Filters
total: 2330
-
Catalog
- Publications 1314 available results
- Journals 283 available results
- Conferences 142 available results
- People 242 available results
- Projects 2 available results
- Research Teams 1 available results
- e-Learning Courses 85 available results
- Events 5 available results
- Open Research Data 256 available results
displaying 1000 best results Help
Search results for: computer
-
International Journal of Computers Communications & Control
Journals -
Jisuanji Xuebao/Chinese Journal of Computers
Journals -
Jordanian Journal OF Computers and Information Technology
Journals -
The lemniscate knowledge flow model
PublicationKnowledge is seen as one of the main resources for organizations providing knowledge-intensive services. Therefore, sharing and reusing are the main goals of modern knowledge management (KM) approach, driven by information and communication technologies (ICT). However, one can ask for the details in order to provide means and tools to design and deploy environment able to fulfil these two goals. We observed that occurred interactions...
-
Towards better understanding of context-aware knowledge transformation
PublicationConsidering different aspects of knowledge functioning, context is poorly understood in spite of intuitively identifying this concept with environmental recognition. For dynamic knowledge, context especially seems to be an essential factor of change. Investigation on the impact of context on knowledge dynamics or more generally on the relationship between knowledge and its contextual interpretation is important in order to understand...
-
Restricted open shop scheduling
PublicationIn the real applications the open shop scheduling models often require some additional constraints and adequate models. We concern the restrictions in the open shop scheduling related to an instance of the problem and to a feasible solution. Precisely, we require that each jobs consists of the bounded number of operations and each machine has a bounded load (i.e., the total number of operations executed on this machine in a schedule)....
-
Assessing Effectiveness of Recommendations to Requirements-Related Problems through Interviews with Experts
PublicationRequirements Engineering and Business Analysis are known as very important to software project outcome but also difficult activities, coping with many problems and challenges. The work reported in this paper was preceded by a survey which revealed most common requirements-related problems in Polish IT industry. We addressed ten most frequently reported problems by reviewing the literature for recommen¬dations how to cope with...
-
Analyzing energy/performance trade-offs with power capping for parallel applications on modern multi and many core processors
PublicationIn the paper we present extensive results from analyzing energy/performance trade-offs with power capping observed on four different modern CPUs, for three different parallel applications such as 2D heat distribution, numerical integration and Fast Fourier Transform. The CPU tested represent both multi-core type CPUs such as Intel⃝R Xeon⃝R E5, desktop and mobile i7 as well as many-core Intel⃝R Xeon PhiTM x200 but also server, desktop...
-
Hard Lessons Learned: A Model that Facilitates the Selection of Methods of IT Project Management
PublicationThe article presents the results of research conducted in an international enterprise responsible for IT project implementation. The carried out analysis of the case study with the use of surveys and data synthesis allowed the major factors causing problems connected with project management to be identified. The identified factors were aggregated and then, by using four key variables, a rhomboidal model adaptation was proposed...
-
MaliciousIDE – software development environment that evokes emotions
PublicationEmotions affect every aspect of human live, including work. Numerous studies in software engineering have shown that negative emotions can lower the productivity of programmers. Unlike traditional approaches to managing software development, modern methods, such as Agile and Lean, take into account human aspects of programming. To thoroughly investigate the impact of negative emotions on the work of programmers, a malicious integrated...
-
Stereoscopy in Graphics APIs for CAVE Applications
PublicationThe paper compares the advantages and disadvantages of a variety of Graphics Application Programming Interfaces (APIs) from the perspective of obtaining stereoscopy in applications written for a CAVE virtual reality environment. A number of problems have been diagnosed and an attempt has been made to solve them using OpenGL, DirectX 11 and 12, Vulkan, as well as the Unity Engine which can internally use DirectX, OpenGL and Vulkan,...
-
The Role of a Software Product Manager in Various Business Environments
PublicationThe aim of the paper is to identify the role of the software product manager depending on the size of the company and the characteristics of the product they are working on. This has been achieved in cooperation with 15 experts from the IT industry. The companies were divided into 4 levels of size: micro-enterprises, small businesses, medium businesses and large enterprises. The characteristics of the products were divided into...
