Filters
total: 1352
-
Catalog
displaying 1000 best results Help
Search results for: game users behaviour
-
Which digital games are appropriate for our children?
PublicationChapter contains advice on which digital games are accessible for children with diverse impairments. It providess a process for choosing the device, the game and adjusting it. It might be of use for therapists, techers and caregivers.
-
Dual drive control under SVPWM, experimental results
Open Research DataThe dataset contains the experimental results of the project: A universal algorithm of space vector pulse width modulation for three-level three and multi-phase NPC inverters with DC-link voltage balancing. The analysis includes the behaviour of the drive system, examining the dynamic system response to speed and angle changes, and encompassing data...
-
Context Search Algorithm for Lexical Knowledge Acquisition
PublicationA Context Search algorithm used for lexical knowledge acquisition is presented. Knowledge representation based on psycholinguistic theories of cognitive processes allows for implementation of a computational model of semantic memory in the form of semantic network. A knowledge acquisition using supervised dialog templates have been performed in a word game designed to guess the concept a human user is thinking about. The game,...
-
Minimising the Churn Out of the Service by Using a Fairness Mechanism
PublicationThe paper proposes an algorithm of bandwidth distribution, ensuring fairness to end-users in computer networks. The proposed algorithm divides users into satisfied and unsatisfied users. It provides fairness in terms of quality of experience (QoE) for satisfied users and quality of service (QoS) for unsatisfied users. In this paper, we present detailed comparisons relevant to service providers to show the advantages of the proposed...
-
Karolina Krause-Brykalska dr inż. arch.
PeopleKarolina Krause – Brykalska is employed at the Department of Applied Informatics in Management at the Faculty of Management and Economics, GUT. She graduated from a master's and PhD degree at GUT. Moreover she obtained several postgratuated studies in fields of urban revitalisation, real estate, safety at work and pedagogical studies.Her current scientific interests are located in users safety in buildings – in context of ergonomics...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublicationIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Disruption of the communication process on the example of ALEP-PL web application
PublicationBy creating a dedicated web service, such as the presented ALEP-PL solution, you can not assume that its users have suffcient knowledge of the energy sector. This application is dedicated to the local energy planning. The ALEP-PL makes it easier to incorporate in the planning of key players in the local energy market. This group of ALEP-PL users represents mainly the ocials of energy companies and specialist offcers. In the paper...
-
Dorota Dominika Kamrowska-Załuska dr hab. inż. arch.
PeopleProf. Dorota Kamrowska-Zaluska, architect and urban planner, Associate Professor and Director of mid-career program on Urban development and management of metropolitan areas, at the Department of Urban Design and Regional Planning at Faculty of Architecture, Gdansk University of Technology; Visiting Scholar and Research Fellow at several research institutions incl. Massachusetts Institute of Technology (2013), Charted Urban Planner...
-
The Complexity of Zero-Visibility Cops and Robber
PublicationIn this work we deal with the computational complexity aspects of the zero-visibility Cops and Robber game. We provide an algorithm that computes the zero-visibility copnumber of a tree in linear time and show that the corresponding decision problem is NP-complete even for the class of starlike graphs.
-
Emotion Recognition for Affect Aware Video Games
PublicationIn this paper the idea of affect aware video games is presented. A brief review of automatic multimodal affect recognition of facial expressions and emotions is given. The first result of emotions recognition using depth data as well as prototype affect aware video game are presented
-
K. Grzelec, J. Staszak-Winkler, Changes in urban transport behaviour and preferences of residents in employment - Gdynia case. Transport Development Challenges in the 21st Century. Proceedings of the 2019 TranSopot Conference. Springer International Publishing .1st ed. 2020. ISBN: 978-3-030-50009-2
Publication -
Igor Garnik dr inż.
PeopleIgor Garnik graduated from the Faculty of Electronics at the Gdańsk University of Technology (1992). He works at the Gdańsk University of Technology since 1997 - first employed as an assistant in the Department of Ergonomics and Maintenance of Technical Systems at the Faculty of Management and Economics, and then - after obtaining the degree of doctor in 2006 as an assistant professor. In the years 2009–2015 he was the coordinator...
-
Volunteerism in the last year as a moderator between empathy and altruistic social value orientation: An exploratory study
PublicationVolunteerism is a sustained prosocial activity, and young adults are one of the most important targets for organizations recruiting volunteers. Empathy and altruistic social value orientation measured by a decomposed game are dispositional traits that might foster engagement in volunteerism. Using a self-report online-based questionnaire study on two groups of young adults (aged 18-35, N = 224 non-volunteers and N = 178 volunteers...
-
Badania empiryczne związane z ewolucją języków - wybrane zagadnienia
PublicationAlthough language evolution is an area in science yet to be developed, its foundations lay on empirical research. The aim of this article is to present three categories of ways to get empirical data on language evolution: observing language in laboratory, monitoring animal communication and analysing pidgins and creoles. The part of the paper about language in laboratory bases on English-language articles presenting the experiments...
-
Sleeping with competitors
Publication -
Jerzy Konorski dr hab. inż.
PeopleJerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublicationWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this...
-
Energy-Efficient Self-Supervised Technique to Identify Abnormal User Over 5G Network for E-Commerce
PublicationWithin the realm of e-commerce networks, it is frequently observed that certain users exhibit behavior patterns that differ substantially from the normative behaviors exhibited by the majority of users. The identification of these atypical individuals and the understanding of their behavioral patterns are of significant practical significance in maintaining order on e-commerce platforms. One such method for accomplishing this objective...
-
Wireless LAN with noncooperative anonymous stations: QOS provisioning via war of attrition
PublicationMAC-layer QoS provision necessitates an admission scheme to grant a requested QoS notwithstanding subse-quent requests. For an ad hoc WLAN with anonymous stations, we assume a degree of power awareness to propose a session- rather than frame-level bidding for bandwidth. Next we analyze the underlying Bayesian war of attrition game.
-
Quantifying Contextuality
PublicationContextuality is central to both the foundations of quantum theory and to the novel information processing tasks. Despite some recent proposals, it still faces a fundamental problem: how to quantify its presence? In this work, we provide a universal framework for quantifying contextuality. We conduct two complementary approaches: (i) the bottom-up approach, where we introduce a communication game, which grasps the phenomenon of...
-
Neoplasm, malignant - Female, 76 - Tissue image [5150730018694051]
Open Research DataThis is the histopathological image of OTHER AND UNSPECIFIED PARTS OF BILIARY TRACT tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Neoplasm, malignant - Female, 76 - Tissue image [515073001869661]
Open Research DataThis is the histopathological image of OTHER AND UNSPECIFIED PARTS OF BILIARY TRACT tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Neoplasm, malignant - Female, 76 - Tissue image [5150730018693621]
Open Research DataThis is the histopathological image of OTHER AND UNSPECIFIED PARTS OF BILIARY TRACT tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Neoplasm, malignant - Female, 76 - Tissue image [5150730018695871]
Open Research DataThis is the histopathological image of OTHER AND UNSPECIFIED PARTS OF BILIARY TRACT tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Neoplasm, malignant - Female, 76 - Tissue image [5150730018699791]
Open Research DataThis is the histopathological image of OTHER AND UNSPECIFIED PARTS OF BILIARY TRACT tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Neoplasm, malignant - Female, 76 - Tissue image [5150730018699951]
Open Research DataThis is the histopathological image of OTHER AND UNSPECIFIED PARTS OF BILIARY TRACT tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Neoplasm, malignant - Female, 76 - Tissue image [5150730018694641]
Open Research DataThis is the histopathological image of OTHER AND UNSPECIFIED PARTS OF BILIARY TRACT tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
WYKORZYSTANIE GRYWALIZACJI (GAMIFICATION) W SEKTORZE MSP DO BUDOWANIA RELACJI KLIENT-USŁUGODAWCA PRZY PROJEKTOWANIU USŁUG
PublicationArtykuł przedstawia nowe pojęcie grywalizacji, które wykorzystuje i przenosi mechanizmy tworzenia gier do świata biznesu i projektowania usług. Autor tekstu wprowadza czytelnika w tematykę zagadnienia grywalizacji, jednocześnie wyjaśniając, na czym ono polega. Prezentuje i omawia mechanizmy, jakie wyróżniają grywalizację. Twórca tekstu pokazuje przykłady zastosowania grywalizacji oraz opisuje zagadnienia związane z wykorzystaniem...
