries participating in the Transatlantic Trade and Investment Partnership (TTIP). In particular, we describe how involvement in global production networks (GPN) varies across EU countries with respect to the United States.
-
Ewa Wagner-Wysiecka dr hab. inż.
PeopleEwa Wagner-Wysiecka is a graduate of the Faculty of Chemistry at Gdańsk University of Technology (specializing in Chemical Technology, with a focus on Inorganic Technology and a sub-specialty in Technical and Industrial Analytics). She completed her master's thesis, entitled "Identification of Contaminants in Pharmacopoeial Sulfaquinoxaline," under the supervision of Professor Jan F. Biernat. After completing her master's degree...
-
Social Entrepreneurship Avenues for the Field Development through Research Paradigm Intersection Discussion
PublicationThe aim of this paper is to identify and provide key arguments for employing integrative approach in the choice of research paradigm for studying social entrepreneurship phenomenon. The fact that social entrepreneurship as a field of research is at its preliminary stage, serves as argument and gives freedom in the discussion of the choice of employing a research paradigm. The author does so through identifying commonalities and...
-
Informal projects management with volunteers participation
PublicationThe article briefly presents some experiences and results of research which has been conducted in order to identify key elements influencing the success of projects managed in informal way with volunteers’ participation. These experiences were collected during the realization of several “soft” projects. The general aims of these projects were sports competitions’ organisation, cultural events and charity projects for...
-
Implementation of Business Intelligence in an IT organization - the concept of an evaluation model
PublicationThis paper presents the issue of assessing the validity and effectiveness of implementing a Business Intelligence system in an IT Support Organization. This entity provides IT services to external clients involving, in particular, the storage and processing of large amounts of data. The vast amount of realized projects and also incidents reported in connection with those projects prevented effective decisions from being made without...
-
Squashed entanglement for multipartite states and entanglement measures based on the mixed convex roof
PublicationNew measures of multipartite entanglement are constructedbased on two definitions of multipartite information anddifferent methods of optimizing over extensions of the states. Oneis a generalization of the squashed entanglement where one takesthe mutual information of parties conditioned on the state's extensionand takes the infimum over such extensions. Additivity ofthe multipartite squashed entanglement is proved for both versionsof...
-
Aspects of pollution in Gdansk and gdynia Harbours at the coastal zone of the South Baltic Sea
PublicationOrganotin compounds (OTC), as well as metals, are toxic to many organisms. Even at very low concentrations OTC and metals can have several negative effects. The paper discusses key issues relating to the location of harbours in the coastal zone (including near the river mouths and semi-closed access to the sea) and the pollution of harbour sediments with heavy metals (e.g. zinc, copper, nickel and lead) and organotin derivatives...
-
The Rule-Based Model of Negentropy for Increasing the Energy Efficiency of the City’s Digital Transformation Processes into a Smart City
PublicationThe aim of the article is to build a rule-based model (RMFDN) for increasing the energy efficiency of Smart Cities’ digital transformation processes. The problem that arises during the implementation of digital transformation processes concerns the measures that should be assigned to estimate the duration of the digital transformation. Previous studies of digital transformation have been based on the analysis of design processes...
-
Diaquadihydroxohexakis(tri-tert-butoxysilanethiolato)octalithium(I)-toluene(1/2). Acta Cryst. Sect. E Struct. Rep. [online]**2002 vol. 58 s. m569-m570 1 rys. 1 tab. bibliogr. 9 poz. Diakwadihydroksoheksakis (tri - tert-butoksysilanotiolano)oktalit(I)-toluen (1/2).
PublicationPraca zawiera opis syntezy i struktury krystalicznej oraz cząsteczkowej ty-tułowego związku. Prezentowana struktura zawiera cząsteczki będące formalnieadduktem o wzorze Li8(SR)6(OH)2(H2O)2 (R=(tBuO)3Si) oraz cząsteczki toluenu.Strukturę wyznaczono stosując rentgenowską analizę strukturalną monokryszta-łu.
-
European Economic Development 2023
e-Learning CoursesMain aim of the subject is to transfer knowledge on theoretical and empirical aspects of economic development in Europe. Key topics: •concepts of economic development, alternative measures of development •factors of economic growth and development (‘determinants of growth’) •history of economic development in Europe •cross-country and cross-regional comparisons •sources: where to find information and data needed for empirical...
-
Piotr Dominiak prof. dr hab.
PeopleHe was born in Radom on June 29, 1948. He graduated in Economy at the University of Warsaw (1971), where he also obtained his doctorate (1976) and his habilitation (1989). He received the title of Professor in 2005. He has been working at GUT since 1971. Between 1991 and1993 he was a director of the Institute of Economic Sciences and Humanities at GUT. He was the Dean of the Faculty of Management and Economics in the years 1993-1999...
