Filtry
wszystkich: 26204
-
Katalog
- Publikacje 3909 wyników po odfiltrowaniu
- Czasopisma 585 wyników po odfiltrowaniu
- Konferencje 261 wyników po odfiltrowaniu
- Wydawnictwa 2 wyników po odfiltrowaniu
- Osoby 509 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 23 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 125 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 20785 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: INFORMATION%20SECURITY
-
Minimum Information about T Regulatory Cells: A Step toward Reproducibility and Standardization
Publikacja -
Architecture for Aggregation, Processing and Provisioning of Data from Heterogeneous Scientific Information Services
Publikacja -
Modern information technology as a factor supporting participation in physical culture of a contemporary man
Publikacja -
Delineating Groundwater Recharge Potential through Remote Sensing and Geographical Information Systems
Publikacja -
The Impact of Innovation and Information Technology on Greenhouse Gas Emissions: A Case of the Visegrád Countries
Publikacja -
Teleportation seen from spacetime: on 2-spinor aspects of quantum information processing
PublikacjaZastosowanie formalizmu 2-spinowego do kwantowego przetwarzania informacji zilustrowane przykładem teleportacji i relatywistycznej korelacji błędu.
-
Knowledge and technology transfer in the Center for Scientific and Technical Information of the Wrocław University of Technology
PublikacjaKnowledge and Technology Transfer between a university and economic operators affects innovation and growth of competitiveness, as well as the development of a knowledge-based society. In the structures of Wroclaw University of Technology, regarded as one of the best and the most innovative technical universities in Poland, a number of units responsible for a wide understanding cooperation with the economy have been established....
-
Building Information Modelling as an opportunity and risk for stakeholders involved in construction investment process
PublikacjaThe requirements to apply Building Information Modelling (BIM) in public investments worldwide are currently very high. Significant interest (sometimes formulated also as a requirement) in BIM technology can be observed also among private investors. Design technology that applies BIM is supported by many private investors due to its numerous advantages. A growing group of construction designers (steel, concrete and reinforced concrete...
-
Dynamic Signal Strength Mapping and Analysis by Means of Mobile Geographic Information System
PublikacjaBluetooth beacons are becoming increasingly popular for various applications such as marketing or indoor navigation. However, designing a proper beacon installation requires knowledge of the possible sources of interference in the target environment. While theoretically beacon signal strength should decay linearly with log distance, on-site measurements usually reveal that noise from objects such as Wi-Fi networks operating in...
-
Selected information technology tools supporting for maintenance and operation management electrical grids
PublikacjaThe paper presents the main issues of management of electrical grids. Selected information technology tools supporting for electrical grids maintenance are presented. In electrical infrastructure maintenance of power companies the geographic information systems are increasingly used to support the management of theirs resources. Their functionalities in terms creating comprehensive databases for electrical infrastructure of power...
-
Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation
PublikacjaIn client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...
-
Developing Novel Solutions to Realise the European Energy - Information Sharing & Analysis Centre
PublikacjaFor more effective decision making in preparation for and response to cyberevents in the energy sector, multilevel situation awareness, from technical to strategic is essential. With an uncertain picture of evolving threats, sharing of the latest cybersecurity knowledge among all sector stakeholders can inform and improve decisions and responses. This paper describes two novel solutions proposed during the formation of the European...
-
Music information retrieval—The impact of technology, crowdsourcing, big data, and the cloud in art.
PublikacjaThe exponential growth of computer processing power, cloud data storage, and crowdsourcing model of gathering data bring new possibilities to music information retrieval (mir) field. Mir is no longer music content retrieval only; the area also comprises the discovery of expressing feelings and emotions contained in music, incorporating other than hearing modalities for helping this issue, users’ profiling, merging music with social...
-
Musical Instrument Classification and Duet Analysis Employing Music Information Retrieval Techniques.
PublikacjaArtykuł przedstawia w sposób przeglądowy prace Katedry Systemów Multimedialnych Politechniki Gdańskiej związane z wyszukiwaniem informacji muzycznej, a w szczególności z klasyfikacją dźwięków instrumentów muzycznych. W opisywanych eksperymentach wykorzystano sztuczne sieci neuronowe.
-
Information- and Knowledge-Based Approaches to Improve Performance in Organizations : special issue editorial
PublikacjaOmówiono podejścia oparte na bazie informacji i bazie wiedzy w zagadnieniach związanych z usprawnianiem funkcjonowania organizacji. Szczególny nacisk położono na mozliwości usprawnień w aspekcie ekonomicznym.
-
Distributed correlations and information flows within a hybrid multipartite quantum-classical system
PublikacjaUnderstanding the non-Markovian mechanisms underlying the revivals of quantum entanglement in the presence of classical environments is central in the theory of quantum information. Tentative interpretations have been given by either the role of the environment as a control device or the concept of hidden entanglement. We address this issue from an information-theoretic point of view. To this aim, we consider a paradigmatic tripartite...
-
The dynamics of the total outputs of Japanese information and communication technology sectors: A further study
PublikacjaThe purpose of this study is to continue the previous studies which discussed the impacts of the changes of final demands on the total outputs of the Information and Communication Technology (ICT) sectors of the specific country. More specifically, this study aims to conduct a deeper analysis regarding these impacts. This study focuses on the case of Japan. This study employs a demand-pull Input-Output (IO) quantity model, one...
-
Data, Information, Knowledge, Wisdom Pyramid Concept Revisited in the Context of Deep Learning
PublikacjaIn this paper, the data, information, knowledge, and wisdom (DIKW) pyramid is revisited in the context of deep learning applied to machine learningbased audio signal processing. A discussion on the DIKW schema is carried out, resulting in a proposal that may supplement the original concept. Parallels between DIWK pertaining to audio processing are presented based on examples of the case studies performed by the author and her collaborators....
-
Discovering relationships between data in an enterprise information system using log analysis
PublikacjaEnterprise systems are inherently complex and maintaining their full, up-to-date overview poses a serious challenge to the enterprise architects’ teams. This problem encourages the search for automated means of discovering knowledge about such systems. An important aspect of this knowledge is understanding the data that are processed by applications and their relationships. In our previous work, we used application logs of an enterprise...
-
Exploring Relationships Between Data in Enterprise Information Systems by Analysis of Log Contents
PublikacjaEnterprise systems are inherently complex and maintaining their full, up-to-date overview poses a serious challenge to the enterprise architects’ teams. This problem encourages the search for automated means of discovering knowledge about such systems. An important aspect of this knowledge is understanding the data that are processed by applications and their relationships. In our previous work, we used application logs of an enterprise...
-
Using Different Information Channels for Affect-Aware Video Games - A Case Study
PublikacjaThis paper presents the problem of creating affect-aware video games that use different information channels, such as image, video, physiological signals, input devices, and player’s behaviour, for emotion recognition. Presented case studies of three affect-aware games show certain conditions and limitations for using specific signals to recognize emotions and lead to interesting conclusions.
-
COMPUTERS & SECURITY
Czasopisma -
Health Security
Czasopisma -
Food Security
Czasopisma -
African Security
Czasopisma -
Democracy & Security
Czasopisma -
European Security
Czasopisma -
Water Security
Czasopisma -
Asian Security
Czasopisma -
Security Challenges
Czasopisma -
INTERNATIONAL SECURITY
Czasopisma -
Security Forum
Czasopisma -
Security and Privacy
Czasopisma -
SECURITY STUDIES
Czasopisma -
Security Journal
Czasopisma -
SECURITY DIALOGUE
Czasopisma -
Computer modeling of the solution conformation of cyclic enkephalins
Publikacja -
The Influence of Shear Deformation in analysis of plane frames
PublikacjaThe focus of the paper is to investigate the influence of shear deformation effect on the distribution of internal forces and frame deformation. To estimate shear deformation effect, the Timoshenko beam theory and the concept of shear deformation coefficients are used. Analysis of example frames gives the possibility to evaluate what have the most impact on size of shear deformation and in which type of frames the shear deformation...
-
Modeling knee joint endoprosthesis mode of deformation
Publikacja -
A nonlinear approach to modelling gas bubble deformation.
PublikacjaPrzedstawiono model wyjaśniający wpływ deformacji pęcherzyka na występowanie zjawiska chaosu podczas generowania pęcherzyków gazowych z pojedynczej dyszy zanurzonej w cieczy.
-
Dynamics of Ice Jam Formation and Release
PublikacjaThe numerical model DynaRICE and its application to ice jam formation and release is presented. The model is a two-dimensional coupled flow and ice dynamic model. The ice dynamic component, which includes both the internal ice resistance and boundary friction on ice motion, uses a Lagrangian SPH method. The hydrodynamic component of the model uses a streamline upwind finite element method, which is capable of simulating trans-critical...
-
Amino acid formation by electron irradiation
PublikacjaW artykule zaprezentowano procedurę badania reakcji indukowanych przez niskoenergetyczne elektrony w mieszanych warstwach molekularnych CH3COOD:NH3.
-
TBAF Promoted Formation of Symmetrical Trisulfides
PublikacjaWe have developed a new method for the synthesis of functionalized symmetrical trisulfides based on (5,5-dimethyl-2-thioxo-1,3,2-dioxaphosphorin-2-yl)disulfanyl derivatives prepared from readily available 5,5-dimethyl-2-sul-fanyl-2-thioxo-1,3,2-dioxaphosphorinane or bis(5,5-dimethyl-2-thioxo-1,3,2-dioxaphosphorinan-2-yl) disulfide. The symmetrical trisulfides can be obtained from aliphatic and aromatic thiols andL-cysteine derivatives...
-
Early models of DNA damage formation
PublikacjaPrzeanalizowano jedne z pierwszych modeli opisujących uszkodzenia nici DNA. Przeanalizowano uszkodzenia powstające w pojedynczych i podwójnych niciach, pod wpływem czynników fizycznych i chemicznych.
-
Recent developments in disulfide bond formation
PublikacjaThis review summarizes the recent developments of disulfide bond formation with variety of reagents. The scope and limitation of the presented methods is discussed. The syntheses of unsymmetrical disulfides are highlighted in order to present the most versatile achievements.
-
Agile Methods In Formation of Metropolis Neighbourhood
PublikacjaA study of the zone adjoining the metropolis area of Tricity (Poland) was conducted on the basis of analyses of changes in spatial development, outline planning decisions and local plans of spatial development. Localities placed at several dozen kilometres from strongly urbanized areas do not constitute metropolis outskirts. The vicinity of large urban centres is an obstacle to the development of localities as self-sufficient units...
-
Lab security improvement using RFID technologies
PublikacjaTechnologia RFID stanowi nie tylko technologię bliźniaczą w stosunku do kodów paskowych, ale posiada również dodatkowe cechy takie jak zdalna identyfikacja przy użyciu fal radiowych. Technologia ta staje się coraz bardziej dostępna i koszty jej wdrożenia są coraz mniejsze. W artykule przedstawiono wykorzystanie technologii RFID do ochrony sprzętu laboratoryjengo przed kradzieżą. Zawarto opis laboratorium wyposażonego w urządzenia...
-
Network-centric warfare: a strategy for homeland security
PublikacjaPojawienie się międzynarodowego terroryzmu skutkuje nowym podejście do identyfikacji potencjalnych zagrożeń dla bezpieczeństwa krajowego. Powstał strategiczny dylemat - jak zidentyfikować przeciwnika? Utworzono pojęcie asymetrycznego zagrożenia i, w konsekwencji, asymetrycznej wojny. Z dużym prawdopodobieństwem można założyć, że kolejne zagrożenia będą dotyczyć takich elementów krajowej infrastruktury, jak źródła energii, elektrownie,...
-
Web-based marine gis for littoral security
PublikacjaW artykule opisano koncepcję oraz przykładowe zastosowania systemu informacji geograficznej umożliwiającego zbieranie, przetwarzanie, integrowanie oraz wizualizację danych pochodzących z pomiarów bezpośrednich, obrazów lotniczych i satelitarnych oraz systemów hydroakustycznych.Przedstawiono przykłady zastosowania systemu w dziedzinie ochrony strefy przybrzeżnej takie, jak: -monitoring rozprzestrzeniania wylewu olejowego, -monitoring...
-
Security Assessment of a Turbo-Gas Power Plant
PublikacjaCritical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.