The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The aim of the discussion was an attempt to illustrate the stance of central Polish authorities and local centers on the methods and means of seizing power in the areas of Cieszyn Silesia and Upper Silesia at the time when the final territorial affiliation of these areas was still undetermined. The nature of actions undertaken by the Polish authorities within the above mentioned areas evokes many...
The acquisition of the part of Silesia by Poland in 1922 was an important event for both Silesians and Poles. The press observed and described this process with great attention and it was particularly active in the border areas. An example of that may be the city of Częstochowa and the “Goniec Częstochowski” newspaper published there. The inhabitants of the city and its surroundings were informed...
Konstanty Wolny lived from 1877 to 1940. He was an eminent Polish independence activist in Upper Silesia, a lawyer and co-founder of the Silesian autonomy. K. Wolny was the first Speaker of the Silesian Parliament and a consistent defender of the autonomy of the Silesian voivodeship. He enjoyed great authority among deputies of the Silesian Parliament – he was repeatedly elected Speaker with a huge...
Włodzimierz Dąbrowski thought that the constitutional system of the Silesian voivodeship was different from other voivodeships of the Second Polish Republic in the interwar period. The constitutional act of 15 July 1920 of the Legislative Sejm containing the organic statute of the Silesian voivodeship determined the establishment of the autonomous system. According to the act passed by the Legislative...
The expanding use of armed, unmanned systems is not only changing the face of modern warfare, but is also altering the process of decision-making in combat operations. These systems have been used extensively in the conflicts in Iraq and Afghanistan, and will continue to be equally relevant — if not more so — as the United States' strategic focus shifts towards the Asia-Pacific region and the high-end...
The Autonomous Surface / Sub-surface Survey System (ASSSS) research program combines long endurance autonomous surface vessels (ASVs) and long endurance autonomous underwater vehicles (AUVs) to create an integrated cooperative navigation system effectively transforming the capabilities and accuracy of AUV survey. ASV is leading the project, working alongside National Oceanography Centre, a world leading...
In his best-selling book, War Made New, military historian Max Boot supports his thesis with historical examples to show how technological-driven “Revolutions in Military Affairs” have transformed warfare and altered the course of history. The U.S. military has embraced a wave of technological change that has constituted a true transformation of the way that military forces will fight in the 21st...
Multi-vehicle teams are being used more and more frequently to solve increasingly complex problems [1, 2]. In order for the team to work effectively, the vehicles must communicate to coordinate their efforts. In applications with high quality communication links, the vehicles are able to operate almost as a single entity. But in more harsh and dynamic environments, such as underwater, communication...
Context: Software development process is executed by professionals with different roles, who are responsible for distinct activities. These roles can have different degrees of autonomy depending on some factors, such as the adopted process and hierarchy. Goal: This study aims to identify what factors can impact autonomy and also investigate how autonomy is given to an employee based on two main factors:...
Over the last decades, information technology in the field of computer networks and Internet is improved rapidly. Hence, in order to achieve high efficiency of information systems in the dispersed environments, it is needed to provide dynamic and distributed applications. There are various kinds of information system architectures to deploy information systems such as Agent-Base Architecture, Enterprise...
The increasing cost of aging population and dependency is an unquestionable and worrying trend. But the constant progress of information technologies also provides real opportunities to improve the healthcare and assistance of dependent people. In this context, this article proposes an original proactive solution for home monitoring, by applying classification methods to this new field of study. Existing...
This article intends to provide an overview of the state of art in developmental models of cognitive robots. With the development of artificial intelligence, robots have been able to perform a variety of complex tasks controlled by human. However, it is still a challenge for robots that they can explore and develop their cognitive ability in the specific environment like human beings. The current...
Levels of Autonomy (LoA) provide a method for describing authority granted to operators and autonomous system elements. Unfortunately, LoA does not provide the user interface designer a clear method to distinguish interface concepts which impose varying levels of operator workload or result in human or system performance changes. The current research suggests an alternate classification framework...
Car makers are toward for the new generation of cars that tend to be more autonomous as possible without the driver intervention being considered such as part of the intelligent transportation systems. In fact, autonomous cars tend to have an increasing ability to autonomously drive themselves, potentially reducing accidents and traffic congestion considering also the improvement of comfort, safety,...
This paper presents a hybrid system of applying homeostatic drives theory and stimuli from environment or human on a robot, aiming to solve the increasing need of elder caring in modern aging society. Through reinforcement learning with human feedback, the robot is enabled to make appropriate decisions by reviewing its own motivation, environment stimuli and human inputs, allowing the robot to finish...
This paper describes the MEDA instrument and its different subsystems, including the proposed data management architecture (hardware and software) supporting MEDA data acquisition, storage, processing and transmission. Mission planning and operations are based on Observation Tables that allow the instrument to operate completely autonomously during the mission (i.e. even when the rover computers are...
For much of the past decade NASA and other organizations have been developing the Disruption Tolerant Networking protocol suite with a primary focus on bringing internet-like functionality to space missions. Now that the core protocols are complete, engineers are beginning to incorporate DTN into mission system designs. When we look across the NASA mission needs over the next decade, there are multiple...
Taking cognizance of the terminology and thought process more likely to be effective with a target audience of engineers, an effort was made to integrate the technique of work sampling with public speaking in order to ensure greater appreciation among engineers for concepts related to communication. In this study, the work sampling was employed to determine productive and unproductive percentages...
In this paper, we will study the theoretical foundations for operationalizing an agent’s knowledge of agency – that is an agent’s knowledge of its own actions and their effects in a dynamic environment. Our main concern will be to develop theoretical foundations and algorithms which will enable a grounded knowledge of agency; these will be empirically evaluated in future work.Our approach will employ...
“Cyber hygiene” strategies for the Internet of Things (IoT) may soon expand far beyond the various approaches that are prescribed for today's computing technologies in workplaces and households (the latter including frequently changing passwords and installing malware protections). This paper explores the various roles of health professionals, insurance agents, marketers, lawyers, financial specialists,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.