Filtry
wszystkich: 319
-
Katalog
- Publikacje 284 wyników po odfiltrowaniu
- Czasopisma 23 wyników po odfiltrowaniu
- Konferencje 1 wyników po odfiltrowaniu
- Osoby 5 wyników po odfiltrowaniu
- Projekty 1 wyników po odfiltrowaniu
- Kursy Online 2 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 2 wyników po odfiltrowaniu
Wyniki wyszukiwania dla: SECURITY, EVIDENCE BASED ARGUMENTS
-
Role of Sports Facilities in the Process of Revitalization of Brownfields
PublikacjaThe paper gives an evidence that building a large sports facility can generate beneficial urban space transformation and a significant improvement in the dilapidated urban areas. On the basis of theoretical investigations and case studies it can be proved that sports facilities introduced to urban brownfields could be considered one of the best known large scale revitalization methods. Large urban spaces surrounding sport facilities...
-
On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks
PublikacjaHandover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...
-
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublikacjaML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Public Participation practice versus economic pressure: transformation of the Gdansk Coastal Strip
PublikacjaThe paper focuses on the issue of public participation in the areas that are particularly sensitive to the transformation processes based on the case study of Gdańsk Coastal Strip. Moreover the article presents the outcome of an innovative attempt at promotion of public participation introduced in university education that was built on the experiences gathered during elaboration of the pro publico bono project of the Coastal Strip...
-
Edible black ant Smith (Carebara vidua) as human food – A systematic review
PublikacjaMeeting food security is one of the major global challenges to ensure sufficient supply of food for current and future generations, considering increasing population growth and climate change issues. Consequently, the consumption of edible insects as an alternative food source has recently gained global attention for combating global food insecurity. The present review aims to provide information on the recent progress in consumption...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublikacjaDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Environmental impacts of food waste management technologies: A critical review of life cycle assessment (LCA) studies
PublikacjaFood waste is a serious global problem. Therefore, it is essential to reduce food waste and adopt recycling strategies to minimize its environmental impacts. However, conventional waste disposal methods emit harmful gases such as dioxin, CH4, N2O, and NH3, which contaminate the air and water resources. This work reviews the environmental consequences of food waste based on lifecycle assessment (LCA) techniques using methods such...
-
Progress towards a unified approach to entanglement distribution
PublikacjaEntanglement distribution is key to the success of secure communication schemes based on quantum mechanics, and there is a strong need for an ultimate architecture able to overcome the limitations of recent proposals such as those based on entanglement percolation or quantum repeaters. In this work we provide a broad theoretical background for the development of such technologies. In particular, we investigate the question of whether...
-
INDUSTRIAL HERITAGE IN “SACRIFICE ZONES”. THE POTENTIAL OF BOCAMINA I & II THERMOELECTRIC IN CORONEL, CHILE
PublikacjaThis work aims to present the recovery potential of the Chilean Sacrifice Zones, urban areas affected by high amounts of pollution caused by industrial activities. It centers in the case of “Bocamina I & II”, two Thermoelectric based in the city of Coronel, southern Chile. A settlement historically related to the mining processes. These plants operated for decades supplying the national energy grid and are seen as both symbols...
-
Technical and Economic Analysis of the Implementation of Selected Variants of Road Investment
PublikacjaThe aim of the article is to analyze three variants of modernization and reconstruction of a road intersection, which in practice is the cause of numerous collisions and accidents. Detailed design solutions are presented for them. The aim of the analyses is to indicate an effective solution that, taking into account technical modifications of the road system elements, will ensure the functionality of the road system to the highest...
-
Representing Process Characteristics to Increase Confidence in Assurance Case Arguments
PublikacjaAn assurance case is a structured, evidence-based argument demonstrating that a safety or other quality objective of a high integrity system is assured. Assurance cases are required or recommended in many industry domains as a means to convince the regulatory bodies to allow commissioning of such system. To be convincing, an argument should address all potential doubts and thus cover numerous additional issues, including the processes...
-
Efficiency of European public higher education institutions: a two-stage multicountry approach
PublikacjaThe purpose of this study is to examine efficiency and its determinants in a set of higher education institutions (HEIs) from several European countries by means of non-parametric frontier techniques. Our analysis is based on a sample of 259 public HEIs from 7 European countries across the time period of 2001-2005. We conduct a two-stage DEA analysis (Simar and Wilson in J Economet 136:31-64, 2007), first evaluating DEA scores...
