Filtry
wszystkich: 779
wybranych: 609
-
Katalog
- Publikacje 609 wyników po odfiltrowaniu
- Czasopisma 29 wyników po odfiltrowaniu
- Konferencje 7 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 22 wyników po odfiltrowaniu
- Projekty 1 wyników po odfiltrowaniu
- Kursy Online 15 wyników po odfiltrowaniu
- Wydarzenia 10 wyników po odfiltrowaniu
- Dane Badawcze 85 wyników po odfiltrowaniu
Filtry wybranego katalogu
Wyniki wyszukiwania dla: ACCESS
-
Scholarly communication activities in the fields of chemistry and economics. A Polish perspective
PublikacjaThis study examines the scholarly communication activities in two scientific fields, chemistry and economics, in a Polish context. The dissertation aims at investigating what characterises the publishing choices of researchers and what supplementary forms for the dissemination of research output are used by scholars. In addition, the paper is looking into what are the views and awareness of open access and institutional repositories...
-
Cross-layer integration of network mechanisms for increasing efficiency of multimedia session support in IEEE 802.11s environment
PublikacjaWith an IEEE 802.11 wireless networks operating in Point-to-Multipoint mode being the most popular WLAN access technology employed today, it can be expected that a Wireless Mesh Network (WMN) based on the technology can provide significant advantages for such network systems. The IEEE 802.11s standard amendment provides the comprehensive set of mechanisms required to implement and deploy a WMN utilizing this widely popular technology....
-
Energy Security of Polish Consumers in 2004-2021
PublikacjaTheoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...
-
Multiacces quantum communication and product higher rank numerical range
PublikacjaIn the present paper we initiate the study of the product higher rank numerical range. The latter, being a variant of the higher rank numerical range, is a natural tool for study- ing a construction of quantum error correction codes for multiple access channels. We review properties of this set and relate it to other numerical ranges, which were recently introduced in the literature. Further, the concept is applied to the construction...
-
Performance analysis of data transmission in MC-CDMA radio interface with turbo codes
PublikacjaMulti-carrier code division multiple access (MC-CDMA) technique is a combination of two radio access techniques: CDMA and orthogonal frequency division multiplexing and has the advantages of both techniques. The paper presents the design of transmitter and receiver for MC-CDMA radio interface. It also presents encoders and decoders of turbo codes which were used in simulation of the MC-CDMA technique. Two turbo codes with 8-state...
-
Design and implementation of GEPON architecture in laboratory testbed
PublikacjaThis paper presents a proposition of GEPON architecture for the didactic purpose. The GEPON architecture is implemented in access networks laboratory testbed. The paper includes a brief description of GEPON standardization, a description of laboratory GEPON equipment architecture and a short presentation of proposed laboratory exercises. The exemplary performance results are included.The proposition of GEPON architecture testbed...
-
Hybrid System for Ship-Aided Design Automation
PublikacjaA hybrid support system for ship design based on the methodology of CBR with some artificial intelligence tools such as expert system Exsys Developer along with fuzzy logic, relational Access database and artificial neural network with backward propagation of errors.
-
Konzepte zur Energieeffizienzsteigerung bei Internet-Zugangsgeräten
PublikacjaThe key issue of this paper is the power management of Internet access devices. The paper commences with an outline on the energy consumption of today's IT devices. It is followed by a description of options to increase energy efficiency of computers. The paper proves that in practice network cards and other IT network components, such as modems, network access points, switches and routers have the maximum energy consumption -...
-
Knowledge management in SMEs – selected issues.
PublikacjaThe success of a small or medium-size enterprise might be dependent on the way in which this company manages its knowledge. With limited access to other resources like land, capital or labor force, the access to knowledge and its effective application might become a source of competitive advantage for an SME. It is confirmed that organizations, which successfully implement the concept of knowledge management might achieve better...
-
Operating system security by integrity checking and recovery using write-protected storage
PublikacjaThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
Projektowanie wiedzy. Relacyjne bazy danych (ISBN 978-83-7348-702-4)
PublikacjaZałożeniem podręcznika Projektowanie wiedzy – relacyjne bazy danych jest kształtowanie praktycznych umiejętności opartych na wiedzy z zakresu tworzenia relacyjnych baz danych z wykorzystaniem narzędzi Microsoft Access. Książka zawiera zestawy ćwiczeń i zadań wraz z rozwiązaniami, które umożliwiają skuteczną naukę prawidłowego tworzenia modelu danych. Opracowanie wyróżnia się na tle innych prac bardzo szczegółowym i dokładnym...
-
NVRAM as Main Storage of Parallel File System
PublikacjaModern cluster environments' main trouble used to be lack of computational power provided by CPUs and GPUs, but recently they suffer more and more from insufficient performance of input and output operations. Apart from better network infrastructure and more sophisticated processing algorithms, a lot of solutions base on emerging memory technologies. This paper presents evaluation of using non-volatile random-access memory as a...
-
AGREEprep – Analytical greenness metric for sample preparation
PublikacjaThis work proposes for the first time, a metric tool that gives prominence to sample preparation. The developed metric (termed AGREEprep) was based on 10 categories of impact that were recalculated to 0 e1 scale sub-scores, and then used to calculate the final assessment score. The criteria of assessment evaluated, among others, the choice and use of solvents, materials and reagents, waste generation, energy consumption, sample...
-
Semantic Memory for Avatars in Cyberspace
PublikacjaAvatars that show intelligent behavior should have an access to general knowledge about the world, knowledge that humans store in their semantic memories. The simplest knowledge representation for semantic memory is based on the Concept Description Vectors (CDVs) that store, for each concept, an information whether a given property can be applied to this concept or not. Unfortunately large-scale semantic memories are not available....
-
Photoelectron-photoabsorption (PePa) database
PublikacjaIn this paper a recently launched Photoelectron-Photoabsorption Database is presented. The database was developed in order to gather all the photoelectron and photoabsorption spectra measured by various collaborators over the years as well as to ease the access to the data to the potential users. In the paper the main features of the database were described and its outline explained.
-
Data librarian and data steward – new tasks and responsibilities of academic libraries in the context of Open Research Data implementation in Poland
PublikacjaThesis/Objective – The policy of Open Access (OA) for researching resources in Europe has been implemented for more than 10 years. The first recommendations concerning providing OA to scientific materials were defined during the implementation of the 7th Framework Programme. Introducing another set of recommendations concerning OA to research data was the next stage. The recommendations were transformed into obligations under the...
-
Is data management a new “digitisation”? A change of the role of librarians in the context of changing academic libraries’ tasks
PublikacjaAcademic libraries’ tasks have been evolving over the years. The changes have been stimulated by appearing of electronic resources, automated library systems, digital libraries and Open Access (OA) repositories. Librarians’ tasks and responsibilities in the academic environment have been evolving in accordance with new tasks they were expected to assume. A few years ago there was a discussion during which an attempt was made to...
-
Organisational Competence vs Transferability of Knowledge in Cluster Organisations and Technology Parks
PublikacjaPurpose. The main paper aims to evaluate the impact of organisational competence on knowledge and information flows within cluster organisations and technology parks, with particular emphasis on innovative content knowledge. The paper addresses the research question: “What set of competencies of cooperating companies allows access to information and knowledge in cluster and parks structures?" Methodology. The authors report their...
-
The roadway bridge over Vistula River in Plock - design and construction.
PublikacjaThe paper presents the design and construction works of the Roadway Bridge over Vistula River in Plock (Poland), designed by first two paper authors as being the winners of international competition for design oraganized by Polish association of the bridge engineers. Total length of the bridge is 1,200 m; 615 m is the length of main bridge part over the Vistula riverbed, and 585 m is the length of access bridge part over river...
-
Blast Charge Technique as a Method of Soil Improving to Locate the New Supporting Runways
PublikacjaA quick and effective method of reinforcing the ground base designed for the construction of engineering structures used for performing various types of air operations was presented. It allows to use wastelands, wetlands, swamps, etc. for these purposes, thus creating a dispersed network of landing sites, increasing the access of large social groups to air transport and increasing their mobility.
-
Eksprtna sistema proektirovani sudovyh sistem avtomatiki. Izv. SPGETU** 2002 ser. ''Informatika, upravlenie i komp´ternye tehnologii'' vyp. 1 c. 1-8 1 rys. bibliog. 4 poz. System ekspertowy projektowania okrętowych systemów automatyki.
