Filtry
wszystkich: 9615
-
Katalog
- Publikacje 6152 wyników po odfiltrowaniu
- Czasopisma 95 wyników po odfiltrowaniu
- Konferencje 79 wyników po odfiltrowaniu
- Wydawnictwa 2 wyników po odfiltrowaniu
- Osoby 148 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 13 wyników po odfiltrowaniu
- Laboratoria 2 wyników po odfiltrowaniu
- Kursy Online 170 wyników po odfiltrowaniu
- Wydarzenia 24 wyników po odfiltrowaniu
- Dane Badawcze 2929 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: COMPANY LEVEL DATA
-
A Method for Underwater Wireless Data Transmission in a Hydroacoustic Channel under NLOS Conditions
PublikacjaWireless data transmission in the hydroacoustic channel under non-line-of-sight (NLOS) propagation conditions, for example, during a wreck penetration, is difficult to implement reliably. This is mostly due to the multipath propagation, which causes a reduction in the quality of data reception. Therefore, in this work an attempt has been made to develop a reliable method of wireless underwater communication test it under the NLOS...
-
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublikacjaThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...
-
Measurements of High-Speed Data Transmission Radio Link for Special Applications
PublikacjaIn the article measurements of high-speed data transmission radio link for special applications were presented. Build measurement stand, measurement scenario and obtained results were briefly described. All conducted research work took place in real maritime environment.
-
DATA MINING AND KNOWLEDGE DISCOVERY
Czasopisma -
Advances in Data Analysis and Classification
Czasopisma -
COMPUTATIONAL STATISTICS & DATA ANALYSIS
Czasopisma -
Statistical Analysis and Data Mining
Czasopisma -
Journal of Open Archaeology Data
Czasopisma -
International Data Privacy Law
Czasopisma -
IEEE Transactions on Big Data
Czasopisma -
INDUSTRIAL MANAGEMENT & DATA SYSTEMS
Czasopisma -
Optoelectronics Instrumentation and Data Processing
Czasopisma -
Journal of Data and Information Science
Czasopisma -
Big Data and Cognitive Computing
Czasopisma -
Big Data Mining and Analytics
Czasopisma -
Journal of Financial Data Science
Czasopisma -
Journal of Open Psychology Data
Czasopisma -
Journal of Data Protection and Privacy
Czasopisma -
Journal of Open Humanities Data
Czasopisma -
Journal of Finance and Data Science
Czasopisma -
Journal of Educational Data Mining
Czasopisma -
Data Analysis and Knowledge Discovery
Czasopisma -
Discovering relationships between data in an enterprise information system using log analysis
PublikacjaEnterprise systems are inherently complex and maintaining their full, up-to-date overview poses a serious challenge to the enterprise architects’ teams. This problem encourages the search for automated means of discovering knowledge about such systems. An important aspect of this knowledge is understanding the data that are processed by applications and their relationships. In our previous work, we used application logs of an enterprise...
-
Bodybuilders and high-level meat consumers’ behavior towards rabbit, beef, chicken, turkey, and lamb meat: A comparative review
PublikacjaIn bodybuilders’ diets, protein plays a crucial role in supporting muscle growth and repairing damaged muscle tissue. These individuals meet their protein needs by combining dietary sources with supplements. Animal-based proteins are often preferred over plant-based proteins because they are believed to better support muscle protein synthesis. This review explores the meat consumption patterns of bodybuilders and high-level meat...
-
Facial data registration facility for biometric protection of electronic documents
PublikacjaIn modern world, information is crucial, and its leakage may lead to serious losses. Documents as the main medium of information must be therefore highly protected. Nowadays, the most common way of protecting data is using passwords, however it seems inconvenient to type complex passwords, when it is needed many times a day. For that reason a significant research has been conducted on biometric authentication...
-
Using Synchronously Registered Biosignals Dataset for Teaching Basics of Medical Data Analysis – Case Study
PublikacjaMedical data analysis and processing strongly relies on the data quality itself. The correct data registration allows many unnecessary steps in data processing to be avoided. Moreover, it takes a certain amount of experience to acquire data that can produce replicable results. Because consistency is crucial in the teaching process, students have access to pre-recorded real data without the necessity of using additional equipment...
-
Discussion of Derivability of Local Residual Stress Level from Magnetic Stray Field Measurement
PublikacjaThe NDT procedure dubbed ‘metal magnetic memory’ method and the related ISO 24497 standard has found wide industrial acceptance in some countries, mainly in Russia and China. The method has been claimed by some researchers (Roskosz and Bieniek in NDT&E Int 45:55–62, 2012; Wilson et al. in Sens Actuators A 135:381–387, 2007) as having potential for quantitative determination of local residual stress state in engineering structures,...
-
ECHOES REDUCTION DURING DIGITAL DATA TRANSMISSION IN HYDROACOUSTIC CHANNEL – LABORATORY EXPERIMENT
PublikacjaThe possibility of using a hydroacoustic channel for digital data transmission is very limited. This is due to the effect of multipath propagation of the emitted acoustic wave and the damping of the mechanical wave in this medium, which increase with frequency. The first of these phenomena results in inter-symbol interference disturbances in data transmission systems, including even hundreds of symbols. Due to the number of reflections...
-
Structures for parameterization, meshing and data exchange of topologically related surfaces of a ship hull
PublikacjaThis paper presents proposal of data structures for storage and processing of a parametric three-dimensional model of a midship hull sections. The model consists of coarse surfaces like: decks, frames, girders, stiffeners, brackets, partitions etc. bounded by topological relations. All workshop details are omitted as the model is intended for numeric calculations. Proposed data structures are prepared to facilitate changes in the...