-
Volunteerism in the last year as a moderator between empathy and altruistic social value orientation: An exploratory study
PublikacjaVolunteerism is a sustained prosocial activity, and young adults are one of the most important targets for organizations recruiting volunteers. Empathy and altruistic social value orientation measured by a decomposed game are dispositional traits that might foster engagement in volunteerism. Using a self-report online-based questionnaire study on two groups of young adults (aged 18-35, N = 224 non-volunteers and N = 178 volunteers...
-
Featured based CAVE software factory
PublikacjaIn the paper we convey the lessons learned along the path we have gone through several years since establishing a room-sized CAVE installation at our university, from craft manufacturing and ad-hoc software reuse of VR software products to the robust feature driven software product line (SPL) implementing the Product Line Engineering (PLE) factory paradigm. With that we can serve all our departments and other entities from the...
-
Scaling Up the Process of Titanium Dioxide Nanotube Synthesis and Its Effect on Photoelectrochemical Properties
PublikacjaIn this work, for the first time, the influence of scaling up the process of titanium dioxide nanotube (TiO2NT) synthesis on the photoelectrochemical properties of TiO2 nanotubes is presented. Titanium dioxide nanotubes were obtained on substrates of various sizes: 2 × 2, 4 × 4, 5 × 5, 6 × 6, and 8 × 8 cm2. The electrode material was characterized using scanning electron microscopy as well as Raman and UV–vis spectroscopy in order...
-
Exploring Impact of Requirements Engineering on Other IT Project Areas – Case Study
PublikacjaRequirements Engineering (RE) is recognized as one of the most important (yet difficult) areas of software engineering that has a significant impact on other areas of IT projects and their final outcomes. Empirical studies investigating this impact are hard to conduct, mainly due to the great effort required. It is thus difficult for both researchers and industry practitioners to make evidence-based evaluations about how decisions...
-
Customization of UWB 3D-RTLS Based on the New Uncertainty Model of the AoA Ranging Technique
PublikacjaThe increased potential and effectiveness of Real-time Locating Systems (RTLSs) substantially influence their application spectrum. They are widely used, inter alia, in the industrial sector, healthcare, home care, and in logistic and security applications. The research aims to develop an analytical method to customize UWB-based RTLS, in order to improve their localization performance in terms of accuracy and precision. The analytical...
-
The Most Valuable Global Brands and Condition of Economies: a Spatial Approach
PublikacjaResearch background: Brands are considered to be the most valuable asset of a company. Some of them achieve spectacular global results. The significance of global brands is proved by the fact that their value is often greater than the sum of all company’s net assets. Purpose of the article: The aim of this article is to highlight that brand value does not only create company’s value but also leverages economies. We claim that even though...
-
Experimental and predicted physicochemical properties of monopropanolamine-based deep eutectic solvents
PublikacjaIn this work, the novel deep eutectic solvents (DESs) based on 3-amino-1-propanol (AP) as hydrogen bond donor (HBD) and tetrabutylammonium bromide (TBAB) or tetrabutylammonium chloride (TBAC) or tetraethylammonium chloride (TEAC) as hydrogen bond acceptors (HBAs) were synthesized with different molar ratios of 1: 4, 1: 6 and 1: 8 salt to AP. Fourier Transform Infrared Spectroscopy measurements were performed to provide an evidence...
-
Experimental and predicted physicochemical properties of monopropanolamine-based deep eutectic solvents
PublikacjaIn this work, the novel deep eutectic solvents (DESs) based on 3-amino-1-propanol (AP) as hydrogen bond donor (HBD) and tetrabutylammonium bromide (TBAB) or tetrabutylammonium chloride (TBAC) or tetraethylammonium chloride (TEAC) as hydrogen bond acceptors (HBAs) were synthesized with different molar ratios of 1:4, 1:6 and 1:8 salt to AP. Fourier Transform Infrared Spectroscopy measurements were performed to provide an evidence...
-
Multimodal Surveillance Based Personal Protection System
PublikacjaA novel, multimodal approach for automatic detection of abduction of a protected individual, employing dedicated personal protection device and a city monitoring system is proposed and overviewed. The solution is based on combining four modalities (signals coming from: Bluetooth, fixed and PTZ cameras, thermal camera, acoustic sensors). The Bluetooth signal is used continuously to monitor the protected person presence, and in case...
-
On extending open source IMS platform for integrated IPTV and VoIP services over IPv6
PublikacjaEven when IMS is the most popular platform for multimedia services, the open versions of IMS ecosystem are lacking in specified functionalities for IPTVv6 and VoIPv6 services. In this paper, we extend current client and server open source software in order to provide reliability and security to these multimedia services. As a part of our work the IMS architecture for conferencing system with proposed mechanisms to improve system...
