Wyniki wyszukiwania dla: WEBQUEST
-
Webquest- dobra praktyka w e-Learningu
PublikacjaW dobie informatyzacji i pokonywania barier wdrażania e-technologii na uczelniach wyższych uważa się, że jedną z najczęściej stosowanych aktywizujących technik nauczania wśród nauczycieli akademickich jest metoda projektu (ang. project-based learning). W niniejszym opracowaniu proponuje się zastosowanie w procesie edukacji na wyższej uczelni, metody webquest. Jest ona dużo rzadziej stosowana w praktyce. Opracowano ją w oparciu...
-
Architecture of Request/Response and Publish/Subscribe System Capable of Processing Multimedia Streams
PublikacjaAnaliza ''w locie'' (ang. on-the-fly) strumieni multimedialnych, zawierających wysokiej jakości dane obrazu i dźwięku, wciąż stanowi wyzwanie dla projektantów oprogramowania. Praca przedstawia architekturę systemu zdolnego do przetwarzania w czasie rzeczywistym strumieni multimedialnych przy użyciu komponentów działających w architekturze Publish/Subscribe oraz Request/Response, korzystających z możliwości Java Multimedia Framework...
-
Architecture of Request/Response and Publish/Subscribe System Capable of Processing Multimedia Streams
PublikacjaAbstrakt Analiza ''w locie'' (ang. on-the-fly) strumieni multimedialnych, zawierających wysokiej jakości dane obrazu i dźwięku, wciąż stanowi wyzwanie dla projektantów oprogramowania. Praca przedstawia architekturę systemu zdolnego do przetwarzania w czasie rzeczywistym strumieni multimedialnych przy użyciu komponentów działających w architekturze Publish/Subscribe oraz Request/Response, korzystających z możliwości Java Multimedia...
-
Webquest w nauczaniu. Dlaczego warto stosować tę metodę?
WydarzeniaWebquest to metoda pracy projektowej zorientowanej na badanie w oparciu o instrukcję umieszczoną na stronie internetowej i dobór wiarygodnych źródeł informacji. Jak wykorzystać tę metodę w przedmiotach akademickich?
-
Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation
PublikacjaIn client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...
-
Performance of ASON/GMPLS architecture in condition of wavelength conversion and without wavelength conversion
PublikacjaThe paper regards the problem of ASON/GMPLS performance in condition of wavelength and without wavelength conversion. The authors present influence analysis in condition of wavelength and non-wavelength conversion on the ASON/GMPLS control plane performance represented by mean Connection Set-up Time E (CST) and request loss probabilities. The offered traffic to the transport layer and request intensity have been changed for evaluation...
-
Generalized access control in hierarchical computer network
PublikacjaThe paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...
-
Creative sprints: an unplanned broad agile evaluation and redesign process.
PublikacjaWe report how a request for routine usability work rapidly evolved into a novel agile process for evaluation and redesign. This process is described and then analysed to identify reasons for success. This analysis supports realistic knowledge transfer between User Experience professionals by outlining how similar future processes could succeed.
-
Active and Dynamic Graphical Code for Object Identification in Healthcare
PublikacjaA new approach for item marking using two dimensional discrete graphics markers. Proposed solution allow o change the code rapidly, upon request and in the case of thermal markers make the code invisible for unauthorized observers. Connecting the proposed codes with wearable multmedial platform such as eGlasses can create new possibilities in human-environment interaction.
-
Uprawnienie do uzyskania od administratora informacji o odbiorcach lub o kategoriach odbiorców a cele prawa dostępu do danych. Glosa do wyroku TS z dnia 12 stycznia 2023 r., C-154/21 (RW przeciwko Österreichische Post AG)
PublikacjaGiven the complexity of modern data processing, individuals often do not know to whom controllers provide the information collected about them. In the commented judgment, the Court ruled that the controller is bound by the data subjects’ request to access information about the identity of the specific recipients of their data and has limited ability to provide them with information about the categories of recipients. This interpretation...
-
Computer application for railway track realignment
PublikacjaThe topic of this article is the issue of railway track realignment. For this purpose, a computer software application was created that supports computations and generates a report needed for regulation of the trajectory of the railway. This program gives the ability to import data from measurement of the railway trajectory and then perform the calculation of the mathematical realignment. The result of this calculation is the basis...
-
Influence analysis of selected parameters on the ASON/GMPLS control plane performance
PublikacjaThe paper regards the problem of ASON/GMPLS performance. The authors present influence analysis of selected parameters on the ASON/GMPLS control plane performance represented in mean Connection Set-up Time E(CST) and mean Connection Release Time E(CRT). The selected parameters are: offered traffic, request intensity and proportion of requests class. The influence analysis is performed with simulation method by using OMNeT++ discrete-event...
-
Przegląd metod oceny struktur przestrzennych w warunkach zrównoważonego rozwoju
Publikacjathe article "the assessment methods' review of urban structures in the sustainable development context" presents various methods along with tools and ways how to apply them. mainly it is based on methods' descriptions contained in bequest programme (building environmental quality evaluation sustainability through time). the assessment should improve formation of the built environment and practical realization of the idea of sustainable...
-
Indirect control over subordinate units
PublikacjaDeveloping a game universe usually involves creation of various units which can be both, encountered by a player or controlled by him. There is a number of works considering autonomous behaviours of units wandering around the game world. When it comes to the units controlled by the player, they often are lack of autonomy and are strictly controlled by the player. This paper presents a concept of units behaviour depending on their...
-
INDIRECT CONTROL OVER SUBORDINATE UNITS
PublikacjaDeveloping a game universe usually involves creation of various units which can be both, encountered by a player or controlled by him. There is a number of works considering autonomous behaviors of units wandering around the game world. When it comes to the units controlled by the player, they are often deprived of autonomy and are strictly controlled by the player. This paper presents a concept of units behavior depending on their...
-
Introduction of SAF-T in selected European countries together with applicable national names
Dane BadawczeAmong the methods used by individual countries in norder to seal the tax collection the introduction of the Standard Audit File for Tax is one of the most important ones.
-
Aspect-Oriented Management of Service Requests for Assurance of High Performance and Dependability
PublikacjaA new approach to service requests management in case of insufficient hardware resources is proposed. It is based on wide aspects of requests analysis and it assures reliable and fast access to priority services. Requests are analyzed for, among others, time of occurrence, category of user who made the request, type of service, current system load and hardware utilization. Deterministic but dynamic rules help to manage system load...
-
Burnout as a State: Random-Intercept Cross-Lagged Relationship Between Exhaustion and Disengagement in a 10-Day Study [Response to Letter]
PublikacjaWe are writing in response to the Letter to the Editor by Block, Bair, and Carillo regarding our study, which took a multilevel approach to examine cross-lagged and co-existing relationships between exhaustion and disengagement, measured daily for ten consecutive working days using the Oldenburg Burnout Inventory (OLBI). We assessed the job burnout symptoms using only eight items, all of them worded negatively. Following Block,...
-
RSVP-TE as a reservation protocol for optical networks
PublikacjaIn this paper, we consider the reservation of optical resources problem. We implement extensions for RSVP-TE (Resource ReSerVation Protocol with Traffic Engineering Extension) to achieve the new functionality for optical resources reservation. Based on ASON/GMPLS architecture we examine an open source implementation KOM RSVP-Engine and extend its functionality according to ITU-T and IETF recommendations. The transport plane consists...
-
Analiza statyczna i wytrzymałościowa konstrukcji wiszącej zadaszenia Stadionu Śląskiego
PublikacjaW artykule scharakteryzowano konstrukcję nośną zadaszenia Stadionu Śląskiego w Chorzowie, system statyczny i przyjęte rozwiązania konstrukcyjne. Przedstawiono poziom wytężenia kluczowych elementów oraz wytyczne dotyczące wzmocnienia. Analizy przeprowadzono w ramach audytu dokumentacji projektowej wykonanego na zlecenie inwestora.