Filtry
wszystkich: 26288
-
Katalog
- Publikacje 3984 wyników po odfiltrowaniu
- Czasopisma 585 wyników po odfiltrowaniu
- Konferencje 261 wyników po odfiltrowaniu
- Wydawnictwa 2 wyników po odfiltrowaniu
- Osoby 509 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 23 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 126 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 20793 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: INFORMATION%20SECURITY
-
INFORMATION SOCIETY DEVELOPMENT TRENDS, FROM DATA THROUGH KNOWLEDGE TO WISDOM
PublikacjaThe paper investigates both the causes and effects of the rapid increase in the data volume(BigData)andtheirimpactonhumancognition.TheroleoftheInternetindistributing and exchanging of such data, and their impact on the growth of the Information Society are emphasized. As a result, Wisdom Science – a new kind of research – emerges which has the potential to facilitate more advanced solutions in the digital world. In consequence,...
-
Sources of Market Information, Its Quality and New Product Financial Performance
PublikacjaWhile we observe a growing interest in the role of market information in new product development (NPD), existing research has still largely ignored the quality of market information that is a crucial issue in the era of the information society. What does affect the quality of market information in new product development projects, and how does this quality influence the financial performance of new products? In this paper, we address...
-
Transparency of information contained in the state budget from the view of utility for the citizen
Publikacja -
Methods and means of processing discrete information in networks with a high level of noise
Publikacja -
Greencoin - educational information system for eco-inclusion and empowering urban adaptability.
PublikacjaSARS-CoV19 pandemic exposed a broad spectrum of challenges for modern cities, societies and the environment at large. The post-Covid transformation requires new social and ecological solutions, adjusted to modern challenges, but also equipped with technological advances that allow for digital inclusion and sustainable urban development to benefit the local economy and society. Many information systems are designed to enable...
-
Greencoin information system empowering urban adaptability and eco living choices.
PublikacjaThere are many gamification projects focused on mitigating climate changes which has been tested or implemented worldwide. However, the gap which remains is the limited number of solutions dedicated for central European countries where the urban polices in terms of climate vulnerability are bounded. On the other hand, cities, when implementing climate-oriented policies, are focused on urban resilience, while the opportunities...
-
Integration of Geographic Information Systems for Monitoring and Dissemination of Marine Environment Data
PublikacjaZastosowanie Systemów Informacji Przestrzennej (GIS) do celu monitorowania i wizualizacji różnych procesów środowiska morskiego jest dziedziną badaną od końca XX wieku. W ostatnich latach rozwój szerokopasmowego dostępu do Internetu oraz dostępność klastrów obliczeniowych pozwalają na wykonywanie czasochłonnych i wymagających operacji, takich jak analizy przestrzenne, w sposób zdalny. Jakkolwiek do tej pory sieciowe Systemy Informacji...
-
Smart information and knowledge management: advances, challenges, and critical issues. - [preface]
PublikacjaOcena aktualnych wyzwan i problemów badawczych w obszarze zarzadzania wiedzą i informacją oraz inteligentnego wspomagania tego obszaru.
-
Modelling Evolution of Knowledge-Based Information Technology Organization: The Concept and Perspective
PublikacjaIncreasing pressure on improving the efficiency of companies' operations leads to transformation of their Information Technology (IT) organizations from technology-oriented to service-oriented, based on the Information Technology Infrastructure Library (ITIL) model. The evolution of these IT organizations can be supported by the knowledge-based systems centered on the rules determined through agregation and refinement of existing...
-
Information technology assessment using a functional prototype of the agent based system
PublikacjaIn the paper authors present the progress of works related with the agent-based system serving the purpose of information technology assessment. Currently this is a prototype including agents, the knowledge base and the ontology; the domain incorporated by the assessment-enterprise managing technologies with special attention paid to technologies directed to IT projects. In this paper, besides indication of expected functionalities...
-
Unconditional privacy over channels which cannot convey quantum information
PublikacjaQuantum cryptography enables one to verify that the state of the quantum system has not been tampered with and thus one can obtain privacy regardless of the power of the eavesdropper. All previous protocols relied on the ability to faithfully send quantum states or equivalently to share pure entanglement. Here we show this need not be the case-one can obtain verifiable privacy even through some channels which cannot be used to...
-
Information technology and knowledge management: a predestined integration. Part 1 : editorial
PublikacjaW pracy omówiono możliwość przyszłościowej integracj obszarów technologii informacyjnej oraz zarządzania wiedzą
-
Information technology and knowledge management: a predestined integration. Part 2: editorial
PublikacjaW pracy omówiono możliwość przyszłościowej integracji obszarów technologii informacyjnej oraz zarządzania wiedzą.
