Wyniki wyszukiwania dla: PRIVACY
-
Experimental generation of complex noisy photonic entanglement
PublikacjaWe present an experimental scheme based on spontaneous parametric down-conversion to produce multiple-photon pairs in maximally entangled polarization states using an arrangement of two type-I nonlinear crystals. By introducing correlated polarization noise in the paths of the generated photons we prepare mixed-entangled states whose properties illustrate fundamental results obtained recently in quantum information theory, in particular those...
-
Multipartite secret key distillation and bound entanglement
PublikacjaRecently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable...
-
Antecedents and outcomes of social media fatigue
PublikacjaPurpose – This study aims to explore which of four chosen factors (i.e. privacy concerns, FoMO, self-disclosure and time cost) induce a feeling of strain among Facebook users in terms of social media fatigue (SMF), and if this occurs, whether it further influences such outcomes as discontinuance of usage (DoU) and interaction engagement decrement (IED). Design/methodology/approach – Through an online structured questionnaire, empirical...
-
Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface
PublikacjaMultimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...
-
Analiza danych osobowych przetwarzanych w systemach telekomunikacyjnych klasy IP PBX oraz metod ich anonimizacji za pomocą systemów SBC
PublikacjaOpisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody...
-
The Innovative Faculty for Innovative Technologies
PublikacjaA leaflet describing Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology. Multimedia Systems Department described laboratories and prototypes of: Auditory-visual attention stimulator, Automatic video event detection, Object re-identification application for multi-camera surveillance systems, Object Tracking and Automatic Master-Slave PTZ Camera Positioning System, Passive Acoustic Radar,...
-
A survey of neural networks usage for intrusion detection systems
PublikacjaIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublikacjaML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Federated Learning in Healthcare Industry: Mammography Case Study
PublikacjaThe paper focuses on the role of federated learning in a healthcare environment. The experimental setup involved different healthcare providers, each with their datasets. A comparison was made between training a deep learning model using traditional methods, where all the data is stored in one place, and using federated learning, where the data is distributed among the workers. The experiment aimed to identify possible challenges...
-
A framework of open government data (OGD) e-service quality dimensions with future research agenda
PublikacjaPurpose This research paper aims to present a framework of open government data (OGD) relating to e-service quality dimensions. In addition, it provides a research agenda for the e-service delivery of OGD. Design/methodology/approach A literature review pertaining to e-service quality with special reference to e-government was delivered to deduce the key dimensions of e-service quality for OGD. Findings Five e-service quality dimensions...
-
Value co‐creation (VCC) and value co‐destruction (VCD) via open government data (OGD): Empirical case of Tanzania
PublikacjaHaving emphasized upon the potential benefits of Open Government Data (OGD) initiatives via value derivation and innovation pursuits of the stakeholders, it falls in place to complement this line of OGD research in the specific case of Tanzania, a developing country, to support the inferences. Specifically, it is important to understand the manner in which OGD VCC-one of the hinges of OGD initiatives- and OGD VCD-a possible fall...
-
Deep learning in the fog
PublikacjaIn the era of a ubiquitous Internet of Things and fast artificial intelligence advance, especially thanks to deep learning networks and hardware acceleration, we face rapid growth of highly decentralized and intelligent solutions that offer functionality of data processing closer to the end user. Internet of Things usually produces a huge amount of data that to be effectively analyzed, especially with neural networks, demands high...
-
Speaker Recognition Using Convolutional Neural Network with Minimal Training Data for Smart Home Solutions
PublikacjaWith the technology advancements in smart home sector, voice control and automation are key components that can make a real difference in people's lives. The voice recognition technology market continues to involve rapidly as almost all smart home devices are providing speaker recognition capability today. However, most of them provide cloud-based solutions or use very deep Neural Networks for speaker recognition task, which are...
-
Borders of Digital Art in the Context of the Information Society
PublikacjaThe article shows the relationship between the development of information technologies, the characteristics of the information society and digital art. The broad possibilities of the digital world related to recording, storing and processing data (cyber text, big data, smart services) and the creation of virtual worlds are pointed out. The influence of the development of information technologies on the character of the works of...
-
Digital Public Service Innovation: Framework Proposal
PublikacjaThis paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....
-
Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons
PublikacjaRecent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...
-
Optimizing Medical Personnel Speech Recognition Models Using Speech Synthesis and Reinforcement Learning
PublikacjaText-to-Speech synthesis (TTS) can be used to generate training data for building Automatic Speech Recognition models (ASR). Access to medical speech data is because it is sensitive data that is difficult to obtain for privacy reasons; TTS can help expand the data set. Speech can be synthesized by mimicking different accents, dialects, and speaking styles that may occur in a medical language. Reinforcement Learning (RL), in the...
-
Detection of People Swimming in Water Reservoirs with the Use of Multimodal Imaging and Machine Learning
PublikacjaEvery year in many countries, there are fatal unintentional drownings in different water reservoirs like swimming pools, lakes, seas, or oceans. The existing threats of this type require creating a method that could automatically supervise such places to increase the safety of bathers. This work aimed to create methods and prototype solutions for detecting people bathing in water reservoirs using a multimodal imaging system and...
-
Preferred Benchmarking Criteria for Systematic Taxonomy of Embedded Platforms (STEP) in Human System Interaction Systems
PublikacjaThe rate of progress in the field of Artificial Intelligence (AI) and Machine Learning (ML) has significantly increased over the past ten years and continues to accelerate. Since then, AI has made the leap from research case studies to real production ready applications. The significance of this growth cannot be undermined as it catalyzed the very nature of computing. Conventional platforms struggle to achieve greater performance...
-
Fully Automated AI-powered Contactless Cough Detection based on Pixel Value Dynamics Occurring within Facial Regions
PublikacjaIncreased interest in non-contact evaluation of the health state has led to higher expectations for delivering automated and reliable solutions that can be conveniently used during daily activities. Although some solutions for cough detection exist, they suffer from a series of limitations. Some of them rely on gesture or body pose recognition, which might not be possible in cases of occlusions, closer camera distances or impediments...
-
Towards Scalable Simulation of Federated Learning
PublikacjaFederated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...
-
Zastosowanie szablonów Trust Case w pracy z normą BS 7799
PublikacjaTrust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...
-
Karol Lisowski mgr inż.
Osoby -
Automatic recognition of males and females among web browser users based on behavioural patterns of peripherals usage
PublikacjaPurpose The purpose of this paper is to answer the question whether it is possible to recognise the gender of a web browser user on the basis of keystroke dynamics and mouse movements. Design/methodology/approach An experiment was organised in order to track mouse and keyboard usage using a special web browser plug-in. After collecting the data, a number of parameters describing the users’ keystrokes, mouse movements and clicks...
-
Piotr Dalka mgr inż.
Osoby -
Attitudes of oncology patients’ towards biospecimen donation for biobank research
PublikacjaBackground Since the biological material that remains after diagnostic and therapeutic procedures plays crucial role in biobank research, this study aims to explore cancer patients’ views on the donation of biospecimens for research purposes. Methods 548 oncology patients from two hospitals with oncology treatment units in Poznan, Poland,...
-
Framework for Integration Decentralized and Untrusted Multi-vendor IoMT Environments
PublikacjaLack of standardization is highly visible while we use historical data sets or compare our model with others that use IoMT devices from different vendors. The problem also concerns the trust in highly decentralized and anonymous environments where sensitive data are transferred through the Internet and then are analyzed by third-party companies. In our research we propose a standard that has been implemented in the form of framework...
-
Magdalena Szuflita-Żurawska
OsobyMagdalena Szuflita-Żurawska jest kierownikiem Sekcji Informacji Naukowo-Technicznej na Politechnice Gdańskiej oraz Liderem Centrum Kompetencji Otwartej Nauki przy Bibliotece Politechniki Gdańskiej. Jej główne zainteresowania badawcze koncentrują się w obszarze komunikacji naukowej oraz otwartych danych badawczych, a także motywacji i produktywności naukowej. Jest odpowiedzialna między innymi za prowadzenie szkoleń dla pracowników...
-
Literature review of user needs, toward user requirements
PublikacjaThis report has been developed in the frame of the IEA SHC Task 61 Subtask A “User requirements”. The main objective was to rethink and reformulate user requirements to lighting (daylighting and electric lighting) in public buildings on the basis of a thorough literature study. The work is a joint effort of a number of scientists and represents collective knowledge in this topic. The concept of Lighting quality is the one, among...
-
Activity-based payments: alternative (anonymous) online payment model
PublikacjaElectronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...