Search results for: VULNERABLE USERS - Bridge of Knowledge

Search

Search results for: VULNERABLE USERS

Search results for: VULNERABLE USERS

  • Fast method for IEEE 802.16-2004 standard-based networks coverage measuring

    This paper presents the time and cost efficient method for measuring effective coverage of IEEE 802.16-2004 standard-based networks. This is done by performing a series of continuous measurements on the grid basis. Due to this kind of signal quality surveying, estimationof the probable coverage area can be made. It is significant that themethod is fast and is uses a standard customer equipment which makes it more accessible for...

    Full text to download in external service

  • Color Processing for Color-Blind Individuals Using Smart Glasses

    In this paper we investigated image processing methods for color-blind individuals. In particular we experimentally verified color naming procedure, generation of maps with color perception differences for average observers and for dichromats, and two color transformation methods. In experiments 7 mobile devices were used: 3 smart glasses and 4 smartphones. User studies were performed with 38 average observers and 9 dichromats....

    Full text to download in external service

  • Exploring perceptions of pro environmental educational mobile applications based on semantic field analysis

    Publication

    - Year 2023

    The paper aims to identify multidimensional perceptions of mobile apps by their users. Special attention has been paid to pro-environmental educational apps. Semantic field analysis and measurement of emotional temperatures were performed to achieve this goal. Transcripts from seven focus group interviews were used as research material. The results indicate that functionality based on a reward or benefit system reinforces environmentally...

    Full text available to download

  • Experience oriented enhancement of smartness for Internet of Things

    Publication

    - Year 2015

    In this paper, we propose a novel approach, the Experience-Oriented Smart Things that allows experiential knowledge discovery, storage, involving, and sharing for Internet of Things. The main features, architecture, and initial experiments of this approach are introduced. Rather than take all the data produced by Internet of Things, this approach focuses on acquiring only interesting data for its knowledge discovery process. By...

  • Dariusz Dąbrowski dr hab. inż.

    Dariusz Dąbrowski graduated from the Faculty of Shipbuilding at Gdańsk University of Technology and in 1987 began working at the university as an assistant in the Department of Shipbuilding Industry Organization within the then Institute of Organization and Design of Production Systems. In 1990, he went on a TEMPUS scholarship from the EU and spent 14 months at the University of Sheffield, where he participated in the Master of...

  • Adaptabilność obiektów architektonicznych we współczesnym projektowaniu / The adaptability of architectural objects in contemporary design

    Publication

    The article discusses the issue of adaptability - the ability to modify modern architectural objects to a changing context - as an important element of contemporary design. Adaptability can take on different forms. It is most commonly understood as a change in the architectural form in reaction to various stimuli from the environment through transformative structures, or as an object's ability to adapt to climatic conditions, providing...

    Full text available to download

  • Personal adaptive tuning of mobile computer audio

    An integrated methodology for enhancing audio quality in mobile computers is presented. The key features are adaptation of the characteristics of the acoustic track to the changing conditions and to the user's individual preferences. Original signal processing algorithms are introduced, which concern: linearization of frequency response, dialogue intelligibility enhancement and dynamics processing tuned up to the user's preferences....

  • Interactive Query Expansion with the Use of Clustering by Directions Algorithm

    This paper concerns Clustering by Directions algorithm. The algorithm introduces a novel approach to interactive query expansion. It is designed to support users of search engines in forming web search queries. When a user executes a query, the algorithm shows potential directions in which the search can be continued. This paper describes the algorithm and it presents an enhancement which reduces the computational complexity of...

  • Multimedia interface using head movements tracking

    Publication

    The presented solution supports innovative ways of manipulating computer multimedia content, such as: static images, videos and music clips and others that can be browsed subsequently. The system requires a standard web camera that captures images of the user face. The core of the system is formed by a head movement analyzing algorithm that finds a user face and tracks head movements in real time. Head movements are tracked with...

    Full text to download in external service

  • ROAD SAFETY FOR CYCLISTS BASED ON THE CALORIES NEEDED

    Publication

    - Transport Problems - Year 2021

    Cyclists are a vulnerable group of road users, especially when no separate infrastructure for cyclists is provided. Then, road factors such as distance and altitude differences can indirectly affect cyclists' safety. Therefore, the authors proposed a procedure based on the geometric characteristics of the road that can determine riding difficulties for cyclists. The proposed procedure can be used both by the public authorities who...

    Full text available to download

  • Toward Intelligent Recommendations Using the Neural Knowledge DNA

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2021

    In this paper we propose a novel recommendation approach using past news click data and the Neural Knowledge DNA (NK-DNA). The Neural Knowledge DNA is a novel knowledge representation method designed to support discovering, storing, reusing, improving, and sharing knowledge among machines and computing systems. We examine our approach for news recommendation tasks on the MIND benchmark dataset. By taking advantages of NK-DNA, deep...

    Full text available to download

  • Monte-Carlo Modeling of Optical Sensors for Postoperative Free Flap Monitoring

    Publication

    - Year 2024

    This work aims to develop a numerical tissue model and implement software to simulate photon propagation using the Monte Carlo method to determine design guidelines for a physical measurement system. C++ was used for the simulation program, and Python as a programming environment to create an interface that allows the user to customize individual simulation elements, allowing for increased accuracy and flexibility when simulating...

    Full text to download in external service

  • Monte-Carlo Modeling of Optical Sensors for Postoperative Free Flap Monitoring

    Publication

    This work aims to develop a numerical tissue model and implement software to simulate photon propagation using the Monte Carlo method to determine design guidelines for a physical measurement system. C++ was used for the simulation program, and Python as a programming environment to create an interface that allows the user to customize individual simulation elements, allowing for increased accuracy and flexibility when simulating...

    Full text to download in external service

  • Combining MUSHRA Test and Fuzzy Logic in the Evaluation of Benefits of Using Hearing Prostheses

    Publication

    - Electronics - Year 2023

    Assessing the effectiveness of hearing aid fittings based on the benefits they provide is crucial but intricate. While objective metrics of hearing aids like gain, frequency response, and distortion are measurable, they do not directly indicate user benefits. Hearing aid performance assessment encompasses various aspects, such as compensating for hearing loss and user satisfaction. The authors suggest enhancing the widely used...

    Full text available to download

  • The literature review on boundary conditions of use for non-residential buildings

    Publication

    - Year 2022

    This paper describes the results of qualitative and quantitative literature reviews on boundary conditions within educational buildings, emphasising the users' perspective. The reviews were performed before and during the COVID-19 pandemic using Scopus, Taylor& Francis, Web of Science databases. The boundary conditions understood as special characteristics for use and or precondition, determining specific features of buildings...

    Full text to download in external service

  • The literature review on boundary conditions of use for non-residential buildings. Educational buildings.

    Publication

    - Year 2022

    This paper describes the results of qualitative and quantitative literature reviews on boundary conditions within educational buildings, emphasising the users' perspective. The studies were performed before and during the COVID-19 pandemic using Scopus, Taylor& Francis, and Web of Science databases. The boundary conditions are understood as special characteristics for use and or precondition, determining specific features of...

    Full text to download in external service

  • Cellular network quality evaluation at a university campus on the eve of 5G

    Thanks to the availability of mobile devices and the spread of broadband access around the world, the number of network users continues to grow. This has raised user awareness when it comes to the quality of content they consume. Many service providers and operators focus on monitoring QoN (Quality of Network) and QoS (Quality of Service) parameters, particularly those influenced by bandwidth and latency. However, for most end-users,...

    Full text available to download

  • DOP and Pseudorange Error Estimation in Urban Environments for Mobile Android GNSS Applications

    Publication

    Just a couple of years ago, GNSS (Global Navigation Satellite Systems) were available only for a narrow group of users. Currently, with the outbreak of mobile devices, they are accessible to anyone and everywhere. Urban navigation or searching for POIs (Points of Interest) had become an everyday activity. With the availability of consumer electronics and wireless technologies, each user can obtain information considering his or...

