Wyniki wyszukiwania dla: PRIVACY - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: PRIVACY

Wyniki wyszukiwania dla: PRIVACY

  • Experimental generation of complex noisy photonic entanglement

    Publikacja
    • K. Dobek
    • M. Karpiński
    • R. Demkowicz-Dobrzański
    • K. Banaszek
    • P. Horodecki

    - LASER PHYSICS - Rok 2013

    We present an experimental scheme based on spontaneous parametric down-conversion to produce multiple-photon pairs in maximally entangled polarization states using an arrangement of two type-I nonlinear crystals. By introducing correlated polarization noise in the paths of the generated photons we prepare mixed-entangled states whose properties illustrate fundamental results obtained recently in quantum information theory, in particular those...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Multipartite secret key distillation and bound entanglement

    Publikacja

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable...

    Pełny tekst do pobrania w portalu

  • Antecedents and outcomes of social media fatigue

    Purpose – This study aims to explore which of four chosen factors (i.e. privacy concerns, FoMO, self-disclosure and time cost) induce a feeling of strain among Facebook users in terms of social media fatigue (SMF), and if this occurs, whether it further influences such outcomes as discontinuance of usage (DoU) and interaction engagement decrement (IED). Design/methodology/approach – Through an online structured questionnaire, empirical...

    Pełny tekst do pobrania w portalu

  • Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface

    Publikacja

    - Rok 2020

    Multimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Analiza danych osobowych przetwarzanych w systemach telekomunikacyjnych klasy IP PBX oraz metod ich anonimizacji za pomocą systemów SBC

    Publikacja

    Opisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The Innovative Faculty for Innovative Technologies

    A leaflet describing Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology. Multimedia Systems Department described laboratories and prototypes of: Auditory-visual attention stimulator, Automatic video event detection, Object re-identification application for multi-camera surveillance systems, Object Tracking and Automatic Master-Slave PTZ Camera Positioning System, Passive Acoustic Radar,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A survey of neural networks usage for intrusion detection systems

    In recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...

    Pełny tekst do pobrania w portalu

  • Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.

    Publikacja

    - Rok 2022

    ML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...

    Pełny tekst do pobrania w portalu

  • A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks

    Publikacja

    - Rok 2021

    For traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Federated Learning in Healthcare Industry: Mammography Case Study

    The paper focuses on the role of federated learning in a healthcare environment. The experimental setup involved different healthcare providers, each with their datasets. A comparison was made between training a deep learning model using traditional methods, where all the data is stored in one place, and using federated learning, where the data is distributed among the workers. The experiment aimed to identify possible challenges...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A framework of open government data (OGD) e-service quality dimensions with future research agenda

    Publikacja
    • C. H. Alexopoulos
    • S. Saxena
    • N. Rizun
    • S. Deo

    - Records Management Journal - Rok 2023

    Purpose This research paper aims to present a framework of open government data (OGD) relating to e-service quality dimensions. In addition, it provides a research agenda for the e-service delivery of OGD. Design/methodology/approach A literature review pertaining to e-service quality with special reference to e-government was delivered to deduce the key dimensions of e-service quality for OGD. Findings Five e-service quality dimensions...

    Pełny tekst do pobrania w portalu

  • Value co‐creation (VCC) and value co‐destruction (VCD) via open government data (OGD): Empirical case of Tanzania

    Publikacja
    • F. Ishengoma
    • D. Shao
    • R. G. da Silva
    • G. C. Wiedenhoft
    • C. H. Alexopoulos
    • N. Rizun
    • S. Saxena

    - Electronic Journal of Information Systems in Developing Countries - Rok 2024

    Having emphasized upon the potential benefits of Open Government Data (OGD) initiatives via value derivation and innovation pursuits of the stakeholders, it falls in place to complement this line of OGD research in the specific case of Tanzania, a developing country, to support the inferences. Specifically, it is important to understand the manner in which OGD VCC-one of the hinges of OGD initiatives- and OGD VCD-a possible fall...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Deep learning in the fog

    In the era of a ubiquitous Internet of Things and fast artificial intelligence advance, especially thanks to deep learning networks and hardware acceleration, we face rapid growth of highly decentralized and intelligent solutions that offer functionality of data processing closer to the end user. Internet of Things usually produces a huge amount of data that to be effectively analyzed, especially with neural networks, demands high...

    Pełny tekst do pobrania w portalu

  • Speaker Recognition Using Convolutional Neural Network with Minimal Training Data for Smart Home Solutions

    Publikacja

    - Rok 2018

    With the technology advancements in smart home sector, voice control and automation are key components that can make a real difference in people's lives. The voice recognition technology market continues to involve rapidly as almost all smart home devices are providing speaker recognition capability today. However, most of them provide cloud-based solutions or use very deep Neural Networks for speaker recognition task, which are...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Borders of Digital Art in the Context of the Information Society

    Publikacja

    The article shows the relationship between the development of information technologies, the characteristics of the information society and digital art. The broad possibilities of the digital world related to recording, storing and processing data (cyber text, big data, smart services) and the creation of virtual worlds are pointed out. The influence of the development of information technologies on the character of the works of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Digital Public Service Innovation: Framework Proposal

    Publikacja

    - Rok 2016

    This paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons

    Publikacja

    Recent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...

    Pełny tekst do pobrania w portalu

  • Optimizing Medical Personnel Speech Recognition Models Using Speech Synthesis and Reinforcement Learning

    Text-to-Speech synthesis (TTS) can be used to generate training data for building Automatic Speech Recognition models (ASR). Access to medical speech data is because it is sensitive data that is difficult to obtain for privacy reasons; TTS can help expand the data set. Speech can be synthesized by mimicking different accents, dialects, and speaking styles that may occur in a medical language. Reinforcement Learning (RL), in the...

    Pełny tekst do pobrania w portalu

  • Detection of People Swimming in Water Reservoirs with the Use of Multimodal Imaging and Machine Learning

    Publikacja

    - Rok 2024

    Every year in many countries, there are fatal unintentional drownings in different water reservoirs like swimming pools, lakes, seas, or oceans. The existing threats of this type require creating a method that could automatically supervise such places to increase the safety of bathers. This work aimed to create methods and prototype solutions for detecting people bathing in water reservoirs using a multimodal imaging system and...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Preferred Benchmarking Criteria for Systematic Taxonomy of Embedded Platforms (STEP) in Human System Interaction Systems

    Publikacja
    • A. Kwaśniewska
    • S. Raghava
    • C. Davila
    • M. Sevenier
    • D. Gamba
    • J. Rumiński

    - Rok 2022

    The rate of progress in the field of Artificial Intelligence (AI) and Machine Learning (ML) has significantly increased over the past ten years and continues to accelerate. Since then, AI has made the leap from research case studies to real production ready applications. The significance of this growth cannot be undermined as it catalyzed the very nature of computing. Conventional platforms struggle to achieve greater performance...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Fully Automated AI-powered Contactless Cough Detection based on Pixel Value Dynamics Occurring within Facial Regions

    Publikacja

    - Rok 2021

    Increased interest in non-contact evaluation of the health state has led to higher expectations for delivering automated and reliable solutions that can be conveniently used during daily activities. Although some solutions for cough detection exist, they suffer from a series of limitations. Some of them rely on gesture or body pose recognition, which might not be possible in cases of occlusions, closer camera distances or impediments...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Towards Scalable Simulation of Federated Learning

    Federated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Zastosowanie szablonów Trust Case w pracy z normą BS 7799

    Publikacja

    - Rok 2006

    Trust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...

  • Karol Lisowski mgr inż.

    Osoby

  • Automatic recognition of males and females among web browser users based on behavioural patterns of peripherals usage

    Publikacja

    - Internet Research - Rok 2016

    Purpose The purpose of this paper is to answer the question whether it is possible to recognise the gender of a web browser user on the basis of keystroke dynamics and mouse movements. Design/methodology/approach An experiment was organised in order to track mouse and keyboard usage using a special web browser plug-in. After collecting the data, a number of parameters describing the users’ keystrokes, mouse movements and clicks...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Piotr Dalka mgr inż.

    Osoby

  • Attitudes of oncology patients’ towards biospecimen donation for biobank research

    Publikacja

    - BMC CANCER - Rok 2024

    Background Since the biological material that remains after diagnostic and therapeutic procedures plays crucial role in biobank research, this study aims to explore cancer patients’ views on the donation of biospecimens for research purposes. Methods 548 oncology patients from two hospitals with oncology treatment units in Poznan, Poland,...

    Pełny tekst do pobrania w portalu

  • Framework for Integration Decentralized and Untrusted Multi-vendor IoMT Environments

    Publikacja

    - IEEE Access - Rok 2020

    Lack of standardization is highly visible while we use historical data sets or compare our model with others that use IoMT devices from different vendors. The problem also concerns the trust in highly decentralized and anonymous environments where sensitive data are transferred through the Internet and then are analyzed by third-party companies. In our research we propose a standard that has been implemented in the form of framework...

    Pełny tekst do pobrania w portalu

  • Magdalena Szuflita-Żurawska

    Magdalena Szuflita-Żurawska jest kierownikiem Sekcji Informacji Naukowo-Technicznej na Politechnice Gdańskiej oraz Liderem Centrum Kompetencji Otwartej Nauki przy Bibliotece Politechniki Gdańskiej. Jej główne zainteresowania badawcze koncentrują się w obszarze komunikacji naukowej oraz otwartych danych badawczych, a także motywacji i produktywności naukowej. Jest odpowiedzialna między innymi za prowadzenie szkoleń dla pracowników...

  • Literature review of user needs, toward user requirements

    Publikacja

    - Rok 2020

    This report has been developed in the frame of the IEA SHC Task 61 Subtask A “User requirements”. The main objective was to rethink and reformulate user requirements to lighting (daylighting and electric lighting) in public buildings on the basis of a thorough literature study. The work is a joint effort of a number of scientists and represents collective knowledge in this topic. The concept of Lighting quality is the one, among...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Activity-based payments: alternative (anonymous) online payment model

    Electronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...

    Pełny tekst do pobrania w serwisie zewnętrznym