-
ECONOMIC HISTORY OF GLOBALIZATION - summer semester2022
e-Learning Courses -
EVALUATION OF THE EFFICIENCY OF FLEXICURITY IMPLEMENTATION IN OECD COUNTRIES
PublicationFlexicurity is a policy of flexible and secure labour market. It has been the subject of many analyses, however, a coherent evaluation methodology is difficult to specify. The purpose of this paper is to propose a Data Envelopment Analysis based model for the evaluation of the efficiency of flexicurity implementation in OECD countries. The results will be used to create the ranking of countries, to determine changes in time, and...
-
Unlocking creativity with new technologies
PublicationArtificial intelligence, augmented and virtual reality, Internet of Things and digital twins are just a few concepts related to the fourth industrial revolution that is happening right before our eyes. The key question asked by managers in the aerosol sector recently is: what does all this new technology mean to me?
-
Architektura bezpieczeństwa systemu netBaltic
PublicationW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Acute hypoxia diminishes the relationship between blood pressure and subarachnoid space width oscillations at the human cardiac frequency
PublicationAcute hypoxia exerts strong effects on the cardiovascular system. Heart-generated pulsatile cerebrospinal fluid motion is recognised as a key factor ensuring brain homeostasis. We aimed to assess changes in heart-generated coupling between blood pressure and subarachnoid space width oscillations during hypoxic exposure.
-
Striving for spatial energy efficiency in dwelling complexes. Kształtowanie przestrzennej efektywności energetycznej w zespołach zabudowy mieszkaniowej.
PublicationThe main aim of this article was to discover the key characteristics in shaping most rewarded eco- district complexes built respectively in temperate climate zone in respect to spatial energy efficiency and resilience principles. It was done through careful case studies, comparative analysis and juxtaposition of critical parameters related to spatial energy efficiency and resilience in chosen representative dwelling complexes....
-
Music Information Retrieval in Music Repositories
PublicationThis chapter reviews the key concepts associated with automated Music Information Retrieval (MIR). First, current research trends and system solutions in terms of music retrieval and music recommendation are discussed. Next, experiments performed on a constructed music database are presented. A proposal for music retrieval and annotation aided by gaze tracking is also discussed.
-
Incorporating Iris, Fingerprint and Face Biometric for Fraud Prevention in e-Passports Using Fuzzy Vault
PublicationA unified frame work which provides a higher security level to e-passports is proposed. This framework integrates face, iris and fingerprint images. It involves three layers of security: the first layer maps a biometric image to another biometric image which is called biostego image. Three mapping schemes are proposed: the first scheme maps single biometric image to single biostego image, the second scheme maps dual biometric images...
-
Zhonghua zheng xing wai ke za zhi = Zhonghua zhengxing waike zazhi = Chinese journal of plastic surgery
Journals -
BJS-03 DO WE NEED FIXATION OF THE MESH IN LAPAROENDOSCOPIC TECHNIQUES FOR M3 INGUINAL DEFECTS? AN EXPERIMENTAL STUDY
PublicationThe authors conducted a research experiment to verify the hypothesis that it is possible to preserve the mesh in the operating field in large direct hernias (M3) without the need to use fixing materials. The results showed that mesh fixation is not the only alternative to preventing recurrence in complex defects and that the type of implant seems to be a key factor from the point of view of mechanics and biophysics.
-
The Presence of Spiritual Archetypes Among Representatives of Eastern and Western Cultures
Publication -
Determining ATP concentration in Candida albicans in process of forming germ tube forms
Publication -
Thermo-mechanical reclaiming of ground tire rubber via extrusion at low temperature: Efficiency and limits
PublicationThermomechanical reclaiming of ground tire rubber (GTR) was performed at different temperatures (60, 120, and 180°C) using a co-rotating twin-screw extruder. Obtained samples were used in styrene-butadiene rubber (SBR) blends. As reference samples, SBR compounds containing untreated GTR were used. Curing characteristics, static and dynamic mechanical properties, and morphology of the obtained blends were determined. The results...
-
Digital fingerprinting for color images based on the quaternion encryption scheme
PublicationIn this paper we present a new quaternion-based encryption technique for color images. In the proposed encryption method, images are written as quaternions and are rotated in a three-dimensional space around another quaternion, which is an encryption key. The encryption process uses the cipher block chaining (CBC) mode. Further, this paper shows that our encryption algorithm enables digital fingerprinting as an additional feature....
