Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "two-factor" wg kryterium: Temat


Wyświetlanie 1-18 z 18
Tytuł:
Modeling of the User’s Identification Security System of on the 2FA Base
Autorzy:
Ussatova, Olga
Nyssanbayeva, Saule
Wójcik, Waldemar
Powiązania:
https://bibliotekanauki.pl/articles/1844625.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
two-factor authentication
data security
user identification
password generator
Opis:
The article describes methods of user identification using authentication based on the second factor. Known algorithms and protocols for two-factor authentication are considered. An algorithm is proposed using mobile devices as identifiers and generating a temporary password based on the hash function of encryption standards. For an automated control system, a two-factor authentication model and a sequential algorithm for generating a temporary password using functions have been developed. The implementation of the system is based on the Node.js software platform using the JavaScript programming language, as well as frameworks and connected system libraries. MongoDB, an open source database management system for information storage and processing was used.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 2; 235-240
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Two-factor authentication (2FA) comparison of methods and applications
Autorzy:
Florczak, Sebastian
Jasiak, Adrian
Szczygieł, Izabela
Powiązania:
https://bibliotekanauki.pl/articles/31233162.pdf
Data publikacji:
2023
Wydawca:
Patryk Organiściak
Tematy:
cybersecurity
authentication
two-factor authentication
2FA
bezpieczeństwo cybernetyczne
uwierzytelnianie
uwierzytelnianie dwuskładnikowe
Opis:
In this document, the investigation delves into the realm of two-factor authentication (2FA), exploring its applications and comparing various methods of implementation. Two-factor authentication, often referred to colloquially as two-step verification, serves to enhance credential security during login processes across platforms such as Facebook and online banking, among others. While 2FA has significantly improved the security of the login and registration processes, it is noteworthy that its adoption tends to be more prevalent among younger individuals. Unfortunately, an increasing number of financial scams target older individuals who may be disinclined to engage with what they perceive as the complexity of multi-step authentication and password confirmation. Subsequent chapters provide a discussion of the various types of two-factor authentication, furnish detailed descriptions, and offer a summary of the benefits and gains achievable through the deployment of 2FA.
Źródło:
Advances in Web Development Journal; 2023, 1; 26-45
2956-8463
Pojawia się w:
Advances in Web Development Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Generators of one-time two-factor authentication passwords
Generatory jednorazowych dwuczynnikowych haseł autoryzacji
Autorzy:
Ussatova, Olga
Nyssanbayeva, Saule
Powiązania:
https://bibliotekanauki.pl/articles/408642.pdf
Data publikacji:
2019
Wydawca:
Politechnika Lubelska. Wydawnictwo Politechniki Lubelskiej
Tematy:
password generator
two-factor authentication
data protection
generator hasła
uwierzytelnianie dwuskładnikowe
ochrona danych
Opis:
The paper presents algorithms for generating a one-time two-factor authentication passwords where application of trigonometric functions have been considered. To protect the opening of a one-time password, a secret string is read that consists of a sequence of randomly generated characters. The second factor is due to the fact that that the code has a certain validity period. The presented password generators allow the formation of secret words and trigonometric functions that the proposed two-factor authentication method consists of. The algorithm presented was implemented in Java Script. The algorithm includes blocks for checking randomly generated words and functions.
W pracy przedstawiono algorytmy generowania jednorazowych, dwuczynnikowych haseł uwierzytelniających, w których uwzględniono zastosowanie funkcji trygonometrycznych. Aby chronić otwarcie jednorazowego hasła, odczytywany jest tajny ciąg składający się z sekwencji losowo generowanych znaków. Drugi składnik wynika z faktu, że kod ma określony okres ważności. Przedstawione generatory haseł umożliwiają tworzenie tajnych słów i funkcji trygonometrycznych, z których składa się proponowana metoda dwuczynnikowego uwierzytelniania. Przedstawiony algorytm został zaimplementowany w Java Script. Algorytm zawiera bloki do sprawdzania losowo generowanych słów i funkcji.
Źródło:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska; 2019, 9, 2; 60-63
2083-0157
2391-6761
Pojawia się w:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Number and content of personality types across methods and samples: Empirically filling the theoretically developed map of RUNO typology
Autorzy:
Strus, Włodzimierz
Cybis, Natalia
Cieciuch, Jan
Rowiński, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/2121822.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Big Five
RUO personality types
RUNO typology
Two Factor Model
Circumplex of Personality Metatraits
Opis:
Personality types are currently understood as basic configurations of personality traits from the Big Five model. However, to date, research has provided inconsistent results as to the number and content of personality types. The broadest support was found for the three-type RUO (Resilient-Undercontrolled-Overcontrolled) typology, but many studies indicate the existence of four or five basic personality types. The prevalence of an exploratory orientation in research on personality types was identified as the main cause of these inconsistencies, and the need for a well-justified theoretical basis for the personality typology was observed. The current study examines the predictions resulting from the four-type RUNO (Resilient-Undercontrolled-Nonresilient-Overcontrolled) typology – a proposal built on the Two Factor Model of personality and its extension: the Circumplex of Personality Metatraits. We used various measurement instruments (11 questionnaires to measure Big Five traits), samples (five samples with a total of 4430 respondents) and statistical procedures (cluster analyses on row and standardized data) testing the three-type, four-type and five-type solutions. We expected that although the robustness of the empirically derived type-solutions across different research conditions will be limited (in accordance with the previous studies), the configurations of each type found in the Big Five data will be in a concordance with the RUNO typology. Obtained results roughly confirmed our expectations. We conclude that a renewed focus on the theoretical basis of personality typology seems to be necessary to further advance this field of research and the Circumplex of Personality Metatraits enables the essential turn from an exploratory approach (usually used in the previous studies) to a theoretically driven approach (proposed by us in the current study) to personality typology.
Źródło:
Polish Psychological Bulletin; 2021, 52, 3; 211-226
0079-2993
Pojawia się w:
Polish Psychological Bulletin
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiza wiedzy o aspektachcyberbezpieczeństwa i logowania dwuetapowego w społeczeństwie
An Analysis of the Knowledge about the Aspects of Cybersecurity and Two-Factor Logging in the Society
Autorzy:
Piłat, Kamil
Pawłowski, Michał Tomasz
Kozieł, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/2086222.pdf
Data publikacji:
2022
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
cyberbezpieczeństwo
logowanie dwuetapowe
oprogramowanie szantażujące
podpis elektroniczny
cybersecurity
two-factor login
ransomware
electronic signature
Opis:
W artykule przedstawiono przebieg badań dotyczących bezpiecznego korzystania z Internetu przeprowadzonych na grupie 200respondentów w wieku 10-60i więcej lat. Szczególną uwagę zwrócono na zagrożenie oprogramowaniem szpiegującym i inne zagrożenia w sieci Internet. Przeprowadzono badania ankietowe wspomagane komputerowo. Wy-niki ankiet były analizowane zużyciem analizy częstości oraz analizy korelacji Pearsona i Spearmana. Przeprowadzone badania wykazałyniezadowalający poziom wiedzy z zakresu cyberbezpieczeństwa dla grup wiekowych 10-15 oraz 60 i więcej lat oraz wystarczający dla grup wiekowych 20-24 lat. Problem stał się szczególnie aktualny, biorąc pod uwagę wpływ pandemii COVID-19 na nauczanie i pracę zdalną oraz komunikację zdalną w rodzinach.
The article presents the course of research on the safe use of the Internet, carried out on a group of 200 respondents aged 10-60 and more. Particular attention was paid to the threat of ransomware and other threats on the Internet. Computer-aided survey research was carried out. Survey results were analyzed using a frequency analysis and a Pearson-Spearman correlation analysis. The conducted research showed an unsatisfactory level of knowledge in the field of cybersecurity for the age groups 10-15 and 60 and more, and it was sufficient for the age groups 20-24. The problem has become especially topical given the impact of the COVID-19 pandemic on teaching and remote work and remote communication in families.
Źródło:
Journal of Computer Sciences Institute; 2022, 23; 112--117
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Theoretical framework for the RUNO personality typology based on the Circumplex of Personality Metatraits
Autorzy:
Strus, Włodzimierz
Cybis, Natalia
Cieciuch, Jan
Rowiński, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/2121846.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
personality types
Big Five
RUO typology
Two Factor Model
Circumplex of Personality Metatraits
RUNO typology
Opis:
The current literature on personality types—understood as basic configurations of the Big Five’s personality traits—provides inconsistent results. The most commonly reported, three-type RUO (Resilient-Undercontrolled-Overcontrolled) solution is not definitive, as other solutions are also" often obtained. The current paper starts from reviewing and discussing the inconsistencies found in the previous results as well as in the RUO typology itself. The prevalence of an exploratory orientation in research on personality type was interpreted as the main cause of these problems. Then, we proposed a solution by using the Two Factor Model of personality and its extension—the Circumplex of Personality Metatraits—as the theoretical foundation for a four-type RUNO typology (Resilient-Undercontrolled-Nonresilient-Overcontrolled). The paper presents the RUNO personality typology and its theoretical consequences – in particular, we argue that the RUNO (a) is the most theoretically justified, and therefore, empirically expected solution, (b) allows us to explain why the three-type RUO solution is so commonly obtained, and (c) helps to solve some other problems that have arisen in the literature (e.g., with “typeness”).
Źródło:
Polish Psychological Bulletin; 2021, 52, 3; 197-210
0079-2993
Pojawia się w:
Polish Psychological Bulletin
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Struktura terminowa stóp procentowych opisana modelami stopy krótkoterminowej
Term structure of interest rates described with short-rate models
Autorzy:
Jodź, Kamil
Powiązania:
https://bibliotekanauki.pl/articles/434054.pdf
Data publikacji:
2014
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
spot rate
term structure of interest rates
yield curve
one-factor short-rate models
two-factor short-rate models
Opis:
The article gives an overview of the theoretical basis for the term structure of interest rates. Theoretical and practical benefits of this kind of modeling are indicated. The arguments in support of the opinion that the financial market model with continuous time is better than the model with discrete time are listed. Slightly wider is the discussion on one-factor and two-factor models of the dynamics of the short term rate due to stochas-tic differential equations.
Źródło:
Śląski Przegląd Statystyczny; 2014, 12(18); 273-284
1644-6739
Pojawia się w:
Śląski Przegląd Statystyczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of potential risks of SMS-based authentication
Autorzy:
Szpunar, Albert
Stęchły, Arkadiusz
Powiązania:
https://bibliotekanauki.pl/articles/31233158.pdf
Data publikacji:
2023
Wydawca:
Patryk Organiściak
Tematy:
authentication
cyber security
two-factor authentication
2FA
SMS
text message
uwierzytelnianie
bezpieczeństwo cybernetyczne
uwierzytelnianie dwuskładnikowe
wiadomość tekstowa
Opis:
The pervasive use of mobile devices and the omnipresence of the Internet have ushered in a transformative era. Nearly everyone, regardless of age, possesses a mobile phone, bridging generational gaps in digital interaction. Mobile phones have become highly personal, with users guarding them zealously. Service providers recognize this intimate relationship, offering an opportunity to enhance security. Traditional password-based security is vulnerable to data breaches, prompting the adoption of mobile phones as a more robust platform for safeguarding digital assets. This shift has also facilitated the development of digital identification applications, reducing reliance on physical identity documents. Additionally, mobile banking applications are replacing physical payment cards, enabling secure transactions. The ascendancy of mobile payment solutions is diminishing the role of physical cash and wallets. In summary, mobile devices have reshaped security and daily activities, becoming the cornerstone of our digital existence, offering higher levels of security, convenience, and efficiency.
Źródło:
Advances in Web Development Journal; 2023, 1; 13-25
2956-8463
Pojawia się w:
Advances in Web Development Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Protecting web applications from authentication attacks
Autorzy:
Gugała, Łukasz
Łaba, Kamil
Dul, Magdalena
Powiązania:
https://bibliotekanauki.pl/articles/31233161.pdf
Data publikacji:
2023
Wydawca:
Patryk Organiściak
Tematy:
web application security
cybersecurity
2FA
authentication
two-factor authentication
bezpieczeństwo aplikacji internetowych
bezpieczeństwo cybernetyczne
uwierzytelnianie
uwierzytelnianie dwuskładnikowe
Opis:
This paper explores the critical domain of safeguarding web-based applications against authentication attacks, recognizing the persistent challenges posed by evolving cyber threats. The project delineates the distinct objectives of such attacks, including data theft, identity theft, and service disruption, underlining their potential far-reaching implications, such as the compromise of sensitive corporate data and the execution of unauthorized administrative operations. It underscores the pivotal role of user awareness and education as the ultimate defense against authentication-related breaches. Robust security measures, encompassing the use of strong, intricate passwords, encrypted network communication, two-factor authentication, and the regulation of failed login attempts, are emphasized as essential safeguards. Additionally, the project underscores the significance of maintaining system components through regular updates and conducting comprehensive security audits. A holistic approach, integrating technical and human factors, underscores user awareness and ongoing training as indispensable elements in the endeavor to enhance security in an increasingly digital landscape. "Protecting Web Applications from Authentication Attacks" aims to equip its readers with a comprehensive understanding of authentication system security and offers practical directives for bolstering defense mechanisms in a professional and formal context.
