Filtry
wszystkich: 1433
wybranych: 837
-
Katalog
- Publikacje 837 wyników po odfiltrowaniu
- Czasopisma 299 wyników po odfiltrowaniu
- Konferencje 82 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 36 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Kursy Online 11 wyników po odfiltrowaniu
- Dane Badawcze 159 wyników po odfiltrowaniu
Filtry wybranego katalogu
Wyniki wyszukiwania dla: SECURITY ONTOLOGY
-
L16 Nutritional Status of Patients with Huntington Disease: Correlations Between Macro- And Micronutrient intake and Severity of HD
Publikacja -
Metody formułowania ontologicznych zapytań
PublikacjaArtykuł dotyczy problemu wydobywania danych wyrażonych w postaci ontologii opisanej językiem Web Ontology Language. Dane takie mogą być wydobywane przy użyciu ontologicznych zapytań. Artykuł przedstawia rodzaje języków umożliwiających formułowanie tego rodzaju zapytań. Ontologiczne zapytania mogą być formułowane przez użytkowników podobnie jak zapytania w wyszukiwarkach internetowych tworzone w celu znajdowania stron internetowych....
-
Association of LBX1 Gene Methylation Level with Disease Severity in Patients with Idiopathic Scoliosis: Study on Deep Paravertebral Muscles
Publikacja -
Methylation of Estrogen Receptor 1 Gene in the Paraspinal Muscles of Girls with Idiopathic Scoliosis and Its Association with Disease Severity
Publikacja -
Koncepcja zastosowania systemów agentowych do oceny technologii informatycznych
PublikacjaW pracy przedstawiono koncepcję wykorzystania systemów agentowych do oceny technologii informatycznych. Praca zawiera opis koncepcji oraz przedstawia możliwości wykorzystania narzędzi informatycznych mogących znaleźć zastosowanie do implementacji i weryfikacji proponowanego rozwiązania. Praca jest częścią wspólnych badań nad tworzeniem rozwiązań do oceny technologii informatycznych, które obejmują wykorzystanie ocen eksperckich...
-
S-Modules - An Approach to Capture Semantics fo Modularized DL Knowledge Bases
PublikacjaModularity of ontologies has been recently recognized as a key requirement for collaborative ontology engineering and distributed ontology reuse. Partitioning of an ontology into modules naturally gives rise to development of module processing methods. In this paper we describe an algebra of ontology modules developed during our work on a Knowledge Base Management System called RKaSeA. The idea differs from other algebras in the...
-
Concept of the agent system for the information technology evaluation
PublikacjaIn this paper the concept of the agent system for the information technology evaluation has been presented. This article includes the concept description and shows abilities of using software tools which can be applicable to implementation and verification of proposed solution. The article is the part of common researches over creation solutions for information technology evaluation which range over using expert's evaluation and...
-
Angiotensin converting enzyme gene polymorphism is associated with severity of coronary artery disease in men with high total cholesterol levels
Publikacja -
Sleepless in Solitude—Insomnia Symptoms Severity and Psychopathological Symptoms among University Students during the COVID-19 Pandemic in Poland
Publikacja -
Assessing Food Insecurity and Its Drivers among Smallholder Farming Households in Rural Oyo State, Nigeria: The HFIAS Approach
Publikacja -
Algorithms for processing and visualization of Critical Infrastructure security data as well as simulation and analysis of threats = Algorytmy przetwarzania i wizualizacji danych dotyczących bezpieczeństwa infrastruktur krytycznych oraz symulacji i analizy zagrożeń
PublikacjaRozprawa traktuje o algorytmach przetwarzania danych dotyczących różnego rodzaju zagrożeń, w szczególności wyników analiz ryzyka infrastruktur krytycznych, pozwalających na przestrzenną analizę tych danych w kontekście geograficznym za pomocą dedykowanego Systemu Informacji Przestrzennej. Prezentowane metody analizy zgrupowań Infrastruktur Krytycznych oraz propagacji ich zagrożeń wykorzystują wyniki syntetycznej analizy podatności...
-
Knowledge base views
PublikacjaThe paper introduces an extension to the NeeK language. In the current shape NeeK allows for selection of fragments of a given ontology. The selected part is automatically mapped to a database schema by Data Views implementation. Experience with a real system using Data Views has shown that the resulting database schema does not necessarily reflect the needs of the business logic of an application that uses a specific Data View....
-
Syntactic modular decomposition of large ontologies with relational database
PublikacjaSupport for modularity allows complex ontologies to be separated into smaller pieces (modules) that are easier to maintain and compute. Instead of considering the entire complex ontology, users may benefit more by starting from a problem-specific set of concepts (signature of problem) from the ontology and exploring its surrounding logical modules. Additionally, an ontology modularization mechanism allows for the splitting up of...
-
Ontological Model for Contextual Data Defining Time Series for Emotion Recognition and Analysis
PublikacjaOne of the major challenges facing the field of Affective Computing is the reusability of datasets. Existing affective-related datasets are not consistent with each other, they store a variety of information in different forms, different formats, and the terms used to describe them are not unified. This paper proposes a new ontology, ROAD, as a solution to this problem, by formally describing the datasets and unifying the terms...
-
Logika opisowa jako język modelowania oprogramowania
PublikacjaW referacie pokazano zastosowanie logiki opisowej do opisu wybranych ontologii pojawiajcych si w inynierii oprogramowania, wymagajcych wsparcia ze strony inynierii wiedzy. Omówione zagadnienia to: inynieria wymaga, opis architektury oprogramowania wysokiego poziomu, opis projektu systemu i ontologia kodu programu. Wskazano zastosowanie systemów wnioskujcych (ang. knowledge reasoner) do automatycznego odkrywania wiedzy w systemach...
-
Association between the seroprevalence of antibodies against seasonal alphacoronaviruses and SARS-CoV-2 humoral immune response, Covid-19 severity, and influenza vaccination.
Publikacja -
Clinical Course and Severity of COVID-19 in 940 Infants with and without Comorbidities Hospitalized in 2020 and 2021: The Results of the National Multicenter Database SARSTer-PED
Publikacja -
Exploring ontological approach for user requirements elicitation in design of online virtual agents
PublikacjaEffective user requirements elicitation is a key factor for the success of software development projects. There are many qualitative and quantitative research studies that promulgate particular methods and show the application of user requirements elicitation in particular domains. However, few try to eliminate the burden of ambiguity in gathered data, naturally occurring in different groups of stakeholders. This paper deals with...
-
The effect of exogenous application of methyl jasmonate on the lipid and carbohydrate content and composition of winter triticale (Triticosecale Wittm.) grain and the severity of fungal infections in triticale plants and grain
PublikacjaKernels of winter triticale (Triticosecale Wittm. cv. Dinaro) were analyzed. In the autumn of 2015, the effect of methyl jasmonate (MJ) on the germination of triticale kernels and the development of triticale seedlings was analyzed in a laboratory before kernels were sown in experimental plots. Kernels harvested from plots in August 2016 were analyzed to determine their lipid and carbohydrate content and composition and the severity...
-
The Influence of SARS-CoV-2 Variants B.1.1.7 and B.1.617.2 on a Different Clinical Course and Severity of COVID-19 in Children Hospitalized in 2021 Compared With 2020
Publikacja -
Knowledge-Grid Modelling for Academic Purposes
PublikacjaNowadays, we face a huge amount of data and information sharing on the Web by different users worldwide. A multidimensional perspective in describing a university ontology seems to be very important for the modelling of higher education resources. This paper proposes a multi-dimensional knowledge model, designed to distribute and manage knowledge resources efficiently. We propose our model as the foundation of an advanced knowledge...
-
Ontological Modeling for Contextual Data Describing Signals Obtained from Electrodermal Activity for Emotion Recognition and Analysis
PublikacjaMost of the research in the field of emotion recognition is based on datasets that contain data obtained during affective computing experiments. However, each dataset is described by different metadata, stored in various structures and formats. This research can be counted among those whose aim is to provide a structural and semantic pattern for affective computing datasets, which is an important step to solve the problem of data...
-
Improving the Performance of Ontological Querying by using a Contextual Approach
PublikacjaIn the paper we present the results of experiment we performed to determine whether a contextual approach may be used to increase the performance of querying a knowledge base. For the experiments we have used a unique setting where we put much effort in developing a contextual and a non-contextual ontology which are as much close counterparts as possible. To achieve this we created a contextual version...
-
Approaching Secure Industrial Control Systems
PublikacjaThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Metody reprezentacji i przetwarzania wiedzy w warunkach niepewności w ontologiach opartych na logice opisowej
PublikacjaW rozprawie przeanalizowano różne istniejące podejścia do problemu zaufania do ontologii, a zwłaszcza te dotyczące wiarygodności źródeł i informacji w nich zawartych. Omówione rozwiązania stosują podejście numeryczne do problemu zaufania, które przysparza jednak mnóstwa problemów związanych z modelowaniem procesu przetwarzania zapytań, jak również z samą interpretacją uzyskanych wyników.W pracy zaprezentowano model systemu zarządzania...
-
Secure access control and information protection mechanisms in radio system for monitoring and acquisition of data from traffic enforcement cameras
PublikacjaThe study presents the architecture of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short: RSMAD), particularly concerning access control and protection of confidential data. RSMAD security structure will be discussed in relation to network security issues. Additionally, the paper presents the results of the work associated with the modelling of potential threats to system security.
-
Extracting concepts from the software requirements specification using natural language processing
PublikacjaExtracting concepts from the software require¬ments is one of the first step on the way to automating the software development process. This task is difficult due to the ambiguity of the natural language used to express the requirements specification. The methods used so far consist mainly of statistical analysis of words and matching expressions with a specific ontology of the domain in which the planned software will be applicable....
-
Semantic OLAP with FluentEditor and Ontorion Semantic Excel Toolchain
PublikacjaSemantic technologies appear as a step on the way to creating systems capable of representing the physical world as real time computational processes. In this context, the paper presents a toolchain for an ontology based knowledge management system. It consists of the ontology editor, FluentEditor and the distributed knowledge representation system, Ontorion. FluentEditor is a comprehensive tool for editing and manipulating complex...
-
Psychosocial risks associated with the profession of train driver
PublikacjaExcellent competencies as well as a good physical and mental health are required in train drivers’ profession. Despite the changes in the structure of employment the train drivers above 46 years and job tenure longer than 30 years are the largest group. The generation gap is becoming more pronounced, and its fulfilment will not be easy. It is related not only to training of new personnel but also promotion of healthy work environment...
-
A Review of Standards with Cybersecurity Requirements for Smart Grid
PublikacjaAssuring cybersecurity of the smart grid is indispensable for the reliable operation of this new form of the electricity network. Experts agree that standardised solutions and practices should be applied in the first place. In recent years many new standards for smart grids have been published, which paradoxically results in the difficulty of finding a relevant publication in this plethora of literature. This paper presents results...
-
Identification of Emotional States Using Phantom Miro M310 Camera
PublikacjaThe purpose of this paper is to present the possibilities associated with the use of remote sensing methods in identifying human emotional states, and to present the results of the research conducted by the authors in this field. The studies presented involved the use of advanced image analysis to identify areas on the human face that change their activity along with emotional expression. Most of the research carried out in laboratories...
-
Modelling the malware propagation in mobile computer devices
PublikacjaNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
Evaluation of Professional Demands and Financial Reward Through the Perception of Police Managers
PublikacjaThe aim of the study was to examine the relationship between job demands and salary in the subjective perception of mid-level police managers. An occupational stress model in which effort spent on job demands are not balanced by the received reward, was adopted. The study comprised 51 police officers (4 women). The partial least squares method was used for the analysis, and the SmartPLS 2.0 program was applied. The income and...
-
Impact of Work on the Well-Being of Police Officers and Firefighters
PublikacjaWork is one of the most important spheres of human functioning and has a significant impact on individual overall well-being. The purpose of this study is to assess the positive and negative impact of the work of police officers and firefighters on their well-being in different spheres of life. In particular, the study examines the relationship between the type of occupation and the elements that generate a feeling of well-being,...
-
Fatigue and Professional Burnout in Police Officers and Firefighters
PublikacjaExcessive demands, work overload and the working time arrangements are an important cause of burnout and fatigue in employees. Specific working time arrangements are characteristic of the internal security services, such as police officers and firefighters. This applies to both the ordering of day and night shifts and the length of shifts. Depletion of personal resources is a common component for acute fatigue and burnout. However,...
-
The Effectiveness of Basic Resuscitation Activities Carried out by Combat Paramedics of the Police, as Exemplified by Polish Counterterrorist Units
PublikacjaThe tasks carried out by Police officers are often accompanied by dangerous situations that threaten the life and health of the people involved, the police themselves, and bystanders. It concerns especially counter-terrorism police units whose activities are aimed at terrorists and particularly dangerous criminals, and their course is violent and aggressive. In conjunction with the inability to bring civilian rescue services into...
-
Review of Cybersecurity Assessment Methods: Applicability Perspective
PublikacjaCybersecurity assessments are crucial in building the assurance that vital cyberassets are effectively protected from threats. Multiple assessment methods have been proposed during the decades of the cybersecurity field. However, a systematic literature search described in this paper reveals that their reviews are practically missing. Thus, the primary objective of this research was to fulfil this gap by comprehensively identifying...
-
Clustering Context Items into User Trust Levels
PublikacjaAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
The methods of secure data transmission in the KNX system
PublikacjaThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Ontologically Aided Rule Model for the Implementation of ITIL Processes
PublikacjaThe implementation of ITIL processes in IT organizations can be seen as a set of interdependent projects. The sequence of the ITIL implementation relies on such parameters as scope, depth, the capability of processes and the maturity of the organization. These factors can form common patterns of ITIL implementation that might be expressed as rules. Also-to semantically reinforce such a model in its predictiveness and replicativeness-the...
-
Measures for Evaluation of Structure and Semantics of Ontologies
PublikacjaArtykuł przedstawia zagadnienie miar jakości ontologii ze szczególnym uwzględnieniem ich podziału na syntaktyczne (strukturalne) i semantyczne. Na tym tle przedstawione jest nowe podejście do pomiaru właściwości semantycznych ontologii bazujące na kartografii wiedzy.
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublikacjaAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Edible black ant Smith (Carebara vidua) as human food – A systematic review
PublikacjaMeeting food security is one of the major global challenges to ensure sufficient supply of food for current and future generations, considering increasing population growth and climate change issues. Consequently, the consumption of edible insects as an alternative food source has recently gained global attention for combating global food insecurity. The present review aims to provide information on the recent progress in consumption...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publikacjaartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Feature extraction in detection and recognition of graphical objects
PublikacjaDetection and recognition of graphic objects in images are of great and growing importance in many areas, such as medical and industrial diagnostics, control systems in automation and robotics, or various types of security systems, including biometric security systems related to the recognition of the face or iris of the eye. In addition, there are all systems that facilitate the personal life of the blind people, visually impaired...
-
Architektura bezpieczeństwa systemu netBaltic
PublikacjaW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
PublikacjaW rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...
-
New RFID readers for scalable RFID system
PublikacjaRFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...