Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "key" wg kryterium: Temat


Tytuł:
Niestatystyczne kryteria doboru słów (i frazeo- logizmów) kluczy. Analiza na przykładzie materiału prasowego dostępnego w korpusie ChronoPress
Autorzy:
Kozioł-Chrzanowska, Ewa
Powiązania:
https://bibliotekanauki.pl/articles/474097.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Warszawski i Uniwersytet Rzeszowski
Tematy:
key words, key fixed expressions, identifying key words, ChronoPress corpus
Opis:
The aim of the article is to analyze non-statistic methods of identifying key words (understood as units presenting special importance for a given culture and being a source of knowledge about it). The analyzed criteria of this identi cation are: the presence of the words in the given types of texts and in their speci c parts, undergoing semantic and pragmatic shifts, being a part of phraseo-logical units. The analysis is conducted mainly on the examples extracted form ChronoPress (The Chronological Corpora of Polish Press Texts 1945-1954) from 1945. The e ect of the survey is the evaluation of the abovementioned criteria in terms of their usefulness for identifying key words, followed by a description of the noticed problems and controversies as well as suggestions on finding solutions.
Źródło:
tekst i dyskurs - text und diskurs; 2018, 11; 463-476
1899-0983
Pojawia się w:
tekst i dyskurs - text und diskurs
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Energy-aware key management in mobile wireless sensor networks
Autorzy:
He, X.
Szalachowski, P.
Kotulski, Z.
Fotiou, N.
Marias, G. F.
Polyzos, G. C.
Meer de, H.
Powiązania:
https://bibliotekanauki.pl/articles/106190.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
wireless sensor networks
Diffie-Hellman key agreement
key management
Opis:
Wireless sensor networks have received wide attention recently across the indoor and outdoor applications. On the other hand, more and more application scenarios require sensor nodes to be mobile, which imposes new technological challenges for security. Key management is the core for secure data communications among the resource-constrained sensor nodes. In this paper, based on the Group Diffie-Hellman key agreement protocols and the energy level of each node in the network, we propose Energy Aware Group Diffie-Hellman key management protocol for mobile wireless sensor networks. The simulation results show that the proposed key management protocol provide significant improvement in maximizing the lifetime of networks.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 4; 83-96
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Koncepcja podmiotu kobiecego w ujęciu Ellen Key — wpływ przekładów Ady Werner-Silberstein na modernizację świadomości społecznej
The Concept of Female Subjectivity with Regard to the Work of Ellen Key — the Impact of Ada Werner-Silberstein’s Translations on the Modernization of Social Awareness
Autorzy:
Ciechomska, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/1068952.pdf
Data publikacji:
2020-12-01
Wydawca:
Łódzkie Towarzystwo Naukowe
Tematy:
Ada Silberstein, feminism, Ellen Key
feminism
Ellen Key
Ada Silberstein
Opis:
The article is split into two parts. In the first one the author presents the interpretation of Ellen Key’s, the Swedish feminist, works, which were translated by Ada Werner-Silberstein. In the second part the author tries to describe the impact of these texts on Polish feminists at the beginning of the 20th century and the use of Silberstein's translations in the women’s press of that time, including the use of Key’s language provided by Silberstein. This research perspective allowed the author to extract interesting threads resulting from the translational activity of Ada Werner-Silberstein.
Źródło:
Zagadnienia Rodzajów Literackich; 2020, 63, 3; 27-46
0084-4446
Pojawia się w:
Zagadnienia Rodzajów Literackich
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nauczanie przedsiębiorczości w polskich szkołach średnich – koncepcja, realizacja, rekomendacje
Teaching entrepreneurship in Polish secondary schools: conception, implementation and recommendations
Autorzy:
Bień, Izabela
Powiązania:
https://bibliotekanauki.pl/articles/2194879.pdf
Data publikacji:
2022
Wydawca:
Kancelaria Sejmu. Biuro Analiz Sejmowych
Tematy:
entrepreneurship
education
key competences
Opis:
The article presents assumptions for teaching entrepreneurship as a key competence in Polish secondary schools. The author refers to the general and specific objectives of the subject “Fundamentals of Entrepreneurship” included in the current core curriculum for secondary schools and analyses the results of studies on the knowledge and competences of entrepreneurship among Polish students as well as studies on the evaluation of lessons on this subject conducted in schools. Moreover, the paper describes innovative projects supporting entrepreneurship education in secondary schools and recommendations of various entities on how to improve the quality of education in this area.
Źródło:
Studia BAS; 2022, 2(70); 147-163
2080-2404
2082-0658
Pojawia się w:
Studia BAS
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Risks related to key persons of service companies noted on the NewConnect
Autorzy:
Jedynak, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/685111.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Jagielloński. Wydawnictwo Uniwersytetu Jagiellońskiego
Tematy:
risk, key persons, management
Opis:
The article concerns one of the most important detailed risk management issues, namely, the risk related to key persons. In the theoretical part of the article, the author analyses the current status of the risk associated with key persons in the processes of management of companies. The empirical part contains the results of research conducted on a group of 44 service companies listed on the NewConnect. The research conducted brought about cognitive effects involving, inter alia, identification of ways of perception of the risk related to key persons and the expected potential consequences of its occurrence in the companies surveyed. The study primarily used the method of critical review of the literature and analysis of the content of disclosure documents of the surveyed companies.
Źródło:
Jagiellonian Journal of Management; 2015, 1, 3
2450-114X
Pojawia się w:
Jagiellonian Journal of Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Certificate-less digital signature technology for e-Governance solutions
Autorzy:
Dhir, Shuchi
Devi, Sumithra
Powiązania:
https://bibliotekanauki.pl/articles/305692.pdf
Data publikacji:
2019
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
digital signatures
identity-based architecture
biometrics
fingerprint minutiae
RSA
private key
public key
Opis:
In spite of the fact that digital signing is an essential requirement for implementation of e-governance solutions in any organization, its use in large scale Government ICT implementation is negligible in India. In order to understand the reasons for low-level acceptance of the technology, authors performed a detailed study of a famous e-governance initiative of India. The outcome of the study revealed that the reasons are related to the challenges concerning the use of cryptographic devices carrying private key and the complicated process of generation, maintenance and disposal of Digital Signature Certificates (DSC). The solution, for the challenges understood from the case study, required implementation of a certificateless technology where private keys should be generated as and when required rather than storing them on cryptographic devices. Although many solutions which provide certificateless technology exist, to date there have been no practical implementation for using biometrics for implementing the solution. This paper presents the first realistic architecture to implement Identity Based Cryptography with biometrics using RSA algorithm. The solution presented in the paper is capable of providing a certificate-less digital signature technology to the users, where public and private keys are generated on-the-fly.
Źródło:
Computer Science; 2019, 20 (4); 431-452
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Unconditional security by the laws of classical physics
Autorzy:
Mingesz, R.
Kish, L. B.
Gingl, Z.
Granqvist, C.-G.
Wen, H.
Peper, F.
Eubanks, T.
Schmera, G.
Powiązania:
https://bibliotekanauki.pl/articles/220876.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
information theoretic security
unconditional security
secure key exchange
secure key distribution
quantum encryption
Opis:
There is an ongoing debate about the fundamental security of existing quantum key exchange schemes. This debate indicates not only that there is a problem with security but also that the meanings of perfect, imperfect, conditional and unconditional (information theoretic) security in physically secure key exchange schemes are often misunderstood. It has been shown recently that the use of two pairs of resistors with enhanced Johnsonnoise and a Kirchhoff-loop - i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol . for secure key distribution leads to information theoretic security levels superior to those of today's quantum key distribution. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. The KLJN system is briefly surveyed here with discussions about the essential questions such as (i) perfect and imperfect security characteristics of the key distribution, and (ii) how these two types of securities can be unconditional (or information theoretical).
Źródło:
Metrology and Measurement Systems; 2013, 20, 1; 3-16
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Verilog-A Compact Semiconductor Device Modelling and Circuit Macromodelling with the QucsStudio-ADMS "Turn-Key" Modelling System
Autorzy:
Brinson, M. E.
Margraf, M.
Powiązania:
https://bibliotekanauki.pl/articles/398029.pdf
Data publikacji:
2012
Wydawca:
Politechnika Łódzka. Wydział Mikroelektroniki i Informatyki
Tematy:
QucsStudio
ADMS
Verilog-A
modelowanie turn-key
compact device modelling
turn-key component modeling
Opis:
The Verilog-A "Analogue Device Model Synthesizer" (ADMS) has in recent years become an established modelling tool for GNU General Public License circuit simulator development. Qucs and ngspice are two examples of open source circuit simulators that employ ADMS for compact semiconductor model construction. This paper presents a "turn- key" compact device modelling and circuit macromodelling system based on ADMS and implemented in the QucsStudio circuit design, simulation and manufacturing environment. A core feature of the new system is a modelling procedure which does not require users to manually patch, by hand, circuit simulator C++ code. At the start of QucsStudio simulation the software automatically detects any changes in Verilog-A model code, re-compiling and dynamically linking the modified code to the body of the QucsStudio cod e. The inherent flexibility of the "turn-key" system encourage s rapid experimentation with analogue and RF compact device models and circuit macromodels. In this paper QucsStudio "turn-key" modelling is illustrated by the design of a single stage RF amplifier circuit and the Harmonic Balance large signal AC simulation of a 50 Ω RF diode switch.
Źródło:
International Journal of Microelectronics and Computer Science; 2012, 3, 1; 32-40
2080-8755
2353-9607
Pojawia się w:
International Journal of Microelectronics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Entrepreneurship as the Key Competence of Early Education Teachers in the Context of Employers’ Expectations – Research Report
Autorzy:
Malinowska, Joanna
Kondracka-Szala, Marta
Powiązania:
https://bibliotekanauki.pl/articles/1997701.pdf
Data publikacji:
2017-09-30
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
key competences
entrepreneurship
entrepreneurial
teacher training
Opis:
The issue undertaken in this article concentrates on entrepreneurship as the key competence of the teachers of preschool and early school children in Poland. A hypothesis was made that developing this competence in the course of professional teacher training is the condition of effective children education. For this purpose, an online survey was conducted with a sample of 232 head teachers of schools and kindergartens (public and private ones). The presented results of the research tackle expectations of employers towards recruited teachers with regards to this competence. Accomplishment of the research project allowed for formulating recommendations for teacher training within the framework of education for entrepreneurship by indicating directions and areas of implementing necessary changes.
Źródło:
The New Educational Review; 2017, 49; 239-249
1732-6729
Pojawia się w:
The New Educational Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Educational priorities in a post pandemic world
Autorzy:
Kobylarek, Aleksander
Plavčan, Peter
Amini Golestani, Taher
Powiązania:
https://bibliotekanauki.pl/articles/1878435.pdf
Data publikacji:
2021-09-25
Wydawca:
Fundacja Pro Scientia Publica
Tematy:
education
key competences
educational priorities
school
Opis:
This article attempts to bring together the most important educational priorities which should be taken into consideration when planning education in a world recovering from a pandemic. Some of the priorities discussed here should have already been taken into account during the 20th century, whilst others are completely new and result from changes that have come about in the 21st century, such as increased arrogance, ignorance, authoritarianism, educational insecurity, contempt for nature, confusion and the promotion of the lies under the name of post-truth . The authors propose a holistic approach to the education process, focused on priorities. In turn, the definition of those priorities should result from the most important problems that affect humanity.
Źródło:
Journal of Education Culture and Society; 2021, 12, 2; 5-11
2081-1640
Pojawia się w:
Journal of Education Culture and Society
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
CZŁOWIEK RADZĄCY SOBIE Z TRUDNOŚCIAMI JAKO WYZWANIE DLA WSPÓŁCZESNEGO WYCHOWANIA
A HUMAN BEING CAPABLE OF CONFRONTING LIFE’S DIFFICULTIES AS A CHALLENGE FOR CONTEMPORARY UPBRINGING
Autorzy:
JUSTYNA, ISKRA
MAŁGORZATA, ARTYMIAK
Powiązania:
https://bibliotekanauki.pl/articles/951370.pdf
Data publikacji:
2017
Wydawca:
Państwowa Wyższa Szkoła Zawodowa w Chełmie
Tematy:
KEY WORDS
resiliency
development
difficult situations
Opis:
Difficult situations are unavoidable in every human's life. They may challenge a person to cope with them in order to overcome the obstacles. The search for personal resources that help one successfully deal with life's challenges has become, in recent years, one of the main issues for both psychology and pedagogy. Resiliency, understood as a personality trait is a subjective quality, which helps one to develop flexible and positive adaptation to difficult situations and to overcome them. The article aims to present the importance of resiliency and the possibilities for raising humans capable of coping with life's obstacles and everyday difficulties.
Źródło:
Scientific Bulletin of Chełm - Section of Pedagogy; 2017, 2; 11-22
2084-6770
Pojawia się w:
Scientific Bulletin of Chełm - Section of Pedagogy
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Kapitał intelektualny jako akcelerator nowej ekonomii
Intellectual capital as an accelerator of the new economy
Autorzy:
Krupa, Kazimierz W.
Mychasiuk, Jan
Stolarczuk, Maksym
Powiązania:
https://bibliotekanauki.pl/articles/534328.pdf
Data publikacji:
2013-12-15
Wydawca:
Uniwersytet Rzeszowski. Wydział Ekonomii
Tematy:
intellectual capital
correlation tables
key employees
Opis:
Empirical studies conducted in the region Podkarpacie indicate that intellectual capital in SMEs do not fully essentially the role starget. This allows the formulation of the opinion that in the studied region, little innovation on balance, it will be difficult implementation strategy escaping forward, by a large group of SMEs, which is expected to be an integral part of the highly developed business
Źródło:
Przedsiębiorstwo i Region; 2013, 5; 6-14
2080-458X
Pojawia się w:
Przedsiębiorstwo i Region
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On the key exchange and multivariate encryption with nonlinear polynomial maps of stable degree
Autorzy:
Ustimenko, V.
Wroblewska, A.
Powiązania:
https://bibliotekanauki.pl/articles/106224.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
key exchange
polynomial mapping
stable degree
Opis:
We say that the sequence gn, n≥3, n→∞ of polynomial transformation bijective mapsof free module Kgn over commutative ring K is a sequence of stable degree if the order of gn is growing with n and the degree of each nonidentical polynomial map of kind gkn is an independent constant c. Transformation b = τgnkτ−1, where τ is the affine bijection, n is large and k is relatively small, can be used as a base of group theoretical Diffie-Hellman key exchange algorithm for the Cremona group C(Kn) of all regular automorphisms of Kn. The specific feature of this method is that the order of the base may be unknown for the adversary because of the complexity of its computation. The exchange can be implemented by tools of Computer Algebra (symbolic computations). The adversary can not use the degree of right handside in bx = d to evaluate unknown x in this form for the discrete logarithm problem. In the paper we introduce the explicit constructions of sequences of elements of stable degree for the cases c = 3 and c = n+2/4 for each commutative ring K containing at least 3 regular elements and discuss the implementation of related key exchange and multivariate map algorithms.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2013, 13, 1; 63-80
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Stymulowanie przez nauczycieli aktywności samokształceniowej uczniów klas 1–3 szkoły podstawowej – raport z badań
Teachers’ ways of independent learning stimulation of primary school students (grades 1–3) – research report
Autorzy:
Flanz, Jolanta
Powiązania:
https://bibliotekanauki.pl/articles/2194748.pdf
Data publikacji:
2021-12-26
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
self-education
lifelong learning
key competences
Opis:
The necessity of developing students’ competences concerning independent learning is easily noticeable in both Polish and international educational documents as well as in scientific literature. This article contains an attempted answer to a question in what way teachers stimulate independent learning activities of primary school students (grade 1 to grade 3). This was the aim of the research conducted with the help of selected group of teachers from Kuyavian-Pomeranian Voivodeship in Poland. The research checked for instance how the teachers encourage the students to independent learning, how they are formulating their homework tasks, and whether they apply the multi-level learning approach. The results of this study are presented in this report.
Źródło:
Kultura-Społeczeństwo-Edukacja; 2021, 20, 2; 257-276
2300-0422
Pojawia się w:
Kultura-Społeczeństwo-Edukacja
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies