Search results for: human computer iteraction - Bridge of Knowledge

Search

Search results for: human computer iteraction

Search results for: human computer iteraction

  • Michał Wróbel dr inż.

    Michał Wróbel, Assistant Professor of Gdańsk University of Technology, computer scientist, a specialist in software engineering. I graduated from the Faculty of Electronics Technical University of Gdansk in 2002 with a degree in Computer Science, with specialization in Software Engineering and Databases. Until 2006 I worked as system administrator in several companies, including CI TASK. Since 2006 I have been working at the Faculty...

  • Urządzenia Peryferyjne - 22/23

    e-Learning Courses
    • M. Wróbel
    • T. Chludziński

    UP/PD 2023 {mlang pl}Przedmiot Urządzenia Peryferyjne i jego angielska wersja Peripheral Devices przeznaczony jest dla studentów II stopnia na specjalności Komputerowe Systemy Elektroniczne (Computer Electronic Systems). Tematem przedmiotu są różnorodne zagadnienia dotyczące urządzeń peryferyjnych systemów komputerowych, głównie umożliwiających komunikację człowiek-komputer, oraz ich prototypowanie i podstawowe podzespoły.{mlang} {mlang...

  • Urządzenia Peryferyjne 2023/24

    e-Learning Courses
    • M. Wróbel

    UP/PD 2023 {mlang pl}Przedmiot Urządzenia Peryferyjne i jego angielska wersja Peripheral Devices przeznaczony jest dla studentów II stopnia na specjalności Komputerowe Systemy Elektroniczne (Computer Electronic Systems). Tematem przedmiotu są różnorodne zagadnienia dotyczące urządzeń peryferyjnych systemów komputerowych, głównie umożliwiających komunikację człowiek-komputer, oraz ich prototypowanie i podstawowe podzespoły.{mlang} {mlang...

  • Urządzenia Peryferyjne 2024/25

    e-Learning Courses
    • M. Wróbel

    UP/PD 2023 {mlang pl}Przedmiot Urządzenia Peryferyjne i jego angielska wersja Peripheral Devices przeznaczony jest dla studentów II stopnia na specjalności Komputerowe Systemy Elektroniczne (Computer Electronic Systems). Tematem przedmiotu są różnorodne zagadnienia dotyczące urządzeń peryferyjnych systemów komputerowych, głównie umożliwiających komunikację człowiek-komputer, oraz ich prototypowanie i podstawowe podzespoły.{mlang} {mlang...

  • Andrzej Klimczuk

    People

    Andrzej Klimczuk, PhD, a sociologist and public policy expert, assistant professor in the Department of Social Policy of the Collegium of Socio-Economics at the SGH Warsaw School of Economics, Poland. Editor and correspondent of publications about computer and video games in the years 2002-2009. In 2011-2013, Vice President of the Foundation's Laboratory Research and Social Action "SocLab." External expert of institutions such...

  • Dariusz Dąbrowski dr hab. inż.

    Dariusz Dąbrowski graduated from the Faculty of Shipbuilding at Gdańsk University of Technology and in 1987 began working at the university as an assistant in the Department of Shipbuilding Industry Organization within the then Institute of Organization and Design of Production Systems. In 1990, he went on a TEMPUS scholarship from the EU and spent 14 months at the University of Sheffield, where he participated in the Master of...

  • Zastosowanie elektronicznych zmysłów w analizie żywności. Zastosowanie elektronicznego języka w analizie żywności.

    W dzisiejszych czasach konsumenci zwracają dużą uwagę na takie cechy żywności jak: zapach, smak i wygląd. Ze względu na to naukowcy od wielu lat podejmują próby naśladowania ludzkich narządów zmysłów za pomocą urządzeń określanych jako elektroniczne zmysły. Zaliczamy do nich elektroniczny nos i język oraz komputerowy system rozróżnienia barw i kształtów. Elektroniczny język znany również jako sztuczny język lub czujnik smaku,...

  • Koncepcja analizy stanów emocjonalnych użytkowników w kontekście systemów zabezpieczeń transportowych

    Autorzy, przywołując własne i światowe badania nad rozpoznawaniem emocji ludzkich z obrazu twarzy, wskazują na możliwość zastosowania algorytmów komputerowych i ich implementacji w komputerach osobistych (i innych urządzeniach personalnych wyposażonych w dostatecznie silny procesor obliczeniowy). Zastosowanie takiego rozwiązania może poprawić bezpieczeństwo użytkowania urządzeń, maszyn i pojazdów, których operatorzy muszą gwarantować...

    Full text available to download

  • Wiktoria Wojnicz dr hab. inż.

    DSc in Mechanics (in the field of Biomechanics)  - Lodz Univeristy of Technology, 2019 PhD in Mechanics (in the field of Biomechanics)  - Lodz Univeristy of Technology, 2009 (with distinction)   List of papers (2009 - ) Wojnicz W., Wittbrodt E., Analysis of muscles' behaviour. Part I. The computational model of muscle. Acta of Bioengineering and Biomechanics, Vol. 11, No.4, 2009, p. 15-21 Wojnicz W., Wittbrodt E., Analysis of...

  • Człowiek zanurzony w rzeczywistości wirtualnej na przykładzie Laboratorium Zanurzonej Wizualizacji Przestrzennej

    Publication

    - Year 2015

    Artykuł opisuje Laboratorium Zanurzonej Wizualizacji Przestrzennej (LZWP), które umożliwia swobodną podróż w czasie i przestrzeni. Jego podstawowym wyposażeniem jest jaskinia rzeczywistości wirtualnej, czyli pomieszczenie o ścianach, suficie i podłodze stanowiących ekrany projekcyjne, wyświetlające generowane komputerowo obrazy 3D, tworzące spójny widok jednej sceny. Człowiek znajdujący się w takiej jaskini jest zatem zanurzony...

    Full text to download in external service

  • AUTOMATYCZNA KLASYFIKACJA MOWY PATOLOGICZNEJ

    Publication

    Aplikacja przedstawiona w niniejszym rozdziale służy do automatycznego wykrywania mowy patologicznej na podstawie bazy nagrań. W pierwszej kolejności przedstawiono założenia leżące u podstaw przeprowadzonych badan wraz z wyborem bazy mowy patologicznej. Zaprezentowano również zastosowane algorytmy oraz cechy sygnału mowy, które pozwalają odróżnić mowę niezaburzoną od mowy patologicznej. Wytrenowane sieci neuronowe zostały następnie...

    Full text to download in external service

  • Cost assessment of computer security activities

    Publication

    Comprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...

    Full text to download in external service

  • Robotics for human health and performance 03.2022

    e-Learning Courses
    • W. Sieklicki

    This course is to provide knowledge in area of biomechanics, necessary to design instrumentation for human health and performance, and automatics necessary to design simple instrumentation as well as about human-robot interface.

  • Robotics for human health and performance (PG_00054982) 04.2024

    e-Learning Courses
    • W. Sieklicki

    During this course students will be provided with the knowledge in areas of robotics and biomechanics necessary to design instrumentation for human health and performance, as well as about human-robot interface.

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Controlling computer by lip gestures employing neural network

    Publication

    - Year 2010

    Results of experiments regarding lip gesture recognition with an artificial neural network are discussed. The neural network module forms the core element of a multimodal human-computer interface called LipMouse. This solution allows a user to work on a computer using lip movements and gestures. A user face is detected in a video stream from a standard web camera using a cascade of boosted classifiers working with Haar-like features....

    Full text to download in external service

  • Gesture-based computer control system

    In the paper a system for controlling computer applications by hand gestures is presented. First, selected methods used for gesture recognition are described. The system hardware and a way of controlling a computer by gestures are described. The architecture of the software along with hand gesture recognition methods and algorithms used are presented. Examples of basic and complex gestures recognized by the system are given.

    Full text to download in external service

  • Józef Woźniak prof. dr hab. inż.

    People

    Professor Józef Woźniak received his M.Sc., Ph.D. and D.Sc. degrees in electronics and telecommunications from the Faculty of Electronics, Gdańsk University of Technology (GUT), Poland, in 1971, 1976 and 1991, respectively. In January 2002 he became a full professor. In 1993 he was elected Associate Dean of the Faculty of Electronics and in 1994 he was he was appointed a Professor at GUT. Simultaneously, from October 1994 till...

  • Computer -Aided Local Energy Planning Using ALEP-PL Software

    The issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...

  • Computer Networks-laboratories - 2023

    e-Learning Courses
    • M. Hoeft
    • T. Gierszewski
    • I. Szczypior
    • J. Grochowski
    • J. Rak
    • W. Gumiński
    • K. Jurczenia
    • K. Gierłowski
    • K. Nowicki

    Acquiring the skills to design, build and configure computer networks. Demonstration of skills to identify and analyze selected protocols and mechanisms of LAN and WAN networks.

  • Computer Networks laboratories 2024

    e-Learning Courses
    • M. Hoeft
    • T. Gierszewski
    • I. Szczypior
    • J. Grochowski
    • J. Rak
    • W. Gumiński
    • K. Jurczenia
    • K. Gierłowski
    • K. Nowicki

    Acquiring the skills to design, build and configure computer networks. Demonstration of skills to identify and analyze selected protocols and mechanisms of LAN and WAN networks.

  • Human Feedback and Knowledge Discovery: Towards Cognitive Systems Optimization

    Publication

    - Procedia Computer Science - Year 2020

    Current computer vision systems, especially those using machine learning techniques are data-hungry and frequently only perform well when dealing with patterns they have seen before. As an alternative, cognitive systems have become a focus of attention for applications that involve complex visual scenes, and in which conditions may vary. In theory, cognitive applications uses current machine learning algorithms, such as deep learning,...

    Full text available to download

  • Modeling of Human Tissue for Medical Purposes

    The paper describes the possibilities offered for medicine by modeling of human tissue using virtual and augmented reality. It also presents three proposals of breast modeling for the use in clinical practice. These proposals are the result of arrangements of medical and computer scientists team (the authors) and will be pursued and implemented in the near future. There is included also a brief description of the most popular methods...

    Full text available to download

  • Computer application for railway track realignment

    Publication

    - Year 2014

    The topic of this article is the issue of railway track realignment. For this purpose, a computer software application was created that supports computations and generates a report needed for regulation of the trajectory of the railway. This program gives the ability to import data from measurement of the railway trajectory and then perform the calculation of the mathematical realignment. The result of this calculation is the basis...

    Full text to download in external service

  • Jacek Rak dr hab. inż.

    Jacek Rak uzyskał stopień doktora habilitowanego nauk technicznych w dyscyplinie telekomunikacji (specjalność: teleinformatyka) w 2016 r., a stopień doktora nauk technicznych w dyscyplinie informatyka w 2009 r. Obecnie jest pracownikiem naukowo-dydaktycznym Katedry Teleinformatyki Wydziału Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej. Jego działalność naukowa koncentruje się w obszarze doboru tras, projektowania...

  • Computer modeling and testing of structural metamaterials

    Publication
    • T. Krolikowski
    • R. Knitter
    • A. Blazejewski

    - Procedia Computer Science - Year 2019

    Full text to download in external service

  • Utilization of fuzzy rules in computer character animation

    Publication

    - Year 2010

    The chapter presents a method for automatic enhancement of computer character animation utilizing fuzzy inference. First the user designs a prototype version of animation, with keyframes only for important poses, roughly describing the action. Then animation is enriched with new motion phases calculated by the fuzzy inference system using descriptors given by the user. Various degrees of motion fluency and naturalness are possible...

    Full text to download in external service

  • Heuristic scheduling algorithms for uniform load of computer system

    Publication

    - Year 2006

    W pracy zaprezentowano opracowany heurystyczny algorytm szeregowania zadań UNILO (ang. UNIform LOad - jednakowe obciążenie), umożliwiający redukcję całkowitego zapotrzebowania na moc obliczeniową systemu komputerowego bez pogarszania jego wydajności. Algorytm ten realizuje takie przydzielenie zadań obliczeniowych do poszczególnych jednostek (procesorów), aby zapewnić ich jednakowe obciążenie. Opracowany algorytm został zweryfikowany...

  • 3D Computer Model of the Hip Joint Cartilage

    This paper presents 3D computer model of the hip joint cartilage in the ANSYS program. Model is made on the basis of anatomy and collected data on the material constants of bone and cartilage components. Analysis and comparison of biochemical model, viscoelastic and molecular mixed - aggregation serves to facilitate the creation of the next model of reality, which could be used in the design of joint prostheses. The correctness...

    Full text to download in external service

  • ASON/GMPLS connection control servers in virtual computer environment

    Publication

    In the paper ASON/GMPLS connection control servers layer in the context of Next Generation Network (NGN) is described. The implementation of ASON/GMPLS connection control servers in virtual computer environment as well as performed measurements are presented. Some aspects of virtual environment installation are depicted. Remarks regarding application of the virtual computer environment to realization of communication between NGN...

  • An Attempt to Develop a Model Selection Algorithm of Computer Simulation during the Design Process of Mechanical Response of Any Mechanical Body

    In the literature, there are algorithms associated with the design of simulations of technological processes, in which the material model has always been defined previously. However, in none of the studies of computer simulation modelling of technological processes known to the authors of this article, is there a detailed description of how the algorithm, or the selection of plastic model used, is subject to this process. This...

    Full text to download in external service

  • Harmonics produced by traction substations – computer modelling and experimental verification

    Voltage and current harmonics have a detrimental effect on the components of a power system. Current harmonics may result in the overload and damage to power transformers. Voltage harmonics may result in, for example, damage to capacitor banks used to compensate reactive power. Devices which contribute to both current and voltage distortion include traction rectifiers. This paper presents results of the computer investigation of...

    Full text available to download

  • Modelling the malware propagation in mobile computer devices

    Publication

    - COMPUTERS & SECURITY - Year 2018

    Nowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...

    Full text to download in external service

  • Computer Controlled Systems Lab - 2023/2024

    e-Learning Courses
    • P. Raczyński

    Computer Controlled Systems Lab The course includes 5 individual projects and their laboratory implementation. The topics:- Job analysis and tuning digital servo- Usage of a PC computer and MatLab package for controlling the dynamic object as a model of the tethered helicopter- Use of C language and the PC to control the plant in real time- Use of assembly language, and a microcontroller to control the plant in real time- Use...

  • Computer Controlled Systems Lab - Nowy - Nowy

    e-Learning Courses
    • P. Raczyński
    • M. Niedźwiecki

    Computer Controlled Systems Lab The course includes 5 individual projects and their laboratory implementation. The topics:- Job analysis and tuning digital servo- Usage of a PC computer and MatLab package for controlling the dynamic object as a model of the tethered helicopter- Use of C language and the PC to control the plant in real time- Use of assembly language, and a microcontroller to control the plant in real time- Use...

  • Generalized access control in hierarchical computer network

    The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...

    Full text available to download

  • Nanotechnology and human environment

    e-Learning Courses
    • M. Chmielewski

  • Advances in Human Genetics

    e-Learning Courses
    • A. Stanisławska-Sachadyn

  • Social media and efficient computer infrastructure in smart city

    Publication

    - Year 2018

    Social media require an efficient infrastructures of computer and communication systems to support a smart city. In a big city, there are several crucial dilemmas with a home and public space planning, a growing population, a global warming, carbon emissions, a lack of key resources like water and energy, and a traffic congestion. In a smart city, we expect an efficient and sustainable transportation, efficient management of resources...

    Full text to download in external service

  • Computer controlled systems - 2022/2023

    e-Learning Courses
    • P. Raczyński

    materiały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution...

  • Adaptive acoustic crosstalk cancellation in mobile computer device

    The cancellation of acoustic crosstalk is employed to enhance the stereo image in mobile listening conditions. A practical setup employing a mobile computer is employed. The adaptation of the crosstalk cancellation filter to the position of the listener's head is featured. The measurement evaluating the possibility of practical application of the method are described. The head and torso simulator was used for measurements. The...

    Full text to download in external service

  • Human hair as a biomarker of human exposure to persistent organic pollutants (POPs)

    The main aim of this article is to investigate the possibility of using human hair as a biomarker with particular emphasis on persistent organic pollutants (POPs). We report previous results of studies of this topic. We critically review the available information on analytical procedures applied during analysis of human hair. Finally, we discuss future trends and possibilities arising from hair analysis.

    Full text to download in external service

  • Gesture-based computer control system applied to the interactive whiteboard

    Publication

    - Year 2010

    In the paper the gesture-based computer control system coupled with the dedicated touchless interactive whiteboard is presented. The system engineered enables a user to control any top-most computer application by using one or both hands gestures. First, a review of gesture recognition applications with a focus on methods and algorithms applied is given. Hardware and software solution of the system consisting of a PC, camera, multimedia...

    Full text to download in external service

  • Gesture-based computer control system applied to the interactive whiteboard

    In the paper the gesture-based computer control system coupled with the dedicated touchless interactive whiteboard is presented. The system engineered enables a user to control any top-most computer application by using one or both hands gestures. First, a review of gesture recognition applications with a focus on methods and algorithms applied is given. Hardware and software solution of the system consisting of a PC, camera, multimedia...

  • Blended Learning Model for Computer Techniques for Students of Architecture

    Abstract: The article summarizes two-year experience of implementing hybrid formula for teaching Computer Techniques at the Faculty of Architecture at the Gdansk University of Technology. Original educational e-materials, consisting of video clips, text and graphics instructions, as well as links to online resources are embedded in the university e-learning educational platform. The author discusses technical constraints associated...

    Full text available to download

  • An electrochemical biosensor for the determination of hormone Human Chorionic Gonadotropin (hCG) in human serum

    Publication
    • A. Koterwa
    • M. Bojko
    • J. Ryl
    • K. Łukaszuk
    • K. Kozłowska
    • W. Sieklicki
    • S. Rodziewicz-Motowidło
    • P. Niedzialkowski

    - ELECTROANALYSIS - Year 2023

    This work describes the modification of a gold electrode to create an electrochemical biosensor capable of detecting human chorionic gonadotropin (hCG). The biosensor was obtained by modifying the gold electrode with cysteamine and oligopeptide (PPLRINRHILTR). The modification steps of the gold electrode were confirmed by cyclic voltammetry (CV) and impedance electrochemical spectroscopy (EIS) measurements. The conducted EIS experiments...

    Full text available to download

  • Essentials of computer science for Bachelor in Management students

    e-Learning Courses
    • J. Durkiewicz

    Various resources accompanying "Essentials of computer science" classes for Bachelor in Management 1st year students.

  • Computer Support of Analysis of Optical Spectra Measurements

    Publication

    The verification of measurement errors has a big impact on the assessment of the accuracy of conducted measurements and obtained results. In many cases, computer simulation results are compared with measurement results in order to evaluate measurement errors. The purpose of our research was to check the accuracy of measurements made with a Fabry–Perot interferometer working in the transmission mode. In the measurement setup, a...

    Full text available to download

  • Computer support of analysis optical spectra measurements

    Publication

    Verification of measurement errors has a big impact on assessment of accuracy of conducted measurements and obtained results. In many cases computer simulation results are compared with measurement results in order to evaluate measurement errors. The purpose of our research was to check the accuracy of measurements made with Fabry-Perot interferometer working in the transmission mode. In measurement setup, a 1310 nm superluminescent...

    Full text available to download

  • Higher harmonics produced by traction substations – computer modelling and experimental verification

    Voltage and current harmonics have a detrimental effect on the components of a power system. Current harmonics may result in the overload and damage to power transformers, although the rms value of load current does not exceed their current-carrying capacity. Voltage harmonics may result in, for example, damage to capacitor banks used to compensate reactive power. Devices which contribute to both current and voltage distortion...

    Full text to download in external service