Didn't find any results in this catalog!
But we have some results in other catalogs.Filters
total: 997
Search results for: mappings creation and verification
-
Game with a Purpose for Mappings Verification
PublicationMappings verification is a laborious task. The paper presents a Game with a Purpose based system for verification of automatically generated mappings. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the gameplay, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation and gathering...
-
Game with a Purpose for Verification of Mappings Between Wikipedia and WordNet
PublicationThe paper presents a Game with a Purpose for verification of automatically generated mappings focusing on mappings between WordNet synsets and Wikipedia articles. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the game-play, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation...
-
Automatically created and partially veriffied Wikipedia - WordNet mappings
Open Research DataMapping between Wikipedia articles and WordNet synsets. The mappings between Wikipedia articles and WordNet synsets were obtained automatically using 4 algorithms of data processing. The automatically generated mappings were than a subject of verification by a group of volunteers using crowdsourcing approach through so called Games with a Purpose. The...
-
Assessing Word Difficulty for Quiz-Like Game
PublicationMappings verification is a laborious task. Our research aims at providing a framework for manual verification of mappings using crowdsourcing approach. For this purpose we plan on implementing a quiz like game. For this purpose the mappings have to be evaluated in terms of difficulty to better present texts in respect of game levels. In this paper we present an algorithm for assessing word difficulty. Three approaches...
-
Adam Inglot dr inż.
PeopleAdam Inglot (born October 3, 1984), studied Environmental Engineering and Geodesy and Cartography at the Faculty of Mine Surveying and Environmental Engineering of AGH University of Science and Technology in Krakow. He graduated in 2011 as a M.Sc. in Environmental Engineering, defending his thesis "Verification of usefulness of GeoMod model for prediction of the urbanization process in Cracow agglomeration" under the guidance of...
-
Concept of the agent system for the information technology evaluation
PublicationIn this paper the concept of the agent system for the information technology evaluation has been presented. This article includes the concept description and shows abilities of using software tools which can be applicable to implementation and verification of proposed solution. The article is the part of common researches over creation solutions for information technology evaluation which range over using expert's evaluation and...
-
Self-Testing of Analog Parts Terminated by ADCs Based on Multiple Sampling of Time Responses
PublicationA new approach for self-testing of analog parts terminated by analog-to-digital converters in mixed-signal electronic microsystems controlled by microcontrollers is presented. It is based upon a new fault diagnosis method using a transformation of the set of voltage samples of the time response of a tested analog part to a square impulse into localization curves placed in a multidimensional measurement space. The method can be used...
-
Ontology management in the multi-agent system for the it evaluation
PublicationThe team of researchers at the Gdańsk University of Technology is currently developing a model of the multi-agent system (MAS_IT) that would aid the IT managers to find the most appropriate technology to the goals assumed. The knowledge is to be provided by experts and stored in the facts and rules bases. The responsibility of the verification process-on the input and query stages-is given to the ontology, making it to some extend...
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Online brand communities’ contribution to digital business models
PublicationAbstract Purpose – There is limited research examining social drivers and mediators of online brand community identification in the context of business models development. This study aims to identify them behind the social mechanisms and present essential factors which should be applied in business models to foster value co-creation. Design/methodology/approach – Data were collected from a convenience sample of 712 cases gathered among...