Filters
total: 1202
filtered: 1033
-
Catalog
Chosen catalog filters
displaying 1000 best results Help
Search results for: agile, security, software development methods
-
WIKI-WS as a C2 NIWA Web Service Management Platform
PublicationThe Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...
-
Applications of Additively Manufactured Tools in Abrasive Machining—A Literature Review
PublicationHigh requirements imposed by the competitive industrial environment determine the development directions of applied manufacturing methods. 3D printing technology, also known as additive manufacturing (AM), currently being one of the most dynamically developing production methods, is increasingly used in many different areas of industry. Nowadays, apart from the possibility of making prototypes of future products, AM is also used...
-
A place of school in the idea of the sustainable development
PublicationWell designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).
-
The impact of security aspects on functional safety analysis = Wpływ aspectów ochrony informacji na wyniki analiz bezpieczeństwa funkcjonalnego
PublicationIt can be said that a distributed control and protection system’s security level may have a significant impact on functional safety analyses and their results. However the issue of integrating those both aspects are difficult and usually is neglected during functional safety analyses. Known methods of functional safety analyses don’t take into consideration this kind of concept also. This paper discusses an attempt to integrate...
-
Security and Anonymity in Agent Systems
PublicationMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network
PublicationIn this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...
-
Towards systemic functional safety and security management in hazardous plants
PublicationThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Oznaczanie tlenu – od metody Winklera do czujników enzymatycznych (Determination of oxygen – from Winkler Method to enzymatic sensor)
PublicationMonitoring of dioxygen levels is of utmost importance from the view-point of life processes, medical diagnostics, nutrition and chemical industries. In all these measurements both low and high levels of this element are important. The common methods for the determination of dioxygen are the Winkler method, Clark electrode and pulsoxymeters. A new, already strong field of research can be now recognized – the development of miniaturized...
-
Selecting Requirements Documentation Techniques for Software Projects: a Survey Study
PublicationA significant number of techniques dedicated to requirements specification and documentation is described in the available sources. As there is no purpose to use all of them, a selection has to be made, taking into consideration the context of a given software project, for example its size, usage of agile approach or stakeholders' technical competency. This paper is intended to provide guidelines for such selection. We reviewed...
-
Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
Publication[Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...
-
Weryfikacja Poziomów Nienaruszalności Bezpieczeństwa z uwzględnieniem Zagadnień Ochrony Informacji
PublicationNiniejszy rozdział poświęcono wybranym istotnym zagadnieniom analizy bezpieczeństwa funkcjonalnego, w szczególności weryfikacji poziomów nienaruszalności bezpieczeństwa SIL funkcji bezpieczeństwa implementowanych w rozproszonych systemach sterowania i zabezpieczeń z uwzględnieniem zagadnień ochrony informacji. Zaproponowano metodę opartą na informacji ilościowej i jakościowej do weryfikacji SIL (IEC 61508, 61511) z uwzględnieniem...
-
ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS
PublicationThe article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...
-
Comparison and Analysis of Service Selection Algorithms
PublicationIn Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...
-
EU-Russian Relations and the Eastern Enlargement: Integration or Isolation
Publication -
Democratisation and Institutional Development in Romania after 1989
Publication -
Security of export transactions in the offer of leading banks on the Polish market
PublicationThe following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...
-
Implementation of integrated control In drinking water distribution systems - IT system proposal
PublicationImplementation of integrated control algorithms requires suitable hardware and software platforms. Proposed solution must allow realizing control and monitoring tasks, while ensuring high reliability and security of processed data. Additionally, the software and hardware solutions must be immune to outside influence. This paper presents an approach to implementation of control systems in drinking water distribution system. Presented...
-
On extending open source IMS platform for integrated IPTV and VoIP services over IPv6
PublicationEven when IMS is the most popular platform for multimedia services, the open versions of IMS ecosystem are lacking in specified functionalities for IPTVv6 and VoIPv6 services. In this paper, we extend current client and server open source software in order to provide reliability and security to these multimedia services. As a part of our work the IMS architecture for conferencing system with proposed mechanisms to improve system...
-
Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons
PublicationRecent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublicationModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
System setup and software for cyclic, staircase and square wave voltammetry measurements
PublicationHardware dedicated for electrochemical measurement sometimes does not allow performing certain voltammetry experiments. Staircase and square wave voltammetry, techniques which have many advantages comparing with standard voltammetric techniques, are rarely implemented in software controlling electrochemical measuring equipment. These methods, however, can be relatively easy realized with some addition...
-
IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA
Publication34 IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA Krystyna Gomółka Department of Social Sciences and Philosophy, Faculty of Management and Economics, Gdansk University of Technology Ul. G. Narutowicza 11/12, 80 - 233 Gdańsk, Poland Krystyna.Gomolka@zie.pg.gda.pl Abstract INOGATE Programme is one of the instruments designed for the implementation of the energy policy developed by the EU and...