Źródło:
Advances in Web Development Journal; 2023, 1; 26-42
2956-8463
Pojawia się w:
Advances in Web Development Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Poczucie autoskuteczności w matematyce uczniów i uczennic
Sense of Self-efficacy in Mathematics of Male and Female Students
Autorzy:
Turska, Dorota
Powiązania:
https://bibliotekanauki.pl/articles/26443930.pdf
Data publikacji:
2013-06-30
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
stereotype
mathematics as a domain for males
a lower secondary school
two-factor analysis of variance
mathematics self-efficacy
Opis:
Women’s underrepresentation in strictly technical fields of study closely linked to mathematics is a universal phenomenon, registered not only in Poland. Conclusions from numerous educational reports are worldwide as well – it is girls who preponderate over boys in math grades at every stage of education. Furthermore, in Polish conditions, the results of external exams are not significantly diversified by gender. Thus, the consequences of different evaluation systems do not explicate the so-called „women gender gap” in terms of women academic and vocational choices. In Poland, for a few years there has been attempts to counteract the prevailing trend through „The Girls for Engineers” programme or systems of scholarships for female students of technical and scientific studies. Such activities are claimed to be legitimate, though still insufficient, because they focus on diminishing the symptoms of the phenomenon, regardless of its exact causes. The explanation proposed in the article refers to the effects of stereotype that „maths is a domain for males”. It has been assumed that such stereotype has an adverse impact on the perception of one’s competences of stigmatized people – i.e. girls. Such facet of analysis has not been adopted in Polish educational research so far. Theoretical background of own research constitute self-efficacy theory by Albert Bandura, which emphasizes cultural context of its formation process. The obtained results indicate that gender is a significant factor contributing to the sense of efficacy formed on the basis of specific achievements in mathematics. It indicates that a typical female student – in relation to similarly assessed typical male student – registers lower trust to her own mathematical competences. Discussion depicted the way in which unfavourable self-perception corresponds to motivation for learning mathematics and consequently to educational choices. The direction for further research has been indicated.
Źródło:
Kultura i Edukacja; 2013, 3(96); 98-115
1230-266X
Pojawia się w:
Kultura i Edukacja
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On constant-weight TSP-tours
Autorzy:
Jones, Scott
Kayll, P.
Mohar, Bojan
Wallis, Walter
Powiązania:
https://bibliotekanauki.pl/articles/743167.pdf
Data publikacji:
2003
Wydawca:
Uniwersytet Zielonogórski. Wydział Matematyki, Informatyki i Ekonometrii
Tematy:
graph labelling
complete graph
travelling salesman problem
Hamilton cycle
one-factor
two-factor
k-factor
constant-weight
local matching conditions
edge label growth-rate
Sidon sequence
well-spread sequence
Opis:
Is it possible to label the edges of Kₙ with distinct integer weights so that every Hamilton cycle has the same total weight? We give a local condition characterizing the labellings that witness this question's perhaps surprising affirmative answer. More generally, we address the question that arises when "Hamilton cycle" is replaced by "k-factor" for nonnegative integers k. Such edge-labellings are in correspondence with certain vertex-labellings, and the link allows us to determine (up to a constant factor) the growth rate of the maximum edge-label in a "most efficient" injective metric trivial-TSP labelling.
Źródło:
Discussiones Mathematicae Graph Theory; 2003, 23, 2; 287-307
2083-5892
Pojawia się w:
Discussiones Mathematicae Graph Theory
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Health Evaluation of R&D and Transformation Functional Platform
Ocena sprawności platformy R&D i transformacji funkcjonalnej
Autorzy:
Cao, Yuhong
You, Jianxin
Shi, Yongjiang
Hu, Wei
Powiązania:
https://bibliotekanauki.pl/articles/371346.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Komitet Człowiek i Środowisko PAN
Tematy:
R&D and transformation functional platform
health evaluation
two-factor model
platforma R&D i transformacji funkcjonalnej
ocena sprawności
teoria dwuskładnikowa
Opis:
In order to improve the operational performance of R&D and transformation functional platform, the health situation of R&D and transformation functional platform must be evaluated. First, the evaluation index system of R&D and transformation functional platform health was established based on influencing factors of platform health.Then,four regional R&D and transformation functional platforms, including Shanghai Lingang Intelligent Manufacturing Research Institute (SHIMRI), Ningbo Intelligent Manufacturing Research Institute(NBIMRI), Harbin University of Technology Intelligent Research Institute(HEBIMRI) and Suzhou Intelligent Manufacturing Research Institute(SZIMRI) are selected for empirical analysis with the help of factor analysis method and two factor theory based evaluation model. Finally, according to the empirical results, policy recommendations for optimize platform’s operation and improve platform’s health are proposed.
W celu poprawy wydajności operacyjnej platformy R&D (Research and Development, Badania i Rozwój) i transformacji funkcjonalnej należy dokonać jej oceny sprawności. Najpierw ustalono system oceny indeksu funkcjonalności platformy, który oparto na czynniki wpływające na jej funkcjonowanie. Następnie cztery regionalne platformy funkcjonalne R&D i transformacji, w tym Shanghai Lingang Intelligent Manufacturing Research Institute (SHIMRI), Ningbo Intelligent Manufacturing Research Institute (NBIMRI), Inteligentny Instytut Badawczy Uniwersytetu Harbina (HEBIMRI) i Suzhou Intelligent Manufacturing Research Institute (SZIMRI) zostały wybrane do analizy empirycznej, w której wykorzystano metodę analizy czynnikowej i modelu oceny opartego na teorii dwuskładnikowej. Wreszcie, zgodnie z wynikami empirycznymi, zaproponowano zalecenia dotyczące polityki optymalizacji działania platformy i poprawy jej funkcjonalności.
Źródło:
Problemy Ekorozwoju; 2019, 14, 2; 171-182
1895-6912
Pojawia się w:
Problemy Ekorozwoju
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Defining Self-Esteem as a Relationship between Competence and Worthiness: How a Two-Factor Approach Integrates the Cognitive and Affective Dimensions of Self-Esteem
Autorzy:
Mruk, Christopher J.
Powiązania:
https://bibliotekanauki.pl/articles/430858.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
self-esteem
defining self-esteem
two-factor approach
self-esteem and cognition
self-esteem and affect
selfesteem and relationships
Competence and Worthiness Training
Opis:
Although the importance of operational defi nitions is obvious while researching new areas of work, taking time to defi ne terms, especially key ones, is also important for mature fi elds. The study of self-esteem, for instance, is one of the oldest themes in psychology and it is characterized by work based on at least three different defi nitions of selfesteem. Each one of them has given rise to a school of thought with its own body of supportive research and fi ndings. Such situations often generate confusion in a fi eld, especially when it comes to establishing consensus or integrating material. Thus, this article fi rst presents the two-factor approach to self-esteem in order to demonstrate how defi ning it as a relationship between competence and worthiness helps to resolve issues that other leading defi nitions do not, especially the common practice of defi ning self-esteem simply as a feeling of “worth.” Second, an attempt is made to show how a two-factor approach also better integrates work on the cognitive and affective of dimensions of self-esteem.
Źródło:
Polish Psychological Bulletin; 2013, 44, 2; 157-164
0079-2993
Pojawia się w:
Polish Psychological Bulletin
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Exploring the motivators to satisfy UAE employees
Odkrywanie motywatorów do zadowolenia pracowników ZEA
Autorzy:
Patterson, Louise
Pandya, Bharti
Cho, BooYun
Powiązania:
https://bibliotekanauki.pl/articles/2021568.pdf
Data publikacji:
2020
Wydawca:
Politechnika Częstochowska
Tematy:
job satisfaction
motivators
Herzberg Two-Factor theory
UAE
private organizations
public organizations
satysfakcja z pracy
motywatory
teoria dwóch czynników Herzberga
ZEA
organizacje prywatne
organizacje publiczne
Opis:
This paper explores job satisfaction determinant influencing intrinsic and extrinsic motivation of employees working in private and public sector organizations operating in Ras Al Khaimah. The purpose of this paper is to understand the degree to which job satisfaction determinants based on employees’ intrinsic and extrinsic values affect their job satisfaction levels. Determinants such as the relationship with co-workers, supervision, pay, recognition, advancement, and working conditions were investigated. Data collected through the survey was analysed using two independent sample t-tests to determine whether job satisfaction depends on the nature of organization, private and public. This study found supervision as a key extrinsic factor and opportunities to be somebody, to support others, and to try own methods as key intrinsic factors causing higher satisfaction levels amongst private-sector employees.
W artykule omówiono czynnik determinujący satysfakcję z pracy wpływający na wewnętrzną i zewnętrzną motywację pracowników pracujących w organizacjach sektora prywatnego i publicznego działających w Ras Al Khaimah. Celem tego artykułu jest zrozumienie, w jakim stopniu determinanty satysfakcji z pracy oparte na wewnętrznych i zewnętrznych wartościach pracowników wpływają na ich poziom satysfakcji z pracy. Zbadano takie czynniki, jak relacje ze współpracownikami, nadzór, wynagrodzenie, uznanie, awans i warunki pracy. Dane zebrane w ankiecie zostały przeanalizowane za pomocą dwóch niezależnych prób t-testów w celu określenia, czy satysfakcja z pracy zależy od charakteru organizacji, prywatnej i publicznej. Badanie to wykazało, że nadzór jest kluczowym czynnikiem zewnętrznym i okazją do bycia kimś, wspierania innych i wypróbowywania własnych metod jako kluczowych wewnętrznych czynników powodujących wyższy poziom satysfakcji wśród pracowników sektora prywatnego.
Źródło:
Polish Journal of Management Studies; 2020, 22, 2; 402-413
2081-7452
Pojawia się w:
Polish Journal of Management Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Dwumodułowy system do przetwarzania danych EEG z wykorzystaniem analizy czynnikowej i pseudoinwersji moore-penrose
Two-modular system for processing EEG data using factor analysis and moore-penrose pseudoinversion
Autorzy:
Paszkiel, S.
Powiązania:
https://bibliotekanauki.pl/articles/408646.pdf
Data publikacji:
2014
Wydawca:
Politechnika Lubelska. Wydawnictwo Politechniki Lubelskiej
Tematy:
system dwumodułowy
pseudoinwersja Moore-Penrose
analiza czynnikowa
EEG
two-modular system
Moore-Penrose pseudoinversion
factor analysis
EEG data
Opis:
W artykule opisano koncepcję otrzymywania tzw. sygnału wyjściowego na potrzeby między innymi zastosowań do procesów sterowania. W tym celu zaproponowano budowę dwumodułowego systemu do przetwarzania i analizy danych elektroencefalograficznych w skład, którego wchodzi analiza czynnikowa oraz pseudoinwersja Moore-Penrose. W artykule scharakteryzowano także problem dużej interferencyjności źródeł sygnałów EEG, co ma negatywny wpływ na finalny proces otrzymywania wyjściowego sygnału z zastosowaniem w automatyce, czy robotyce. Implikuje to tym samym konieczność właściwej i poprawnej identyfikacji źródeł sygnału w mózgu człowieka.
This paper describes the concept of obtaining the so-called. the output signal for the purpose, inter alia, the control processes carried out. To this end, proposed the construction of two-modular system for processing and analysis of electrophysiological data on the composition, which includes factor analysis and pseudoinversion Moore Penrose. In the article the problem of high interference sources of EEG signals, which has a negative impact on the process of obtaining the final output using automation or robotics. This implies also the problem of proper and correct identification of sources in the human brain.
Źródło:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska; 2014, 4; 62-64
2083-0157
2391-6761
Pojawia się w:
Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A study of performance and emissions of SI engine with a two-stage combustion system
Autorzy:
Jamrozik, A.
Tutak, W.
Powiązania:
https://bibliotekanauki.pl/articles/185841.pdf
Data publikacji:
2011
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
silnik z dwustopniowym systemem spalania
współczynnik nadmiaru powietrza
engine with two-stage combustion system
prechamber
excess air factor
indicated work
indicated efficiency
non-repeatability factor of the indicated work
Opis:
Lean mixture burning leads to a decrease in the temperature of the combustion process and it is one of the methods of limiting nitric oxide emissions. It also increases engine efficiency. An effective method to correct lean mixture combustion can be a two-stage system of stratified mixture combustion in an engine with a prechamber. This article presents the results of laboratory research on an SI engine (spark ignition) with a two-stage combustion system with a cylinder powered by gasoline and a prechamber powered by propane-butane gas LPG (liquefied petroleum gas). The results were compared to the results of research on a conventional engine with a one-stage combustion process. The test engine fuel mixture stratification method, with a two-stage combustion system in the engine with a prechamber, allowed to burn a lean mixture with an average excess air factor equal to 2.0 and thus led to lower emissions of nitrogen oxides in the exhaust of the engine. The test engine with a conventional, single-stage combustion process allowed to properly burn air-fuel mixtures of excess air factors X not exceeding 1.5. If the value X > 1.5, the non-repeatability factor COVLi increases, and the engine efficiency decreases, which makes it virtually impossible for the engine to operate. The engine with a two-stage combustion process, working with X = 2.0, the QmlQim = 2.5%, reduced the NOx content in the exhaust gases to a level of about 1.14 g/kWh. This value is significantly lower than the value obtained in a conventional engine, which worked at X = 1.3 with comparable non-repeatability of successive cycles (about 3%) and a similar indicated efficiency (about 34%), was characterised by the emissions of NOx in the exhaust equal to 26.26 g/kWh.
Źródło:
Chemical and Process Engineering; 2011, 32, 4; 453-471
0208-6425
2300-1925
Pojawia się w:
Chemical and Process Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of indication errors of the SI gas engine with a prechamber
Analiza bledow indykowania gazowego silnika ZI z komora wstepna
Autorzy:
Jamrozik, A.
Powiązania:
https://bibliotekanauki.pl/articles/793719.pdf
Data publikacji:
2011
Wydawca:
Komisja Motoryzacji i Energetyki Rolnictwa
Tematy:
engine
two-stage combustion system
excess air factor
indicated work
gas engine
prechamber
thermal process
internal combustion engine
spark ignition
piston engine
Źródło:
Teka Komisji Motoryzacji i Energetyki Rolnictwa; 2011, 11
1641-7739
Pojawia się w:
Teka Komisji Motoryzacji i Energetyki Rolnictwa
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The TDP method of seed yield component analysis in grain legume breeding
Autorzy:
Golaszewski, J
Idzkowska, M.
Milewska, J.
Powiązania:
https://bibliotekanauki.pl/articles/2044235.pdf
Data publikacji:
1998
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
breeding population
path analysis
stem
treatment factor
multiple regression
yield component
grain legume
multivariate method
seed
two-dimensional partitioning method
Vicia faba
ontogenesis
plant height
fruiting node
broad bean
fodder pea
Pisum sativum
Opis:
The results of plant breeding trials with populations of fodder pea strains and broad bean hybrids were the basis of consideration on the interrelationship between some traits - the yield structure elements. Developed by Eaton, a relatively new method of yield component analysis called the two-dimensional partitioning method (TDP) was applied to analyse the data. The method, which combines multiple regression and ANOVA, allows for concise tabular presentation and simple interpretation of the distribution of traits in one direction and the sources of variance according to ANOVA model in the other direction. Additionally, the interpretation of the results was supported by such standard statistical techniques as ANOVA, simple and multiple regression and path analysis. The main components of pea yielding were plant height and the number of pods per plant. Among the analysed characters of broad bean the number of nodes with pods on the main stem, which turned out to be the determinant of broad bean yielding, might be strongly affected by environmental conditions. The number of nodes with pods might be considered a selecting character of high potential yielding of broad bean genotypes.
Źródło:
Journal of Applied Genetics; 1998, 39, 4; 299-308
1234-1983
Pojawia się w:
Journal of Applied Genetics
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-18 z 18

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies