Filters
total: 118
filtered: 101
Search results for: Quality Assurance
-
Understanding the Relation between HR Practices and Pull Approach to Knowledge Sharing: Case Study
PublicationThe aim of this study is to identify the relationship between human resource (HR) practices, knowledge seeking and knowledge giving by applying the lenses of the motivation-opportunities-abilities framework in the context of the multinational enterprise subsidiary located in Central Europe. The article presents the research results using qualitative methodology, mainly based on semi-structured interviews among employees of a...
-
Homogeneity study of candidate reference material (contaminated soil) based on determination of selected metals, PCBs and PAHs
PublicationReference materials (RMs) are an indispensable part of QA/QC system and have played a critical role in the continual expansion of analytical capabilities of the analytical laboratories. The homogeneity study of the candidate for reference material is essential for the quality of reference material (certified reference material) used in quality assurance activities. The homogeneity study of candidate for reference materials of contaminated...
-
Method of selecting programming practices for the safety-critical software development projects
PublicationIn recent years a plan-driven approach traditionally used in safety-critical software development has been put to a test by rapidly changing technologies, more diverse group of clients and volatile market requirements. The need to deliver good quality systems, faster and at lower cost in comparison to competitors encouraged companies to look for more efficient solutions. Agile methodologies are known to successfully address these...
-
Critical review of electronic nose and tongue instruments prospects in pharmaceutical analysis
PublicationElectronic nose (enose, EN) and electronic tongue (etongue, ET) have been designed to simulate human senses of smell and taste in the best possible way. The signals acquired from a sensor array, combined with suitable data analysis system, are the basis for holistic analysis of samples. The efficiency of these instruments, regarding classification, discrimination, detection, monitoring and analytics of samples in different types...
-
NADZOROWANIE WYPOSAŻENIA DO MONITOROWANIA I POMIARÓW WEDŁUG WYMAGAŃ WYBRANYCH NORM ORAZ PRZEPISÓW PRAWNYCH
Publication: Przyrządy pomiarowe stanowią zasadniczy element złożonego systemu oceny jakości wyrobów na wszystkich etapach produkcji. Odpowiednio zaprojektowane procedury opisujące procesy kontrolne i pomiarowe, sprawnie zorganizowane i przeprowadzane operacje monitorowania i pomiarów parametrów procesów i produktów oraz skutecznie funkcjonujący nadzór nad wyposażeniem do monitorowania i pomiarów w organizacji są podstawą do wykazania, że...
-
Analytics of Surfactants in the Environment: Problems and Challenges
PublicationSurfactants (surface active agents = SAAs) are a group of compoundswith specific physicochemical properties (amphiphilicity,solubility in polar and nonpolar liquids, ability to form micelles,adsorption at phase boundaries).1,2 Because of their properties,surface-active compounds are widely applied in industry and thehousehold (e.g., in detergents, personal-care products, paints,pesticides, petroleum products). As their applications...
-
AN ORIGINAL APPROACH IN THE FIELD OF PREPARATION REFERENCE MATERIALS OF VOLATILE ANALYTES
PublicationStandard gas mixtures (SGM) are indispensable reference materials for ensuring the reliability of analytical work. Reference materials are an excellent tool for the quality control and assurance of analytical results. Standard gas mixtures are unique among reference materials. The rapid progress of SGM production is connected with the instability of gaseous analytes which make them difficult to obtain. The use of standards with...
-
A simplified approach to determine the expiration date of certified reference material based on the results of monitoring long-term stability
PublicationAll components of the quality assurance (QA) system for measurement results depend heavily on certified reference materials (CRMs). There is a need for a comprehensive discussion of the stability study using the CRM statistical method. Monitoring involves periodic sampling and analysis of the CRM at predetermined intervals to continuously monitor stability without compromising its integrity. The obtained stability data is then...
-
Evaluation and application of data from road weather stations for winter maintenance management
PublicationThe paper presents the analysis of road weather data from meteorological stations located at the Polish national roads of Pomerania District during the impact of winter conditions. Presented issue is particularly important from the point of view the problem of winter maintenance and especially for prediction and assurance of quality of asphalt pavement surface ie. resistance to low temperature cracking or risk of glazed frost....
-
A method for the analysis of methylmercury and total Hg in fungal matrices
PublicationThe aim of the study was to develop an efficient method for the determination of monomethyl-mercury (MeHg) and total mercury (THg) content in materials such as fungal sporocarps and sclerotia. Certified Reference Materials (CRMs) with the assigned values of MeHg and THg as well as the control materials (dried mushrooms) with known content of THg were evaluated for method validation. Recovery of MeHg from reference materials was...
-
Ocena jakości wyników pomiarów analitycznych - klasyfikacja błędów, szacowanie niepewności pomiarów
PublicationW wielu dziedzinach, nie tylko nauki, ogromna ilość decyzji jest podejmowana na podstawie wyników badań analitycznych. Jest zatem oczywiste, że przywiązuje się coraz większą uwagę do ich jakości. Oznaczanie analitów na coraz niższych poziomach stężeń w próbkach charakteryzujących się coraz bardziej złożonym składem matrycy to jeden z głównych kierunków rozwojowych analityki chemicznej. Jest to zadanie niezwykle trudne i skomplikowane...
-
Assurance Case Patterns On-line Catalogue
PublicationAssurance case is an evidence-based argument demonstrating that a given property of a system (e.g. safety, security) is assured. Assurance cases are developed for high integrity systems, as in many industry domains such argu-ment is explicitly required by regulations. Despite the fact that each assurance case is unique, several reusable argument patterns have been identified and pub-lished. This paper reports work on development...
-
Uniform Model Interface for Assurance Case Integration with System Models
PublicationAssurance cases are developed and maintained in parallel with corresponding system models and therefore need to reference each other. Managing the correctness and consistency of interrelated safety argument and system models is essential for system dependability and is a nontrivial task. The model interface presented in this paper enables a uniform process of establishing and managing assurance case references to various types...
-
Development of the System Assurance Reference Model for Generating Modular Assurance Cases
PublicationAssurance cases are structured arguments used to demonstrate specific system properties such as safety or security. They are used in many industrial sectors including automotive, aviation and medical devices. Larger assurance cases are usually divided into modules to manage the complexity and distribute the work. Each of the modules is developed to address specific goals allocated to the specific objects i.e. components of the...
-
Introducing agile practices into development processes of safety critical software
PublicationIn this paper we present AgileSafe - a method which supports introduction of agile practices into safety-critical software development processes. To represent safety assurance constraints resulting from the regulatory context, AgileSafe uses assurance case patterns. The knowledge base of AgileSafe helps the user to select the agile practices relevant for the considered software development project. The corresponding assurance case...
-
Integrating Confidence And Assurance Arguments
PublicationTo be considered compelling an assurance case should address its potential deficits, possibly with the use of a confidence argument. Assurance argument and confidence argument should be clearly separated and consistent at the same time. We propose a way of their integration with the use of an element representing rationale for each argumentation strategy. The rationale integrates confidence argument for a given argumentation step...
-
Assessment of risks introduced to safety critical software by agile practices - a software engineer's perspective
PublicationIn this article we investigate the problem of applying agile practices into safety-critical projects.The goal of our research is to investigate potential benefits from introducing agile practicesinto safety-critical environment and to present a solution providing for balancing agileapproach with more disciplined assurance techniques, bringing the best of the two worlds together.In the article we present the supporting ideas such...
-
Analiza spostrzeżeń podczas audytów w przedsiębiorstwach z branży spożywczej
PublicationAnalizowano dane z 54 przedsiębiorstw potwierdzających zgodność z wdrożonym systemem ISO 22000 w latach 2005–2013 przez jednostkę certyfikującą DNV GL–BA. Przedstawiono najczęściej spotykane kategorie niezgodności stwierdzane podczas audytów certyfikujących w przedsiębiorstwach należących do łańcucha żywnościowego. Przeanalizowano występujące problemy wpływające na bezpieczeństwo żywności podczas procesu produkcyjnego. Obliczono...
-
Integrated functional safety and cyber security analysis
PublicationThe chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...
-
An integrated framework for security protocol analysis
PublicationAssurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...
-
Determining and verifying the safety integrity level with security aspects
PublicationSafety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...
-
Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure
PublicationSafety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...
