Filtry
wszystkich: 32141
wybranych: 7755
-
Katalog
- Publikacje 7755 wyników po odfiltrowaniu
- Czasopisma 1635 wyników po odfiltrowaniu
- Konferencje 255 wyników po odfiltrowaniu
- Wydawnictwa 2 wyników po odfiltrowaniu
- Osoby 1072 wyników po odfiltrowaniu
- Projekty 93 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Aparatura Badawcza 1 wyników po odfiltrowaniu
- Kursy Online 194 wyników po odfiltrowaniu
- Wydarzenia 18 wyników po odfiltrowaniu
- Dane Badawcze 21114 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: applied information technology
-
Introduction to the special issue on intelligent systems to aid the handicapped.
PublikacjaWśród wielu zastosowań sztucznej inteligencji i technologii bazodanowych pojawiają się zastosowania wspierające osoby niepełnosprawne. Z chwilą pojawienia są każdej nowej technologii komputerowej świat naukowy proponuje zastosowania tej technologii do celu poprawy komunikacji z osobami niepełnosprawnymi bądź technologie wspierające te osoby bezpośrednio. Niniejsze wydanie specjalne czasopisma Journal of Intelligent Information...
-
Frequency response spectra applied to assess efficiency of the training techniques
PublikacjaThe purpose of the research is to assess the increase of the muscle strength and power. Movement of the human body when the moving one impacts a stationary or moving body is taken under consideration. The waveform produced by an impact is transformed into frequency domain. The acceleration record is transformed as a complex spectrum, by the use of a Discrete Fourier Transformation. In this paper the applications of the discrete...
-
Lighting Design for the 21st Century Applied research in lighting practice
PublikacjaFor those who are unfamiliar with research, it’s important to know there are two categories. Fundamental (or basic) research and applied research. Basic research often discusses scientific ideas/theories, whereas, applied research explores testing these ideas in practice to develop technology or techniques. It’s applied research which most interests lighting practitioners. Great lighting design that creates a pleasant and beneficial...
-
Superadditivity of two quantum information resources
PublikacjaEntanglement is one of the most puzzling features of quantum theory and a principal resource for quantum information processing. It is well known that in classical information theory, the addition of two classical information resources will not lead to any extra advantages. On the contrary, in quantum information, a spectacular phenomenon of the superadditivity of two quantum information resources emerges. It shows that quantum...
-
Demonstrator testera wbudowanego BIST dla układów w pełni różnicowych
PublikacjaPrzedstawiono demonstrator testera wbudowanego, przeznaczony do pracy na stanowisku dydaktycznym w laboratorium z przedmiotu Zaawansowane Metody Pomiarowe i Diagnostyczne. Na stanowisku studenci zapoznają się z technologią BIST (ang. Built-In Self-Test), która jest przykładem wdrożenia strategii projektowania dla testowania.
-
BEZCZUJNIKOWE STEROWANIE WOLNOOBROTOWYM SILNIKIEM PMSM Z KOMPENSACJĄ MOMENTU ZACZEPOWEGO
PublikacjaW pracy przedstawiono propozycję rozwiązania problemu bezczujnikowego sterowania wolnoobrotową maszyną synchroniczną z magnesami trwałymi PMSM. Przedstawiono silnik PMSM, który zastosowano w stanowisku badawczym. Omówiono problem występowania tętnień momentu napędowego wynikający głównie ze znacznego momentu zaczepowego. Pokazano rozwiązanie kompensujące tętnienia momentu napędowego w silniku PMSM. Przygotowano procedurę startową...
-
Comparison of technology adoption models
PublikacjaThere are several technology adoption models, that try to explain, how and why the technologies are adopted and used. Among those, that are widely used to explain, how the older adults accept technologies, there are some general models and models specific to the group of older users. Among the general ones I would recommend paying attention to the following models: Technology Acceptance Model (TAM) proposed by Davis...
-
Applying Web 2.0 Concepts to Creating Energy Planning Portal
PublikacjaCommunity authorities in Europe are tasked to create Advanced Local Energy Plans (ALEP), which encompasses collecting local data on current energy use and generation, as well as generating future development scenarios. Both the data and the development scenarios must be publicly accessible as a basis for energy-related decisions taken by residents, local companies and other local institutions. The data must partially be collected...
-
Information-driven network resilience: Research challenges and perspectives
PublikacjaInternet designed over 40 years ago was originally focused on host-to-host message delivery in a best-effort manner. However, introduction of new applications over the years have brought about new requirements related with throughput, scalability, mobility, security, connectivity, and availability among others. Additionally, convergence of telecommunications, media, and information technology was responsible for transformation...
-
Wroclaw University of Technology Knowledge Repository - project objectives
PublikacjaKnowledge Repository is a project created in the Library and Scientific Information Centre of Wroclaw University of Technology (WrUT). Its main task will be collecting, sharing, and promoting scientific publications of researchers, postgraduates and students of WrUT. It will be also used for bibliometric analysis and reporting research output of WrUT scientific community.Knowledge Repository will closely cooperate with other databases...
-
Information Retrieval with the Use of Music Clustering by Directions Algorithm
PublikacjaThis paper introduces the Music Clustering by Directions (MCBD) algorithm. The algorithm is designed to support users of query by humming systems in formulating queries. This kind of systems makes it possible to retrieve songs and tunes on the basis of a melody recorded by the user. The Music Clustering by Directions algorithm is a kind of an interactive query expansion method. On the basis of query, the algorithm provides suggestions...
-
Information and Communication Technologies for Economic Development
PublikacjaThis chapter is intended to explain why and how information and communication technologies may affect the process of socio-economic development, especially with regard to economically backward economies. It sheds light on why technological changes constitute prerequisites enabling advancements along the socio-economic development pattern. It is also designed to exhibit the special relevance of information and communication technologies...
-
The influence of IT-competency dimensions on job satisfaction, knowledge sharing and performance across industries
PublikacjaPurpose – Technology makes knowledge management easier. Knowledge sharing is essential for organizational development. Job satisfaction fosters knowledge sharing. Hence, this study aims to develop an understanding of the mutual relationship between knowledge sharing and job satisfaction when both are predicted by information technology (IT)-competency dimensions such as IT-operations, IT-knowledge and IT-infrastructure in the context...
-
Activity-based payments: alternative (anonymous) online payment model
PublikacjaElectronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...
-
Sliding burnishing technology of holes in hardened steel
PublikacjaNew technology with sliding burnishing of holes with cylindrical surface, made of hardened steel /60 HRC/, is presented in the paper.After burnishing operation on hole diameter 30 mm in satellite gear wheel the surface roughness parameter Ra=0,02-0,04 micrometers was obtained. The method and results of research as technological conclusion are presented.
-
Architecture Design of a Networked Music Performance Platform for a Chamber Choir
PublikacjaThis paper describes an architecture design process for Networked Music Performance (NMP) platform for medium-sized conducted music ensembles, based on remote rehearsals of Academic Choir of Gdańsk University of Technology. The issues of real-time remote communication, in-person music performance, and NMP are described. Three iterative steps defining and extending the architecture of the NMP platform with additional features to...
-
Database of speech and facial expressions recorded with optimized face motion capture settings
PublikacjaThe broad objective of the present research is the analysis of spoken English employing a multiplicity of modalities. An important stage of this process, discussed in the paper, is creating a database of speech accompanied with facial expressions. Recordings of speakers were made using an advanced system for capturing facial muscle motion. A brief historical outline, current applications, limitations and the ways of capturing face...
-
Internet technology in education - offer of Gdansk University of Technology.