-
Problems and Solutions of Software Design in Scrum Projects
PublicationThe aim of the paper is to identify the problems and solutions of the software design in Scrum project as well as to analyze the effectiveness of the solutions. Through a series of workshops with 4 experts from IT industry and academia we have identified 52 problems and 99 unique solutions. In this paper we present a list of 10 common problems and 5 solutions for each problem selected by the number of sources. The effectiveness...
-
Benchmarking overlapping communication and computations with multiple streams for modern GPUs
PublicationThe paper presents benchmarking a multi-stream application processing a set of input data arrays. Tests have been performed and execution times measured for various numbers of streams and various compute intensities measured as the ratio of kernel compute time and data transfer time. As such, the application and benchmarking is representative of frequently used operations such as vector weighted sum, matrix multiplication etc....
-
Top k Recommendations using Contextual Conditional Preferences Model
PublicationRecommender systems are software tools and techniques which aim at suggesting to users items they might be interested in. Context-aware recommender systems are a particular category of recommender systems which exploit contextual information to provide more adequate recommendations. However, recommendation engines still suffer from the cold-start problem, namely where not enough information about users and their ratings is available....
-
Utilizing online collaborative games to facilitate Agile Software Development
PublicationEffective collaboration and interaction among the development team and between the team and the customer as well as proactive attitude in initiating and implementing improvements play vital roles in the success of agile projects. The challenge is how to address these social aspects since neither the Agile Manifesto nor the Scrum Guide specify techniques that aid the human side of software development. To fill this gap, we developed...
-
Infografika - aktywizujące środowisko edukacyjne
PublicationArtykuł analizuje szerokie spektrum zagadnień związanych z infografikami. Opisuje sposoby ich tworzenia w celu efektywnej wizualizacji informacji, danych i wiedzy oraz publikowania ich w portalach LCMS dla osiągnięcia celów pedagogicznych. Zwraca uwagę na znaczenie, jakie mają w stymulowaniu studentów do aktywnego i kreatywnego uczestniczenia w procesie uczenia się. Podkreśla także ich ogromną rolę w innowacyjnej edukacji, w szczególności...
-
Aspekty Edukacyjne Wirtualnych Światów. Aplikacja Second Life
PublicationArtykuł koncentruje się na trójwymiarowych środowiskach wirtualnych i ich funkcjonalności edukacyjnej na przykładzie świata Second Life. Wbrew opiniom pojawiającym się od czasu do czasu w literaturze przedmiotu światy wirtualne 3D nie odchodzą w przeszłość, przynajmniej nie w sektorze edukacyjnym. Autorzy artykułu próbują to wykazać,przedstawiając różne aspekty Second Life w zastosowaniach dydaktycznych, naukowych,...
-
Do online reviews reveal mobile application usability and user experience? The case of WhatsApp
PublicationThe variety of hardware devices and the diversity of their users imposes new requirements and expectations on designers and developers of mobile applications (apps). While the Internet has enabled new forms of communication platform, online stores provide the ability to review apps. These informal online app reviews have become a viral form of electronic wordof-mouth (eWOM), covering a plethora of issues. In our study, we set ourselves...
-
On the Agile Mindset of an Effective Team – An Industrial Opinion Survey
PublicationIn this paper we present the results of an opinion survey among 52 agile practitioners who evaluated the importance of 26 selected elements of the agile mindset to the effectiveness of an agile team. In total, we have identified 70 unique agile mindset elements based on 11 literature sources and 5 interviews with industry experts. 7 elements belonged to the “support for business goals” category, 20 to the “relationships within...
-
Preliminary Citation and Topic Analysis of International Conference on Agile Software Development Papers (2002-2018)
PublicationThis study utilizes citation analysis and automated topic analysis of papers published in International Conference on Agile Software Development (XP) from 2002 to 2018. We collected data from Scopus database, finding 789 XP papers. We performed topic and trend analysis with R/RStudio utilizing the text mining approach, and used MS Excel for the quantitative analysis of the data. The results show that the first five years of XP...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublicationThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Applications for investigating therapy progress of autistic children
PublicationThe paper regards supporting behavioral therapy of autistic children with mobile applications, specifically applied for measuring the child’s progress. A family of five applications is presented, that was developed as an investigation tool within the project aimed at automation of therapy progress monitoring. The applications were already tested with children with autism spectrum disorder. Hereby we analyse children’ experience...
