Filtry
wszystkich: 319
-
Katalog
- Publikacje 284 wyników po odfiltrowaniu
- Czasopisma 23 wyników po odfiltrowaniu
- Konferencje 1 wyników po odfiltrowaniu
- Osoby 5 wyników po odfiltrowaniu
- Projekty 1 wyników po odfiltrowaniu
- Kursy Online 2 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 2 wyników po odfiltrowaniu
Wyniki wyszukiwania dla: SECURITY, EVIDENCE BASED ARGUMENTS
-
Global Complex Roots and Poles Finding Algorithm in C × R Domain
PublikacjaAn algorithm to find the roots and poles of a complex function depending on two arguments (one complex and one real) is proposed. Such problems are common in many fields of science for instance in electromagnetism, acoustics, stability analyses, spectroscopy, optics, and elementary particle physics. The proposed technique belongs to the class of global algorithms, gives a full picture of solutions in a fixed region ⊂ C × R and...
-
Modeling the impact of surface currents in a harbor using graph theory
PublikacjaEnsuring security in a harbor requires research into its infrastructure using spatial environmental data. This paper presents a methodology that defines the design of a graph for modeling the interactions between surface currents and moving objects. Combining this graph with port charts that integrate electronic navigation charts with coastal orthophotographs allows us to perform a multidimensional analysis. In addition, the complete...
-
Radio system for monitoring and acquisition of data from traffic enforcement cameras - features and assumptions of the system
PublikacjaThe study presents the architecture and selected functional assumptions of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (RSMAD). Ultimately, the system will be used for transmission and archiving image data of traffic offenses, but can also perform other duties related to traffic safety. Implementation of the RSMAD system will facilitate, inter alia, issuing the fine process and supervision...
-
Analysis of human behavioral patterns
PublikacjaWidespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...
-
Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies
PublikacjaThe aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...
-
RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band
PublikacjaIn this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can be also used for DoA estimation....
-
Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach
PublikacjaIn this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely on received signal strength...
-
Facing the brainstorming theory. A case of requirements elicitation
PublikacjaKnowledge is still considered to be power and its externalization makes it possible for others to use that power. In this paper, we examine the theory of brainstorming, and the claim by father Alex Osborn that in a group session an individual can think of twice as many ideas than working alone. In the context of requirements elicitation, we performed an experiment on a “nominal” and a “real” group of participants, following a procedure...
-
New bulk liquid membrane oscillator composed of two coupled oscillators with diffusion-mediated physical coupling
PublikacjaA new type of bulk liquid membrane system, which represents the first example of a bulk liquid membrane oscillator characterised by the presence of two coupled oscillators, is described. When the benzyldimethyltetradecylammonium chloride surfactant undergoes an oscillatory mass transfer through a nitromethane liquid membrane, a new liquid layer (phase X) appears between the membrane and the acceptor phase. Kinetic analysis provides...
-
Supporting compliance with safety standards by trust case templates
PublikacjaStandard Compliance (SC) Framework presented in this paper encompasses methods and tools which provide support for application of standards. The framework is based on trust case methodology. A trust case is a data structure which represents a justification that an object (a system, an infrastructure, an organization) exhibits certain properties. It contains an argument and related evidence which support claimed properties. A trust...
-
A Novel Multicast Architecture of Programmable Networks
PublikacjaIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
The role and importance of WIMAX mobile system as a high-performance data transfer technology in wireless sensor networks for wide area monitoring applications
PublikacjaThe study discuses basic features and functional design of WiMAX Mobile system, based on the IEEE 802.16e (Release 1.5 Rev. 2.0) standard. The analysis has been made in terms of ability to use this system to transmit video stream related to monitoringof large agglomeration areas. What is more, the study includes comparison of technical parameters of WiMAX Mobile system with competitive systems such as: HSPA+ and UMTS-LTE, which...
-
Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons
PublikacjaRecent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...
-
Towards a process based management system for oil port infrastructure in context of insurance
PublikacjaThis article addresses selected methodological aspects of a process based management system based on analysis of hazards and threats and risk evaluation for an oil port infrastructure in context of insurance. The oil port terminal is regarded as important system of the critical infrastructure that require careful system oriented approach to deal with integrated aspects of environmental, safety and security management to reduce...
-
Multisensor System for the Protection of Critical Infrastructure of Seaport
PublikacjaThere are many separated infrastructural objects within a harbor area that may be considered “critical”, such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons...
-
An updated method identifying collision-prone locations for ships. A case study for oil tankers navigating in the Gulf of Finland
PublikacjaTo ensure the risk level associated with continuously increasing maritime traffic through particularly sensitive sea areas remains at acceptable level, a periodic risk assessment needs to be carried out by the relevant authorities. As a part of such assessment, allowing for proactive countermeasures to mitigate risk, the frequency of accidents is estimated along with the assessment of geographical locations where the accidents...