PublikacjaW artykule przedstawiono ofertę szkoleń Centrum Edukacji Niestacjonarnej Politechniki Gdańskiej oraz możliwości jej wykorzystania na Wydziale Inżynierii Lądowej w studiach doktoranckich i podyplomowych, które zostaną uruchomione w ramach V Programu Ramowego Unii Europejskiej, Centra Doskonałości (projekt CURE - Centre for Urban Construction and Rehabilitation: Technology Transfer, Research and Education). Zaprezentowano model nauczania...
-
Average Redundancy of the Shannon Code for Markov Sources
PublikacjaIt is known that for memoryless sources, the average and maximal redundancy of fixed–to–variable length codes, such as the Shannon and Huffman codes, exhibit two modes of behavior for long blocks. It either converges to a limit or it has an oscillatory pattern, depending on the irrationality or rationality, respectively, of certain parameters that depend on the source. In this paper, we extend these findings, concerning the Shannon...
-
Semi-definite programming and quantum information
PublikacjaThis paper presents a comprehensive exploration of semi-definite programming (SDP) techniques within the context of quantum information. It examines the mathematical foundations of convex optimization, duality, and SDP formulations, providing a solid theoretical framework for addressing optimization challenges in quantum systems. By leveraging these tools, researchers and practitioners can characterize classical and quantum correlations,...
-
Sources of Market Information, Its Quality and New Product Financial Performance
PublikacjaWhile we observe a growing interest in the role of market information in new product development (NPD), existing research has still largely ignored the quality of market information that is a crucial issue in the era of the information society. What does affect the quality of market information in new product development projects, and how does this quality influence the financial performance of new products? In this paper, we address...
-
Operating system security by integrity checking and recovery using write-protected storage
PublikacjaThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
NO-BROADCASTING OF NON-SIGNALLING BOXES VIA OPERATIONS WHICH TRANSFORM LOCAL BOXES INTO LOCAL ONES
PublikacjaWe deal with families of probability distributions satisfying non-signalling condition, called non-signalling boxes and consider a class of operations that transform local boxes into local ones (the one that admit LHV model). We prove that any operation from this class cannot broadcast a bipartite non-local box with 2 binary inputs and outputs. We consider a function called anti-Robustness which can not decrease under these operations....
-
“Project-factor-decision”. Decisive factors in IT projects and their impact on its success
PublikacjaThe aim of this article is to indicate the need for a deepening, systematizing and codifying of the theoretical and practical knowledge on IT project management, in the area of management decision-making processes. The scope of decisions made by managers is constantly on the increase. Project managers make decisions not only within the classic triangle of constraints, which consists of a schedule, a budget and the project scope,...
-
Edge-chromatic sum of trees and bounded cyclicity graphs
Publikacja -
Platform governance for sustainable development: Reshaping citizen-administration relationships in the digital age
PublikacjaChanging governance paradigms has been shaping and reshaping the landscape of citizen-administration relationships, from impartial application of rules and regulations by administration to exercise its authority over citizens (bureaucratic paradigm), through provision of public services by administration to fulfil the needs of citizens (consumerist paradigm), to responsibility-sharing between administration and citizens for policy...
-
Universal and contextualized public services: Digital public service innovation framework
PublikacjaIn view of the rising social and economic inequalities, public service delivery should be both universal, i.e. independent of the recipients' social or economic status, and contextualized, i.e. able to compensate for different local needs and conditions. Reconciling both properties requires various forms of innovations, chief among them innovations in digital public services. Building upon the four-stage model underpinning the...
-
Implementing Sustainable Development Goals with Digital Government – Aspiration-capacity gap
PublikacjaSustainable Development Goals (SDGs) represent a commitment by all United Nations Member States to pursue development efforts, including ending poverty and hunger, promoting well-being and education, reducing inequalities, fostering peace, and protecting the planet. Member States and their governments are supposed to take ownership of the SDGs, strengthen the implementation means, and improve public governance as both the means...
-
On the hardness of computing span of subcubic graphs
PublikacjaIn the paper we study the problem of finding ξ-colorings with minimal span, i.e. the difference between the largest and the smallest color used.
-
Complexity of weak acceptonic conditions in tree automata
PublikacjaRozważano złożoność problemu pustości dla automatów na drzewach ze słabymi warunkami akceptowalności. Rozważano także translacje pomiędzy słabymi i silnymi warunkami akceptowalności.
-
Maximum vertex occupation time and inert fugitive: recontamination does help [online]
PublikacjaRozważamy problem przeszukania danego grafu prostego G w celu przechwycenia niewidocznego i leniwego uciekiniera. Parametrem optymalizacyjnym, który minimalizujemy jest maksymalny czas (liczba tur strategii przeszukiwania), podczas których wierzchołek może być strzeżony (okupowany przez strażnika). Strategia monotoniczna to taka, która nie dopuszcza sytuacji, w której uciekinier dociera do wierzchołka, który wcześniej został oczyszczony....
-
Modelling of Diffusing Capacity Measurement Results in Lung Microangiopathy Patients. A novel Diagnostic Suppport
PublikacjaLung microangiopathy is a little known negative influence of diabetes mellitus on the functioning of the lungs. The aim of this study is to design a supportive method for diagnosing lung microangiopathy. This will be based on routinely performed pulmonary measurements as well as on investigation process modelling and data processing. A model of the diffusion of oxygen from the alveoli to the blood has been described with a set...
-
A note on mixed tree coloring
PublikacjaZaproponowano liniowy algorytm dla problemu kolorowania mieszanego w drzewach, uzyskując tym samym poprawę w stosunku do algorytmu o złożoności O(n^2) podanego w pracy [P. Hansen, J. Kuplinsky, D. de Werra, Mixed graph colorings, Math. Methods Oper. Res. 45 (1997) 145-160].
-
Trees having many minimal dominating sets
PublikacjaWe provide an algorithm for listing all minimal dominating sets of a tree of order n in time O(1.4656^n). This leads to that every tree has at most 1.4656^n minimal dominating sets. We also give an infinite family of trees of odd and even order for which the number of minimal dominating sets exceeds 1.4167^n, thus exceeding 2^{n/2}. This establishes a lower bound on the running time of an algorithm for listing all minimal dominating...
-
Cluster-based instance selection for machine classification
Publikacja -
An approximation algorithm for maximum P3-packing in subcubic graphs
PublikacjaW pracy podano algorytm 4/3-przyliżony dla trudnego obliczeniowo problemu umieszczania wierzchołkowo rozłącznych dwukrawędziowych ścieżek w grafach o stopniu maksymalnym 3 i stopniu minimalnym 2. Poprawiono tym samym wcześniejsze wyniki dla grafów kubicznych (A. Kelmans, D. Mubayi, Journal of Graph Theory 45, 2004).
-
The computational complexity of the backbone coloring problem for bounded-degree graphs with connected backbones
PublikacjaGiven a graph G, a spanning subgraph H of G and an integer λ>=2, a λ-backbone coloring of G with backbone H is a vertex coloring of G using colors 1, 2, ..., in which the color difference between vertices adjacent in H is greater than or equal to lambda. The backbone coloring problem is to find such a coloring with maximum color that does not exceed a given limit k. In this paper, we study the backbone coloring problem for bounded-degree...
-
Are quantum correlations symmetric?
PublikacjaWe provide operational definition of symmetry of entanglement: An entangled state contains symmetric entanglement if its subsystems can be exchanged (swapped) by means of local operations and classical communication. We show that in general states have asymmetric entanglement. This allows to construct nonsymmetric measure of entanglement, and a parameter that reports asymmetry of entanglement contents of quantum state. We propose...
-
ICT for Global Competitiveness and Economic Growth in Emerging Economies: Economic, Cultural, and Social Innovations for Human Capital in Transition Economies
Publikacja -
Open Source in Development: Enabling Business and Services
Publikacja -
ENTERPRISE ACTIVITIES MODELING BY BPMN NOTATION
PublikacjaDepending on the process behavior, available know-how and organizational goals, different techniques and tools can be used for business process modeling. We concentrate on e-commerce, and try to find the best marketing strategy for the sales process improvement. In the paper we present the multilayer approach to define enterprise scenarios. This allows us to collect the suitable knowledge necessary for enterprise analysis and improvement....
