Search results for: mobile application - Bridge of Knowledge

Search

Search results for: mobile application

Filters

total: 583
filtered: 562

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: mobile application

  • KIERUNKI ROZWOJU HANDLU ELEKTRONICZNEGO

    Celem artykułu jest ukazanie istoty e-commerce oraz wskazanie najważniejszych kierunków jego rozwoju w Polsce. Opracowano uniwersalną definicję handlu elektronicznego oraz ukazano jego miejsce na tle biznesu elektronicznego oraz gospodarki internetowej. W dalszej części przedstawiono wyniki badań dotyczących najbardziej istotnych w najbliższych latach kierunków rozwoju handlu elektronicznego, jakimi są mobile commerce oraz social...

    Full text available to download

  • Game with a Purpose for Verification of Mappings Between Wikipedia and WordNet

    Publication

    - Year 2017

    The paper presents a Game with a Purpose for verification of automatically generated mappings focusing on mappings between WordNet synsets and Wikipedia articles. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the game-play, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation...

    Full text to download in external service

  • A universal IT system architecture for servicing, collecting, storing, processing and presenting data from wireless devices

    In the article we present a universal IT system architecture, which allows one to develop, based on mobile and multiplatform JAVA language, applications capable of working with many different wireless systems in an easy and effective way. Modular system architecture supports efficient data processing and enables convenient presentation of chosen parameters. Additionally, proposed IT system architecture provides easy adoption to...

  • Path Loss Modelling for Location Service Applications

    The aim of this paper is the path loss modeling for the radiolocation services in radiocommunication networks, particularly in cellular networks. The main results of the measurements obtained in the physical layer of the UMTS are introduced. A new method for the utilization of the multipath propagation phenomenon to improve the estimation of the distance between the mobile station (MS) and the base station (BS) is outlined. This...

  • Analysis of the parameters of respiration patterns extracted from thermal image sequences

    Remote estimation of vital signs is an important and active area of research. The goal of this work was to analyze the feasibility of estimating respiration parameters from video sequences of faces recorded using a mobile thermal camera. Different estimators were analyzed and experimentally verified. It was demonstrated that the respiration rate, periodicity of respiration, and presence and length of apnea periods could be reliably...

    Full text to download in external service

  • Evaluation of respiration rate and pattern using a portable thermal camera

    Publication

    - Year 2016

    The goal of this paper was to analyze the accuracy of the proposed method for the evaluation of respiration rate and respiration rhythm patterns (e.g. inspiration slope) using the portable and mobile thermal camera module that could be a part of smart glasses. Parameters were analyzed for 12 volunteers in two experiments, when subjects speak and do not speak. The pressure, chest belt was used as a reference measurement method....

    Full text to download in external service

  • Android OS: A Review

    Publication

    Due to the technological development, mobile terminals have evolved into functionally sophisticated devices such as smartphones and tablets. The Android platform has become one of the most popular operating system with millions of new users each year. Despite many studies, none have provided a comprehensive description of this operating system. In this paper we present a review of the Android OS. We describe the platforms history...

    Full text available to download

  • Low-Cost Unattended Design of Miniaturized 4 × 4 Butler Matrices with Nonstandard Phase Differences

    Publication

    Design of Butler matrices dedicated to Internet of Things and 5th generation (5G) mobile systems—where small size and high performance are of primary concern—is a challenging task that often exceeds capabilities of conventional techniques. Lack of appropriate, unified design approaches is a serious bottleneck for the development of Butler structures for contemporary applications. In this work, a low-cost bottom-up procedure for...

    Full text available to download

  • Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart Cities

    Publication

    - Year 2022

    In relation to smart city planning and management, processing huge amounts of generated data and execution of non-lightweight cryptographic algorithms on resource constraint devices at disposal, is the primary focus of researchers today. To enable secure exchange of data between cloud networks and mobile devices, in particular smart hand held devices, this paper presents Blockchain based approach that disperses a public/free key...

    Full text available to download

  • Dynamic risk assessment in autonomous vehicles motion planning

    Publication

    - Year 2008

    Arguing that an autonomous mobile system is sufficiently safe to operate in presence of other vehicles and objects is an important element in development of such systems. Traditional approach to assure safety is to distinguish between safe and unsafe area and prevent the autonomous vehicle from entering the unsafe area. The paper presents a model of autonomous vehicle control system which uses risk assessment...

