Wyniki wyszukiwania dla: employee suggestion scheme
-
Maria Bartoszewicz Ph. dr.
Osoby -
Transition curve with smoothed curvature at its ends for railway roads
PublikacjaIn the paper, in view of a railway ballasted track, a new concept of transition curve of linear form of curvature along its length and smoothed extreme regions is presented. For this purpose use has been made of an original, universal method for identifying transition curves by means of differential equations. Some general curvature equations for three regions investigated have been determined to be followed by appropriate parametric...
-
Reasons behind changes in the share of labour in national income in the Polish economy: Selected aspects
PublikacjaAim/purpose – The aim of this paper is to examine the impact of structural changes taking place in the Polish economy on the share of labour in national income. Design/methodology/approach – The scope of this study includes a review of the literature dedicated to the issue and an empirical analysis of data available on this topic. The study uses elements of descriptive statistics and the method of induction. Findings – The conducted...
-
Computationally Effcient Solution of a 2D Diffusive Wave Equation Used for Flood Inundation Problems
PublikacjaThis paper presents a study dealing with increasing the computational efficiency in modeling floodplain inundation using a two-dimensional diffusive wave equation. To this end, the domain decomposition technique was used. The resulting one-dimensional diffusion equations were approximated in space with the modified finite element scheme, whereas time integration was carried out using the implicit two-level scheme. The proposed...
-
Decision-Making Models of the Human-Operator as an Element of the Socio-Technical Systems
PublikacjaThe authors of the chapter proved that the fundamental intellectual processes, which lie on the basis of decision-making behavior of the human-operator, could be identified on the bases on the analogies with the devices (elements). The basic intellectual processes of the Rational decision-making models can be adequately identified by the transient processes of the PID-controller; the intellectual processes of the Bounded Rationality...
-
Effects of the polyhistidine tag on kinetics and other properties of trehalose synthase from Deionococcus geothermalis
PublikacjaTwo recombinant trehalose synthases from Deinococcus geothermalis (DSMZ 11300) were compared. A significant influence of the artificial polyhistidine tag was observed in protein constitution. The recombinant trehalose synthase from D. geothermalis with His6 -tag has a higher K m value of 254 mM, in comparison with the wild-type trehalose synthase (K m 170 mM), and displayed a lower activity of maltose conversion when compared...
-
The Ellenbogen's "Matter as Software" Concept for Quantum Computer Implementation: II Bonding Between the C60 and X@C60 Molecules as Available Molecular Building Blocks (MBBs) for Tip-Based Nanofabrication (TBN) of Quantum Computing Devices
PublikacjaThe binding energy, BE of the X@C60-X@C60 homodimer and the X@C60-Y@C60 heterodimer resulting from the bond formation between the occupied X@C60 MBB and the C60 molecule was studied by means of semiempirical PM7 calculations, where X and Y denote atoms from H to Bi, excluding Tc and lanthanides. All possible combinations of N = 68 guest atoms were considered, which resulted in K = 2346 of different calculated dimers of (X@C60-Y@C60)...
-
Michał Ryms dr inż.
Osobydr inż. Michał Ryms, fizyk, absolwent Politechniki Gdańskiej. Pracę doktorską obronił na Wydziale Chemicznym. Od 2011 roku pracuje w Katedrze Aparatury i Maszynoznawstwa Chemicznego Politechniki Gdańskiej, obecnie na stanowisku adiunkta. Działalność naukowa obejmuje: zagadnienia związane z poprawą efektywności energetycznej oraz możliwości nowego zastosowania materiałów zmiennofazowych (PCM) głównie w budownictwie energooszczędnym...
-
Adaptive CAD-Model Construction Schemes
PublikacjaTwo advanced surrogate model construction techniques are discussed in this paper. The models employ radial basis function (RBF)interpolation scheme or artificial neural networks (ANN) with a new training algorithm. Adaptive sampling technique is applied withrespect to all variables. Histograms showing the quality of the models are presented. While the quality of RBF models is satisfactory, theperformance of the ANN models obtained...