    Full text to download in external service

  • Speace frienly for the blind = Przestrzeń przyjazna dla niewidomych

    Publication

    - Year 2012

    The article presents issues connected with accessibility of public space for people with eyesight disabilities. The use of the extravisual spatial stimuli in shaping the urban environment has been analysed. Spaces in which musltisensory spatial reception is feasible become user-friendly, as they come to meet the changing needs of their users. The article introduces a system of textures aiding spatial orientation, navigation and...

  • Demographic Changes in Poland – The Regional Dimension

    The article notes that the ageing process does not occur uniformly across all Polish regions, i.e. at the same pace and with the same intensity. The results of studies indicating the regions being most vulnerable to the ageing of the regional community and the negative consequences of this process in the next two decades are presented.

    Full text available to download

  • Accelerometer-based Human Activity Recognition and the Impact of the Sample Size

    Publication

    The presented study focused on the recognition of eight user activities (e.g. walking, lying, climbing stairs) basing on the measurements from an accelerometer embedded in a mobile device. It is assumed that the device is carried in a specific location of the user’s clothing. Three types of classifiers were tested on different sizes of the samples. The influence of the time window (the duration of a single trial) on selected activities...

    Full text to download in external service

  • Problemy zagrażające bezpieczeństwu dzieci i ich rodziców w ruchu drogowym podczas podróży do szkoły na przykładzie Przymorza Małego w Gdańsku

    Artykuł opisuje problemy wpływające negatywnie na bezpieczeństwo ruchu drogowego na obszarze Przymorza Małego, a także przedstawia pomysły, których realizacja powinna poprawić bezpieczeństwo pieszych, rowerzystów oraz kierowców pojazdów samochodowych poruszających się po tym obszarze. W pierwszej części przedstawiono informacje dotyczące stanu aktualnego analizowanego terenu, opisano zlokalizowane tutaj placówki oświatowe, a także...

    Full text available to download

  • INFRO@D Safety management of unprotected road users

    e-Learning Courses
    • J. Wachnicka
    • W. Kustra
    • T. Mackun
    • M. Budzyński
    • A. Guzik
    • K. Dytrych

  • Australasian User Interface Conference

    Conferences

  • Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues

    Management of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...

  • Design and Configuration of Context-aware VoIP Telephony Systems

    Publication

    - Year 2013

    Voice over IP is a widely used concept with regard to a realization technology of different types of telephony systems, including those that are used in enterprises. Such systems of a call procesing component and a set of desk endpoints that are pervasove from a user perspective. Those andpoints are usually not mobile, but in result can deliver a much greater set of functions needed in an everyday office work. Those functions also...

    Full text to download in external service

  • Towards Contactless, Hand Gestures-Based Control of Devices

    Publication

    Gesture-based intuitive interactions with electronic devices can be an important part of smart home systems. In this paper, we adapt the contactless linear gesture sensor for the navigation of smart lighting system. Set of handled gestures allow to propose two methods of active light source selection, continuous dimming, and turning on and off based on discrete gestures. The average gesture recognition accuracy was 97.58% in the...

    Full text to download in external service

  • Modal Analysis of a Steel Radial Gate Exposed to Different Water Levels

    With the increase in water retention needs and planned river regulation, it might be important to investigate the dynamic resistance of vulnerable elements of hydroelectric power plants, including steel water locks. The most frequent dynamic loads affecting hydroengineering structures in Poland include vibrations caused by heavy road and railway traffic, piling works and mining tremors. More destructive dynamic loads, including...

    Full text available to download

  • Industrial User Interfaces

    e-Learning Courses
    • M. J. Grzegorek

  • LIDAR data from the measurement of a WD113 bridge structure

    Open Research Data

    The measurement data was obtained during research related to the utilization of LiDAR observations to assess the condition of bridge structures. The provided data comes from measurements of viaduct WD113 located along a newly built national road near the town of Koszalin. The acquired point cloud constitutes an integral set of information regarding...

