Filtry
wszystkich: 774
-
Katalog
- Publikacje 465 wyników po odfiltrowaniu
- Czasopisma 36 wyników po odfiltrowaniu
- Konferencje 19 wyników po odfiltrowaniu
- Osoby 36 wyników po odfiltrowaniu
- Projekty 3 wyników po odfiltrowaniu
- Kursy Online 14 wyników po odfiltrowaniu
- Wydarzenia 5 wyników po odfiltrowaniu
- Dane Badawcze 196 wyników po odfiltrowaniu
Wyniki wyszukiwania dla: private equity
-
Wpływ postrzeganego ryzyka oraz czynników wizerunkowych na zamiar zakupu marek własnych sieci handlowych
PublikacjaCelem przeprowadzonych badań była analiza wpływu wizerunku sklepu, postrzeganego ryzyka oraz wizerunku cenowego marek własnych na zamiar ich zakupu. Dokonano replikacji modelu zaproponowanego przez M.F. Diallo i w jej ramach zastosowano technikę wywiadu realizowanego za pośrednictwem Internetu (CAWI) i przeprowadzono analizy z wykorzystaniem modelu równań strukturalnych (SEM) przy pomocy oprogramowania AMOS. Stwierdzono, że zamiar...
-
Evaluation of Machine Learning Methods for the Experimental Classification and Clustering of Higher Education Institutions
PublikacjaHigher education institutions have a big impact on the future of skills supplied on the labour market. It means that depending on the changes in labour market, higher education institutions are making changes to fields of study or adding new ones to fulfil the demand on labour market. The significant changes on labour market caused by digital transformation, resulted in new jobs and new skills. Because of the necessity of computer...
-
Essays on China's international trade - focus on One-Belt One-Road initiative
PublikacjaThis thesis explores China's international trade from trade, global value chains (GVCs) and export diversity, focusing on the "One-Belt One-Road" (OBOR) initiative proposed at the end of 2013. Specifically, I verify the potential association of OBOR with bilateral imports and exports in the first chapter. Then the relationship between OBOR and GVCs has been explored in Chapter 2. And I have extended the research in GVCs to China's...
-
VALUATION OF EMBEDDED OPTIONS IN NON-MARKETABLE CALLABLE BONDS: A NEW NUMERICAL APPROACH
PublikacjaThe issue of how to price options embedded in callable bonds has attracted a lot of interest over the years. The usual bond valuation methods rely on yield curves, risk premium, and other parameters to estimate interest rates used in discounted cash flow calculations. The option to retire the bond is, however, neglected in the standard pricing models, causing a systematic overvaluation of callable bonds. In the event of a decline...
-
Mirosław Andrusiewicz prof. dr hab. n. med. i n. o zdr.
OsobyPosiadane dyplomy, stopnie naukowe lub artystyczne ̶ stopień doktora habilitowanego nauk medycznych (dyscyplina biologia medyczna) z dnia 4 grudnia 2017 r. Tytuł osiągnięcia naukowego: „Analiza wybranych genów związanych z przebiegiem zmian patologicznych w komórkach wywodzących się z żeńskich wewnętrznych narządów płciowych”; Uniwersytet Medyczny im. Karola Marcinkowskiego w Poznaniu, Wydział Lekarski II; recenzenci: Prof....
-
Kurs szkoleniowy
Kursy OnlineKurs szkoleniowy dla wykładowców - quizy i zadania, tutoriale i nagrania ze spotkań
-
Multipartite secret key distillation and bound entanglement
PublikacjaRecently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable...
-
Locating and Identifying Ferromagnetic Objects
PublikacjaThe new non-iterative method of determining the dipole moment and location is presented in this paper. The algorithm of an object's localization and identification was achieved by using numerical calculations and approximation method. The arbitrary shapes of an object were assumed in the identification algorithm - axially symmetric spheroid (a prolate and an oblate). Several examples of localization and identification of an object's...
