Search results for: VULNERABLE USERS - Bridge of Knowledge

Search

Search results for: VULNERABLE USERS

Filters

total: 1489
filtered: 1366

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: VULNERABLE USERS

  • Innovative Railway Stations

    Publication

    In relation to modern demographic trends, evolving technologies and environmentfriendly solutions increases the potential of rail considered as sustainable form of public transport. Contemporary tendencies of designing railway stations in Europe are focused on lowering energy consumption and reducing carbon emission. The main goal of the designers is to create a friendly and intuitive space for its users and at the same time a...

    Full text available to download

  • Solid road environment and its hazards

    Publication

    - MATEC Web of Conferences - Year 2017

    Accidents that involve vehicles departing the road tend to have very high severity, as they often result in the vehicle hitting a permanent obstacle (which can be a ree, a pole, facility pillar, front wall of a culvert or a barrier). In recent years, this type of accident caused approx. 19% of all road deaths in Poland. A particularly high risk can be observed on roads located in northern and western...

    Full text available to download

  • Facial emotion recognition using depth data

    Publication

    - Year 2015

    In this paper an original approach is presented for facial expression and emotion recognition based only on depth channel from Microsoft Kinect sensor. The emotional user model contains nine emotions including the neutral one. The proposed recognition algorithm uses local movements detection within the face area in order to recognize actual facial expression. This approach has been validated on Facial Expressions and Emotions Database...

    Full text to download in external service

  • The Decisional DNA-Based Smart Bike for Internet of Things

    Publication

    - Year 2014

    In this paper, we introduce a novel application of the Internet of Things, the Decisional DNAbased Smart Bike. The Decisional DNA is a domain-independent, flexible and standard knowledge representation structure; it allows its domains to acquire and store experiential knowledge and formal decision events in an explicit way. By using Decisional DNA, the sensor-equipped bicycle is able to learn its user’s weight, riding habits, etc....

    Full text to download in external service

  • Verpa bohemica (Krombh.) Schroet. (Morchellaceae) w Gdańsku.

    Publication
    • M. S. Wilga

    - Acta Botanica Cassubica - Year 2002

    Na obszarze Jaśkowego Lasu graniczącego z gdańskim Osiedlem Morena, w kwietniu 1997 roku stwierdzono stanowisko rzadkiego, ściśle chronionego gatunku grzyba - naparstniczki (smardzówki) czeskiej Verpa bohemica; nie był on dotąd notowany na Pomorzu Gdańskim. Gatunek został umieszczony na ''Czerwonej liście'' grzybów w kategorii ''narażone'' [V - vulnerable].

  • Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange

    This paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...

  • Disruption of the communication process on the example of ALEP-PL web application

    Publication

    - Year 2013

    By creating a dedicated web service, such as the presented ALEP-PL solution, you can not assume that its users have suffcient knowledge of the energy sector. This application is dedicated to the local energy planning. The ALEP-PL makes it easier to incorporate in the planning of key players in the local energy market. This group of ALEP-PL users represents mainly the ocials of energy companies and specialist offcers. In the paper...

  • Modern approaches to file system integrity checking

    Publication

    - Year 2008

    One of the means to detect intruder's activity is totrace all unauthorized changes in a file system.Programs which fulfill this functionality are called fileintegrity checkers. This paper concerns modernapproach to file system integrity checking. It reviewsarchitecture of popular systems that are widely used inproduction environment as well as scientific projects,which not only detect intruders but also take actions tostop their...

    Full text to download in external service

  • Health monitoring services based on off-the-shelf mobile devices

    Publication

    - Year 2013

    Development of health monitoring systems usually involves usage of dedicated devices with provided guarantees in terms of their reliability. Those devices raise the cost of the whole system, because of which such platforms are limited only to specific areas and constrained number of users. Usage of off-the- shelf devices could lower the cost and bring those systems to the masses. The paper covers possible uses of common off-the-shelf...

  • Ergonomics in Polish outpatient clinics

    Publication

    Outpatient clinics are structures In which ergonomics play a key role. This fact is associated with an often occurring risk of developing hospital-acquired infection. The risk increases with mistakes made in wrong planning the functional and spatial lay-out is subordinated to high utilitarian requirements, including hygienic and sanitary, and technological requirements. A properly planned structure allows to reduce dangers more...

