Filtry
wszystkich: 18422
-
Katalog
- Publikacje 15274 wyników po odfiltrowaniu
- Czasopisma 935 wyników po odfiltrowaniu
- Konferencje 182 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 459 wyników po odfiltrowaniu
- Wynalazki 4 wyników po odfiltrowaniu
- Projekty 45 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Zespoły Badawcze 2 wyników po odfiltrowaniu
- Aparatura Badawcza 8 wyników po odfiltrowaniu
- Kursy Online 555 wyników po odfiltrowaniu
- Wydarzenia 50 wyników po odfiltrowaniu
- Dane Badawcze 906 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: KNOWLEDGE MANAGEMENT, KNOWLEDGE SECURITY, KNOWLEDGE RISKS, COVID-19, CONCEPTUAL PAPER, INTEGRATIVE MODEL
-
Administration of tocilizumab to patients with high concentrations of IL-6 in the course of COVID-19 is associated with a better prognosis
Publikacja -
Remdesivir-based therapy improved recovery of patients with COVID-19 in the SARSTer multicentre, real-world study
Publikacja -
Lifestyle changes in patients with morbid obesity and type 2 diabetes mellitus during the COVID-19 pandemic
Publikacja -
Bariatric Surgery during COVID-19 Pandemic from Patients’ Point of View—The Results of a National Survey
Publikacja -
Handling of the Covid-19 Pandemic and Its Effects on Bariatric Surgical Practice: Analysis of GENEVA Study Database
Publikacja -
Universal Predictors of Dental Students’ Attitudes towards COVID-19 Vaccination: Machine Learning-Based Approach
Publikacja -
Frequency and Nuisance Level of Adverse Events in Individuals Receiving Homologous and Heterologous COVID-19 Booster Vaccine
Publikacja -
Amplifying dementia as a global public health problem: A cross-country comparison of the impact of COVID-19 pandemic
Publikacja -
A qualitative 5-country comparison of the perceived impacts of COVID-19 on people living with dementia and unpaid carers
Publikacja -
Psychopathological responses and face mask restrictions during the COVID-19 outbreak: Results from a nationwide survey
Publikacja -
SDN testbed for validation of cross-layer data-centric security policies
PublikacjaSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
Distributed Trust Management Model for Wireless Sensor Networks
Publikacja -
Cybersecurity of Enterprise Infrastructure 2023
Kursy OnlineThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
Cybersecurity of Enterprise Infrastructure 2024
Kursy OnlineThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
Knowledge capture
Konferencje -
Gravity-related research (Engineering and Management of Space Systems) 21/22
Kursy OnlineThe goal of the subject is to extend of the knowledge gained in the framework of general mechanics (statics, kinematics, dynamics). Students will be familiarized with the description of the kinematics and dynamics of motion in typical gravity-related research conditions (microgravity in parabolic flights, drop towers, sounding rockets) as well as gravity-related research platforms, its opportunities and limitations. Additionally,...
-
Wybrane problemy ochrony żeglugi (Maritime Security)
Publikacjaprzedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...
-
Security of export transactions in the offer of leading banks on the Polish market
PublikacjaThe following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...
-
ICT and social development. Conceptual considerations.
PublikacjaThis chapter is intended to provide basic ideas and concepts related to technology, technological progress and society. It explains how and why technology and society are interrelated, forming a dynamic, complex and interdependent evolutionary system. It introduces the terms Digital (ICT) Revolution and information and communication technologies (ICTs), showing elementary features of new technologies. The chapter explains why ICTs...
-
Conceptual system development in a concurrent environment
PublikacjaW artykule omówiono możliwości wspomagania jednego z najważniejszych obszarów projektowania, a mianowicie projektowania koncepcyjnego. Rozważania te odniesiono do otoczenia inżynierii wspozadaniowej, co dodatkowo skomplikowano problemy decyzyjne podejmowane na tym etapie projektowania. Zaproponowano szereg elementów wspomagania projektowania koncepcyjnego ze szczególnym uwzględnieniem możliwości praktycznej implementacji takiego...
-
Ideological and Practical Model of Metaontology
PublikacjaRozwój inicjatywy Semantic Web spowodował rozwój różnych języków definiowania wiedzy i manipulowania nią. W ramach tych języków istotnym elementem jest zaprojektowanie rozkazów terminologicznych. W artykule przedstawiono sposób realizacji zapytań terminologicznych w języku KQL (Knowledge Query Language), służącym do dostępu do systemu zarządzania wiedzą RKaSeA.
-
Witold Sygocki dr
Osoby -
Functional safety and security assessment of the control and protection systems
PublikacjaW artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.
-
Paper and Biomaterials
Czasopisma -
Economics of credit scoring management
PublikacjaCredit scoring models constitute an inevitable element of modern risk and profitability management in retail financial lending institutions. Quality,or separation power of a credit scoring model is usually assessed with the Gini coefficient. Generally, the higher Gini coefficient the better, as in this way a bank can increase number of good customers and/or reject more bad applicants. In...
