Filtry
wszystkich: 1986
wybranych: 1395
-
Katalog
- Publikacje 1395 wyników po odfiltrowaniu
- Czasopisma 325 wyników po odfiltrowaniu
- Konferencje 81 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 85 wyników po odfiltrowaniu
- Projekty 12 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 33 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 50 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: THREATS OF PUBLIC SECURITY
-
Performance Measurements of Real Time Video Transmission from Car Patrol
PublikacjaThe HSUPA technology application to video streaming from moving vehicle to the central server is presented in the paper. A dedicated software for transmission control in case of non public IP address is employed. Quality of video streaming in urban area was measured. Several car routes were investigated in the area of the Polish Tricity. Measurements pointed out that the real time streaming quality during vehicle movement is sufficient...
-
Utility analysis and rating of energy storages in trolleybus power supply system
PublikacjaThe article discusses two energy storage applications in power supply system of public electrified transport. The first application aims at reducing the peak power of the traction substation. The second application increases effectiveness of using solar power plant to cover partial power demand of traction supply system. These two applications were discussed and analyzed based on trolleybus supply system in Gdynia, where most measurements...
-
Towards 5G — Cloud-based Radio Access Networks
PublikacjaIn the paper a general concept of the 5G network architecture is presented as well as system requirements having impact on innovative solutions in the 5G network are highlighted. A major part of the paper is both presentation and discussion of the problem of Cloud Radio Access Network introduction for public networks in which the cell and resource virtualisation will be implemented. On the other hand, the problem of resource virtualization...
-
Development of globalization in culture on the example of Europe
PublikacjaThis article attempts to reflect on the consequences of cultural globalization i.e. the opporturnities and threats that exist it brings with it for existing local cultures. As we know, The processes of globalization contribute to the emergence of any, often contradictory phenomena in the field of culture which influence the existing local cultural systems in various ways. It is assumed that the most important consequence of cultural...
-
PV installations and the safety of residential buildings
PublikacjaThe dynamic development of the photovoltaic industry entails threats that have a direct impact on the safety of residential buildings. Appropriate design of a PV installation can be a challenge due to the multifaceted nature of this issue. The designer should take into account issues related to the selection of electrical parameters of the installation, adapting lightning and surge protection in accordance...
-
Social media as an opportunity or a blind alley in social communication and forest education? – Experiences from Poland
PublikacjaThe article characterizes the experiences, problems, and prospects for the development of forest education on social media, which in Poland has been carried out by the Państwowe Gospodarstwo Leśne Lasy Państwowe (National Forest Holding ‘State...
-
Społeczne uwarunkowania dostępności przestrzeni publicznej
PublikacjaDziałania projektowe urbanistów i architektów powinny iść w kierunku tworzenia pełnej dostępności przestrzeni publicznej, która spełni oczekiwania wszystkich mieszkańców, bez względu na wiek, stan zdrowia czy ogranicznia mobliności lub percepcji. Powszechna dostępność przestrzeni warunkuje prawidłowy rozwój jednostki i całych wspólnot oraz sprzyja tworzeniu zintegrowanego społeczeństwa obywatelskiego. Dla poprawy bezpieczeństwa...
-
Automatic Analysis of Trajectories of Moving Objects
PublikacjaOngoing monitoring is essential to providing security and safety of maritime and air operations. This paper presents the research in the area of automatic analysis of movement of unrestricted vehicles like ships and air-planes. The analysis is aimed at extraction of trajectory information, and the results can be used to identify anomalous behaviour in archived and real-time data. In this paper we focus on data acquired using the...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublikacjaManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
An Approach to the Detection of Bank Robbery Acts Employing Thermal Image Analysis
PublikacjaA novel approach to the detection of selected security-related events in bank monitoring systems is presented. Thermal camera images are used for the detection of people in difficult lighting conditions. Next, the algorithm analyses movement of objects detected in thermal or standard monitoring cameras using a method evolved from the motion history images algorithm. At the same time, thermal images are analyzed in order to detect...
-
Framework for RIDM within functional safety management process
PublikacjaThe functional safety management in life cycle is a complex process starting with identifying hazards and defining safety-related functions (SRFs) with risk assessment oriented at determining the safety integrity level. Another element of such life cycle is a verification of required SIL for designed safety-related system which implements safety function. Due to complexity of the problem, to overcome difficulties in safety-related...
-
VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD
PublikacjaMonitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...
-
Trust and Distrust in e-Democracy
PublikacjaIn the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of distrust is almost neglected in such literature but,...
-
Cluster organization as a form of non-technological innovation
PublikacjaThe paper aims to investigate the relationships that cluster enterprises develop with their environment through participation in cluster organization (CO). The authors report the findings from a qualitative study carried out in the Lubusz Metal Cluster. The main research strategy is case study. An in-depth individual interview was used to collect the data, and qualitative content analysis and coding for its analysis. The study...
-
URBAN MENTORING JAKO NOWA TECHNIKA WPRÓŁPRACY W PROCESIE PLANOWANIA PARTCYPACYJNEGO
PublikacjaW 25 lat od powrotu demokracji opierającej się o neoliberalny paradygmat rozwoju kraju, Polska przyjęła Krajową Politykę Miejską 2030. Wraz z ustawą o rewitalizacji w nowoczesny sposób określa ona pole współpracy władz samorządowych i administracji z mieszkańcami, przejście do drugiej fazy rozwoju społeczeństwa demokratycznego – mieszkańców współgospodarzy przestrzeni miast. Powolna ewolucja tej relacji, silnie obarczonej dziedzictwem...
-
Edible black ant Smith (Carebara vidua) as human food – A systematic review
PublikacjaMeeting food security is one of the major global challenges to ensure sufficient supply of food for current and future generations, considering increasing population growth and climate change issues. Consequently, the consumption of edible insects as an alternative food source has recently gained global attention for combating global food insecurity. The present review aims to provide information on the recent progress in consumption...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublikacjaDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Zarzadzanie ryzykiem jako wymiar strategicznego i przedsiębiorczego podejścia do zarządzania małym i srednim przedsiębiorstwem
PublikacjaJedną z wielu przyczyn niepowodzenia ekonomicznego małych i średnich przedsiębiorstw jest niezrozumienie lub niewłaściwe rozumienie kwestii zarządzania ryzykiem. Ryzyko w wielu wymiarach sprzężone jest z procesem przedsiębiorczym. Zarządzanie nim wymaga dostrzegania okazji, umiejętności wykorzystywania zagrożeń jako szans oraz dynamicznej odpowiedzi na zmiany w otoczeniu i w samej organizacji. Sposób podej- ścia do zarządzania...
-
Determinanty i efekty uczenia się wydziałów ekonomicznych publicznych szkół wyższych województwa pomorskiego
PublikacjaPubliczne uczelnie wyższe jako twory przez lata bardzo zhierarchizowane, ze znacznymi przejawami biurokratyzmu i silnie scentralizowaną władzą, w XXI wieku mają przed sobą długą drogę w dążeniu do doskonalenia własnej zdolności do uczenia się. Głównym celem pracy było zdiagnozowanie stanu determinant i efektów uczenia się badanych organizacji. Postawiono następujące hipotezy badawcze: poziom determinant uczenia się wydziałów ekonomicznych...
-
Procesualne kryteria oceny zrównoważonego projektowania architektonicznego
Publikacjaimportance of participation in sustainable design is constantly increasing, as sustainable design becomes a basic idea in architecture. thus mentioning of sustainable design process criteria is authorized. they consist of three following levels: 1) participation in design, 2) participation design, 3) participation design based on the consensus. there is differentia specifica of participation in participatory design because of...
-
Influence of operation of national experimental nuclear reactor on the natural environment
PublikacjaThis paper presents the impact of experimental nuclear reactor operations on the national environment, based on assessment reports of the radiological protection of active nuclear technology sources. Using the analysis of measurements carried out in the last 15 years, the trends are presented in selected elements of the environment on the Świerk Nuclear Centre site and its surroundings. In addition, the impact of research results...
-
Photovoltaic demonstration set up
PublikacjaThe use of photovoltaics is growing rapidly in the industry as well as households. Therefore, educating the public will help them understand solar cell technology, which is becoming more common in everyday life. This paper proposes a demonstrational set-up of photovoltaic panel for the purpose of science education. It was used in numerous outreach activities such as science fairs. Moreover, it proved to be a great tool for education...
-
Low voltage photovoltaic power system
PublikacjaThe use of photovoltaics is growing rapidly in the industry as well as households. Therefore, educating the public will help them understand solar cell technology, which is becoming more common in everyday life. This paper proposes a demonstrational set-up of photovoltaic panel for the purpose of science education. It was used in numerous outreach activities such as science fairs. Moreover, it proved to be a great tool for education...