  • BeesyCluster as Front-End for High Performance Computing Services

    Publication

    - TASK Quarterly - Year 2015

    The paper presents the BeesyCluster system as a middleware allowing invocation of services on high performance computing resources within the NIWA Centre of Competence project. Access is possible through both WWW and SOAP Web Service interfaces. The former allows non-experienced users to invoke both simple and complex services exposed through easyto-use servlets. The latter is meant for integration of external applications with...

    Full text available to download

  • Teaching High Performance Computing Using BeesyCluster and Relevant Usage Statistics

    Publication

    - Year 2014

    The paper presents motivations and experiences from using the BeesyCluster middleware for teaching high performance computing at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. Features of BeesyCluster well suited for conducting courses are discussed including: easy-to-use WWW interface for application development and running hiding queuing systems, publishing applications as services...

    Full text to download in external service

  • The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art

    Commemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...

    Full text to download in external service

  • Changing by light - how the lighting of intelligent spaces can influence the urban image

    Publication

    - Year 2012

    In the article light will be presented as a tool in the process of transforming the urban space. The reason for this use of light is the commercial aspect of space that forces it to be still competitive and profitable. Such a need gives rise to many innovative solutions in the city space, which allow transmitting information in order to attract human attention, and sometimes make it even possible to involve the user in the interaction...

    Full text to download in external service

  • Evaluation of flavour profiles in e-cigarette refill solutions using gas chromatography–tandem mass spectrometry

    Many flavour compounds that are present in e-liquids for e-cigarettes are responsible for specific tastes and smoking sensations for users. Data concerning content and specific types of flavours is often limited and unknown to users. The aim of the research was to define and compare flavour profiles of e-liquids with the same group taste from different manufacturers. Gas chromatography coupled with tandem mass spectrometry (GC–MS/MS)...

    Full text available to download

  • Effect of the Road Environment on Road Safety in Poland

    Run-off-road accidents tend to be very severe because when a vehicle leaves the road, it will often crash into a solid obstacle (tree, pole, supports, front wall of a culvert, barrier). A statistical analysis of the data shows that Poland's main roadside hazard is trees and the severity of vehicles striking a tree in a run-off-road crash. The risks are particularly high in north-west Poland with many of the roads lined up with...

    Full text available to download

  • Modelling Of Commercial Websites. A New Perspective On Usability And Customer Relation

    From an economic point of view, a critical aspect of online services is their ability to retain customers. The aim of presented study was the use of a layered model VIPR (Visual - Interaction - Process - Relation ) for commercial services online. The indicator of trust and establishing lasting relationships were assessment achieved from experienced users of commercial online services (n = 207), obtained by means of Web Credibility...

    Full text available to download

  • ON EGNOS MONITORING IN LOCAL CONDITIONS

    Any SBAS system should deliver to the user corrections to pseudoranges as well as information about the system integrity. In theory, as soon as the system is permanently monitored by RIMS stations, it is impossible to deliver the fault information to the user. However many observations shows that accuracy of EGNOS service in the same time are different in different places, which shows the influence of local conditions on them....

    Full text available to download

  • Lighting Design for the 21st Century Applied research in lighting practice

    For those who are unfamiliar with research, it’s important to know there are two categories. Fundamental (or basic) research and applied research. Basic research often discusses scientific ideas/theories, whereas, applied research explores testing these ideas in practice to develop technology or techniques. It’s applied research which most interests lighting practitioners. Great lighting design that creates a pleasant and beneficial...

    Full text available to download

  • Towards evaluation of the Second Generation Intact Stability Criteria - examination of a fishing vessel vulnerability to surf-riding, based on historical capsizing

    Publication

    - OCEAN ENGINEERING - Year 2022

    The Second Generation Intact Stability Criteria (SGISC) are the latest achievements in the field of intact ship stability assessment. The criteria are the result of massive international cooperative efforts and extensive research that lasted more than 15 years. Even though they are based on a solid scientific foundation, the trial period has commenced to collect user experience and further validation. One of possible approaches...

    Full text to download in external service

  • Ginące i zagrożone gatunki grzybów wielkoowocnikowych w Lasach Oliwskich.

