Search results for: VULNERABLE USERS - Bridge of Knowledge

Search

Search results for: VULNERABLE USERS

Filters

total: 1489
filtered: 1366

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: VULNERABLE USERS

  • Quality Evaluation of Speech Transmission via Two-way BPL-PLC Voice Communication System in an Underground Mine

    Publication

    - Archives of Acoustics - Year 2023

    In order to design a stable and reliable voice communication system, it is essential to know how many resources are necessary for conveying quality content. These parameters may include objective quality of service (QoS) metrics, such as: available bandwidth, bit error rate (BER), delay, latency as well as subjective quality of experience (QoE) related to user expectations. QoE is expressed as clarity of speech and the ability...

    Full text available to download

  • Investigation of tracking systems properties in CAVE-type virtual reality systems

    Publication

    In recent years, many scientific and industrial centers in the world developed a virtual reality systems or laboratories. One of the most advanced solutions are Immersive 3D Visualization Lab (I3DVL), a CAVE-type (Cave Automatic Virtual Environment) laboratory. It contains two CAVE-type installations: six-screen installation arranged in a form of a cube, and four-screen installation, a simplified version of the previous one. The...

    Full text to download in external service

  • Ocena warunków nasłonecznienia i projektowanie elektrowni słonecznych z wykorzystaniem dedykowanego oprogramowania oraz baz danych

    Przytoczono typowe dla obszaru Polski wartości nasłonecznienia. Zaprezentowano sposoby dokładniejszego określenia wartości nasłonecznienia w oparciu o bazy danych o nasłonecznieniu i aplikacje komputerowe. Narzędzia te pozwalają w pełniejszy sposób uwzględnić kąt nachylenia i azymut modułów fotowoltaicznych, linię horyzontu i zacienienie oraz zmienność nasłonecznienia w ciągu roku na podstawie statystycznych wartości nasłonecznia...

    Full text available to download

  • INTER-LAYER SHARING OF BACKUP PATH CAPACITIES PROVIDING FAST SERVICE RECOVERY IN IP-MPLS/WDM NETWORKS

    Publication

    - Year 2013

    In this paper, we investigate the issue of providing the transmission continuity in IP-MPLS/WDM networks in the presence of failures of nodes/links. Special focus is put on assuring fast restoration of flows affected after a failure in a scenario assuming sharing the backup path capacities in order to decrease the overall bandwidth consumption. In particular, we propose a new approach to inter-layer sharing of link capacity reserved...

  • The IPV6 Deployment - Best practices

    Publication

    - Year 2011

    The new Internet Protocol IPv6 has been regarded for quite a long time as the only option to ensure uninterrupted operation for the Internet service providers andend-users in the current Internet. The article presents important faets about the IPv6, including current statistics of the IPv4 usage, the IPv6 statistics for Poland comparing to the whole Internet. Moreover, this paper shows important aspeets of migration from IPv4 towards...

    Full text to download in external service

  • The need for new transport protocols on the INTERNET

    The TCP/IP protocol suite is widely used in IP networks, regardless of diverse environments and usage scenarios. Due to the fact of being the basic concept of organizing the work of the Internet, it is the subject of interest and constant analysis of operators, users, network researchers, and designers. The Internet is a "living" organism in which new needs appear all the time. This is particularly important due to the emerging...

    Full text to download in external service

  • Road texture influence on tyre rolling resistance

    Tyre performance, one of the critical factors for vehicle users, is strongly related to theroad surface characteristics, most notably to the pavement texture. Phenomena that occur at the tyre/road interface affect tyre friction (skid resistance), rolling resistance, tyre wear and tyre/road noise. This article deals with relationship between surface texture and rolling resistance of light and heavy vehicle tyres. Mean profile depth...

    Full text available to download

  • The influence of time of hearing aid use on auditory perception in various acoustic situations

    Publication

    - Journal of the Acoustical Society of America - Year 2018

    The assessment of sound perception in hearing aids, especially in the context of benefits that a prosthesis can bring, is a complex issue. The objective parameters of the hearing aids can easily be determined. These parameters, however, do not always have a direct and decisive influence on the subjective assessment of quality of the patient’s hearing while using a hearing aid. The paper presents the development of a method for...

    Full text to download in external service

  • THE FUNCTION OF GREENERY IN A SKYSCRAPER: THE PLACEMENT AND ITS INFLUENCE

    Publication

    The contrast between the high rise buildings; with their mostly geometric shapes, and the organic form of the greenery was visible even in the idea of a skyscraper. Yet the realizations and recent projects show emerging interest and the link between them. To better understand the developing function of the greenery in the context of a skyscraper, both literature and case studies are conducted. The aim is to relate the location...

    Full text to download in external service

  • Hazard Control in Industrial Environments: A Knowledge-Vision-Based Approach

    Publication

    This paper proposes the integration of image processing techniques (such as image segmentation, feature extraction and selection) and a knowledge representation approach in a framework for the development of an automatic system able to identify, in real time, unsafe activities in industrial environments. In this framework, the visual information (feature extraction) acquired from video-camera images and other context based gathered...

    Full text to download in external service

  • Dynamic risk assessment in autonomous vehicles motion planning

    Publication

    - Year 2008

    Arguing that an autonomous mobile system is sufficiently safe to operate in presence of other vehicles and objects is an important element in development of such systems. Traditional approach to assure safety is to distinguish between safe and unsafe area and prevent the autonomous vehicle from entering the unsafe area. The paper presents a model of autonomous vehicle control system which uses risk assessment...

    Full text to download in external service

  • Standard Compliance Framework for effective requirements communication

    Standard Compliance Framework (SCF) is a framework, which supports application of standards at the stages of achieving, assessing and maintaining the compliance. It uses Trust Case language to develop argument structures demonstrating compliance with standards. The paper presents how SCF is applied to increase effectiveness of requirements communication. Relevant mechanisms of the framework are thoroughly described referring to...

  • Study of data scheduling methods in the WiMAX Mobile metropolitan area networks

    The paper discusses basic assumptions of the WiMAX Mobile system. It also presents and analyses the results of simulation tests run for selected data scheduling methods and subcarrier allocation. Based on the test results, the authors have prepared a comparative analysis of two popular data scheduling methods, i.e. WRR and PF, and their own method CDFQ which uses information about the current channel situation for the queuing processes...

  • Design, Realization and Measurements of Enhanced Performance 2.4 GHz ESPAR Antenna for Localization in Wireless Sensor Networks

    Publication

    - Year 2013

    This paper presents the design, realization and measurements of an Electronically Steerable Parasitic Array Radiator (ESPAR) antenna with enhanced performance of estimating the incoming signal direction. Designed antenna is dedicated for 2.4 GHz ISM applications with emphasis on Wireless Sensor Networks (WSN). Proposed antenna provides different radiation patterns by proper configuration of the parasitic elements. Thus, several...

    Full text to download in external service

  • The new version of contact-less method for localisation of catenary contact wire – theoretical assumption

    Publication

    This article presents the theoretical basic of a new version of contact-less method for localising the catenary contact wires, using the advanced video techniques and image analysis. So far, contact line diagnostic systems exploited nowadays uses the contact measuring methods with special design current collector. This solutions make it impossible to measure the contact line geometry in a static way. The proposed measurement method...

    Full text available to download

  • Retrieval with Semantic Sieve

    Publication

    The article presents an algorithm we called Semantic Sieve applied for refining search results in text documents repository. The algorithm calculates socalled conceptual directions that enables interaction with the user and allows to narrow the set of results to the most relevant ones. We present the system where the algorithm has been implemented. The system also offers in the presentation layer clustering of the results into...

    Full text to download in external service

  • MAlSim - Mobile Agent Malware Simulator

    Publication

    - Year 2008

    One of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...

  • A quaternion-based modified feistel cipher for multimedia transmission

    In this paper a quaternion-based modified Feistel Cipher is proposed. The algorithm is based on the scheme proposed by Sastry and Kumar (2012). Our algorithm uses special properties of quaternions to perform rotations of data sequences in 3D space for each of the cipher rounds. The plaintext (image in gray-tone) is divided into two square matrices of equal size which consist of Lipschitz quaternions. A modular arithmetic was implemented...

  • On thermal stability of topological qubit in Kitaev's 4D model

    Publication

    - OPEN SYSTEMS & INFORMATION DYNAMICS - Year 2010

    We analyse stability of the four-dimensional Kitaev model-a candidate for scalable quantum memory - in finite temperature within the weak coupling Markovian limit. It is shown that, below a critical temperature, certain topological qubit observables X and Z possess relaxation times exponentially long in the size of the system. Their construction involves polynomial in system size algorithm which uses as an input the results of...

  • Automatic detection of abandoned luggage employing a dual camera system

    Publication

    - Year 2010

    A system for automatic detection of events using a system of fixed and PTZ (pan-tilt-zoom) cameras is described. Images from the fixed camera are analyzed by means of object detection and tracking. Event detection system uses a set of rules to analyze data on the tracked moving objects and to detect defined events. A PTZ camera is used to obtain a detailed view of a selected object. A procedure for conversion between the pixel...

  • Reducing income inequalities through government expenditures on education. Evidence for European countries Piotr PłatkowskiORCID Icon &Ewa LechmanORCID Icon

    This study examines the role of government spending on education in mitigating income inequalities. The study uses dynamic panel regressions to assess the evolution of education expenditures and income inequality in the sample of 30 European countries between 1995 and 2018. Our findings show that increases in government spending on education positively affect income inequality reduction. The impact was more substantial in case...

    Full text to download in external service

  • Systematic Literature Review on Click Through Rate Prediction

    Publication

    The ability to anticipate whether a user will click on an item is one of the most crucial aspects of operating an e-commerce business, and clickthrough rate prediction is an attempt to provide an answer to this question. Beginning with the simplest multilayer perceptrons and progressing to the most sophisticated attention networks, researchers employ a variety of methods to solve this issue. In this paper, we present the findings...

    Full text to download in external service

  • Universal construction of genuinely entangled subspaces of any size

    Publication

    We put forward a simple construction of genuinely entangled subspaces – subspaces supporting only genuinely multipartite entangled states – of any permissible dimensionality for any number of parties and local dimensions. The method uses nonorthogonal product bases, which are built from totally nonsingular matrices with a certain structure. We give an explicit basis for the constructed subspaces. An immediate consequence of our...

    Full text available to download

  • Impact of Spatial Noise Correlation on Bearing Accuracy in DIFAR Systems

    DIFAR type underwater passive systems are one of the more commonly used tools for detecting submarines. At the design stage, which usually uses computer simulations, it is necessary to generate acoustic noise of the sea. It has been shown that correlating noise significantly reduces these errors compared to the assumption that noise is uncorrelated. In addition, bearing errors have been shown to be the same in systems with a commonly...

    Full text available to download

  • A new method of wind farm active power curve estimation based on statistical approach

    Publication

    - Przegląd Elektrotechniczny - Year 2022

    The purpose of this paper is to solve the wind farm active power estimation problem, introducing the method which is based on a statistical approach and robust fitting. The proposed algorithm uses a statistical approach and compared to existing ones- includes a wind direction as well as the influence of turbine start-up procedure on the estimation. The results show that additional estimation inputs i.e. the wind direction and the...

    Full text available to download

  • Application of Survey Simulator for Museums

    Publication

    - Year 2015

    “Virtual Museum” is currently a very popular form of presenting museums’ collections of artefacts as well as an approach to archaeological research [1], [2], [3]. The term “virtual” can be understood in many ways – from a simple collection of on-line photographs, through multidirectional viewable panorama pictures, to complete interactive models of the real world, including 3-dimensional (3D) geometry, physical properties and many...

    Full text to download in external service

  • Towards Emotion Acquisition in IT Usability Evaluation Context

    Publication

    - Year 2015

    The paper concerns extension of IT usability studies with automatic analysis of the emotional state of a user. Affect recognition methods and emotion representation models are reviewed and evaluated for applicability in usability testing procedures. Accuracy of emotion recognition, susceptibility to disturbances, independence on human will and interference with usability testing procedures are...

    Full text to download in external service

  • Study of the Flow Dynamics of Surface Water Masses in the Area of the Coastal Gulf of Gdansk

    Publication

    - Year 2017

    The paper describes two methods of predicting the movement of small objects with surface water masses. One of the methods uses graph theory to describe the motion of water masses in port docks. The results of this study were compared to a simulation using the hydrodynamic numerical model M3D. The results obtained in a virtual environment were related to the experiments in the real world. In the coastal area of the Gulf of Gdansk,...

    Full text to download in external service

  • Heuristic Method of Safe Manoeuvre Selection Based on Collision Threat Parameters Areas

    This paper is a continuation of papers dedicated to a radar-based CTPA (Collision Threat Parameters Area) display designed to support safe manoeuvre selection. The display visualizes all the ships in an encounter and presents situational overview from the own ship’s point of view. It calculates and displays information on unsafe or unrealistic own ship’s course & speed allowing a user to select a safe manoeuvre. So far only the...

    Full text available to download

  • Face detection algorithms evaluation for the bank client verification

    Publication

    Results of investigation of face detection algorithms in the video sequences are presented in the paper. The recordings were made with a miniature industrial USB camera in real conditions met in three bank operating rooms. The aim of the experiments was to check the practical usability of the face detection method in the biometric bank client verification system. The main assumption was to provide as much as possible user interaction...

  • Aspect-Oriented Management of Service Requests for Assurance of High Performance and Dependability

    A new approach to service requests management in case of insufficient hardware resources is proposed. It is based on wide aspects of requests analysis and it assures reliable and fast access to priority services. Requests are analyzed for, among others, time of occurrence, category of user who made the request, type of service, current system load and hardware utilization. Deterministic but dynamic rules help to manage system load...

    Full text available to download

  • Testing of Technical Fabrics under Fast Camera Control

    Publication

    The dynamic development of measurement and recording techniques has been changing the way one conceives material strength. In this study, two different methods of evaluating the strength of fabrics are compared. The first is the typical and commonly used technique based on the use of a testing machine. The second method uses the so-called “fast camera” to monitor the entire process of the destruction of a fabric sample and analyse...

    Full text available to download

  • A novel architecture of Web-GIS for mapping and analysis of echinococcosis in Poland

    Publication

    - Applied Geomatics - Year 2022

    Echinococcosis is an infectious disease transferred through ingestion of food or water which have been contaminated with eggs of the Echinococcus tapeworm, which are spread by intermediate parasite hosts. Because the latter are primarily territorial, research related to diagnosis and prevention of echinococcosis requires investigation of environmental factors, which can be supported with the use of a Geographical Information System...

    Full text available to download

  • Evaluation of multimedia applications in a cluster oriented environment

    In the age of Information and Communication Technology (ICT), Web and the Internet have changed significantly the way applications are developed, deployed and used. One of recent trends is modern design of web-applications based on SOA. This process is based on the composition of existing web services into a single scenario from the point of view of a particular user or client. This allows IT companies to shorten product time-to-market....

    Full text available to download

  • Preference-based evolutionary multi-objective optimization in ship weather routing

    In evolutionary multi-objective optimization (EMO) the aim is to find a set of Pareto-optimal solutions. Such approach may be applied to multiple real-life problems, including weather routing (WR) of ships. The route should be optimal in terms of passage time, fuel consumption and safety of crew and cargo while taking into account dynamically changing weather conditions. Additionally it must not violate any navigational constraints...

    Full text available to download

  • Applications of Raman spectroscopy for detection of selected substances in tissues

    Publication

    - Year 2019

    This dissertation explores the applications of Raman spectroscopy for biological tissue analysis. Basics of Raman and surface-enhanced Raman spectroscopy (SERS) are described, along with an analysis of the literature on biodetection and non-invasive blood analysis with emphasis on glucose detection. Instrumentation for Raman measurements is described. The sources of noise and interferences occurring in biological tissue measurements...

  • Universal autonomous control and management system for multipurpose unmanned surface vessel

    The paper presents design, structure and architecture of the Universal Autonomous Control and Management System (UACAMS) for multipurpose unmanned surface vessel. The system was designed, installed and implemented on the multipurpose platform - unmanned surface vessel named HydroDron. The platform is designed to execute hydrographic survey missions with multi-variant configuration of the survey system (payload? ) including multi-beam...

    Full text available to download

  • EMG and gaze based interaction with graphic interface of smart glasses application

    In this paper we investigate the effectiveness of the interaction using eye tracking and electromyography. Smart glasses requires reliable interfaces for controlling the graphic content displayed directly in front of the user's eye. Presented research is related with the eGlasses project, which is focused on the development of an open platform in the form of multisensory electronic glasses and related interaction methods. One of...

    Full text to download in external service

  • Decoherence-free communication over multiaccess quantum channels

    In this paper we consider decoherence-free communication over multiple access and k-user quantum channels. First, we concentrate on a hermitian unitary noise model U for a two-access bi-unitary channel and show that in this case a decoherence-free code exists if the space of Schmidt matrices of an eigensubspace of U exhibits certain properties of decomposability. Then, we show that our technique is also applicable for generic random unitary...

    Full text to download in external service

  • A method for counting people attending large public events

    The algorithm for people counting in crowded scenes, based on the idea of virtual gate which uses optical flow method is presented. The concept and practical application of the developed algorithm under real conditions is depicted. The aim of the work is to estimate the number of people passing through entrances of a large sport hall. The most challenging problem was the unpredicted behavior of people while entering the building....