-
Towards solving heterogeneous fleet vehicle routing problem with time windows and additional constraints: real use case study
PublicationIn advanced logistic systems, there is a need for a comprehensive optimization of the transport of goods, which would reduce costs. During past decades, several theoretical and practical approaches to solve vehicle routing problems (VRP) were proposed. The problem of optimal fleet management is often transformed to discrete optimization problem that relies on determining the most economical transport routes for a number of vehicles...
-
A Parallel MPI I/O Solution Supported by Byte-addressable Non-volatile RAM Distributed Cache
PublicationWhile many scientific, large-scale applications are data-intensive, fast and efficient I/O operations have become of key importance for HPC environments. We propose an MPI I/O extension based on in-system distributed cache with data located in Non-volatile Random Access Memory (NVRAM) available in each cluster node. The presented architecture makes effective use of NVRAM properties such as persistence and byte-level access behind...
-
Game with a Purpose for Mappings Verification
PublicationMappings verification is a laborious task. The paper presents a Game with a Purpose based system for verification of automatically generated mappings. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the gameplay, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation and gathering...
-
Virtual Sightseeing in Immersive 3D Visualization Lab
PublicationThe paper describes the modern Immersive 3D Visualization Lab (I3DVL) established at the Faculty of Electronics, Telecommunications and Informatics of the Gdańsk University of Technology (GUT) and its potential to prepare virtual tours and architectural visualizations on the example of the application allowing a virtual walk through the Coal Market in Gdańsk. The paper presents devices of this laboratory (CAVE, walk simulator etc.),...
-
Talents, Competencies and Techniques of Business Analyst: A Balanced Professional Development Program
PublicationThis paper presents preliminary results of action research in which we search for fundamentals of an universal theory of balanced approaches to software process. It is developed on the basis of balanced approach for professional development program for business analysts which integrates approaches oriented on talents, competencies and techniques. This paper includes the description of key concepts in background approaches, components...
-
Completeness and Consistency of the System Requirement Specification
PublicationAlthough the System Requirement Specification, as a first formal and detailed document, is the base for the software project in classic software methodologies, there is a noticeable problem of assuring the completeness of this document. The lack of its completeness causes uncertainty of the project foundations. This was one of motivations for agile methodologies – if the SRS cannot be easily validated, if it can change in late project...
-
Towards detecting programmers’ stress on the basis of keystroke dynamics
PublicationThe article describes the idea of detecting stress among programmers on the basis of keystroke dynamics. An experiment with a group of students of artificial intelligence classes was performed. Two samples of keystroke data were recorded for each case, the first while programming without stress, the second under time pressure. A number of timing and frequency parameters were calculated for each sample. Then statistical analysis...
-
DFT-based prediction of reactivity of short-chain alcohol dehydrogenase
Publication -
Stationarity-Based Approach for the Selection of Lag Length in Cointegration Analysis Used for Structural Damage Detection
Publication -
Hybrid Obfuscation Technique for Reverse Engineering Problems
Publication -
Metoda chromatyczna i jej zastosowania techniczne
PublicationArtykuł ma charakter przeglądowy. Przedstawiono w nim najważniejsze modele koloryzowania grafów i ich zastosowania w wybranych problemach technicznych. Ponieważ jest to wiodąca tematyka badawcza Katedry Podstaw Informatyki Wydziału ETI Politechniki Gdańskiej, praca służy również upowszechnianiu dorobku naukowego pracowników Katedry oraz osób z nią współpracujących w opisywanej dziedzinie.
-
"Computing with words" concept applied to musical information retrieval
PublicationW artykule zaproponowano wykorzystanie koncepcji "przetwarzania słów języka naturalnego" do znalezienia związku pomiędzy wybranymi parametrami dźwięków muzycznych a subiektywnie postrzeganą barwą. W pierwszej kolejności przedstawiono klasyczne metody mapowania parametrów mierzalnych i ich subiektywnych odpowiedników, następnie zbudowano bazę wiedzy w oparciu o wyniki testów subiektywnych. W procesie obróbki wykorzystano metodę...
-
Vector Field Editing and Periodic Orbit Extraction Using Morse Decomposition
Publication -
Influence of energy absorbers on Malgaigne fracture mechanism in lumbar-pelvic system under vertical impact load
Publication -
Using Statistical Methods to Estimate The Worst Case Response Time of Network Software Running on Indeterministic Hardware Platforms
PublicationIn this paper we investigate whether the statistical Worst Case Execution Time (WCET) estimation methods devised for embedded platforms can be successfully applied to find the Worst Case Response Time (WCRT) of a network application running on a complex hardware platform such as a contemporary commercial off-the-shelf (COTS) system. Establishing easy-to-use timing validation techniques is crucial for real-time applications and...
