Filtry
wszystkich: 18422
wybranych: 15274
-
Katalog
- Publikacje 15274 wyników po odfiltrowaniu
- Czasopisma 935 wyników po odfiltrowaniu
- Konferencje 182 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 459 wyników po odfiltrowaniu
- Wynalazki 4 wyników po odfiltrowaniu
- Projekty 45 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Zespoły Badawcze 2 wyników po odfiltrowaniu
- Aparatura Badawcza 8 wyników po odfiltrowaniu
- Kursy Online 555 wyników po odfiltrowaniu
- Wydarzenia 50 wyników po odfiltrowaniu
- Dane Badawcze 906 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: KNOWLEDGE MANAGEMENT, KNOWLEDGE SECURITY, KNOWLEDGE RISKS, COVID-19, CONCEPTUAL PAPER, INTEGRATIVE MODEL
-
ESH Position Paper
Publikacja -
Security Assessment of a Turbo-Gas Power Plant
PublikacjaCritical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.
-
The Analysis of Vodka: A Review Paper
PublikacjaVodka is the most popular alcoholic beverage in Poland, Russia and other Eastern European countries, made from ethyl alcohol of agricultural origin that has been produced via fermentation of potatoes, grains or other agricultural products. Despite distillation and multiple filtering, it is not possible to produce 100 % ethanol. The solution with a minimum ethanol content of 96 %, which is used to produce vodkas, also contains trace amounts...
-
Security Information Sharing for the Polish Power System
PublikacjaThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Current challenges and methodological issues of functional safety and security management in hazardous technical systems
PublikacjaCelem artykułu jest zidentyfikowanie problemów oceny ryzyka w kontekście stosowania systemów elektrycznych / elektronicznych / programowalnych elektronicznych (E/E/PE) z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego i zabezpieczeń (ochrony). Zadaniem rozwiązań bezpieczeństwa funkcjonalnego jest efektywne redukowanie ryzyka wychodząc z poziomu nieakceptowanego. Ryzyko jest definiowane jako kombinacja prawdopodobieństwa wystąpienia...
-
Experience-Driven Model of Decision-Making Processes in Project Teams
PublikacjaThis article presents a model of decision-making processes in project teams. Project teams constitute a specific type of organization appointed to implement a project. Decisions made by project teams result from the methods of project management and best management practices. The authors have undertaken the task of formalizing these processes using the classical method of constructing decision trees. It has been established that...
-
Don't forget the dark side of green transformation
PublikacjaDesign/methodology/approach – The study is a continuation of the research by Durst and Zieba (2019) related to knowledge risks and their potential outcomes. This present study makes an update on the literature on knowledge risks and green transformation and describes knowledge risks that can be faced in this process. Originality/value – The paper offers new insights for researchers dealing with the topic of knowledge risks in...
-
Use of structural equation modeling in quantitative research in the field of management and economics: A bibliometric analysis in the systematic literature review
PublikacjaPURPOSE: This paper aims to provide a comprehensive review of scholarly research focusing on using quantitative methods and particularly structural equation modeling (SEM) in management and economics studies, as well as provide a bibliometric agenda including the time horizon of individual publications, the highest citation rate, geographic and industry areas, methodological context, and keywords. METHODOLOGY: A systematic literature...
-
Algorithms for testing security in graphs
PublikacjaIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
Public Finance in Poland in a COVID Fog: A Look Through the Lens of Fiscal Transparency and Accountability
PublikacjaAbstract. Goal– The aim of the article is to identify dysfunctional phenomena (implementation of specific mechanisms/solutions and actions taken), generating increased opacity and limit the responsibility/accountability of public f inance in Poland, exacerbated by the COVID-19 crisis. Methods– descriptive analysis, comparative analysis and financial analysis methods were used. Results– fiscal transparency and accountability in...
-
Risk management model of winter navigation operations
Publikacja -
Security aspects in functional safety analysis
PublikacjaA security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...
-
Automatic sound recognition for security purposes
PublikacjaIn the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublikacjaModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Rapid Antenna Optimization with Restricted Sensitivity Updates by Automated Dominant Direction Identification
PublikacjaMeticulous tuning of geometry parameters turns pivotal in improving performance of antenna systems. It is more and more often realized using formal optimization methods, which is demonstrably the most efficient way of handling multiple design variables, objectives, and constraints. Although in some cases a need for launching global search arises, a typical design scenario only requires local optimization, especially when a decent...
-
Energy Security of Polish Consumers in 2004-2021
PublikacjaTheoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...
-
Abilities, Motivations, and Opportunities of Furloughed Employees in the Context of Covid-19: Preliminary Evidence From the UK
Publikacja -
COVID-19-Associated Mucormycosis (CAM): Case-Series and Global Analysis of Mortality Risk Factors
Publikacja -
Diversity of Students’ Unethical Behaviors in Online Learning Amid COVID-19 Pandemic: An Exploratory Analysis
Publikacja -
The Impact of the COVID-19 Pandemic on Poles’ Nutritional and Health Behaviour and Quality of Life—A Pilot Study
Publikacja -
Associations of Nutritional Behavior and Gut Microbiota with the Risk of COVID-19 in Healthy Young Adults in Poland
Publikacja -
Small-lot Production with Additive Production Using Reverse Logistics and IT Solutions in COVID-19 Era
Publikacja -
The case of fatal acute hemorrhagic necrotizing encephalitis in a two-month-old boy with Covid-19.
Publikacja -
Sex-related patient-reported brain fog symptoms in non-hospitalised COVID-19 patients
Publikacja -
Use of technology by people with dementia and informal carers during COVID‐19: A cross‐country comparison
Publikacja -
The use of technology by people with dementia and informal carers during COVID-19: a cross-country comparison
Publikacja -
Wpływ COVID-19 na skórę: objawy zakażenia, osutki polekowe oraz zapalenie kontaktowe
Publikacja -
Class of 2020 in Poland: Students’ Mental Health during the COVID-19 Outbreak in an Academic Setting
Publikacja -
Coping of Chronically-Ill Patients during the COVID-19 Pandemic: Comparison between Four Groups
Publikacja -
The COVID-19 outbreak and Google searches: Is it really the time to worry about global mental health?
Publikacja -
Novel psychopathological picture during the COVID-19 pandemic based on a first episode of psychotic depression.
Publikacja -
Impact of COVID-19 Pandemic Constraints on the Ecobiochemical Status of Cultivated Soils along Transportation Routes
Publikacja -
When to Resume Bariatric Surgery after COVID-19 Pandemic? – Results of Patients’ and Surgeons’ Survey.
Publikacja -
Impact of the COVID-19 Pandemic on the Patient’s Decision about Bariatric Surgery: Results of a National Survey
Publikacja -
When to resume bariatric surgery after COVID-19 pandemic?: results of patients’ and surgeons’ survey
Publikacja -
The ChoCO-W prospective observational global study: Does COVID-19 increase gangrenous cholecystitis?
Publikacja -
Volatility in International Sovereign Bond Markets: The role of government policy responses to the COVID-19 pandemic
Publikacja -
Predictors of Psychological Distress across Three Time Periods during the COVID-19 Pandemic in Poland
Publikacja -
Remote and on-site work stress severity during the COVID-19 pandemic: comparison and selected conditions
Publikacja -
Case study methodology. Few conceptual considerations.
PublikacjaThis paper contributes to the debate on case study as methodological approach. It shows several issues concerning its major advatangeus and disadvantageus
-
Integration of Lean Manufacturing with ISO Management Systems in Enterprise
PublikacjaLean manufacturing [LM], quality management system and environmental management system are clear initiatives with a goal of improving effectiveness and efficiencies of organizations. Many organisations tackle lean philosophy, ISO standards individually but this kind of attempt do not focus on the synergy and the advantage from the potential collaboration. This paper aims to present the possibility of integration Lean Management...
-
Update a simple hypoplastic constitutive model
PublikacjaW artykule omówiono uproszczona formę hipoplastycznego konstytutywnego prawa materiałowego do opisu zachowania się materiałów granulowanych. Wykonano symulacje testów elementów i porównano wyniki z doświadczeniami.
-
The Sense of Security of the Prison Service Offi cers
Publikacja -
Integrative genomics reveal a role for MCPIP1 in adipogenesis and adipocyte metabolism
Publikacja -
Motion Trajectory Prediction in Warehouse Management Systems: A Systematic Literature Review
PublikacjaBackground: In the context of Warehouse Management Systems, knowledge related to motion trajectory prediction methods utilizing machine learning techniques seems to be scattered and fragmented. Objective: This study seeks to fill this research gap by using a systematic literature review approach. Methods: Based on the data collected from Google Scholar, a systematic literature review was performed, covering the period from 2016...
-
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Challenges in providing support for management of evidence-based arguments
PublikacjaThe paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...
-
Supporting Compliance with Security Standards by Trust Case Templates
PublikacjaTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Fast EM-Driven Parameter Tuning of Microwave Circuits with Sparse Sensitivity Updates via Principal Directions
PublikacjaNumerical optimization has become more important than ever in the design of microwave components and systems, primarily as a consequence of increasing performance demands and growing complexity of the circuits. As the parameter tuning is more and more often executed using full-wave electromagnetic (EM) models, the CPU cost of the overall process tends to be excessive even for local optimization. Some ways of alleviating these issues...
-
Expedited Metaheuristic-Based Antenna Optimization Using EM Model Resolution Management
PublikacjaDesign of modern antenna systems heavily relies on numerical opti-mization methods. Their primary purpose is performance improvement by tun-ing of geometry and material parameters of the antenna under study. For relia-bility, the process has to be conducted using full-wave electromagnetic (EM) simulation models, which are associated with sizable computational expendi-tures. The problem is aggravated in the case of global optimization,...