Filtry
wszystkich: 18522
wybranych: 15335
-
Katalog
- Publikacje 15335 wyników po odfiltrowaniu
- Czasopisma 936 wyników po odfiltrowaniu
- Konferencje 182 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 458 wyników po odfiltrowaniu
- Wynalazki 4 wyników po odfiltrowaniu
- Projekty 45 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Zespoły Badawcze 2 wyników po odfiltrowaniu
- Aparatura Badawcza 8 wyników po odfiltrowaniu
- Kursy Online 589 wyników po odfiltrowaniu
- Wydarzenia 50 wyników po odfiltrowaniu
- Dane Badawcze 911 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: KNOWLEDGE MANAGEMENT, KNOWLEDGE SECURITY, KNOWLEDGE RISKS, COVID-19, CONCEPTUAL PAPER, INTEGRATIVE MODEL
-
Case study methodology. Few conceptual considerations.
PublikacjaThis paper contributes to the debate on case study as methodological approach. It shows several issues concerning its major advatangeus and disadvantageus
-
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Supporting Compliance with Security Standards by Trust Case Templates
PublikacjaTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Motion Trajectory Prediction in Warehouse Management Systems: A Systematic Literature Review
PublikacjaBackground: In the context of Warehouse Management Systems, knowledge related to motion trajectory prediction methods utilizing machine learning techniques seems to be scattered and fragmented. Objective: This study seeks to fill this research gap by using a systematic literature review approach. Methods: Based on the data collected from Google Scholar, a systematic literature review was performed, covering the period from 2016...
-
Challenges in providing support for management of evidence-based arguments
PublikacjaThe paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...
-
Fast EM-Driven Parameter Tuning of Microwave Circuits with Sparse Sensitivity Updates via Principal Directions
PublikacjaNumerical optimization has become more important than ever in the design of microwave components and systems, primarily as a consequence of increasing performance demands and growing complexity of the circuits. As the parameter tuning is more and more often executed using full-wave electromagnetic (EM) models, the CPU cost of the overall process tends to be excessive even for local optimization. Some ways of alleviating these issues...
-
Expedited Metaheuristic-Based Antenna Optimization Using EM Model Resolution Management
PublikacjaDesign of modern antenna systems heavily relies on numerical opti-mization methods. Their primary purpose is performance improvement by tun-ing of geometry and material parameters of the antenna under study. For relia-bility, the process has to be conducted using full-wave electromagnetic (EM) simulation models, which are associated with sizable computational expendi-tures. The problem is aggravated in the case of global optimization,...
-
Urban Vegetation in Air Quality Management: A Review and Policy Framework
PublikacjaRecent episodes of high air pollution concentration levels in many Polish cities indicate the urgent need for policy change and for the integration of various aspects of urban development into a common platform for local air quality management. In this article, the focus was placed on the prospects of improving urban air quality through proper design and protection of vegetation systems within local spatial planning strategies....
-
An integrated e-learning services management system providing HD videoconferencing and CAA services
PublikacjaIn this paper we present a novel e-learning services management system, designed to provide highly modifiable platform for various e-learning tools, able to fulfill its function in any network connectivity conditions (including no connectivity scenario). The system can scale from very simple setup (adequate for servicing a single exercise) to a large, distributed solution fit to support an enterprise. Strictly modular architecture...
-
On Decision-Making Strategies for Improved-Reliability Size Reduction of Microwave Passives: Intermittent Correction of Equality Constraints and Adaptive Handling of Inequality Constraints
PublikacjaDesign optimization of passive microwave components is an intricate process, especially if the primary objective is a reduction of the physical size of the structure. The latter has become an important design consideration for a growing number of modern applications (mobile communications, wearable/implantable devices, internet of things), where miniaturization is imperative due to a limited space allocated for the electronic circuitry....
-
The model of photovoltaic phenomenon in thin inhomogeneously organic film
PublikacjaW pracy przedstawiono model zjawiska fotowoltaicznego w obecności gradientu pułapek nośników ładunku. Zakładając, że długość dyfuzji ekscytonów związana jest z koncentracją pułapek, wykazano, że napięcie fotowoltaiczne silnie zależy od gradientu koncentracji pułapek.
-
Ontology as a Tool for the IT Management Standards Support
PublikacjaIn this paper the authors discuss the initial idea of using ontologies to model requirements of the standards that support IT management processes. The Open Group Architecture Framework (TOGAF) is set as an example. A need for transition from the generic model do the organization-specific one is indicated. The described example serves as a ground for considering the usefulness of such modeling approach in the wider spectrum of...
-
Algorithmic Human Resources Management
PublikacjaThe rapid evolution of Digital Human Resources Management has introduced a transformative era where algorithms play a pivotal role in reshaping the landscape of workforce management. This transformation is encapsulated in the concepts of algorithmic management and algorithmic Human Resource Management (HRM). The integration of advanced analytics, predictive and prescriptive analytics and the power of Artificial Intelligence (AI)...
-
The Conceptual Research over Low-Switching Modulation Strategy for Matrix Converters with the Coupled Reactors
PublikacjaIn this paper, different Pulse Width Modulation (PWM) strategies for operating with a low-switching frequency, a topology that combines Conventional Matrix Converters (CMCs), and Coupled Reactors (CRs) are presented and discussed. The principles of the proposed strategies are first discussed by a conceptual analysis and later validated by simulation. The paper shows how the combination of CMCs and CRs could be of special interest...
-
User Trust Levels and Their Impact on System Security and Usability
PublikacjaA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Model Management for Low-Computational-Budget Simulation-Based Optimization of Antenna Structures Using Nature-Inspired Algorithms
PublikacjaThe primary objective of this study is investigation of the possibilities of accelerating nature-inspired optimization of antenna structures using multi-fidelity EM simulation models. The primary methodology developed to achieve acceleration is a model management scheme which the level of EM simulation fidelity using two criteria: the convergence status of the optimization algorithm, and relative quality of the individual designs...
-
Software modules and application layer's security structure of RSMAD
PublikacjaThe paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...
-
Road Infrastructure Safety Management in Poland
PublikacjaThe objective of road safety infrastructure management is to ensure that when roads are planned, designed, built and used road risks can be identified, assessed and mitigated. Road transport safety is significantly less developed than that of rail, water and air transport. The average individual risk of being a fatality in relation to the distance covered is thirty times higher in road transport that in the other modes. This is...
-
Ontologically Aided Rule Model for the Implementation of ITIL Processes
PublikacjaThe implementation of ITIL processes in IT organizations can be seen as a set of interdependent projects. The sequence of the ITIL implementation relies on such parameters as scope, depth, the capability of processes and the maturity of the organization. These factors can form common patterns of ITIL implementation that might be expressed as rules. Also-to semantically reinforce such a model in its predictiveness and replicativeness-the...
-
Technological vs. Non-Technological Mindsets: Learning From Mistakes, and Organizational Change Adaptability to Remote Work
PublikacjaThe permanent implementation of the change in working methods, e.g., working in the virtual space, is problematic for some employees and, as a result, for management leaders. To explore this issue deeper, this study assumes that mindset type: technological vs. non-technological, may influence the organizational adaptability to change. Moreover, the key interest of this research is how non-technological mindsets...
-
CULTURAL DETERMINANTS OF EVIDENCE-BASED HUMAN RESOURCES MANAGEMENT: A CROSS-COUNTRY ANALYSIS
PublikacjaPurpose: This paper aims at providing comparative analysis of the influence of cultural determinants on the managers’ perceptions of human resources management practices, as a factor conditioning application of evidence-based management. Design/methodology/approach: This article presents the study of 121 managers in Poland, on their perception of HRM practices and analyses the consistency of findings with the Hofstede cultural...
-
Lessons learned from developing an Industry 4.0 mobile process management system supported by Artificial Intelligence
PublikacjaResearch, development and innovation (RDI) projects are undertaken in order to improve existing, or develop new, more efficient products and services. Moreover, the goal of innovation is to produce new knowledge through research, and disseminating it through education and training. In this line of thinking, this paper reports and discusses the lessons learned from the undertaken project, regarding three areas: machine learning...
-
Model of distributed learning objects repository for a heterogenic internet environment
PublikacjaW artykule wprowadzono pojęcie komponentu edukacyjnego jako rozszerzenie obiektu edukacyjnego o elementy zachowania (metody). Zaproponowane podejście jest zgodne z paradygmatem obiektowym. W oparciu o komponent edukacyjny zaprojektowano model budowy repozytorium materiałów edukacyjnych. Model ten jest oparty o usługi sieciowe i rejestry UDDI. Komponent edukacyjny oraz model repozytorium mogą znaleźć zastosowanie w konstrukcji zbiorów...
-
Information retrieval with semantic memory model
PublikacjaPsycholinguistic theories of semantic memory form the basis of understanding of natural language concepts. These theories are used here as an inspiration for implementing a computational model of semantic memory in the form of semantic network. Combining this network with a vector-based object-relation-feature value representation of concepts that includes also weights for confidence and support, allows for recognition of concepts...
-
Response to David Steigmann’s discussion of our paper
PublikacjaWe respond to David Steigmann's discussion of our paper "A general theory for anisotropic Kirchhoff-Love shells with in-plane bending of embedded fibers, Math. Mech. Solids, 28(5):1274-1317" (arXiv:2101.03122). His discussion allows us to clarify two misleading statements in our original paper, and confirm that its formulation is fully consistent with the formulation of Steigmann. We also demonstrate that some of our original statements...
-
On Software Unit Testing For Security and Performance Gain At Unit Level
PublikacjaPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
On Software Unit Testing For Improving Security And Performance Of Distributed Applications
PublikacjaPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
Paradoxes in the engineering change management process
PublikacjaPurpose: The main purpose of this paper is to conceptualize and operationalize paradoxes that are significant in the engineering change management (ECM) process. The following research question was stated: What are the paradoxes that influence the ECM process, and how can they be measured? Design/methodology/approach: The study is divided into two parts: conceptualization and operationalization. Conceptualization involved a literature...
-
SDN testbed for validation of cross-layer data-centric security policies
PublikacjaSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
Influence of COVID-19 on lifestyle behaviors in the Middle East and North Africa Region: a survey of 5896 individuals
Publikacja -
Remdesivir-based therapy improved recovery of patients with COVID-19 in the SARSTer multicentre, real-world study
Publikacja -
Administration of tocilizumab to patients with high concentrations of IL-6 in the course of COVID-19 is associated with a better prognosis
Publikacja -
Remdesivir-based therapy improved recovery of patients with COVID-19 in the SARSTer multicentre, real-world study
Publikacja -
Lifestyle changes in patients with morbid obesity and type 2 diabetes mellitus during the COVID-19 pandemic
Publikacja -
Universal Predictors of Dental Students’ Attitudes towards COVID-19 Vaccination: Machine Learning-Based Approach
Publikacja -
Frequency and Nuisance Level of Adverse Events in Individuals Receiving Homologous and Heterologous COVID-19 Booster Vaccine
Publikacja -
Amplifying dementia as a global public health problem: A cross-country comparison of the impact of COVID-19 pandemic
Publikacja -
A qualitative 5-country comparison of the perceived impacts of COVID-19 on people living with dementia and unpaid carers
Publikacja -
Psychopathological responses and face mask restrictions during the COVID-19 outbreak: Results from a nationwide survey
Publikacja -
Bariatric Surgery during COVID-19 Pandemic from Patients’ Point of View—The Results of a National Survey
Publikacja -
Handling of the Covid-19 Pandemic and Its Effects on Bariatric Surgical Practice: Analysis of GENEVA Study Database
Publikacja -
The Prevalence of Loneliness among University Students from Five European Countries during the COVID-19 Pandemic
Publikacja -
Distributed Trust Management Model for Wireless Sensor Networks
Publikacja -
Wybrane problemy ochrony żeglugi (Maritime Security)
Publikacjaprzedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...
-
Security of export transactions in the offer of leading banks on the Polish market
PublikacjaThe following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...
-
Ideological and Practical Model of Metaontology
PublikacjaRozwój inicjatywy Semantic Web spowodował rozwój różnych języków definiowania wiedzy i manipulowania nią. W ramach tych języków istotnym elementem jest zaprojektowanie rozkazów terminologicznych. W artykule przedstawiono sposób realizacji zapytań terminologicznych w języku KQL (Knowledge Query Language), służącym do dostępu do systemu zarządzania wiedzą RKaSeA.
-
ICT and social development. Conceptual considerations.
PublikacjaThis chapter is intended to provide basic ideas and concepts related to technology, technological progress and society. It explains how and why technology and society are interrelated, forming a dynamic, complex and interdependent evolutionary system. It introduces the terms Digital (ICT) Revolution and information and communication technologies (ICTs), showing elementary features of new technologies. The chapter explains why ICTs...
-
Conceptual system development in a concurrent environment
PublikacjaW artykule omówiono możliwości wspomagania jednego z najważniejszych obszarów projektowania, a mianowicie projektowania koncepcyjnego. Rozważania te odniesiono do otoczenia inżynierii wspozadaniowej, co dodatkowo skomplikowano problemy decyzyjne podejmowane na tym etapie projektowania. Zaproponowano szereg elementów wspomagania projektowania koncepcyjnego ze szczególnym uwzględnieniem możliwości praktycznej implementacji takiego...
-
Functional safety and security assessment of the control and protection systems
PublikacjaW artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...