    Full text available to download

  • ASIC Design Example of Complex SoC with FPGA Prototyping

    The paper presents an example of the System on a Chip design, where the FPGA prototyping has been used. Two FPGA prototypes have been realized. The first FPGA prototype uses AVNET board containing Xilinx Virtex4 device accompanied by custom board with required devices. The second FPGA prototype has been built using the custom PCB with Xilinx Virtex-4 XC4VLX60 FPGA accompanied by all needed external components. The final system...

    Full text available to download

  • Jakość usług interaktywnych: projektowanie, ocena, doskonalenie

    Publication

    - Year 2014

    W publikacji poddano analizie główne koncepcje jakości usług on-line, zorientowane na następujące cele: jakość techniczno-funkcjonalna, interakcja użytkownik-system, doświadczenie użytkownika (User Experience), satysfakcja klienta oraz budowa relacji i lojalności klienta. Omówiono związek tych koncepcji z pięcioma perspektywami projektowymi jako środkami realizacji wspomnianych celów jakościowych. Przeanalizowano istotę i zawartość...

  • Big Data Processing by Volunteer Computing Supported by Intelligent Agents

    Publication

    In this paper, volunteer computing systems have been proposed for big data processing. Moreover, intelligent agents have been developed to efficiency improvement of a grid middleware layer. In consequence, an intelligent volunteer grid has been equipped with agents that belong to five sets. The first one consists of some user tasks. Furthermore, two kinds of semi-intelligent tasks have been introduced to implement a middleware...

    Full text to download in external service

  • Launch of the Immersive 3D Visualization Laboratory

    The paper presents the concept of Immersive 3D Visualization Laboratory, formed at the Faculty of Electronics, Telecommunications and Informatics at Gdańsk University of Technology under the project Gdańsk University of Technology's Modern auditoriums. The basic unit of this laboratory will be cubic CAVE (Cave Automatic Virtual Environment) enriched with spherical walk simulator. This device will allow the user unlimited walking,...

  • Estimation of interior-permanent-magnet-synchronous-motor rotor position by analysis of phase-current derivatives

    Publication

    This paper describes an algorithm for estimation of IPMSM rotor angular position. The algorithm uses derivatives of motor phase currents resulting from PWM modulation to obtain the rotor position. The presented method is designed for medium- and high-speed range, since it is based on determination of the EMF vector. Calculation of the motor position is performed in every PWM cycle. The standard SV-PWM method is used to determine...

  • Parametrical 3D model of an asynchronous motor - AutoCAD application.

    Publication

    A computer program for automatic drawing of 3D models of squirrel-cage induction motors is presented in this paper. The created model of a machine is of parametrical nature, which means that the user defines geometry of particular elements (shaft, stator core, bearing, windings etc.) on the basis dimensions and some other parameters e.g. type of bearing, kind of winding, number of slots. This program is useful for 3D modelling...

  • KEMR-Net: A Knowledge-Enhanced Mask Refinement Network for Chromosome Instance Segmentation

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2024

    This article proposes a mask refinement method for chromosome instance segmentation. The proposed method exploits the knowledge representation capability of Neural Knowledge DNA (NK-DNA) to capture the semantics of the chromosome’s shape, texture, and key points, and then it uses the captured knowledge to improve the accuracy and smoothness of the masks. We validate the method’s effectiveness on our latest high-resolution chromosome...

    Full text available to download

  • A Point Set Connection Problem for Autonomous Mobile Robots in a Grid

    Publication

    - COMPUTING AND INFORMATICS - Year 2012

    Consider an orthogonal grid of streets and avenues in a Manhattan-like city populated by stationary sensor modules at some intersections and mobile robots that can serve as relays of information that the modules exchange, where both module-module and module-robot communication is limited to a straight line of sight within the grid. The robots are oblivious and move asynchronously. We present a distributed algorithm that, given...

    Full text to download in external service

  • ASIC Design Example of Complex SoC with FPGA Prototyping

    Publication

    The paper presents an example of the System on a Chip design, where the FPGA prototyping has been used. Two FPGA prototypes have been realized. The first FPGA prototype uses AVNET board containing Xilinx Virtex4 device accompanied by custom board with required devices. The second FPGA prototype has been built using the custom PCB with Xilinx Virtex-4 XC4VLX60 FPGA accompanied by all needed external components. The final system...

  • Development of the sound field 3D intensity probe based on miniature microphones

    Publication

    The engineered measuring probe uses three pairs of miniature microphones coupled. The signals from the microphones after an initial amplification are fed to differential circuits. Due to the required symmetry of the circuit it was necessary to select electronic components very carefully. Moreover, additional digital signal processing techniques were applied to avoid amplitude and phase mismatch. The view of the engineered probe...