-
Mechanical properties of mosquito nets in the context of hernia repair
PublicationThe paper deals with issue of applying mosquito nets as implants in hernia repair, which have already been used in resource-poor developing countries. Uniaxial tensile tests have been conducted on polyester mosquito meshes in two orthogonal directions. Non-linear elastic constitutive laws parameters have been identified to be applied in dense net material models. Mechanical performance of tested mosquito nets has been compared...
-
Information Logistics as a Paradigm
PublicationThis paper presents a paradigm-based approach to information logistics. The approach deals with extracting concepts specific to information logistics in categories typical to paradigms. The resulting description should be easily connected to complementary components which are based on other paradigms, e.g. business process management and information systems development. Empirical part aims at checking and enhancing features typical...
-
Chained machine learning model for predicting load capacity and ductility of steel fiber–reinforced concrete beams
PublicationOne of the main issues associated with steel fiber–reinforced concrete (SFRC) beams is the ability to anticipate their flexural response. With a comprehensive grid search, several stacked models (i.e., chained, parallel) consisting of various machine learning (ML) algorithms and artificial neural networks (ANNs) were developed to predict the flexural response of SFRC beams. The flexural performance of SFRC beams under bending was...
-
A selectively reduced degree basis for efficient mixed nonlinear isogeometric beam formulations with extensible directors
PublicationThe effect of higher order continuity in the solution field by using NURBS basis function in isogeometric analysis (IGA) is investigated for an efficient mixed finite element formulation for elastostatic beams. It is based on the Hu–Washizu variational principle considering geometrical and material nonlinearities. Here we present a reduced degree of basis functions for the additional fields of the stress resultants and strains...
-
Active Kriging-based conjugate first-order reliability method for highly efficient structural reliability analysis using resample strategy
PublicationEfficient structural reliability analysis method is crucial to solving reliability analysis of complex structural problems. High-computational cost and low-failure probability problems greatly limit the efficiency in structural reliability analysis problems, causing the safety and reliability of the structure to be questioned. In this work, a highly efficient structural reliability analysis method coupling active Kriging algorithm...
-
A simple and efficient hybrid discretization approach to alleviate membrane locking in isogeometric thin shells
PublicationThis work presents a new hybrid discretization approach to alleviate membrane locking in isogeometric finite element formulations for Kirchhoff–Love shells. The approach is simple, and requires no additional dofs and no static condensation. It does not increase the bandwidth of the tangent matrix and is effective for both linear and nonlinear problems. It combines isogeometric surface discretizations with classical Lagrange-based...
-
Application of elasto-viscoplastic Bodner-Partom constitutive equations in finite element analysis
PublicationW artykule omówiono szczegółowo zastosowanie sprężysto-lepkoplastycznego prawa Bodnera-Partoma w analizie MES. Przedstawiono opis podstawowych równań modelu wraz z kodem procedury UVSCPL wykorzystanej w analizie numerycznej MES.
-
Modeling two phase flow in large scale fractured porous media with an extended multiple interacting continua method
PublicationWe present a two phase flow conceptual model, the corresponding simulator (2pMINC) and a workflow for large-scale fractured reservoirs, based on a continuum fracture approach which uses the multiple interacting continua (MINC) method complemented with an improved upscaling technique. The complex transient behavior of the flow processes in fractured porous media is captured by subgridding the coarse blocks in nested volume elements...
-
A new open-source software developed for numerical simulations usingdiscrete modeling methods
PublicationThe purpose of this work is to present the development of an open-source software based on a discrete description of matter applied to study the behavior of geomaterials. This software uses Object Oriented Programming techniques, and its methodology design uses three different methods, which are the Discrete Element Method (DEM) [F. Donzé, S.A. Magnier, Formulation of a three-dimensional numerical model of brittle behavior, Geophys....
-
Evaluation of Chemotherapeutic Activity of the Selected Bases’ Analogues of Nucleic Acids Supported by ab initio Various Quantum Chemical Calculations
Publication -
Web-Based Integrated Timetable Information System for Railways and Airlines
Publication -
Simulating malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...