Filtry
wszystkich: 1489
wybranych: 1366
-
Katalog
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: VULNERABLE USERS
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublikacjaIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Low cost microwave X-band generator
PublikacjaA low cost microwave X-band generator for educational purposes was designed and built. Its simple construction and user's interface makes it suitable for a student laboratory.The generator is based on a single frequency conversion concept. It uses a digitally tunable PLL chip for intermediate frequency generation and an active frequency multiplier for frequency conversion. The generator covers 9,7 - 11 GHz part of the X frequency...
-
Detection of Face Position and Orientation Using Depth Data
PublikacjaIn this paper an original approach is presented for real-time detection of user's face position and orientation based only on depth channel from a Microsoft Kinect sensor which can be used in facial analysis on scenes with poor lighting conditions where traditional algorithms based on optical channel may have failed. Thus the proposed approach can support, or even replace, algorithms based on optical channel or based on skeleton...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublikacjaDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Quantum randomness protected against detection loophole attacks
PublikacjaDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....
-
Landscape of Automated Log Analysis: A Systematic Literature Review and Mapping Study
PublikacjaLogging is a common practice in software engineering to provide insights into working systems. The main uses of log files have always been failure identification and root cause analysis. In recent years, novel applications of logging have emerged that benefit from automated analysis of log files, for example, real-time monitoring of system health, understanding users’ behavior, and extracting domain knowledge. Although nearly every...
-
Impact of information systems (IS) infusion on Open Government Data (OGD) adoption
PublikacjaPurpose – This study aims to underline the possible influence of the moderator, information systems (IS) infusion, on Open Government Data (OGD) adoption and usage. Design/methodology/approach – Using the partial least squares-structural equation modeling methodological approach, the adapted unified theory of acceptance and use of technology (UTAUT) model has been used for understanding the role of themoderating variable, namely,...
-
An integrated e-learning services management system providing HD videoconferencing and CAA services
PublikacjaIn this paper we present a novel e-learning services management system, designed to provide highly modifiable platform for various e-learning tools, able to fulfill its function in any network connectivity conditions (including no connectivity scenario). The system can scale from very simple setup (adequate for servicing a single exercise) to a large, distributed solution fit to support an enterprise. Strictly modular architecture...
-
Verification and Benchmarking in MPA Coprocessor Design Process
PublikacjaThis paper presents verification and benchmarking required for the development of a coprocessor digital circuit for integer multiple-precision arithmetic (MPA). Its code is developed, with the use of very high speed integrated circuit hardware description language (VHDL), as an intellectual property core. Therefore, it can be used by a final user within their own computing system based on field-programmable gate arrays (FPGAs)....
-
Complex Monitoring of the Coastal Cliffs on the Example of Cliff in Jastrzebia Gora, Poland
PublikacjaThe cliff coasts, which are in total about 100 km long, are especially vulnerable to abrasion. The mean regression of the studied object which is the seacliff in Jastrzebia Gora depends on time. For example, from 1875 to 1937 the cliff regress 90 m in mean pace of 1.4 meter a year. Besides of natural factors causing the degradation, there is also an anthropogenic activity, which speeds up the abrasion process. Based on these informations,...
-
Arctic Freshwater Environment Altered by the Accumulation of Commonly Determined and Potentially New POPs
PublikacjaChemical composition of Arctic freshwater ecosystems depends on several factors. They include characteristics of the surrounding landscape, its lithology, geomorphology, vegetation, and hydrological features, as well as accumulation of anthropogenic pollution. In the Arctic, the problem of environmental contamination is widespread. That is why research on lakes and river catch-ments in terms of their chemical composition has enjoyed...
-
Virtual Whiteboard: A gesture-controlled pen-free tool emulating school whiteboard
PublikacjaIn the paper the so-called Virtual Whiteboard is presented which may be an alternative solution for modern electronic whiteboards based on electronic pens and sensors. The presented tool enables the user to write, draw and handle whiteboard contents using his/her hands only. An additional equipment such as infrared diodes, infrared cameras or cyber gloves is not needed. The user's interaction with the Virtual Whiteboard computer...
-
Internet photogrammetry as a tool for e-learning
PublikacjaAlong with Internet development, there were interactive applications which allow for remote sensing and photogrammetric analysis. An example of an application that can provide Earth images and make it possible to measure distances in these images is Google Earth. The authors, who have experience from 2001-2015 argue that it is possible and it is important to create more advanced photogrammetric network applications. In this there...
-
Zintegrowane działania komunikacyjne w internecie na przykładzie marki Żywiec Zdrój Smako-Łyk
PublikacjaArtykuł ma na celu ukazanie przykładów angażowania polskich internautów w kampanie komunikacji marketingowej realizowane dla marki Żywiec Zdrój Smako-Łyk. Analizie poddano treści odnoszące się bezpośrednio do marki oraz wybranych kampanii online prowadzonych w latach 2009–2015. W ostatnich latach w Polsce można obserwować coraz więcej kampanii wykorzystujących potencjał, jaki mają w sobie internauci. Cenne pomysły można pozyskać...
-
The transition of HIV within and between affected populations in Poland
PublikacjaThe aim of the paper is the estimation of probabilities that describe the transition of HIV within and between the following three populations: homosexual and bisexual men, injecting drug users and heterosexual persons in Poland in the years 1995-2006
-
Risks to Older People in Road Traffic
Publikacjahe article looks at road traffic risks and main trends from the perspective of older road users (drivers, cyclists, pedestrians). With a longer time to react, poor eyesight and hearing, impaired mobility, ill health and medication, older road users are put at risk. A comprehensive and pro-active strategy is needed to deal with these risk factors and meet the safety and mobility needs...
-
Determinanty kreowania wartości marki poprzez media społecznościowe w gospodarce sieciowej
PublikacjaGłównym problemem badawczym podejmowanym w pracy, jest określenie struktury czynników determinujących kreowanie wartości marki w mediach społecznościowych. Dla rozwiązania tego problemu wykonano dwa badania. Pierwsze z nich dotyczyło określenia relacji pomiędzy wartością marki a jej pozycją w sieciach społecznościowych (model BV). Badanie to zrealizowano w oparciu o metody ilościowe: analizę statystyczną danych wtórnych i danych...
-
Examining Acoustic Emission of Engineered Ultrasound Loudspeakers
PublikacjaMeasurement results of the sound emitted from an ultrasound custom-made system with high spatial directivity are presented. The proposed system is using modulated ultrasound waves which demodulate in nonlinear medium resulting in audible sound. The system is aimed at enhancing the users’ personal audio space, therefore the measurements are performed using the Head and Torso Simulator which provides the realistic reproduction of...
-
Targeting shelterin proteins for cancer therapy.
PublikacjaAs a global health challenge, cancer prompts continuous exploration for innovative therapies that are also based on new targets. One promising avenue is targeting the shelterin protein complex, a safeguard for telomeres crucial in preventing DNA damage. The role of shelterin in modulating ataxia- telangiectasia mutated (ATM) and ataxia-telangiectasia and Rad3-related (ATR) kinases, key players in the DNA damage response (DDR),...
-
Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management
PublikacjaThis article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...
-
Implementation of failover and load balancing algorithms in SIP PBX High Availability system
PublikacjaGoal of the project was to design a High Availability SIP VoIP system that guarantees access to additional services like auto-attendent and automatic call distribution. The realization of the project required system to have load balancing and failover algorithms implemented. From the end users’ point of view the whole system had to figure as a single element. After taking under consideration the known methods of implementations...
-
HCI-Based Wireless System for Measuring the Concentration of Mining Machinery and Equipment Operators
PublikacjaMaintaining stable and reliable working conditions is a matter of vital importance for various companies, especially those involving heavy machinery. Due to human exhaustion, as well as unpredicted hazards and dangerous situations, the personnel has to take actions and wisely plan each move. This paper presents a human–computer interaction (HCI)-based system that uses a concentration level measurement function to increase the safety...
-
Measurements and Simulations of Engineered Ultrasound Loudspeakers
PublikacjaSimulation and measurement results of the sound emitted from an ultrasound custom-made system with high spatial directivity are presented. The proposed system is using modulated ultrasound waves which demodulate in nonlinear medium resulting in audible sound. The system is aimed at enhancing the users’ personal audio space, therefore the measurements are performed using the Head and Torso Simulator which provides realistic reproduction...
-
Architektura przyszłości – przekraczanie granic poprzez interfejsy
PublikacjaArchitektura przyszłości rozpatrywana jest w kontekście rozwoju technologii cyfrowych, które umożliwiają nadawanie obiektom architektonicznym cech interfejsów. Przekraczanie granic dotyczy więc nadawania architekturze nowych funkcji - funkcjonalności zapożyczonych ze świata wirtualnego, emisji informacji oraz interakcji. W tym ujęciu „interfejs architektoniczny” stanowi płaszczyznę komunikacji pomiędzy obiektem architektonicznym...
-
Human Feedback and Knowledge Discovery: Towards Cognitive Systems Optimization
PublikacjaCurrent computer vision systems, especially those using machine learning techniques are data-hungry and frequently only perform well when dealing with patterns they have seen before. As an alternative, cognitive systems have become a focus of attention for applications that involve complex visual scenes, and in which conditions may vary. In theory, cognitive applications uses current machine learning algorithms, such as deep learning,...
-
Capacity Estimation of the OFDMA and SC-FDMA Radio Interface for UMTS-LTE
PublikacjaIn the paper a method of capacity estimation for the UMTS-LTE interface is presented. Both the OFDMA and SC-FDMA technology has been considered. A method of physical resource allocation for users is mentioned and analytical results of theoretical throuhput calculation are described.
-
Ontology clustering by directions algorithm to expand ontology queries
PublikacjaThis paper concerns formulating ontology queries. It describes existing languages in which ontologies can be queried. It focuses on languages which are intended to be easily understood by users who are willing to retrieve information from ontologies. Such a language can be, for example, a type of controlled natural language (CNL). In this paper a novel algorithm called Ontology Clustering by Directions is presented. The algorithm...
-
Analysing and processing of geotagged social media
PublikacjaThe use of location based data analysing tools is an important part of geomarketing strategies among entrepreneurs. One of the key elements of interest is social media data shared by the users. This data is analysed both for its content and its location information, the results help to identify trends represented in the researched regions. In order to verify the possibilities of analysing and processing of geotagged social media...
-
Acceptance Testing of Software Products for Cloud-Based On-Line Delivery
PublikacjaSoftware products intended for on-line delivery by distributors serving an open community of subscribers are developed in a specific life-cycle model, in which roles of the major stakeholders are strongly separated, unlike in any other software development model known in software engineering. Its specificity underlines the fact that a distributor of the final product, responsible for its acceptance for publication and delivery...
-
Multiuser Stereoscopic Projection Techniques for CAVE-Type Virtual Reality Systems
PublikacjaDespite the development of increasingly popular head mounted displays, CAVE-type systems may still be considered one of the most immersive virtual reality systems with many advantages. However, a serious limitation of most CAVE-type systems is the generation of a three-dimensional (3-D) image from the perspective of only one person. This problem is significant because in some applications, the participants must cooperate with each...
-
Encouraging pro-environmental behaviour through an educational mobile application: Preliminary insights from early adopters
PublikacjaThis article aims to explore the extent to which the educational mobile application PULA supports and promotes pro-environmental behaviours, identify the most utilised functionalities by early adopters, and explore the least engaged functionalities. The study employs a quantitative approach based on data collected from the application. The analysis provides a comprehensive understanding of users' experiences and behaviours within...
-
Encouraging Pro-environmental Behaviour Through an Educational Mobile Application: Preliminary Insights from Early Adopters
PublikacjaThis article aims to explore the extent to which the educational mobile application PULA supports and promotes pro-environmental behaviours, identify the most utilised functionalities by early adopters, and explore the least engaged functionalities. The study employs a quantitative approach based on data collected from the application. The analysis provides a comprehensive understanding of users' experiences and behaviours within...
-
Mobile Security: Threats and Best Practices
PublikacjaCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
Does the Use of Cell Phones and Headphones at the Signalised Pedestrian Crossings Increase the Risk of Accident?
PublikacjaReduction of the number of fatalities among pedestrians remains a topical issue in Poland. For many years, this percentage has remained at around 30% of all those who were killed on the road. At the same time, there is an increase in the use of electronic devices by pedestrians and cyclists that may affect their perception when crossing the road. This can lead to traffic accidents. In order to investigate the problem, field studies...
-
Organizational Resilience in Hospitality and Tourism
PublikacjaAlthough ‘VUCA’ is not a new term, the features of the world it describes, a volatile, uncertain, complex and ambiguous environment, have never been more valid. The VUCA world has become the new reality for business, specifically for hospitality and tourism organizations that are more vulnerable than any other sector due to the historically-recognized turbulent environment in which they operate. In this book, the authors present...
-
Comparative analysis of different numerical models of a steel radial gate
PublikacjaHydrotechnical structures are important components in water management system and general flooding safety. Their reliability should be ensured since potential damage might lead to catastrophic consequences. Weir gates are considered to be highly vulnerable elements of each hydro power plant, with regard to its dynamic resistance. The aim of the paper is to compare different numerical models and their influence on the results of...
-
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
PublikacjaAutomatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...
-
Social change: from the Solidarity y tmovement too urban movements -– a Design Thinking approach in co-producing city of Gdansk
PublikacjaThis paper presents a model of bottom-up revitalization of Gdansk's urban quarter using Design Thinking approach as users needs oriented method co-producing of space. This project is introduced as a possible canva to elaborate the model of intervention for other spaces in need of similar intervention.
-
Badanie aktywności online polskich konsumentów dotyczącej marek
PublikacjaRozwój nowych trendów w internecie, a w szczególności Web 2.0, spowodował wzrost społecznego zaangażowania internautów oraz dalszy rozwój kanałów społecznościowych i tym samym różnego typu platform interaktywnych. Internet zachęca internautów do interakcji z witrynami, a za ich pośrednictwem z innymi użytkownikami sieci. Umożliwia im tworzenie treści na temat różne tematy, w tym na przykład związany z markami produktów. Dzięki...
-
Mixed electromagnetic - circuits modeling and parallelization for rigorouscharacterization of cosite interference in wireless communication channels. W: UGC 2002 Homepage [online]. Department of Defense High Performance Com- puting Modernization Program. Users Group Conference 2002. Austin, Texas, USA. June 10-14, 2002. [Dostęp: 15 grudnia**2002]. Dostępny w World Wide Web: http://www.hpcmo.hpc.mil/Htdocs/UGC/UGC02/paper/[45 slajdów]. Modelowanie układów elektromagnetycznych i zrównoleglanie w celu określenia wzajemnych oddziaływań w bezprzewodowych kanałach komunikacyjnych.
PublikacjaRównoległe działanie sąsiadujące modułów nadawczo-odbiorczych typowo prowa-dzi do efektów ubocznych z powodu wzajemnych oddziaływań, które obniżają pa-rametry sieci. W celu scharakteryzowania takich efektów, zaprezentowano roz-wiązanie równań Maxwella w dziedzinie czasu z modelowaniem efektów nielinio-wych.
-
Practical I-Voting on Stellar Blockchain
PublikacjaIn this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...
-
Refurbishment of a historical building - design issues
PublikacjaOver a 10-year modernization of the main building of Gdansk University of Technology is coming to the end. The ever increasing number of students requires not only the development of the campus with new facility buildings, also the existing buildings are subject to adaptation and modernization. In addition to high-impact solutions, as restoring the former glory of the building (reconstruction of the clock tower), or introducing...
-
Open extensive IoT research and measurement infrastructure for remote collection and automatic analysis of environmental data.
PublikacjaInternet of Things devices that send small amounts of data do not need high bit rates as it is the range that is more crucial for them. The use of popular, unlicensed 2.4 GHz and 5 GHz bands is fairly legally enforced (transmission power above power limits cannot be increased). In addition, waves of this length are very diffiult to propagate under field conditions (e.g. in urban areas). The market response to these needs are the...
-
Pedestrian protection, speed enforcement and road network structure the key action for implementing Poland's Vision Zero
PublikacjaSince 1991 Poland's road safety has been systematically improving with a 60% reduction in road deaths. Despite the progress Poland continues to be one of the European Union' worst performing countries. The country's main road safety problems remain unchanged: dangerous behaviour of road users, underdeveloped system of road safety management and low quality of road infrastructure. This is why subsequent road safety programmes (implemented...
-
How to Design Affect-aware Educational Systems – the AFFINT Process Approach
PublikacjaComputer systems, that support learning processes, can adapt to the needs and states of a learner. The adaptation might directly address the knowledge deficits and most tutoring systems apply an adaptable learning path of that kind. Apart from a preliminary knowledge state, there are more factors, that influence education effectiveness and among those there are fluctuating emotional states. The tutoring systems may recognize or...
-
The Application of the IODA Document Architecture to Music Data
PublikacjaThis paper is concerned with storing music data with the use of document architecture called Interactive Open Document Architecture (IODA). This architecture makes it possible to create documents which are executable, mobile, interactive and intelligent. Such documents consist of many files that are semantically related to each other. Semantic links are defined in XML files which are a part of a document. IODA documents with music...
-
Unveiling the Green Mirage: Unearthing Weaknesses in Pro-Environmental Applications
PublikacjaGrowing ecological concerns and a general shift towards tailored digitized solutions in cities lead to an increased popularity of pro ecological applications, especially those associated with transport-oriented functionalities. This research focuses on the results from a testbed of a pro-environmental application deployment among early adopters. Based on quantitative and cartographic analysis enriched with interviews’ results,...
-
Identification of Risk Factors for Collisions Involving Cyclists Based on Gdansk Example
PublikacjaThe role of pedestrian and bicycle traffic in Poland has growing trend. The comprehensive traffic study, conducted in Gdansk in 2016, has confirmed the increase in the number of cyclists and their share in the modal split. Therefore, it is particularly important to ensure the safety of this group of unprotected road users. Only in 2015 on the roads of Gdansk occurred 93 accidents (excluding collisions) involving cyclists. As a...
-
Brand loyalty creation in the social network. Does the product category matter?
PublikacjaThe final goal of all marketers’ effort is to achieve a high level of loyalty toward their brands. Social network brand sites are increasingly attracting the attention of scientists and managers intrigued by their potential application for brand loyalty creation. The aim of this research, based on European sample, is to fill the gap in understanding the product category loyalty and brand loyalty relation as an output of brand identification...
-
Photoelectron-photoabsorption (PePa) database
PublikacjaIn this paper a recently launched Photoelectron-Photoabsorption Database is presented. The database was developed in order to gather all the photoelectron and photoabsorption spectra measured by various collaborators over the years as well as to ease the access to the data to the potential users. In the paper the main features of the database were described and its outline explained.