Search results for: safety-critical software - Bridge of Knowledge

Search

Search results for: safety-critical software

Filters

total: 3829
filtered: 2815

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: safety-critical software

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Software Tools to Measure the Duplication of Information

    Data stored in average computer system usually is not unique, portions of stored data are duplicated. When duplicated data are stored in separate files containing source code of computer program of student homework, a possibility of cheating should be seriously considered. This paper presents software tools built, in order to detect re-use of pieces of code in supplied text files. Three aspects of information atching are considered:...

    Full text to download in external service

  • Computer -Aided Local Energy Planning Using ALEP-PL Software

    The issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...

  • Antecedents to Achieve Kanban Optimum Benefits in Software Companies

    Publication
    • M. Ahmad
    • A. Rohunen
    • P. Raulamo-jurvanen

    - Year 2019

    In 2004, Kanban successfully entered into the Agile and Lean realm. Since then software companies have been increasingly using it in software development teams. The goal of this study is to perform an empirical investigation on antecedents considered as important for achieving optimum benefits of Kanban use and to discuss the practical implications of the findings. We conducted an online survey with software professionals from...

    Full text to download in external service

  • Resonant DC link inverters for AC motor drive systems – critical evaluation

    In this survey paper, resonant and quasiresonant DC link inverters are reexamined for AC motor drive applications. Critical evaluation of representative topologies is based on simulation and waveform analysis to characterize current/voltage stress of components, control timing constraints and feasibility. A special concern over inverter common-mode voltage and voltage gradient du/dt limitation capacity is discussed for motor bearing...

    Full text available to download

  • Open-source software (OSS) and hardware (OSH) in UAVs

    Publication

    - Year 2020

    The popularity of the Open Source Tool (OST) has expanded significantly. This is the case for Unmanned Aerial Vehicles (UAVs) based on open-source hardware (OSH) as well. Open-source software (OSS) and OSH can be applied in a wide range of applications and can improve several technologies. The chapter begins with an introduction to OSS depicting its rationale, description of fundamental differences between OSS and proprietary software...

    Full text available to download

  • Artificial intelligence for software development — the present and the challenges for the future

    Since the time when first CASE (Computer-Aided Software Engineering) methods and tools were developed, little has been done in the area of automated creation of code. CASE tools support a software engineer in creation the system structure, in defining interfaces and relationships between software modules and, after the code has been written, in performing testing tasks on different levels of detail. Writing code is still the task...

    Full text available to download

  • Fuzzy regresion approach to road safety analysis at regional level

    Road safety modelling on regional level of NUTS 2 in the EU is the complex issue and authors of this article indicate this in previous publications. NUTS 2 are basic regions for the application of regional policies (0.8-3 m inhabitants). During multivariate models development they discovered that it is difficult to make regression model well described all regions, even if they are from one country. In the first step Poisson model...

    Full text to download in external service

  • HEALTH SAFETY OF BREAD IN SMALL BAKERIES

    The aim of the article is to present the safety and health risks in the production process of bread, supported by research in small bakeries located in the Pomeranian Voivodeship. Health safety of bread is one of the features that decide its quality. This article additionally presents other determinants influencing the quality of bread. It also demonstrates opinions showing food safety as a separate attribute of quality. The paper...

    Full text available to download

  • Regional implementation of a road safety observatory in Poland

    Publication

    The paper outlines the background and goals of the Road Safety Observatory in the Polish region of Warmia and Mazury. While created it was Poland’s first road safety Observatory, both at the regional and central level. Established in line with the methodology proposed in the European project SafetyNet, together with the planned National Road Safety Observatory it will form part of a Europe-wide network of observatories linked with...

    Full text available to download

  • Scaled agile framework. Dealing with software process‐related challenges of a financial group with the action research approach

    Publication

    - Journal of Software-Evolution and Process - Year 2022

    This article reports on a domain-specific software development venture at Nordea. We explore organizational constraints, challenges, and corrective actions undertaken when scaling the agile development approach of their Core Banking Platform program. The fit and required customizations of the rather complex and rigid SAFe framework in a policy-heavy financial institution are audited against the organic growth of the program. In...

    Full text available to download

  • Adopting Collaborative Games into Agile Software Development

    Publication

    - Year 2018

    Although the emergence of agile methods has triggered a growing awareness that social factors have a crucial impact on the success of software projects, neither the Scrum Guide nor the Agile Manifesto prescribe techniques that aid the human side of software development. To address this challenge, we enriched the Scrum process with a set of collaborative games. Collaborative games refer to techniques inspired by game play, but designed...

    Full text to download in external service

  • Adaptation of radar software to work with ambiguous distance measurement

    Publication

    A software extension for radar stations designed to work in the low-PRF mode that allows them to correctly measure range to targets outside of their instrumented range, is proposed. The solution does not require substantial modifications of the radar software. Additionally, we describe tools that allow one to simulate the output of a low-PRF radar observing targets that are outside its instrumented range. The proposed approach...

    Full text available to download

  • Approach to evaluation of time to the critical degradation of ship pipelines

    Publication

    In the article an approach to the problem of estimating time to the critical degradation of ship pipelines is considered. Such an assessment would consist of six stages. The fundamental idea is to include to the estimation of time to failure of pipelines such elements like: materials that the pipelines are made, destructive physical phenomena taking place in them and applied means of protection. The result of that evaluation should...

    Full text available to download

  • The role of observatories in the integrated transport safety systems

    Accurate knowledge about the causes, circumstances and place of transport accidents is the prerequisite to take the correct action to improve transport safety. Developing appropriate organizational structures, forms and methods of management and implementation of safety measures in the sectoral approach condition the success. Therefore, the Safety Information System is one of the integral areas of the Integrated Transport Safety...

    Full text available to download

  • Functional safety and human factors

    Publication

    - Year 2007

    Rozdział przedstawia istotny problem uwzględnienia czynników ludzkich (H&OF) w analizie bezpieczeństwa funkcjonalnego, które wpływają istotnie na bezpieczeństwo przemysłowych obiektów podwyższonego ryzyka, nie ujęty jednak w normach bezpieczeństwa funkcjonalnego. Przedstawia się metody analizy niezawodności człowieka (HRA) w kontekście tych czynników, które wpływają na błędy człowieka. Czynniki ludzkie i organizacyjne powinny być...

  • Acceptance Testing of Software Products for Cloud-Based On-Line Delivery

    Publication

    Software products intended for on-line delivery by distributors serving an open community of subscribers are developed in a specific life-cycle model, in which roles of the major stakeholders are strongly separated, unlike in any other software development model known in software engineering. Its specificity underlines the fact that a distributor of the final product, responsible for its acceptance for publication and delivery...

    Full text available to download

  • PROPRIETARY SOFTWARE IN TECHNICAL HIGHER EDUCATION

    The authors present a relatively easy way to extend the quality of education in professional studies (engineering) on major “Geodesy and Cartography”. They indicate the possibility to deepen students’ knowledge by using in the educational process proprietary software enriching education. The authors use their own experiences, results of the cooperation with employers, as well as the effects of scientific research to introduce into...

    Full text to download in external service

  • PROPRIETARY SOFTWARE IN TECHNICAL HIGHER EDUCATION

    The authors present a relatively easy way to extend the quality of education in professional studies (engineering) on major “Geodesy and Cartography”. They indicate the possibility to deepen students’ knowledge by using in the educational process proprietary software enriching education. The authors use their own experiences, results of the cooperation with employers, as well as the effects of scientific research to introduce...

    Full text to download in external service

  • The Role of a Software Product Manager in Various Business Environments

    The aim of the paper is to identify the role of the software product manager depending on the size of the company and the characteristics of the product they are working on. This has been achieved in cooperation with 15 experts from the IT industry. The companies were divided into 4 levels of size: micro-enterprises, small businesses, medium businesses and large enterprises. The characteristics of the products were divided into...