-
Locating and Identifying Ferromagnetic Objects
PublikacjaThe new non-iterative method of determining the dipole moment and location is presented in this paper. The algorithm of an object's localization and identification was achieved by using numerical calculations and approximation method. The arbitrary shapes of an object were assumed in the identification algorithm - axially symmetric spheroid (a prolate and an oblate). Several examples of localization and identification of an object's...
-
Semantic URL Analytics to Support Efficient Annotation of Large Scale Web Archives
PublikacjaLong-term Web archives comprise Web documents gathered over longer time periods and can easily reach hundreds of terabytes in size. Semantic annotations such as named entities can facilitate intelligent access to the Web archive data. However, the annotation of the entire archive content on this scale is often infeasible. The most efficient way to access the documents within Web archives is provided through their URLs, which are...
-
ZRÓŻNICOWANIE STRUKTURY KAPITAŁOWO-MAJĄTKOWEJ W ZALEŻNOŚCI OD WIELKOŚCI PRZEDSIĘBIORSTWA
PublikacjaW artykule przedstawiono różnice w kształtowaniu struktury kapitałowo-majątkowej pomiędzy małymi, średnimi i dużymi przedsiębiorstwami. W trakcie przeprowadzonych badań uwzględniono 97 471 sprawozdań finansowych przedsiębiorstw, prowadzących działalność gospodarczą w 12 różnych działach polskiej gospodarki narodowej. Do potwierdzenia zróżnicowania struktury kapitałowo-majątkowej w zależności od wielkości przedsiębiorstwa wykorzystano...
-
Antecedents and outcomes of social media fatigue
PublikacjaPurpose – This study aims to explore which of four chosen factors (i.e. privacy concerns, FoMO, self-disclosure and time cost) induce a feeling of strain among Facebook users in terms of social media fatigue (SMF), and if this occurs, whether it further influences such outcomes as discontinuance of usage (DoU) and interaction engagement decrement (IED). Design/methodology/approach – Through an online structured questionnaire, empirical...
-
Confidence, Financial Literacy and Investment in Risky Assets: Evidence from the Survey of Consumer Finances
PublikacjaWe employ recent Survey of Consumer Finances (SCF) microdata from the US to analyze the impacts of confidence in one's own financial knowledge, confidence in the economy, and objective financial literacy on investment in risky financial assets (equity and bonds) on both the extensive and intensive margins. Controlling for a rich set of covariates including risk aversion, we find that objective financial literacy is positively...
-
Description of symmetrical prolate ellipsoid (sphere) magnetic signature parameters-Be = 50 mT, I = 70 deg, z = -10 m, a =4 m, e = 1, mr = 100
Dane BadawczeThe Earth magnetic field (Fig.1): BE – total magnetic flux density, BEx – x component of the Earth magnetic flux density, BEy = 0 y component of the Earth magnetic flux density, BEz – z component of the Earth magnetic flux density, I – inclination of the Earth magnetic field.
-
Description of symmetrical prolate ellipsoid (sphere) magnetic signature parameters-Be = 50 mT, I = 70 deg, z = -100 m, a =4 m, e = 1, mr = 100
Dane BadawczeThe Earth magnetic field (Fig.1): BE – total magnetic flux density, BEx – x component of the Earth magnetic flux density, BEy = 0 y component of the Earth magnetic flux density, BEz – z component of the Earth magnetic flux density, I – inclination of the Earth magnetic field.
-
Description of symmetrical prolate ellipsoid (sphere) magnetic signature parameters-Be = 50 mT, I = 70 deg, z = -50 m, a =4 m, e = 1, mr = 100
Dane BadawczeThe Earth magnetic field (Fig.1): BE – total magnetic flux density, BEx – x component of the Earth magnetic flux density, BEy = 0 y component of the Earth magnetic flux density, BEz – z component of the Earth magnetic flux density, I – inclination of the Earth magnetic field.
-
Description of symmetrical prolate ellipsoid (sphere) magnetic signature parameters-Be = 50 mT, I = 70 deg, z = -10 m, a =4 m, e = 1, mr = 100
Dane BadawczeThe Earth magnetic field (Fig.1): BE – total magnetic flux density, BEx – x component of the Earth magnetic flux density, BEy = 0 y component of the Earth magnetic flux density, BEz – z component of the Earth magnetic flux density, I – inclination of the Earth magnetic field.
-
Description of symmetrical prolate ellipsoid (sphere) magnetic signature parameters-Be = 50 mT, I = 70 deg, z = -20 m, a =4 m, e = 1, mr = 100
Dane BadawczeThe Earth magnetic field (Fig.1): BE – total magnetic flux density, BEx – x component of the Earth magnetic flux density, BEy = 0 y component of the Earth magnetic flux density, BEz – z component of the Earth magnetic flux density, I – inclination of the Earth magnetic field.
-
Przestrzeń publiczna a przemiany miasta
PublikacjaPraca składa się z dwunastu rozdziałów. Pierwsza część ma charakter wprowadzający do problematyki przestrzeni publicznej. W rozdziale drugim autorka przywołuje wybrane i ważne dla przedmiotu badań koncepcje teoretyczne oparte na modelu wieloparadygmatycznym. Rozdział trzeci osnuty jest wokół antycznego wzorca przestrzeni publicznej, który ze względu na niezwykłe bogactwo rozwiązań w tym zakresie wywodzi się właśnie z tego pnia....
-
Magdalena Ciesielska dr inż.
OsobyMagdalena Ciesielska jest adiunktem w Katedrze Informatyki w Zarządzaniu, Wydział Zarządzania i Ekonomii, Politechnika Gdańska, Polska. Posiada tytuł doktora w dziedzinie ekonomii biznesu i zarządzania . Jej obszary badań i ekspertyzy są interdyscyplinarne i obejmują zarządzanie cyfrowym rządem na poziomie krajowym, sektorowym i lokalnym, otwarte dane, włączenie cyfrowe oraz wkład cyfrowego rządu w zrównoważony rozwój i inne cele...
-
Adaptive system for recognition of sounds indicating threats to security of people and property employing parallel processing of audio data streams
PublikacjaA system for recognition of threatening acoustic events employing parallel processing on a supercomputing cluster is featured. The methods for detection, parameterization and classication of acoustic events are introduced. The recognition engine is based onthreshold-based detection with adaptive threshold and Support Vector Machine classifcation. Spectral, temporal and mel-frequency descriptors are used as signal features. The...
-
Device-independent quantum key distribution based on measurement inputs
PublikacjaWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
The most important elements of the social package that guide students of Wrocław University of Science and Technology when choosing their first job
Dane BadawczeThis dataset contains the results of research that were carried out by the Wrocław University of Science and Technology in March and April 2016, using an anonymous "on-line" questionnaire. 1,320 people took part in the study entitled "My ideal employer" - students and doctoral students of all faculties of the university (including those fields of study...
-
Implementation of Business Intelligence in an IT organization - the concept of an evaluation model
PublikacjaThis paper presents the issue of assessing the validity and effectiveness of implementing a Business Intelligence system in an IT Support Organization. This entity provides IT services to external clients involving, in particular, the storage and processing of large amounts of data. The vast amount of realized projects and also incidents reported in connection with those projects prevented effective decisions from being made without...
-
On Software Unit Testing For Security and Performance Gain At Unit Level
PublikacjaPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
On Software Unit Testing For Improving Security And Performance Of Distributed Applications
PublikacjaPerformance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...
-
Planning Around Polarisation: Components of Finding Common Ground Based on Regeneration Projects in London and Gdańsk
PublikacjaVarious forms of public participation in urban design and planning—as presented and discussed in literature—have recently been challenged by the needs and expectations of different stakeholders, including those coming from the private sector. This comes with a redefinition of the public good and the roles and responsibilities of municipal authorities in post‐liberal times. As a result, contemporary participatory processes need...
-
Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface
PublikacjaMultimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...
-
Horizon Europe proposals - Administrative Part
Dane BadawczeThe dataset contains data collected during the HE National Contact Point training on Oct. 12, 2022, reg. the administrative part of Horizon Europe grant proposals. The data set includes presentations concerning administrative forms of 2022 proposals and their content, including participant data; information about abstract writing, keyword choice and...