-
Interaction with medical data using QR-codes
PublikacjaBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
Assembling and testing of quasi-static hybrid piezoelectric motor based on electroactive lubrication principle
PublikacjaThe presented paper concerns a novel concept of hybrid piezoelectric motor based on electroactive lubrication principle. Its structure is combined of quasi-static and resonance piezoelectric actuators, synchronizing their work to generate the rotary movement. The hybrid motor topology is compared to the existing piezoelectric motors, regarding its field of applications in embedded systems with very high security requirements. The...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublikacjaAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
Towards a Lightweight Approach for the Evaluation of Requirements Engineering Impact on Other IT Project Areas
PublikacjaRequirements Engineering (RE) is recognized as one of the most important, but difficult areas of software engineering, with a significant impact on other areas of the IT project and its final outcome. The empirical studies investigating this impact are hard to conduct, mainly due to large effort required. It is thus difficult for researchers and even more for industry practitioners to make evidence-based evaluations, how decisions...
-
The influence of IT-competency dimensions on job satisfaction, knowledge sharing and performance across industries
PublikacjaPurpose – Technology makes knowledge management easier. Knowledge sharing is essential for organizational development. Job satisfaction fosters knowledge sharing. Hence, this study aims to develop an understanding of the mutual relationship between knowledge sharing and job satisfaction when both are predicted by information technology (IT)-competency dimensions such as IT-operations, IT-knowledge and IT-infrastructure in the context...
-
Selected concentration techniques for gas chromatographic analysis of environmental samples
PublikacjaThe paper describes the role and tasks of environmental analysis and monitoring. It emphasises the leading role played by gas chromatography, especially when coupled with suitable sample preparation. This is demonstrated by some literature evidence and mainly by the author's original work on the design of sample preparation apparatus and development of GC-based methods of determination of a wide variety of organic pollutants in...
-
The condition of economies. Do most valuable global brands matter?
PublikacjaResearch background: Brands are considered to be the most valuable asset of a company. Some of them achieve spectacular global results. The significance of global brands is proved by the fact that their value is often greater than the sum of all company’s net assets. Purpose of the article: The aim of this article is to highlight that brand value does not only create company’s value, but also leverages economies. The Authors claim...
-
Mining Knowledge of Respiratory Rate Quantification and Abnormal Pattern Prediction
PublikacjaThe described application of granular computing is motivated because cardiovascular disease (CVD) remains a major killer globally. There is increasing evidence that abnormal respiratory patterns might contribute to the development and progression of CVD. Consequently, a method that would support a physician in respiratory pattern evaluation should be developed. Group decision-making, tri-way reasoning, and rough set–based analysis...
-
PRINCIPLES OF ARTIFICIAL INTELLIGENCE APPLICATION IN CONTROL OF THE ENTERPRISE
PublikacjaThe implementation of the tasks of evaluating historical financial information, the control or audit of business activities are based primarily on professional judgments about the object of study of a professional accountant or auditor. Their findings are drawn on the basis of the study of documents, the use of audit evidence, risk assessment, etc. There is always a probability (and rather high) that professional judgment will...
-
Multi-functional sensor based on photonic crystal fiber using plasmonic material and magnetic fluid
PublikacjaA unique highly sensitive photonic crystal fiber is investigated based on plasmonic material and magnetic fluid (MF) for the simultaneous measurement of temperature and magnetic field sensor. The designed sensor is explored by tracing the different parameters such as birefringence, coupling length, power spectrum, and the peak wavelength of the transmission intensity. The magnetic field and temperature computation are attained...
-
Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach
PublikacjaIn this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely...
-
Zarządzanie wiedzą w małych przedsiębiorstwach oferujących wiedzochłonne usługi biznesowe
PublikacjaCelem artykułu jest przedstawienie praktyk zarządzania wiedzą oraz czynników wpływających na sukces, bądź porażkę w ich wdrażaniu na podstawie badania jakościowego przeprowadzonego w trzech firmach działających na terenie województwa pomorskiego. Firmy te należą do sektora małych i średnich przedsiębiorstw oraz oferują wiedzochłonne usługi biznesowe (knowledge-intensive business services – KIBS). W artykule podjęto próbę odpowiedzi...
-
Relationship between Chemical Structure and Biological Activity Evaluated In Vitro for Six Anthocyanidins Most Commonly Occurring in Edible Plants
PublikacjaNumerous studies have provided evidence that diets rich in anthocyanins show a broad spectrum of health benefits. Anthocyanins in nature are usually found in the form of glycosides. Their aglycone forms are called anthocyanidins. The chemical structure of anthocyanins is based on the flavylium cation, but they differ in the position and number of substituents. However, the bioactives and foods that contain them are frequently treated...