-
Co w architekturze piszczy? Dźwiękowy wymiar przestrzeni / What’s the buzz in architecture? – The sonic aspect of space
PublikacjaThe article presents a debate on the dividing line between architecture and the sound sciences. It sketches out the theoretical and practical aspects of space development in the context of its sonic reception. The analysis is based on examples of projects combining architecture and art in public space and their consequences for the reception of this space. The projects relate to the use of art in urban space with special emphasis...
-
Promotion and its tools in territorial marketing
PublikacjaCelem artykułu jest przedstawienie instrumentów promocji, które jednostki samorządu terytorialnego mogą wykorzystywać w kształtowaniu i przy realizacji strategii marketingowej. W artykule przeanalizowano zestaw pięciu podstawowych narzędzi promocji, do których zalicza się reklamę, public relations i publicity, promocję sprzedaży oraz sprzedaż osobistą. Wymienioną grupe rozszerzono o marketing bezpośredni, który przedstawiono z...
-
Expert assessment of arguments: a method and its experimental evaluation
PublikacjaArgument structures are commonly used to develop and present cases for safety, security and other properties. Such argument structures tend to grow excessively. To deal with this problem, appropriate methods of their assessment are required. Two objectives are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant...
-
Bezpieczeństwo w IP Multimedia Subsystem
PublikacjaAbstrakt Artykuł jest trzecim w cyklu prac poświęconych IP Multimedia Subsystem (IMS) - po przedstawieniu architektury i usług IMS, odpowiednio w zeszytach 12/2009 oraz 2-3/2011 Przeglądu Telekomunikacyjnego i Wiadomości Telekomunikacyjnych. W obecnym artykule przedstawiono sposoby zapewnienia bezpieczeństwa przy realizacji tych usług.Artykuł został podzielony został na trzy części w których omówiono ogólne wyzwania bezpieczeństwa...
-
Nuclear power plant as a source of electrical energy and heat
PublikacjaIn this paper certain issues concerning usage of nuclear power plants as sources of not only electric power but also thermal energy will be discussed. For such a solution appeals most of all the need to limit harmful emissions of gases (including CO2) and ashes, which come from the process of burning fossil fuels, as well as the raising demand for network heat and chill. Additionally combined heat and power production brings measurable...
-
Eye-Gaze Tracking-Based Telepresence System for Videoconferencing
PublikacjaAn approach to the teleimmersive videoconferencing system enhanced by the pan-tilt-zoom (PTZ) camera, controlled by the eye-gaze tracking system, is presented in this paper. An overview of the existing telepresence systems, especially dedicated to videoconferencing is included. The presented approach is based on the CyberEye eye-gaze tracking system engineered at the Multimedia Systems Department (MSD) of Gdańsk University of Technology...
-
Political Parties in the Digital World
PublikacjaThe aim of this report is to outline how digital technologies and digital media are redefining the way political parties fulfill their role as collective platforms for political participation of citizens, e.g. in relation to the parties’ decision-making processes, communication strategies, funding mechanisms, membership, information sharing, etc. and to highlight the existing international standards and good practices in this area....
-
Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components
PublikacjaThe chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...
-
Trust and Distrust in e-Democracy
PublikacjaIn the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of...
-
Planning Around Polarisation: Components of Finding Common Ground Based on Regeneration Projects in London and Gdańsk
PublikacjaVarious forms of public participation in urban design and planning—as presented and discussed in literature—have recently been challenged by the needs and expectations of different stakeholders, including those coming from the private sector. This comes with a redefinition of the public good and the roles and responsibilities of municipal authorities in post‐liberal times. As a result, contemporary participatory processes need...
-
The youth in polish legations and government
PublikacjaUntil the 2015 elections, youth policy in Poland was treated as a separate domain. There is no uniform legal basis concerned with the matters of young people. Youth rights are dealt with in several articles of the Constitution of the Republic of Poland as well as a number of Acts: on Public Administration Branches, on the Education System, on Higher Education, on Employment Promotion and Labour Market Institutions, on NFZ General...
-
Reduction of vibrations of steel structure models with Polymeric Bearings - experimental study
PublikacjaEarthquake-induced ground motions are the most severe and unpredictable threats to the structures all around the world. Therefore, designing earthquake protective systems has become an extremely challenging problem in civil engineering. Base isolation is one of the most popular and widely adopted methods of protecting structures against earthquake forces. The present paper reports the results obtained from the shaking table experimental...