-
Tomasz Wąsowicz dr hab.
OsobyAbsolwent Technikum Elektrycznego w Słupsku (1997 rok) oraz Wydziału Matematyki, Fizyki i Informatyki Uniwersytetu Gdańskiego (2002 rok). W 2006 roku obronił dysertację doktorską z fizyki na WMFiI UG. Pracując już w PG, w 2018 roku uzyskał habilitację. W pierwszym okresie prace badawcze Tomasza Wąsowicza miały związek ze spektroskopią atomową wysokiej zdolności rozdzielczej i koncentrowały się na pomiarze i analizie prawdopodobieństw...
-
Students receiving scholarships in 1990-2011
Dane BadawczeSince 2005, the financial support system for students has been operating on the basis of on the Act of 27 July 2005, the Law on Higher Education (Journal of Laws No. 164, item 1365), as amended, and detailed regulations for determining the amount, awarding and payment of financial assistance benefits for students determined by rectors in consultation...
-
Suwerenność państwa i rządy prawa: kodyfikacja prawa prywatnego w Chinach
PublikacjaThe main issue of this article is a comparison of codification of private law in the Republic of China (1912–1949) with the current fi fth attempt to codify civil law in the People’s Republic of China, which is planned to be enacted in 2020. The aim of the paper is to prove that in both the most important factors for drafting new laws were not the internal needs of the state, but the necessity to regulate the...
-
Hidden Champions of Poland
PublikacjaPoland is a country with a strong entrepreneurial spirit. The hidden champions’ performance has been closely related to political and economic changes: the fall of communism in 1989 and the transition from a centrally planned economy to a market economy. This led to the emergence of small private businesses focused on the domestic market. The accession to the European Union in 2004 created new perspectives for the hidden champions’...
-
Professional activity and women entrepreneurship in Poland – Europe 2020 Strategy perspective
PublikacjaThe level of economic activity of women in Poland is the lowest among Baltic Sea Region countries. The analysis of Europe 2020 targets, shows that at least 3 of the 5 main objectives relate, more or less, to women (e.g. participation in labor market). The objective concerning social inclusion assumes the increase in the employment rate of men and women (aged 20-64) in Poland up to 71%. To achieve this goal, support programs to...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Total domination in versus paired-domination in regular graphs
PublikacjaA subset S of vertices of a graph G is a dominating set of G if every vertex not in S has a neighbor in S, while S is a total dominating set of G if every vertex has a neighbor in S. If S is a dominating set with the additional property that the subgraph induced by S contains a perfect matching, then S is a paired-dominating set. The domination number, denoted γ(G), is the minimum cardinality of a dominating set of G, while the...
-
Personal Brand Value and Social Media, the Top Football Players’ Case
PublikacjaPersonal branding valuation and social media usage are new and empirically unexplored areas of research. The aim of the presented study is to determine how social media performance and sentiment are related to the value of a personal brand. Based on an example of 100 most valuable football players, in reference to transfermarkt.com and the sentione.com (sentiment analysis), the author points out the strongest...
-
The Innovative Faculty for Innovative Technologies
PublikacjaA leaflet describing Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology. Multimedia Systems Department described laboratories and prototypes of: Auditory-visual attention stimulator, Automatic video event detection, Object re-identification application for multi-camera surveillance systems, Object Tracking and Automatic Master-Slave PTZ Camera Positioning System, Passive Acoustic Radar,...
-
Computer-Aided Detection of Hypertensive Retinopathy Using Depth-Wise Separable CNN
PublikacjaHypertensive retinopathy (HR) is a retinal disorder, linked to high blood pressure. The incidence of HR-eye illness is directly related to the severity and duration of hypertension. It is critical to identify and analyze HR at an early stage to avoid blindness. There are presently only a few computer-aided systems (CADx) designed to recognize HR. Instead, those systems concentrated on collecting features from many retinopathy-related...
