Search results for: IT TICKETS
-
Discovery of Stylistic Patterns in Business Process Textual Descriptions: IT Ticket Case
PublicationGrowing IT complexity and related problems, which are reflected in IT tickets,create a need for new qualitative approaches. The goal isto automate the extraction of main topics described in tickets in order to provide high quality support for the IT process workers and enablea smooth service delivery to the end user. Present paper proposes a method of knowledge extraction in a form of stylistic patterns in business...
-
Dickens Quarterly
Journals -
Problems of surface topography with oil pockets analysis
Publication -
Transzendentalphilosophie als Geltungsreflexion? Zur Philosophie Heinrich Rickerts
PublicationFilozofie transcendentalną utożsamia się z refleksją o ważności, ale przecież od czasu słynnej debaty między Adolfem Trendelenburgiem i Kuno Fischerem rozwój refleksji transcendentalnej poszedł w dwu kierunkach. W szkole badeńskiej aprioryczna siła transcendentalnego podmiotu przeciwstawia się sferze przedmiotowej redukowanej do czystej faktyczności. Wartość i obiektywizacja poznania jest zasługą transcendentalnej świadomości -...
-
Acoustic streaming caused by modulated sound and wave packets.
PublicationRozpatruje się powstanie pola wirowego na skutek nieliniowej propagacji fali akustycznej w środowiskach z lepkością. Teoria odwołuje się do fal akustycznych nieokresowych, w odróżnieniuod teorii klasycznej. Obliczenia numeryczne na podstawie nowych wzorów są porównywane z wynikami teorii klasycznej.
-
Assessing business process complexity based on textual data: Evidence from ITIL IT ticket processing
PublicationPurpose This study aims to draw the attention of business process management (BPM) research and practice to the textual data generated in the processes and the potential of meaningful insights extraction. The authors apply standard natural language processing (NLP) approaches to gain valuable knowledge in the form of business process (BP) complexity concept suggested in the study. It is built on the objective, subjective and meta-knowledge...
-
JOURNAL OF SPACECRAFT AND ROCKETS
Journals -
Dickens Studies Annual
Journals -
The use of GFRP tubes as load-bearing jackets in concrete-composite columns
PublicationThe paper presents the fields of applications of polymer composites in building structures. The use of composite glass fibre tubes is discussed in more detail. The laboratory methods used to test the mechanical properties of these pipes are presented. An original research program is presented, including six concrete-filled glass fibre tubes. The cylinders and columns made in this way were tested for their axial load capacity. Conclusions...
-
An incentive-based forwarding protocol for mobile ad hoc networks with anonymous packets
PublicationPrzekazywanie pakietów w sieciach ad hoc z transmisją wieloetapową zależy od współpracy ruchomych terminali oraz stworzenia właściwego systemu motywacyjnego. Zaproponowany protokół wykorzystuje elementy podejścia systemu reputacyjnego dla stworzenia funkcji wypłaty w grze niekooperacyjnej, w której strategie dotyczą konfiguracji progu admisji pakietów źródłowych w stacjach. Dla symetrycznego modelu sieci pokazano, że istnieją punkty...
-
Ultrastructural alterations of the tympanic membrane in retraction pockets from patients with chronic otitis media
Publication -
On the convergence of a finite-difference discretization à la Mickens of the generalized Burgers–Huxley equation
PublicationIn this note, we establish the property of convergence for a finite-difference discretization of a diffusive partial differential equation with generalized Burgers convective law and generalized Hodgkin–Huxley reaction. The numerical method was previously investigated in the literature and, amongst other features of interest, it is a fast and nonlinear technique that is capable of preserving positivity, boundedness and monotonicity....
-
Experimental research on a hydrodynamic thrust bearing with hydrostatic lift pockets: Influence of lubrication modes on bearing performance
PublicationThe aim of the study is to investigate the performance of a thrust bearing equipped with hydrostatic lift pockets under different lubrication modes. Three types of flat land bearing lubrication modes are studied experimentally: hydrostatic lubrication (HS; forced oil injection to the pockets), hybrid lubrication (HS + HD; hydrostatic lubrication combined with the external forced bearing oil supply) and hydrodynamic lubrication...
