Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "ICT systems" wg kryterium: Temat


Wyświetlanie 1-13 z 13
Tytuł:
Dangers and Attacks on Digital Information in the Public Safety Space
Autorzy:
Grubicka, Joanna
Rogowski, Krzysztof
Diemientiew, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/1808051.pdf
Data publikacji:
2020-01-27
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
threats of Internet crime
cyberspace
ICT systems
Opis:
The need for security is one of the most fundamental human needs. The scale of the threats posed by cybercrime to IT systems is large. It is mostly the result of the high vulnerability of IT systems to threats, the high risk of data theft, a very high occurrence of Internet frauds, the low efficiency of the systems protecting computers and networks, and an inadequately low level, as related to the existing threats, of security measures utilized by the users of IT systems. In this article, the authors discuss the underestimated problem of crime on the Internet and its nature in today’s reality.
Źródło:
Security Dimensions; 2019, 30(30); 66-95
2353-7000
Pojawia się w:
Security Dimensions
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Healthcare model with use of information and communication technology for patients with chronic disease
Autorzy:
Lisiecka-Biełanowicz, Mira
Wawrzyniak, Zbigniew M.
Powiązania:
https://bibliotekanauki.pl/articles/989249.pdf
Data publikacji:
2016
Wydawca:
Instytut Medycyny Wsi
Tematy:
healthcare system
chronic disease
organizational model
health information management
ict systems
Opis:
Introduction and objective. The healthcare system is positioned in the patient’s environment and works with other determinants of the treatment. Patient care requires a whole system compatible to the needs of organizational and technical solutions. The purpose of this study is to present a new model of patient-oriented care, in which the use of information and communication technology (ICT) can improve the effectiveness of healthcare for patients with chronic diseases. Material and methods. The study material is the process of healthcare for chronically ill patients. Knowledge of the circumstances surrounding ecosystem and of the patients’ needs, taking into account the fundamental healthcare goals allows us to build a new models of care, starting with the economic assumptions. The method used is modeling the construction of efficient healthcare system with the patient-centered model using ICT tools. Results. We present a new systemic concept of building patient’s environment in which he is the central figure of the healthcare organization – so called patient centered system. The use of ICT in the model of chronic patient’s healthcare can improve the effectiveness of this kind of care. The concept is a vision to making wide platform of information management in chronic disease in a real environment ecosystem of patient using ICT tools. Conclusions. On the basis of a systematic approach to the model of chronic disease, and the knowledge of the patient itself, a model of the ecosystem impacts and interactions through information feedback and the provision of services can be constructed. ICT assisted techniques will increase the effectiveness of patient care, in which nowadays information exchange plays a key role.
Źródło:
Annals of Agricultural and Environmental Medicine; 2016, 23, 3
1232-1966
Pojawia się w:
Annals of Agricultural and Environmental Medicine
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Modeling a negotiation process between aircraft using petri nets
Autorzy:
Żuchowska, Daria
Stelmach, Anna
Powiązania:
https://bibliotekanauki.pl/articles/27315982.pdf
Data publikacji:
2023
Wydawca:
Politechnika Śląska. Wydawnictwo Politechniki Śląskiej
Tematy:
air traffic control
ICT systems
ASAS
Petri Nets
transportation systems
kontrola ruchu lotniczego
systemy ICT
sieci Petriego
systemy transportowe
Opis:
New air traffic control ideas are sought. Many studies point out the delegation of the responsibility for ensuring separation from air traffic controllers to the aircraft crews, but it should be assumed that the transition from centralized to decentralized air traffic control will occur in stages. It is, therefore, necessary to ensure effective communication between conflicting aircraft and to define the negotiation process between aircraft. The concept of the process of negotiation and communication between aircraft in conflict using a monotonic concession protocol is presented. The proposed solution was modeled using a Petri Net, which allowed us to analyze all the dependencies present in the system. The analysis allowed us to evaluate the method in the context of safety. The conducted research showed that, under the assumed conditions, the negotiation method allows obtaining the desired effect of negotiations while maintaining an adequate level of safety.
Źródło:
Zeszyty Naukowe. Transport / Politechnika Śląska; 2023, 121; 267--285
0209-3324
2450-1549
Pojawia się w:
Zeszyty Naukowe. Transport / Politechnika Śląska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Environmentally Sustainable Transport Planning in the First and Last Mile Section of the Supply Chain
Autorzy:
Sierpiński, Grzegorz
Staniek, Marcin
Powiązania:
https://bibliotekanauki.pl/articles/504333.pdf
Data publikacji:
2019
Wydawca:
Międzynarodowa Wyższa Szkoła Logistyki i Transportu
Tematy:
eco-friendly supply chains
freight transport planning
ICT systems in logistic
sustainable development
open data source
Opis:
Background: The article provides a discussion on freight transport planning. The existing solutions applied in this sphere have been compared with the environment-related needs. The concept which has been proposed involves a dedicated travel planner that takes some additional non-standard criteria into consideration. At the same time, the authors have highlighted the necessity to expand the algorithms being applied, and to address the comprehensive nature of the problem. However, it is the first and last mile section of supply chains on which the article focuses. The planner described in the paper is being developed as a part of an integrated platform implemented under the international S-mile project. Research methodology: The solutions proposed for transport planning purposes include application of ICT. A review of the available solutions has made it possible to indicate one of the planners currently in use as the foundation upon which a more advanced freight transport planning tool dedicated to the first/last mile section can be built. The planner requires application of several optimisation algorithms, including those which consider route parameters, the selection of fleet vehicles available for the given task, cargo distribution over the vehicle etc. The article defines both primary and secondary criteria that such a planner should take into account, including the environmental ones. What the authors have also highlighted is the possibility to make use of open data sources. The approach they have proposed makes it possible to raise the level of environmental awareness at the first and the last mile management stage, and since multiple transport aspects have been addressed, it also increases planning efficiency. Goals: The purpose of the article has been to discuss an eco-friendly solution which may limit the negative environmental impact of transport. Conclusions: The solution described in the paper may change the manner in which freight transport is managed in cities. Taking environmental criteria into consideration makes it possible to reduce the negative environmental impact of transport. Planning of freight transport requires that far more criteria should be taken into account compared to route planning for the travelling population. A comprehensive fleet management platform featuring a planning module combined with other modules of the S-mileSys system being currently developed is also aimed at integration of large freight companies with the carriers that service first and last miles.
Źródło:
Logistics and Transport; 2019, 42, 2; 83-92
1734-2015
Pojawia się w:
Logistics and Transport
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Information and communications technology supporting internal transport systems management
Autorzy:
Wawrzyński, W.
Jacyna, M.
Powiązania:
https://bibliotekanauki.pl/articles/244317.pdf
Data publikacji:
2015
Wydawca:
Instytut Techniczny Wojsk Lotniczych
Tematy:
ICT
informatics systems in logistics,
WMS
RFiD
warehouse management
Opis:
The article presents some aspects concerning the application of Information and Computer Technologies in logistics processes. In order to improve management processes the integrated informatics and communication systems, dedicated applications and hardware solutions are used increasingly. The market offers a variety of solutions developed strictly for Transport and Logistics consisting of a multitude modules and applications meeting standard and non-standard requirements of supply chains. Specified solutions are used in warehouses and other types of logistics facilities realizing internal transport. A useful tool for supporting management of warehousing processes in logistics facilities is Warehouse Management System with RFiD technology for information collection and advanced planning. The RFiD is identification technology using radio waves for reading and recording information about products, logistics units or equipment on electronic chip. Construction of RFID systems largely depends on the destination of the system. The special attention is paid to the use of RFID technology to manage transportation system in warehousing facilities. The main features of RFiD technology are discussed.
Źródło:
Journal of KONES; 2015, 22, 4; 319-327
1231-4005
2354-0133
Pojawia się w:
Journal of KONES
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Effect of the challenges facing use of information and communications technology on inventory management amongst breweries in Nigeria
Autorzy:
Odesola, O. T.
Akinola, G. O.
Powiązania:
https://bibliotekanauki.pl/articles/326703.pdf
Data publikacji:
2018
Wydawca:
Politechnika Śląska. Wydawnictwo Politechniki Śląskiej
Tematy:
inventory
performance
efficiency
ICT challenges
inventory management systems
inwentaryzacja
wydajność
efektywność
wyzwania ICT
systemy zarządzania zapasami
Opis:
Information and communications technology (ICT) in the recent times has become a viable strategic policy option adopted by many businesses in order to compete favourably in a competitive and dynamic ICT driven market. This strategic move by business organizations is being hindered by some challenges which has invariably reduced the benefits accruable from ICT deployment for business operations especially in the inventory management. The paper identified challenges facing the use of ICT for inventory management by firms in the Nigerian Brewery industry. Other objectives of the paper are to x-ray how these challenges had impacted on the inventory management in the Nigerian Brewery industry, the effect of these challenges on customers' satisfaction, relationship between these challenges and inventory costs incurred by firms in the industry, and to suggest appropriate solutions. Primary data formed the methodology of the study. It was established during the field survey that challenges facing the use of ICT had impacted negatively on the performance of inventory management in the Nigerian brewery industry during the period under study. It was also revealed that the cost of software was a major challenge in the industry and that the identified challenges had significant effect on customers' satisfaction of the firms in the Nigerian brewery industry.