    Full text available to download

  • COMPARISON OF SOFTWARE AND HARDWARE REALIZATION OF AES CRYPTOGRAPHIC ALGORITHM

    In this paper hardware and software realization of direct and inverse AES cryptographic algorithm is presented. Both implementations were made using the Virtex-II FPGA and were practically tested. As the criteria of comparison, the resource utilization, achieved performance and power dissipation were chosen. Hardware realization increases throughput of conversion about 190 times over software implementation and decreases the energy...

  • Software modules and application layer's security structure of RSMAD

    Publication

    The paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...

  • Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems

    Publication

    Sustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...

    Full text to download in external service

  • Safety assurance strategies for autonomous vehicles

    Publication

    - Year 2008

    Assuring safety of autonomous vehicles requires that the vehicle control system can perceive the situation in the environment and react to actions of other entities. One approach to vehicle safety assurance is based on the assumption that hazardous sequences of events should be identified during hazard analysis and then some means of hazard avoidance and mitigation, like barriers, should be designed and implemented. Another approach...

    Full text to download in external service

  • Safety at railway level crossings and Vision Zero

    In this work, safety analysis at the railway level crossings is presented using advanced mathematical modelling. Resistivity of track subgrade panels is taken into account. The analysis does not refer to the assessment of the current regulations. Specific cases of generalized dynamic system are considered by introducing operations S=Δ, S=P defined in space C(N) of real sequences. In this model, generalized discrete exponential...

    Full text available to download

  • Road safety inspection as a tool for road safety management – the polish experience

    In Poland, road inspections were implemented in June 2014 on all national roads. Previously conducted traffic surveys mainly related to the technical condition of roads, signs and markings; other safety issues were overlooked. The main problem that occurs during inspection is an inspector’s subjective qualitative assessment which affects the classification of the sources of hazard on the road.. The paper presents an analysis of...

    Full text available to download

  • Overview of Knowledge Management in Occupational Safety, Health, and Ergonomics

    Publication

    - Year 2022

    Occupational safety, health, and ergonomics (OSHE) are strategic pillars of contemporary organizations. In order to provide safer workplace, it is vital to manage the organizational knowledge, so that effective decision making along with absolute compliance to standards can be executed. The critical challenge for OSHE in modern industry is management of existing individual knowledge (experience), structure knowledge, and organizational...

    Full text to download in external service

  • EXPERIMENTAL ANALYSIS OF CONNECTION BETWEEN OBJECT-ORIENTED METRICS AND SOFTWARE CHANGEABILITY

    Publication

    - Year 2013

    For the purpose of video surveillance software quality assessment in this work the ISO/IEC-9126 norm was used with a particular focus on maintainability of the software system. The paper presents a study on the connection between software metrics derived from the static analysis of the source code and changeability of the video surveillance software system. It is shown that meeting requirements of software quality metrics may result...

  • Knowledge Safety – Insights from the SME Sector

    Purpose: This paper aims to explore the topic of knowledge safety, defined as the state of knowledge being safe from loss, leakage, attrition, oblivion, waste or theft. The paper first presents a theoretical background and review of previous studies on knowledge loss and ways of overcoming it, and then illustrates the topic of knowledge safety with ten case studies from the small and medium-sized enterprises (SMEs) sector. Methodology:...

    Full text available to download

  • Tools for road infrastructure safety management in Poland

    Publication

    The objective of road safety infrastructure management is to ensure that when roads are planned, designed, built and used road risks can be systematically identified, assessed, removed and mitigated. There are a number of approaches to road safety management. European Union Directive 2008/96/EC requires EU member states to use four basic tools of road safety infrastructure management. An overview of the methods in these countries...