-
Hard and Soft Modelling Based Knowledge Capture for Information Flow Management
PublikacjaW rozdziale przedstawiono najpierw złożony aparat matematyczny który może być wykorzystany w modelowaniu zarządzania informacją i oceny jej wartości w procesach decyzyjnych. Aparat ten oparto na teorii procesów stochastycznych oraz na teorii uzyteczności. Następnie, opierając się na wypracowanym modelu matematycznym, zaproponowano przejście do modelowania miękkiego. Całość zilustrowano na przykładach z obszaru zarządzania informacją.
-
Reversible transformations from pure to mixed states and the unique measureof information.
PublikacjaWprowadzono protokół w którym kwantowe stany czyste są w sposób odwracalny przeprowadzane w stany mieszane. W oparciu o analizę protokołu wyprowadzono jednoznaczną miarę informacji. Dokonano porównania z innymi nieodwracalnymi protokółami przeprowadzającymi stany czyste w mieszane.
-
Biological fluids as a source of information on the exposure of man to envinonmental chemical agents.
PublikacjaWiele związków (min. lotne związki chlorowcoorganiczne, metale) ma szkodliwy wpływ na tkanki i narządy organizmu ludzkiego, wywołując nieodwracalne zmiany chorobowe. W celu określenia zagrożenia zawodowego coraz częściej wykonuje się pomiar stężeń substancji chemicznych i ich metabolitów w płynach biologicznych - moczu, krwi, rzadziej w mleku matki, żółci, ślinie, czy też spermie. Aby oznaczyć poziomy tych stężeń, pobrane próbki...
-
Quantum information isomorphism: Beyond the dilemma of the Scylla of ontology and the Charybdis of instrumentalism.
PublikacjaZaprezentowano koncepcję izomorfizmu kwantowej informacji, zgodnie z którym kwantowy opis natury jest izomorficzny z samą naturą.
-
Previous Opinions is All You Need - Legal Information Retrieval System
PublikacjaWe present a system for retrieving the most relevant legal opinions to a given legal case or question. To this end, we checked several state-of-the-art neural language models. As a training and testing data, we use tens of thousands of legal cases as question-opinion pairs. Text data has been subjected to advanced pre-processing adapted to the specifics of the legal domain. We empirically chose the BERT-based HerBERT model to perform...
-
Impact of information systems (IS) infusion on Open Government Data (OGD) adoption
PublikacjaPurpose – This study aims to underline the possible influence of the moderator, information systems (IS) infusion, on Open Government Data (OGD) adoption and usage. Design/methodology/approach – Using the partial least squares-structural equation modeling methodological approach, the adapted unified theory of acceptance and use of technology (UTAUT) model has been used for understanding the role of themoderating variable, namely,...
-
Information Extraction from Polish Radiology Reports using Language Models
PublikacjaRadiology reports are vital elements of directing patient care. They are usually delivered in free text form, which makes them prone to errors, such as omission in reporting radiological findings and using difficult-to-comprehend mental shortcuts. Although structured reporting is the recommended method, its adoption continues to be limited. Radiologists find structured reports too limiting and burdensome. In this paper, we propose...
-
Transparency of publicly available information about fiscal and monetary policy in Poland
PublikacjaResearch background: The quality of information provided by fiscal and monetary authorities are important in a democratic state. Ensuring fiscal policy transparency reduces fiscal risk and corruption and promotes public acceptance of fiscal reforms. Ensuring transparency in monetary policy allows market participants to anticipate central bank responses and take their effects into account when making investment and consumption decisions. Aim...
-
Management Information Base module for electrical power system configuration and use
PublikacjaInternet standards describe a virtual information store, termed the Management Information Base (MIB), which is made available through Simple Network Management Protocol (SNMP). No standard MIB exists to date for monitoring power lines in facilities over IP network. This paper defines a subset of the MIB for power system monitoring.
-
Konferencja „Federated Conference on Computer Science and Information Systems”
Wydarzeniakonferencja „Federated Conference on Computer Science and Information Systems”, współorganizator: Wydział Elektroniki, Telekomunikacji i Informatyki, miejsce obrad: WETI B
-
Towards gelsolin amyloid formation
Publikacja -
Formation of acoustic field in rooms
PublikacjaPaper describes known form literature method of sound diffusity index assesment, which utilizes impulse response of the room. Process of froming diffused sound field using this method was investigated.Increase of sound diffusity index in time was noted in rooms differing in shape,volume and reverberation time. Exponential growth of sound diffusion index was noted which correlates with other acoustical rooms measures.