-
Context of Digitalized Employment for Older Adults with Autism Spectrum Disorder in the New Normal
PublikacjaEmployers are actively considering how to normalize remote work technology across different industries. The residual risk of coronavirus disease-19 (COVID-19) will necessarily lower the bar for allowing some workers to stay remote on a more permanent basis. This is based on the realization that many essential jobs can be teleworked while retaining or enhancing productivity. The decisions employers make regarding future work arrangements...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublikacjaManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Architektura i woda - przekraczanie granic
PublikacjaPublikacja daje wgląd w procesy kształtowania połączeń wody i form zbudowanych. W obserwowanych współcześnie eksperymentach struktury budynków przeplatają się z zarysami pól wodnych, powstają konstrukcje architektoniczne unoszące się na różnego rodzaju platformach pływających. Woda jest także coraz częściej włączana w projekty urbanistyczne. Linie styku pomiędzy lądem i wodą ulegają modyfikacjom, przywraca się dawne kanały i tworzy...
-
Driving forces of informal employment: An empirical study based on Polish enterprise data
PublikacjaObjective: The article aims to indicate the determinants of informal employment in registered enterprises using company-level evidence from Poland. Research Design & Methods: The survey conducted among Polish small and medium-sized (SME) enterprises in 2018 was used to find the driving forces of informal employment in Poland. The adequate sample comprised 952 representative surveys derived from the computer-assisted telephone...
-
Eye-Gaze Tracking-Based Telepresence System for Videoconferencing
PublikacjaAn approach to the teleimmersive videoconferencing system enhanced by the pan-tilt-zoom (PTZ) camera, controlled by the eye-gaze tracking system, is presented in this paper. An overview of the existing telepresence systems, especially dedicated to videoconferencing is included. The presented approach is based on the CyberEye eye-gaze tracking system engineered at the Multimedia Systems Department (MSD) of Gdańsk University of Technology...
-
Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger
PublikacjaW artykule opisano aplikację, która automatycznie wykrywa zdarzenia dźwiękowe takie jak: rozbita szyba, wystrzał, wybuch i krzyk. Opisany system składa się z bloku parametryzacji i klasyfikatora. W artykule dokonano porównania parametrów dedykowanych dla tego zastosowania oraz standardowych deskryptorów MPEG-7. Porównano też dwa klasyfikatory: Jeden oparty o Percetron (sieci neuronowe) i drugi oparty o Maszynę wektorów wspierających....
-
Theory versus experiment for vacuum Rabi oscillations in lossy cavities. II. Direct test of uniqueness of vacuum
PublikacjaThe paper continues the analysis of vacuum Rabi oscillations we started in part I [Phys. Rev. A 79, 033836 (2009)]. Here we concentrate on experimental consequences for cavity QED of two different classes of representations of harmonic-oscillator Lie algebras. The zero-temperature master equation, derived in part I for irreducible representations of the algebra, is reformulated in a reducible representation that models electromagnetic...
-
Analysis of High Resolution Clouds of Points as a Source of Biometric Data
PublikacjaThe article presents the analysis devoted to human face data obtained by means of precise photographic scanners. Collected point clouds were used to make high precision meshes of human face. The essence of these studies is the comparison of relative features as well as the comparison of absolute models which require as precisely as possible matching of face models. The article focuses on the analysis of various parts of the human...
-
Mechanizmy komunikacji w rozproszonych systemach specjalnego przeznaczenia
PublikacjaZadania ochrony i bezpieczeństwa granic państwa realizowane przez Straż Graniczną wymagają wsparcia ze strony nowoczesnych systemów Technologii Informacyjnych (TI) uwarunkowanych ich specjalnym przeznaczeniem. Z uwagi na charakter tej służby, rozwiązania dla jej potrzeb muszą być realizowane jako systemy rozproszone umożliwiające przenoszenie i przetwarzanie informacji głosowych oraz różnorodnych danych, w tym specjalnego przeznaczenia....
-
Generating actionable evidence from free-text feedback to improve maternity and acute hospital experiences: A computational text analytics & predictive modelling approach
PublikacjaBackground Patient experience surveys are a key source of evidence for supporting decision-making and quality improvement in healthcare services. These surveys contain two main types of questions: closed and open-ended, asking about patients’ care experiences. Apart from the knowledge obtained from analysing closed-ended questions, invaluable insights can be gleaned from free-text data. Advanced analytics techniques are increasingly...
