Filters
total: 1333
filtered: 538
-
Catalog
Chosen catalog filters
Search results for: information technology
-
Assessing Industry 4.0 Features Using SWOT Analysis
PublicationThis paper assesses some features of industry 4.0 by using SWOT analysis that affects the adoption and implementation of industry 4.0. The paper identifies the strengths, weaknesses, opportunities, and threats related to industry 4.0. By the consideration of these four groups of factors, the industrial practitioners can understand how to implement industry 4.0. Moreover, industrial practitioners can use the strengths/opportunities...
-
Multimedia polysensory integration training system dedicated to children with educational difficulties
PublicationThis paper aims at presenting a multimedia system providing polysensory train- ing for pupils with educational difficulties. The particularly interesting aspect of the system lies in the sonic interaction with image projection in which sounds generated lead to stim- ulation of a particular part of the human brain. The system architecture, video processing methods, therapeutic exercises and guidelines for children’s interaction...
-
Design and Evaluation of the Platform for Weight-Shifting Exercises with Compensatory Forces Monitoring
PublicationDetails of a platform for the rehabilitation of people with severe balance impairment are discussed in the paper. Based upon a commercially available static parapodium, modified to fit force sensors, this device is designed to give a new, safe tool to physiotherapists. It is designed for the patients who cannot maintain equilibrium during a bipedal stance and need to hold to or lean on something during the rehabilitation. Visual,...
-
The Role of Electrostatics in Enzymes: Do Biomolecular Force Fields Reflect Protein Electric Fields?
PublicationPreorganization of large, directionally oriented, electric fields inside protein active sites has been proposed as a crucial contributor to catalytic mechanism in many enzymes, and it may be efficiently investigated at the atomistic level with molecular dynamics simulations. Here, we evaluate the ability of the AMOEBA polarizable force field, as well as the additive Amber ff14SB and Charmm C36m models, to describe the electric...
-
Automated Classifier Development Process for Recognizing Book Pages from Video Frames
PublicationOne of the latest developments made by publishing companies is introducing mixed and augmented reality to their printed media (e.g. to produce augmented books). An important computer vision problem that they are facing is classification of book pages from video frames. The problem is non-trivial, especially considering that typical training data is limited to only one digital original per book page, while the trained classifier...
-
System for monitoring road slippery based on CCTV cameras and convolutional neural networks
PublicationThe slipperiness of the surface is essential for road safety. The growing number of CCTV cameras opens the possibility of using them to automatically detect the slippery surface and inform road users about it. This paper presents a system of developed intelligent road signs, including a detector based on convolutional neural networks (CNNs) and the transferlearning method employed to the processing of images acquired with video...
-
Two examples of Quantum Dynamical Semigroups
PublicationThe Hamiltonians of the considered bi-partite systems are of the form $$ H_{S,R} = H_S /times 1_R + Q_{S} /times M_R + 1_S /times H_R $$ Subindex $S$ corresponds to the observed system and $R$ to the reservoir (the enviroment of $S$). Two classes of systems are distinguished: the discrete-continuous...
-
Human Tracking in Multi-camera Visual Surveillance System
PublicationArtykuł prezentuje krótkie podsumowanie wykorzystywanych technologii z dziedziny śledzenia osób z wykorzystaniem inteligentnych systemów bezpieczeństwa. Opisane w niniejszym opracowaniu systemy rozpoznawania twarzy, w połączeniu ze śledzeniem osób, nie mają na celu rozpoznawania tożsamości osób. Nie powstaje żadna baza danych łącząca cechy biometryczne z konkretnymi osobami, co sprawia że przestrzegane jest prawo w zakresie ochrony...
-
Activity-based payments: alternative (anonymous) online payment model
PublicationElectronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...
-
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis
PublicationRecently, a survey of cybersecurity assessment methods focused on general characteristics was conducted. Among its major findings, it revealed the methods’ adoption issues. This paper presents a follow-up to the study. It provides an in-depth analysis of the methods’ adoption-related properties based on qualitative metrics. As a result, the proposals which demonstrate a higher adoption potential were identified. The methods are...
-
Introduction to the special issue on intelligent systems to aid the handicapped.
PublicationWśród wielu zastosowań sztucznej inteligencji i technologii bazodanowych pojawiają się zastosowania wspierające osoby niepełnosprawne. Z chwilą pojawienia są każdej nowej technologii komputerowej świat naukowy proponuje zastosowania tej technologii do celu poprawy komunikacji z osobami niepełnosprawnymi bądź technologie wspierające te osoby bezpośrednio. Niniejsze wydanie specjalne czasopisma Journal of Intelligent Information...
-
Intelligent processing of stuttered speech.
