Browse

81 - 90 of 607 items :

  • Communication Science x
Clear All
Corrosion Properties Of 1.4512 Ferritic And 1.4404 Austenitic Steels For The Automotive Industry

Abstract

Exhaust systems are susceptible to in-service wear because of their exposition to the very aggressive corrosive environment. Various stainless steels grades (mostly ferritic and austenitic, but also martensitic and duplex) and protective coatings are currently used for exhaust system elements to increase their aestetics and corrosion resistance. This article focuses on evaluation and comparison of the common corrosion properties of two stainless steels with different microstructures (ferritic and austenitic) used for exhaust system components at the low ambient temperature (35 °C). An aggressive acidic corrosion solution for electrochemical cyclic potentiodynamic tests (ASTM G61) was chosen to simulate partly inner (condensate) and also external environment (reaction of exhaust gases with water, chlorides in solution after winter road maintenance). Exposure tests of the pitting corrosion resistance were performed according to ASTM G48 standard method.

Open access
Creating Safe and Competitive Conditions for the Provision of Rail Transport Services

Abstract

Safety is a key and necessary condition for the sustainable development of the railway industry. Every entity operating in the railway area should maintain and increase the level of security as part of its operations. The subject of the analysis of data on the rail transport safety in European countries and content of the safety culture program implemented in Poland, whose main objective is to implement safety culture principles in the railway transport and to encourage all companies operating in the railway industry to improve the rail transport safety as the key condition for the sustainable development of railway industry. Paper contains results of the analysis of the European rail transport safety level in the context of the objectives set for Poland indicated by the European Union (CSI value) as improvement areas.

Open access
Creating Value Added for an Enterprise by Managing Information Security Incidents

Abstract

This article presents the structure and analysis of information security incidents in a production company in 2015-2017. The purpose of the analysis is to identify incidental events and their frequencies. The analysis includes the occurrence of notifications, threatening events, employee errors and false alarms. The conducted research includes also the procedure for handling the incident in the enterprise. The enterprises very often avoid informing their contractors about the occurrence of incidents. Thanks to the analysis of incidents and a clearly defined action plan, the examined enterprise tested the incidents and actions taken with them as a method of creating the added value of the enterprise during the period under consideration. The conducted research has shown that contractors who are aware of preventive actions taken, as well as those affecting information security even after the occurrence of an incident, are more willing to provide trust and even support to the surveyed enterprise. The conducted analysis is a pilot study carried out in one large enterprise in the metallurgical industry. The aim of the conducted research is to show that the incident or negative event may have a positive impact on the company's image. The research was carried out with the use of a questionnaire and in-depth interview with representatives of enterprises that are co-operators of the examined company.

Open access
Customer Relationship Management (CRM) - Philosophy and its Significance for the Enterprise

Abstract

The article presents the CRM (Customer Relationship Management) philosophy. The principles of building the CRM strategy, enabling building and strengthening ties with the client (including ensuring its safety in relationship with a company), thanks to which the company can expect continuous sales, have been presented. Exemplary tools used in CRM (such as: call centre, contact centre, key account management) are listed and described. An attempt has been made to assess the cost-effectiveness of implementing the CRM philosophy in the enterprise based on the SWOT analysis. The strengths, weaknesses, opportunities and threats of such an undertaking were analysed, and the results were presented in the summary and final conclusions.

Open access
Damage Risk of the Raceway Edge Arise in Four-Point Slewing Bearing

Abstract

In the article some forms of damage to raceway of slewing bearings for single-row ball bearing slewing ring with four-point contact and their causes were shown. Changes of the contact angle and its influence on the geometry for contact zone of the rolling elements raceway were analyzed. An identification of changes for contact angle of individual balls for different parameters of the contact was received. It was showed that contact angles of some rolling elements were increasing. It can cause damage to the raceway by spalling or rolling out of edge of the bearing ring. Ways of avoiding too early damage to the raceway at the stage of the design and the selection of coronary bearings were suggested.