    Publication
    • M. S. Wilga

    - Acta Botanica Cassubica - Year 2002

    Przedstawiono listę gatunków grzybów wielkoowocnikowych, stwierdzonych na obszarze Lasów Oliwskich, które zostały umieszczone na polskiej ''Czerwonej liście'' grzybów zagrożonych: 6 gatunków należy do klasy Ascomycetes, a 38 do Basidiomycetes. 5 gatunków zaliczono do wymierających [E - endangered], 14 narażonych na wyginięcie [V - vulnerable], 15 rzadkich [R - rare], a 10 o nieokreślonym statusie zagrożenia.

  • Using Evidence-based Arguments to Support Dependability Assurance-Experiences and Challenges

    Publication

    The article introduces to the problem of evidence-based arguments and their applications. Then, based on the experiences collected during commercial deployment of a concrete solution to this problem (system NOR-STA) we overview selected challenges and the ways of addressing them

    Full text available to download

  • Support for Employees with ASD in the Workplace Using a Bluetooth Skin Resistance Sensor–A Preliminary Study

    The application of a Bluetooth skin resistance sensor in assisting people with Autism Spectrum Disorders (ASD), in their day-to-day work, is presented in this paper. The design and construction of the device are discussed. The authors have considered the best placement of the sensor, on the body, to gain the most accurate readings of user stress levels, under various conditions. Trial tests were performed on a group of sixteen...

    Full text available to download

  • Comparative Analysis of Two Polish Hyperbolic Systems AEGIR and JEMIOLUSZKA

    Global Navigation Satellite System (GNSS) is seen by terrorists or hostile countries as a high value target. Volpe Center report contains the following statement: “During the course of its development for military use and more recent extension to many civilian uses, vulnerabilities of Global Navigation Satellite Systems (GNSS) – in the United States the Global Positioning System (GPS) – have become apparent. The vulnerabilities...

    Full text to download in external service

  • ECU calibration for gaseous dual fuel supply system in compression ignition engines

    Publication

    The dual fuel (DF) combustion mode is proven solution that allows to improve or get at the same level engine performance and reduce toxic compounds in exhaust gases which is confirmed by researchers and end-users. DF combustion mode uses two fuels gaseous fuel as a primary energy source and a pilot quantity of diesel fuel as ignition source. However, in order, to fully take advantage of the potential of the dual fuel mode, DF system...

    Full text available to download

  • Seismic performance evaluation of steel buckling-restrained braced frames including SMA materials

    The permanent deformation of the building after seismic excitations can be determined by the Maximum Residual Interstory Drift Ratio (MR-IDR), which may be used for measuring the damage states. Low-post yield stiffness of the steel buckling-restrained braced frame (BRBF) makes this system vulnerable to large MR-IDR after a severe earthquake event. To overcome this issue, this paper investigates the seismic limit state performances...

    Full text to download in external service

  • Kontekstowo zorientowany model bezpieczeństwa systemów internetowych

    Publication

    - Year 2016

    W rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...

    Full text available to download

  • Introducing agile practices into development processes of safety critical software

    Publication

    In this paper we present AgileSafe - a method which supports introduction of agile practices into safety-critical software development processes. To represent safety assurance constraints resulting from the regulatory context, AgileSafe uses assurance case patterns. The knowledge base of AgileSafe helps the user to select the agile practices relevant for the considered software development project. The corresponding assurance case...

    Full text available to download

  • Reduction of Derivative pipeline effort in water turbine

    Publication

    - Studia Geotechnica et Mechanica - Year 2013

    The paper presents an approach to evaluate and reduce the effort of the derivative pipeline in a water turbine of a hydrostatic power station in its vulnerable spots. Potential places of the biggest effort of the structure, as well as the coefficient of displacement and safety factor related to them were identified using FEM numerical method. Pipeline reinforcement was designed and made based on FEM analysis. Original technology...

    Full text available to download

  • Numerical analysis of the carpentry joints applied in the traditional wooden structures

    Publication

    - Year 2016

    The paper concerns the numerical analysis of the carpentry joints made from spruce wood. The material parameters of the wood have been calculated on the basis of nine independent material constants (an orthotropic material). The contact zone between the individual elements of the connection has been determined using Contact Tables in the MSC.Marc software. Five types of carpentry joints have been analyzed. The main aim of the research...

    Full text to download in external service

  • An Empirical Study on the Impact of Gender on Mobile Applications Usability

    Publication

    - IEEE Access - Year 2022

    In the area of broadband wireless Internet, mobile applications have already replaced their desktop equivalents and are recognized as valuable tools for any size of businesses and for private use. With the emergence of millions of apps, the quality of their interaction with the user remains an open question for software vendors. While female and male requirements and preferences are not always similar, to the best of our knowledge,...

    Full text available to download

  • Climate change impact on groundwater resources in sandbar aquifers in southern Baltic coast

    Publication

    Shallow coastal aquifers are vulnerable hydrosystems controlled by many factors, related to climate, seawater‑freshwater interactions and human activity. Given on‑going climate change, sea level rise and increasing human impact, it is especially true for groundwater resources situated in sandbars. We developed numerical models of unsaturated zone water flow for two sandbars in northern Poland: the Vistula Spit and the Hel Spit...

    Full text available to download

  • COMBINING FUNCTIONAL AND AESTHETIC ASPECTS OF DAYLIGHTING IN SUSTAINABLE ARCHITECTURE WITH THE USE OF DIGITAL DESIGN METHODS

    Publication

    The aesthetics of modern architecture should relate to its origins and goals - the environment, function, sustainability and its users. One of the conditions that meet the criteria is the presence of daylight and the use of its potential. The contemporary digital tools that support the design process allow to controlling the use of difficult and capricious materials, such as daylight. They also combine daylighting aspects with...

  • Pursuing Analytically the Influence of Hearing Aid Use on Auditory Perception in Various Acoustic Situations

    Publication

    - Vibrations in Physical Systems - Year 2022

    The paper presents the development of a method for assessing auditory perception and the effectiveness of applying hearing aids for hard-of-hearing people during short-term (up to 7 days) and longer-term (up to 3 months) use. The method consists of a survey based on the APHAB questionnaire. Additional criteria such as the degree of hearing loss, technological level of hearing aids used, as well as the user experience are taken...

    Full text available to download

  • Just Let Me Think: Designing Against Acquired Illiteracy.

    Publication

    - Year 2014

    This article concerns the relatively new problem of illiteracy relating to persons previously being literate, which is caused by too intensive using of so-called digital media (TV, computers, tablets, smartphones, e-book readers, portable media players, etc.). The problem has been observed for several years mainly in countries with high economic and technological development. The widespread use of digital media and the ease of...

    Full text to download in external service

  • The significance of the underground experience: Selection of reference design cases from the underground public transport stations and interchanges of the European Union

    Publication

    Abstract Background Recent research into the way public transport users appreciate stations and interchanges has highlighted several key aspects. Importantly, the optimization of these facilities should not simply aim to resolve dissatisfiers, but should also focus on addressing satisfiers, through the incorporation of factors such as comfort and experience. ‘Soft requirements,’ which have emerged in architecture and urban design,...

  • Quality Modeling in Grid and Volunteer-Computing Systems

    Publication

    - Year 2013

    A model of computational quality in large-scale computing systems was presented in the previous chapter of this book. This model describes three quality attributes: performance, reliability and energy efficiency. We assumed that all processes in the system are incessantly ready to perform calculations and that communication between the processes occurs immediately. These assumptions are not true for grid and volunteer computing...

  • Koncepcja systemu wspomagania decyzji nawigatora statku opartego na ewolucyjnym planowaniu manewrów antykolizyjnych

    Publication

    Artykuł przedstawia koncepcję systemu wspomagania decyzji nawigatora statku opartego na wątkach badań prowadzonych wcześniej przez autora. System będzie rozszerzał funkcjonalność systemów dotychczasowych o możliwość szczegółowego planowania bezpiecznej trajektorii statku na wodach zamkniętych, z dużą liczbą statków obcych i ograniczeniami toru wodnego. Artykuł zawiera dyskusję możliwych podejść do planowania manewrów, optymalizacji...

  • Digital fingerprinting for color images based on the quaternion encryption scheme

    In this paper we present a new quaternion-based encryption technique for color images. In the proposed encryption method, images are written as quaternions and are rotated in a three-dimensional space around another quaternion, which is an encryption key. The encryption process uses the cipher block chaining (CBC) mode. Further, this paper shows that our encryption algorithm enables digital fingerprinting as an additional feature....

    Full text to download in external service

  • Discovering patterns of Web Page Visits from Associaton Rules Viewpoint

    Publication

    The popularity of the Internet results from the almost unlimited resources of information stored in it. At the same time, Internet portals have become a widespread source of information and note very large number of visits. The list of web pages opened by users is stored in web servers' log files. Extraction of knowledge on the navigation paths of users has become carefully analyzed problem. Currently, there are a number of algorithms...