PublicationW artykule zaprezentowano kilka metod analizy i automatycznego zliczania potknięć artykulacyjnych, związanych z jąkaniem się, opartych na wykorzystaniu algorytmów uczących się sztucznych sieci neuronowych i zbiorów przybliżonych.
-
Estimation of musical sound separation algorithm effectiveness employing neural networks.
PublicationŚlepa separacja dźwięków sygnałów muzycznych zawartych w zmiksowanym materiale jest trudnym zadaniem. Jest to spowodowane tym, że dźwięki znajdujące się w relacjach harmonicznych mogą zawierać kolidujące składowe sinusoidalne (składowe harmoniczne). Ewaluacja wyników separacji jest również problematyczna, gdyż analiza błędu energetycznego często nie odzwierciedla subiektywnej jakości odseparowanych sygnałów. W tej publikacji zostały...
-
Data Model Development for Security Information Sharing in Smart Grids
PublicationThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid, the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
Information Logistics as a Paradigm
PublicationThis paper presents a paradigm-based approach to information logistics. The approach deals with extracting concepts specific to information logistics in categories typical to paradigms. The resulting description should be easily connected to complementary components which are based on other paradigms, e.g. business process management and information systems development. Empirical part aims at checking and enhancing features typical...
-
DBpedia As a Formal Knowledge Base – An Evaluation
PublicationDBpedia is widely used by researchers as a mean of accessing Wikipedia in a standardized way. In this paper it is characterized from the point of view of questions answering system. Simple implementation of such system is also presented. The paper also characterizes alternatives to DBpedia in form of OpenCyc and YAGO knowledge bases. A comparison between DBpedia and those knowledge bases is presented.
-
Informal projects management with volunteers participation
PublicationThe article briefly presents some experiences and results of research which has been conducted in order to identify key elements influencing the success of projects managed in informal way with volunteers’ participation. These experiences were collected during the realization of several “soft” projects. The general aims of these projects were sports competitions’ organisation, cultural events and charity projects for...
-
Calculation of Induced Sheath Voltages in Power Cables – Single Circuit System versus Double Circuit System
PublicationThis paper presents comparison of values of induced sheath voltages in power cable metallic sheaths when one or two cables per phase are used. Calculation of voltages is performed for various phase sequences of the power cables. Three types of the sheaths bonding and earthing are considered. Shock hazard and voltage stress of non-metallic outer sheath of cables are evaluated. The proposed, optimal configuration of the power cable...
-
Task Assignments in Logistics by Adaptive Multi-Criterion Evolutionary Algorithm with Elitist Selection
PublicationAn evolutionary algorithm with elitist selection has been developed for finding Pareto-optimal task assignments in logistics. A multi-criterion optimization problem has been formulated for finding a set of Pareto- optimal solutions. Three criteria have been applied for evaluation of task assignment: the workload of a bottleneck machine, the cost of machines, and the numerical performance of system. The machine constraints have...
-
Limitations of Emotion Recognition in Software User Experience Evaluation Context
PublicationThis paper concerns how an affective-behavioural- cognitive approach applies to the evaluation of the software user experience. Although it may seem that affect recognition solutions are accurate in determining the user experience, there are several challenges in practice. This paper aims to explore the limitations of the automatic affect recognition applied in the usability context as well as...
-
Modeling energy consumption of parallel applications
PublicationThe paper presents modeling and simulation of energy consumption of two types of parallel applications: geometric Single Program Multiple Data (SPMD) and divide-and-conquer (DAC). Simulation is performed in a new MERPSYS environment. Model of an application uses the Java language with extension representing message exchange between processes working in parallel. Simulation is performed by running threads representing distinct process...
-
Balance recognition on the basis of EEG measurement.
PublicationAlthough electroencephalography (EEG) is not typically used for verifying the sense of balance, it can be used for analysing cortical signals responsible for this phenomenon. Simple balance tasks can be proposed as a good indicator of whether the sense of balance is acting more or less actively. This article presents preliminary results for the potential of using EEG to balance sensing....
-
Designing effective educational games - a case study of a project management game
PublicationThis paper addresses the issues of designing effective educational games. We aim at investigating how the cognitive, behavioral and emotional aspects of the games influence their educational effectiveness. The results were obtained with an observational user experience study extended with affect analysis carried out for a project management game GraPM. We analyzed the...
