Filtry
wszystkich: 1435
wybranych: 837
-
Katalog
- Publikacje 837 wyników po odfiltrowaniu
- Czasopisma 299 wyników po odfiltrowaniu
- Konferencje 82 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 37 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Kursy Online 11 wyników po odfiltrowaniu
- Dane Badawcze 160 wyników po odfiltrowaniu
Filtry wybranego katalogu
Wyniki wyszukiwania dla: SECURITY ONTOLOGY
-
Procedure based proactive functional safety management for the risk mitigation of hazardous events in the oil port installations including insurance aspects
PublikacjaThis article addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety requirements specified in standards IEC 61508 and IEC 61511. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on risk assessment results...
-
Wytwarzanie architektury korporacyjnej środowiskiem weryfikacji struktur baz wiedzy systemu wieloagentowego
PublikacjaRozdział dokumentuje przebieg i wyniki weryfikacji opracowywanego w Zakładzie Zarządzania Technologiami Informatycznymi modelu systemu wieloagentowego do oceny technologii informatycznych. Wykorzystanie tego modelu (zaprojektowanego w oparciu o ontologie i zasoby baz wiedzy) ma docelowo wspomagać procesy decyzyjne z zakresu doboru technologii informatycznych dla danej organizacji. Dla potrzeb weryfikacji rozwiązania w zakresie...
-
Ontological queries supporting decision process in KaSea system
PublikacjaWraz z rozwojem baz wiedzy pojawiły się systemy ekspertowe, które wykorzystują je do wsparcia procesu podejmowania decyzji. Systemy Wsparcia Decyzyjnego (SWD), które są tematem niniejszego artykułu, komunikują się z bazami wiedzy, wypełniając je znanymi faktami i odczytując nowo wywnioskowane informacje. Jednakże istnieją sytuacje, w których SWD otrzymują niejednoznaczną odpowiedź od bazy wiedzy. Wówczas pojawia się potrzeba określenia,...
-
Dane, informacje i wiedza w Semantic Web
PublikacjaW rozdziale podjęto próbę usystematyzowania pozornie dobrze znanych pojęć informatycznych, takich jak dane, informacja i wiedza, w kontekście burzliwego rozwoju zasobów informacyjnych ludzkości spowodowanego powstaniem i gwałtownym rozwojem sieci WWW. Zaprezentowane podejście opiera się na ustabilizowanym dorobku informatyki w zakresie baz danych oraz na rozwijającym się dynamicznie dorobku w zakresie ontologii i baz wiedzy. Te...
-
Ontological queries supporting decision process in KaSea system
PublikacjaWraz z rozwojem baz wiedzy pojawiły się systemy ekspertowe, które wykorzystują je do wsparcia procesu podejmowania decyzji. Systemy Wsparcia Decyzyjnego (SWD), które są tematem niniejszego artykułu, komunikują się z bazami wiedzy, wypełniając je znanymi faktami i odczytując nowo wywnioskowane informacje. Jednakże istnieją sytuacje, w których SWD otrzymują niejednoznaczną odpowiedź od bazy wiedzy. Wówczas pojawia się potrzeba określenia,...
-
Wykorzystanie portalu ontologicznego w zastosowaniach mikroekonomicznych
PublikacjaPrzedstawiono problematykę dzidzinowo zorientowanych ontologii w informatycznych zastosowaniach praktycznych. Wprowadzono podstawy podejścia ontologicznego, jako alternatywnego ujęcia dla opisu oraz dynamicznego przechowywania okreslonych reprezentacji wiedzy. Pokazano dziedzinową problematykę zagadnień mikroekonomicznych oraz zwrócono uwagę na potencjalne mozliwości zastosowania podejścia ontologicznego w tym zakresie. Przeanalizowano...
-
Wpływ teorii chaosu na niektóre tradycyjne stanowiska ontologiczne oraz na spór o redukcjonizm
PublikacjaTeoria chaosu stanowi nie tylko nowy paradygmat w nauce, ale także inspirację do badań filozoficznych nad rzeczywistością. W artykule podjęto próbę zarysowania głównych założeń teorii chaosu oraz określenia jej wpływu na niektóre tradycyjne stanowiska ontologiczne oraz spór o redukcjonizm. Z punktu widzenia ontologii, w dynamice nieliniowej szczególnie interesujący jest powrót do ciągłościowego monoizmu w opozycji do atomizmu....
-
Diagnostic Accuracy of Liquid Biopsy in Endometrial Cancer
PublikacjaBackground: Liquid biopsy is a minimally invasive collection of a patient body fluid sample. In oncology, they offer several advantages compared to traditional tissue biopsies. However, the potential of this method in endometrial cancer (EC) remains poorly explored. We studied the utility of tumor educated platelets (TEPs) and circulating tumor DNA (ctDNA) for preoperative EC diagnosis, including histology determination. Methods:...
-
Surgical Site Infection after Breast Surgery: A Retrospective Analysis of 5-Year Postoperative Data from a Single Center in Poland
PublikacjaBackground and Objectives: Surgical site infection (SSI) is a significant complication of non-reconstructive and reconstructive breast surgery. This study aimed to assess SSI after breast surgery over five years in a single center in Poland. The microorganisms responsible for SSI and their antibiotic susceptibilities were determined. Materials and Methods: Data from 2129 patients acquired over five years postoperatively by the...
-
Financial Markets and Bankruptcy Systems: Is there a Relationship?
PublikacjaPurpose: Filling the cognitive gap in the theory of ex-post transaction costs, i.e., at the stage of enforcing market transactions by examining the relationship between friendliness/severity of the bankruptcy and restructuring law towards debtors, the level of development of financial markets, the effectiveness of the judicial system and the rate of debt recovery. Design/Methodology/Approach: In the research, the following methods...
-
Searching for road deformations using mobile laser scanning
PublikacjaMillions of people use roads every day all over the world. Roads, like many other structures, have an estimated durability. In Poland a lot of the roads were built at the turn of the 20th and 21st c., especially for light cars. Many of these roads carry traffic and heavy goods vehicles which were not predicted when the traffic was first estimated. It creates a lot of problems with technical conditions and the infrastructure must...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublikacjaQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublikacjaMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
New Challenges in Management and Economics in 21st century. Selected studies and examples
PublikacjaIn Chapter 1 authors describe the method used to assess the level of readiness of an organization to introduce the Lean Six Sigma concept supporting the Quality 4.0 assumptions, which is gaining more and more interest not only in large organizations, but also in the SME sector. Its use will be illustrated by the example of a small service company. Chapter 2 presents the characteristics of blockchain technology applications in the...
-
Society 4.0: Issues, Challenges, Approaches, and Enabling Technologies
PublikacjaThis guest edition of Cybernetics and Systems is a broadening continuation of our last year edition titled “Intelligence Augmentation and Amplification: Approaches, Tools, and Case Studies”. This time we cover research perspective extending towards what is known as Society 4.0. Bob de Vit brought the concept of Society 4.0 to life in his book “Society 4.0 – resolving eight key issues to build a citizens society”. From the Systems...
-
Global energy transition: From the main determinants to economic challenges regions
PublikacjaDynamic global energy transition has been accelerating for the last decade. Interestingly, the energy transition is multidimensional and concerns both the dimensions of technique/ technology and the economic, social, institu-tional, and legal spheres (Shuguang et al., 2022; Tzeremes et al., 2022; Ram-zan et al., 2022; Tzeremes et al., 2022). The literature also points to the signif-icant impact of the digitization of the global...
-
A framework of open government data (OGD) e-service quality dimensions with future research agenda
PublikacjaPurpose This research paper aims to present a framework of open government data (OGD) relating to e-service quality dimensions. In addition, it provides a research agenda for the e-service delivery of OGD. Design/methodology/approach A literature review pertaining to e-service quality with special reference to e-government was delivered to deduce the key dimensions of e-service quality for OGD. Findings Five e-service quality dimensions...
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublikacjaThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublikacjaElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Market Price Prediction of Property Rights from Gas Fired Plants or Plants with Total Installed CHP Source Capacity Below 1 MW until 2025
PublikacjaThe resolution on the Polish Energy Policy until 2030 (PEP-30) was adopted by the Council of Ministers on 10 November 2009. The document specifies the combined electricity and heat generation as a direction of pursuing the goals of energy efficiency, fuel and energy supply security, competitive fuel and energy markets development, and reduction of the energy sector’s environmental impact. PEP-30 assumes that electricity generation...
-
An Off-Body Narrowband and Ultra-Wide Band Channel Model for Body Area Networks in a Ferryboat Environment
PublikacjaIn the article an off-body narrowband and ultra-wide band channel model for body area networks in a ferryboat environment is described. Considering the limited number of publications there is a need to develop an off-body channel model, which will facilitate the design of radio links, both from the multimedia services provider and the security point of view, for body area networks in this atypical environment. A mobile heterogeneous...
-
Therapeutic Potential of Carnosine and Its Derivatives in the Treatment of Human Diseases
PublikacjaDespite significant progress in the pathogenesis, diagnosis, treatment, and prevention of cancer and neurodegenerative diseases, their occurrence and mortality are still high around theworld. The resistance of cancer cells to the drugs remains a significant problem in oncology today,while in the case of neuro-degenerative diseases, therapies reversing the process are still yet to be found. Furthermore, it is important to seek new...
-
Extracellular matrix metalloproteinase inducer (EMMPRIN) expression correlates positively with active angiogenesis and negatively with basic fibroblast growth factor expression in epithelial ovarian cancer
Publikacja -
Gene copy numbers of HER family in breast cancer
Publikacja -
p53 Gene status in relation to ex vivo chemosensitivity of non-small cell lung cancer
Publikacja -
Antitumor Activity of Triazine Mimic Antibiotics for DNA-binding Implications (Impressive Activity in Vitro Against a Variety of Tumor Types in the NCI-60 Screen): NSC 710607 To Fight HCT-116 Human Colon Carcinoma Cell Lines in Vivo Using the Hollow Fiber Assay and Xenograft Mouse Models
PublikacjaPurpose Successful clinical applications of DNA-directed selective cytotoxic agents disrupt the vital replication/transcription processes and ultimately lead to cancer cell death. This study aimed to examine the growth screen of two lead triazine compounds in a number of cell lines and xenografts and to develop anticancer agents with noncovalent binding affinity bringing fewer side effects. Methods The NCI initial hollow...
-
DNA methylation analysis of benign and atypical meningiomas: correlation between RUNX3 methylation and WHO grade
Publikacja -
Novel therapeutic compound acridine–retrotuftsin action on biological forms of melanoma and neuroblastoma
PublikacjaPURPOSE: As a continuation of our search for anticancer agents, we have synthesized a new acridine-retrotuftsin analog HClx9-[Arg(NO2)-Pro-Lys-Thr-OCH3]-1-nitroacridine (named ART) and have evaluated its activity against melanoma and neuroblastoma lines. Both tumors develop from cells (melanocytes, neurons) of neuroectodermal origin, and both are tumors with high heterogeneity and unsatisfactory susceptibility to chemotherapies....
-
Cancer immune escape: the role of antigen presentation machinery
PublikacjaThe mechanisms of antigen processing and presentation play a crucial role in the recognition and targeting of cancer cells by the immune system. Cancer cells can evade the immune system by downregulating or losing the expression of the proteins recognized by the immune cells as antigens, creating an immunosuppressive microenvironment, and altering their ability to process and present antigens. This review focuses on the mechanisms...
-
Comparison and Analysis of Service Selection Algorithms
PublikacjaIn Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...
-
Automated Valuation Model based on fuzzy and rough set theory for real estate market with insufficient source data
PublikacjaObjective monitoring of the real estate value is a requirement to maintain balance, increase security and minimize the risk of a crisis in the financial and economic sector of every country. The valuation of real estate is usually considered from two points of view, i.e. individual valuation and mass appraisal. It is commonly believed that Automated Valuation Models (AVM) should be devoted to mass appraisal, which requires a large...
-
CURRENT SITUATION ON THE POLAND REAL ESTATE MARKET
PublikacjaIn recent years the polish real estate market has been characterised by a significant increase in supply and demand. This was facilitated by a number of macroeconomic factors. In recent years, housing has been commissioned as 30 years ago. Therefore, the depth analysis issue of the causes and consequences for the Polish economy of these trends is now relevant. Among the reasons are significant economic growth, low interest rates...
-
The investment process in the power supply industry
PublikacjaThe basis for power supply industry programming in a market economy should be the principle of sustainable development, which must take into account maintaining an adequate level of energy security on the one hand, and the aim to preserve the maximum degree of non-renewable resources on the other hand. Therefore, the overriding aim should be a strive to meet the current and prospective demand for energy and fuel, in conjugation...
-
An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks
PublikacjaHandwriting biometrics applications in e-Security and e-Health are addressed in the course of the conducted research. An automated graphomotor analysis method for the dynamic electronic representation of the handwritten signature authentication was researched. The developed algorithms are based on dynamic analysis of electronically handwritten signatures employing neural networks. The signatures were acquired with the use of the...
-
Selection of an artificial pre-training neural network for the classification of inland vessels based on their images
PublikacjaArtificial neural networks (ANN) are the most commonly used algorithms for image classification problems. An image classifier takes an image or video as input and classifies it into one of the possible categories that it was trained to identify. They are applied in various areas such as security, defense, healthcare, biology, forensics, communication, etc. There is no need to create one’s own ANN because there are several pre-trained...
-
Digital Public Service Innovation: Framework Proposal
PublikacjaThis paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....
-
Chromatographic analyses of Lavandula angustifolia and Rosmarinus officinalis extracts and their biological effects in mammalian cells and cell-free systems
PublikacjaKnowledge of biological properties of natural compounds allows to understand their therapeutic value, efficacy and security. We investigated: composition of Lavandula angustifolia (LA) and Rosmarinus officinalis (RO) extracts, their antioxidant capacity, cytotoxicity and genotoxicity, their DNA-protective potential against DNA damage induced in hamster V79 cells by several genotoxins or in plasmid DNA by Fe2+ ions and activity...
-
Weryfikacja struktur baz wiedzy systemu agentowego do oceny technologii informatycznych
PublikacjaRozdział dokumentuje przebieg i wyniki weryfikacji opracowywanego w Zakładzie Zarządzania Technologiami Informatycznymi modelu systemu wieloagentowego do oceny technologii informatycznych. Wykorzystanie tego modelu (zaprojektowanego w oparciu o ontologie i zasoby baz wiedzy) ma docelowo wspomagać procesy decyzyjne z zakresu doboru technologii informatycznych dla danej organizacji. Dla potrzeb jego weryfikacji wykorzystano dane...
-
Concrete-domain reasoning techniques in knowledge cartography
PublikacjaWiele zjawisk w świecie rzeczywistym opisujemy korzystając z liczb i symboli. W ramach naszej pracy jako punkt wyjścia traktujemy podejście kartograficzne opracowane na potrzeby wnioskowania z ontologii opartych na logice opisowej i pozwalające na efektywne przetwarzanie baz wiedzy zwierających dużą liczbę osobników. Niniejszy artykuł przedstawia rozszerzenie podejścia kartograficznego pozwalające na wnioskowanie z wartości symbolicznych,...
-
Wnioskowanie z danych zapisanych w zewnętrznych źródłach w systemie zarządzania wiedzą
PublikacjaRozdział prezentuje proces wnioskowania z danych przechowywanych w zewnętrznych źródłach. W procesie tym wykorzystywane są dwie nowe metody: metoda semantycznego wzbogacania źródeł - SED (Semantic Enrichment of Data) oraz wykorzystująca ją metoda wnioskowania z danych zewnętrznych - RED (Reasoning over External Data). Obie te metody zostały w niniejszym rozdziale przedstawione. Metoda SED służy do opisania zewnętrznych źródeł danych...
-
Numerical simulation of the influence of the selected factors on the performance of a concrete road barrier H2/W5/B
PublikacjaThis paper discuss the influence of selected factors on the performance of a concrete road barrier H2/W5/B. Modelling techniques of a concrete road safety system were briefly discussed. Comparison to the full scale crash test results has been shown. The concrete road safety barrier has been investigated for evaluation of the overall damage after collision under various initial conditions. The failure assessment criterion has been...
-
SPECYFIKA OBLIGACJI ZAMIENNYCH EMITOWANYCH PRZEZ SPÓŁKI PUBLICZNE
PublikacjaUpublicznienie rynku instrumentów dłużnych przedsiębiorstw w Polsce umożliwiło spółkom bardziej efektywne pozyskiwanie środków finansowych poprzez zaciąganie długu u wierzycieli detalicznych, równolegle z istniejącą już możliwością pozyskiwania kapitałów własnych. Rynek ten otworzył także spółkom publicznym drogę do emisji obligacji zamiennych, które z kolei bez obecności instrumentów udziałowych emitenta na rynku publicznym, stają...
-
Zarządzanie zaufaniem w bezprzewodowych sieciach czujników - studium przypadku
PublikacjaW artykule przedstawiono studium przypadku dotyczące zastosowania bezprzewodowej sieci czujników do wspomagania pacjenta z nadwagą w jego środowisku domowym. Przyjęto, że sieć wykorzystuje metodę rozproszonego zarządzania zaufaniem i pokazano, że metoda ta umożliwia wykrycie i izolację czujników realizujących działania sprzeczne z polityką sieci. Ilościowe oszacowanie czasu niezbędnego do wykrycia takich...
-
Automated Reasoning Based User Interface
PublikacjaMotivation: The ability to directly trace how requirements are implemented in a software system is crucial in domains that require a high level of trust (e.g. medicine, law, crisis management). This paper describes an approach that allows a high level of traceability to be achieved with model-driven engineering supported by automated reasoning. The paper gives an introduction to the novel, automated user interface synthesis in...
-
Damage Detection Strategies in Structural Health Monitoring of Overhead Power Transmission System
PublikacjaOverhead power transmission lines, their supporting towers, insulators and other elements create a highly distributed system that is vulnerable to damage. Typical damage scenarios cover cracking of foundation, breakage of insulators, loosening of rivets, as well as cracking and breakage of lines. Such scenarios may result from various factors: groundings, lightning strikes, floods, earthquakes, aeolian vibrations, conductors galloping,...
-
The fast identification of explosives, natcotics and other chemicals carried on board of ships or transported in containers
PublikacjaThe fast identification of explosives, narcotics and other chemicals carried on board of ships or transported in containers to the harbors is an important problem of maritime security. Raman spectroscopy is an advanced technique used in state-of-the art laboratories for fast identification of chemicals. No sample preparation is required, and identification can be carried out through transparent packing, such as plastic or glass,...
-
Oxygen vacancy-enriched V2O5·nH2O nanofibers ink for universal substrates-tolerant and multi means-integratable NH3 sensing
PublikacjaUniversal substrates-tolerant and multi means-integratable ammonia (NH3) sensing is highly desired in future Internet of Things in environmental monitoring, food security and early diagnosis of human diseases, however, is still less than satisfactory. Here, an oxygen vacancy-governed NH3 sensing has been developed with V2O5·nH2O nanofibers (NFs) ink, via combined thermal decomposition of ammonium metavanadate and dilution. As-obtained...
-
Privacy-Preserving, Scalable Blockchain-Based Solution for Monitoring Industrial Infrastructure in the Near Real-Time
PublikacjaThis paper proposes an improved monitoring and measuring system dedicated to industrial infrastructure. Our model achieves security of data by incorporating cryptographical methods and near real-time access by the use of virtual tree structure over records. The currently available blockchain networks are not very well adapted to tasks related to the continuous monitoring of the parameters of industrial installations. In the database...
-
Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons
PublikacjaRecent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...
-
Tracking of the broadband source of the underwater noise in the very shallow water conditions
PublikacjaThe paper contains the result s, both theoretical and experimental , connected with the tracking of the underwater noise source as small ships, pontoon , diver and so on. The pro blem of security in the shallow water area is the challenge for underwater acousticians. In this paper there is take n into account the detection of the sources that move on the surface of the sea or underwater in shallow...