Źródło:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska; 2018, 119; 191-207
1641-3466
Pojawia się w:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyber attacks and threats
Autorzy:
Witkowski, M.
Wojaczek, A.
Powiązania:
https://bibliotekanauki.pl/articles/1395621.pdf
Data publikacji:
2017
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
cyberterrorism
cyber threats
terrorism network
Information and Communication Technology systems
ICT
Opis:
The article presents current threats and examples of malware which can be used to disrupt the infrastructure. Next, a classification of current threats and attacks which occur in cyberspace is proposed. Finally, the publication also presents examples of attacks which disrupted the smooth functioning of networks and systems.
Źródło:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki; 2017, 2; 184-194
1731-8157
Pojawia się w:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyfryzacja usług administracji publicznej
Information management in public administration
Autorzy:
Sroka, Karol
Suchanek, Marek
Powiązania:
https://bibliotekanauki.pl/articles/1590849.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Szczeciński. Wydawnictwo Naukowe Uniwersytetu Szczecińskiego
Tematy:
public administration
information systems
ICT
administracja publiczna
systemy informacyjne
technologie teleinformatyczne
Opis:
Dostęp do informacji to ważny czynnik umożliwiający skuteczne administrowanie państwem. Administracja publiczna jest jednym z największych użytkowników technicznych i programowych środków teleinformatycznych. Systemy informatyczne mogą usprawnić przetwarzanie danych, których ilość związana z funkcjami realizowanymi przez administrację publiczną szybko rośnie. Wydaje się jednak, że możliwości współczesnych środków technicznych i programowych teleinformatyki nie są w pełni wykorzystane i nie zawsze ich stosowanie przekłada się na wzrost efektywności działania administracji publicznej. Wynika to z faktu, że sprawność działania publicznych instytucji administrujących zależy również od celów i standardów mających zastosowanie w tej sferze, struktury organizacyjnej, zasobów ludzkich, zasobów finansowych i uwarunkowań prawnych. W artykule podjęto próbę identyfikacji i scharakteryzowania podstawowych czynników wpływających na efekty procesu cyfryzacji usług administracji publicznej.
Access to information is one of the most important factors that allow to administer the state effectively. Public administration is one of the biggest user of technical and program means of teleinformatics. Information technology considerably facilitate entities and public institutions the processing of the continuously increasing amount of data concerning conducted activity. This process, in consequence, should streamline the functioning of administration, make it easier for clients, employees and partners to do their everyday tasks. It seems, however, that the speed of the processing of data does not lead directly to an increase in effectiveness of administration that also depends on objectives and standards applicable in this sphere, an organizational structure, human resources, financial resources and information resources. An attempt to characterise basic issues concerning information management in administration was made in the article.
Źródło:
Studia Administracyjne; 2017, 9; 29-44
2080-5209
2353-284X
Pojawia się w:
Studia Administracyjne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Aspect of data communication security in the Central Node of Polands Schengen Information System and Visa Information System Component
Autorzy:
Bliźniuk, G.
Kośla, R.
Machnacz, A.
Powiązania:
https://bibliotekanauki.pl/articles/305903.pdf
Data publikacji:
2008
Wydawca:
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego
Tematy:
IT systems
ICT security
Schengen zone
Schengen Information System
Visa Information System
Opis:
Data communication security assurance in the Central Node of Poland's Schengen Information System and Visa Information System Component (in polish: Centralny Węzeł Polskiego Komponentu Systemu Informacyjnego Schengen i Systemu Informacji Wizowej - CW PK SIS i VIS) is crucial for building adequate trust of the operation of mechanisms of the Schengen agreement in Poland. Presented in this chapter are the security requirements, agreed by member states of the Schengen agreement, which fulfillment is subject to independent review during periodical SIS/SIRENE evaluations. The essence of law, organizational and technical role means have also been indicated for assuring a high level of SIS and VIS data communication security, which is higher than the standard level required by regulations on the protecting of personal data. Directions for further development of the implementation of the SIS and VIS in Poland have been presented in the conclusion.
Źródło:
Biuletyn Instytutu Systemów Informatycznych; 2008, 2; 1-12
1508-4183
Pojawia się w:
Biuletyn Instytutu Systemów Informatycznych
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Computer-assisted assessment: Application of computerised testing at the Institute of English Studies at the University of Lodz, Poland
Autorzy:
Trendak, Olga
Powiązania:
https://bibliotekanauki.pl/articles/606071.pdf
Data publikacji:
2019
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
computer-assisted assessment
computer assisted testing systems
computerised testing
computer-based assessment
ICT
Opis:
Der Band enthält die Abstracs ausschließlich in englischer Sprache
Numerous researchers have noticed the need for better measurement of students’ stated learning outcomes (Conole & Warburton, 2005). One of the reasons is the increasing number of university students, which has led to the necessity of finding an efficient form of assessment. One of the ways of testing, which is rapidly gaining popularity among academic staff, is computer-assisted assessment (CAA). The aim of the following paper is to briefly discuss the notion of CAA and the observed positive impacts it has exerted on the testing process at the Institute of English Studies at the University of Lodz, Poland, and to consider several pedagogical implications related to the use of this type of assessment within the institution. The findings were observed by the author of the paper and are not based on empirical data.
L'article contient uniquement les résumés en anglais.
Źródło:
Lublin Studies in Modern Languages and Literature; 2019, 43, 4
0137-4699
Pojawia się w:
Lublin Studies in Modern Languages and Literature
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Forming Key Competences within the ICT-supported Instruction in Higher Education
Autorzy:
Šimonová, Ivana
Poulová, Petra
Sokolová, Marcela
Bílek, Martin
Powiązania:
https://bibliotekanauki.pl/articles/2028740.pdf
Data publikacji:
2014-03-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
ICT
key competences
online courses
e-learning
learning styles
Database Systems
Management
IT English
Opis:
The paper presents research results of the two-year pedagogical experiment comparing test scores in three subjects (Database Systems, Management, IT English) taught either in the ICT-supported way, or in the traditional face-to-face way at the Faculty of Informatics and Management, University of Hradec Kralove, Czech Republic. The main research objective was to find out whether ICT contribute to increasing learners’ knowledge and consequently to forming key competences. Didactic tests as the main tool were used within the pedagogical experiment which followed the “pre-test - instruction - post-test - post-test2” structure. The research sample included 687 respondents. Obtained results proved there were no statistically significant differences in learners’ knowledge in both approaches to instruction. The results were discussed from two important points of view: (1) teachers’ and learners’ ability to use the potential of ICT in teaching/learning and (2) the role of teaching/learning styles in the ICT-supported instruction.
Źródło:
The New Educational Review; 2014, 35; 134-147
1732-6729
Pojawia się w:
The New Educational Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Influence of IQT on research in ICT
Autorzy:
Bednarski, Bogdan J.
Lepak, Łukasz E.
Łyskawa, Jakub J.
Pieńczuk, Paweł
Rosoł, Maciej
Romaniuk, Ryszard S.
Powiązania:
https://bibliotekanauki.pl/articles/2055259.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
ICT
control theory
IQT
Information Quantum Technologies
Quantum 2.0
applications of IQT
quantum systems
qubit neural networks
quantum time series forecasting;
Quantum Reinforcement Learning
Opis:
This paper is written by a group of Ph.D. students pursuing their work in different areas of ICT, outside the direct area of Information Quantum Technologies IQT. An ambitious task was undertaken to research, by each co-author, a potential practical influence of the current IQT development on their current work. The research of co-authors span the following areas of ICT: CMOS for IQT, QEC, quantum time series forecasting, IQT in biomedicine. The intention of the authors is to show how quickly the quantum techniques can penetrate in the nearest future other, i.e. their own, areas of ICT.
Źródło:
International Journal of Electronics and Telecommunications; 2022, 68, 2; 259--266
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
IT Security Development Process in the Experimental SecLab Development Environment
Proces rozwoju bezpieczeństwa IT w eksperymentalnym środowisku rozwoju SecLab
Autorzy:
Białas, Andrzej
Flisiuk, Barbara
Powiązania:
https://bibliotekanauki.pl/articles/585886.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Ekonomiczny w Katowicach
Tematy:
Bezpieczeństwo danych
Rynek informatyczny
Systemy informatyczne
Technologie informacyjne i telekomunikacyjne
Zabezpieczenie systemów informatycznych
Computer system
Data security
Information and Communication Technology (ICT)
Information technology (IT) market
Security of information systems
Opis:
Artykuł zawiera krótką charakterystykę trzech podstawowych procesów podejścia Common Criteria. Autorzy opisują, jak proces rozwoju bezpieczeństwa technologii informacji jest zorganizowany w eksperymentalnym laboratorium SecLab w Instytucie EMAG. Badany proces obejmuje analizę użyteczności produktu informatycznego, opis jego środowiska działania i czynniki ryzyka. Prowadząc analizę w ten sposób, autorzy opracowują specyfikację wymagań i dokonują wdrożenia funkcji bezpieczeństwa produktu informatycznego. W części obejmującej wnioski końcowe autorzy przedstawiają dalsze kroki wdrażania funkcji bezpieczeństwa w odniesieniu do konkretnych produktów informatycznych.
Źródło:
Studia Ekonomiczne; 2014, 188; 25-38
2083-8611
Pojawia się w:
Studia Ekonomiczne
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-13 z 13

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies