Filters
total: 8876
filtered: 6063
-
Catalog
- Publications 6063 available results
- Journals 751 available results
- Conferences 363 available results
- Publishing Houses 1 available results
- People 499 available results
- Inventions 1 available results
- Projects 23 available results
- Research Teams 2 available results
- Research Equipment 3 available results
- e-Learning Courses 297 available results
- Events 11 available results
- Open Research Data 862 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: safety of computer systems
-
Computer simulation of vibration surveillance of discretely idealised mechanical systems. Part I: Optimal control at the energy performance index for open non-stationary systems
PublicationPraca dotyczy sposobów nadzorowania drgań mechanicznych z wykorzystanie elementów teorii sterowania, optymalizacji dynamicznej, nowoczesnych metod symulacji komputerowej oraz technik pomiarowych. Do modelowania niestacjonarnego układu sterowanego zastosowano mieszaną metodą sztywnych i odkształcalnych elementów skończonych. Opracowano metodę nadzorowania drgań w dziedzinie czasu, z wykorzystaniem sterowania optymalnego przy energetycznym...
-
Verification of safety in low-voltage power systems without nuisance tripping of residual current devices
PublicationLow-voltage power systems require initial and periodical verification to check the effectiveness of protection against electric shock. As a protection in case of fault, automatic disconnection of supply is most often used. To verify such a protection measure, the earth fault loop impedance or resistance is measured. This measurement is easy to perform in circuits without residual current devices. When residual current devices are...
-
Innovations in Wastewater Treatment: Harnessing Mathematical Modeling and Computer Simulations with Cutting-Edge Technologies and Advanced Control Systems
PublicationThe wastewater treatment landscape in Central Europe, particularly in Poland, has undergone a profound transformation due to European Union (EU) integration. Fueled by EU funding and rapid technological advancements, wastewater treatment plants (WWTPs) have adopted cutting-edge control methods to adhere to EU Water Framework Directive mandates. WWTPs contend with complexities such as variable flow rates, temperature fluctuations,...
-
Modern design solutions of cooling systems, as an example of energy efficiency rationing, operational safety and environmental protection
Publication -
Organizational culture as prerequisite of proactive safety and security management in critical infrastructure systems including hazardous plants and ports
PublicationThis article addresses selected aspects of organizational culture to be considered in the context of knowledge based proactive safety and security management of plants, ports and systems of critical infrastructure. It has been often emphasized in the domain literature that business effectiveness of such plants and their resilience against hazards and threats to avoid major accidents depends substantially on human and organizational...
-
Procedure based functional safety and information security management of industrial automation and control systems on example of the oil port installations
PublicationThe approach addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety and security requirements specified in standards IEC 61508, IEC 61511 and IEC 62443. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of...
-
The Impact of Cultivation Management and Weed Control Systems of Very Early Potato on Weed Infestation, Biodiversity, and Health Safety of Tubers
Publication -
Computer simulation of vibration surveillance of discretely idealised mechanical systems. Part II: Tool-workpiece vibration in a non-stationary model of the cutting process
PublicationPrzedmiotem rozważań jest problem nadzorowania drgań narzędzie-przedmiot obrabiany w procesie skrawania. Dokonano analizy obiektu badań oraz dynamiki skrawania. Utworzono niestacjonarny model obliczeniowy. Przedstawiono różne podejścia oraz przykłady symulacji komputerowych nadzorowania drgań z wykorzystaniem modelu niestacjonarnego. Bazowały one na sterowaniu optymalnym oraz sterowaniu skokową zmiana prędkości obrotowej wrzeciona....
-
Safety Analysis for the Operation Process of Electronic Systems Used Within the Mobile Critical Infrastructure in the Case of Strong Electromagnetic Pulse Impact
Publication -
The value if independent investigations within integrated transport safety systems = Wartość niezależnych dochodzeń w ramach zintegrowanych systemów bezpieczeństwa
PublicationZnaczenie niezależnych dochodzeń w sprawie przyczyn wypadków transportowych jest wciąż w Polsce bagatelizowane, tak samo, jak prawo społeczeństwa do odpowiednich informacji dotyczących bezpieczeństwa. Tymczasem międzynarodowe doświadczenie pokazuje, że mogą one skutecznie poprawić bezpieczeństwo poprzez obniżenie kosztów, zwiększenie przepływu informacji o bezpieczeństwie między różnymi środkami transportu, ułatwiając rozwój nowych...
-
Functional safety and cyber security analysis for life cycle management of industrial control systems in hazardous plants and oil port critical infrastructure including insurance
PublicationThis report addresses selected methodological aspects of proactive reliability, functional safety and cyber security management in life cycle of industrial automation and control systems (IACS) in hazardous plants and oil port critical installations based on the analysis of relevant hazards / threats and evaluation of related risks. In addition the insurance company point of view has been also considered, because nowadays the insurer,...
-
Large-scale multimedia content delivery over optical networks for interactive TV services
Publication -
The ICTBioMed NCIP Hub: Cancer research in a science gateway consortium
Publication -
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis
PublicationRecently, a survey of cybersecurity assessment methods focused on general characteristics was conducted. Among its major findings, it revealed the methods’ adoption issues. This paper presents a follow-up to the study. It provides an in-depth analysis of the methods’ adoption-related properties based on qualitative metrics. As a result, the proposals which demonstrate a higher adoption potential were identified. The methods are...
-
AgileSafe – a method of introducing agile practices into safety-critical software development processes
PublicationThis article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the software assurance requirements imposed by the application domain. We present the description of the method covering the process of its application and the input and output artefacts.
-
Emotion Monitor - Concept, Construction and Lessons Learned
PublicationThis paper concerns the design and physical construction of an emotion monitor stand for tracking human emotions in Human-Computer Interaction using multi-modal approach. The concept of the stand using cameras, behavioral analysis tools and a set of physiological sensors such as galvanic skin response, blood-volume pulse, temperature, breath and electromyography is presented and followed...
-
Supporting Gastroesophageal Reflux Disease Diagnostics by Using Wavelet Analysis in Esophageal pH-Metry
PublicationThis paper presents a new approach to computer supported esophageal pH-metry measurement analysis performed in order to diagnose gastroesophageal reflux disease. In this approach wavelet analysis was used to analyse the esophageal pH-metry course. The research was performed on three groups of pH-metry courses: whole 24-hour pH-metry course, sleep only pH-metry course and 20 minutes after the end of a meal pH-metry course. After...
-
Modeling energy consumption of parallel applications
PublicationThe paper presents modeling and simulation of energy consumption of two types of parallel applications: geometric Single Program Multiple Data (SPMD) and divide-and-conquer (DAC). Simulation is performed in a new MERPSYS environment. Model of an application uses the Java language with extension representing message exchange between processes working in parallel. Simulation is performed by running threads representing distinct process...
-
Top k Recommendations using Contextual Conditional Preferences Model
PublicationRecommender systems are software tools and techniques which aim at suggesting to users items they might be interested in. Context-aware recommender systems are a particular category of recommender systems which exploit contextual information to provide more adequate recommendations. However, recommendation engines still suffer from the cold-start problem, namely where not enough information about users and their ratings is available....
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublicationThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Information Logistics as a Paradigm
PublicationThis paper presents a paradigm-based approach to information logistics. The approach deals with extracting concepts specific to information logistics in categories typical to paradigms. The resulting description should be easily connected to complementary components which are based on other paradigms, e.g. business process management and information systems development. Empirical part aims at checking and enhancing features typical...
-
Towards solving heterogeneous fleet vehicle routing problem with time windows and additional constraints: real use case study
PublicationIn advanced logistic systems, there is a need for a comprehensive optimization of the transport of goods, which would reduce costs. During past decades, several theoretical and practical approaches to solve vehicle routing problems (VRP) were proposed. The problem of optimal fleet management is often transformed to discrete optimization problem that relies on determining the most economical transport routes for a number of vehicles...
-
Towards the participant observation of emotions in software development teams
PublicationEmotions, moods and temperament influence our behaviour in every aspect of life. Until now plenty of research has been conducted and many theories have been proposed to explain the role of emotions within the working environment. However, in the field of software engineering, interest in the role of human factors in the process of software development is relatively new. In the paper the research design process that has been proposed...
-
Applications for investigating therapy progress of autistic children
PublicationThe paper regards supporting behavioral therapy of autistic children with mobile applications, specifically applied for measuring the child’s progress. A family of five applications is presented, that was developed as an investigation tool within the project aimed at automation of therapy progress monitoring. The applications were already tested with children with autism spectrum disorder. Hereby we analyse children’ experience...
-
A Parallel MPI I/O Solution Supported by Byte-addressable Non-volatile RAM Distributed Cache
PublicationWhile many scientific, large-scale applications are data-intensive, fast and efficient I/O operations have become of key importance for HPC environments. We propose an MPI I/O extension based on in-system distributed cache with data located in Non-volatile Random Access Memory (NVRAM) available in each cluster node. The presented architecture makes effective use of NVRAM properties such as persistence and byte-level access behind...
-
Completeness and Consistency of the System Requirement Specification
PublicationAlthough the System Requirement Specification, as a first formal and detailed document, is the base for the software project in classic software methodologies, there is a noticeable problem of assuring the completeness of this document. The lack of its completeness causes uncertainty of the project foundations. This was one of motivations for agile methodologies – if the SRS cannot be easily validated, if it can change in late project...
-
Virtual Sightseeing in Immersive 3D Visualization Lab
PublicationThe paper describes the modern Immersive 3D Visualization Lab (I3DVL) established at the Faculty of Electronics, Telecommunications and Informatics of the Gdańsk University of Technology (GUT) and its potential to prepare virtual tours and architectural visualizations on the example of the application allowing a virtual walk through the Coal Market in Gdańsk. The paper presents devices of this laboratory (CAVE, walk simulator etc.),...
-
Talents, Competencies and Techniques of Business Analyst: A Balanced Professional Development Program
PublicationThis paper presents preliminary results of action research in which we search for fundamentals of an universal theory of balanced approaches to software process. It is developed on the basis of balanced approach for professional development program for business analysts which integrates approaches oriented on talents, competencies and techniques. This paper includes the description of key concepts in background approaches, components...
-
APIS – Agent Platform for Integration of Services
PublicationThe paper presents an approach to creating the platform for development and evaluation of complex tasks execution algorithms. Proposed solution is based on an agent paradigm where independent peers can cooperate and negotiate in order to execute specified tasks which are defined only by the final output description. Tasks are realized by the means of services exposed by different peers. In case when there is no single service fulfilling...
-
Task Assignments in Logistics by Adaptive Multi-Criterion Evolutionary Algorithm with Elitist Selection
PublicationAn evolutionary algorithm with elitist selection has been developed for finding Pareto-optimal task assignments in logistics. A multi-criterion optimization problem has been formulated for finding a set of Pareto- optimal solutions. Three criteria have been applied for evaluation of task assignment: the workload of a bottleneck machine, the cost of machines, and the numerical performance of system. The machine constraints have...
-
An unorthodox view on the problem of tracking facial expressions
PublicationRecent developments in imaging cameras has opened a new way of analyzing facial expression. We would like to take advantage from this new technology and present a method of imaging and processing images of human face as a response to the particular stimuli. The response in this case is represented by the facial expressions and the stimuli are still images representing six basic emotions according to Eckmann. Working hypothesis...
-
Assessing Effectiveness of Recommendations to Requirements-Related Problems through Interviews with Experts
PublicationRequirements Engineering and Business Analysis are known as very important to software project outcome but also difficult activities, coping with many problems and challenges. The work reported in this paper was preceded by a survey which revealed most common requirements-related problems in Polish IT industry. We addressed ten most frequently reported problems by reviewing the literature for recommen¬dations how to cope with...
-
Analyzing energy/performance trade-offs with power capping for parallel applications on modern multi and many core processors
PublicationIn the paper we present extensive results from analyzing energy/performance trade-offs with power capping observed on four different modern CPUs, for three different parallel applications such as 2D heat distribution, numerical integration and Fast Fourier Transform. The CPU tested represent both multi-core type CPUs such as Intel⃝R Xeon⃝R E5, desktop and mobile i7 as well as many-core Intel⃝R Xeon PhiTM x200 but also server, desktop...
-
NVRAM as Main Storage of Parallel File System
PublicationModern cluster environments' main trouble used to be lack of computational power provided by CPUs and GPUs, but recently they suffer more and more from insufficient performance of input and output operations. Apart from better network infrastructure and more sophisticated processing algorithms, a lot of solutions base on emerging memory technologies. This paper presents evaluation of using non-volatile random-access memory as a...
-
MaliciousIDE – software development environment that evokes emotions
PublicationEmotions affect every aspect of human live, including work. Numerous studies in software engineering have shown that negative emotions can lower the productivity of programmers. Unlike traditional approaches to managing software development, modern methods, such as Agile and Lean, take into account human aspects of programming. To thoroughly investigate the impact of negative emotions on the work of programmers, a malicious integrated...
-
Stereoscopy in Graphics APIs for CAVE Applications
PublicationThe paper compares the advantages and disadvantages of a variety of Graphics Application Programming Interfaces (APIs) from the perspective of obtaining stereoscopy in applications written for a CAVE virtual reality environment. A number of problems have been diagnosed and an attempt has been made to solve them using OpenGL, DirectX 11 and 12, Vulkan, as well as the Unity Engine which can internally use DirectX, OpenGL and Vulkan,...
-
The Role of a Software Product Manager in Various Business Environments
PublicationThe aim of the paper is to identify the role of the software product manager depending on the size of the company and the characteristics of the product they are working on. This has been achieved in cooperation with 15 experts from the IT industry. The companies were divided into 4 levels of size: micro-enterprises, small businesses, medium businesses and large enterprises. The characteristics of the products were divided into...
-
Problems and Solutions of Software Design in Scrum Projects
PublicationThe aim of the paper is to identify the problems and solutions of the software design in Scrum project as well as to analyze the effectiveness of the solutions. Through a series of workshops with 4 experts from IT industry and academia we have identified 52 problems and 99 unique solutions. In this paper we present a list of 10 common problems and 5 solutions for each problem selected by the number of sources. The effectiveness...
-
Benchmarking overlapping communication and computations with multiple streams for modern GPUs
PublicationThe paper presents benchmarking a multi-stream application processing a set of input data arrays. Tests have been performed and execution times measured for various numbers of streams and various compute intensities measured as the ratio of kernel compute time and data transfer time. As such, the application and benchmarking is representative of frequently used operations such as vector weighted sum, matrix multiplication etc....
-
Hard Lessons Learned: A Model that Facilitates the Selection of Methods of IT Project Management
PublicationThe article presents the results of research conducted in an international enterprise responsible for IT project implementation. The carried out analysis of the case study with the use of surveys and data synthesis allowed the major factors causing problems connected with project management to be identified. The identified factors were aggregated and then, by using four key variables, a rhomboidal model adaptation was proposed...
-
Towards detecting programmers’ stress on the basis of keystroke dynamics
PublicationThe article describes the idea of detecting stress among programmers on the basis of keystroke dynamics. An experiment with a group of students of artificial intelligence classes was performed. Two samples of keystroke data were recorded for each case, the first while programming without stress, the second under time pressure. A number of timing and frequency parameters were calculated for each sample. Then statistical analysis...
-
Limitations of Emotion Recognition in Software User Experience Evaluation Context
PublicationThis paper concerns how an affective-behavioural- cognitive approach applies to the evaluation of the software user experience. Although it may seem that affect recognition solutions are accurate in determining the user experience, there are several challenges in practice. This paper aims to explore the limitations of the automatic affect recognition applied in the usability context as well as...
-
Balance recognition on the basis of EEG measurement.
PublicationAlthough electroencephalography (EEG) is not typically used for verifying the sense of balance, it can be used for analysing cortical signals responsible for this phenomenon. Simple balance tasks can be proposed as a good indicator of whether the sense of balance is acting more or less actively. This article presents preliminary results for the potential of using EEG to balance sensing....
-
Designing effective educational games - a case study of a project management game
PublicationThis paper addresses the issues of designing effective educational games. We aim at investigating how the cognitive, behavioral and emotional aspects of the games influence their educational effectiveness. The results were obtained with an observational user experience study extended with affect analysis carried out for a project management game GraPM. We analyzed the...
-
Enhanced Eye-Tracking Data: a Dual Sensor System for Smart Glasses Applications
PublicationA technique for the acquisition of an increased number of pupil positions, using a combined sensor consisting of a low-rate camera and a high-rate optical sensor, is presented in this paper. The additional data are provided by the optical movement-detection sensor mounted in close proximity to the eyeball. This proposed solution enables a significant increase in the number of registered fixation points and saccades and can be used...
-
Game with a Purpose for Mappings Verification
PublicationMappings verification is a laborious task. The paper presents a Game with a Purpose based system for verification of automatically generated mappings. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the gameplay, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation and gathering...
-
On the Agile Mindset of an Effective Team – An Industrial Opinion Survey
PublicationIn this paper we present the results of an opinion survey among 52 agile practitioners who evaluated the importance of 26 selected elements of the agile mindset to the effectiveness of an agile team. In total, we have identified 70 unique agile mindset elements based on 11 literature sources and 5 interviews with industry experts. 7 elements belonged to the “support for business goals” category, 20 to the “relationships within...
-
Preliminary Citation and Topic Analysis of International Conference on Agile Software Development Papers (2002-2018)
PublicationThis study utilizes citation analysis and automated topic analysis of papers published in International Conference on Agile Software Development (XP) from 2002 to 2018. We collected data from Scopus database, finding 789 XP papers. We performed topic and trend analysis with R/RStudio utilizing the text mining approach, and used MS Excel for the quantitative analysis of the data. The results show that the first five years of XP...
-
Towards semantic-rich word embeddings
PublicationIn recent years, word embeddings have been shown to improve the performance in NLP tasks such as syntactic parsing or sentiment analysis. While useful, they are problematic in representing ambiguous words with multiple meanings, since they keep a single representation for each word in the vocabulary. Constructing separate embeddings for meanings of ambiguous words could be useful for solving the Word Sense Disambiguation (WSD)...
-
The lemniscate knowledge flow model
PublicationKnowledge is seen as one of the main resources for organizations providing knowledge-intensive services. Therefore, sharing and reusing are the main goals of modern knowledge management (KM) approach, driven by information and communication technologies (ICT). However, one can ask for the details in order to provide means and tools to design and deploy environment able to fulfil these two goals. We observed that occurred interactions...