PublikacjaSystem ekspertowy opracowany w wyniku analizy procesów projektowych systemówautomatyki. System zawiera bazę danych oraz metody i procedury projektowaniawspółpracujących z pakietem programów MATLAB Simulink i bazą wiedzy. Wyko-rzystano system ekspertowy Exsys Developer, a bazę danych w oparciu o systemMS Access 7.
-
Baza danych usprawniająca zarządzanie kadrowo-magazynowe w Jednostce Ratowniczo-Gaśniczej PSP
PublikacjaBazy danych zaimplementowane w środowiskach komputerowych są obecnie podstawowymi narzędziami do wspomagania zarządzania w różnych organizacjach. W artykule zaprojektowano i wdrożono relacyjną bazę danych dla Jednostki Ratowniczo-Gaśniczej w Państwowej Straży Pożarnej. System zaimplementowano i przetestowano w środowisku Microsoft Access.
-
The Transmission Protocol of Sensor Ad Hoc Networks
PublikacjaThis paper presents a secure protocol for a radio Ad Hoc sensor network. This network uses the TDMA multiple access method. The transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
Supporting First Year Students Through Blended-Learning - Planning Effective Courses and Learner Support
PublikacjaHigher education has been actively encouraged to find more effective and flaxible delivery models to provide all students with access to good quality learning experiences. This paper describes students opinion about using e-learning techniques and their participation in courses provided in different ways as additional help and expectations of first year students.
-
Projekt i wdrożenie komputerowego systemu bazodanowego w poradni dietetycznej
PublikacjaDziałalność firm nie jest możliwa, bez szybkiego dostępu do dużej liczby danych. Niezbędne stają się komputerowe bazy danych, które wspomagają zarządzanie w przedsiębiorstwach. W artykule zaprojektowano i wdrożono relacyjną bazę danych w poradni dietetycznej. Bazę danych zaimplementowano w środowisku Microsoft Access.
-
MOST Wiedzy jako narzędzie promocji potencjału naukowo-badawczego uczelni wyższej
PublikacjaRozwój Internetu wpłynął na wiele aspektów naszego życia. Pośród wielu z nich zrewolucjonizował sposób komunikacji. Pochodną tego jest zmiana sposobu przekazywania wszelkiego rodzaju wiedzy. Ogromne znaczenie mają przeszukiwane źródła wiedzy, ich jakość i dostępność. W związku z tym, w obecnych czasach, o potencjale naukowym uczelni wyższej stanowią, obok pracowników w nich zatrudnionych, przede wszystkim zgromadzone bazy wiedzy...
-
Uprawnienie do uzyskania od administratora informacji o odbiorcach lub o kategoriach odbiorców a cele prawa dostępu do danych. Glosa do wyroku TS z dnia 12 stycznia 2023 r., C-154/21 (RW przeciwko Österreichische Post AG)
PublikacjaGiven the complexity of modern data processing, individuals often do not know to whom controllers provide the information collected about them. In the commented judgment, the Court ruled that the controller is bound by the data subjects’ request to access information about the identity of the specific recipients of their data and has limited ability to provide them with information about the categories of recipients. This interpretation...
-
Modulo N Backoff Scheme for effective QoS differentiation and increased bandwidth utilization in IEEE 802.11 networks
PublikacjaThe paper presents a new "modulo N" channel access scheme for wireless Local Area Networks (WLANs). The novel solution derives from the Distributed Coordination Function (DCF) of the IEEE 802.11 standard, further elaborated as Enhanced Distribution Channel Access (EDCA) by the 802.11e draft specification. The main innovation concerns improvement of the binary exponential backoff scheme used for collision avoidance in 802.11 networks....
-
The secure transmission protocol of sensor Ad Hoc network
PublikacjaThe paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.
-
CIP Security Awareness and Training: Standards and Practice
PublikacjaThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
CIP Security Awareness and Training: Standards and Practice
PublikacjaThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
Adaption of Open Science Paradigm at Gdańsk University of Technology
PublikacjaThe paper describes the basic principles standing behind Open Access and will try to dispel the doubts behind them. Further the solution adapted by the Gdańsk University of Technology is presented. Later on the systems that the University uses and means of their integration into a complex Open Science platform are described. Finally the procedures needed to publish a document in the repository alongside the University's policy...