-
Release of Encapsulated Bioactive Compounds from Active Packaging/Coating Materials and Its Modeling: A Systematic Review
PublikacjaThe issue of achieving controlled or targeted release of bioactive compounds with specific functional properties is a complex task that requires addressing several factors, including the type of bioactive, the nature of the delivery system, and the environmental conditions during transportation and storage. This paper deals with extensive reporting for the identification of original articles using Scopus and Google Scholar based...
-
Rethinking non-governmental organizations – at the crossroad of economics and civil society
PublikacjaThe article aims to close the existing knowledge gaps, show why non‑governmental organizations are founded and maintained, and elaborate and systematize the existing knowledge through an analysis of the existing subdisciplines within economics, laying the groundwork for the economics of non‑governmental organizations. The article was written based on a structured literature review with an approach similar to the grounded theory...
-
Formal Institutions: the Source of Unproductive Entrepreneurship in Poland
PublikacjaThe purpose of this article is to determine the entrepreneurs' perception of formal institutions in Poland as a source of non-productive behaviours. The research methodology was developed based on many years of the teams' research experience. It involved three stages of research: 1) panel of experts and 2) telephone surveys of 1,612 entrepreneurs in Poland, which were the basis for 3) development of detailed research to be conducted...
-
Iranian future healthcare professionals’ knowledge and opinions about rare diseases: cross‑sectional study
PublikacjaBackground: Rare diseases are a new global health priority, requiring evidence-based estimates of the global prevalenceof diseases to inform public policymakers and provide a serious challenge to the healthcare system that must not be ignored. The purpose of this study is to investigate Iranian future healthcare professionals’ knowledge and opinions about rare diseases.Results: A total of 6838 students responded...
-
Long-term comparative evaluation of an acoustic climate in selected schools before and after the acoustic treatment
PublikacjaThe results of long-term continuous noise measurements in two selected schools are presented in the paper. Noise characteristics were measured continuously there for approximately 16 months. Measurements started eight months prior to the acoustic treatment of the school corridors of both schools. An evaluation of the acoustic climates in both schools, before and after the acoustic treatment, was performed based on comparison of...
-
An Assessment of RASSCF and TDDFT Energies and Gradients on an Organic Donor−Acceptor Dye Assisted by Resonance Raman Spectroscopy
PublikacjaThe excitation energies and gradients in the ground and the first excited state of a novel donor−(π- bridge)−acceptor 4-methoxy-1,3-thiazole-based chromophore were investigated by means of MS-RASPT2/RASSCF and TDDFT in solution. Within both methods, the excitation energies strongly depend on the employed equilibrium structures, whose differences can be rationalized in terms of bond length alternation indexes. It is shown that functionals with...
-
About the Noether’s theorem for fractional Lagrangian systems and a generalization of the classical Jost method of proof
PublikacjaRecently, the fractional Noether's theorem derived by G. Frederico and D.F.M. Torres in [10] was proved to be wrong by R.A.C. Ferreira and A.B. Malinowska in (see [7]) using a counterexample and doubts are stated about the validity of other Noether's type Theorem, in particular ([9],Theorem 32). However, the counterexample does not explain why and where the proof given in [10] does not work. In this paper, we make a detailed analysis...
-
Functional safety and cyber security analysis for life cycle management of industrial control systems in hazardous plants and oil port critical infrastructure including insurance
PublikacjaThis report addresses selected methodological aspects of proactive reliability, functional safety and cyber security management in life cycle of industrial automation and control systems (IACS) in hazardous plants and oil port critical installations based on the analysis of relevant hazards / threats and evaluation of related risks. In addition the insurance company point of view has been also considered, because nowadays the insurer,...
-
Innovative method of localization airplanes in VCS (VCS-MLAT) distributed system
PublikacjaThe article presents the concept and the structure of the localization module. The prototype module is the part of the VCS (VCS-MLAT) localization distributed system. The device receives the audio signal transmitted in airplanes band (118 MHz – 136 MHz). Received data with the timestamps are send to the main server. The data from multiple devices estimates the localization of the airplane. The main aim of the project is the analysis...
-
Searching for road deformations using mobile laser scanning
PublikacjaMillions of people use roads every day all over the world. Roads, like many other structures, have an estimated durability. In Poland a lot of the roads were built at the turn of the 20th and 21st c., especially for light cars. Many of these roads carry traffic and heavy goods vehicles which were not predicted when the traffic was first estimated. It creates a lot of problems with technical conditions and the infrastructure must...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublikacjaElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublikacjaThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...