An open and private-by-design Active and Healthy Ageing smart home platform
- Henry Llumiguano,
- María Espinosa,
- Sergio Jiménez,
- Jesús Fernandez-Bermejo,
- Xavier del Toro,
- Juan Carlos López
The increasing trend in the percentage of older people among the European population, and in the number of older people living alone, poses a number of challenges, some of which can be addressed from digital solutions monitoring and supporting ...
IT dynamic capabilities as a factor influencing Controlling Effectiveness
This paper concerns the influence of IT dynamic capabilities on controlling effectiveness. The main aim of the article is to verify whether IT dynamic capabilities strengthen the influence of dynamic capabilities of controlling on organizational ...
Dynamic capabilities of IT as a factor shaping servant leadership influence on organizational performance
The paper is devoted to the analysis of the role of IT dynamic capabilities on leadership influence on organizational performance. In particular, the analysis concentrates on servant leadership. It is assumed that the dynamic capabilities of IT ...
Detection of abnormal traffic and network intrusions based on multiple fuzzy rules
Fuzzy network intrusion detection systems use a set of fuzzy rules using symmetric Gaussian membership functions to determine the probability of specific or common network attacks. A fuzzy set can be formed to describe traffic on a particular ...
Cryptographic encoding in modern symmetric and asymmetric encryption
In this article, we address the global problem of improving the quality of cryptographic trans-forming information. There were revealed contradictions between the approaches to the development of encryption algorithms for information security ...
Use of a mobile learning application in the process of foreign vocabulary learning
Mobile devices and applications (apps), which have become an integral part of our lives, are gradually used for different purposes, including learning languages. Since vocabulary plays an important role in the process of foreign language learning, ...
Steady state visual evoked potential classification by modified KNN method
- Mariia Stadnyk,
- Mykhailo Fryz,
- Natalia Zagorodna,
- Valerii Muzh,
- Roman Kochan,
- Joanna Nikodem,
- Lukasz Hamera
The use of the modified k-nearest neighbor (KNN) method for binary classification of established visual potentials is substantiated. The importance of using special metrics is investigated, in which the diagnostic significance of both sets of ...
Residual classes based mathematical model of the computer system's reliability
It is also known, and it is practically shown that the use of a unposition number system in residual classes (RNS) allows you to drastically increase the speed of the computer system (CS). There are various approaches and difficulties regarding to ...
Informed Graph Convolution Networks for Multilingual Short Text Understanding
In the open domain environment, the state-of-the-art models cannot process analyze insufficient training data correctly. We propose an adaptive graph convolution network with informed machine learning for multilingual short text understanding to ...
Empower Keywords Generation for Short Texts with Graph-to-Sequence Learning
Keywords are useful in natural language tasks. However, it is a challenge task to extraction keywords from short texts. In which the model may be subject to impaction of topic dependence and poor text organization structure. To resolve this ...
Analysis of modern cloud services to ensure cybersecurity
- Yevhenii Pedchenko,
- Yevheniia Ivanchenko,
- Ihor Ivanchenko,
- Iryna Lozova,
- Daniel Jancarczyk,
- Pawel Sawicki
This article describes the use of cloud services. The analysis of the most popular cloud services and comparison of their basic functionality is carried out. Examples of practical application of cloud services among well-known companies around the ...
Concept of cybernetic ability estimation of a human-operator for next generation aircraft “fly-by-wireless”
Development of a society in last decades is characterized by automation of person activity in various spheres. In spite of achievements in the field of computer science and information technology, in most cases control systems by aircraft, railway ...
Methods of crypto-stable symmetric encryption in the residual number system
This paper proposes new symmetric cryptography algorithms of Residue Number System and its Modified Perfect Form. According to the first method, ciphertext is regarded as a set of residues to the corresponding sets of modules (keys) and decryption ...
Forecasting Basal Insulin for the Clinical Therapy of Juvenile Diabetes at Onset
Establishing insulin dosages for diabetic patients is getting a challenge right after a patient's admission to a hospital. This is mainly due to the physicians’ limited information on the current health state of a newly diagnosed patient. ...
On the Resilience of Shallow Machine Learning Classification in Image-based Malware Detection
- Rosangela Casolare,
- Giovanni Ciaramella,
- Giacomo Iadarola,
- Fabio Martinelli,
- Francesco Mercaldo,
- Antonella Santone,
- Michele Tommasone
Shallow machine learning is massively applied by researchers with the aim to detect (novel and unseen) malicious applications. Machine learning models are typically evaluated using malicious and trusted applications generated over a short period. ...
Augmented Reality for Scene Text Recognition, Visualization and Reading to Assist Visually Impaired People
Reading traffic signs while driving a car for visually impaired people and people with visual problems is a very difficult task for them. This task is encountered every day, sometimes incorrect reading of traffic signs can lead to very serious ...
Detection of data drift in a two-dimensional stream using the Kolmogorov-Smirnov test
In recent years, there has been an increasing amount of streaming information coming from time series. Learning from data appearing in real time is quite a call, due in part to the speed at which new data appears. Hidden data changes that are not ...
Knowledge-Intensive Business Service Projects – Characteristics and Implications for Project Management – a Preliminary Study
This research examines the characteristics of knowledge-intensive business service projects based on two cases of Enterprise System implementations. The study results confirm that knowledge asymmetry, ambiguity, opaque quality and co-production ...
Measuring Crowdfunding Attribute Values on the Example of the USA
The intensive development of crowdfunding which has altered the financing of many projects, makes it necessary to undertake research on this economic phenomenon. The participants in the crowdfunding process feel there are no precise analyzes and ...
Heuristics for shelf space allocation problem with vertical and horizontal product categorization
In this research, we proposed a practical shelf space allocation model with the vertical and horizontal categorization of products. Five groups of constraints, such as shelf, product, multi-shelves, orientation and band constraints, are ...
Monocular depth-based visual tracker for gait recognition
Recognition of human gait in the wild remains a weakly studied problem due to many factors. One of these factors is how to estimate the distance and location of a person in relation to the camera in order to find the best position for visual ...
Online Managerial Accounting education during the COVID-19 pandemic: A case study from Poland
The COVID-19 pandemic made the higher education providers give up traditional face-to-face education and change completely into distance learning. The primary objective of the study was to learn the opinions of the students majoring in Finance and ...
Multi-body Model Simulating Biodynamic Responseof the Seated Human under Whole-Body Vibration
In this paper a multi-degree of freedom model simulating biodynamic response of the seated human body is presented. The model consists of three masses connected by linear springs and dampers. The unknown model parameters are identified by means of ...
Catch Me If You Can: Online Classification for Near Real-Time Anomaly Detection in Business Process Event Streams
Near-real-time monitoring and classification of business process event streams is becoming more and more prominent. This also includes ensuring data quality for the application of downstream online process mining activities and therefore identify ...
Bicriteria Oversampling for Imbalanced Data Classification
The paper proposes bicriteria oversampling strategy for mining imbalanced data. We use two specialized criteria for oversampling -classification potential and distance from the borderline between minority and majority instances. The potential is ...
Approximate entropy and sample entropy algorithms in financial time series analyses
The goal of this comparative research is to assess regularity/irregularity in time series of stock market indices, in the context of their predictability, within the two-year pre-pandemic (2018-2019) and COVID-19 pandemic (2020-2021) periods. The ...
Digitalisation as a driving force for land grabbing in the Global South
The aim of this article is to present the impact of digitalisation on the intensification of land grabbing in the Global South in the context of the profound changes that have taken place in the world since the 1970s that have led to the emergence ...
Multi-segment, spatial biomechanical model of a human body
This paper presents issues related to selected human biomechanical models that have been and are being used to analyze human body motion, human interaction with the environment, vehicles, machines. The process of building a multi-segment human ...