Open access
The Development of an Explosion Protection System in the Starting Air Manifold of a High Power Engine

Abstract

In this paper, the authors have discussed the subject of fire and explosion hazards during the operation of a modern ship's high-power internal combustion engines. The causes of the occurrence of and the methods of preventing explosions in the starting manifolds of modern piston combustion engines equipped with a pneumatic starting system, with starting valves on the cylinder heads, have been specified. The concept of an active system for monitoring the technical condition of the starting valves has been presented in order to quickly diagnose leakages and reduce the risk of explosion. A conceptual design of a prototype of a non-invasive, new generation leak detector for starting valves and its technical design have been presented. Exemplary implementations of the prototype detector have been shown and its selected functionalities have been discussed. This paper has ended with an assessment of the possibility of further development and the applications of this device.

Open access
Diagnosis in New Technological Line for Steel Fiber Production for Process Safety

Abstract

Theoretical and experimental studies of new technology and equipment on the fulfilled cables and ropes of handling equipment are provided for diagnosis of main process. The result of the safe processing is steel fiber which is used further for production of a steel-fiber reinforced concrete. The research offered a number of essentially new diagnose methods which considerably increases engineering procedures of fiber production from waste.

Open access
Do-It-Yourself Terrorism. How Do Terrorist Organizations Inspire, Support and Teach Their European Supporters via Internet?

Abstract

The following paper is a review article. It is an attempt to analyze the most widely available publications of Salafi terrorist organizations addressed to European supporters. This article concentrates primarily on publications describing tactics related to committing acts of terror on civilian population. Organizations like AQ and ISIS suggest launching attacks using the most available resources (attack using a knife or a sharp tool, arson, ramming with a vehicle), constructing various kinds of IED (pipe bomb, pressure cooker bomb), encourage to attack in public and poorly protected places or advise on how to organize a shooting and hostage-taking situation. Moreover, they state bluntly that theft, vandalism or causing major traffic accidents are also actions which can help in the war with infidels. The substantive value of the instructions is questionable – the authors of many of them (e.g. the attack using a knife) have vague idea about equipment and combat. The content of these publications suggests that they are prepared for people relatively young, with no general experience in life and combat training. Terrorist organizations skillfully select passages from Quran and hadiths to find a pseudo religious justification for barbarism and cruelty. Finally, they treat all victims indiscriminately – all infidels deserve to die and killing them is a glorious achievement.

Open access
Dynamic Management of Occupational Health and Safety Processes in Integrated Business Information Systems

Abstract

Currently operating enterprises are more and more willing to adopt a process approach in their structures. The process approach means the transition from traditionally understood management towards adapting to constantly changing environmental conditions. This change is accompanied by the possibility of using a wide range of tools of ICT technology, that allow modelling of any type of process occurring in the enterprise, including processes related to OHS. Thus, the objective of the paper is to indicate the opportunity for the integration of OHS processes with other processes (primary and auxiliary) of the organization using ERP systems. In the first part of the study, there will be indicated the determinants of the development of the process approach in modern enterprises. Subsequently, there will be characterized OHS processes against the background of other processes of the organization. In the third part, there will be indicated the most significant features of ERP systems. The last part will refer to the practical implementation of the process in the area of OHS in the Macrologic Merit system.

Open access
Early Modern Multiloquent Authors (EMMA): Designing a large-scale corpus of individuals’ languages

Abstract

The present article provides a detailed description of the corpus of Early Modern Multiloquent Authors (EMMA), as well as two small case studies that illustrate its benefits. As a large-scale specialized corpus, EMMA tries to strike the right balance between big data and sociolinguistic coverage. It comprises the writings of 50 carefully selected authors across five generations, mostly taken from the 17th-century London society. EMMA enables the study of language as both a social and cognitive phenomenon and allows us to explore the interaction between the individual and aggregate levels.

The first part of the article is a detailed description of EMMA’s first release as well as the sociolinguistic and methodological principles that underlie its design and compilation. We cover the conceptual decisions and practical implementations at various stages of the compilation process: from text-markup, encoding and data preprocessing to metadata enrichment and verification.

In the second part, we present two small case studies to illustrate how rich contextualization can guide the interpretation of quantitative corpus-linguistic findings. The first case study compares the past tense formation of strong verbs in writers without access to higher education to that of writers with an extensive training in Latin. The second case study relates s/th-variation in the language of a single writer, Margaret Cavendish, to major shifts in her personal life.

Open access