  • Frequent Sequence Mining in Web Log Data

    Publication

    - Year 2018

    The amount of information available even on a single web server can be huge. On the other hand, the amount of visitors (users) can often reach a number of at least six digits. Users vary in gender, age and education, and in consequence their information needs are different. Moreover, they subconsciously expect to get more adequate content after visiting the first few pages. The scope of this kind of problem relates to the domain...

    Full text to download in external service

  • Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents

    Electronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...

    Full text available to download

  • Generalized access control in hierarchical computer network

    The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...

    Full text available to download

  • COVID-19 and digital deprivation in Poland

    Publication

    Research background: The problem of digital deprivation is already known, but the COVID-19 pandemic has highlighted its negative consequences. A global change in the way of life, work and socialisation resulting from the epidemic has indicated that a basic level of digital integration is becoming necessary. During the lockdown, people were forced to use ICTs to adapt to a rapidly changing reality. Current experience with coronavirus...

    Full text available to download

  • Enhancing environmental literacy through urban technology-based learning. The PULA app case

    Publication
    • E. Duda
    • H. Anacka
    • H. Obracht-prondzyńska
    • H. C. Geirbo
    • J. Kowal

    - Year 2024

    This study addresses the need to enhance environmental literacy, focusing on urban adults through mobile applications, based on the example of PULA app that engages early adopters in gamified pro- environmental activities, offering insights into informal learning. Grounded in 'urban pedagogy,' the study combines semi-structured interviews with 17 application testers and quantitative data analysis, unveiling motivations, user feedback,...

    Full text to download in external service

  • DOP and Pseudorange Error Estimation in Mobile GNSS Systems for Android OS Applications

    Publication

    In the near past, GNSS (Global Navigation Satellite Systems) were only offered for a narrow group of recipients. Nowadays, thanks to mobile devices, they are available to anyone and everywhere. Personal navigation, searching for POI (Point of Interest), etc., had become a basic essential activity. Thanks to the widespread and availability of smartphones each user can obtain information considering his or her location even in an...

    Full text to download in external service

  • The Conference Report of Why R? Turkey 2022: The First R Conference with Call For Papers in Turkey

    Publication
    • M. Cavus
    • O. Aydin
    • O. Evkaya
    • D. Turfan
    • F. Karadag
    • O. Ozdemir
    • U. Dar
    • D. Bezer

    - R Journal - Year 2022

    Why R? Turkey 2022 was a non-profit conference that aimed to bring Turkish R users together and encourage them to attend the R conferences. The targeted audience of the conference consisted of, data scientists, data analysts, and all R users from academia and industry. The three-day conference, which consisted of several events such as workshops, regular talks, lightning talks, short tutorials, and panels, was free of charge and...

    Full text available to download

  • Semi complex navigation with an active optical gesture sensor

    This paper presents the methods of diversified touchless interactions between a user and a mobile platform utilizing the optical gesture sensor. The sensor uses 8 photodiodes to measure the reflected light in the active mode (using embedded LEDs) or it measures shadows caused by fingers in the passive mode. Several algorithms were implemented: automatic mode switching, adaptive illumination level compensation, resolution improvements...

    Full text to download in external service

  • The dynamic signature verification using population-based vertical partitioning

    Publication

    - Year 2020

    The dynamic signature is an attribute used in behavioral biometrics for verifying the identity of an individual. This attribute, apart from the shape of the signature, also contains information about the dynamics of the signing process described by the signals which tend to change over time. It is possible to process those signals in order to obtain descriptors of the signature characteristic of an individual user. One of the methods...

    Full text to download in external service

  • ANALIZA POSTAW INTERNAUTÓW WOBEC MARKI W MEDIACH SPOŁECZNOŚCIOWYCH

    Publication

    Celem opracowania jest ukazanie roli, jaką odgrywają media społecznościowe i wypowiedzi internautów w kształtowaniu wizerunku marki wśród użytkowników Sieci. Artykuł prezentuje także wyniki obserwacji aktywności polskich internautów dotyczące jednej z polskich marek spożywczych. Internauci zamieszczają w Internecie różnorodne treści powiązane pośrednio lub bezpośrednio z markami. Zadaniem organizacji, podobnie jak w przypadku pozostałych...

    Full text available to download