-
Enhanced Eye-Tracking Data: a Dual Sensor System for Smart Glasses Applications
PublicationA technique for the acquisition of an increased number of pupil positions, using a combined sensor consisting of a low-rate camera and a high-rate optical sensor, is presented in this paper. The additional data are provided by the optical movement-detection sensor mounted in close proximity to the eyeball. This proposed solution enables a significant increase in the number of registered fixation points and saccades and can be used...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublicationThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Towards solving heterogeneous fleet vehicle routing problem with time windows and additional constraints: real use case study
PublicationIn advanced logistic systems, there is a need for a comprehensive optimization of the transport of goods, which would reduce costs. During past decades, several theoretical and practical approaches to solve vehicle routing problems (VRP) were proposed. The problem of optimal fleet management is often transformed to discrete optimization problem that relies on determining the most economical transport routes for a number of vehicles...
-
Game with a Purpose for Mappings Verification
PublicationMappings verification is a laborious task. The paper presents a Game with a Purpose based system for verification of automatically generated mappings. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the gameplay, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation and gathering...
-
AgileSafe – a method of introducing agile practices into safety-critical software development processes
PublicationThis article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the software assurance requirements imposed by the application domain. We present the description of the method covering the process of its application and the input and output artefacts.
-
Towards the participant observation of emotions in software development teams
PublicationEmotions, moods and temperament influence our behaviour in every aspect of life. Until now plenty of research has been conducted and many theories have been proposed to explain the role of emotions within the working environment. However, in the field of software engineering, interest in the role of human factors in the process of software development is relatively new. In the paper the research design process that has been proposed...
-
Applications for investigating therapy progress of autistic children
PublicationThe paper regards supporting behavioral therapy of autistic children with mobile applications, specifically applied for measuring the child’s progress. A family of five applications is presented, that was developed as an investigation tool within the project aimed at automation of therapy progress monitoring. The applications were already tested with children with autism spectrum disorder. Hereby we analyse children’ experience...
-
A Parallel MPI I/O Solution Supported by Byte-addressable Non-volatile RAM Distributed Cache
PublicationWhile many scientific, large-scale applications are data-intensive, fast and efficient I/O operations have become of key importance for HPC environments. We propose an MPI I/O extension based on in-system distributed cache with data located in Non-volatile Random Access Memory (NVRAM) available in each cluster node. The presented architecture makes effective use of NVRAM properties such as persistence and byte-level access behind...
-
Completeness and Consistency of the System Requirement Specification
PublicationAlthough the System Requirement Specification, as a first formal and detailed document, is the base for the software project in classic software methodologies, there is a noticeable problem of assuring the completeness of this document. The lack of its completeness causes uncertainty of the project foundations. This was one of motivations for agile methodologies – if the SRS cannot be easily validated, if it can change in late project...
-
Top k Recommendations using Contextual Conditional Preferences Model
PublicationRecommender systems are software tools and techniques which aim at suggesting to users items they might be interested in. Context-aware recommender systems are a particular category of recommender systems which exploit contextual information to provide more adequate recommendations. However, recommendation engines still suffer from the cold-start problem, namely where not enough information about users and their ratings is available....
-
The lemniscate knowledge flow model
PublicationKnowledge is seen as one of the main resources for organizations providing knowledge-intensive services. Therefore, sharing and reusing are the main goals of modern knowledge management (KM) approach, driven by information and communication technologies (ICT). However, one can ask for the details in order to provide means and tools to design and deploy environment able to fulfil these two goals. We observed that occurred interactions...
-
Towards better understanding of context-aware knowledge transformation
PublicationConsidering different aspects of knowledge functioning, context is poorly understood in spite of intuitively identifying this concept with environmental recognition. For dynamic knowledge, context especially seems to be an essential factor of change. Investigation on the impact of context on knowledge dynamics or more generally on the relationship between knowledge and its contextual interpretation is important in order to understand...
-
Talents, Competencies and Techniques of Business Analyst: A Balanced Professional Development Program
PublicationThis paper presents preliminary results of action research in which we search for fundamentals of an universal theory of balanced approaches to software process. It is developed on the basis of balanced approach for professional development program for business analysts which integrates approaches oriented on talents, competencies and techniques. This paper includes the description of key concepts in background approaches, components...
-
APIS – Agent Platform for Integration of Services
PublicationThe paper presents an approach to creating the platform for development and evaluation of complex tasks execution algorithms. Proposed solution is based on an agent paradigm where independent peers can cooperate and negotiate in order to execute specified tasks which are defined only by the final output description. Tasks are realized by the means of services exposed by different peers. In case when there is no single service fulfilling...
-
Towards detecting programmers’ stress on the basis of keystroke dynamics
PublicationThe article describes the idea of detecting stress among programmers on the basis of keystroke dynamics. An experiment with a group of students of artificial intelligence classes was performed. Two samples of keystroke data were recorded for each case, the first while programming without stress, the second under time pressure. A number of timing and frequency parameters were calculated for each sample. Then statistical analysis...
-
Challenges in Reporting the COVID-19 Spread and its Presentation to the Society
Publication -
Hard and Soft Modeling Tools and Approaches to Data and Information Management in Real-Life Projects and Systems : special issue editorial
PublicationOmówiono miękkie oraz twarde narzędzia służące do modelowania i symulacji przepływów dużych ilości danych oraz informacji. Przedstawiono mozliwości zastosowania tego typu narzędzi w funkcjonowaniu systemów rzeczywistych.
-
Application of social relation graphs for early detection of transient spammers
PublicationWczesne wykrywanie społecznych zagrożeń i anomalii jest prawdziwym wyzwaniem w dzisiejszch, dynamicznych społeczeństwach. Ludzie tworzą skoplikowane relacje społeczne, które mogą być przedstawione za pomocą różnych typów grafów, których wierzchołki reprezentować mogą aktorów sieci (konkretne osoby lub organizacje) a krawędzie relacje pomiędzy nimi. Analiza tych dynamicznie zmieniających się relacji może wskazywać na niektóre nadciągające...
-
Language of Benefits as a Novel Tool for Improving Website Personalization
PublicationA properly designed website allows the user to search for information faster, and more accurately. The information content of the website should be also adapted to the needs of the user. The purpose of this article is to present a novel Language of Benefits (LoB) approach to facilitate the use of websites for individual user groups. The LoB approach is an approach addressed to IT Analysts, to facilitate the process of web design,...
-
Effective Decision-Making in Supply Chain Management
PublicationProper decision-making in Supply Chain Management (SCM) is crucial for an appropriately functioning mechanisms. The paper presents how IT technologies can impact on an organization and process realization. Especially Service Oriented Architecture (SOA) standard and the Cloud Computing (CC) paradigms are taken into account. A general model of decision-making is proposed and based on a specific practical example is analyzed using...
-
Assessing Effectiveness of Recommendations to Requirements-Related Problems through Interviews with Experts
PublicationRequirements Engineering and Business Analysis are known as very important to software project outcome but also difficult activities, coping with many problems and challenges. The work reported in this paper was preceded by a survey which revealed most common requirements-related problems in Polish IT industry. We addressed ten most frequently reported problems by reviewing the literature for recommen¬dations how to cope with...
-
Analyzing energy/performance trade-offs with power capping for parallel applications on modern multi and many core processors
PublicationIn the paper we present extensive results from analyzing energy/performance trade-offs with power capping observed on four different modern CPUs, for three different parallel applications such as 2D heat distribution, numerical integration and Fast Fourier Transform. The CPU tested represent both multi-core type CPUs such as Intel⃝R Xeon⃝R E5, desktop and mobile i7 as well as many-core Intel⃝R Xeon PhiTM x200 but also server, desktop...
-
MaliciousIDE – software development environment that evokes emotions
PublicationEmotions affect every aspect of human live, including work. Numerous studies in software engineering have shown that negative emotions can lower the productivity of programmers. Unlike traditional approaches to managing software development, modern methods, such as Agile and Lean, take into account human aspects of programming. To thoroughly investigate the impact of negative emotions on the work of programmers, a malicious integrated...
-
Stereoscopy in Graphics APIs for CAVE Applications
PublicationThe paper compares the advantages and disadvantages of a variety of Graphics Application Programming Interfaces (APIs) from the perspective of obtaining stereoscopy in applications written for a CAVE virtual reality environment. A number of problems have been diagnosed and an attempt has been made to solve them using OpenGL, DirectX 11 and 12, Vulkan, as well as the Unity Engine which can internally use DirectX, OpenGL and Vulkan,...
-
The Role of a Software Product Manager in Various Business Environments
PublicationThe aim of the paper is to identify the role of the software product manager depending on the size of the company and the characteristics of the product they are working on. This has been achieved in cooperation with 15 experts from the IT industry. The companies were divided into 4 levels of size: micro-enterprises, small businesses, medium businesses and large enterprises. The characteristics of the products were divided into...
-
Discovering interactions between applications with log analysis
PublicationApplication logs record the behavior of a system during its runtime and their analysis can provide useful information. In this article, we propose a method of automated log analysis to discover interactions taking place between applications in an enterprise. We believe that such an automated approach can greatly support enterprise architects in building an up-to-date view of a governed system in a modern, fast-paced development...
-
Immersive Technologies that Aid Additive Manufacturing Processes in CBRN Defence Industry
PublicationTesting unique devices or their counterparts for CBRN (C-chemical, B-biological, R-radiological, N-nuclear) defense relies on additive manufacturing processes. Immersive technologies aid additive manufacturing. Their use not only helps understand the manufacturing processes, but also improves the design and quality of the products. This article aims to propose an approach to testing CBRN reconnaissance hand-held products developed...