-
Edge-Computing based Secure E-learning Platforms
PublikacjaImplementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...
-
The health impact of urban parks along waterways
PublikacjaWell designed parks along waterways could promote health and well-being of local inhabitants. The way the human settlements meet water bodies can influence the habits of local population. How people spend their time have significant impact on their health. For example, a team of Japanese scientists has proven that a well designed walk-able green spaces are crucial for the longevity of elderly citizens (Takano T. et al, 2002). Nature...
-
KONCEPCJA WSPÓŁPRACY SYSTEMU STRUMIENIOWEJ TRANSMISJI DANYCH CZASU RZECZYWISTEGO STRADAR Z EUROPEJSKIM SYSTEMEM EUROSUR
PublikacjaPrzedstawiono koncepcję współpracy systemów STRADAR i EUROSUR, w celu wymiany informacji związanych z ochroną granic UE. Opisano cechy zrealizowanego demonstratora STRADAR i zasady komunikacji oraz bezpieczeństwa wymiany informacji w systemie EUROSUR. Opisano warianty wymiany infor-macji pomiędzy systemami STRADAR i EUROSUR, od najprostszych, możliwych do zastosowania w obecnej wersji STRADAR, do zautomatyzowanych, wymagających...
-
Improving web user experience with caching user interface
PublikacjaIn human-computer interaction, response time is assumed generally not to exceed significantly 1-2 seconds. While the natural competition in the Internet public Web serving ensures adhering widely to such limits, some Web environments are less competitive and offer much worse user experience in terms of response time. This paper describes a solution to significantly improve user experience in terms of response time with only modification...
-
Road safety analysis in Poland using time-series modelling techniques
PublikacjaA number of international studies argue that there is a correlation between the number of traffic fatalities and the degree of public activity. The studies use the unemployment rate to support that argument. As unemployment grows miles travelled fall, a factor known to affect road safety. This relationship seems to be true for Poland, as well. The model presented in the paper is intended to prove it. It is a structural time-series local...
-
THE ROLE OF THE STATE IN TAXATION. POLISH TAX POLICY AFTER 2015
PublikacjaThis article is an attempt to present and evaluate tax policy Polish of the years 2015-2020, i.e. the period which resulted in formulating the new government. These time was a period of tax reforms, the introduction of new taxes and public tributes, as well as new mechanisms to control tax collection. Moreover, the policies introduced also concern changes in the level of fiscalism and tax redistribution. The research methods adopted...
-
E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
PublikacjaE-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublikacjaIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublikacjaThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...
-
Hedging Strategies of Derivatives Instruments for Commodity Trading Entities
PublikacjaHedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...
-
Support for argument structures review and assessment
PublikacjaArgument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow excessively, which causes problems with their review and assessment. Two issues are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant recipients. The paper...
-
A survey of neural networks usage for intrusion detection systems
PublikacjaIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
The efficiency of scientific activities and technology transfer in higher education in Poland
PublikacjaThe objective of the article is to measure and evaluate the efficiency of scientific activity and technology transfer to the economy by public higher education institutions (HEIs) in Poland and to formulate recommendations for state policy to increase the effectiveness of the technology transfer process by them. The study measured scientific activity and technology transfer separately in two groups of higher education institutions...
-
IS SMALLER BETTER? THE VALUATION OF SOCIAL IMPACTS OF DIFFERENTLY SIZED SPORTING EVENTS. THE CASE OF GDAŃSK
PublikacjaIntroduction. There is a discourse in the international literature regarding the impact of large sporting events on the place where they are held. In the last few years, particular emphasis has been laid on intangible effects, including social impacts that may occur not only in the case of mega sporting events but also in smaller sporting events. Therefore, the main aim of this paper is to estimate the monetary value of intangible...
-
Professional activity and women entrepreneurship in Poland – Europe 2020 Strategy perspective
PublikacjaThe level of economic activity of women in Poland is the lowest among Baltic Sea Region countries. The analysis of Europe 2020 targets, shows that at least 3 of the 5 main objectives relate, more or less, to women (e.g. participation in labor market). The objective concerning social inclusion assumes the increase in the employment rate of men and women (aged 20-64) in Poland up to 71%. To achieve this goal, support programs to...