Filtry
wszystkich: 1255
-
Katalog
- Publikacje 889 wyników po odfiltrowaniu
- Czasopisma 119 wyników po odfiltrowaniu
- Konferencje 81 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 51 wyników po odfiltrowaniu
- Wynalazki 5 wyników po odfiltrowaniu
- Projekty 11 wyników po odfiltrowaniu
- Kursy Online 34 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 63 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: JOB SECURITY
-
Education of Logisticians in Poland: Problems and Prospects in Students’ Opinion
PublikacjaLogistics is one of the key sectors of the Polish economy. Its value reflects not only its own capacity, but also the role it plays in ensuring the proper functioning of the entire economy. The rapid development of the industry and the highest demands on logistics solutions bring to the fore the problem of preparing a new generation of specialists in logistics. That is why the question of compliance to learning expectations of...
-
Language of Benefits as a Novel Tool for Improving Website Personalization
PublikacjaA properly designed website allows the user to search for information faster, and more accurately. The information content of the website should be also adapted to the needs of the user. The purpose of this article is to present a novel Language of Benefits (LoB) approach to facilitate the use of websites for individual user groups. The LoB approach is an approach addressed to IT Analysts, to facilitate the process of web design,...
-
Platforma KASKADA jako system zapewniania bezpieczeństwa poprzez masową analizę strumieni multimedialnych w czasie rzeczywistym
PublikacjaW artykule przedstawiono Platformę KASKADA rozumianą jako system przetwarzania danych cyfrowych i strumieni multimedialnych oraz stanowiącą ofertę usług wspomagających zapewnienie bezpieczeństwa publicznego, ocenę badań medycznych i ochronę własności intelektualnej. celem prowadzonych prac było stworzenie innowacyjnego systemu umozliwiajacego wydajną i masową analizę dokumentów cyfrowych i strumieni multimedialnych w czasie rzeczywistym...
-
Workforce mobility against the background of labour market duality theory – the example of selected OECD countries
PublikacjaThe paper aims to present an empirical study of labour market segmentation (LMS) hypothesis. According to the dual labour market theory jobs can be divided into two groups: primary and secondary jobs, with enter barriers into the first one. The primary jobs are usually described with relative high wages, whereas secondary jobs provide lower level of wages. In this paper we first examine the main sectors (according to the ISIC rev....
-
A place of school in the idea of the sustainable development
PublikacjaWell designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).
-
Self-Organizing Wireless Monitoring System for Containers
PublikacjaThis paper presents a description of new global monitoring system for containers, with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing Container Monitoring Network...
-
Self-organizing wireless monitoring system for cargo containers
PublikacjaThis paper presents a description of new global monitoring system for containers with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing ContainerMonitoring Network is...
-
Factors influencing the selection of the ideal employer
Dane BadawczeThis dataset contains the results of research that were carried out by the Wrocław University of Science and Technology in March and April 2016, using an anonymous "on-line" questionnaire. 1,320 people took part in the study entitled "My ideal employer" - students and doctoral students of all faculties of the university (including those fields of study...
-
Professional prospects of polish logisticians in the light of the higher education: students’ opinion research.
PublikacjaThe paper focuses on a topic concerning the students’ professional future. Students more often and more are prepared to leave the labor market. In addition to the ongoing higher education they get their education at a variety of courses and trainings; they increase their skills in workshops or attend internships and practices to become attractive candidates for the job in the eyes of a potential employer. At this point a number...
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublikacjaThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
International Conference on Information Security and Assurance
Konferencje -
International Conference on Security in Pervasive Computing
Konferencje -
International Conference on Computational Intelligence and Security
Konferencje -
International Workshop on Visualization for Cyber Security
Konferencje -
Australian Information Security Management Conference
Konferencje -
Information Hiding and Multimedia Security Workshop
Konferencje -
International Conference on Information and Communications Security
Konferencje -
International Conference on Information Theoretic Security
Konferencje -
International Conference on Principles of Security and Trust
Konferencje -
IFIP Information Security & Privacy Conference
Konferencje -
Australasian Conference on Information Security and Privacy
Konferencje -
International Workshop on Information Security Applications
Konferencje -
International IEEE Security in Storage Workshop
Konferencje -
International Conference on Information Security and Cryptology
Konferencje -
Workshop on Security and Privacy in e-Commerce
Konferencje -
Computational Intelligence in Security for Information Systems
Konferencje -
International Conference on Security of Information and Networks
Konferencje -
International Conference on Information Systems Security
Konferencje -
Australian Information Warfare and Security Conference
Konferencje -
Financial Cryptography and Data Security Conference
Konferencje -
Workshop in Information Security Theory and Practices
Konferencje -
International Conference on Information Security and Cryptography
Konferencje -
International Symposium on Information Assurance and Security
Konferencje -
Australasia Conference on Information Security and Privacy
Konferencje -
International Conference on Cryptology and Network Security
Konferencje -
Symposium on Requirements Engineering for Information Security
Konferencje -
SKLOIS Conference on Information Security and Cryptology
Konferencje -
Annual Conference on Privacy, Security and Trust
Konferencje -
International Workshop on Issues in the Theory of Security
Konferencje -
Information Security Practice and Experience Conference
Konferencje -
International Conference on network and System Security
Konferencje -
International Workshop on Security in Information Systems
Konferencje -
IEEE European Symposium on Security and Privacy
Konferencje -
ACM Conference on Computer and Communications Security
Konferencje -
Annual Computer Security Applications Conference
Konferencje -
European Symposium On Research In Computer Security
Konferencje -
International Conference on Availability, Reliability and Security
Konferencje -
Cloning, expression, and purification of a recombinant cold-adapted β-galactosidase from antarctic bacterium Pseudoalteromonas sp. 22b
PublikacjaAntarktyczny szczep, gram-ujemnych bakterii Pseudoalteromonas sp. 22b, wyizolowanych z przewodu pokarmowego kryla z gatunku Thyssanoessa macrura, jest producentem wewnątrzkomórkowej zimnolubnej beta-galaktozydazy. Białko to jest homotetramerem, w którym każda z jednostek monomeru zbudowana jest z 1028 reszt aminokwasowych. Gen kodujący ten enzym został sklonowany i eksprymowany w komórkach E. coli. Następnie z zastosowaniem procedury...
-
A calculation proposal of labour time input when concreting in difficult atmospheric conditions
PublikacjaThe paper presents a selected proposal of establishing labour input in concreting jobs carried out in difficult atmospheric conditions.
-
Implementing decisional trust: a first approach for smart reliable systems
PublikacjaIn this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...