Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "key" wg kryterium: Temat


Tytuł:
Niestatystyczne kryteria doboru słów (i frazeo- logizmów) kluczy. Analiza na przykładzie materiału prasowego dostępnego w korpusie ChronoPress
Autorzy:
Kozioł-Chrzanowska, Ewa
Powiązania:
https://bibliotekanauki.pl/articles/474097.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Warszawski i Uniwersytet Rzeszowski
Tematy:
key words, key fixed expressions, identifying key words, ChronoPress corpus
Opis:
The aim of the article is to analyze non-statistic methods of identifying key words (understood as units presenting special importance for a given culture and being a source of knowledge about it). The analyzed criteria of this identi cation are: the presence of the words in the given types of texts and in their speci c parts, undergoing semantic and pragmatic shifts, being a part of phraseo-logical units. The analysis is conducted mainly on the examples extracted form ChronoPress (The Chronological Corpora of Polish Press Texts 1945-1954) from 1945. The e ect of the survey is the evaluation of the abovementioned criteria in terms of their usefulness for identifying key words, followed by a description of the noticed problems and controversies as well as suggestions on finding solutions.
Źródło:
tekst i dyskurs - text und diskurs; 2018, 11; 463-476
1899-0983
Pojawia się w:
tekst i dyskurs - text und diskurs
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Energy-aware key management in mobile wireless sensor networks
Autorzy:
He, X.
Szalachowski, P.
Kotulski, Z.
Fotiou, N.
Marias, G. F.
Polyzos, G. C.
Meer de, H.
Powiązania:
https://bibliotekanauki.pl/articles/106190.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
wireless sensor networks
Diffie-Hellman key agreement
key management
Opis:
Wireless sensor networks have received wide attention recently across the indoor and outdoor applications. On the other hand, more and more application scenarios require sensor nodes to be mobile, which imposes new technological challenges for security. Key management is the core for secure data communications among the resource-constrained sensor nodes. In this paper, based on the Group Diffie-Hellman key agreement protocols and the energy level of each node in the network, we propose Energy Aware Group Diffie-Hellman key management protocol for mobile wireless sensor networks. The simulation results show that the proposed key management protocol provide significant improvement in maximizing the lifetime of networks.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 4; 83-96
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Koncepcja podmiotu kobiecego w ujęciu Ellen Key — wpływ przekładów Ady Werner-Silberstein na modernizację świadomości społecznej
The Concept of Female Subjectivity with Regard to the Work of Ellen Key — the Impact of Ada Werner-Silberstein’s Translations on the Modernization of Social Awareness
Autorzy:
Ciechomska, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/1068952.pdf
Data publikacji:
2020-12-01
Wydawca:
Łódzkie Towarzystwo Naukowe
Tematy:
Ada Silberstein, feminism, Ellen Key
feminism
Ellen Key
Ada Silberstein
Opis:
The article is split into two parts. In the first one the author presents the interpretation of Ellen Key’s, the Swedish feminist, works, which were translated by Ada Werner-Silberstein. In the second part the author tries to describe the impact of these texts on Polish feminists at the beginning of the 20th century and the use of Silberstein's translations in the women’s press of that time, including the use of Key’s language provided by Silberstein. This research perspective allowed the author to extract interesting threads resulting from the translational activity of Ada Werner-Silberstein.
Źródło:
Zagadnienia Rodzajów Literackich; 2020, 63, 3; 27-46
0084-4446
Pojawia się w:
Zagadnienia Rodzajów Literackich
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nauczanie przedsiębiorczości w polskich szkołach średnich – koncepcja, realizacja, rekomendacje
Teaching entrepreneurship in Polish secondary schools: conception, implementation and recommendations
Autorzy:
Bień, Izabela
Powiązania:
https://bibliotekanauki.pl/articles/2194879.pdf
Data publikacji:
2022
Wydawca:
Kancelaria Sejmu. Biuro Analiz Sejmowych
Tematy:
entrepreneurship
education
key competences
Opis:
The article presents assumptions for teaching entrepreneurship as a key competence in Polish secondary schools. The author refers to the general and specific objectives of the subject “Fundamentals of Entrepreneurship” included in the current core curriculum for secondary schools and analyses the results of studies on the knowledge and competences of entrepreneurship among Polish students as well as studies on the evaluation of lessons on this subject conducted in schools. Moreover, the paper describes innovative projects supporting entrepreneurship education in secondary schools and recommendations of various entities on how to improve the quality of education in this area.
Źródło:
Studia BAS; 2022, 2(70); 147-163
2080-2404
2082-0658
Pojawia się w:
Studia BAS
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Risks related to key persons of service companies noted on the NewConnect
Autorzy:
Jedynak, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/685111.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Jagielloński. Wydawnictwo Uniwersytetu Jagiellońskiego
Tematy:
risk, key persons, management
Opis:
The article concerns one of the most important detailed risk management issues, namely, the risk related to key persons. In the theoretical part of the article, the author analyses the current status of the risk associated with key persons in the processes of management of companies. The empirical part contains the results of research conducted on a group of 44 service companies listed on the NewConnect. The research conducted brought about cognitive effects involving, inter alia, identification of ways of perception of the risk related to key persons and the expected potential consequences of its occurrence in the companies surveyed. The study primarily used the method of critical review of the literature and analysis of the content of disclosure documents of the surveyed companies.
Źródło:
Jagiellonian Journal of Management; 2015, 1, 3
2450-114X
Pojawia się w:
Jagiellonian Journal of Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Certificate-less digital signature technology for e-Governance solutions
Autorzy:
Dhir, Shuchi
Devi, Sumithra
Powiązania:
https://bibliotekanauki.pl/articles/305692.pdf
Data publikacji:
2019
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
digital signatures
identity-based architecture
biometrics
fingerprint minutiae
RSA
private key
public key
Opis:
In spite of the fact that digital signing is an essential requirement for implementation of e-governance solutions in any organization, its use in large scale Government ICT implementation is negligible in India. In order to understand the reasons for low-level acceptance of the technology, authors performed a detailed study of a famous e-governance initiative of India. The outcome of the study revealed that the reasons are related to the challenges concerning the use of cryptographic devices carrying private key and the complicated process of generation, maintenance and disposal of Digital Signature Certificates (DSC). The solution, for the challenges understood from the case study, required implementation of a certificateless technology where private keys should be generated as and when required rather than storing them on cryptographic devices. Although many solutions which provide certificateless technology exist, to date there have been no practical implementation for using biometrics for implementing the solution. This paper presents the first realistic architecture to implement Identity Based Cryptography with biometrics using RSA algorithm. The solution presented in the paper is capable of providing a certificate-less digital signature technology to the users, where public and private keys are generated on-the-fly.
Źródło:
Computer Science; 2019, 20 (4); 431-452
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Unconditional security by the laws of classical physics
Autorzy:
Mingesz, R.
Kish, L. B.
Gingl, Z.
Granqvist, C.-G.
Wen, H.
Peper, F.
Eubanks, T.
Schmera, G.
Powiązania:
https://bibliotekanauki.pl/articles/220876.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
information theoretic security
unconditional security
secure key exchange
secure key distribution
quantum encryption
Opis:
There is an ongoing debate about the fundamental security of existing quantum key exchange schemes. This debate indicates not only that there is a problem with security but also that the meanings of perfect, imperfect, conditional and unconditional (information theoretic) security in physically secure key exchange schemes are often misunderstood. It has been shown recently that the use of two pairs of resistors with enhanced Johnsonnoise and a Kirchhoff-loop - i.e., a Kirchhoff-Law-Johnson-Noise (KLJN) protocol . for secure key distribution leads to information theoretic security levels superior to those of today's quantum key distribution. This issue is becoming particularly timely because of the recent full cracks of practical quantum communicators, as shown in numerous peer-reviewed publications. The KLJN system is briefly surveyed here with discussions about the essential questions such as (i) perfect and imperfect security characteristics of the key distribution, and (ii) how these two types of securities can be unconditional (or information theoretical).
Źródło:
Metrology and Measurement Systems; 2013, 20, 1; 3-16
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Verilog-A Compact Semiconductor Device Modelling and Circuit Macromodelling with the QucsStudio-ADMS "Turn-Key" Modelling System
Autorzy:
Brinson, M. E.
Margraf, M.
Powiązania:
https://bibliotekanauki.pl/articles/398029.pdf
Data publikacji:
2012
Wydawca:
Politechnika Łódzka. Wydział Mikroelektroniki i Informatyki
Tematy:
QucsStudio
ADMS
Verilog-A
modelowanie turn-key
compact device modelling
turn-key component modeling
Opis:
The Verilog-A "Analogue Device Model Synthesizer" (ADMS) has in recent years become an established modelling tool for GNU General Public License circuit simulator development. Qucs and ngspice are two examples of open source circuit simulators that employ ADMS for compact semiconductor model construction. This paper presents a "turn- key" compact device modelling and circuit macromodelling system based on ADMS and implemented in the QucsStudio circuit design, simulation and manufacturing environment. A core feature of the new system is a modelling procedure which does not require users to manually patch, by hand, circuit simulator C++ code. At the start of QucsStudio simulation the software automatically detects any changes in Verilog-A model code, re-compiling and dynamically linking the modified code to the body of the QucsStudio cod e. The inherent flexibility of the "turn-key" system encourage s rapid experimentation with analogue and RF compact device models and circuit macromodels. In this paper QucsStudio "turn-key" modelling is illustrated by the design of a single stage RF amplifier circuit and the Harmonic Balance large signal AC simulation of a 50 Ω RF diode switch.
Źródło:
International Journal of Microelectronics and Computer Science; 2012, 3, 1; 32-40
2080-8755
2353-9607
Pojawia się w:
International Journal of Microelectronics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Entrepreneurship as the Key Competence of Early Education Teachers in the Context of Employers’ Expectations – Research Report
Autorzy:
Malinowska, Joanna
Kondracka-Szala, Marta
Powiązania:
https://bibliotekanauki.pl/articles/1997701.pdf
Data publikacji:
2017-09-30
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
key competences
entrepreneurship
entrepreneurial
teacher training
Opis:
The issue undertaken in this article concentrates on entrepreneurship as the key competence of the teachers of preschool and early school children in Poland. A hypothesis was made that developing this competence in the course of professional teacher training is the condition of effective children education. For this purpose, an online survey was conducted with a sample of 232 head teachers of schools and kindergartens (public and private ones). The presented results of the research tackle expectations of employers towards recruited teachers with regards to this competence. Accomplishment of the research project allowed for formulating recommendations for teacher training within the framework of education for entrepreneurship by indicating directions and areas of implementing necessary changes.
Źródło:
The New Educational Review; 2017, 49; 239-249
1732-6729
Pojawia się w:
The New Educational Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Educational priorities in a post pandemic world
Autorzy:
Kobylarek, Aleksander
Plavčan, Peter
Amini Golestani, Taher
Powiązania:
https://bibliotekanauki.pl/articles/1878435.pdf
Data publikacji:
2021-09-25
Wydawca:
Fundacja Pro Scientia Publica
Tematy:
education
key competences
educational priorities
school
Opis:
This article attempts to bring together the most important educational priorities which should be taken into consideration when planning education in a world recovering from a pandemic. Some of the priorities discussed here should have already been taken into account during the 20th century, whilst others are completely new and result from changes that have come about in the 21st century, such as increased arrogance, ignorance, authoritarianism, educational insecurity, contempt for nature, confusion and the promotion of the lies under the name of post-truth . The authors propose a holistic approach to the education process, focused on priorities. In turn, the definition of those priorities should result from the most important problems that affect humanity.
Źródło:
Journal of Education Culture and Society; 2021, 12, 2; 5-11
2081-1640
Pojawia się w:
Journal of Education Culture and Society
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
CZŁOWIEK RADZĄCY SOBIE Z TRUDNOŚCIAMI JAKO WYZWANIE DLA WSPÓŁCZESNEGO WYCHOWANIA
A HUMAN BEING CAPABLE OF CONFRONTING LIFE’S DIFFICULTIES AS A CHALLENGE FOR CONTEMPORARY UPBRINGING
Autorzy:
JUSTYNA, ISKRA
MAŁGORZATA, ARTYMIAK
Powiązania:
https://bibliotekanauki.pl/articles/951370.pdf
Data publikacji:
2017
Wydawca:
Państwowa Wyższa Szkoła Zawodowa w Chełmie
Tematy:
KEY WORDS
resiliency
development
difficult situations
Opis:
Difficult situations are unavoidable in every human's life. They may challenge a person to cope with them in order to overcome the obstacles. The search for personal resources that help one successfully deal with life's challenges has become, in recent years, one of the main issues for both psychology and pedagogy. Resiliency, understood as a personality trait is a subjective quality, which helps one to develop flexible and positive adaptation to difficult situations and to overcome them. The article aims to present the importance of resiliency and the possibilities for raising humans capable of coping with life's obstacles and everyday difficulties.
Źródło:
Scientific Bulletin of Chełm - Section of Pedagogy; 2017, 2; 11-22
2084-6770
Pojawia się w:
Scientific Bulletin of Chełm - Section of Pedagogy
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Kapitał intelektualny jako akcelerator nowej ekonomii
Intellectual capital as an accelerator of the new economy
Autorzy:
Krupa, Kazimierz W.
Mychasiuk, Jan
Stolarczuk, Maksym
Powiązania:
https://bibliotekanauki.pl/articles/534328.pdf
Data publikacji:
2013-12-15
Wydawca:
Uniwersytet Rzeszowski. Wydział Ekonomii
Tematy:
intellectual capital
correlation tables
key employees
Opis:
Empirical studies conducted in the region Podkarpacie indicate that intellectual capital in SMEs do not fully essentially the role starget. This allows the formulation of the opinion that in the studied region, little innovation on balance, it will be difficult implementation strategy escaping forward, by a large group of SMEs, which is expected to be an integral part of the highly developed business
Źródło:
Przedsiębiorstwo i Region; 2013, 5; 6-14
2080-458X
Pojawia się w:
Przedsiębiorstwo i Region
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On the key exchange and multivariate encryption with nonlinear polynomial maps of stable degree
Autorzy:
Ustimenko, V.
Wroblewska, A.
Powiązania:
https://bibliotekanauki.pl/articles/106224.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
key exchange
polynomial mapping
stable degree
Opis:
We say that the sequence gn, n≥3, n→∞ of polynomial transformation bijective mapsof free module Kgn over commutative ring K is a sequence of stable degree if the order of gn is growing with n and the degree of each nonidentical polynomial map of kind gkn is an independent constant c. Transformation b = τgnkτ−1, where τ is the affine bijection, n is large and k is relatively small, can be used as a base of group theoretical Diffie-Hellman key exchange algorithm for the Cremona group C(Kn) of all regular automorphisms of Kn. The specific feature of this method is that the order of the base may be unknown for the adversary because of the complexity of its computation. The exchange can be implemented by tools of Computer Algebra (symbolic computations). The adversary can not use the degree of right handside in bx = d to evaluate unknown x in this form for the discrete logarithm problem. In the paper we introduce the explicit constructions of sequences of elements of stable degree for the cases c = 3 and c = n+2/4 for each commutative ring K containing at least 3 regular elements and discuss the implementation of related key exchange and multivariate map algorithms.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2013, 13, 1; 63-80
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Stymulowanie przez nauczycieli aktywności samokształceniowej uczniów klas 1–3 szkoły podstawowej – raport z badań
Teachers’ ways of independent learning stimulation of primary school students (grades 1–3) – research report
Autorzy:
Flanz, Jolanta
Powiązania:
https://bibliotekanauki.pl/articles/2194748.pdf
Data publikacji:
2021-12-26
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
self-education
lifelong learning
key competences
Opis:
The necessity of developing students’ competences concerning independent learning is easily noticeable in both Polish and international educational documents as well as in scientific literature. This article contains an attempted answer to a question in what way teachers stimulate independent learning activities of primary school students (grade 1 to grade 3). This was the aim of the research conducted with the help of selected group of teachers from Kuyavian-Pomeranian Voivodeship in Poland. The research checked for instance how the teachers encourage the students to independent learning, how they are formulating their homework tasks, and whether they apply the multi-level learning approach. The results of this study are presented in this report.
Źródło:
Kultura-Społeczeństwo-Edukacja; 2021, 20, 2; 257-276
2300-0422
Pojawia się w:
Kultura-Społeczeństwo-Edukacja
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Key competences formation and effective support of students mobility at technology faculties: modeling, design and assessment of flexible education concept
Autorzy:
Pavlásek, P.
Simonová, A.
Koniar, D.
Hargaš, Libor
Špánik, P.
Uriča, T.
Prandová, A.
Powiązania:
https://bibliotekanauki.pl/articles/376745.pdf
Data publikacji:
2018
Wydawca:
Politechnika Poznańska. Wydawnictwo Politechniki Poznańskiej
Tematy:
key competences
flexibility
mobility
higher education didactics
Opis:
The paper brings the results of the current national educational agency project research of effectiveness of the modular didactic cycle with new technologies, methods and forms in student-focused concept through the processing of experimental data of the electronics study program from the period of 2016-2017. Data were collected from contributions kept by the students groups during the preparation phase and also from reflective final phase of the research period. Also, the presented solution and results of the project are directed at the main component of the educational process – the content of education and its compatibility with the technological trends in the actual working environment. The results show that digitization of the learning content and flexibility of design of educational modules with multimedia components are dominant and indicate compatibility with the trends of flexible educational environment. In addition, the results of project illustrates that even the change can be difficult, success can be attained in the most heterogeneous diversification of university education and mobility of graduates of technical universities that will contribute to increase of educational efficiency and will encourage arrival of investments to innovative entrepreneur projects and, mainly, will help national firms to succeed at EU and world market by strengthening of the dominant subject which produces values – the technical field graduate with the key competences for the 21st century needs.
Źródło:
Poznan University of Technology Academic Journals. Electrical Engineering; 2018, 96; 297-306
1897-0737
Pojawia się w:
Poznan University of Technology Academic Journals. Electrical Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The role of childrens universities in developing key competences and universal skills of children and teenagers
Autorzy:
Morańska, Danuta
Powiązania:
https://bibliotekanauki.pl/articles/426375.pdf
Data publikacji:
2018
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
information society
cyber-culture
education
key competences
Opis:
Civilization changes related to the development of information and communication technologies require the formation of new competences in the society, the possession of which will determine the quality of life in the digital world and rational participation in cyberculture. The implementation of this task becomes the special responsibility of educational institutions that aim at stimulating the growth of interests of children and youth in the areas of knowledge crucial for the development of the information society. It is extremely important to take actions supporting the development of logical and mathematical intelligence and digital competences. Their possession is of key importance for the conscious, rational and creative use of new technical possibilities. One of the important initiatives supporting this task is the organization of classes within children’s universities. The article describes the projects undertaken at the Children’s University of the Humanitas University in Sosnowiec. Their main goal is to provide conditions for facilitating the development of interest in science, through its popularization. The main assumption is to implement the idea of active learning in the digital environment. Through experiencing and experimenting with the use of information technology methods and means, children and adolescents can develop competences necessary for efficient functioning in the information society.
Źródło:
e-mentor. Czasopismo naukowe Szkoły Głównej Handlowej w Warszawie; 2018, 4 (76); 54-58
1731-6758
1731-7428
Pojawia się w:
e-mentor. Czasopismo naukowe Szkoły Głównej Handlowej w Warszawie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Value For Clients Resulting From Rail Transport Market Regulation In Poland
Autorzy:
Antonowicz, Mirosław
Powiązania:
https://bibliotekanauki.pl/articles/417376.pdf
Data publikacji:
2014-12-15
Wydawca:
Akademia Leona Koźmińskiego w Warszawie
Tematy:
market
market regulation
key facilities
value
network
Opis:
Purpose: The aim of this study was to elucidate the role of regulation as a tool to create values for both business entities and individual clients due to competition development in the Polish market of rail transport services. Methodology: This study was of a conceptual character. It was based on the analysis of the notion of the rail transport services regulation and the main regulation problems that have appeared in the rail transport regulation practice so far. The analysis of literary sources as well as practice enabled the author to highlight the circumstances when the regulation becomes a necessity and to discuss the conditions for its introduction. Findings: Reviewing the regulation on Polish railway transportation market, the author presents a fundamental conclusion - despite all the changes on the market, regulation does not produce assumed results perceived as an increase of transportation role in economy. According to author, major improvement of institutional and marketing efficiency of regulation entity is essential, as it is relevant for producing favorable results concerning the way the market operates, behavior of the market players as well as building customer value. Originality: Market regulation is a new phenomenon in Polish rail transport. The study discussed the notion of regulatory service. A value-for-clients model was also offered, i.e. the clients of regulatory activities in the course of the competition development in the rail transport services.
Źródło:
Management and Business Administration. Central Europe; 2014, 22, 4; 168-178
2084-3356
Pojawia się w:
Management and Business Administration. Central Europe
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Structures lexico-syntaxiques fondées sur le verbe viser dans l’écrit scientifique. Analyse contrastive franco-polonaise
Lexical-syntactic structures based on the verb FR viser in a scientific text
Autorzy:
Gabrysiak, Katarzyna
Powiązania:
https://bibliotekanauki.pl/articles/1817669.pdf
Data publikacji:
2021-10-22
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
Lexical-syntactic structures
semantic motive
key-concepts
Opis:
The paper offers an analysis of lexical-syntactic structures based on the verb form viser typical of a scientific text, that is a text that follows quite a stable and rigid structure. A corpus-based analysis, achieved through the use of the Scientext corpora, runs across two dimensions. The first dimension is constituted by the subject matter of the text while the other dimension concerns the relation between the author of the text and the recipient. The analysis presented is a two-stage process. At the first stage, lexical-syntactic structures are singled out. The second stage is to assign those structures to the particular parts of the text, such as Introduction, Main body, Conclusion.
Źródło:
Neophilologica; 2021, 33; 1-12
0208-5550
2353-088X
Pojawia się w:
Neophilologica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiza schematów SH-GKDS
Analysis of Self-healing Group Key Distribution Schemes (SH-GKDS)
Autorzy:
Rams, T.
Pacyna, P.
Powiązania:
https://bibliotekanauki.pl/articles/298531.pdf
Data publikacji:
2011
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
bezpieczna komunikacja grupowa
dystrybucja klucza kryptograficznego
selektywna dystrybucja klucza
secure group communication
group key distribution
selective key distribution
Opis:
Artykuł przybliża techniki selektywnej dystrybucji kryptograficznego klucza grupowego w kanale rozsiewczym ze stratami. Stanowi on wprowadzenie do klasy schematów Self-healing Group Key Distribution Schemes (SH-GKDS). Przedstawiono w nim najważniejsze mechanizmy wykorzystywane w projektowaniu schematów SH-GKDS, kładąc nacisk na analizę ich właściwości pod kątem bezpieczeństwa, skalowalności oraz czasu działania systemu stosującego schemat SH-GKDS.
The paper presents techniques for selective group key distribution over an unreliable broadcast channel. It provides introduction to Self-healing Group Key Distribution Schemes (SH-GKDS), including guidelines for scheme design and analysis. The most important mechanisms used in SH-GKDS are described and analysed in terms of security, scalability and system life-time.
Źródło:
Telekomunikacja Cyfrowa : technologie i usługi; 2010-2011, 10; 26-35
1505-9405
Pojawia się w:
Telekomunikacja Cyfrowa : technologie i usługi
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Key Competences in Educating Teachers
Autorzy:
SZŐKÖL, István
Powiązania:
https://bibliotekanauki.pl/articles/457380.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Rzeszowski
Tematy:
key competences
education
teachers competences
information literacy
Opis:
The aim of this work is to show the importance of the expansion of teacher’s key competences, while also pointing out those other competences which are unavoidable in the pedagogical work. If one wants to meet the exigencies of time: vehement changes in science, technology, economy, the changing character of work, one has to learn during all his lifetime. To fulfil the personal and social interests, to improve the quality of one’s life: the life-long education of the individuals is very important – from maternal schools, through scholastic education, education in different institutions and in business, until the education as pensioners.
Źródło:
Edukacja-Technika-Informatyka; 2015, 6, 1; 249-253
2080-9069
Pojawia się w:
Edukacja-Technika-Informatyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Kluczowe wskaźniki efektywności w e-commerce
Key performance indicators in e-commerce
Autorzy:
Zagajewski, A.
Saniuk, S.
Powiązania:
https://bibliotekanauki.pl/articles/323253.pdf
Data publikacji:
2018
Wydawca:
Politechnika Śląska. Wydawnictwo Politechniki Śląskiej
Tematy:
e-commerce
KPI
CSF
Key Performance Indicators
Opis:
Effective management of an online store requires learning about the behavior of its customers. This is possible thanks to the analysis of data provided by users. E-commerce systems and integrated tools provide more and more information about users, which raises problems regarding the selection of data for analysis that support decision-making processes. Hence the need to extract the most important information and build a customized indicator system. Theoretical considerations on the characterization of key performance indicators were undertaken in the paper. In order to identify them in e-commerce, key success factors for the purchasing process were proposed. Particular attention has been paid to methods that can positively influence the indications of key performance indicators. The aim of the article is to propose the key performance indicators (KPI) for the assessment of the purchasing process in e-commerce systems.
Skuteczne zarządzanie sklepem internetowym wymaga poznania zachowania jego klientów. Jest to możliwe dzięki analizie danych, które dostarczają użytkownicy. Systemy e-commerce oraz zintegrowane narzędzia dostarczają coraz więcej informacji o użytkownikach, co rodzi problemy dotyczące wyboru danych do analizy, które wspomagają procesy decyzyjne. Stąd potrzeba wyodrębnienia najważniejszych informacji i zbudowania dostosowanego systemu wskaźników. W pracy podjęto teoretyczne rozważania na temat charakterystyki kluczowych wskaźników efektywności. W celu ich identyfikacji w e-commerce zaproponowano kluczowe czynniki sukcesu dla procesu zakupowego. Szczególną uwagę zwrócono na metody, które mogą pozytywnie wpłynąć na wskazania kluczowych wskaźników efektywności. Celem artykułu jest zaproponowanie wybranych, kluczowych wskaźników efektywności (KPI) dla oceny procesu zakupowego w systemach e-commerce.
Źródło:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska; 2018, 118; 692-701
1641-3466
Pojawia się w:
Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Defining key economic competences for lifelong learning
Autorzy:
Czarnecki, Paweł
Powiązania:
https://bibliotekanauki.pl/articles/2049778.pdf
Data publikacji:
2021
Wydawca:
Instytut Studiów Międzynarodowych i Edukacji Humanum
Tematy:
economics
key competences
lifelong learning
literacy
knowledge
Opis:
In this short article, the idea of key economic competences for lifelong learning is presented. Europe- an Commission recommendations on key competences for lifelong learning and related documents were used as primary sources of the theoretical analysis. The article is divided into an introduction and theoretical background, methodology, results and conclusion. Eight key economic competences defined in this article can be considered as a main contribution to the topic.
Źródło:
Humanum. Międzynarodowe Studia Społeczno-Humanistyczne; 2021, 1(40); 89-92
1898-8431
Pojawia się w:
Humanum. Międzynarodowe Studia Społeczno-Humanistyczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A New Efficient Authenticated and Key Agreement Scheme for SIP Using Digital Signature Algorithm on Elliptic Curves
Autorzy:
Jebrane, A.
Toumanari, A.
Meddah, N.
Bousseta, M.
Powiązania:
https://bibliotekanauki.pl/articles/958109.pdf
Data publikacji:
2017
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
authentication
key agreement
session initiation protocol
VoIP
Opis:
Voice over Internet Protocol (VoIP) has been recently one of the more popular applications in Internet technology. It benefits lower cost of equipment, operation, and better integration with data applications than voice communications over telephone networks. However, the voice packets delivered over the Internet are not protected. The session initiation protocol (SIP) is widely used signaling protocol that controls communications on the Internet, typically using hypertext transport protocol (HTTP) digest authentication, which is vulnerable to many forms of attacks. This paper proposes a new secure authentication and key agreement scheme based on Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) named (ECDSA). Security analysis demonstrates that the proposed scheme can resist various attacks and it can be applied to authenticate the users with different SIP domains.
Źródło:
Journal of Telecommunications and Information Technology; 2017, 2; 62-68
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Multivariate Cryptosystems Based on Computable Maps with Invertible Decomposition
Autorzy:
Ustimenko, V.
Powiązania:
https://bibliotekanauki.pl/articles/106324.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
multivariate map
invertible decomposition
public key infrastructure
Opis:
Let K be a commutative ring and K^n be a space over K of dimension n. We introduce the concept of a family of multivariate maps f(n) of K^n into itself with invertible decomposition.If f(n) is computable in polynomial time then it can be used as the public rule and the invertible decomposition provides a private key in f(n) based public key infrastructure. Requirementsof polynomial ity of degree and density for f(n) allow to estimate the complexity of encryption procedurefor a public user. The concepts of a stable family and a family of increasing order are motivatedby the studies of discrete logarithm problem in the Cremona group. The statement on the existenceof families of multivariate maps of polynomial degree and polynomial density of increasing order with the invertible decomposition is proved. The proof is supported by explicite construction which canbe used as a new cryptosystem. The presented multivariate encryption maps are induced by special walks in the algebraically dened extremal graphs A(n;K) and D(n;K) of increasing girth.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2014, 14, 1; 7-17
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development of key performance indicators of capital market-oriented entities in the Prime Standard since the introduction of DRS 20
Autorzy:
Blumenstein, Philipp
Schmidt, Robert C.
Hastenteufel, Jessica
Powiązania:
https://bibliotekanauki.pl/articles/2175388.pdf
Data publikacji:
2022
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
DRS 20
Prime Standard
key performance indicator
Opis:
This paper examines the performance indicators of 168 Prime Standard entities since the introduction of DRS 20, focusing on the core question of how the use of performance indicators has changed over time. For this purpose, we compare the published key performance indicators from various companies in different years to point out existing differences. Furthermore, we examine which KPIs are changed most often and how frequently businesses adjust their performance indicators. The companies examined are differentiated according to size and sector.
Źródło:
Managerial Economics; 2022, 23, 1; 7--26
1898-1143
Pojawia się w:
Managerial Economics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Funkcja politycznych słów kluczy w memach internetowych
Autorzy:
Niekrewicz, Agnieszka A.
Powiązania:
https://bibliotekanauki.pl/articles/1036194.pdf
Data publikacji:
2020-11-20
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
key word
Internet meme
political language
depreciation
Opis:
The subject of the study is the role of political key words used in memes. To determine their role, a semantic and stylistic analysis of Polish-language memetic statements from 2012–2019 was used, in which the following words were included: sorrel, mirabelles, trotyl, octopuses, light bulb, salad. The article shows that the use of key words even in a completely neutral context allows us to activate references to negatively evaluated events and situations, and to recall the emotions and views associated with them. In addition, quoting chronologically diverse examples of the use of key words has lead to the possibility of recreating the process of extending their meanings, which is the result of releasing quotes associated with a specific situation from their function.
Źródło:
Forum Lingwistyczne; 2020, 7; 105-116
2449-9587
2450-2758
Pojawia się w:
Forum Lingwistyczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Key enabling technologies in the European Union and in Poland
Autorzy:
Gwarda-Gruszczyńska, Edyta
Starzyńska, Dorota
Gortatowicz, Karolina
Powiązania:
https://bibliotekanauki.pl/articles/2128537.pdf
Data publikacji:
2020
Wydawca:
Uniwersytet w Białymstoku. Wydawnictwo Uniwersytetu w Białymstoku
Tematy:
key enabling technologies
technological competitiveness
EU strategy
Opis:
Purpose – To analyse the situation in Key Enabling Technologies (KETs) in the European Union and in Poland. Research method – Desk research and the analysis of available literature. The sources of data used were, among others: European Patent Office, Central Statistical Office, IMD World Competitiveness Centre and High Level Expert Group reports as well as the reports and data of the European Commission. KETs’ analysis in Poland was conducted based on the published CSO data. The article presents selected variables characterising the activity of enterprises operating in the field of biotechnology and nanotechnology, and the analyses of research and development activities as part of the executive sectors in both of the analysed fields. In addition, data on the number of registered patents in Poland and the share of the number of registered patents in the field of biotechnology in relation to their total number were presented. Results – The article covers topics connected with the measurement of KETs’ competitiveness, describes the situation of KETs in Europe and in Poland, not being a very innovative EU country. Originality /value – The problem of KETs and their importance for the EU and its members’ sustainable development is recognized in a limited scope. There is not much literature on the topic. There is no strategy for KETs at the national level in Poland.
Źródło:
Optimum. Economic Studies; 2020, 2(100); 47-62
1506-7637
Pojawia się w:
Optimum. Economic Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Знаки обращения к лермонтовской традиции в пьесе А. Вампилова "Утиная охота"
The references to Lermontov in Vampilov’s play "Duck Hunt"
Autorzy:
Прохорова, Татьяна
Powiązania:
https://bibliotekanauki.pl/articles/22446747.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
tradition
dialogue links
implications
key motifs
reminiscences
Opis:
The goal of the present essay is to reveal Lermontov references in Vampilov’s play Duck Hunt. The analysis is carried out on the basis of the key motifs, allusions, reminiscences and structural models referring to A Hero of our Time and Lermontov’s lyrics.
Źródło:
Acta Universitatis Lodziensis. Folia Litteraria Rossica; 2013, 6; 65-73
1427-9681
2353-4834
Pojawia się w:
Acta Universitatis Lodziensis. Folia Litteraria Rossica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Kompetencje kluczowe w edukacji polonistycznej a działalność innowacyjna szkół - przykład rozwiązań dydaktycznych
Key competences in Polish education and the innovative activity of schools - an example of didactic solutions
Autorzy:
Kubarek, Marta
Powiązania:
https://bibliotekanauki.pl/articles/782336.pdf
Data publikacji:
2020
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
key competences
social competences
communication competences
didactic innovations
Opis:
The aim of the article is to discuss the issue of key competences and to show examples of didactic solutions related to their education in the scope of Polish language education and educational work. The author focuses primarily on social and communication competences. She presents the assumptions of pedagogical innovation, which assumes youth project activities. She also points out the benefits of casting students as explorers, seekers, and creators.
Źródło:
Z Teorii i Praktyki Dydaktycznej Języka Polskiego; 2020, 29; 101-110
0208-5011
2353-9577
Pojawia się w:
Z Teorii i Praktyki Dydaktycznej Języka Polskiego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Role of Key Competences in Adult Education: The Case of Lithuania
Autorzy:
Tūtlys, Vidmantas
Gedvilienė, Genutė
Powiązania:
https://bibliotekanauki.pl/articles/1997802.pdf
Data publikacji:
2017-09-30
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
key competences
knowledge
abilities
lifelong learning (LLL)
Lithuania
Opis:
This article focuses on the analysis of the current state of the key competence development of adults in Lithuania. The following key competences are analysed: communication in native tongues and foreign languages, development of cultural awareness, entrepreneurship, application of information society technologies, and learning to learn. The research involved analysis of the definition and role of the key competences, discussing their typologies and revealing the preconditions, factors and approaches to the development of the key competences. Results of the quantitative survey involving 6992 adult respondents in Lithuania showed that the key competences are important for the majority of the research sample in their social, work and personal life. Individualised ways of key competence development are applied more frequently than collective ways. Key competence development is mostly enhanced by personal needs (work, wish of development and self-realization) and support of the family. The most frequently mentioned obstacles to the development of key competences are lack of financial resources and expensive training services.
Źródło:
The New Educational Review; 2017, 49; 40-53
1732-6729
Pojawia się w:
The New Educational Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Rosyjskie wyrażenie не судьба i jego polskie odpowiedniki
The Russian Expression не судьба and Its Polish Equivalents
Autorzy:
Hordy, Mirosława
Powiązania:
https://bibliotekanauki.pl/articles/1068039.pdf
Data publikacji:
2021-02-22
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
key idea
LOS
СУДЬБА
semantics
pragmatics
interlingual equivalents
Opis:
The subject of the article is a comparative analysis of the Russian expression не судьба кому-л. and its Polish equivalents. In the ethno-cultural aspect, it describes one of the Russian key ideas – the concept of SUD’BA. The special status of the discussed unit is evidenced by: the synthetic form and the inability to express its content in the same simple way in another language, the non-assertive type of meaning and informality. The analysis of lexicographic and corpus sources shows that the closest synonyms of the Russian predicate are Polish sentence phrases, coś nie było sądzone komuś and taki los that shows semantic and pragmatic differences. The devaluation of the importance of the Russian unit observed in recent uses consists in changing the attitude of regret towards unfavourable events into a sense of relief and its relation to “light” and ordinary events. This meaning corresponds to Polish – taka już czyjaś uroda.
Źródło:
Poznańskie Studia Slawistyczne; 2020, 19; 349-362
2084-3011
Pojawia się w:
Poznańskie Studia Slawistyczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Key sectors after a decade of transition: Evidence from Poland
Autorzy:
Gurgul, H.
Lach, Ł.
Powiązania:
https://bibliotekanauki.pl/articles/1201245.pdf
Data publikacji:
2015
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
Polska
input-output matrices
transition
key sector identification
Opis:
This paper is one of the first studies dedicated to the extensive examination of the dynamics of key sectors in Poland in the period of transition. The research was based on the maximum entropy decomposition of the Leontief inverse applied to the highly-disaggregated input-output tables covering the period of 2000–2005. The results allow formulating the list of sectors, which, more or less, have preserved the status of the key sectors in Poland. In turn, some sectors (especially the financial-intermediation- and food-and-agriculture-related ones) have significantly derailed, while services-related sectors (including the transport, tourism, and trade services) have clearly gained in importance. These facts, together with rising importance of certain manufacturing sectors, may suggest that Poland has largely managed to avoid the most negative consequences of the process of de-industrialization, which has been taking place in CEE from the beginning of transition.
Źródło:
Managerial Economics; 2015, 16, 1; 39-79
1898-1143
Pojawia się w:
Managerial Economics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Multi-threshold signature
Autorzy:
Nakielski, B.
Pomykała, J.
Pomykała, J. A.
Powiązania:
https://bibliotekanauki.pl/articles/308529.pdf
Data publikacji:
2008
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
public key cryptography
threshold signature
multisignature
secret sharing
Opis:
The work presents a new signature scheme, called the multi-threshold signature, which generalizes the concept of multisignature and threshold signature. This scheme protects the anonymity of signers in a way the group signature does - in exceptional circumstances the identities of signers may be revealed. Due to the new party - completer, in our scheme the threshold size may vary together with the message to be signed. The presented scheme is based on the RSA signature standard, however other signature standards might be applied to it as well.
Źródło:
Journal of Telecommunications and Information Technology; 2008, 1; 51-55
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Silent Calls – Causes and Measurements
Autorzy:
Baran, K.
Cegłowski, P.
Kula, S.
Powiązania:
https://bibliotekanauki.pl/articles/308612.pdf
Data publikacji:
2015
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
key performance indicators
silent calls
speech signal analysis
Opis:
The quality of telephone services is very important from either operator or subscriber point of view. One of the negative phenomenon which affects quality of telephone services is lack of speech signal during a call. This situation occurs relatively frequently in mobile telephony, and is called silent call (SC). Lack of speech signal can occur only once or many times during the call, and degrade connection quality. In this paper, an analysis of this phenomenon is presented. The research base are the results of measurements mobile network one of operators in Trójmiasto a large urban area consisting of three cities: Gdańsk, Gdynia, and Sopot. To estimate impact of silent calls on speech quality, mean opinion score index was calculated using POLQA algorithm.
Źródło:
Journal of Telecommunications and Information Technology; 2015, 1; 20-22
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Stratigraphy and lithology of Quaternary sediments in the Kleczew region and in key sections of the eastern Wielkopolska Lowland, central Poland
Autorzy:
Widera, M.
Powiązania:
https://bibliotekanauki.pl/articles/2059428.pdf
Data publikacji:
2000
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
Wielkopolska Lowland
Quaternary
Pleistocene
stratigraphy
lithology
key section
Opis:
The stratigraphy and lithology of the Quaternary deposits of the Kleczew region are analysed in a regional context. They can be correlated with the Preglacial, Narevian(?), South Polish, Middle Polish and Vistulian Glaciations, and the Podlasian, Zbójno and Eemian Interglacials. Large glaciotectonic structures, commonly encountered in lignite mines, proved useful in correlating grey tills of the older Pleistocene glaciations. Lithology, stratigraphy, thickness and palaeomorphology of the Pleistocene sediments were presented in the key sites Konin-Marantów, Mikorzyn, Sławoszewek and in 6 borehole sections. A regional lithostratigraphic scheme of the Quaternary in the eastern Wielkopolska Lowland was constructed basing on petrographic coefficients of tills, lithology, genesis and, finally, on hypsometric setting and thickness. In the light of these studies the maximum ice sheet unit of the Oldest Glaciation should be moved to the south from Kleczew. Moreover, tills of the Odranian, Wartanian and Vistulian Glaciations were found.
Źródło:
Geological Quarterly; 2000, 44, 2; 211-220
1641-7291
Pojawia się w:
Geological Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Support of active ageing through P2P learning
Autorzy:
Baschiera, Barbara
De Meyer, Willem
Powiązania:
https://bibliotekanauki.pl/articles/954222.pdf
Data publikacji:
2016
Wydawca:
Fundacja Pro Scientia Publica
Tematy:
Older Adults
Peer to peer learning
Key competences
Opis:
Personal development throughout the course of life is at the core of several important policy documents that have shaped European cooperation in economic, social and educational sciences over the last decade. The paradigm of Lifelong Learning implies learning at any age of life and underlines the importance of achieving continuous knowledge and self-care. Pedagogy has started taking into account the age of older adults only in recent years. The European project we are going to illustrate sought to test how well peer to peer learning can be useful to define new training and learning models for older adults. The HiHtaST (Hand in Hand to a Social Tomorrow) project provides an example of peer to peer learning among older adults. We provided training for adult learners to teach IT among other older adults as a means for social inclusion in five European countries. Each country had 20 learners / trainers who had other older students in turn. Multiple choice questionnaires and focus groups were used to collect data. The project was run in the theoretical framework of active ageing, considering the paradigm of Vygotsky’s zone of proximal development and co-construction of knowledge.The project results showed that adults can acquire knowledge in peer to peer group situations with no drop-outs especially when learning real and practical tasks, which suggests that peer to peer learning works better than a frontal class in formal as well as non-formal or informal situations.
Źródło:
Journal of Education Culture and Society; 2016, 7, 1; 180-192
2081-1640
Pojawia się w:
Journal of Education Culture and Society
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Experimental research of the resilient keyed joints statics
Autorzy:
Malaschenko, V.
Strilets, O.
Yankiv, V.
Powiązania:
https://bibliotekanauki.pl/articles/411241.pdf
Data publikacji:
2014
Wydawca:
Polska Akademia Nauk. Oddział w Lublinie PAN
Tematy:
shaft-hub connection
resilient parallel key
torque transfer
Opis:
This article deals with the problem of shaft-hub connections rigidity and one way of solving it by using the new constructions of resilient keyed joints. Methods of experimental research of the resilient paral-lel keyed joints statics are described by showing de-pendences between their deformations, torque and sizes, and conclusions in comparison with theoretical research are made.
Źródło:
ECONTECHMOD : An International Quarterly Journal on Economics of Technology and Modelling Processes; 2014, 3, 4; 11-16
2084-5715
Pojawia się w:
ECONTECHMOD : An International Quarterly Journal on Economics of Technology and Modelling Processes
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Key Performance Indicators in local government in Poland
Autorzy:
Kowalczyk, Magdalena
Powiązania:
https://bibliotekanauki.pl/articles/581090.pdf
Data publikacji:
2018
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
Key Performance Indicators
local government units
performance measurement
Opis:
One of the basic accusations against public finance units, including local governments (lg), is the lack of economic efficiency and relations of the expenditures and outcomes. Just like in the case of commercial entities, local governments put more emphasis on the possibility to present the effectiveness of their operations not only by means of financial indicators. The herein study constitutes an attempt to demonstrate the possibilities and benefits of introducing the Key Performance Indicators (KPI) reporting in lg. According to the conducted research it results that the use of KPI in order to report on the achieved outcomes in different fields of activities is fully reasonable in terms of local governments. The elaboration of a set of common KPI for all the units shall facilitate the comparison of the achieved results both in time and space. The article presents a new issue that are the opportunities of using KPI in the Polish local governments in order to prepare reports.
Źródło:
Prace Naukowe Uniwersytetu Ekonomicznego we Wrocławiu; 2018, 503; 236-245
1899-3192
Pojawia się w:
Prace Naukowe Uniwersytetu Ekonomicznego we Wrocławiu
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Random-Resistor-Random-Temperature Kirchhoff-Law-Johnson-Noise (RRRT-KLJN) Key Exchange
Autorzy:
Kish, L. B.
Granqvist, C. G.
Powiązania:
https://bibliotekanauki.pl/articles/221212.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
KLJN key exchange
information theoretic security
unconditional security
Opis:
We introduce two new Kirchhoff-law-Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR-) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR-KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random Resistor Random Temperature (RRRT-) KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT-KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT-KLJN scheme can prevail at a non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation-Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT-KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.
Źródło:
Metrology and Measurement Systems; 2016, 23, 1; 3-11
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ключевые имена времени в публицистическом стиле
Autorzy:
ЦОНЕВА, ЛИЛЯНА
Powiązania:
https://bibliotekanauki.pl/articles/957692.pdf
Data publikacji:
2007
Wydawca:
Uniwersytet Opolski
Tematy:
key names
proper names
paraphrase
occasional words
pun
Opis:
The paper diccusses key proper names in modem Russian - names of personalities that are at the focus of publikę attention. They, like key words in generał, have theer oron spe- cific features, e. g. high frequency and use in titles of joumalistic discourse. Special attention is paid on the use of key proper names in different language games conditioned by theirlinguistic and extralinguistic associative potential.
Źródło:
Stylistyka; 2007, 16; 423-441
1230-2287
2545-1669
Pojawia się w:
Stylistyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Dynamical systems as the main instrument for the constructions of new quadratic families and their usage in cryptography
Autorzy:
Ustimenko, V.
Wroblewska, A.
Powiązania:
https://bibliotekanauki.pl/articles/106218.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
discrete logarithm
cryptographic algorithm
cryptography
public key cryptography
Opis:
Let K be a finite commutative ring and f = f(n) a bijective polynomial map f(n) of the Cartesian power K^n onto itself of a small degree c and of a large order. Let f^y be a multiple composition of f with itself in the group of all polynomial automorphisms, of free module K^n. The discrete logarithm problem with the pseudorandom base f(n) (solvef^y = b for y) is a hard task if n is sufficiently large. We will use families of algebraic graphs defined over K and corresponding dynamical systems for the explicit constructions of such maps f(n) of a large order with c = 2 such that all nonidentical powers f^y are quadratic polynomial maps. The above mentioned result is used in the cryptographical algorithms based on the maps f(n) – in the symbolic key exchange protocols and public keys algorithms.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 3; 65-74
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Atomic-key B-trees
Autorzy:
Drozdek, A.
Vujanović, D.
Powiązania:
https://bibliotekanauki.pl/articles/92948.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
atomic-key B-tree
data structures
database management
Opis:
Atomic-key B-trees are B-trees with keys of different sizes. This note presents two versions of an insertion algorithm and a deletion algorithm for atomic-key B-trees.
Źródło:
Studia Informatica : systems and information technology; 2015, 1-2(19); 15-26
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Adjusting the employee management process to key organisational values
Autorzy:
Marek, Agnieszka
Powiązania:
https://bibliotekanauki.pl/articles/14458710.pdf
Data publikacji:
2018-12-22
Wydawca:
Wyższa Szkoła Bankowa we Wrocławiu
Tematy:
key organizational values
employee management
management by values
Opis:
Aim: The paper is aimed at highlighting the growing importance of values in both management theory and practice with a focus on aligning employee management practices with the key values in organisations which practise Management by Values (MBV).   Design / Research methods:  Critical literature review and analysis of results of accessible empirical research.   Conclusions / findings: Management by Values can only yield effects if it is applied in all sections of the firm with employees taking up actions in line with the shared organizational values. That is why it is crucial to reflect the core values in recruitment and selection of employees, as well as training, motivation or work productivity assessment. The analysis of the literature revealed the need for more in-depth research on the links between staff policy and management by values, especially in management practices.   Originality / value of the paper: The paper is aimed at managers who implement MBV in their organisations as well as scholars focusing on the subject of values in management. What is more, it synthesizes different outlooks on MBV and embeds this concept in realities of Polish companies.   Limitations of the research: The literature review and analysis of the results of empirical research conducted in Polish companies indicate the growing importance of values in management practice and the necessity of constructing specific tools that would enable leaders to operationalize key values and use some indicators to assess present and potential employees in the terms of their respect for the organization’s shared values.
Źródło:
Central European Review of Economics and Management; 2018, 2, 4; 111-126
2543-9472
Pojawia się w:
Central European Review of Economics and Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On the “cracking” scheme in the paper “A directional coupler attack against the Kish key distribution system” by Gunn, Allison and Abbott
Autorzy:
Chen, H.-P.
Kish, L. B.
Granqvist, C. G.
Schmera, G.
Powiązania:
https://bibliotekanauki.pl/articles/221413.pdf
Data publikacji:
2014
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
KLJN key exchange
information theoretic security
unconditional security
Opis:
Recently, Gunn, Allison and Abbott (GAA) [http://arxiv.org/pdf/1402.2709v2.pdf] proposed a new scheme to utilize electromagnetic waves for eavesdropping on the Kirchhoff-law-Johnson-noise (KLJN) secure key distribution. We proved in a former paper [Fluct. Noise Lett. 13 (2014) 1450016] that GAA’s mathematical model is unphysical. Here we analyze GAA’s cracking scheme and show that, in the case of a loss-free cable, it provides less eavesdropping information than in the earlier (Bergou)-Scheuer-Yariv mean-square-based attack [Kish LB, Scheuer J, Phys. Lett. A 374:2140-2142 (2010)], while it offers no information in the case of a lossy cable. We also investigate GAA’s claim to be experimentally capable of distinguishing - using statistics over a few correlation times only - the distributions of two Gaussian noises with a relative variance difference of less than 10-8. Normally such distinctions would require hundreds of millions of correlations times to be observable. We identify several potential experimental artifacts as results of poor KLJN design, which can lead to GAA’s assertions: deterministic currents due to spurious harmonic components caused by ground loops, DC offset, aliasing, non-Gaussian features including non-linearities and other non-idealities in generators, and the timederivative nature of GAA’s scheme which tends to enhance all of these artifacts.
Źródło:
Metrology and Measurement Systems; 2014, 21, 3; 389-400
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A new method of line feature generalization based on shape characteristic analysis
Autorzy:
Huang, Z.
Nie, H.
Powiązania:
https://bibliotekanauki.pl/articles/220575.pdf
Data publikacji:
2011
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
line generalization
key point detection
shape characteristic analysis
Opis:
This paper presents a piecewise line generalization algorithm (PG) based on shape characteristic analysis. An adaptive threshold algorithm is used to detect all corners, from which key points are selected. The line is divided into some segments by the key points and generalized piecewise with the Li-Openshaw algorithm. To analyze the performance, line features with different complexity are used. The experimental results compared with the DP algorithm and the Li-Openshaw algorithm show that the PG has better performance in keeping the shape characteristic with higher position accuracy.
Źródło:
Metrology and Measurement Systems; 2011, 18, 4; 597-605
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Video key frame detection based on the restricted Boltzmann machine
Autorzy:
Knop, M.
Kapuściński, T.
Mleczko, W. K.
Powiązania:
https://bibliotekanauki.pl/articles/122435.pdf
Data publikacji:
2015
Wydawca:
Politechnika Częstochowska. Wydawnictwo Politechniki Częstochowskiej
Tematy:
Restricted Boltzmann Machine
key frame detection
video compression
Opis:
In this paper we present a new method for key frame detection. Our approach is based on a well-known algorithm of the Restricted Boltzmann Machine (RBM), which is a pivotal step in our method. The frames are compared to the RBM matcher, which allows one to search for key frame in the video sequence. The Restricted Boltzmann Machine is one of sophisticated types of neural networks, which can process the probability distribution, and is applied to filtering image recognition and modelling. The learning procedure is based on the matrix description of RBM, where the learning samples are grouped into packages, and represented as matrices. Our research confirms a potential usefulness for video key frame detection. The proposed method provides better results for professional and high-resolution videos. The simulations we conducted proved the effectiveness of our approach. The algorithm requires only one input parameter.
Źródło:
Journal of Applied Mathematics and Computational Mechanics; 2015, 14, 3; 49-58
2299-9965
Pojawia się w:
Journal of Applied Mathematics and Computational Mechanics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Development of Student Key Competencies while Studying Computer Science in Secondary School
Autorzy:
Mukii, Taisiia
Powiązania:
https://bibliotekanauki.pl/articles/448485.pdf
Data publikacji:
2017-04-01
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
key competencies
reflexivity
humane pedagogy
personal development
ICT
Opis:
This paper discusses the key competencies in the 21st century in the context of a transition to a new humanistic paradigm of education as well as the results of the PISA 2012 study “Creative Problem Solving.” Contradictions between traditional skills and 21st century competencies of a school graduate are analyzed. The article also discusses contradictions between social needs of a person with a highly developed intellectual, spiritual and moral potential, and an insufficient development of theoretical and methodological bases of the student’s key com- petence development, as well as between the traditional methods of computer science teaching and the necessity to solve problems during the educational process supported by the use of ICT. The results of the application of ICT teaching methods based on the principles of humane pedagogy are presented, and their effectiveness is confirmed.
Źródło:
International Journal of Research in E-learning IJREL; 2015, 1, 2; 106-120
2451-2583
2543-6155
Pojawia się w:
International Journal of Research in E-learning IJREL
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A theory of global economic growth in the very long-run: is a grand innovation slowdown inevitable?
Autorzy:
Gomułka, Stanisław
Powiązania:
https://bibliotekanauki.pl/articles/1356655.pdf
Data publikacji:
2020-06-06
Wydawca:
Uniwersytet Warszawski. Wydział Nauk Ekonomicznych
Tematy:
Endogenous growth theory
Phelps
Hat-shaped relationship
Long-term global growth slowdown
Key growth trends
Key growth stylized facts
JEL Classification
Opis:
The paper shows how the original semi endogenous and balanced growth model of Phelps (1966), and my extended version of it (Gomulka, 1990), could be useful in explaining the key ‘stylized facts’ of global long-term growth so far, and in predicting its dynamics in the future. During the last two centuries the sector of R&D and education, producing qualitative changes, has been expanding in the world’s most developed countries much faster than the sector producing conventional goods. The extended model is used to explore and evaluate. the consequences for the global long-term growth of the end of this unbalanced growth, of the completion of the catching up by most of the world’s less developed countries, and of the expected eventual stabilization of the size of the world population. The theory yields a thesis, new in the literature, that the rate of global per capita GDP growth will eventually return to the historically standard very low level, thus implying that the world’s technological revolution is going to be an innovation super-fluctuation.
Źródło:
Central European Economic Journal; 2019, 6, 53; 175 - 188
2543-6821
Pojawia się w:
Central European Economic Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
High performance quantum key distribution prototype system using a commercial off-the-shelf solution: experimental and emulation demonstrations
Autorzy:
Lopez-Leyva, J. A.
Ruiz-Higuera, J.
Arvizu-Mondragon, A.
Santos-Aguilar, J.
Ramos-Garcia, R.
Ponce-Camacho, M.
Powiązania:
https://bibliotekanauki.pl/articles/174150.pdf
Data publikacji:
2017
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
quantum cryptography
final secret key rate
FSecKR
coherent states
Opis:
A continuous variable-quantum key distribution system prototype that uses weak coherent states with a diffused phase, commercial off-the-shelf devices, complete free space 90-degrees hybrid and simplified quantum protocol is proposed in this paper. In general, the quantum transmitter-receiver shows an experimental average quantum bit error rate of 30% using auto-homodyne detection with 0.25 photons per pulse in locking phase mode. The emulated final secret key rate measurements were 20 and 40 Kbps for minimum (30 Mbps) and maximum (90 Mbps) throughput, respectively, in a real traffic network using databases for the quantum keys generated by two true random number generators.
Źródło:
Optica Applicata; 2017, 47, 3; 411-419
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies