Ograniczanie wyników
Czasopisma help
Autorzy help
Lata help
Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 193

Liczba wyników na stronie
first rewind previous Strona / 10 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  information systems
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 10 next fast forward last
EN
Year after year, agriculture increasingly utilizes smart technologies to solve production tasks. These technologies are often used in specific agricultural sectors or technological processes. Climate change and rising prices for plant protection products, fertilizers, fuels, and lubricants are driving the need for comprehensive implementation of smart technologies in farm operations, which will enable agricultural management at a new, higher level of quality. Smart farm technologies enable rapid data collection, increasing the level of monitoring and control over all areas of operation. Smart technologies are actively used in various types of farms, but the potential use of augmented reality as a potential element of this process has not yet been sufficiently explored. Augmented reality can help farmers combat pests. Augmented reality has potential in precision agriculture. Some elements of augmented reality are present in the functionality of modern agricultural machinery. Although agriculture has historically been characterized by a slower pace of technological innovation, the decline in their costs has accelerated the implementation of smart technologies, including augmented reality, in agriculture. The research substantiates the structure of the "Smart Farm" IT system using augmented reality and presents its description. The new feature of the article is the proposed directions for the transformation of the "Smart Farm" IT system, taking into account the potential challenges and opportunities of digital transformation of technological processes in agriculture.
PL
Rolnictwo z roku na rok coraz częściej wykorzystuje inteligentne technologie do rozwiązywania zadań produkcyjnych. Technologie te są często stosowane w określonych sektorach rolnictwa lub procesach technologicznych. Zmiany klimatyczne i rosnące ceny środków ochrony roślin, nawozów, paliw i środków smarnych wymuszają potrzebę kompleksowego wdrożenia inteligentnych technologii w działalności rolniczej, co umożliwi zarządzanie rolnictwem na nowym, wyższym poziomie jakości. Inteligentne technologie rolnicze umożliwiają szybkie gromadzenie danych, zwiększając poziom monitorowania i kontroli nad wszystkimi obszarami działalności. Inteligentne technologie są aktywnie wykorzystywane w różnych typach gospodarstw rolnych, ale potencjalne wykorzystanie rzeczywistości rozszerzonej jako elementu tego procesu nie zostało jeszcze wystarczająco zbadane. Rzeczywistość rozszerzona może pomóc rolnikom w walce ze szkodnikami. Rzeczywistość rozszerzona ma potencjał w rolnictwie precyzyjnym. Niektóre elementy rzeczywistości rozszerzonej są obecne w funkcjonalności nowoczesnych maszyn rolniczych. Chociaż rolnictwo historycznie charakteryzowało się wolniejszym tempem innowacji technologicznych, spadek ich kosztów przyspieszył wdrażanie inteligentnych technologii, w tym rzeczywistości rozszerzonej, w rolnictwie. W artykule uzasadniono strukturę systemu informatycznego „Inteligentne Gospodarstwo” wykorzystującego rzeczywistość rozszerzoną oraz przedstawiono jego opis. Nowością w artykule są proponowane kierunki transformacji systemu informatycznego „Inteligentne Gospodarstwo”, uwzględniające potencjalne wyzwania i możliwości cyfrowej transformacji procesów technologicznych w rolnictwie.
EN
This paper investigates how existing literature has approached the concept of sustainability in the context of digital transformation. It adopts a three-step procedure for a systematic literature review (SLR), including planning, conducting, and reporting the review to synthesise current knowledge, classify key thematic areas, and establish a foundation for further empirical research. The findings emphasise the need for a structured and sustainable approach to digital transformation to enhance business resilience and effectiveness. Although this is a relatively new and emerging topic, and there is a lack of a solid conceptualisation of the role of sustainability in digital transformation, several important theoretical implications can still be identified. By addressing the fragmented nature of the literature, this study contributes to the f ield by developing a structured framework for classifying key areas of sustainability in digital transformation. The systematic literature review revealed an absence of a unified conceptualisation and a lack of consistent understanding of sustainability in digital transformation across the analysed publications. Nevertheless, the study successfully identified 24 areas related to the sustainability of digital transformation, which were categorised into a framework comprising four fields: people, management, technology, and environment. The study plays a crucial role in enhancing the understanding of the sustainability of the digital transformation process by using a classified set of sustainability areas within it. The study results provide practical information for managers leading digital transformation processes in companies.
3
EN
Industry leaders, together with their horizontal value chain partners, digitise the core functions of their internal (vertical) operational processes. They are strengthening their product portfolio with digital functionalities and introducing innovative data services. More than 2,000 companies expect a significant increase in the overall level of digitisation. Although only 33% of them rate their company's current state in this area as advanced, by 2020, this percentage is expected to rise to more than 70%. At the end of this transformation process, successful industrial companies will become true digital enterprises, which will have at their core physical products augmented by digital interfaces and innovative services based on the active use of data. These digital enterprises will work together with their customers as well as suppliers in industrial digital ecosystems. These developments will not only fundamentally change individual companies, but also transforms market dynamics across a range of industries. And this is true in countries all over the world - as both developed and emerging markets. In order to generate additional revenue, the companies will bring new industrial products to the market equipped with digital features and expand their existing portfolio. Digital-based services based on data analytics as well as complete digital solutions serving customers, will be the main will be the main drivers of revenue growth. The biggest challenge for industrial for industry leaders is not technology, but people. While digital technologies are fast becoming a commodity, the success largely depends on the digital IQ of an organization, especially on how its executives (CEO, CTO, or CIO) can drive this transformation can define, communicate and manage it. To develop digital processes and services is necessary sufficient qualification of key staff. The introduction of each significant change in the enterprise is is accompanied by a challenging transition period, so that the ability to manage and to manage such change will have critical. It will be important also increasing skills in data analytics and improving the organisational structure.
PL
W niniejszej publikacji przedstawiono zaawansowaną koncepcję oraz ilustracyjne zastosowanie bezzałogowego systemu powietrznego (BSP), który został zintegrowany z modułem wizualizacji treści oraz podzespołem audialnym służącym do transmisji komunikatów głosowych. Szczegółowa analiza skupia się na konstrukcji tych modułów oraz na strategiach ich implementacji w strukturze BSP, co jest kluczowe dla optymalizacji funkcjonalności i efektywności systemu w realnych aplikacjach. Dyskutowane są techniczne aspekty modułów, w tym ich specyfikacje, możliwości oraz integracja z głównym układem BSP, co podkreśla innowacyjność i praktyczną wartość prezentowanego rozwiązania.
EN
In this publication, an advanced concept and illustrative application of an unmanned aerial system (UAS) integrated with a content visualization module and an auditory subsystem for voice message transmission are presented. Detailed analysis focuses on the construction of these modules and the strategies for their implementation within the UAS framework, which is crucial for optimizing functionality and efficiency in real-world applications. Technical aspects of the modules are discussed, including their specifications, capabilities, and integration with the main UAS framework, underscoring the innovation and practical value of the proposed solution.
EN
Ensuring cybersecurity is one of the main tasks entrusted to public administration and entities using information systems in their activities. Responsibility for ensuring cybersecurity has also been placed on digital service providers that form part of the national cybersecurity system. Preventing cybersecurity incidents and eliminating their consequences are the most critical tasks facing the entire system and individual entities. Universal accessibility of such services, enabling electronic contract conclusion and web search, also highlights the significant role of digital service providers.
PL
Zapewnienie cyberbezpieczeństwa jest jednym z podstawowych zadań zarówno administracji publicznej, jak i podmiotów wykorzystujących do swojej działalności systemy informacyjne. Obowiązki w zakresie cyberbezpieczeństwa zostały też nałożone na dostawców usług cyfrowych, którzy wchodzą w skład krajowego systemu cyberbezpieczeństwa. Przeciwdziałanie incydentom cyberbezpieczeństwa i usuwanie ich skutków to najważniejsze zadanie stojące zarówno przed tym systemem, jak i poszczególnymi podmiotami go tworzącymi. Znaczenie dostawców usług cyfrowych podkreśla też powszechność takich usług, umożliwiających zarówno zawieranie umów drogą elektroniczną, jak i wyszukiwanie stron internetowych.
EN
Background: Supply chain information systems (SCIS) have turned into a key success factor for the proper management of the automotive supply chain. Therefore, the scope of this paper is to explore the impact of SC information system infrastructure (SCISI) and SC information sharing (ISSC) on interorganizational trust (IOT), SC collaboration (SCC), SC agility (SCA), and SC performance (SCP) in the Moroccan automotive industry context. Methods: The dataset was drawn from a selected sample of Moroccan automotive industry firms through an online survey. Furthermore, the partial least squares (PLS-SEM) procedure was applied to test the conceptual model. Results: The findings support the positive influence of SCIS infrastructure on IOT and SC agility. Similarly, information sharing in SC positively affects the collaboration between IOT and automotive SC. The results also provide evidence that IOT plays a significant role in improving SC agility. Lastly, agility and SC collaboration were identified as key drivers of SC of performance. Conclusions: The findings extend the existing literature on SC management and management information systems by providing empirical verification of how information sharing and IS infrastructure can influence collaboration, agility, and SC performance. These findings are useful in guiding SC managers through the process of improving SC performance.
7
Content available remote Discovering relationships between data in enterprise system using log analysis
EN
Enterprise systems are inherently complex and maintaining their full, up-to-date overview poses a serious challenge to the enterprise architects' teams. This problem encourages the search for automated means of discovering knowledge about such systems. An important aspect of this knowledge is understanding the data that are processed by applications and their relationships. In our previous work, we used application logs of an enterprise system to derive knowledge about the interactions taking place between applications. In this paper, we further explore logs to discover correspondence between data processed by different applications. Our contribution is the following: we propose a method for discovering relationships between data using log analysis, we validate our method against a benchmark system AcmeAir and we validate our method against a real-life system running at Nordea Bank.
PL
W artykule przedstawiono podstawowe informacje na temat koncepcji „Zero Trust Architecture” oraz projekt i wykonane na jego podstawie narzędzie do wspomagania migracji systemów informacyjnych do „Zero Trust Architecture”. We wstępnej części artykułu opisano zwięźle koncepcję Zero Trust oraz przedstawiono wykonaną na bazie NSC 800-207 listę czynności niezbędnych do migracji systemów informacyjnych do wyżej wymienionej architektury. Następnie zaprezentowano procedurę praktycznego wykorzystania tej listy. Na końcu artykułu krótko opisano sposób implementacji wspomnianej procedury do postaci narzędzia wspomagającego migrację.
EN
The paper presents basic information on the „Zero Trust Architecture” concept and a project involving a tool designed to support the migration of information systems to this architecture. Initially, the Zero Trust concept is briefly described, followed by the presentation of steps based on NSC 800-207 necessary for migrating information systems to this architecture. Subsequently, the procedure for practically using this list is outlined. Finally, the implementation of this procedure into a migration support tool is described.
EN
Local self-government, as a structure within which civil society can thrive, where the digital competencies of the local and regional community come to life, must have the right tools to ensure adequate cybersecurity. These days, e-government, also at the local self-government level, is a common form of performing public tasks, and as a result, its activities in cyberspace must be properly secured. Many tasks are performed using ICT systems that are exposed to external attacks, and therefore, they should meet the appropriate security standards. The article refers to the legal solutions in the field of cybersecurity operating within local self-government in Poland and Hungary.
PL
Samorząd terytorialny jako struktura, w której może rozwijać się społeczeństwo obywatelskie, gdzie dochodzą do głosu kompetencje cyfrowe lokalnej i regionalnej wspólnoty, musi mieć odpowiednie narzędzia pozwalające na zapewnienie odpowiedniej ochrony cyberbezpieczeństwa. E-administracja, w tym na poziomie samorządu terytorialnego, jest dzisiaj powszechną formą wykonywania zadań publicznych, w związku z czym prowadzone w jej ramach działania w cyberprzestrzeni muszą być odpowiednio zabezpieczone. Ponieważ wiele zadań jest wykonywanych z wykorzystaniem systemów teleinformatycznych, które są narażone na ataki z zewnątrz, więc powinny one spełniać odpowiednie standardy bezpieczeństwa. Artykuł odnosi się do rozwiązań prawnych w zakresie cyberbezpieczeństwa funkcjonujących w ramach samorządu terytorialnego w Polsce i na Węgrzech.
EN
European Commission has published a nearly 50-page-long document on cybersecurity in transport called the Transport cybersecurity toolkit. As part of the work of ISAC-Kolej (the Information Sharing and Analysis Center for the railway transport sub-sector), guidelines in terms of cybersecurity for the employees of the railway entities have been developed and adopted. This article briefly discusses the European and Polish activities taken in order to protect railway transport against cyberthreats and shares the guidelines for employees adopted by ISAC-Kolej. Considering the increasingly widespread use of digital solutions, both for supporting operations of the business entities that constitute the railway system and for railway traffic management and supervision, these guidelines should be disseminated to the maximum possible extent among railway employees that use computers in their work.
PL
Artykuł dotyczy monitorowania współczesnych sieci komputerowych. Działanie to umożliwia natychmiastową reakcję na różne nieprawidłowości w funkcjonowaniu infrastruktury teleinformatycznej czy naruszenia zasad bezpieczeństwa. Systemy monitoringu są obecnie wdrażane w każdej organizacji, niezależnie od jej wielkości czy profilu działania. Monitorowanie sieci jest niezbędnym wymogiem zwłaszcza w firmach, w których praca opiera się głównie na systemach informatycznych. Wiele firm wdraża tego typu rozwiązania w celu zminimalizowania problemów z infrastrukturą teleinformatyczną oraz poprawy wydajności sieci komputerowych i produktywności pracowników. W artykule przedstawiono proces implementacji jednego z najpopularniejszych systemów monitorowania współczesnych sieci komputerowych Nagios Core w wersji 4.4.5.
EN
The paper concerns contemporary computer networks monitoring. This enables immediate reaction to various irregularities in the functioning of the ICT infrastructure or breaches of security rules. Currently, monitoring systems are implemented in every organization, regardless of its size or activity profile. Network monitoring is a necessary requirement, especially in companies where the work is based mainly on IT systems. Many companies implement such solutions to minimize problems with the ICT infrastructure, and to improve computer network performance and employee productivity. The paper presents the implementation process of Nagios Core in version 4.4.5 –one of the most popular monitoring systems of modern computer networks.
12
Content available remote Innowacyjne rozwiązania w transporcie kontenerów
PL
W artykule przedstawiono historyczne ujęcie rozwoju technologii transportowej jaką jest kontener. Wskazano jakie rozwiązania są obecnie stosowane na terminalach aby skracać czas obsługi jednostek intermodalnych oraz zapewnić wzrost efektywności operacji manipulacyjnych. Przedstawiono inteligentne kontenery, które wyposażone są w liczne czujniki, które m.in. mogą śledzić trasę przejazdu kontenera. Autor przybliżył jakie działania są obecnie prowadzone przez organizacje rządowe i międzynarodowe w celu zapewnienia bezpieczeństwa ładunku podczas operacji transportowych. Zasygnalizowano kierunki zmian w zakresie konstrukcji kontenerów i systemów wspomagania informatycznego oraz jak branża logistyczna reaguje i powinna postępować w dobie rozprzestrzeniania się koronawirusa w przypadku kiedy wiele strategii firm będzie zrewidowanych o nowe zachowania konsumenckie.
EN
The article presents a historical perspective on the development of transport technology, i.e. a container. It was indicated what solutions are currently used on terminals in order to shorten the service time of intermodal units and ensure an increase in the efficiency of handling operations. Intelligent containers are presented, which are equipped with numerous sensors, which include can follow the route of the container. The author outlined what activities are currently carried out by governmental and international organizations to ensure cargo safety during transport operations. The directions of changes in the design of containers and IT support systems have been signaled, and how the logistics industry reacts and should proceed in the era of the spread of the coronavirus in the event that many companies' strategies will be revised with new consumer behavior
EN
To determine the memory volume of information systems (IS), it was proposed to use a stochastic model, based on the use of a queueing network with bypasses, known as an HM-network. This model includes the servicing of heterogeneous requests along with their volumes, the ability to change the volume of such requests with their passage of time and the possibility of finding computer viruses in them, and therefore servicing requests can be interrupted at some random time. The expressions were obtained for the expected total values of the volume of requests in IS nodes.
14
Content available remote Extended distributive contact lattices and extended contact algebras
EN
The notion of contact algebra is one of the main tools in mereotopology. This paper considers a generalisation of contact algebra (called extended distributive contact lattice) and the so called extended contact algebras which extend the language of contact algebras by the predicates covering and internal connectedness.
15
Content available remote Concept Blueprints Serving More Focused User Queries
EN
Information Retrieval is about user queries and strategies executed by machines to find the documents that best suit the user's information need. However, this need reduced to a couple of words gives the retrieval system (IRS) a lot room for interpretation. In order to zero in on the user's need many a IRS expands the user query by implicitly adding or explicitly recommending the users further useful terms that help to specify their information need. Queries often do not comprise more than a handful of terms, which, in turn, do not sufficiently represent the user's need. In this paper, we propose and demonstrate an approach that enables users to resort to implicitly more complex query expressions. We call these semantic structures concept blueprints. Furthermore, users have the possibility to define the blueprints on their own. The purpose of the blueprints is to spot more precisely the text passage that fits the user's information need.
16
Content available remote Computing Duals of Finite Gödel Algebras
EN
We introduce an algorithm that computes and counts the duals of finite G\"odel-Dummett algebras of k ≥ 1 elements. The computational cost of our algorithm depends on the factorization of k, nevertheless a Python implementation is sufficiently fast to compute the results for very large values of k.
17
Content available remote A simple crime hotspot forecasting algorithm
EN
Crime hotspot forecasting is an important part of crime prevention and reducing the delay between a 911 call and the physical intervention. Current developments in the field focus on enriching the historical data and sophisticated point process analysis methods with a fixed grid. In the paper we present a simple spatio-temporal point process allowing one to perform exhaustive (literal) grid searches. We then show that this approach can compete with more complex methods, as evidenced by the results on data collected by the Portland Bureau of Police. Finally, we discuss the advantages and potential implications of the new method.
18
Content available Outstanding Issues of Military Logistics in Ukraine
EN
The article presents an analysis of the definition of military logistics and historical and developmental analysis of military logistics in Ukraine. The current state and problems of military logistics in Ukraine are revealed. The approaches to application of Blockchain technology to military logistics are given. The article highlights the projected development of military logistics.
PL
Artykuł zawiera analizę koncepcji treści logistyki wojskowej, analizy historycznej i ewolucyjnej logistyki wojskowej na Ukrainie. Aktualny stan i problemy logistyki wojskowej na Ukrainie zostały ujawnione. Podano podejścia do stosowania blokady w logistyce wojskowej. Artykuł dotyczy prognozy dalszego rozwoju logistyki wojskowej.
EN
In the era of globalization, more and more threats to the IT systems of many global companies will be observed. More and more attacks are effective and the losses caused by intrusions are systematically growing. The problem of ensuring the security of networks and computer systems is one of the most important issues of modern computer science. Today, more research is being done around the world to ensure the security of operating systems and applications.
EN
To solve the problem of determining the volume of memory of information systems (IS), it was suggested to use a stochastic model based on the use of HM (Howard-Matalytski) - a queueing network with revenues. This model allows you to take into account the dependencies of the processing times of messages (claims) on their volumes, the possibility of changing the volume of messages over time, and also the possibility of getting computer viruses into it. In such cases the processing of messages in nodes can be interrupted for some random time. Expressions are obtained for the mean (expected) values of the total message volumes in the IS nodes.
first rewind previous Strona / 10 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.