-
Acceleration of the Discrete Green’s Function Formulation of the FDTD Method Based on Recurrence Schemes
PublikacjaIn this paper, we investigate an acceleration of the discrete Green's function (DGF) formulation of the FDTD method (DGF-FDTD) with the use of recurrence schemes. The DGF-FDTD method allows one to compute FDTD solutions as a convolution of the excitation with the DGF kernel. Hence, it does not require to execute a leapfrog time-stepping scheme in a whole computational domain for this purpose. Until recently, the DGF generation...
-
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublikacjaThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
Reversible Data Hiding in Encrypted DICOM Images Using Cyclic Binary Golay (23, 12) Code
PublikacjaIn this paper, a novel reversible data hiding method for encrypted images (RDHEI) is proposed. An efficient coding scheme based on cyclic binary Golay (23, 12) code is designed to embed additional data into the least significant bits (LSBs) of the encrypted image. The most significant bits (MSBs) are used to ensure the reversibility of the embedding process. The proposed scheme is lossless, and based on the receiver’s privileges,...
-
Incorporating Iris, Fingerprint and Face Biometric for Fraud Prevention in e-Passports Using Fuzzy Vault
PublikacjaA unified frame work which provides a higher security level to e-passports is proposed. This framework integrates face, iris and fingerprint images. It involves three layers of security: the first layer maps a biometric image to another biometric image which is called biostego image. Three mapping schemes are proposed: the first scheme maps single biometric image to single biostego image, the second scheme maps dual biometric images...
-
Long-distance quantum communication over noisy networks without long-time quantum memory
PublikacjaThe problem of sharing entanglement over large distances is crucial for implementations of quantum cryptography. A possible scheme for long-distance entanglement sharing and quantum communication exploits networks whose nodes share Einstein-Podolsky-Rosen (EPR) pairs. In Perseguers et al. [Phys. Rev. A 78, 062324 (2008)] the authors put forward an important isomorphism between storing quantum information in a dimension D and transmission...
-
Dataset of phase portraits of the fractional prey-predator model with Holling type-II interaction (without predator harvesting)
Dane BadawczeThe need for a fractional generalization of a given classical model is often due to new behaviors which cannot be taken into account by the model. In this situation, it can be useful to look for a fractional deformation of the initial system, trying to fit the fractional exponent of differentiation in order to catch properly the data.
-
Database of the illustrative simulations of the nonstandard approximation of the generalized Burgers–Huxley equation
Dane BadawczeThe presented dataset is a result of numerical analysis of a generalized Burgers–Huxley partial differential equation. An analyzed diffusive partial differential equation consist with nonlinear advection and reaction. The reaction term is a generalized form of the reaction law of the Hodgkin–Huxley model, while the advection is a generalized form of...
-
Approaching Secure Industrial Control Systems
PublikacjaThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Modified SPWM Technique with Zero-Sequence Voltage Injection for a Five-Phase, Three-Level NPC Inverter
PublikacjaThis article presents a modified sinusoidal pulse-width modulation (SPWM) scheme for a five-phase, three-level neutral-point-clamped inverter. The modulation scheme deploys a modified min–max function to inject the zero-sequence components into the reference modulating signals; hence enabling the effective utilization of the DC-link voltage. Balanced split-input DC-link voltages were achieved through further incorporation of adjustable...
-
Tweet you right back: Follower anxiety predicts leader anxiety in social media interactions during the SARS-CoV-2 pandemic
PublikacjaRecent research has shown that organizational leaders’ tweets can influence employee anxiety. In this study, we turn the table and examine whether the same can be said about followers’ tweets. Based on emotional contagion and a dataset of 108 leaders and 178 followers across 50 organizations, we infer and track state- and trait-anxiety scores of participants over 316 days, including pre- and post the onset of the SARS-CoV-2 pandemic...
-
Network Graph Transformation Providing Fast Calculation of Paths for Resilient Routing
PublikacjaProtection of transmission against failures can be appropriately dealt with by alternative paths. However, common schemes (e.g., Bhandaris scheme) are characterized by a remarkable delay while determining the transmission paths. This in turn may have a serious impact on serving dynamic demands (characterized by relatively short duration time). As a remedy to this problem, we introduce an approach to pre-compute the sets of disjoint...
-
Indicators describing the effectiveness of tax systems of selected OECD countries
Dane BadawczeThe following research data include indicators describing the effectiveness of the tax administration activity in Poland compared to selected countries. In economic understanding efficiency is measured by the calculation of the expenditure of funds spent on its operation and performance of statutory functions. In this respect, the basic indicator is...
-
Self-Censorship in a Workplace: The Role of Gender, Management Position, Procedural Justice and Organizational Climate
Dane BadawczeData consist of three studies. In study 1 (N = 948) we test whether women manifest more self-censorship than men and we verify whether this effect is maintained when women and men hold managerial position. Then, we analyse the effects of procedural justice (study 2, N = 98) and communal organizational climate (study 3, N = 567) on women’s and men’s...
-
Comparative analysis of numerical with optical soliton solutions of stochastic Gross–Pitaevskii equation in dispersive media
PublikacjaThis article deals with the stochastic Gross–Pitaevskii equation (SGPE) perturbed with multiplicative time noise. The numerical solutions of the governing model are carried out with the proposed stochastic non-standard finite difference (SNSFD) scheme. The stability of the scheme is proved by using the Von-Neumann criteria and the consistency is shown in the mean square sense. To seek exact solutions, we applied the Sardar subequation...
-
Impact of Cyclist Facility Availability at Work on the Number of Bike Commuters
PublikacjaThe article describes the results of research designed to establish whether cycle provision can influence the number of employees commuting by bike. To that end, employee surveys were conducted in three IT companies in 2012 and 2016. The questionnaire asked about travel behaviour and what the staff thought about their company’s provision of cyclist facilities. Since 2012 each of the companies has moved its head office and the...
-
MODELLING OF TRANSIENT FLOW IN STORM SEWERS
PublikacjaThe paper focuses on the assessment of second-order explicit numerical scheme for unsteady flows in sewers. In order to simulate the pressurized flow the 'Preissmann slot' concept is implemented. For simulation of the transcritical flow the original and improved McCormack scheme is used. The calculated results are compared with numerical solutions and laboratory measurements published in the technical literature. Moreover, the...
-
Application a laboratory stand for multi-symptoms tests for high cyclic fatigue of constructional material
PublikacjaThis paper describes a need of diagnostics present ship plants according to current technical state. In order to reach competent physical quantity describing fatigue of materials by congregated energy. This paper describes using some diagnostics methods (acoustic emission AE, vibration, thermovision, deformation) in order to definition fatigue state of construction material. The author tries to find correlation between measured...
-
Straightened characteristics of McKendrick-von Foerster equation
PublikacjaWe study the McKendrick-von Foerster equation with renewal (that is the age-structured model, with total population dependent coefficient and nonlinearity). By using a change of variables, the model is then transformed to a standard age-structured model in which the total population dependent coefficient of the transport term reduces to a constant 1. We use this transformation to get existence, uniqueness of solutions of the problem...
-
Underfrequency Load Shedding: An Innovative Algorithm Based on Fuzzy Logic
PublikacjaIn contemporary power systems, the load shedding schemes are typically based on disconnecting a pre-specified amount of load after the frequency drops below a predetermined value. The actual conditions at the time of disturbance may largely dier from the assumptions, which can lead to non-optimal or ineective operation of the load shedding scheme. For many years, increasing the eectiveness of the underfrequency load shedding (UFLS)...
-
The most important elements of the social package that guide students of Wrocław University of Science and Technology when choosing their first job
Dane BadawczeThis dataset contains the results of research that were carried out by the Wrocław University of Science and Technology in March and April 2016, using an anonymous "on-line" questionnaire. 1,320 people took part in the study entitled "My ideal employer" - students and doctoral students of all faculties of the university (including those fields of study...
-
Smart Embedded Systems with Decisional DNA Knowledge Representation
PublikacjaEmbedded systems have been in use since the 1970s. For most of their history embedded systems were seen simply as small computers designed to accomplish one or a few dedicated functions; and they were usually working under limited resources i.e. limited computing power, limited memories, and limited energy sources. As such, embedded systems have not drawn much attention from researchers, especially from those in the artificial...
-
Digital Fingerprinting based on Quaternion Encryption for Image Transmission
PublikacjaIn this paper a new digital fingerprinting scheme for images is proposed. A proposed method is based on quaternion encryption with Cipher Block Chaining (CBC) mode of operation. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm is designed for grey-tone images. For purpose of encryption, the algorithm uses the rotation of data vectors presented...
-
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
PublikacjaAbstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...
-
Image Processing Techniques for Distributed Grid Applications
PublikacjaParallel approaches to 2D and 3D convolution processing of series of images have been presented. A distributed, practically oriented, 2D spatial convolution scheme has been elaborated and extended into the temporal domain. Complexity of the scheme has been determined and analysed with respect to coefficients in convolution kernels. Possibilities of parallelisation of the convolution operations have been analysed and the results...
-
Wojciech Wyrzykowski dr hab.
OsobyWojciech Wyrzykowski jest pracownikiem Katedry Finansów na Wydziale Zarządzania i Ekonomii Politechniki Gdańskiej. Jest autorem 70 publikacji naukowych w tym 5 monografii oraz współautorem 7 monografii. Najistotniejsze z nich oddające zainteresowania naukowe autora to m.in.: Podatkowe uwarunkowania rozwoju przedsiębiorczości w Polsce, Podatki w Polsce – zarys wykładu, Księgi, ewidencje i rejestry podatkowe małych przedsiębiorców,...
-
SONIC - Self-optimizing narrowband interference canceler: comparison of two frequency tracking strategies
PublikacjaThis paper presents a new approach to rejection of complex-valued sinusoidal disturbances acting at the output of a discrete-time linear stable plant with unknown and possibly time-varying dynamics. It is assumed that both the instantaneous frequency of the sinusoidal disturbance and its amplitude may be slowly varying with time and that the output signal is contaminated with wideband measurement noise. The proposed disturbance...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublikacjaIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Bayesian Optimization for solving high-frequency passive component design problems
PublikacjaIn this paper, the performance of the Bayesian Optimization (BO) technique applied to various problems of microwave engineering is studied. Bayesian optimization is a novel, non-deterministic, global optimization scheme that uses machine learning to solve complex optimization problems. However, each new optimization scheme needs to be evaluated to find its best application niche, as there is no universal technique that suits all...
-
MEMORY EFFECT ANALYSIS USING PIECEWISE CUBIC B-SPLINE OF TIME FRACTIONAL DIFFUSION EQUATION
PublikacjaThe purpose of this work is to study the memory effect analysis of Caputo–Fabrizio time fractional diffusion equation by means of cubic B-spline functions. The Caputo–Fabrizio interpretation of fractional derivative involves a non-singular kernel that permits to describe some class of material heterogeneities and the effect of memory more effectively. The proposed numerical technique relies on finite difference approach and cubic...
-
Muneer Ahmed Mr
OsobyLooking for an organization where I can better utilize my scientific and technical skills in the arena of research or work as a faculty person. Besides, I am also willing to work as professional engineer with dedication and diligence in dynamic environment. Likewise, I've been a committed and tenacious candidate throughout my career. I am aware of the level of commitment, dedication and strength required. Despite the fact that...
-
Load-carrying capacity of axially loaded concrete-filled steel tubular columns made of thin tubes
PublikacjaAn experimental investigation was conducted on 30 CFST columns. An influence of the following factors on load-carrying capacity of the investigated columns was analyzed: the column slenderness (l1 = 42, l2 = 27 and l3 = 15), the tube thickness (the reinforcement ratio was equal to 4% or 6%), the way of applying the load to CFST columns (through the concrete core or through the entire cross-section), the bond strength between a...
-
Future Skills and Education in a Computerized World
PublikacjaAs computerization of Western economies has advanced, the supply of the demand for routine cognitive tasks and routine manual tasks has fallen. Computerization has increased labour input of nonroutine cognitive tasks which has favourized high educated workers. Similarly, there is clear evidence of an increase in demand for high skilled workforce which originates from poor machine performance of nonroutine...
-
Ferromagnetic nanocrystallites in the SiO2 - PbO - Fe2O3 glass system
PublikacjaThe structure of 50% SiO2 - 35% PbO - 15% Fe2O3, 50% SiO2 - 30% PbO - 20% Fe2O3 and 50% SiO2 - 25% PbO - 25% Fe2O3 (in mol%) glass was investigated by the means of AFM microscopy and X-ray diffraction. Observation by the atomic force microscopy shows that each of prepared iron oxide glass doesn't have homogeneous structure and some nanocrystallites were detected. Next, test with neodymium magnet found out strong magnetic properties...
-
Greedy Multipoint Model-Order Reduction Technique for Fast Computation of Scattering Parameters of Electromagnetic Systems
PublikacjaThis paper attempts to develop a new automated multipoint model-order reduction (MOR) technique, based on matching moments of the system input–output function, which would be suited for fast and accurate computation of scattering parameters for electromagnetic (EM) systems over a wide frequency band. To this end, two questions are addressed. Firstly, the cost of the wideband reduced model generation is optimized by automating a...
-
Within- and between-firm wage inequalities and trade integration in GVC
PublikacjaThis paper examines between- (inter) and within- (intra) firm wage inequality using rich employer-employee data for 12 European countries. We confirm that much overall wage inequality is observed within sectors and within occupations. The share of the within- and between-firm components in overall wage inequality varies across countries. We estimate the link between involvement in global value chains (GVCs) and wages differentiating...
-
Global value chains and wages under different wage setting mechanisms
PublikacjaThis study examines whether, and how, differences in wage bargaining schemes shape the relationship between global value chains (GVCs) and the wages of workers while considering both GVC participation and position in GVC. Our dataset is derived from the European Structure of Earnings Survey (SES), containing employee–employer data from 18 European countries, merged with sectoral data from the World Input-Output Database (WIOD)....
-
Deformation of the Structural Details of the Components Created by the Rapid Prototyping Method
PublikacjaThe paper present the results of preliminary research and describes the deformation of construction details within the process of producing small element employing a stereography system. The article discuses a scheme for changes in data conversion. Variation in construction details have been described on the basis of analysing photographs.
-
Thermal ablation modeling via bioheat equation
PublikacjaWe consider Pennes’ bioheat equation and discuss an implicit numerical scheme which has better stability properties than other approaches. Our discussion concerns Carthesian geometry problems, however it carries over to spherical geometry models and more complicated shapes.
-
Własności kwantowe przemian energetycznych zachodzących w silnikach o zapłonie samoczynnym = Quantum properties of energy transformation in diesel engines
PublikacjaW pracy uzasadniono, że w badaniach własności energetycznych silników spalinowych o zapłonie samoczynnym należy uwzględnić istniejącą w ich eksploatacji przypadkowość i nieprzewidywalność zdarzeń. Nawiązano do osiągnięć mechaniki kwantowej wskazując na wynikający z nich postulat, że wielkości nazywane komplementarnymi, mają istotną własność, która polega na tym, że niemożliwy jest jednoczesny i zarazem dokładny pomiar ich wartości....
-
Application analysis of a hybrid solid oxide fuel cell-gas turbine system for marine power plants
PublikacjaThe results of theoretical studies of the possibilities of using hybrid solid oxide fuel cell–gas turbine (SOFC-GT) systems for marine power plants are presented. A 500 kW auxiliary marine power plant scheme using stacks of SOFCs in combination with a regenerative gas turbine operating with over-expansion based on our recent patent application is proposed. The results of mathematical modelling showed the opportunity to obtain a...
-
High Efficiency Dual-Active-Bridge Converter with Triple-Phase-Shift Control for Battery Charger of Electric Vehicles
PublikacjaAn optimal modulation scheme with triple-phase-shift (TPS) control could increase the efficiency in the entire load range for a dual-active-bridge (DAB) converter under wide output voltage range conditions. Therefore, this study proposes a convergent approach to TPS mode selection, coupled with an optimal modulation scheme, ensuring the circuit’s efficiency over the entire range in the realm of a high-power and high-efficiency...