-
Accounting for the distributions of input quantities in the procedure for the measurement uncertainty evaluation when calibrating the goniometer
PublicationThe discords concerning the measurement uncertainty evaluation in the Guide to the Expressing of Uncertainty in Measurement (GUM) and its Supplement 1 are considered. To overcome these discords, the authors of the paper propose to use the kurtosis method and the law of the propagation of the expanded uncertainty. Using the example of the goniometer calibration, the features of accounting for the distribution laws of input quantities...
-
Model-based testing for execution algorithms in the simulation of cyber-physical systems
PublicationThe understanding of simulation semantics of a hybrid system is a challenge for computational engineers as it requires expertise in computer science, engineering, numerical methods, and mathematics at once. The testing methods for the execution of a simulation are being researched but not yet applied on the industrial level. Consequently, the semantics of the simulation becomes a critical artifact in the system development process....
-
The Impact of Lexicon Adaptation on the Emotion Mining From Software Engineering Artifacts
PublicationSentiment analysis and emotion mining techniques are increasingly being used in the field of software engineering. However, the experiments conducted so far have not yielded high accuracy results. Researchers indicate a lack of adaptation of the methods of emotion mining to the specific context of the domain as the main cause of this situation. The article describes research aimed at examining whether the adaptation of the lexicon...
-
Comparison of developed gaze point estimation methods
PublicationThis paper presents the software part of an inexpensive hands-free eye tracking system. The system works using infrared illumination like most of the available eye trackers. Two methods allowing estimation the gaze point on computer screen are compared. Research on effectiveness of these methods is discussed and the better one is indicated.
-
Experimental and Computational Analysis of the Ship Propeller in Open Water Conditions for Inclined Flow
PublicationThe paper presents the results of computational analyses simulating the open water tests of ship propeller in inclined flow. The results of computations are compared with the results of corresponding experimental analyses carried out in the towing tank of Ship Design and Research Centre (CTO S.A.). The object of the research was the model propeller identified as CP469. The aim of the study was to validate the results of numerical...
-
PLC-based Implementation of Stochastic Optimization Method in the Form of Evolutionary Strategies for PID, LQR, and MPC Control
PublicationProgrammable logic controllers (PLCs) are usually equipped with only basic direct control algorithms like proportional-integral-derivative (PID). Modules included in engineering software running on a personal computer (PC) are usually used to tune controllers. In this article, an alternative approach is considered, i.e. the development of a stochastic optimizer based on the (μ,λ) evolution strategy (ES) in a PLC. For this purpose,...
-
Automatic Incident Detection at Intersections with Use of Telematics
PublicationWhile there are many examples of Intelligent Transport System deployments in Poland, more attention should be paid to traffic incident management and detection on dual-carriageways and urban street networks. One of the aims of CIVITAS DYN@MO, a European Union funded project, is to use TRISTAR (an Urban Transport Management System) detection modules to detect incidents at junctions equipped with traffic signals. First part of paper...
-
Applicability of Emotion Recognition and Induction Methods to Study the Behavior of Programmers
PublicationRecent studies in the field of software engineering have shown that positive emotions can increase and negative emotions decrease the productivity of programmers. In the field of affective computing, many methods and tools to recognize the emotions of computer users were proposed. However, it has not been verified yet which of them can be used to monitor the emotional states of software developers. The paper describes a study carried...
-
Creating IT competence centers
PublicationThis article indicates the need for supporting University Competence Centers. They are specialized centers, which aim to support teaching and development of newest software technologies, educating students, PhD Students and scientific workers also raising competetitiveness of the university at higher education market.
-
Marine autonomous surface ship - control system configuration
PublicationThis paper addresses the problem of marine autonomous surface ship (MASS) control. The contribution of the paper is the development of a control system configuration, done assuming fully autonomous MASS operation under distinct operational conditions. The overview of hardware and software selection is included.
-
Verification and Benchmarking in MPA Coprocessor Design Process
PublicationThis paper presents verification and benchmarking required for the development of a coprocessor digital circuit for integer multiple-precision arithmetic (MPA). Its code is developed, with the use of very high speed integrated circuit hardware description language (VHDL), as an intellectual property core. Therefore, it can be used by a final user within their own computing system based on field-programmable gate arrays (FPGAs)....
-
Gesture-based computer control system
PublicationIn the paper a system for controlling computer applications by hand gestures is presented. First, selected methods used for gesture recognition are described. The system hardware and a way of controlling a computer by gestures are described. The architecture of the software along with hand gesture recognition methods and algorithms used are presented. Examples of basic and complex gestures recognized by the system are given.
-
Generalized access control in hierarchical computer network
PublicationThe paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...
-
Creating a modern educational system based on IT competence centers
PublicationThis article indicates the need to support University Competence Centers. These are specialized cen-ters which aim to support teaching and the development of the latest software technologies, educating students, PhD students and scientific workers and also raising the competitiveness of the university on the higher education market. The article presents the characteristics of: IBM Rational RequisitePro, IBM Rational Requirements...