    Full text available to download

  • Multisensor System for the Protection of Critical Infrastructure of Seaport

    Publication
    • M. Kastek
    • R. Dulski
    • M. Życzkowski
    • M. Szustakowski
    • P. Trzaskawka
    • W. Ciurapiński
    • P. Markowski
    • M. Karol
    • G. Grelowska
    • I. Gloza... and 2 others

    - Year 2013

    There are many separated infrastructural objects within a harbor area that may be considered “critical”, such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons...

  • Wireless Networks as an Infrastructure for Mission-Critical Business Applications

    Publication

    Despite the dynamic growth of wireless network systems, their pres-ence in business-support infrastructure has been limited. In the article we provide an overview of generic corporate network architecture and examine usefulness of available wireless network solutions in such systems. Following this overview we analyze new wireless network architecture which currently undergoes standardization process - wireless mesh. It can result...

  • Engineering Analysis with ANSYS Software Second Edition

    Publication

    - Year 2018

    The best way to learn complex systems is by means of hands-on experience. With an innovative and clear tutorial based approach, this powerful book provides a comprehensive introduction to the fundamental areas of engineering analysis needed on research or commercial engineering projects. With its detailed step-by-step explanations and sample problems, this book will develop the reader's understanding of FEA and their ability to...

    Full text to download in external service

  • The effects of vehicle restraint systems on road safety

    Key to understanding the needs and tools of road infrastructure management for preventing run-off-road crashes or minimising their consequences, is to identify the hazads and sources of hazards caused by wrong or improper use of road safety devices and identify errors in the desifn, structure, construction and operation of road safety devices. Studying such an extended scope of the problem required fieldwork and surveys with road...

    Full text available to download

  • Towards the participant observation of emotions in software development teams

    Emotions, moods and temperament influence our behaviour in every aspect of life. Until now plenty of research has been conducted and many theories have been proposed to explain the role of emotions within the working environment. However, in the field of software engineering, interest in the role of human factors in the process of software development is relatively new. In the paper the research design process that has been proposed...

    Full text available to download

  • PV installations and the safety of residential buildings

    The dynamic development of the photovoltaic industry entails threats that have a direct impact on the safety of residential buildings. Appropriate design of a PV installation can be a challenge due to the multifaceted nature of this issue. The designer should take into account issues related to the selection of electrical parameters of the installation, adapting lightning and surge protection in accordance...

    Full text available to download

  • The Indicators Assessment of Safety and Functionality of Tram Loops

    Publication

    - Journal of KONBiN - Year 2020

    The new requirements set for tram loops mean that all stakeholders' expectations regarding their safety and functionality change. This creates a need for new tools for tram loop assessment, which are important interchanges, especially for people living outside the city limits or on their outskirts. The aim of the authors ’research is to create a indicators for assessing the safety and functionality of tram loops. Therefore, the...

    Full text available to download

  • Fire-induced spalling of ultra-high performance concrete: A systematic critical review

    Publication

    - CONSTRUCTION AND BUILDING MATERIALS - Year 2023

    Ultra-high performance concrete (UHPC) is a novel concrete class characterized by a compressive strength of more than 150 MPa. One of the most significant drawbacks of employing UHPC is that is very low permeability owing to its great compactness of dense structure increases the risk of fire-induced spalling. It is challenging for fire safety and structural engineers to predict and analyze this issue due to the lack of widely accepted...

    Full text to download in external service

  • Functional Safety Analysis including Human Factors

    In this paper selected aspects of human factors are discussed that should be taken into account during the design of safety-related functions for a complex hazardous installation and its protections. The layer of protection analysis (LOPA) methodology is used for simplified risk analysis based on defined accident scenarios. To control the risk the safety instrumented functions (SIFs) are identified and their safety integrity levels...

    Full text to download in external service

  • Functionality of road safety devices - identification and analysis of factors

    Road safety devices are designed to protect road users from the risk of injury or death. The principal type of restraint is the safety barrier. Deployed on sites with the highest risk of run-off-road accidents, safety barriers are mostly found on bridges, flyovers, central reservations, and on road edges which have fixed obstacles next to them. If properly designed and installed, safety barriers just as other road safety devices,...