-
The complete list of two-dimensional number-conserving ternary cellular automata
Dane BadawczeThis dataset contains a complete list of all 1327 two-dimensional number-conserving cellular automata with the state set {0,1,2} (the so-called ternary cellular automata) based on adjacent cells only, i.e. with the von Neumann neighborhood. The detailed definitions and the method of enumerating are given in the paper:
-
Project-Based Learning as a Method for Interdisciplinary Adaptation to Climate Change—Reda Valley Case Study
PublikacjaThe challenges of the global labour market require university authorities to extend traditional forms of education into more innovative and effective solutions. Project-based learning (PjBL) is one of highly effective methods for acquiring knowledge and teaching “soft” skills to future employees. This article describes an experimental use of PjBL at a university with a long history of teaching based on traditional methods—the Gdansk...
-
E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
PublikacjaE-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...
-
PUBLIC SOURCES OF FINANCE FOR CULTURE AS AN ELEMENT OF CULTURAL SECURITY IN POLAND
PublikacjaCulture is an important element of the country, playing an important role both for its security and the economy. It cannot be only seen as a cost-creating sector, but may be a significant factor in economic development. For this to happen, it is necessary to create a system of financing this economic sector. This article’s aim is to analyze the use of funds from public sources in Poland to finance culture-related activities. The...
-
New σ-phases in the Nb–X–Ga and Nb–X–Al systems (X = Ru, Rh, Pd, Ir, Pt, and Au)
PublikacjaPreviously unreported σ-phases in the ternary niobium-based systems Nb–X–Ga for X = Ru, Rh, Pd, Ir, Pt, Au, and Nb–X–Al for X = Ir, and Pt are presented, prepared by arc-melting followed by annealing at 1000 °C for 1 week. The phases are primitive tetragonal (P42/mnm, no. 136) with lattice parameters of a = 9.8336(2)–9.9432(1) Å and c = 5.1098(1)–5.1718(1) Å. Refinements of the single crystal X-ray diffraction data for the Ru and...
-
Numerical Simulations of Seepage in Dikes Using unsaturated and Two-Phase Flow Models
PublikacjaModeling of water flow in variably saturated porous media, including flood dikes, is often based on the Richards equation, which neglects the flow of pore air, assuming that it remains at constant atmospheric pressure. However, there is also evidence that the air flow can be important, especially when the connectivity between the pore air and atmospheric air is lost. In such cases a full two-phase air-water flow model should be...
-
The Belt and Road Initiative and export variety: 1996–2019
PublikacjaThis study examines the association between the Belt and Road Initiative (BRI) and export variety (EV). We propose three hypotheses on how BRI may foster export markets (destinations) or export product lines. The estimates are based on a dataset constructed specifically for this analysis, covering 183 countries and linked with trade data from 1996 to 2019. We apply the instrumental variable (IV) approach in regressions for covering the...
-
Adhesive compliance effect in mode I separation:Profilometry approach
PublikacjaThe effect of adhesive compliance on the deflection of a loaded, bonded beam was studied using laser profilometry. Experimental data obtained were compared with both Euler-Bernoulli (encastré) and Winkler (one parameter elastic foundation) models. A third, analytical, 2D model, based on shear within the adhesive layer (two parameter elastic foundation), was introduced. Finite element analysis (FEA) was also used to study the effect...
-
THE ARCHİTECTURE AND FASHİON DESİGN – An Examination of the Relationship between Fashion and Architecture Design in light of Technological Advancements
PublikacjaThe article focuses on the mutual relationship between two seemingly distant fields of art - architecture and fashion design. It describes a common basis for the process of creating art in the approach to both fashion and architecture. The following considerations, which are based on principles of composition, attempt to reach beyond just the form and analyze also context or perception. The article quotes famous creators and depicts...
-
Investigating Analytics Dashboards’ Support for the Value-based Healthcare Delivery Model
PublikacjaImproving the value of care is one of the essential aspects of Value-Based Healthcare (VBHC) model today. VBHC is a new HC delivery model which is centered on patient health outcomes and improvements. There is anecdotal evidence that the use of decision aid tools like dashboards can play a significant role in the successful implementation of VBHC models. However, there has been little or no systematic studies and reviews to establish...
-
Connected & Automated Urban Mobility, Zombie Cars and Kitchen Knives: Will Autonomous Automobiles, Self-Driving Car-Sharing and Ride-Hailing, and Driverless Shuttles Harm Cities?
PublikacjaThere is a deficiency of supportive evidence to verify thesis that cities are prepared for mobility revolution which already begun and will advance exponentially. Furthermore, present revisions mostly emphasize how emerging mobility solutions will alter transport efficiency or affect mass transit usage, rather than on urban morphology, metropolitan society, nor local communities. Author is thoroughly concerned that municipalities...
