Search results for: library user training - Bridge of Knowledge

Search

Search results for: library user training

Search results for: library user training

  • LDRAW based renders of LEGO bricks moving on a conveyor belt

    Open Research Data
    open access
    • T. Boiński
    • K. Zawora
    • S. Zaraziński
    • B. Śledź
    • B. Łobacz
    - series: LEGO

    The set contains renders of 5237 LEGO bricks moving on a white conveyor belt. The images were prepared for training neural network for recognition of LEGO bricks. For each brick starting position, alignment and color was selected (simulating the brick falling down on the conveyour belt) and than 10 images was created while the brick was moved across...

  • Evolution of End-User Participation in IT Projects.

    Publication

    - Year 2013

    This chapter is aimed at presenting a review of evolutionary design paradigms which determine the end-user’s role in IT (Information Technology) projects across recent decades. This review covers different perspectives starting from technology-oriented sequential software development lifecycles, through user-centred approaches, ending finally in contemporary service design approaches supported by e-business and social media. Finally,...

  • User-generated images and its impact on consumer-based brand equity and on purchase intention

    Publication

    - Logistyka - Year 2015

    Researchers and brand managers have limited knowledge of the effects that different types of user-generated content (UGC) have on consumers’ perception of brands and behavior. In this study we investigated 301 authors of a specific category of UGC, i.e., user-generated images (UGI) on a social networking site to confirm the relationships of four drivers reported in literature (co-creation, empowerment, community, and self-concept)...

    Full text available to download

  • Mohsan Ali Master of Science in Computer Science

    People

    Mohsan Ali is a researcher at the University of the Aegean. He won the Marie-Curie Scholarship in 2021 in the field of open data ecosystem (ODECO) to pursue his PhD degree at the University of the Aegean. Currently, he is working on the technical interoperability of open data in the information systems laboratory; this position is funded by ODECO. His areas of expertise are open data, open data interoperability, data science, natural...

  • [soft skills] Scientific databases and information skills

    e-Learning Courses
    • R. Jankowski
    • A. Klej
    • M. Szuflita-Żurawska

    {mlang pl} Dyscyplina: wszystkie dyscypliny Zajęcia obowiązkowe dla doktorantów I roku Prowadzący:  Magdalena Szuflita-Żurawska, Biblioteka PG Liczba godzin: 5 Forma zajęć: wykład {mlang} {mlang en} Discipline: all disciplines Obligatory course for 1st-year PhD students Academic teacher: Magdalena Szuflita-Żurawska, GUT Library Total hours of training: 5 teaching hours Course type: lecture {mlang} Soft skills Area...

  • User Trust Levels and Their Impact on System Security and Usability

    A multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.

    Full text available to download

  • Clustering Context Items into User Trust Levels

    An innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....

    Full text available to download

  • Health and safety training for students

    e-Learning Courses
    • I. Ziemba-Filip
    • M. Orepuk-Templin
    • M. Sokołowski

    Health and safety training is aimed at all newcoming students of Gdańsk University of Technology.

  • User interface prototyping. Techniques, methods and tools

    Currently, for interactive applications their usability and ergonomics of the user interface (UI) are critical factors for achieving users' acceptance.

    Full text available to download

  • Center for Scientific and Technical Information - Library Services for Business and Science at Wroclaw University of Technology

    Publication

    - Year 2014

    Wroclaw University of Technology is situated in Lower Silesia – the dynamically developing region of Poland. Focusing on adopting its own offer to the market needs had been selected as a strategy. Due to that, a synergy effect has been achieved with the development of segments strategic for the region. The University is strongly oriented to cooperation with the economy and industry. One of the key initiatives was establishment...

    Full text available to download

  • LDRAW based renders of LEGO bricks moving on a conveyor belt with extracted models

    Open Research Data
    version 3.0 open access - series: LEGO

    The set contains renders of LEGO bricks moving on a white conveyor belt. The images were prepared for training neural network for recognition of LEGO bricks. For each brick starting position, alignment and color was selected (simulating the brick falling down on the conveyour belt) and than 10 images was created while the brick was moved across the...

  • eNauczanie PG - introductory training for students

    e-Learning Courses
    • N. K. Gietka
    • J. Mytnik
    • A. M. Dąbrowicz-Tlałka
    • O. Ludyga

    The eNauczanie platform, an introductory training for foreign students.

  • From the Concept to Results: A Case Study on the Collection Development for the ODC–Opening Day Collection at Qatar National Library

    Publication

    - Year 2016

    "A library collection should fit the mission for which it is created. The number of books it holds does not determine its worth." (E. J. Loveland, 2000) If so, how do we create a national library, and how do we build its collection from scratch without making many mistakes? Since 2012, when the plans for the new national library were announced, Qatar National Library (QNL) envisioned as carrying out its mission to "spread knowledge,...

    Full text available to download

  • Text Categorization Improvement via User Interaction

    Publication

    - Year 2018

    In this paper, we propose an approach to improvement of text categorization using interaction with the user. The quality of categorization has been defined in terms of a distribution of objects related to the classes and projected on the self-organizing maps. For the experiments, we use the articles and categories from the subset of Simple Wikipedia. We test three different approaches for text representation. As a baseline we use...

    Full text to download in external service

  • Koala graph coloring library: an open graph coloring library for real-world applications

    Publication

    Pomimo intensywnej pracy naukowej na polu kolorowania grafów, nie jest znana kompletna i dedykowana biblioteka programistyczna. Celem artykułu jest zaproponowanie architektury takiej biblioteki. Celem jest spełnienie oczekiwań wypływających z rzeczywistych zastosowań, w szczególności spełnienie potrzeb wydajnościowych. Zaimplementowano szereg algorytmów cheurystycznego kolorowania grafów. Przyjętym językiem programowania jest C++....

    Full text to download in external service

  • Automated Reasoning Based User Interface

    Publication

    - EXPERT SYSTEMS WITH APPLICATIONS - Year 2017

    Motivation: The ability to directly trace how requirements are implemented in a software system is crucial in domains that require a high level of trust (e.g. medicine, law, crisis management). This paper describes an approach that allows a high level of traceability to be achieved with model-driven engineering supported by automated reasoning. The paper gives an introduction to the novel, automated user interface synthesis in...

    Full text to download in external service

  • Context-aware User Modelling and Generation of Recommendations in Recommender Systems

    Publication

    - Year 2018

    Recommender systems are software tools and techniques which aim at suggesting new items that may be of interest to a user. This dissertation is focused on four problems in recommender systems domain. The first one is context-awareness, i.e. how to obtain relevant contextual information, how to model user preferences in a context and use them to make predictions. The second one is multi-domain recommendation, which aim at suggesting...

    Full text available to download

  • A Special Section on Intelligent User Interfaces in Healthcare (IUIH)

    A concept of interface has evolved from the first appearance in the form of a command line interface to the established use of direct manipulation or WIMP (windows, icons, menus and pointing) interfaces in nearly all applications. Intelligent user interfaces (IUI) form a subfield of Human-Computer Interaction research. Optimal human-computer interactions are defined as ones where users are able to perform complex tasks more quickly...

    Full text to download in external service

  • Visual Attention Distribution Based Assessment of User's Skill in Electronic Medical Record Navigation

    Publication

    Currently, the most precise way of reflecting the skills level is an expert’s subjective assessment. In this paper we investigate the possibility of the use of eye tracking data for scalar quantitative and objective assessment of medical staff competency in EMR system navigation. According to the experiment conducted by Yarbus the observation process of particular features is associated with thinking. Moreover, eye tracking is...

    Full text to download in external service

  • The Crowd as a Source of Knowledge - From User Feedback to Fulfilling Requirements

    Publication

    - Year 2024

    Crowd-based and data-intensive requirements engineering (RE) strategy is an approach for gathering and analyzing information from the general public or the so-called crowd to derive validated user requirements. This study aims to conceptualize the process of analyzing information from a crowd to achieve the fulfillment of user requirements. The created model is based on the ADO framework (Antecedents-Decisions-Outcomes). In the...

    Full text available to download

  • Usability and relational factors in user-perceived quality of online services

    The purpose of this paper is to identify the key determinants of con-sumer-perceived usability of online service websites and their impact on e-loyalty potential, expressed by customer’s willingness to return and to recommend the website to others. In this experimental usability study fifteen video-recorded users performed specific tasks in financial, travel and health online service websites. After completing the tasks users filled...

    Full text available to download

  • AutoCAD: Examination of Factors Influencing User Adoption

    The primary purpose of the research is to examine and validate determinants of user intention to use AutoCAD software, utilising the constructs from prior studies in a more integrated model. The paper proposes a revised Technology Acceptance Model (TAM) for measuring the adoption of AutoCAD. In the study, a latent construct PPA (perceived physical accessibility) was added to the proposed research model as a new determinant of AutoCAD...

    Full text available to download

  • The impact of end-user participation in IT projects on product usability

    Publication

    - Year 2013

    Many companies implementing new IT projects encounter numerous problems with ensuring good final product usability. The strong market competition they experience often results in necessity of undertaking difficult decisions with regard to cost minimization. This may force cuts in usability expertise and consulting, most often by limiting end-user participation in the project. However, it may also result in serious consequences...

    Full text to download in external service

  • Integrating web site services into application through user interface

    The issue of integrating applications which are only accessible through visual user interface is not thoroughly researched. Integration of web applications running remotely and controlled by separate organizations becomes even more complicated, as their user interface can display differently in different browsers or change without prior notification as a result of application maintenance. While possible, it is generally not common...

    Full text to download in external service

  • The Evaluation of Use of Colors in Graphical User-Interfaces in Healthcare

    In this paper, color difference/contrast measures are investigated in reference to results of experiments with the participation of average, color-normal observers and with individuals with deuteranopia. Additionally, a new method for the automatic analysis of color contrast is proposed, which supports designers of graphical user- interfaces in healthcare. The method was verified using the GUI phantom of a vital signs monitor (the...

    Full text to download in external service

  • CIP Security Awareness and Training: Standards and Practice

    Publication

    - Year 2018

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

    Full text available to download

  • CIP Security Awareness and Training: Standards and Practice

    Publication

    - Year 2016

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

  • eNauczanie - introductory training for students - 2020/2021

    e-Learning Courses
    • A. M. Dąbrowicz-Tlałka

    eNauczanie - introductory training for students - 2020/2021

  • A tool for integrating Web Site services over User Interface

    Publication

    - Year 2013

    Companies and organizations are building information systems by integrating previously independent applications, together with new developments. This integration process has to deal with existing applications, which can only be used through their specific interfaces, and often cannot be modified. Integration of web applications running remotely and controlled by separate organizations becomes even more complicated, as their user...

  • SAILING ROUTE PLANNING METHOD CONSIDERING VARIOUS USER CATEGORIES

    Publication

    The article describes the methodology related to determining the multi-criteria routes for sailing ships. Details of sea area discretisation and discretisation of the description of the sailing vessel properties and manoeuvring principles are shown. User requirements were specified (for five different categories of users) and on this basis the criteria for selecting the most suitable shipping route were formulated. The presented...

    Full text available to download

  • Neural network training with limited precision and asymmetric exponent

    Publication

    Along with an extremely increasing number of mobile devices, sensors and other smart utilities, an unprecedented growth of data can be observed in today’s world. In order to address multiple challenges facing the big data domain, machine learning techniques are often leveraged for data analysis, filtering and classification. Wide usage of artificial intelligence with large amounts of data creates growing demand not only for storage...

    Full text available to download

  • Features of a radial user interface to search engines

    The paper is concerned with a new type of user interface to search engines. Instead of presenting search results in a form of a ranked list, the results are presented in radial arrangement. In the center of the interface the most relevant web page is presented. Other web pages are located around the central one. The location of a web page depends on two factors: its relevance to the query and its content. The relevance has influence...

    Full text to download in external service

  • Training of Deep Learning Models Using Synthetic Datasets

    Publication

    - Year 2022

    In order to solve increasingly complex problems, the complexity of Deep Neural Networks also needs to be constantly increased, and therefore training such networks requires more and more data. Unfortunately, obtaining such massive real world training data to optimize neural networks parameters is a challenging and time-consuming task. To solve this problem, we propose an easy-touse and general approach to training deep learning...

    Full text to download in external service

  • Exploration of Creativity Techniques in Software Engineering in Training-Application-Feedback Cycle

    Creativity research has proposed about a hundred and fifty creativity techniques. The question is whether they can be applied in software engineering for creativity training or directing creativity in software projects. This paper aims at answering this question via a quasi-experiment conducted in Training-Application-Feedback cycle in which participants express their opinions about selected creativity techniques after training...

    Full text to download in external service

  • Factors Affecting the Effectiveness of Military Training in Virtual Reality Environment

    Publication
    • M. Gawlik-Kobylińska
    • P. Maciejewski
    • J. Lebiedź
    • A. Wysokińska-Senkus

    - Year 2020

    In this paper, we explored the factors influencing the effectiveness of military trainings performed in a virtual reality environment. The rationale for taking up the topic is the fact that such trainings are often conducted under specific operational procedures. These procedures may create rigorous frameworks for all elements of the learning environment, including the teacher’s performance. Therefore, to ensure the most conducive...

    Full text to download in external service

  • Training Services in Small and Medium-sized Enterprises: Evidence from Poland

    In the knowledge-based economy knowledge and skills are becoming more and more significant for the success of companies. This applies also to firms from small and medium-sized enterprises (SMEs) sector. As large companies in many cases posses special divisions devoted to trainings, they normally have no problems with updating the knowledge and skills of their employees. The situation is different with regard to SMEs, which often...

    Full text to download in external service

  • Limitations of Emotion Recognition in Software User Experience Evaluation Context

    This paper concerns how an affective-behavioural- cognitive approach applies to the evaluation of the software user experience. Although it may seem that affect recognition solutions are accurate in determining the user experience, there are several challenges in practice. This paper aims to explore the limitations of the automatic affect recognition applied in the usability context as well as...

    Full text available to download

  • Resource constrained neural network training

    Publication

    Modern applications of neural-network-based AI solutions tend to move from datacenter backends to low-power edge devices. Environmental, computational, and power constraints are inevitable consequences of such a shift. Limiting the bit count of neural network parameters proved to be a valid technique for speeding up and increasing efficiency of the inference process. Hence, it is understandable that a similar approach is gaining...

    Full text available to download

  • Wideband Off-Body Channel Characteristics with Dynamic User

    Publication

    - Year 2019

    This paper presents the preliminary results of a dynamic off-body channel characterisation study, based on wideband measurements at 5.8 GHz in an indoor environment. The Channel Impulse Response (CIR) was measured for a scenario with the user approaching and departing from the off-body antenna. A CIR deconvolution procedure was performed jointly in two polarisations, and the received signal power, Cross-Polarisation Discrimination...

  • The Library

    Journals

    ISSN: 0024-2160 , eISSN: 1744-8581

  • Ensuring the QoE-Related Fairness to Reduce the User Abandonment Ratio

    Publication

    These days, it is quite a challenge for app owners to keep users engaged with an app. Currently, the level of user abandonment is one of the key parameters that application owners are interested in. To meet these challenges, we are conducting an extended study of a previously proposed solution that significantly reduces the abandonment rate of a given application. The investigated solution is based on the methods of fairness using...

    Full text available to download

  • Usefulness of Keystroke Dynamics Features in User Authentication and Emotion Recognition

    The study presented in the article focuses on keystroke dynamics analysis applied to recognize emotional states and to authenticate users. An overview of some studies and applications in these areas is presented. Then, an experiment is described, i.e. the way of collecting data, extracting features, training classifiers and finding out the most appropriate feature subsets. The results show that it is difficult to indicate a universal...

    Full text to download in external service

  • Identification and molecular modeling of a novel lipase from an Antarctic soil metagenomic library.

    Publication

    - Polish Journal of Microbiology - Year 2009

    In this work, we present the construction of a metagenomic library in Escherichia coli using pUC19 vector and environmental DNA directly isolated from Antarctic topsoil and screened for lipolytic enzymes. The screening on agar supplemented with olive oil and rhodamine B revealed one clone with lipolytic activity (Lip1) out of 11,000 E. coli clones. This clone harbored a plasmid, pLip1, which has an insert of 4722 bp that has been...

    Full text available to download

  • Real and Virtual Instruments in Machine Learning – Training and Comparison of Classification Results

    Publication

    The continuous growth of the computing power of processors, as well as the fact that computational clusters can be created from combined machines, allows for increasing the complexity of algorithms that can be trained. The process, however, requires expanding the basis of the training sets. One of the main obstacles in music classification is the lack of high-quality, real-life recording database for every instrument with a variety...

  • On Explaining Intuitiveness of Software Engineering Techniques with User eXperience Concepts

    Publication

    - Year 2013

    W referacie zawarto próbę wyjaśnienia intuicyjności technik inżynierii oprogramowania za pomocą pojęć zaczerpniętych z obszaru doświadczenia użytkownika. Analizy dotyczą zarówno intuicyjności przy pierwszym zetknięciu się użytkownika z daną techniką, jak i dynamiki transformacji epizodycznych doświadczeń na doświadczenie skumulowane i powiązane z nim postrzeganie intuicyjności. Przedyskutowano potencjalne zastosowania modelu i...

    Full text to download in external service

  • Deep Learning Optimization for Edge Devices: Analysis of Training Quantization Parameters

    Publication

    - Year 2019

    This paper focuses on convolution neural network quantization problem. The quantization has a distinct stage of data conversion from floating-point into integer-point numbers. In general, the process of quantization is associated with the reduction of the matrix dimension via limited precision of the numbers. However, the training and inference stages of deep learning neural network are limited by the space of the memory and a...

    Full text available to download

  • Vehicle detector training with minimal supervision

    Publication

    - Year 2019

    Recently many efficient object detectors based on convolutional neural networks (CNN) have been developed and they achieved impressive performance on many computer vision tasks. However, in order to achieve practical results, CNNs require really large annotated datasets for training. While many such databases are available, many of them can only be used for research purposes. Also some problems exist where such datasets are not...

  • Multi-domain and Context-Aware Recommendations Using Contextual Ontological User Profile

    Publication

    - Year 2022

    Recommender Systems (RS) became popular tools in many Web services like Netflix, Amazon, or YouTube, because they help a~user to avoid an information overload problem. One of the types of RS are Context-Aware RS (CARS) which exploit contextual information to provide more adequate recommendations. Cross-Domain RS (CDRS) were created as a response to the data sparsity problem which occurs when only few users can provide reviews or...

    Full text to download in external service

  • Exploring the Usability and User Experience of Social Media Apps through a Text Mining Approach

    This study aims to evaluate the applicability of a text mining approach for extracting UUX-related issues from a dataset of user comments and not to evaluate the Instagram (IG) app. This study analyses textual data mined from reviews in English written by IG mobile application users. The article’s authors used text mining (based on the LDA algorithm) to identify the main UUX-related topics. Next, they mapped the identified topics...

    Full text available to download

  • Improving css-KNN Classification Performance by Shifts in Training Data

    Publication

    - Year 2015

    This paper presents a new approach to improve the performance of a css-k-NN classifier for categorization of text documents. The css-k-NN classifier (i.e., a threshold-based variation of a standard k-NN classifier we proposed in [1]) is a lazy-learning instance-based classifier. It does not have parameters associated with features and/or classes of objects, that would be optimized during off-line learning. In this paper we propose...