-
Be fearless: Positive affect as a mediator between venturesomeness and self-efficacy in future entrepreneurs and managers
PublicationIntroduction and objectives Self-efficacy, personality and different affect states in entrepreneurs and managers are important factors for effectiveness and well-being. The aim of the study was to examine in young adults during entrepreneurship-related education, the relationships between venturesomeness and self-efficacy, and the mediating effects of positive affect and positive emotions (joviality, self-assurance, attentiveness)...
-
AgileSafe – a method of introducing agile practices into safety-critical software development processes
PublicationThis article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the software assurance requirements imposed by the application domain. We present the description of the method covering the process of its application and the input and output artefacts.
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublicationThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
Experimental verification and comparison of mode shape-based damage detection methods
PublicationThis paper presents experimental verification and comparison of damage detection methods based on changes in mode shapes such as: mode shape curvature (MSC), modal assurance criterion (MAC), strain energy (SE), modified Laplacian operator (MLO), generalized fractal dimension (GFD) and Wavelet Transform (WT).
-
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile
PublicationThe paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublicationCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Approaching Secure Industrial Control Systems
PublicationThis study presents a systematic approach to secure industrial control systems based on establishing a business case followed by the development of a security programme. To support these two fundamental activities the authors propose a new method for security cost estimation and a security assessment scheme. In this study they explain the cost evaluation technique and illustrate with a case study concerning the assessment of the...
-
Towards Agile Development of Critical Software
PublicationThe paper presents a case study aiming at collecting opinions of software en-gineers on the risks related to integration of agile practices to safety-critical software development projects. The study has been performed within the scope of our research targetting at providing critical software developers with a comprehensive solution allowing to incorporate agile practices into software development process while still being conformant...
-
Challenges in providing support for management of evidence-based arguments
PublicationThe paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...
-
Agile Development of Critical Software - Can It be Justified?
PublicationThe paper introduces the problem of application of agile practices in critical software development projects. It summarizes the present state of research and identifies the need for having a ready-to-use model of being agile while still meeting the required assurance levels which could be particularly useful for small and medium sized safety-critical software companies. Then the objective and scope of a research aiming at delivering...
-
Safety assurance strategies for autonomous vehicles
PublicationAssuring safety of autonomous vehicles requires that the vehicle control system can perceive the situation in the environment and react to actions of other entities. One approach to vehicle safety assurance is based on the assumption that hazardous sequences of events should be identified during hazard analysis and then some means of hazard avoidance and mitigation, like barriers, should be designed and implemented. Another approach...
-
Procedure based functional safety and information security management of industrial automation and control systems on example of the oil port installations
PublicationThe approach addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety and security requirements specified in standards IEC 61508, IEC 61511 and IEC 62443. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of...
-
Plate heat exchanger with porous structure for potential use in ORC system
PublicationThe experimental analysis of passive heat transfer intensification in the case of plate heat exchanger has been carried out. The passive intensification was obtained by a modification of the heat transfer surface, which was covered by a metallic porous microlayer. The experiment was accomplished in two stages. In the first stage the commercial stainless steel gasketed plate heat exchanger was investigated, while in the second one...
-
Plate heat exchanger with porous structure for potential use in ORC system
PublicationThe experimental analysis of passive heat transfer intensification in the case of plate heat exchanger has been carried out. The passive intensification was obtained by a modification of the heat transfer surface, which was covered by a metallic porous microlayer. The experiment was accomplished in two stages. In the first stage the commercial stainless steel gasketed plate heat exchanger was investigated, while in the second one...
-
Influence of metallic porous microlayer on pressure drop and heat transfer of stainless steel plate heat exchanger
PublicationThe experimental analysis of passive heat transfer intensification in the case of plate heat exchanger has been carried out. On the heat transfer surface of heat exchanger the metallic porous layer was created. The experiment was accomplished in two stages. In the first stage the commercial stainless steel gasketed plate heat exchanger was investigated, while in the second one – the identical heat exchanger but with the modified...