    Full text available to download

  • Extendable Safety and Security Ontology

    Security plays an increasingly important role in our everyday life, and research and users of computer systems point out that the need arises for a common, formalised model capable of integrating different solutions. In this paper we show that an ontology can be designed and created in a way that will make it suitable for interoperability and integration. A security and safety ontology and the methodology for creating a common...

    Full text available to download

  • Knowledge Management Critical Success Factors and the Innovativeness of KIBS Companies

    The purpose of this paper is to examine the influence of two critical success factors for knowledge management (i.e. leadership and support by the management, motivational practices) on the innovativeness of knowledge-intensive business service (KIBS) companies in the SMEs sector. A sample of 400 companies (KIBS SMEs) located in the Pomeranian District in Poland was selected. The questionnaire was designed to measure knowledge...

    Full text available to download

  • Exploration of Creativity Techniques in Software Engineering in Training-Application-Feedback Cycle

    Creativity research has proposed about a hundred and fifty creativity techniques. The question is whether they can be applied in software engineering for creativity training or directing creativity in software projects. This paper aims at answering this question via a quasi-experiment conducted in Training-Application-Feedback cycle in which participants express their opinions about selected creativity techniques after training...

    Full text to download in external service

  • Pedestrian safety management using the risk-based approach

    The paper presents a concept of a multi-level pedestrian safety management system. Three management levels are distinguished: strategic, tactical and operational. The basis for the proposed approach to pedestrian safety management is a risk-based method. In the approach the elements of behavioural and systemic theories were used, allowing for the development of a formalised and repeatable procedure integrating the phases of risk...

    Full text available to download

  • System setup and software for cyclic, staircase and square wave voltammetry measurements

    Publication

    Hardware dedicated for electrochemical measurement sometimes does not allow performing certain voltammetry experiments. Staircase and square wave voltammetry, techniques which have many advantages comparing with standard voltammetric techniques, are rarely implemented in software controlling electrochemical measuring equipment. These methods, however, can be relatively easy realized with some addition...

  • The Impact of Lexicon Adaptation on the Emotion Mining From Software Engineering Artifacts

    Publication

    - IEEE Access - Year 2020

    Sentiment analysis and emotion mining techniques are increasingly being used in the field of software engineering. However, the experiments conducted so far have not yielded high accuracy results. Researchers indicate a lack of adaptation of the methods of emotion mining to the specific context of the domain as the main cause of this situation. The article describes research aimed at examining whether the adaptation of the lexicon...

    Full text available to download

  • Team Roles and Team Performance in Small Virtual Software Teams

    The article presents the results of research on the composition of team roles conducted in 24 student software teams. An adaptation of M. Belbin’s model by B. Kożusznik was used. The model of team balance according to Belbin and Haaf is presented and correlations between team balance and team performance are analysed. Team performance is measured at three levels: result, satisfaction and team climate. The selected constellation...

    Full text to download in external service

  • A Survey Investigating the Influence of Business Analysis Techniques on Software Quality Characteristics

    Publication

    Business analysis is recognized as one of the most important areas determining the outcome (success or failure) of a software project. In this paper we explore this subject further by investigating the potential impact of techniques applied in business analysis on essential software quality characteristics. We conducted a literature search for software quality models, analyzed the existing models and selected a subset of commonly...

    Full text available to download

  • Determining and verifying the safety integrity level with security aspects

    Publication

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...

    Full text to download in external service

  • Using FreeFEM open software for modelling the vibrations of piezoelectric devices

    Publication

    Modelling vibrations of piezoelectric transducers has been a topic discussed in the literature for many decades. The first models - so-called one-dimensional - describe the vibrations only near operating frequency and near its harmonics. Attempts to introduce two-dimensional models were related to the possibility of one transducer working at several frequencies, including both thickness vibrations and those resulting from the transducer...

    Full text available to download