-
Composition of data visualizations by sub-bottom profiler and multibeam echosounder in Matlab
PublikacjaThis paper contains description of procedure, which was elaborated in a numerical computing environment Matlab. The result of these procedures is a graphical composition of images obtained from two different hydroacoustic devices. It enables to compare different types of visualizations for the same geographical position and simultaneous work with graphical representation of all data types.
-
Cost-Efficient Two-Level Modeling of Microwave Passives Using Feature-Based Surrogates and Domain Confinement
PublikacjaA variety of surrogate modelling techniques has been utilized in high-frequency design over the last two decades. Yet, the curse of dimensionality still poses a serious challenge in setting up re-liable design-ready surrogates of modern microwave components. The difficulty of the model-ing task is only aggravated by nonlinearity of circuit responses. Consequently, constructing a practically usable surrogate model, valid across...
-
Improved Uniform Sampling in Constrained Domains for Data-Driven Modelling of Antennas
PublikacjaData-driven surrogate modelling of antenna structures is an attractive way of accelerating the design process, in particular, parametric optimization. In practice, construction of surrogates is hindered by curse of dimensionality as well as wide ranges of geometry parameters that need to be covered in order to make the model useful. These difficulties can be alleviated by constrained performance-driven modelling with the surrogate...
-
Impact of AI-Based Tools and Urban Big Data Analytics on the Design and Planning of Cities
PublikacjaWide access to large volumes of urban big data and artificial intelligence (AI)-based tools allow performing new analyses that were previously impossible due to the lack of data or their high aggregation. This paper aims to assess the possibilities of the use of urban big data analytics based on AI-related tools to support the design and planning of cities. To this end, the author introduces a conceptual framework to assess the...
-
44 Years Hindcast of the sea level and circulation in the Baltic Sea
Publikacja -
Effects of basal level of antioxidants on oxidative DNA damage in humans
Publikacja -
Comparison of post-mortem ethanol level in blood and bone marrow
Publikacja -
Modelling of Edge Insulation Depending on Boundary Conditions for the Ground Level
Publikacja -
Risk-based explanation for the country-level size and value effects
Publikacja -
Traffic Speed Deflectometer for Network-Level Pavement Management in Tennessee
Publikacja -
Assessment of the level of reliability of power supplies of the objects of critical infrastructure
Publikacja -
The Dependence of Crop Potatoes on the Level of Irrigation under Polish Conditions
Publikacja -
Methods for verification safety integrity level in control and protection systems
PublikacjaW artukule przedstawiono podstawowe oraz zaawansowane ilościowe metody weryfikacji poziomów nienaruszalności bezpieczeństwa SIL w systemach sterowania i zabezpieczeń. Metody te zawierają analizę wrażliwości i niepewności modeli probabilistycznych tych systemów. Pod uwagę wzięte zostały także uszkodzenia o wspólnej przyczynie. Zaprezentowane zostały wyniki analiz oraz zalety ich stosowania.
-
Imminent threats analysis and security level evaluation in social networks
PublikacjaRozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...
-
Energy Level Structure of Bi3+ in Zircon and Scheelite Polymorphs of YVO4
Publikacja -
Spectroscopic properties and energy level location of Eu2+ in Sr2Si5N8 phosphor
Publikacja -
PF5 and PCl5 interacting with water – Comparative study at the molecular level
Publikacja -
Implementation and testing of Level 2 security architecture for the IIP System
PublikacjaSystem IIP definiuje kilka równoległych Internetów (PI), w tym jeden oparty na IPv6, dwa na rozwiązaniach post-IP oraz sieć zarządzania, pracujących na wspólnej infastrukturze komunikacyjnej. System ma architekturę 4-poziomową, w której poziom 2 odpowiada za tworzenie zasobów wirtualnych PI. W artykule omawiana jest trójwarstwowa architektura bezpieczeństwa proponowana dla przeciwdziałania zagrożeniom wprowadzania obcego ruchu...
-
The programmed spindle speed control to reduce the level of the chatter vibration
PublikacjaOpracowano strategię nadzorowania drgań ''chatter'' za pomocą programowego sterowania prędkością obrotową wrzeciona obrabiarki. Skuteczność tej strate-gii jest obserwowana w czasie całego procesu obróbkowego. Ponadto zastosowa-nie jej wymaga poniesienia tylko niewielkich nakładów finansowych, gdyż nie są konieczne zmiany w układzie napędowym i sterowania CNC.
-
Low-Cost Data-Driven Surrogate Modeling of Antenna Structures by Constrained Sampling
PublikacjaFull-wave electromagnetic (EM) analysis has become one of the major design tools for contemporary antenna structures. Although reliable, it is computationally expensive which makes automated simulation-driven antenna design (e.g., parametric optimization) difficult. This difficulty can be alleviated by utilization of fast and accurate replacement models (surrogates). Unfortunately, conventional data-driven modeling of antennas...
-
Exploring Relationships Between Data in Enterprise Information Systems by Analysis of Log Contents
PublikacjaEnterprise systems are inherently complex and maintaining their full, up-to-date overview poses a serious challenge to the enterprise architects’ teams. This problem encourages the search for automated means of discovering knowledge about such systems. An important aspect of this knowledge is understanding the data that are processed by applications and their relationships. In our previous work, we used application logs of an enterprise...