-
PORÓWNANIE EFEKTYWNOŚCI DZIAŁALNOŚCI BADAWCZO ROZWOJOWEJ W KRAJACH OECD
PublicationEfektywność działalności badawczo-rozwojowej powinna być w centrum zainteresowania decydentów we wszystkich krajach. Kluczowe jest stworzenie możliwości pomiaru efektywności działań w tym obszarze. Celem artykułu jest porównanie efektywności realizacji polityki działalności badawczo-rozwojowej w krajach OECD, wykorzystując metodę Data Envelopment Analysis. Podkreślono problem heterogeniczności grupy porównywanych krajów. Zastosowano...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Model DEA do oceny efektywności funkcjonowania publicznych uniwersytetów w Polsce
PublicationPubliczne szkolnictwo wyższe w Polsce, wziąwszy pod uwagę zagrożenia wynikające z sytuacji demograficznej, wymaga analizowania efektywności jego funkcjonowania. W artykule przedstawiono model do pomiaru i oceny efektywności uniwersytetów, uwzględniając pięć podstawowych obszarów ich działalności: badań, rozwoju kadry, dydak-tyki, jakości i finansowania. Zastosowano metodę Data Envelopment Analysis (DEA). Wadą konwencjonalnych modeli...
-
Influence of metallic porous microlayer on pressure drop and heat transfer of stainless steel plate heat exchanger
PublicationThe experimental analysis of passive heat transfer intensification in the case of plate heat exchanger has been carried out. The metallic porous layer was created on the heat transfer surface of analyzed unit. The experiment was accomplished in two stages. In the first stage the commercial stainless steel gasketed plate heat exchanger was investigated, while in the second one – the identical heat exchanger but with the modified...
-
Review of Cybersecurity Assessment Methods: Applicability Perspective
PublicationCybersecurity assessments are crucial in building the assurance that vital cyberassets are effectively protected from threats. Multiple assessment methods have been proposed during the decades of the cybersecurity field. However, a systematic literature search described in this paper reveals that their reviews are practically missing. Thus, the primary objective of this research was to fulfil this gap by comprehensively identifying...
-
Updating Finite Element Model of a Wind Turbine Blade Section Using Experimental Modal Analysis Results
PublicationThis paper presents selected results and aspects of themultidisciplinary and interdisciplinary research oriented for the experimental and numerical study of the structural dynamics of a bend-twist coupled full scale section of awind turbine blade structure.Themain goal of the conducted research is to validate finite elementmodel of themodified wind turbine blade section mounted in the flexible support structure accordingly to the...
-
Wydatki na opiekę zdrowotną a efekty zdrowotne – analiza porównawcza krajów europejskich metodą DEA
PublicationEfektywnie działające systemy ochrony zdrowia mają istotne znaczenie dla zapewnienia społeczeństwu jakości życia na odpowiednim poziomie. Średnie wydatki dla krajów UE wynosiły w 2000 r. 1836 dol., a w 2012 r. osiągnęły poziom 3317 dol. na osobę z uwzględnieniem parytetu siły nabywczej (Purchasing Power Parity, PPP). W krajach Europy Środkowo-Wschodniej nienależących do UE całkowite wydatki na zdrowie są znacznie niższe, a proporcja...
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublicationThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Safety integrity level verification for safety-related functions with security aspects
PublicationThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
Heat transfer intensification by enlarged surface roughness in the plate heat exchanger
PublicationIn the paper an experimental analysis of passive heat transfer intensification technique employed in the case of the plate heat exchanger is presented. The passive intensification was obtained by a modification of the heat transfer surface. The roughness of surface was increased by a use of glass micro-beads. Single-phase convective heat transfer in the water-water system was studied. The experiment was accomplished in two stages....
-
Effect of surface roughness on thermal-hydraulic characteristics of plate heat exchanger
PublicationIn the paper the experimental analysis of passive heat transfer intensification in the case of modeled plate heat exchanger is conducted. The plate heat exchanger is chosen for the analysis because this kind of heat exchangers could be prospectively applied in the ORC systems, however other areas or application are equally possible. The experimental setup was assembled at the Department of Energy and Industrial Apparatus of Gdansk...
-
Exploration of optical fibres as a carrier for new benzene and toluene matrix-free reference materials
PublicationTo meet high expectations concerning precision and accuracy of reference materials, preparation of matrixfree reference materials using thermal decomposition-gas chromatography-mass spectrometry (TD-GC-MS) was proposed in this study. In the paper, the results obtained in preparation of the new reference materials for benzene and toluene are presented, based on the thermal decomposition technique of compounds chemically bound to...