Filtry
wszystkich: 13508
wybranych: 4526
-
Katalog
- Publikacje 4526 wyników po odfiltrowaniu
- Czasopisma 493 wyników po odfiltrowaniu
- Konferencje 4 wyników po odfiltrowaniu
- Wydawnictwa 3 wyników po odfiltrowaniu
- Osoby 179 wyników po odfiltrowaniu
- Wynalazki 4 wyników po odfiltrowaniu
- Projekty 40 wyników po odfiltrowaniu
- Aparatura Badawcza 3 wyników po odfiltrowaniu
- Kursy Online 6164 wyników po odfiltrowaniu
- Wydarzenia 18 wyników po odfiltrowaniu
- Dane Badawcze 2074 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: DEFENSIVE SET
-
Affronter la distance et la séparation : l'utilisation des médias sociaux par les migrants dans leurs relations interpersonnelles
PublikacjaL'augmentation progressive de la mobilité, de l'interconnectivité et de l'instabilité, la transformation du travail et de l'emploi et celle de la communication (Castells, 2010) ont contribué à l’émergence d’une déracinés et séparés de leur foyer évoluent vers de nouvelles perspectives les migrants comme des sujets mobiles et interconnectés qui, grâce aux TIC, peuvent entretenir des relations et des connexions à distance les...
-
Michał Savonarola o trudnym porodzie, „Ad mulieres Ferrarienses de regimine pregnantium et noviter natorum usque ad septennium
Publikacja -
Letter to the editor on the article “Alteration of redox status by commonly used antimalarial drugs in the north-western region of Nigeria” by Muhammad A et al.
Publikacja -
Problemy z powłokami antykorozyjnymi na elementach wyposażenia obiektów mostowych
PublikacjaOpisano problem wadliwości zabezpieczenia antykorozyjnego w zakresie malarskich powłok ochronno-dekoracyjnych wykonywanych na stalowych elementach barier zabezpieczonych uprzednio poprzez ocynkowanie metodą zanurzeniową na gorąco. Wykorzystując przykłady pochodzące z różnych obiektów przedstawiono powtarzający się problem delaminacji powłok malarskich, niezależny od rodzaju zastosowanych wyrobów lakierniczych oraz znacznego rozwoju...
-
Problemy z powłokami antykorozyjnymi na elementach wyposażenia obiektów mostowych
PublikacjaPrzedstawiono problem wadliwości zabezpieczenia antykorozyjnego w zakresie malarskich powłok ochronno - dekoracyjnych wykonywanych na stalowych elementach barier zabezpieczonych uprzednio poprzez ocynkowanie metodą zanurzeniową. Wykorzystując przykłady pochodzące z różnych obiektów przedstawiono powtarzający się problem delaminacji powłok malarskich, niezależny od rodzaju zastosowanych wyrobów lakierniczych oraz znacznego rozwoju...
-
Analyzing the Impact of Simulated Multispectral Images on Water Classification Accuracy by Means of Spectral Characteristics
PublikacjaRemote sensing is widely applied in examining the parameters of the state and quality of water. Spectral characteristics of water are strictly connected with the dispersion of electromagnetic radiation by suspended matter and the absorp-tion of radiation by water and chlorophyll a and b.Multispectral sensor ALI has bands within the ranges of electromagnetic radia-tion: blue and infrared, absent in sensors such as Landsat, SPOT,...
-
Searching for the primary metabolic alterations of polycystic ovary syndrome by application of the untargeted metabolomics approach
PublikacjaDespite a large number of studies, the pathogenesis of polycystic ovary syndrome (PCOS) still remains unexplained. In light of ambiguous observations reported in metabolomics, there is a need to carry out studies focusing on confirming the discriminating power of the proposed metabolomics biomarkers. Our research aimed to perform a validation study of metabolites detected in our previous study from serum samples, on the new set...
-
T-colorings, divisibility and circular chromatic number
PublikacjaLet T be a T-set, i.e., a finite set of nonnegative integers satisfying 0 ∈ T, and G be a graph. In the paper we study relations between the T-edge spans espT (G) and espd⊙T (G), where d is a positive integer and d ⊙ T = {0 ≤ t ≤ d (max T + 1): d |t ⇒ t/d ∈ T} . We show that espd⊙T (G) = d espT (G) − r, where r, 0 ≤ r ≤ d − 1, is an integer that depends on T and G. Next we focus on the case T = {0} and show that espd⊙{0} (G) =...
-
2-outer-independent domination in graphs
PublikacjaWe initiate the study of 2-outer-independent domination in graphs. A 2-outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of V(G)\D has at least two neighbors in D, and the set V(G)\D is independent. The 2-outer-independent domination number of a graph G is the minimum cardinality of a 2-outer-independent dominating set of G. We show that if a graph has minimum degree at least two,...
-
An upper bound for the double outer-independent domination number of a tree
PublikacjaA vertex of a graph is said to dominate itself and all of its neighbors. A double outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D, and the set V(G)\D is independent. The double outer-independent domination number of a graph G, denoted by γ_d^{oi}(G), is the minimum cardinality of a double outer-independent dominating set of G. We prove...
-
Entropy measures of heart rate variability for short ECG datasets in patients with congestive heart failure
PublikacjaWe investigated the usefulness of entropy measures calculated for short ECG series in distinguishing healthy subjects from patients with congestive heart failure (CHF). Four entropy measures were tested: Approximate Entropy (ApEn), Sample Entropy (SampEn), Fuzzy Entropy (FuzzyEn) and Permutation Entropy (PE), each computed for ECG series of 1000, 500, 250 and 100 RR intervals. We found that with a reduction of the data set length...
-
Entropy Measures of heart rate variability for short ECG datasets in patients with congestive heart failure
PublikacjaWe investigated the usefulness of entropy measures calculated for short ECG series in distinguishing healthy subjects from patients with congestive heart failure (CHF). Four entropy measures were tested: Approximate Entropy (ApEn), Sample Entropy (SampEn), Fuzzy Entropy (Fuzzy En) and Permutation Entropy (PE), each computed for ECG series of 1000, 500, 250 and 100 RR intervals. We found that with a reduction of the data set length...
-
Redukcja czasu analizy MZP przez ograniczenie rozmiaru rozwiązania
PublikacjaAnaliza drzew niezdatności jest uznaną metodą analizy bezpieczeństwa systemów. Notacja ECSDM pozwala definiować zależności czasowe między zdarzeniami drzewa oraz przeanalizować je w celu określenia zależności pomiędzy zdarzeniami z Minimalnych Zbiorów Przyczyn (MZP). Dzięki wprowadzeniu klasyfikacji zdarzeń z MZP można wyodrębnić zależności czasowe istotne dla zapobiegania wywoływania hazardu przez konkretny MZP. Pozostałe zależności...
-
Weakly convex domination subdivision number of a graph
PublikacjaA set X is weakly convex in G if for any two vertices a; b \in X there exists an ab–geodesic such that all of its vertices belong to X. A set X \subset V is a weakly convex dominating set if X is weakly convex and dominating. The weakly convex domination number \gamma_wcon(G) of a graph G equals the minimum cardinality of a weakly convex dominating set in G. The weakly convex domination subdivision number sd_wcon (G) is the minimum...
-
Ships - inspiring objects in architecture
PublikacjaSea-going vessels have for centuries fascinated people, not only those who happen to work at sea, but first and foremost, those who have never set foot aboard a ship. The environment in which ships operate is reminiscent of freedom and countless adventures, but also of hard and interesting maritime working life. The famous words of Pompey: “Navigare necesseest, vivere non estnecesse” (sailing is necessary, living – is not necessary),...
-
Hybrid constructed wetlands for the National Parks in Poland - a case study, requirements, dimensioning, preliminary results
PublikacjaWater and wastewater management, especially in rural areas, greatly affects loads of nutrients discharged to the Baltic Sea. In Poland, this management is unbalanced because of the dispersed development and in many locations con struction of sewerage system is uneconomic or even impossible. For this reason, a significant part of sewage from single-family houses in rural areas must be discharged into domestic sewage systems. The...
-
Design of an Autonomous IoT Node Powered by a Perovskite-Based Wave Energy Converter
PublikacjaThis paper presents the results of experimental research focused on wave energy harvesting and its conversion to power Internet of Things (IoT) devices. The harvesting and conversion process was performed using a wave energy converter (WEC) consisting of a lead zirconate titanate piezoelectric ceramic perovskite material and a prototype power electronic circuit. The designed WEC was considered as a power supply for an end node...
-
Electro-chemo-mechanical properties in nanostructured Ca-doped ceria (CDC) by field assisted sintering
PublikacjaRecent investigations have shown that highly oxygen defective cerium oxides generate non-classical electrostriction that is superior to lead-based ferroelectrics. In this work, we report the effect of field-assisted spark plasma sintering (SPS) on electro-chemo-mechanical properties of calcium doped ceria (CDC). Nanometric powders of Ca.10 nm are rapidly consolidated to form polycrystalline nanostructures with a high degree of...
-
Ni-WC/Al2O3 and Ni-WC/MgWO4/MgAl2O4 catalysts for resource recovery via pyrolysis combined with the dry reforming of plastics (PCDR)
PublikacjaPlastic waste (PW) is currently one of an environmental threat. Despite the increasing share of recycled plastics, their disposal remains high. Therefore, there is a high demand for new PW management systems. Among them, pyrolysis combined with dry reforming (PCDR) is an advantageous solution because it allows for resource recovery in the form of gas and liquid fuels, with simultaneous utilization of CO2. To date, catalysts based...
-
Model of Rules for IT Organization Evolution
PublikacjaThe aim of this paper is to introduce the Model of Rules for IT Organization Evolution which shall be in compliance with the Generic IT Organization Evolution Model. Due to its general nature, a set of practical adjustments is proposed in order to adapt the Generic Model to the IT Service Management domain. Further, two sets of rules describing the evolution of the IT Service Management area are defined based on two types of rules...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublikacjaIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
Recognition of Emotions in Speech Using Convolutional Neural Networks on Different Datasets
PublikacjaArtificial Neural Network (ANN) models, specifically Convolutional Neural Networks (CNN), were applied to extract emotions based on spectrograms and mel-spectrograms. This study uses spectrograms and mel-spectrograms to investigate which feature extraction method better represents emotions and how big the differences in efficiency are in this context. The conducted studies demonstrated that mel-spectrograms are a better-suited...
-
Weakly convex and convex domination numbers of some products of graphs
PublikacjaIf $G=(V,E)$ is a simple connected graph and $a,b\in V$, then a shortest $(a-b)$ path is called a $(u-v)$-{\it geodesic}. A set $X\subseteq V$ is called {\it weakly convex} in $G$ if for every two vertices $a,b\in X$ exists $(a-b)$- geodesic whose all vertices belong to $X$. A set $X$ is {\it convex} in $G$ if for every $a,b\in X$ all vertices from every $(a-b)$-geodesic belong to $X$. The {\it weakly convex domination number}...
-
A lower bound on the double outer-independent domination number of a tree
PublikacjaA vertex of a graph is said to dominate itself and all of its neighbors. A double outer-independent dominating set of a graph G is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D, and the set V(G)D is independent. The double outer-independent domination number of a graph G, denoted by gamma_d^{oi}(G), is the minimum cardinality of a double outer-independent dominating set of G. We...
-
Safety and efficacy of a Ventralight ST echo ps implant for a laparoscopic ventral hernia repair – a prospective cohort study with a one-year follow-up
Publikacjaing new products Thus, every mesh prior to introduction in clinical settings should be tested with a dedicated tacker to discover the proper fixation algorithm. The aim of the study was to assess the safety and efficacy of the Ventralight ST implant with an ECHO positioning system and a dedicated fixation device, the SorbaFix stapler, in a prospective cohort of patients. Material and methods. The study was a prospective single...
-
Correction: Białowiec, A., et al. The Oxygen Transfer Capacity of Submerged Plant Elodea densa in Wastewater Constructed Wetlands. Water, 2019, 11, 575
Publikacja -
An Excess Electron Bound to Magnesium Halides and Basic Grignard Compounds (RMgX and RMgR, R = Me, Et, Ph; X = F, Cl, Br)
Publikacja -
Bardoxolone Methyl Displays Detrimental Effects on Endothelial Bioenergetics, Suppresses Endothelial ET-1 Release, and Increases Endothelial Permeability in Human Microvascular Endothelium
Publikacja -
Porównanie wyników datowania metodami luminescencji (TL i OSL) próbek z wybranych profili lessowych Polski SE i Ukrainy NW
PublikacjaPrzeprowadzono datowanie dla wybranych pięciu profili lessowych, trzy pochodziły z Polski a dwa z Ukrainy. Datowaniu podlegało 89 próbek, przeprowadzono je metodami TL i OSL. W pracy zostały przedstawione statystyczne relacje między wspomnianymi metodami oraz między profilami glebowymi występującymi w danych okresach geologicznych.
-
Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej
PublikacjaStacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.
-
Graphs with isolation number equal to one third of the order
PublikacjaA set D of vertices of a graph G is isolating if the set of vertices not in D and with no neighbor in D is independent. The isolation number of G, denoted by \iota(G) , is the minimum cardinality of an isolating set of G. It is known that \iota(G) \leq n/3 , if G is a connected graph of order n, , distinct from C_5 . The main result of this work is the characterisation of unicyclic and block graphs of order n with isolating number...
-
Rola GIS w badaniach środowiska morskiego
PublikacjaŚrodowisko morskie nadal pozostaje „białą plamą” z punktu widzenia systemów GIS. Trudno jest znaleźć analogie pomiędzy cyfrowym modelem terenu a danymi batymetrycznymi, ponieważ odzwierciedlają one tylko jedno z możliwych obliczy środowiska morskiego, drugim bardzo ważnym, jest falowanie. Jednakże dopiero informacja wspólna o batymetrii i falowaniu jest naprawdę wartościowa dla ludzi korzystających z morza zawodowo. Mając do dyspozycji...
-
A Survey Investigating the Influence of Business Analysis Techniques on Software Quality Characteristics
PublikacjaBusiness analysis is recognized as one of the most important areas determining the outcome (success or failure) of a software project. In this paper we explore this subject further by investigating the potential impact of techniques applied in business analysis on essential software quality characteristics. We conducted a literature search for software quality models, analyzed the existing models and selected a subset of commonly...
-
Comparative Study of Self-Organizing Maps vs. Subjective Evaluation of Quality of Allophone Pronunciation for Nonnative English Speakers
PublikacjaThe purpose of this study was to apply Self-Organizing Maps to differentiate between the correct and the incorrect allophone pronunciations and to compare the results with subjective evaluation. Recordings of a list of target words, containing selected allophones of English plosive consonants, the velar nasal and the lateral consonant, were made twice. First, the target words were read from the list by 9 non-native speakers and...
-
Modified Preisach model of hysteresis in multi air gap ferrite core medium frequency transformer
PublikacjaThis article presents the modified Preisach model of hysteresis for a 3-phase medium frequency transformer in a 100 kW dual active bridge converter. The transformer magnetic core is assembled out of ferrite I-cores, which results in multiple parasitic air gaps. For this transformer, the hysteresis loops were measured and parameters of the Preisach model were determined. The Preisach distribution function is approximated with a...
-
Analysis of results of large-scale multimodal biometric identity verification experiment
PublikacjaAn analysis of a large set of biometric data obtained during the enrolment and the verification phase in an experimental biometric system installed in bank branches is presented. Subjective opinions of bank clients and of bank tellers were also surveyed concerning the studied biometric methods in order to discover and to explore relations emerging from the obtained multimodal dataset. First, data acquisition and identity verification...
-
The Potential of Greed for Independence
PublikacjaThe well-known lower bound on the independence number of a graph due to Caro and Wei can be established as a performance guarantee of two natural and simple greedy algorithms or of a simple randomized algorithm. We study possible generalizations and improvements of these approaches using vertex weights and discuss conditions on so-called potential functions p(G) : V(G) -> N_0 defined on the vertex set of a graph G for which suitably...
-
Inverse shadowing and related measures
PublikacjaWe study various weaker forms of the inverse shadowing property for discrete dynamical systems on a smooth compact manifold. First, we introduce the so-called ergodic inverse shadowing property (Birkhoff averages of continuous functions along an exact trajectory and the approximating one are close). We demonstrate that this property implies the continuity of the set of invariant measures in the Hausdorff metric. We show that the...
-
Decisional DNA and Optimization Problem
PublikacjaMany researchers have proved that Decisional DNA (DDNA) and Set of Experience Knowledge Structure (SOEKS or SOE) is a technology capable of gathering information and converting it into knowledge to help decision-makers to make precise decisions in many ways. These techniques have a feature to combine with different tools, such as data mining techniques and web crawlers, helping organization collect information from different sources...
-
Ground-based, Hyperbolic Radiolocation System with Spread Spectrum Signal - AEGIR
PublikacjaThe most popular radiolocation systems in the world (at present), is the American GPS (Global Positioning System). It is managed by the Department of Defense and there is always the possibility of the occasional inaccuracies or deliberate introduction of errors that prevent its use by the special services or armies of other countries than the U.S.A. This situation has spawned the need to develop an autonomous, ground-based radiolocation...
-
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Connection matrix theory for discrete dynamical systems
PublikacjaIn [C] and [F1] the connection matrix theory for Morse decomposition is developedin the case of continuous dynamical systems. Our purpose is to study the case of discrete timedynamical systems.
-
Wireless Link Selection Methods for Maritime Communication Access Networks—A Deep Learning Approach
PublikacjaIn recent years, we have been witnessing a growing interest in the subject of communication at sea. One of the promising solutions to enable widespread access to data transmission capabilities in coastal waters is the possibility of employing an on-shore wireless access infrastructure. However, such an infrastructure is a heterogeneous one, managed by many independent operators and utilizing a number of different communication...
-
MACHINE LEARNING–BASED ANALYSIS OF ENGLISH LATERAL ALLOPHONES
PublikacjaAutomatic classification methods, such as artificial neural networks (ANNs), the k-nearest neighbor (kNN) and selforganizing maps (SOMs), are applied to allophone analysis based on recorded speech. A list of 650 words was created for that purpose, containing positionally and/or contextually conditioned allophones. For each word, a group of 16 native and non-native speakers were audio-video recorded, from which seven native speakers’...
-
An Alternative Proof of a Lower Bound on the 2-Domination Number of a Tree
PublikacjaA 2-dominating set of a graph G is a set D of vertices of G such that every vertex not in D has a at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. Fink and Jacobson [n-domination in graphs, Graph theory with applications to algorithms and computer science, Wiley, New York, 1985, 283-300] established the following lower bound on the 2-domination...
-
On trees with double domination number equal to 2-domination number plus one
PublikacjaA vertex of a graph is said to dominate itself and all of its neighbors. A subset D subseteq V(G) is a 2-dominating set of G if every vertex of V(G)D is dominated by at least two vertices of D, while it is a double dominating set of G if every vertex of G is dominated by at least two vertices of D. The 2-domination (double domination, respectively) number of a graph G is the minimum cardinality of a 2-dominating (double dominating,...
-
Thermodynamic Cycles of Air Microturbine Power Plants Working on Biomass Fuels
PublikacjaThe gas turbine engine is modified to work as an air turbine set which consists, in the simplest arrangement, of a compressor, a heat exchanger and a turbine. Air is a working medium for both: the compressor and the turbine. This kind of air turbine set can be applied in power plants working on biomass fuels. In this solution we can burn fuels of varying parameters in the external combustion chamber without any harmful effects...
-
Bounds on the vertex-edge domination number of a tree
PublikacjaA vertex-edge dominating set of a graph $G$ is a set $D$ of vertices of $G$ such that every edge of $G$ is incident with a vertex of $D$ or a vertex adjacent to a vertex of $D$. The vertex-edge domination number of a graph $G$, denoted by $\gamma_{ve}(T)$, is the minimum cardinality of a vertex-edge dominating set of $G$. We prove that for every tree $T$ of order $n \ge 3$ with $l$ leaves and $s$ support vertices we have $(n-l-s+3)/4...
-
On trees attaining an upper bound on the total domination number
PublikacjaA total dominating set of a graph G is a set D of vertices of G such that every vertex of G has a neighbor in D. The total domination number of a graph G, denoted by γ_t(G), is the minimum cardinality of a total dominating set of G. Chellali and Haynes [Total and paired-domination numbers of a tree, AKCE International Journal of Graphs and Combinatorics 1 (2004), 69-75] established the following upper bound on the total domination...
-
Interpolation properties of domination parameters of a graph
PublikacjaAn integer-valued graph function π is an interpolating function if a set π(T(G))={π(T): T∈TT(G)} consists of consecutive integers, where TT(G) is the set of all spanning trees of a connected graph G. We consider the interpolation properties of domination related parameters.