-
Procedure based proactive functional safety management for the risk mitigation of hazardous events in the oil port installations including insurance aspects
PublikacjaThis article addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety requirements specified in standards IEC 61508 and IEC 61511. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on risk assessment results...
-
Impact of rotor geometry optimization on the off-design ORC turbine performance
PublikacjaThe paper describes the method of CFD based Nelder-Mead optimization of a 10 kW single-stage axial turbine operating in an ORC system working on R7100. The total-to-static isentropic efficiency is defined as an objective function. Multi-point linear regression is carried out to determine the significance of the objective function arguments and to pick up the set of particular variables and characteristic quantities (e.g. flow angles)...
-
Algorithms for testing security in graphs
PublikacjaIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
A sense of security and freedom in a residential environment
PublikacjaThe article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...
-
Integrated sectors - diversified earnings: the (mising) impact of offshoring on wages and wage convergence in the EU27
PublikacjaThis paper assesses the impact of international outsourcing/offshoring practices on the process of wage equalization across manufacturing sectors in a sample of EU27 economies (1995–2009). We discriminate between heterogeneous wage effects on different skill categories of workers (low, medium and high skill). The main focus is on the labour market outcomes of vertical integration, so we augment a model of conditional wage convergence through...
-
Integrated Sectors - Diversified Earnings: The (Missing) Impact of Offshoring on Wages and Wage Convergence in the EU27
PublikacjaThis paper assesses the impact of international outsourcing/offshoring practices on the process of wage equalization across manufacturing sectors in a sample of EU27 economies (1995-2009). We discriminate between heterogeneous wage effects on different skill categories of workers (low, medium and high skill). The main focus is on the labour market outcomes of vertical integration, so we augment a model of conditional wage convergence...
-
Relationships between Trust and Collaborative Culture in The Context of Tacit Knowledge Sharing
PublikacjaThe literature review presents a lot of theoretical and empirical evidence that Trust affects Collaborative Culture. The opposite also proves to be true: Collaborative Culture influences Trust. The main hypothesis presented in this paper says that both these factors are strongly correlated and modify each other. This study examines the mutual relationship of the said variables in the context of Tacit Knowledge Sharing based on...
-
Narracja jako sposób wyjaśniania organizacyjnej rzeczywistości oraz metoda wywierania wpływu
PublikacjaNiniejszy artykuł ma na celu analizę roli i znaczenia narracji w funkcjonowaniu członków organizacji. W wyniku przeglądu literatury podjęto również próbę przeanalizowania mechanizmów decydujących o tym, że odpowiednio wykorzystane i skonstruowane narracje mogą służyć jako narzędzie pozwalające wywierać wpływ. Następnie na podstawie tej analizy zaproponowano wskazówki dotyczące tworzenia i przedstawiania narracji czy historii organizacyjnej...
-
Crystal structure and electronic structure of CePt2In7
PublikacjaWe report a corrected crystal structure for the CePt2In7 superconductor, refined from single crystal x-ray diffraction data. The corrected crystal structure shows a different Pt–In stacking along the c-direction in this layered material than was previously reported. In addition, all of the atomic sites are fully occupied with no evidence of atom site mixing, resolving a discrepancy between the observed high resistivity ratio of...
-
Prosociality in relation to developmental tasks of emerging adulthood
PublikacjaProsociality, understood as the capacity to act in a way that benefits others, is an important feature for emerging adults to fulfill their personal needs and fulfill developmental tasks. This life period is a time of exploration within various areas of life, enabling individuals to try out and choose own worldview, lifestyle, work and preferred patterns of interpersonal relationships. This review aims at bringing together the...
-
Does the coordinated development of two-way FDI increase the green energy efficiency of Chinese cities? Evidence from Chinese listed companies
PublikacjaBased on the evidence from listed company microdata and data from 285 cities in China, this paper studies the coordinated development of two-way FDI (CDFDI) in improving green energy efficiency (GEE). In particular, this paper examines the spatial heterogeneity effects of CDFDI on GEE. The results showed that CDFDI had a positive impact on the GEE of local and surrounding cities. Mechanistic examinations show that the effects...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublikacjaQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Robot-Based Intervention for Children With Autism Spectrum Disorder: A Systematic Literature Review
PublikacjaChildren with autism spectrum disorder (ASD) have deficits in the socio-communicative domain and frequently face severe difficulties in the recognition and expression of emotions. Existing literature suggested that children with ASD benefit from robot-based interventions. However, studies varied considerably in participant characteristics, applied robots, and trained skills. Here, we reviewed robot-based interventions targeting...