-
Bilateral Multi-Issue Negotiation Between Active Documents and Execution Devices
PublicationMobile document-agents are often in conflict with execution devices when attempting to perform activities of the business process they implement, since preferences of device owners may change depending on their current location and the actual class of the device in use. The paper proposes a bilateral negotiation mechanism based on a simple bargaining game that can effectively resolve such conflicts without any third party support.
-
Pedestrian safety in road traffic – studies, recommendations and proposed improvements
PublicationPedestrians are involved and most frequently the victims of every third road accident in Poland. Pedestrian accidents most frequently occur in complex circumstances, as a result of many factors related to the behaviour of drivers and pedestrians. The basic parameters that determine road safety include the perception of traffic and visibility on the road. The paper will present the results of research conducted within the project...
-
Quality Modeling in Grid and Volunteer-Computing Systems
PublicationA model of computational quality in large-scale computing systems was presented in the previous chapter of this book. This model describes three quality attributes: performance, reliability and energy efficiency. We assumed that all processes in the system are incessantly ready to perform calculations and that communication between the processes occurs immediately. These assumptions are not true for grid and volunteer computing...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublicationThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
Discovering patterns of Web Page Visits from Associaton Rules Viewpoint
PublicationThe popularity of the Internet results from the almost unlimited resources of information stored in it. At the same time, Internet portals have become a widespread source of information and note very large number of visits. The list of web pages opened by users is stored in web servers' log files. Extraction of knowledge on the navigation paths of users has become carefully analyzed problem. Currently, there are a number of algorithms...
-
Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix...
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublicationThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
Numeryczna analiza dynamiczna wieszaków w łukowym wiadukcie kolejowym. Analiza przypadku
PublicationW artykule przedstawiono analizę dynamiczną wiaduktu kolejowego w ciągu Centralnej Magistrali Kolejowej zlokalizowanego koło Huty Zawadzkiej. W analizie zwrócono szczególną uwagę na lokalną odpowiedź wieszaków na obciążenie przejeżdżającym pociągiem oraz wiatrem. Obliczenia przeprowadzono na podstawie wykonanego modelu MES. Zweryfikowano poprawność modelu poprzez porównanie uzyskanych wyników z wartościami pomierzonymi. Przeprowadzono...
-
Frequent Sequence Mining in Web Log Data
PublicationThe amount of information available even on a single web server can be huge. On the other hand, the amount of visitors (users) can often reach a number of at least six digits. Users vary in gender, age and education, and in consequence their information needs are different. Moreover, they subconsciously expect to get more adequate content after visiting the first few pages. The scope of this kind of problem relates to the domain...
-
Usefulness of Keystroke Dynamics Features in User Authentication and Emotion Recognition
PublicationThe study presented in the article focuses on keystroke dynamics analysis applied to recognize emotional states and to authenticate users. An overview of some studies and applications in these areas is presented. Then, an experiment is described, i.e. the way of collecting data, extracting features, training classifiers and finding out the most appropriate feature subsets. The results show that it is difficult to indicate a universal...
-
Neoplasm, malignant - Female, 76 - Tissue image [5150730018695731]
Open Research DataThis is the histopathological image of OTHER AND UNSPECIFIED PARTS OF BILIARY TRACT tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Patrycja Klimas dr hab.
PeoplePatrycja Klimas is an associate professor at Wroclaw University of Economics and Business in the Department of Advanced Research in Management. As a researcher, she researches within strategic management, focused on inter-organizational cooperation and coopetition considered under dyads, networks, and different types of ecosystems. Based on her research mainly on the aviation and the video game industry, she published several papers...
-
Hey student, are you sharing your knowledge? A cluster typology of knowledge sharing behaviours among students
PublicationKnowledge Sharing (KS) is crucial for all organisations to better face current and future challenges. It is justifiable to assume that after graduation, students will have to face the coming challenges at societal and business levels, and that they will need the adequate KS skills to do so. Though the importance of KS is established, the understanding of how students pass on their knowledge is still fragmented and underdeveloped....
-
Evolutionary Sets of Safe Ship Trajectories: the Method's Development and Selected Reaserch Results
PublicationThe Evolutionary Sets of Safe Ship Trajectories is a method solving ship encounter situations. The method combines evolutionary approach to planning ship trajectory with some of the assumption of game theory. For given positions and motion parameters the method finds a near optimal set of safe trajectories of all ships involved in an encounter. This paper presents framework of the method and its development. Additionally, selected...
-
Affective reactions to playing digital games
PublicationThe paper presents a study of emotional states during a gameplay. An experiment of two-player Tetris game is reported, followed by the analysis of the results - self-reported emotional states as well as physiological signals measurements interpretation. The study reveals the diversity of emotional reactions and concludes, that a representative player's emotional model is hard to define. Instead, an adaptive approach to emotion...
-
User interface prototyping. Techniques, methods and tools
PublicationCurrently, for interactive applications their usability and ergonomics of the user interface (UI) are critical factors for achieving users' acceptance.
-
User experience and user interface (UX/UI) design of Greencoin mobile application.
PublicationThe aim of the Greencoin mobile application is to encourage its users to change their behavior and to act pro-ecologically. The pilot version of the application will operate within the city of Gdańsk. To keep the app’s user base as large as possible, the graphical user interface should be attractive to the broadest possible audience, and the application itself should be easy and fun to use. This work is a continuation of studies...
-
User -friendly E-learning Platform: a Case Study of a Design Thinking Approach Use
PublicationE-learning systems are very popular means to support the teaching process today. These systems are mainly used by universities as well as by commercial training centres. We analysed several popular e-learning platforms used in Polish universities and find them very unfriendly for the users. For this reason, the authors began the work on the creation of a new system that would be not only useful, but also usable for students, teachers...
-
Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation
PublicationIn client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...
-
Navigating the complexities of altruistic helping in Nonprofit Organizations: An analysis of Benefits, Burdens and managerial challenges
PublicationWe investigate how individuals cope with side effects of altruistic behaviour at work, i.e. genuine helping behaviour which is not part of any job description, and what role the organizational context plays in these dynamics. Employing simultaneous dyadic interviews, we show how employees of non-profit organizations cope with undesired effects of altruistic help. Our data provides evidence of unintended outcomes for the individual...
-
Torsional buckling and post-buckling of columns made of aluminium alloy
PublicationThe paper concerns torsional buckling and the initial post-buckling of axially compressed thin-walled aluminium alloy columns with bisymmetrical cross-section. It is assumed that the column material behaviour is described by the Ramberg–Osgood constitutive equation in non-linear elastic range. The stationary total energy principle is used to derive the governing non-linear differential equation. An approximate solution of the equation...
-
The Conference Report of Why R? Turkey 2022: The First R Conference with Call For Papers in Turkey
PublicationWhy R? Turkey 2022 was a non-profit conference that aimed to bring Turkish R users together and encourage them to attend the R conferences. The targeted audience of the conference consisted of, data scientists, data analysts, and all R users from academia and industry. The three-day conference, which consisted of several events such as workshops, regular talks, lightning talks, short tutorials, and panels, was free of charge and...