    Full text to download in external service

  • Color Processing for Color-Blind Individuals Using Smart Glasses

    In this paper we investigated image processing methods for color-blind individuals. In particular we experimentally verified color naming procedure, generation of maps with color perception differences for average observers and for dichromats, and two color transformation methods. In experiments 7 mobile devices were used: 3 smart glasses and 4 smartphones. User studies were performed with 38 average observers and 9 dichromats....

    Full text to download in external service

  • Asynchronous time difference of arrival (ATDOA) method

    Publication

    A new method for a location service in the asynchronous wireless sensor networks is outlined. This method, which is called asynchronous time difference of arrival (ATDOA), enables calculation of the position of a mobile node without knowledge of relative time differences (RTDs) between measuring sensors. The ATDOA method is based on the measurement of time difference of arrival between the node and the same sensor at the discrete...

    Full text to download in external service

  • Game with a Purpose for Mappings Verification

    Mappings verification is a laborious task. The paper presents a Game with a Purpose based system for verification of automatically generated mappings. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the gameplay, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation and gathering...

    Full text available to download

  • Taking advantage of symmetries: Gathering of many asynchronous oblivious robots on a ring

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2010

    One of the recently considered models of robot-based computing makes use of identical, memoryless mobile units placed in nodes of an anonymous graph. The robots operate in Look-Compute-Move cycles; in one cycle, a robot takes a snapshot of the current configuration (Look), takes a decision whether to stay idle or to move to one of the nodes adjacent to its current position (Compute), and in the latter case makes an instantaneous...

    Full text available to download

  • Collision-Free Network Exploration

    Publication
    • J. Czyzowicz
    • D. Dereniowski
    • L. Gąsieniec
    • R. Klasing
    • A. Kosowski
    • D. Pająk

    - Year 2014

    A set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...

    Full text to download in external service

  • Fast Fading Influence on the Deep Learning-Based LOS and NLOS Identificationin Wireless Body Area Networks

    In the article, the fast fading influence on the proposed DL (Deep Learning) approach for LOS (Line-of-Sight) and NLOS (Non-Line-of-Sight) conditions identification in Wireless Body Area Networks is investigated. The research was conducted on the basis of the off-body communication measurements using the developed mobile measurement stand, in an indoor environment for both static and dynamic scenarios. The measurements involved...

    Full text to download in external service

  • Connected searching of weighted trees

    W artykule rozważamy problem spójnego przeszukiwania drzew obciążonych. Autorzy w [L. Barriere i inni, Capture of an intruder by mobile agents, SPAA'02 (2002) 200-209] twierdzą, że istnieje wielomianowy algorytm dla problemu obliczania optymalnej strategii przeszukiwania obciążonego drzewa. W niniejszej pracy pokazano, że problem ten jest obliczeniowo trudny nawet dla wierzchołkowo-obciążonych drzew (wagi krawędzi równe 1) oraz...

    Full text to download in external service

  • Empirical Propagation Model for the Container Terminal Environment

    Publication

    In the paper the empirical propagation model for mobile radio links in a container terminal environment is presented and the investigated environment Deepwater Container Terminal in Gdansk, Poland) is characterized. Described empirical model was elaborated on the basis of almost 290 thousand propagation path measurements in real conditions. The diversity of conditions occurring in different places of the container terminal has...

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Deterministic Rendezvous in Restricted Graphs

    Publication

    - Year 2015

    In this paper we consider the problem of synchronous rendezvous in which two anonymous mobile entities (robots) A and B are expected to meet at the same time and point in a graph G = (V;E). Most of the work devoted to rendezvous in graphs assumes that robots have access to the same sets of nodes and edges, where the topology of connections may be initially known or unknown. In our work we assume the movement of robots is restricted...

    Full text to download in external service

  • Computational complexity and length of recorded data for fluctuation enhanced sensing method in resistive gas sensors

    Publication

    - Year 2015

    This paper considers complexity and accuracy of data processing for gas detection using resistance fluctuation data observed in resistance gas sensors. A few selected methods were considered (Principal Component Analysis – PCA, Support Vector Machine – SVM). Functions like power spectral density or histogram were used to create input data vector for these algorithms from the observed resistance fluctuations. The presented considerations...

    Full text to download in external service

  • Intelligent Autonomous Vehicles

    Publication

    Advanced mobile vehicles and robots have long been one of the main issues in engineering. They have various applications in emergency, lifeguarding and entertainment as well as in various industrial, civil and military systems. Among them, you can distinguish robots that can move in an open environment or operate only in predetermined confined spaces. Open world robots are very demanding because they have...

  • Kinetics and mechanism of the chemically modified starches during gelatinization.