-
An approach to constructing genuinely entangled subspaces of maximal dimension
PublikacjaGenuinely entangled subspaces (GESs) are the class of completely entangled subspaces that contain only genuinely multiparty entangled states. They constitute a particularly useful notion in the theory of entanglement but also have found an application, for instance, in quantum error correction and cryptography. In a recent study (Demianowicz and Augusiak in Phys Rev A 98:012313, 2018), we have shown how GESs can be efficiently...
-
Design principles for creating digital transparency in government
PublikacjaUnder pressure to fight corruption, hold public officials accountable, and build trust with citizens, many governments pursue the quest for greater transparency. They publish data about their internal operations, externalize decision-making processes, establish digital inquiry lines to public officials, and employ other forms of transparency using digital means. Despite the presence of many transparency-enhancing digital tools,...
-
Mobile Security: Threats and Best Practices
PublikacjaCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
Quantum randomness protected against detection loophole attacks
PublikacjaDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....
-
Perspectives of Telematics Implementation in Tri-City Transport Systems Management and Planning
PublikacjaIn 2010 the City of Gdynia applied for match funding the project ''Implementation of the Integrated Traffic Management System TRISTAR in Tri-City" under the Operational Programme Infrastructure and Environment. This year the project has been placed on a list approved by the Ministry of Infrastructure. Tri-City proceeds with a tender for the implementation of the system. The project will be implemented in key elements are included...
-
Language of Benefits as a Novel Tool for Improving Website Personalization
PublikacjaA properly designed website allows the user to search for information faster, and more accurately. The information content of the website should be also adapted to the needs of the user. The purpose of this article is to present a novel Language of Benefits (LoB) approach to facilitate the use of websites for individual user groups. The LoB approach is an approach addressed to IT Analysts, to facilitate the process of web design,...
-
Zagrożenia bezpieczeństwa protokołów komunikacji morskiej, lotniczej i lądowej
PublikacjaW artykule przedstawiono przykładowe zagrożenia wykorzystujące słabości wybranych protokołów komunikacji morskiej, lotniczej i lądowej. Wskazano, jakie czynności należy podjąć, żeby się przed nimi ustrzec (przynajmniej częściowo). Opisano również kierunek, w jakim powinny być rozwijane analizowane protokoły, aby zwiększyć bezpieczeństwo osób je używających.
-
MOST Wiedzy jako narzędzie promocji otwartych zasobów nauki
PublikacjaRośnie znaczenie wiedzy zgromadzonej w różnego rodzaju systemach, w tym w kursach on-line. Połączenie systemów je przetwarzających z Internetem w znaczącym stopniu usprawniło rozprzestrzenianie informacji i zwiększyło jej dostępność. Coraz szersze uznanie zyskują ruchy Otwartego Dostępu (ang. Open Access). Politechnika Gdańska w ramach projektu Multidyscyplinarny Otwarty System Transferu Wiedzy – MOST Wiedzy buduje platformę o...
-
Promocja zasobów Pomorskiej Biblioteki Cyfrowej na przykładzie XVIII-wiecznego rękopisu
PublikacjaCelem artykułu jest przedstawienie sposobu udostępniania i promocji zbiorów rękopiśmiennych na przykładzie XVIII-wiecznego rękopisu Christiana Gabriela Fishera dostępnego w Pomorskiej Bibliotece Cyfrowej (dalej: PBC). Rękopis ten stał się inspiracją do podjęcia współpracy Biblioteki Politechniki Gdańskiej oraz Instytutu Kultury Miejskiej w Gdańsku. Dzięki wspólnej inicjatywie rozpoczęto prace nad transkrypcją niemieckiego tekstu...