-
Existence and uniqueness of monotone and bounded solutions for a finite-difference discretization a` la Mickens of the generalized Burgers–Huxley equation.
PublicationDeparting from a generalized Burgers–Huxley partial differential equation, we provide a Mickens-type, nonlinear, finite-difference discretization of this model. The continuous system is a nonlinear regime for which the existence of travelling-wave solutions has been established previously in the literature. We prove that the method proposed also preserves many of the relevant characteristics of these solutions, such as the positivity,...
-
Rola nowego tramwaju wodnego w Gdańsku
PublicationStreszczenie Tramwaj wodny – środek miejskiej komunikacji zbiorowej czy jednostka przewozów turystyczny? Identyfikacja, zestawienie i analiza czynników transportu nowopowstałej usługi przewozowej z komunikacją miejską i przewozem turystycznym tj. :cennik biletów, sposobu dystrybucji biletów, czasu przejazdu dostępności, przebieg trasy i częstotliwości kursowania. Wskazanie funkcji przewozowej tramwaju wodnego w Gdańsku.
-
Ticks and Tick-Borne Diseases
Journals -
Menedżer IT
e-Learning Courses -
Infrastruktura IT przedsiębiorstw
e-Learning Courses -
INFRASTRUKTURA IT PRZEDSIĘBIORSTW
e-Learning Courses -
Results of microhardness measurements of acrylic bone cements incorporating various components
Open Research DataThe database contains the images of microhardness measurements of modified bone cements using the Vickers Hardness Tester. The following modifications were evaluated: the addition of biodegradable components (including chitosan, cellulose, tricalcium phosphate, polydioxanone or magnesium), the addition of bioactive components (bioglasses) or the addition...
-
Kod fontannowy z przyrastającą liczbą symboli źródłowych
PublicationKody fontannowe zabezpieczające transmisję przed wymazaniami wyróżnia brak określonej z góry długości i losowy sposób generacji kolejnych pakietów kodowych. W pracy pokazano jak właściwości tych kodów zależą od rozkładu macierzy generującej dla dwóch wariantów dostarczania pakietów do kodera. Szczególnie interesujący jest przypadek, gdy pakiety źródłowe trafiają do kodera stopniowo podczas transmisji. Uzyskane wyniki wskazują na...
-
Technologie zespołów IT - niestacjonarne
e-Learning Courses -
Modeling SPMD Application Execution Time
PublicationParallel applications in a Single Process Multiple Data paradigm assume splitting huge amounts of data to multiple processors working in parallel at small data packets. As the individual data packets are not independent, the processors must interact with each other to exchange results of the calculations with their adjacent partners and take these results into account in their own computations. An example of SPMD is geometric parallelism...
-
The most important elements of the social package that guide students of Wrocław University of Science and Technology when choosing their first job
Open Research DataThis dataset contains the results of research that were carried out by the Wrocław University of Science and Technology in March and April 2016, using an anonymous "on-line" questionnaire. 1,320 people took part in the study entitled "My ideal employer" - students and doctoral students of all faculties of the university (including those fields of study...
-
IT project management in business
e-Learning Courses -
Zarządzanie Zasobami IT w przedsiębiorstwie
e-Learning CoursesKurs: Zarządzanie Zasobami IT w przedsiębiorstwie Kierunek: Zarządzanie inżynierskie sem 3
-
Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
PublicationA novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...
-
Microfluidic SIW-Based Tunable Self-Diplexing Antenna for Sub-6 GHz Band Applications
PublicationThis work introduces a novel frequency tunable self-diplexing antenna (SDA) design based on substrate integrated waveguide (SIW) technology. A modified A-shaped slot is employed on the cavity’s top plane, which is excited by two independent 50 Ω microstrip feed lines to operate at each resonant frequency. The frequency flexibility of the proposed antenna allows for fine-tuning at each resonance frequency. The frequency flexibility...
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublicationThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublicationIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
Gossiping by energy-constrained mobile agents in tree networks
PublicationEvery node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...
-
The secure transmission protocol of sensor Ad Hoc network
PublicationThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Method of Decision-Making Logic Discovery in the Business Process Textual Data
PublicationGrowing amount of complexity and enterprise data creates a need for novel business process (BP) analysis methods to assess the process optimization opportunities. This paper proposes a method of BP analysis while extracting the knowledge about Decision-Making Logic (DML) in a form of taxonomy. In this taxonomy, researchers consider the routine, semi-cognitive and cognitive DML levels as functions of BP conceptual aspects of Resources,...
-
Zarządzanie zasobami IT w przedsiębiorstwie – NS
e-Learning Courses -
IT project management in business 2023
e-Learning Courses -
Projekt zespołowy (IT) - 2T_II_IT - 2022/2023
e-Learning CoursesProjekt zespołowy (IT) - sem. 2 II stopnia Transport - Infrastruktura Transportu
-
IT project management in business 2022
e-Learning Courses -
Zarządzanie zasobami IT NS 2023/24
e-Learning Courses -
Seminarium dyplomowe 7T (IT) 2024/2025
e-Learning Courses -
IT Project Management in Business - 2024
e-Learning Courses -
Projekt zespołowy (IT) - 2T_II_IT - 2023/2024
e-Learning CoursesProjekt zespołowy (IT) - sem. 2 II stopnia Transport - Infrastruktura Transportu
-
Seminarium dyplomowe 7T (IT) 2023/2024
e-Learning Courses -
Zarządzanie zasobami IT SS 23/24
e-Learning Courses -
Giant Nernst effect in the incommensurate charge density wave state of P4W12O44
PublicationWe report the study of Nernst effect in quasi-low-dimensional tungsten bronze P4W12O44 showing a sequence of Peierls instabilities. We demonstrate that both condensation of the electronic carriers in the charge density wave state and the existence of high-mobility electrons and holes originating from the small pockets remaining in the incompletely nested Fermi surface give rise to a Nernst effect of a magnitude similar to that...
-
Improvement of microstructure and mechanical properties of high dense sic ceramics manufactured by high-speed hot pressing
PublicationNon-oxide ceramics possess high physical-mechanical properties, corrosion and radiation resistance, which can be used as a protective materials for radioactive wastes disposal. The aim of the present study was the manufacturing of high density SiC ceramics with advanced physical and mechanical parameters. The high performance on the properties of produced ceramics was determined by the dense and monolithic structure. The densified...
-
Performance Modeling and Prediction of Real Application Workload in a Volunteer-based System
PublicationThe goal of this paper is to present a model that predicts the real workload placed on a volunteer based system by an application, with incorporation of not only performance but also availability of volunteers. The application consists of multiple data packets that need to be processed. Knowing the computational workload demand of a single data packet we show how to estimate the application workload in a volunteer based system. Furthermore,...
-
Zarządzanie produktem w branży IT 2022/2023
e-Learning CoursesCel kursu: Rozwój umiejętności z zakresu tworzenia innowacyjnych produktów, wprowadzania ich na rynek, analizy odpowiedzi rynku i zarządzania produktem.
-
Managing enterprise IT infrastructure and security 2022
e-Learning CoursesThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
Zarządzanie produktem w branży IT 2023/2024
e-Learning CoursesCel kursu: Rozwój umiejętności z zakresu tworzenia innowacyjnych produktów, wprowadzania ich na rynek, analizy odpowiedzi rynku i zarządzania produktem.
-
Zarządzanie produktem w branży IT 2024/2025
e-Learning CoursesCel kursu: Rozwój umiejętności z zakresu tworzenia innowacyjnych produktów, wprowadzania ich na rynek, analizy odpowiedzi rynku i zarządzania produktem.