    Publication

    - Year 2013

    Native starch was silicated by means of microwave-assisted reactions with varying doses of reagents. Resulting products were characterized by DSC and HMR-relaxation methods. It was observed that the hydratation of the silicated starches during gelatinization decreases when compared to that of the native potato starch. The amount of unfrozen water for ungelitinizated silicated starches are less than in control samples. At the same...

  • A Visual Method of Measuring Railway-Track Weed Infestation Level

    Publication

    This paper concerns the assessment of railway track surface conditions in relation to the degree of weed infestation. The paper conceptually describes the proposed method using a visual system to analyse weed infestation level. The use of image analysis software for weed detection is also proposed. This new measurement method allows for a mobile assessment of the track’s weed infestation status. Validation of the assessment method...

    Full text available to download

  • Simultaneous handover scheme for IEEE 802.11 WLANs with IEEE 802.21 tiggers

    Handover performance in wireless networks is important, especially nowadays, when multimedia services are becoming increasingly available over the wireless devices. However, users expect uncompromised mobility when using the service. Thus, the support of multimedia services is not possible if handover is inefficient. At the same time it is clear that a strict separation between IP Layer and the Link Layer results in built-in sources...

    Full text available to download

  • Common methods for the chiral determination of amphetamine and related compounds I. Gas, liquid and thin-layer chromatography

    Publication

    This article reviews the most common, useful methods for the chiral determination of amphetamine (AM) and AM-deriveddesigner drugs in different of matrix, including blood, hair, urine, medicaments or standard solutions, taking into considerationarticles published in the past 15 years. We consider chromatographic methods (e.g., gas, liquid, high-performance liquid, and thinlayer). We describe several types of chiral derivatization...

    Full text to download in external service

  • Augmenting digital documents with negotiation capability

    Publication

    Active digital documents are not only capable of performing various operations using their internal functionality and external services, accessible in the environment in which they operate, but can also migrate on their own over a network of mobile devices that provide dynamically changing execution contexts. They may imply conflicts between preferences of the active document and the device the former wishes to execute on. In the...

    Full text available to download

  • Realizacja mobilnego urządzenia do wytwarzania kurtyny elektromagnetycznej do zastosowań specjalnych

    In the article the assumptions, design and realisation of the technological demonstrator of a mobile device for generating an electromagnetic curtain (AEGIS) were presented, both in the area of hardware and software. The device is designed to block radio communication by which it is possible to detonate the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the demonstrator for generating...

  • ASYNCHRONICZNA METODA TDOA

    Przedstawiono nową metodę lokalizowania terminali ruchomych MT (Mobile Terminal) w sieciach radiowych, w których stacje bazowe BS (Base Station) pracują asynchronicznie względem siebie. Metoda ta, nazwana ATDOA (Asynchronous Time Difference of Arrival), umożliwia estymację położenia MT na podstawie pomiarów różnicy czasów propagacji sygnałów radiowych pomiędzy terminalem ruchomym będącym w ruchu, a pojedynczą stacją bazową w różnych...

  • Analysis of human behavioral patterns

    Publication

    - Year 2022

    Widespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...

    Full text to download in external service

  • The Snow Team Problem

    Publication

    - Year 2017

    We study several problems of clearing subgraphs by mobile agents in digraphs. The agents can move only along directed walks of a digraph and, depending on the variant, their initial positions may be pre-specified. In general, for a given subset~$\cS$ of vertices of a digraph $D$ and a positive integer $k$, the objective is to determine whether there is a subgraph $H=(\cV_H,\cA_H)$ of $D$ such that (a) $\cS \subseteq \cV_H$, (b)...

    Full text to download in external service

  • Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection

    Publication
    • A. G. Akintola
    • A. O. Balogun
    • H. A. Mojeed
    • F. Usman-Hamza
    • S. A. Salihu
    • K. S. Adewole
    • G. B. Balogun
    • P. O. Sadiku

    - International Journal of Interactive Mobile Technologies - Year 2022

    Due to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approach for detecting Android malware. This approach has the disadvantage of being unable to identify unknown malware. As a result of this issue, machine learning (ML) for detecting malware...

    Full text available to download

  • Measuring research on radio wave propagation

    Publication

    - Year 2010

    Telecommunication connections are increasingly based on the wireless links, both fixed and mobile, carried out under different radio systems. This kind of solution has many advantages. However, the propagation medium is a factor that causes many difficulties in designing wireless networks, because of large diversity of propagation environments. Transmission loss in each environment is determined by many variables phenomena and...

  • 5G/6G optical fronthaul modeling: cost and energy consumption assessment

    In fifth generation (5G) and the future beyond 5G (6G) radio access networks (RANs), the cost of fronthaul deployment is a main challenge for mobile network operators. Depending on different constraints, there are various solutions to deploy an efficient fronthaul. Fiber-optic-based fronthaul offers long-term support with regard to a rapid increase in capacity demands. When fiber connections, either point-to-point (P2P) or point-to-multipoint...

    Full text available to download

  • Practical Trial for Low-Energy Effective Jamming on Private Networks With 5G-NR and NB-IoT Radio Interfaces

    Publication

    - IEEE Access - Year 2024

    Fourth-generation (4G) mobile networks are successively replaced by fifth-generation (5G) ones, based on the new releases of the 3rd Generation Partnership Project (3GPP) standard. 5G generation is dedicated to civilian users and the conducted analytical work shows that it has numerous technological gaps that prevent its direct implementation in military communications systems. However, the recent armed world conflicts showed that...

    Full text to download in external service

  • Analiza efektywności metod estymacji położenia terminala ruchomego w środowisku propagacji wielodrogowej

    Publication

    - Year 2009

    W referacie została zaprezentowana analiza efektywności metod estymacji położenia terminala ruchomego w systemie WCDMA/FDD (Wideband Code Division Multiple Access / Frequency Division Duplex) w warunkach propagacji wielodrogowej. Analizie poddano cztery, najczęściej spotykane w literaturze przedmiotu, metody: Chan'a, Foy'a, Fang'a oraz Friedlander'a. Metody te umożliwiają wyznaczanie położenia geograficznego termi-nala ruchomego...

  • Analiza modalna konstrukcji stanowiska badawczego dynamiki małogabarytowych wirników przy wykorzystaniu wzbudników drgań część 1. badania eksperymentalne

    Publication

    - Year 2012

    Streszczenie: W artykule przedstawiono przebieg i wyniki eksperymentalnej analizy modalnej konstrukcji stanowiska do badania wirników małogabarytowych, które miały w drugiej części pracy posłużyć do weryfikacji stworzonego modelu symulacyjnego. Wymuszeniem były dwa wzbudniki drgań, modułem akwizycji danych był SCADAS Mobile, a środowiskiem, w którym pracowano był Test.Lab 11 B. Obiekt badań podwieszono na elastycznych linach by...

  • Analiza modalna konstrukcji podpierającej stanowiska badawczego dynamiki małogabarytowych wirników / część pierwsza - badania eksperymentalne

    Publication

    - Year 2012

    Streszczenie: W artykule przedstawiono przebieg i wyniki eksperymentalnej analizy modalnej konstrukcji stanowiska do badania wirników małogabarytowych, które miały w drugiej części pracy posłużyć do weryfikacji stworzonego modelu symulacyjnego. Wymuszeniem były dwa wzbudniki drgań, modułem akwizycji danych był SCADAS Mobile, a środowiskiem, w którym pracowano był Test.Lab 11 B. Obiekt badań podwieszono na elastycznych linach by...

  • Modification of Selected Propagation Models in Terms of Path Loss Estimation in Container Terminal

    Publication

    It is particularly important to look for any propagation model that could be useful for designing mobile radio networks in container terminal environment. Selected propagation models have been investigated. Firstly - basing on measurements results - they have been evaluated in this scope and the analysis has shown, that the adjustment is needed. This modification improved significantly the accuracy of path loss modelling. For the...

  • Obsługa przełączeń terminali ruchomych niewspierających mobilności

    Artykuł omawia koncepcję network-based mobility management umożliwiającą obsługę terminali ruchomych niewspierających protokołów mobilności. Praca koncentruje się na protokole Proxy Mobile IPv6 (PMIPv6) który zapewnienia ciągłą osiągalność terminala ruchomego, pomimo zmiany punktu przyłączenia terminala do sieci. W dalszej części artykuł przybliża wysiłki autorów poczynione w celu uruchomienia środowiska do testowania efektywności...

  • Evolution of Animats Following a Moving Target in an Artificial Ecosystem

    Publication

    - Year 2014

    Many biological animals, even microscopically small, are able to track moving sources of food. In this paper, we investigate the emergence of such behavior in artificial animals (animats) in a 2-dimensional simulated liquid environment. These "predators" are controlled by evolving artificial gene regulatory networks encoded in linear genomes. The fate of the predators is determined only by their ability to gather food and reproduce—no...

    Full text to download in external service

  • Performance evaluation of parallel background subtraction on GPU platforms

    Implementation of the background subtraction algorithm on parallel GPUs is presented. The algorithm processes video streams and extracts foreground pixels. The work focuses on optimizing parallel algorithm implementation by taking into account specific features of the GPU architecture, such as memory access, data transfers and work group organization. The algorithm is implemented in both OpenCL and CUDA. Various optimizations of...

    Full text to download in external service

  • Analiza modalna konstrukcji stanowiska badawczego dynamiki małogabarytowych wirników przy wykorzystaniu wzbudników drgań. cz. I. badania eksperymentalne.

    Publication

    streszczenie: w artykule przedstawiono przebieg i wyniki eksperymentalnej analizy modalnej konstrukcji stanowiska do badania wirników małogabarytowych, które miały w drugiej części pracy posłużyć do weryfikacji stworzonego modelu symulacyjnego. wymuszeniem były dwa wzbudniki drgań, modułem akwizycji danych był scadas mobile, a środowiskiem, w którym pracowano był test.lab 11 b. obiekt badań podwieszono na elastycznych linach by...

    Full text available to download

  • Realizacja przełączeń terminali ruchomych przez elementy infrastruktury systemu mobilności

    Publication

    - Year 2012

    W artykule przedstawione zostało rozwiązanie pozwalające zrealizować mobilność terminali, które nie posiadają zaimplementowanych zaawansowanych mechanizmów dedykowanych dla tej usługi. Opisano protokół Proxy Mobile IPv6 jako rozwiązanie wpisujące się w model network-based localized mobility management, w której to elementy infrastruktury systemu odpowiadają za zachowanie ciągłości połączenia w trakcie przełączania. Zaprezentowane...

  • Analysis of profitability of inter-system handovers between IEEE 802.11band UMTS

    Publication

    - Year 2003

    Celem pracy jest analiza opłacalności przełączenia pomiędzy sieciami IEEE 802.11b i UMTS w przypadku używania Mobile IPv4. Analiza została przeprowadzona między innymi w zależności od przepustowości kanału dostępnego w sieci UMTS, jakości połączenia radiowego, ilości użytkowników w sieci 802.11b, rodzaju generowanego ruchu oraz wymagań jakościowych (QoS) tego ruchu. Szczegółowe symulacje zostały przeprowadzone przy użyciu NS2 oraz...

  • Reliable Document-Centric Processing in Loosely Coupled Email-Based Systems

    Publication

    - Year 2015

    Email is a simple way to exchange digital documents of any kind. The Mobile INteractive Document architecture (MIND) enables self-coordination and self-steering of document agent systems based on commonly available email services. In this paper, a mechanism for providing integrity and reliability of such an email based agent system is proposed to cope with message soft or hard bounces, user interrupts, and other unexpected events....

  • Design and Configuration of Context-aware VoIP Telephony Systems

    Publication

    - Year 2013

    Voice over IP is a widely used concept with regard to a realization technology of different types of telephony systems, including those that are used in enterprises. Such systems of a call procesing component and a set of desk endpoints that are pervasove from a user perspective. Those andpoints are usually not mobile, but in result can deliver a much greater set of functions needed in an everyday office work. Those functions also...

    Full text to download in external service

  • Balancing energy consumption in limited power grid with active front-end and three phase dual active bridge system

    Publication

    - Year 2020

    Paper deals with simulation analysis of bidirectional power converters system for charging station of electric vehicle in condition of limited power source in city infrastructure. In case of incapability to provide additional power supply through the grid by virtue of historical, architectural and economic reasons it is possible to solve this issue by implementation of mobile battery-powered supply source. The proposed bidirectional...

    Full text available to download

  • A Novel Bitrate Adaptation Method for Heterogeneous Wireless Body Area Networks

    In the article, a novel bitrate adaptation method for data streams allocation in heterogeneous Wireless Body Area Networks (WBANs) is presented. The efficiency of the proposed algorithm was compared with other known algorithms of data stream allocation using computer simulation. A dedicated simulator has been developed using results of measurements in the real environment. The usage of the proposed adaptive data streams allocation...

  • Mobility management solutions for current IP and future networks

    Publication

    Enormous progress in the design of portable electronic devices allowed them to reach a utility level comparable to desktop computers, while still retaining their mobility advantage. At the same time new multimedia services and applications are available for IP users. Unfortunately, the performance of base IP protocol is not satisfactory in mobile environments, due to lack of handover support and higher layer mobility management...

    Full text available to download