-
MOST Wiedzy jako narzędzie promocji otwartych zasobów nauki
PublikacjaRośnie znaczenie wiedzy zgromadzonej w różnego rodzaju systemach, w tym w kursach on-line. Połączenie systemów je przetwarzających z Internetem w znaczącym stopniu usprawniło rozprzestrzenianie informacji i zwiększyło jej dostępność. Coraz szersze uznanie zyskują ruchy Otwartego Dostępu (ang. Open Access). Politechnika Gdańska w ramach projektu Multidyscyplinarny Otwarty System Transferu Wiedzy – MOST Wiedzy buduje platformę o...
-
Cross-layer mDNS/ARP integration for IEEE 802.11s Wireless mesh Network
PublikacjaPopularization of mobile computing devices created a need for robust, efficient and ubiquitous methods of communication and network access. At the same time, evolution and standardization of Wireless Local Area Network (WLAN) technologies made them an attractive solution for building of complex network systems. Moreover, growing maturity of WLAN standards such as IEEE 802.11 allows for introduction of WLAN architectures other than...
-
Editor's Farewell
PublikacjaBy this occasion, I would like to mention the major milestones Archives of Acoustics experienced during the last years. For some years, we concentrated our efforts on introducing Archives of Acoustics to the ISI Web of Knowledge and the Journal Citation Report databases.We achieved this aim, and since 2007 Archive of Acoustics has been referenced in the Journal Citation Report. Accordingly, our next object was to obtain the Impact...
-
Projekt i wdrożenie bazy danych w przedsiębiorstwie branży stoczniowej
PublikacjaObecnie działalność firm nie jest możliwa, bez szybkiego dostępu do dużej liczby danych. Niezbędne stają się komputerowe bazy danych, które wspomagają zarządzanie w przedsiębiorstwach. W artykule przedstawiono projekt relacyjnej bazy danych, który zaimplementowano w środowisku Microsoft Access. System wdrożono w przedsiębiorstwie Baltim, działającym w branży stoczniowej.
-
Phosphinoborinium cation: a synthon for cationic B-P bond systems
PublikacjaHerein, we report access to phosphinoborinium cations via heterolytic cleavage of the boron-bromide bond in bromophosphinoborane. The product of the reaction was isolated as a dimeric dication possessing a planar P2B2 core. Activation of C-H and C-P bonds in the dication led to formation of the borinium-phosphaborene adduct. Reactivity studies revealed that title cation exhibits ambiphilic properties and intramolecular frustrated...
-
Service and Path Discovery Extensions for Self-forming IEEE 802.11s Wireless Mesh Systems
PublikacjaWith the rapid growth of the quantity and capabilities of end-user electronic devices, both stationary and mobile, they are employed in increasing number of applications. In this situation, wireless network technologies begin to play a crucial role as networks access technologies, as cable-based solutions tend to be of limited utility in case of easily portable or mobile devices. Resulting development of wireless technologies reached...
-
A Test-Bed Analysis of Simultaneous PMIPv6 Handover in 802.11 WLANs Environment
PublikacjaProviding mobility in access networks is a challenge that we have to deal with. Due to networks’ convergence and migration to all-IP networks, mobility management at the network layer is required. However, there is a need for cooperation mechanisms between the network layer and lower layers to support multimedia services and make handover more efficient. This paper presents experimental research on simultaneous handover performance...
-
Biometryczna kontrola dostępu
PublikacjaOpisano szczegółowo algorytm detekcji oraz identyfikacji człowieka na podstawie punktów nodalnych twarzy. Zdefiniowano pojęcia: biometria, proces pomiaru biometrycznego, metody biometrycznej identyfikacji oraz kontrola dostępu. Przedstawiono opis opracowanego systemu biometrycznej identyfikacji wykorzystującego sztuczne sieci neuronowe. Podano wyniki badań oraz przeprowadzono ich wnikliwą dyskusję.Biometrics is the study of automated...
-
Międzynarodowa konferencja IATUL Seminar 2019 „Organizacyjne i prawne aspekty Otwartej Nauki” / International IATUL Seminar 2019 "Organizing the Open Science Framework – Strategies and Legal Aspects”
PublikacjaIATUL Seminar 2019 was held in Gdańsk/Sopot, Poland (December 10-11th, 2019). The theme of the Seminar was „Organizing the Open Science Framework – Strategies and Legal Aspects”. The event was co-organized by Gdańsk University of Technology Library and International Association of University Libraries (IATUL). IATUL Seminar 2019 event attracted delegates, including directors and senior managers of university and research libraries...
-
ICT, financial markets and their impact on firms’ performance and internationalisation
PublikacjaThe effects of information and communication technology (ICT) and financial development on growth are highly debated in the literature. Motivated by previous studies and their mixed results, in this study, we propose an analysis to re-examine the ICT-finance puzzle. We go beyond country-specific or sector-specific studies and conduct cross-country analysis with firm-level data. It enables obtaining a broad picture of the ICT-finance-growth...
-
Metody i algorytmy testowania obwodów drukowanych z wykorzystaniem standardu IEEE 1149.1 JTAG
PublikacjaW artykule przedstawiono metody i algorytmy wykorzystywane do testowania defektów montażowych płytek drukowanych. Przedstawiono sposób komunikacji z układami scalonymi z interfejsem IEEE 1149.1 popularnie znanym jako JTAG, (ang. Joint Test Access Group). Opisano bloki sprzętowe zdefiniowane z standardzie JTAG, opis BSDL układów scalonych, sposób przeprowadzania testu oraz techniki generacji wektorów testowych.
-
Non-monotone graph searching models
PublikacjaGraph searching encompasses a variety of different models, many of which share a property that in optimal strategies fugitive can never access once searched regions. Monotonicity, as it is called, is vital in many established results in the field however its absence significantly impedes the analysis of a given problem. This survey attempts to gather non-monotone models, that are less researched in effort of summarizing the results...
-
System bazodanowy wspomagający gospodarkę księgowo-finansową w firmie handlowej
PublikacjaKomputerowe systemy bazodanowe wykorzystywane są do wspomagania zarządzania w firmach, bez względu na rodzaj prowadzonej działalności gospodarczej. Są to podstawowe narzędzia komputerowe wspomagające bieżącą i przyszłą działalność firm. W artykule zaprojektowano i wdrożono relacyjną bazę danych dla hipotetycznej firmy, zajmującej się kupnem i sprzedażą łożysk. Bazę danych zaimplementowano w środowisku Microsoft Access.
-
Hyperbolic position location estimation in the multipath propagation environment
PublikacjaThe efficiency analysis a hyperbolic position location estimation in the multipath propagation environment in the wideband code division multiple access (WCDMA) interface was presented. Four, the most popular methods: Chan's, Foy's, Fang's and Friedlander's were considered. These algorithms enable the calculation of the geographical position of a mobile station (MS) using the time differences of arrival (TDOA) between several base...
-
Komputerowy system bazodanowy wspomagający zarządzanie w firmie KATMET-GA
PublikacjaKomputerowe systemy bazodanowe wykorzystywane są do wspomagania zarządzania w firmach, bez względu na rodzaj prowadzonej działalności gospodarczej. Są to podstawowe narzędzia komputerowe wspomagające bieżącą i przyszłą działalność firm. W artykule zaprojektowano i wdrożono relacyjną bazę danych dla firmy KATMET-GA zajmującej się skupem i sprzedażą odpadów elektronicznych. Bazę danych zaimplementowano w środowisku Microsoft Access.
-
Forewarned Is Forearmed: Machine Learning Algorithms for the Prediction of Catheter-Induced Coronary and Aortic Injuries
PublikacjaCatheter-induced dissections (CID) of coronary arteries and/or the aorta are among the most dangerous complications of percutaneous coronary procedures, yet the data on their risk factors are anecdotal. Logistic regression and five more advanced machine learning techniques were applied to determine the most significant predictors of dissection. Model performance comparison and feature importance ranking were evaluated. We identified...
-
BeesyBees: A mobile agent-based middleware for a reliable and secure execution of service-based workflow applications in BeesyCluster
PublikacjaIntegrating distributed services into workflows comes with its own set of challenges, including security, coordination, fault tolerance and optimisation of execution time. This paper presents an architecture and implementation - nicknamed BeesyBees - that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middleware that allows users to access distributed resources as well as publish...
-
Semantic URL Analytics to Support Efficient Annotation of Large Scale Web Archives
PublikacjaLong-term Web archives comprise Web documents gathered over longer time periods and can easily reach hundreds of terabytes in size. Semantic annotations such as named entities can facilitate intelligent access to the Web archive data. However, the annotation of the entire archive content on this scale is often infeasible. The most efficient way to access the documents within Web archives is provided through their URLs, which are...