  • Voice Maps - portable, dedicated GIS for supporting street navigtion and self-dependent movement of the blind

    The concept and the prototype application of the system supporting the street navigation and independent, outdoor movement of the blind is presented. The system utilises the GIS database of geometric network of the pedestrian paths in the city and is capable of finding the route from the indicated source to destination. Subsequently, the system supports the movement of the blind along the found route. The information on the user's...

  • Electronic Noses for Indoor Air Quality Assessment

    This chapter presents a proposal of the use of electronic noses in the monitoring of indoor air quality. The main focus is put on the detailed characteristics of today’s indoor air quality control methods, the types of pollution in the air, and the development of electronic noses for air testing. Currently, scientists seek methodological and structural solutions that would enable real-time online indoor air control. It has been...

    Full text available to download

  • Depolarisation Model for a BAN Indoor Scenario

    Publication
    • M. M. Ferreira
    • F. D. Cardoso
    • S. J. Ambroziak
    • M. Särestöniemi
    • K. Turbic
    • L. M. Correia

    - Year 2023

    In this paper, an analysis of depolarisation in Body Area Networks for Body-to-Infrastructure communications based on a measurement campaign in the 5.8 GHz band in an indoor environment is performed. Measurements were made with an offbody antenna transmitting linearly polarised signals and dualpolarised receiving antennas carried by the user on the body. A Normal Distribution with a mean of 2.0 dB and a standard deviation of 4.3...

    Full text available to download

  • The effect of social media communication on consumer perceptions of brands

    Researchers and brand managers have limited understanding of the effects social media communication has on how consumers perceive brands. We investigated 504 Facebook users in order to observe the impact of firm-created and user-generated (UG) social media communication on brand equity (BE), brand attitude (BA) and purchase intention (PI) by using a standardized online survey throughout Poland. To test the conceptual model, we...

    Full text to download in external service

  • Dorota Dominika Kamrowska-Załuska dr hab. inż. arch.

    Prof. Dorota Kamrowska-Zaluska, architect and urban planner, Associate Professor and Director of mid-career program on Urban development and management of metropolitan areas, at the Department of Urban Design and Regional Planning at Faculty of Architecture, Gdansk University of Technology; Visiting Scholar and Research Fellow at several research institutions incl. Massachusetts Institute of Technology (2013), Charted Urban Planner...

  • Business applications of geolocation - modern solutions and trends

    Publication

    - Year 2015

    The technological development of geolocation systems has resulted in the utilization of physical location of users by a growing number of entrepreneurs. As mobile technology develops, the use of geolocation in business is becoming widespread with a new range of geomarketing techniques. Entrepreneurs therefore more often utilize geolocation in their promotional and operational activities. In this article mobile-based geolocation...

  • Solid road environment and its hazards

    Publication

    - MATEC Web of Conferences - Year 2017

    Accidents that involve vehicles departing the road tend to have very high severity, as they often result in the vehicle hitting a permanent obstacle (which can be a ree, a pole, facility pillar, front wall of a culvert or a barrier). In recent years, this type of accident caused approx. 19% of all road deaths in Poland. A particularly high risk can be observed on roads located in northern and western...

    Full text available to download

  • Innovative Railway Stations

    Publication

    In relation to modern demographic trends, evolving technologies and environmentfriendly solutions increases the potential of rail considered as sustainable form of public transport. Contemporary tendencies of designing railway stations in Europe are focused on lowering energy consumption and reducing carbon emission. The main goal of the designers is to create a friendly and intuitive space for its users and at the same time a...

    Full text available to download

  • Performance analysis of mobility protocols and handover algorithms for IP-based networks

    Publication

    A rapid growth of IP-based networks and services has created the vast collection of resources and functionality available to users by means of a universal method of access - an IP protocol. At the same time, advances in design of mobile electronic devices have allowed them to reach utility level comparable to stationary, desktop computers, while still retaining their mobility advantage. Following this trend multiple extensions...

  • Facial emotion recognition using depth data

    Publication

    - Year 2015

    In this paper an original approach is presented for facial expression and emotion recognition based only on depth channel from Microsoft Kinect sensor. The emotional user model contains nine emotions including the neutral one. The proposed recognition algorithm uses local movements detection within the face area in order to recognize actual facial expression. This approach has been validated on Facial Expressions and Emotions Database...