-
Attention-Based Deep Learning System for Classification of Breast Lesions—Multimodal, Weakly Supervised Approach
PublikacjaBreast cancer is the most frequent female cancer, with a considerable disease burden and high mortality. Early diagnosis with screening mammography might be facilitated by automated systems supported by deep learning artificial intelligence. We propose a model based on a weakly supervised Clustering-constrained Attention Multiple Instance Learning (CLAM) classifier able to train under data scarcity effectively. We used a private...
-
Impact of Work on the Well-Being of Police Officers and Firefighters
PublikacjaWork is one of the most important spheres of human functioning and has a significant impact on individual overall well-being. The purpose of this study is to assess the positive and negative impact of the work of police officers and firefighters on their well-being in different spheres of life. In particular, the study examines the relationship between the type of occupation and the elements that generate a feeling of well-being,...
-
New Materiality-towards ‘Media Environments
PublikacjaArticle presents media solutions providing new materiality of architectural spaces. Media solutions in architecture evolve in new forms. Articlepresentsboth the developmentof new technological solutionsas well as new ways of application of media solutions in relation toarchitectural form. The aim of the article is to show technical aspects of new materiality - intelligent materials, allowing transmission of changeable visual content...
-
Potential for ITS/ICT Solutions in Urban Freight Management
PublikacjaThe article presents a study on applying ITS solutions in planning and management of urban freight transport in Gdynia. The traffic management system Tristar which is under implementation and its related systems show a potential to assist in development of freight transport measures. Recommendations for urban freight policy development supplementing Gdynia's Sustainable Urban Mobility Plan were used as a basis for identification...
-
An Empirical Study on the Impact of Gender on Mobile Applications Usability
PublikacjaIn the area of broadband wireless Internet, mobile applications have already replaced their desktop equivalents and are recognized as valuable tools for any size of businesses and for private use. With the emergence of millions of apps, the quality of their interaction with the user remains an open question for software vendors. While female and male requirements and preferences are not always similar, to the best of our knowledge,...
-
The impact of knowledge risk management on sustainability
PublikacjaPurpose The purpose of this study is to examine the effect of knowledge risk management (KRM) on organizational sustainability and the role of innovativeness and agility in this relationship. Methodology The study presents the results of a quantitative survey performed among 179 professionals from knowledge-intensive organizations dealing with knowledge risks and their management in organizations. Data included in this study are...
-
Application of Text Analytics in Public Service Co-Creation: Literature Review and Research Framework
PublikacjaThe public sector faces several challenges, such as a number of external and internal demands for change, citizens' dissatisfaction and frustration with public sector organizations, that need to be addressed. An alternative to the traditional top-down development of public services is co-creation of public services. Co-creation promotes collaboration between stakeholders with the aim to create better public services and achieve...
-
A survey of neural networks usage for intrusion detection systems
PublikacjaIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
MODEL FOR MEASUREMENT OF FLOW INSTALLATION TIME IN SDN SWITCH
PublikacjaSDN is the approach in telecommunication networks that separates control plane from data forwarding plane by specifying a single network entity as a controller that defines rules (called flows) of traffic forwarding for the switches connected to it. The time that is required for installation of these rules might be a hindrance for the overall performance of SDN network. In the paper, a model for testing and evaluating the influence...
-
Description of symmetrical prolate ellipsoid magnetic signature parameters-Be = 50 mT, I = 70 deg, z = 50 m, q = 80 deg, j = 45 deg, a =4 m, e = 8, mr = 100
Dane BadawczeThe Earth magnetic field (Fig.1): BE – total magnetic flux density, BEx – x component of the Earth magnetic flux density, BEy = 0 y component of the Earth magnetic flux density, BEz – z component of the Earth magnetic flux density, I – the inclination of the Earth magnetic field.
-
Description of symmetrical prolate ellipsoid magnetic signature parameters-Be = 50 mT, I = 70 deg, z = 100 m, q = 90 deg, j = 135 deg, a =4 m, e = 1, mr = 100
Dane BadawczeThe Earth magnetic field (Fig.1): BE – total magnetic flux density, BEx – x component of the Earth magnetic flux density, BEy = 0 y component of the Earth magnetic flux density, BEz – z component of the Earth magnetic flux density, I – the inclination of the Earth magnetic field.