Filtry
wszystkich: 8123
wybranych: 5358
-
Katalog
- Publikacje 5358 wyników po odfiltrowaniu
- Czasopisma 916 wyników po odfiltrowaniu
- Konferencje 83 wyników po odfiltrowaniu
- Wydawnictwa 5 wyników po odfiltrowaniu
- Osoby 177 wyników po odfiltrowaniu
- Projekty 37 wyników po odfiltrowaniu
- Laboratoria 4 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Aparatura Badawcza 2 wyników po odfiltrowaniu
- Kursy Online 167 wyników po odfiltrowaniu
- Wydarzenia 53 wyników po odfiltrowaniu
- Dane Badawcze 1320 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: LAW SEVERITY
-
Bankruptcy Law Severity for Debtors: Comparative Analysis Among Selected Countries
PublikacjaPurpose: The objective of this paper is to propose the new indicator of bankruptcy law severity for debtors (BLSI-Bankruptcy Law Severity Index). On the basis of this index we conducted comparative analysis of debtor/creditor friendliness of bankruptcy laws among 27 selected countries. Design/Methodology/Approach: In the research the following methods were used: analysis of legal acts, literature review and expert method. Findings:...
-
Lab security improvement using RFID technologies
PublikacjaTechnologia RFID stanowi nie tylko technologię bliźniaczą w stosunku do kodów paskowych, ale posiada również dodatkowe cechy takie jak zdalna identyfikacja przy użyciu fal radiowych. Technologia ta staje się coraz bardziej dostępna i koszty jej wdrożenia są coraz mniejsze. W artykule przedstawiono wykorzystanie technologii RFID do ochrony sprzętu laboratoryjengo przed kradzieżą. Zawarto opis laboratorium wyposażonego w urządzenia...
-
Anti-theft lab security system based on RFID
PublikacjaThe aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...
-
Tax law[w:] Polish Financial Law. Law: The Basic Concepts,
Publikacja -
The Effects of Roadside Hazards on Road Accident Severity
PublikacjaThe risk of becoming involved in an accident emerges when elements of the transport system do not operate properly (man – vehicle – road – roadside). The road, its traffic layout andsafety equipment have a critical impact on road user safety. This gives infrastructural work a priority in road safety strategies and programmes. Run-off-road accidents continue to be one of the biggest problems of road safety with consequences including...
-
Low Frequency Electromagnetic Interferences Impact on Transport Security Systems Used in Wide Transport Areas
Publikacja -
EVALUATION OF THE ENERGY SECURITY AS A COMPONENT OF NATIONAL SECURITY OF THE COUNTRY
Publikacja -
On UMTS security.
PublikacjaW artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.
-
Ways of Harmonising Polish Competition Law with the Competition Law of the EU
PublikacjaThis article discusses the harmonisation of laws within the EU focusing on the specific ways of achieving an approximation of the Polish legal system with European competition law. It identifies and gives an overview of three specific ways of harmonising national laws with EU antitrust provisions: (1) spontaneous (or bottom-up) harmonisation; (2) judicial harmonisation and; (3) legislative harmonisation by means of EU Directives....
-
Circulating suPAR as a biomarker of disease severity in children with proteinuric glomerulonephritis
Publikacja -
On the influence of the acceleration recording time on the calculation of impact severity indexes
PublikacjaThe paper concerns with the analysis of normative requirements pertaining to experimental setup of a crash test and its numerical modelling. An overview of parameters describing the collision of a vehicle with a road restraining system is presented. A short description of a concrete road safety barrier is presented. A brief description of numerical modelling procedures for crash tests is given as well. The parametric influence...
-
Application of the Regional Security Complex Theory for Security Analysis in the Persian Gulf
Publikacja -
Security and knowledge management
PublikacjaOmówiono zagadnienia związane z problemami bezpieczeństwa w obszarach technologicznego wspomagania zarządzania wiedzą.
-
Security of Web Services
PublikacjaArtykuł przedstawia zagadnienia związane tematycznie z Web Services. W szczególności dotyczy problemów związanych z zapewniwniem poufności i integralności danych. Zdefiniowano model bezpieczeństwa Web Services integrujący trzy główne technologie: SOAP, UDDI, WSDL.
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Metacognition increases the severity of depression through trait anxiety in a nonclinical population
Publikacja -
Winter severity and snowiness and their multiannual variability in the Karkonosze Mountains and Jizera Mountains
Publikacja -
A Robust Random Forest Model for Classifying the Severity of Partial Discharges in Dielectrics
PublikacjaPartial Discharges (PDs) are a common source of degradation in electrical assets. It is essential that the extent of the deterioration level of insulating medium is correctly identified, to optimize maintenance schedules and prevent abrupt power outages. Temporal PD signals received from damaged insulation, collected through the IEC-60270 method is the gold standard for PD detection. Temporal signals may be transformed to the frequency...
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublikacjaThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
A la recherche d’une coherence perdue – Possible Arguments for the Non-application of EU Law in Member States
PublikacjaThe European Union (EU) is an international organization which has a broad scope of competences that have been transferred to it by its Member States in the founding Treaties. The object of the article is to identify arguments raised, or that potentially might be raised, by national Constitutional Courts (and in the future possibly by other actors as well) to exclude in certain instances the application of EU law or EU jurisprudence...
-
Serum neurotrophin-3 and neurotrophin-4 levels are associated with asthma severity in children
Publikacja -
On some extensions of Murray's Law
PublikacjaThis paper cites the original Murray's law about optimal radii.Extensions to some class of non-newtonian flows that aredescribedby Ostwalda-de Waele model and newtonian flows foreliptical crosssections. A generalisation of Murray's law formultiobjectiveformulation is also given. It is shown that theoriginal formulation of optimal condition is a particular case ofmultiobjective formulation.
-
Chinese Law Research Guide
PublikacjaA journey of a thousand miles begins with a single step. This Research Guide will be the first step in your journey with Chinese law. China grows more important every day from a global perspective. However, studying and conducting research on Chinese law can be extremely challenging, especially if you do not know Mandarin well. This book is intended as a compact but comprehensive research guide that would provide students (especially...
-
Extendable Safety and Security Ontology
PublikacjaSecurity plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...
-
Areas of research in maritime security
PublikacjaW referacie przedstawiono analizę ważniejszych aspektów dotyczących ochrony żeglugi (maritime security) oraz zaproponowano nowe kierunki rozwoju.
-
Plant Biotechnology in Food Security
Publikacja -
The EU's Cyber Security Strategy
Publikacja -
Security and Anonymity in Agent Systems
PublikacjaMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Security Mechanisms in the Comcute System
PublikacjaThe aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.
-
Security ontology construction and integration
PublikacjaThere are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presentsgathered requirements needed to be taken into account when creating an ontology. The method of ontology creation...
-
On some aspects of maritime security
PublikacjaZostały przedstawione wybrane zagadnienia dotyczące ochrony żeglugi, w tym opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS, Statkowy System Alarmowania (SSAS) oraz system AIS i System Identyfikacji i Śledzenia Dalekiego Zasięgu (LRIT). Przedstawiono również znaczenie nowoczesnej telekomunikacji dla potrze sprawnej ochrony żeglugi na morzach i oceanach
-
Algorithms for testing security in graphs
PublikacjaIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
External Security Strategies of Belarus
PublikacjaUnder President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...
-
Quantum security and theory of decoherence
PublikacjaWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Ukraine’s Energy Security in Strategies
PublikacjaDuring the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...
-
The effect of topical treatment and psoriasis severity on serum retinol-binding protein-4 levels
Publikacja -
COVID-19 severity forecast based on machine learning and complete blood count data
PublikacjaProper triage of COVID-19 patients is a key factor in eective case management, especially with limited and insucient resources. In this paper, we propose a machine-aided diagnostic system to predict how badly a patient with COVID-19 will develop disease. The prognosis of this type is based on the parameters of commonly used complete blood count tests, which makes it possible to obtain data from a wide range of patients.We chose...
-
COVID-19 severity forecast based on machine learning and complete blood count data
PublikacjaProper triage of COVID-19 patients is a key factor in eective case management, especially with limited and insucient resources. In this paper, we propose a machine-aided diagnostic system to predict how badly a patient with COVID-19 will develop disease. The prognosis of this type is based on the parameters of commonly used complete blood count tests, which makes it possible to obtain data from a wide range of patients.We chose...
-
Law regulation in Poland related to biofuels
PublikacjaThe situation in the area of using biofuels in transport mostly the law aspects was presented and discussed. In Poland there are various legal issues with biofuel production, examination and use. These include among the others: quality inspection, production costs and market prices of biofuels, forms of public and legal service for biofuel producers or programs of biofuels promotion. In order to popularise biofuels it is significant...
-
Relations between law, authority, and trust
PublikacjaW artykule przedstawiono relacje pomiędzy prawem, autorytetem i zaufaniem. Zwrócono uwagę, że prawo, a głównie jego egzekwowanie wynika z przymusu państwowego. Pozostałe natomiast kategorie są kształtowane przez inne czynniki. Rozważania mają charakter filozoficzny.
-
Automatic sound recognition for security purposes
PublikacjaIn the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...
-
Cost assessment of computer security activities
PublikacjaComprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...
-
Architecture supporting security of agent systems
PublikacjaW rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...
-
Indo-French Defence and Security Partnership
Publikacja -
The Impact of Terrorism on International Peace and Security
Publikacja -
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Resilience and Security in Software Defined Networking
PublikacjaThis paper gives an overview of the most important issues on resilience and security in Software Defined Networking
-
An integrated framework for security protocol analysis
PublikacjaAssurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...
-
An integrated method for security protocols analysis
Publikacja -
Aspects of maritime security and safety of Poland
PublikacjaReferat przedstawia wybrane aspekty morskiego bezpieczeństwa Polski. Prezentacja problematyki jest ukierunkowana na problemy techniczne związane z bezpieczeństwem, pozostawiając na uboczu problemy prawne, logistyczne i społeczne. Na wstępie przedstawiono analizę zagrożeń dla bezpieczeństwa Bałtyku. Następnie opisano wybrane instytucje odpowiedzialne za morskie bezpieczeństwo Polski, ze szczegółowym uwzględnieniem Morskiej Straży...