Filtry
wszystkich: 1255
-
Katalog
- Publikacje 889 wyników po odfiltrowaniu
- Czasopisma 119 wyników po odfiltrowaniu
- Konferencje 81 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 51 wyników po odfiltrowaniu
- Wynalazki 5 wyników po odfiltrowaniu
- Projekty 11 wyników po odfiltrowaniu
- Kursy Online 34 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 63 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: JOB SECURITY
-
Journal of Conflict Transformation and Security
Czasopisma -
Journal of Nutrition and Food Security
Czasopisma -
International Journal of Nuclear Security
Czasopisma -
Analysis of kinematics and basic loads luffing jib oat davit.
PublikacjaW pracy przedstawiono opis działania oraz analizę kinematyki i podstawowych obciążeń nowoczesnego, wypadowego żurawika łodziowego. Ten typ żurawika, zastosowany został na statku pasażerskim Queen Mary 2 i przeznaczony jest zwłaszcza do dużych, zakrytych łodzi dla 150 osób. Podstawowe obciążenia, wymiary, kinematyka i inne parametry techniczne zostały oszacowane i dobrane na podstawie ogólnodostępnych informacji i fotografii, jakie...
-
The role of rewards and demands in burnout among surgical nurses
PublikacjaObjective: Job rewards have both, an intrinsic and an extrinsic motivational potential, and lead to employees’ development as well as help them to achieve work goals. Rewards can balance job demands and protect from burnout. Due to changes on the labour market, new studies are needed. The aim of our study was to examine the role of demands and individual rewards (and their absence) in burnout among surgical nurses. Materials and...
-
RECHERCHE TRANSPORTS SECURITE
Czasopisma -
Low Frequency Electromagnetic Interferences Impact on Transport Security Systems Used in Wide Transport Areas
Publikacja -
Bound entanglement maximally violating Bell inequalities: quantum entanglement is not fully equivalent to cryptographic security
PublikacjaW pracy pokazano, że czterokubitowy stan o splątaniu związanym może maksymalnie łamać prostą nierówność Bella podobną do standardowej nierówności CHSH. Prostota rozważanego układu oraz odporność splątania sprawiają, że łamanie to jest obiecujące dla współczesnej technologii eksperymentalnej. Z drugiej strony, splątanie tego stanu nie pozwala na destylację bezpiecznego klucza kryptograficznego, zatem ani splątanie, ani maksymalne...
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublikacjaThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
Knowledge-based functional safety and security management in hazardous industrial plants with emphasis on human factors
PublikacjaExisting and emerging new hazards have significant potential to impact destructively operation of technical systems, hazardous plants, and systems / networks of critical infrastructure. The programmable control and protection systems play nowadays an important role in reducing and controlling risk in the process of hazardous plant operation. It is outlined how to deal with security related hazards concerning such systems to be...
-
Bezpieczeństwo Bankowości Internetowej Wobec Współczesnych Cyberzagrożeń = INTERNET BANKING SECURITY IN TERMS OF CONTEMPORARY CYBERTHREATS
PublikacjaW niniejszej pracy zostały opisane aktualne podejścia do zabezpieczeń bankowości internetowej. Przeanalizowane jest bezpieczeństwo bankowości internetowej 7 banków polskich wobec współczesnych rodzajów cyberataków (takich jak ataki na użytkowników niemieckich banków w 2017 roku z wykorzystaniem luk bezpieczeństwa w systemie SS7). Zaproponowane są dwa podejścia do zabezpieczeń ochrony środków klientów banku wobec tych zagrożeń
-
Assessment of Financial Security of SMEs Operating in the Renewable Energy Industry during COVID-19 Pandemic
Publikacja -
Shared multi-processor scheduling
PublikacjaWe study shared multi-processor scheduling problem where each job can be executed on its private processor and simultaneously on one of many processors shared by all jobs in order to reduce the job’s completion time due to processing time overlap. The total weighted overlap of all jobs is to be maximized. The problem models subcontracting scheduling in supply chains and divisible load scheduling in computing. We show that synchronized...
-
Securitas Imperii
Czasopisma -
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublikacjaThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
Partial dominated schedules and minimizing the total completion time of deteriorating jobs
PublikacjaA problem of scheduling deteriorating jobs on a single processor is considered. The processing time of a job is given by a function pi=ai+bisi, where si is the starting time of the job, ai>=0, bi>=0, for i=1,...,n. Jobs are non-preemptive and independent and there are neither ready times nor deadlines. The goal is to minimize the total weighted completion time. We show how to employ the concept of non-dominated schedules to construct...
-
No-Wait & No-Idle Open Shop Minimum Makespan Scheduling with Bioperational Jobs
PublikacjaIn the open shop scheduling with bioperational jobs each job consists of two unit operations with a delay between the end of the first operation and the beginning of the second one. No-wait requirement enforces that the delay between operations is equal to 0. No-idle means that there is no idle time on any machine. We model this problem by the interval incidentor (1, 1)-coloring (IIR(1, 1)-coloring) of a graph with the minimum...
-
The Effects of Roadside Hazards on Road Accident Severity
PublikacjaThe risk of becoming involved in an accident emerges when elements of the transport system do not operate properly (man – vehicle – road – roadside). The road, its traffic layout andsafety equipment have a critical impact on road user safety. This gives infrastructural work a priority in road safety strategies and programmes. Run-off-road accidents continue to be one of the biggest problems of road safety with consequences including...
-
Indicator Analysis of Security Risk for Electronic Systems Used to Protect Field Command Posts of Army Groupings
Publikacja -
Issues Related to Power Supply Reliability in Integrated Electronic Security Systems Operated in Buildings and Vast Areas
Publikacja -
Shock a disposable time in electronic security systems / Porażenie a czas dyspozycyjny w elektronicznych systemach bezpieczeństwa
Publikacja -
Scheduling of identical jobs with bipartite incompatibility graphs on uniform machines. Computational experiments
PublikacjaWe consider the problem of scheduling unit-length jobs on three or four uniform parallel machines to minimize the schedule length or total completion time. We assume that the jobs are subject to some types of mutual exclusion constraints, modeled by a bipartite graph of a bounded degree. The edges of the graph correspond to the pairs of jobs that cannot be processed on the same machine. Although the problem is generally NP-hard,...
-
Scheduling of unit-length jobs with cubic incompatibility graphs on three uniform machines
PublikacjaWe consider the problem of scheduling n identical jobs on 3 uniform machines with speeds s1, s2, and s3 to minimize the schedule length. We assume that jobs are subject to some kind of mutual exclusion constraints, modeled by a cubic incompatibility graph. We how that if the graph is 2-chromatic then the problem can be solved in O(n^2) time. If the graph is 3-chromatic, the problem becomes NP-hard even if s1>s2=s3.
-
Scheduling of unit-length jobs with bipartite incompatibility graphs on four uniform machines
PublikacjaThe problem of scheduling n identical jobs on 4 uniform machines with speeds s1>=s2>=s3>=s4 is considered.The aim is to find a schedule with minimum possible length. We assume that jobs are subject to mutual exclusion constraints modeled by a bipartite incompatibility graph of degree delta. We show that the general problem is NP-hard even if s1=s2=s3. If, however, delta<5 and s1>12s2 s2=s3=s4, then the problem can be solved to...
-
Journal of Security and Sustainability Issues
Czasopisma -
Journal of Asian Security and International Affairs
Czasopisma -
International Journal of Security and Its Applications
Czasopisma -
Security Dimensions: International & National Studies
Czasopisma -
Journal of Digital Forensics Security and Law
Czasopisma -
Security Dimensions and Socio-Legal Studies
Czasopisma -
International Journal of Information Security and Privacy
Czasopisma -
International Journal of Information and Computer Security
Czasopisma -
Stability-International Journal of Security and Development
Czasopisma -
Policija i Sigurnost-Police and Security
Czasopisma -
IEEE Transactions on Information Forensics and Security
Czasopisma -
Journal of Internet Services and Information Security
Czasopisma -
ACM Transactions on Information and System Security
Czasopisma -
International Journal of Computer Science and Security
Czasopisma -
Public administration and state security aspects
Czasopisma -
Journal of Homeland Security and Emergency Management
Czasopisma -
Chinese Journal of Network and Information Security
Czasopisma -
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublikacjaIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Zagrożenia starych budynków w sąsiedztwie nowej zabudowy = The threat of old buildings security in neighbourhood of new buildings
PublikacjaNa przykładzie jednego z budynków mieszkalnych, przedstawiono zagrożenia na jakie są narażone stare obiekty w zwartej zabudowie śródmiejskiej, podczas prowadzenia w ich sąsiedztwie prac budowlanych, którym często towarzyszą głębokie wykopy. Powoduje to powstawanie licznych uszkodzeń, uniemozliwiających ich prawidłową eksploatację lub stanowiących nawet zagrożenie bezpieczeństwa.
-
Organizational culture as prerequisite of proactive safety and security management in critical infrastructure systems including hazardous plants and ports
PublikacjaThis article addresses selected aspects of organizational culture to be considered in the context of knowledge based proactive safety and security management of plants, ports and systems of critical infrastructure. It has been often emphasized in the domain literature that business effectiveness of such plants and their resilience against hazards and threats to avoid major accidents depends substantially on human and organizational...
-
Architecture of security and application layer structure of radio system for monitoring and acquisition of data from traffic enforcement cameras
PublikacjaThe study presents architecture of security and application layer structure of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras. It also provides general assumptions concerning the range of the system as well as its modules and application components.
-
Business continuity management framework for Industry 4.0 companies regarding dependability and security of the ICT and ICS/SCADA system
PublikacjaThis chapter addresses a business continuity management (BCM) framework for the Industry 4.0 companies including the organizational and technical solutions, regarding the dependability and security of the information and telecommunication technology (ICT), and the industrial control system (ICS) / supervisory control and data acquisition (SCADA) system. These technologies and systems play nowadays important roles in modern advanced...
-
ENISA Study: Challenges in Securing Industrial Control Systems
PublikacjaIn 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its objective was to obtain the current view on the ICS protectionprimarily in Europe but also in the international context. The portrait' included threats, risks, and challenges in the area of ICS protection as well as national, pan European, and international initiatives on ICS security. The...
-
Contemporary Ob/Gyn
Czasopisma -
A FPTAS for minimizing total completion time in a single machine time-dependent scheduling problem
PublikacjaIn this paper a single machine time-dependent scheduling problem with total completion time criterion is considered. There are given n jobs J1,…,Jn and the processing time pi of the ith job is given by pi=a+bisi, where si is the starting time of the ith job (i=1,…,n),bi is its deterioration rate and a is the common base processing time. If all jobs have deterioration rates different and not smaller than a certain constant u>0,...
-
Adaptive system for recognition of sounds indicating threats to security of people and property employing parallel processing of audio data streams
PublikacjaA system for recognition of threatening acoustic events employing parallel processing on a supercomputing cluster is featured. The methods for detection, parameterization and classication of acoustic events are introduced. The recognition engine is based onthreshold-based detection with adaptive threshold and Support Vector Machine classifcation. Spectral, temporal and mel-frequency descriptors are used as signal features. The...