-
FORECASTING BIOGAS FORMATION IN LANDFILLS
Publikacja: The aim of the present research was to develop a mathematical model for estimating the amount of viscous gas generated as a function of weather conditions. Due to the lack of models for predicting gas formation caused by sudden changes in weather conditions in the literature, such a model was developed in this study using the parameters of landfills recorded for over a year. The effect of temperature on landfill gas production...
-
Stesses in tank shell with shape deformation
PublikacjaW referacie przedstawiono wyniki pomiarów naprężeń w płaszczy stalowego, rzeczywistego zbiornika. Pomiary przeprowadzono przy pomocy tensometrii elektrooporowej. Obiektem badań był stalowy zbiornik pionowy z dachem pływającym o pojemności nominalnej 12.000 m3. Defermacje płaszcza stalowego badanego obiektu wynoszą od -170 do +150 mm.
-
Security aspects in functional safety analysis
PublikacjaA security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...
-
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
An integrated framework for security protocol analysis
PublikacjaAssurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...
-
An integrated method for security protocols analysis
Publikacja -
Automatic sound recognition for security purposes
PublikacjaIn the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...
-
Indo-French Defence and Security Partnership
Publikacja -
The Impact of Terrorism on International Peace and Security
Publikacja -
Architecture supporting security of agent systems
PublikacjaW rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...
-
Aspects of maritime security and safety of Poland
PublikacjaReferat przedstawia wybrane aspekty morskiego bezpieczeństwa Polski. Prezentacja problematyki jest ukierunkowana na problemy techniczne związane z bezpieczeństwem, pozostawiając na uboczu problemy prawne, logistyczne i społeczne. Na wstępie przedstawiono analizę zagrożeń dla bezpieczeństwa Bałtyku. Następnie opisano wybrane instytucje odpowiedzialne za morskie bezpieczeństwo Polski, ze szczegółowym uwzględnieniem Morskiej Straży...
-
Cost assessment of computer security activities
PublikacjaComprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...
-
Mobile Security: Threats and Best Practices
PublikacjaCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
A sense of security and freedom in a residential environment
PublikacjaThe article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...
-
Resilience and Security in Software Defined Networking
PublikacjaThis paper gives an overview of the most important issues on resilience and security in Software Defined Networking
-
Reformation
Czasopisma -
Building Information Modelling as an opportunity and risk for stakeholders involved in construction investment process
PublikacjaThe requirements to apply Building Information Modelling (BIM) in public investments worldwide are currently very high. Significant interest (sometimes formulated also as a requirement) in BIM technology can be observed also among private investors. Design technology that applies BIM is supported by many private investors due to its numerous advantages. A growing group of construction designers (steel, concrete and reinforced concrete...
-
Three-dimensional Web Geographic Information System using web-based technologies
PublikacjaWeb-based Geographic Information Systems offer a way of delivering geographic information to devices with small computational power, such as smartphones. In recent years, the rapid development of the Web Graphics Library (WebGL) made it possible to create rich interactive applications running inside a web browser and displaying three-dimensional objects using hardware acceleration. This paper presents a three-dimensional Web-GIS...
-
Knowledge and technology transfer in the Center for Scientific and Technical Information of the Wrocław University of Technology
PublikacjaKnowledge and Technology Transfer between a university and economic operators affects innovation and growth of competitiveness, as well as the development of a knowledge-based society. In the structures of Wroclaw University of Technology, regarded as one of the best and the most innovative technical universities in Poland, a number of units responsible for a wide understanding cooperation with the economy have been established....
-
Dynamic Signal Strength Mapping and Analysis by Means of Mobile Geographic Information System
PublikacjaBluetooth beacons are becoming increasingly popular for various applications such as marketing or indoor navigation. However, designing a proper beacon installation requires knowledge of the possible sources of interference in the target environment. While theoretically beacon signal strength should decay linearly with log distance, on-site measurements usually reveal that noise from objects such as Wi-Fi networks operating in...
-
The operational method of filling information gaps in satellite imagery using numerical models
Publikacja -
Minimum Information about T Regulatory Cells: A Step toward Reproducibility and Standardization
Publikacja -
Full Implementation of the River Information Services of Border and Lower Section of the Odra in Poland
Publikacja -
Information and Communication Technology Management for Global Competitiveness and Economic Growth in Emerging Economies
Publikacja -
Database for integration of information in distributed data exchange system elements of Border Guard
PublikacjaThe paper presents the database solution for integration of information in distributed data exchange system elements of the Polish Border Guard. The proposed database solution is described in the context of data exchange system elements which control position and store identification data of vessels (fishing, sports and sailing boats) and other suspicious objects on the territorial sea, sea-coast and the internal sea-waters controlled...