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublicationAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Doppler effect in the CW FM sonar
PublicationWhen sonars are used for military purposes they have to ensure unobtrusive operation, a feature that can be potentially secured by 'silent sonar' or continuous wave frequency modulation sonars (CW FM sonars). The article presents how these sonars operate and identifies the relations between their parameters. The Doppler effect and its impact on the CW FM sonar are studied to identify how it affects the sonar's parameters. The results...
-
A systematic retrieval of international competitiveness literature: a bibliometric study
PublicationOver the last three decades there has been growing interest in international competitiveness research. However, as evidenced by the academic literature, there is a lack of systematic chronological studies synthesizing how this field has evolved over time. The main aim of this paper is to consolidate the state of the art of academic research on international competitiveness in the discipline of economics by using a new method: a...
-
A New Quaternion Encryption Scheme for Image Transmission
PublicationQuaternions are hypercomplex number of rank 4. They are often applied to mechanics in three-dimensional space and considered as one of the best ways to represent rotations. In this paper a new encryption scheme, based on the rotation of data vector in three-dimensional space around another quaternion (key) is proposed. A computer-based simulation was created to analyze the potential of the proposed encryption technique.
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
CIP Security Awareness and Training: Standards and Practice
PublicationThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
Effects of Store Brand Perceived Risk on Buyers’ Behavior – Four Decades of Research Overview = Wpływ postrzeganego ryzyka związanego z markami własnymi na zachowania nabywców – przegląd czterech dekad badań
PublicationAbstract. The aim of this paper is to present the concept of store brand perceived risk and the most important studies on its measurement that were being conducted for 40 years. For this purpose, an extensive literature review is introduced. Some aspects of the risk constructs and major effects of store brand perceived risk are emphasized. This paper provides key directions to brand managers regarding store brand assortment.
-
Programming Geometry as a Creative Play with Architectural Form
PublicationIn the twenty-first century "programming" is the key word that opens unprecedented opportunities for design and materialization of geometrically complex architectural objects. From the digital designer perspective programming geometry can be seen as a creative play with a form and a process of generation/exploration as well as the possibility of applying the computing power as a co-designer in the process of finding solutions for...
-
Trade-offs in multiparty Bell-inequality violations in qubit networks
PublicationTwo overlapping bipartite binary input Bell inequalities cannot be simultaneously violated as this would contradict the usual no-signalling principle. This property is known as monogamy of Bell inequality violations and generally Bell monogamy relations refer to trade-offs between simultaneous violations of multiple inequalities. It turns out that multipartite Bell inequalities admit weaker forms of monogamies that allow for violations...
-
BPN/BEK/2022/1/00001 Volunteering in social crises: between episodic and organized help. Perspectives of nongovernmental organizations and volunteers from Italy and Poland
ProjectsProject realized in The Maria Grzegorzewska University according to BPN/BEK/2022/1/00001 agreement from 2023-02-09
-
Critical Remarks on Landauer’s principle of erasure– dissipation: Including notes on Maxwell demons and Szilard engines
PublicationWe briefly address Landauer’s Principle and some related issues in thermal demons. We show that an error-free Turing computer works in the zero-entropy limit, which proves Landauer’s derivation incorrect. To have a physical logic gate, memory or information-engine, a few essential components necessary for the operation of these devices are often neglected, such as various aspects of control, damping and the fluctuation–dissipation...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublicationIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
Władza misjonarzy. Zmierzch i świt świeckiej religii w Dolinie Krzemowej
Publication"Władza misjonarzy" to książka o misjonarskim zapale zmieniania świata i o kryzysie świeckiej religii towarzyszącej liderom nowych technologii, o ich świętokradztwach i sprofesjonalizowanej pokucie mającej przywrócić harmonię technologicznego raju na ziemi z Alphabetem, Metą, Apple i TikTokiem w roli głównej. Także o skruszonych inżynierach, żałujących każdej chwili, którą poświęcili na wymyślanie uzależniających algorytmicznych rozwiązań...
-
Bibliometric approach to tracking the concept of international competitiveness
PublicationThe main aim of paper is to identify the growth pattern in the international competitiveness literature, its core publications and key research domains on the basis of bibliometric data from the years 1945–2015. Citation data is collected from the ISI Web of Science Website, Scopus and Google Scholar, and analysed using HistCite, Pajek and VOSviewer software. Bibliometric indicators, network citation, key-route path methods and...
-
Chitosan-based electrospun nanofibers for encapsulating food bioactive ingredients: A review
PublicationToday, society has been more aware of healthy food products and related items containing bioactive compounds, which potentially contribute to human health. Unfortunately, the long-term stability and bioactivity of biologically active compounds against environmental factors compromise their target and effective action. In this way, lab-designed vehicles, such as nanoparticles and nanofibers, provide enough properties for their preservation...