    Full text to download in external service

  • The Decisional DNA-Based Smart Bike for Internet of Things

    Publication

    - Year 2014

    In this paper, we introduce a novel application of the Internet of Things, the Decisional DNAbased Smart Bike. The Decisional DNA is a domain-independent, flexible and standard knowledge representation structure; it allows its domains to acquire and store experiential knowledge and formal decision events in an explicit way. By using Decisional DNA, the sensor-equipped bicycle is able to learn its user’s weight, riding habits, etc....

    Full text to download in external service

  • Number of active HCE cards installed in mobile phones (2017)

    Open Research Data
    open access

    HCE technology (Host Card Emulation), which enables contactless payments by phone in a similar way as in the case of a payment card. At the time of making the transaction, the phone is close to the terminal, practically the same as the payment card. This solution, like the others described previously, should be included in the elements of electronic...

  • Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange

    This paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...

  • Verpa bohemica (Krombh.) Schroet. (Morchellaceae) w Gdańsku.

    Publication
    • M. S. Wilga

    - Acta Botanica Cassubica - Year 2002

    Na obszarze Jaśkowego Lasu graniczącego z gdańskim Osiedlem Morena, w kwietniu 1997 roku stwierdzono stanowisko rzadkiego, ściśle chronionego gatunku grzyba - naparstniczki (smardzówki) czeskiej Verpa bohemica; nie był on dotąd notowany na Pomorzu Gdańskim. Gatunek został umieszczony na ''Czerwonej liście'' grzybów w kategorii ''narażone'' [V - vulnerable].

  • VAT rates in particular member states of the European Union in 2015

    Open Research Data
    open access

    Under European Union law, the minimum standard rate of VAT that Member States can apply is 15%. An upper limit has not been specified. Despite attempts to harmonize the value added tax rates, the range of tax rates applied between countries is large. Currently, Luxembourg uses the lowest standard rate (15%), and Hungary uses the highest (27%). Due to...

  • Disruption of the communication process on the example of ALEP-PL web application

    Publication

    - Year 2013

    By creating a dedicated web service, such as the presented ALEP-PL solution, you can not assume that its users have suffcient knowledge of the energy sector. This application is dedicated to the local energy planning. The ALEP-PL makes it easier to incorporate in the planning of key players in the local energy market. This group of ALEP-PL users represents mainly the ocials of energy companies and specialist offcers. In the paper...

  • Modern approaches to file system integrity checking

    Publication

    - Year 2008

    One of the means to detect intruder's activity is totrace all unauthorized changes in a file system.Programs which fulfill this functionality are called fileintegrity checkers. This paper concerns modernapproach to file system integrity checking. It reviewsarchitecture of popular systems that are widely used inproduction environment as well as scientific projects,which not only detect intruders but also take actions tostop their...

    Full text to download in external service

  • Ergonomics in Polish outpatient clinics

    Publication

    Outpatient clinics are structures In which ergonomics play a key role. This fact is associated with an often occurring risk of developing hospital-acquired infection. The risk increases with mistakes made in wrong planning the functional and spatial lay-out is subordinated to high utilitarian requirements, including hygienic and sanitary, and technological requirements. A properly planned structure allows to reduce dangers more...

  • Health monitoring services based on off-the-shelf mobile devices

    Publication

    - Year 2013

    Development of health monitoring systems usually involves usage of dedicated devices with provided guarantees in terms of their reliability. Those devices raise the cost of the whole system, because of which such platforms are limited only to specific areas and constrained number of users. Usage of off-the- shelf devices could lower the cost and bring those systems to the masses. The paper covers possible uses of common off-the-shelf...

  • Teaching High Performance Computing Using BeesyCluster and Relevant Usage Statistics

    Publication

    - Year 2014

    The paper presents motivations and experiences from using the BeesyCluster middleware for teaching high performance computing at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. Features of BeesyCluster well suited for conducting courses are discussed including: easy-to-use WWW interface for application development and running hiding queuing systems, publishing applications as services...

    Full text to download in external service