-
E-Learning Service Management System For Migration Towards Future Internet Architectures
PublikacjaAs access to knowledge and continuous learning are among the most valuable assets in modern, technological society, it is hardly surprising that e-learning solutions can be counted amongst the most important groups of services being deployed in modern network systems. Based on analysis of their current state-of-the-art, we decided to concentrate our research and development work on designing and implementing a management system...
-
2D Mathematical Model of the Commutator Sliding Contact of an Electrical Machine
PublikacjaW artykule przedstawiono model matematyczny 2D komutatorowego zestyku ślizgowego z wieloma stopniami swobody. W modelu uwzględniono zmienne wymuszenia działające na szczotkę. Wymuszenia te są wynikiem falistości wirującego komutatora. Szczotka została zamodelowana jako system wielu mas, elementów sprężystych i tłumików rozłożonych w kierunku stycznym i promieniowym. Zamodelowano wszystkie oddziaływania lepkosprężyste pomiędzy komutatorem...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Polish Polar Research: Green-and-White Paper under the aegis of the Polish Polar Consortium (PPC)
PublikacjaPolar research is a colloquial term for cross-area, cross-domain and interdisciplinary research in the Arctic and Antarctic. Polar research is mainly the domain of natural sciences, but technical sciences and humanities also grow in importance. Being vulnerable to climate change, polar regions are commonly considered as a kind of litmus paper of changes in geosystems, hence the importance of research done there. It aims at a better...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublikacjaIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects
PublikacjaSafety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...
-
Procedure based proactive functional safety management for the risk mitigation of hazardous events in the oil port installations including insurance aspects
PublikacjaThis article addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety requirements specified in standards IEC 61508 and IEC 61511. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on risk assessment results...
-
General Active-RC filter model for computer-aided design
PublikacjaW pracy przedstawiono ogólną topologię filtru aktywnego RC czasu ciągłego. Proponowany model umożliwia zunifikowaną analizę wszystkich możliwych realizacji układowych filtrów aktywnych RC jako szczególnych przypadków danej struktury ogólnej. Poprawność modelu teoretycznego została zweryfikowana poprzez symulacje w programie SPICE.
-
The first International Comparative Social Enterprise Models Working Paper: Poland
PublikacjaIn this paper, social enterprise models: entrepreneurial nonprofit organizations, cooperatives and vocational enterprises for the disabled are presented. Their emergence and institutionalization in the Polish social enterprise organizations landscape is provided and analysed. Also, the authors point to the convergences and divergences between these three models. Additionally historical background and institutional trajectories...
-
Michał Urbaniak dr inż.
Osoby -
Ideologiczny i praktyczny model metaontologii
PublikacjaRozwój inicjatywy Semantic Web spowodował rozwój różnych języków definiowania wiedzy i manipulowania nią. W ramach tych języków istotnym elementem jest zaprojektowanie rozkazów terminologicznych. W artykule przedstawiono sposób realizacji zapytań terminologicznych w języku KQL (Knowledge Query Language) - języku dostępu do systemu zarządzania wiedzą RKaSeA.
-
Security of Web Services
PublikacjaArtykuł przedstawia zagadnienia związane tematycznie z Web Services. W szczególności dotyczy problemów związanych z zapewniwniem poufności i integralności danych. Zdefiniowano model bezpieczeństwa Web Services integrujący trzy główne technologie: SOAP, UDDI, WSDL.
-
THE RELATIONSHIP BETWEEN STRESS HORMONES AND STUDENTS’ COPING STRATEGIES IN THE CONTEXT OF THE DYNAMICALLY CHANGING SITUATION OF THE COVID-19 PANDEMIC
Publikacja -
Stress Perception and Coping Strategies of Students on Both Sides of the EU’s Eastern Border during the COVID-19 Pandemic
Publikacja -
Association between brain fog, cardiac injury, and quality of life at work after hospitalization due to COVID-19
Publikacja -
Multivalent Display of SARS-CoV-2 Spike (RBD Domain) of COVID-19 to Nanomaterial, Protein Ferritin Nanocages
Publikacja -
30‐Day morbidity and mortality of bariatric metabolic surgery in adolescence during the COVID‐19 pandemic – The GENEVA study
Publikacja -
Exploring COVID-19 conspiracy theories: education, religiosity, trust in scientists, and political orientation in 26 European countries
Publikacja -
‘Who Else If Not We’. Medical Students’ Perception and Experiences with Volunteering during the COVID-19 Crisis in Poznan, Poland
Publikacja -
“We are also here”—Spiritual Care Practitioners’ Experiences of the COVID-19 Pandemic: A Qualitative Study from Poland
Publikacja -
Analysis of mHealth research: mapping the relationship between mobile apps technology and healthcare during COVID-19 outbreak
Publikacja -
Low symptomatic COVID-19 in an elderly patient with follicular lymphoma treated with rituximab-based immunotherapy: A case report
Publikacja -
COVID-19 pandemic fear, life satisfaction and mental health at the initial stage of the pandemic in the largest cities in Poland
Publikacja -
A 10-Year-old Girl With Late Acute Lymphoblastic Leukemia Recurrence Diagnosed With COVID-19 and Treated With Remdesivir
Publikacja -
Updated principles of prevention, diagnosis and treatment of COVID-19 in children in Poland – recommendations for paediatricians and family medicine doctors
Publikacja