-
CMMI - an Assurance of Transferability of Knowledge andProjects in a Distributed Enterprise
PublicationCMMI (Capability Maturity Model Integrated)is a reference model fordefining and performing processes in software and systems engineeringorganizations.An organization implementing CMMI,among other things,assures thatacit knowledge is properly externalized into formal knowledge.This externalization gives an organization opportunity to assure that knowledge and development projects are easily transferable across adistributed enterprise...
-
Edible black ant Smith (Carebara vidua) as human food – A systematic review
PublicationMeeting food security is one of the major global challenges to ensure sufficient supply of food for current and future generations, considering increasing population growth and climate change issues. Consequently, the consumption of edible insects as an alternative food source has recently gained global attention for combating global food insecurity. The present review aims to provide information on the recent progress in consumption...
-
Implementation of IMS/NGN Transport Stratum Based on the SDN Concept
PublicationThe paper presents the development and verification of software and a testbed aiming to demonstrate the ability of two telecommunication network concepts—Next Generation Network (NGN) and Software-Defined Networking (SDN)—to cooperate. The proposed architecture includes components of the IP Multimedia Subsystem (IMS) in its service stratum and of the SDN (controller and programmable switches) in its transport stratum, providing...
-
A comprehensive overview of software product management challenges
PublicationThe principal focus of software product management is to ensure the economic success of the product, which means to prolong the product life as much as possible with modest expenditures to maximizs profits. Software product managers play an important role in the software development organization while being responsible for the strategy, business case, product roadmap, high-level requirements, product deployment (release-management),...
-
Bibliometric approach to tracking the concept of international competitiveness
PublicationThe main aim of paper is to identify the growth pattern in the international competitiveness literature, its core publications and key research domains on the basis of bibliometric data from the years 1945–2015. Citation data is collected from the ISI Web of Science Website, Scopus and Google Scholar, and analysed using HistCite, Pajek and VOSviewer software. Bibliometric indicators, network citation, key-route path methods and...
-
Computer-Aided Greenery Design—Prototype Green Structure Improving Human Health in Urban Ecosystem
PublicationIncreasing population and urbanization, with climate change consequences, such as rising temperatures, influence public health and well-being. The search to improve the quality of life in cities becomes one of the priority objectives. A solution can be found in the role of greenery in an urban environment and its impact on human health. This opens a path toward experimentation on microclimate green structures that can be inserted...
-
A review on carbon storage via mineral carbonation: Bibliometric analysis, research advances, challenge, and perspectives
PublicationMineral carbonation as a way of carbon storage has received a particular attention in the reduction of carbon dioxide (CO2) emission . This work gives a comprehensive description of the research trends and hotspots in the field of mineral carbonation for carbon storage based on bibliometric analysis. A total of 1507 articles were collected from the Web of Science database from 2010 to 2022 and analyzed in details, using a Citepace...
-
Innovative method of localization airplanes in VCS (VCS-MLAT) distributed system
PublicationThe article presents the concept and the structure of the localization module. The prototype module is the part of the VCS (VCS-MLAT) localization distributed system. The device receives the audio signal transmitted in airplanes band (118 MHz – 136 MHz). Received data with the timestamps are send to the main server. The data from multiple devices estimates the localization of the airplane. The main aim of the project is the analysis...
-
Active IR-Thermal Imaging in Medicine
PublicationIn this paper we summarize results of several research projects devoted to development of new diagnostic methods and procedures based on quantitative infrared thermography in medical applications. First, basics of active dynamic thermography are presented. Described are both, instrumentation and software comprising measurement procedures including collection of series of IR-images after external excitation, data treatment with...
-
DS-CDMA receiver in Software Defined Radio technology. Admission to the implementation of a RAKE receiver
PublicationProgrammable radio is one of the latest trends in the construction of multi-standard receivers. The technology, called Software Defined Radio (SDR), is also an ideal test platform that allows to try out different algorithms of signal receiving. This particular feature led to choose this platform to implement a DS-CDMA receiver (Direct Sequence Code Division Multiple Access). The use of SDR allows for a gradual upgrade of data processing...
-
Standards Conformity Framework in comparison with contemporary methods supporting standards application
PublicationAchieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...
-
Recognition of hazardous acoustic events employing parallel processing on a supercomputing cluster . Rozpoznawanie niebezpiecznych zdarzeń dźwiękowych z wykorzystaniem równoległego przetwarzania na klastrze superkomputerowym
PublicationA method for automatic recognition of hazardous acoustic events operating on a super computing cluster is introduced. The methods employed for detecting and classifying the acoustic events are outlined. The evaluation of the recognition engine is provided: both on the training set and using real-life signals. The algorithms yield sufficient performance in practical conditions to be employed in security surveillance systems. The...
-
Device-independent quantum key distribution based on measurement inputs
PublicationWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Advanced Potential Energy Surfaces for Molecular Simulation
PublicationAdvanced potential energy surfaces are defined as theoretical models that explicitly include many-body effects that transcend the standard fixed-charge, pairwise-additive paradigm typically used in molecular simulation. However, several factors relating to their software implementation have precluded their widespread use in condensed-phase simulations: the computational cost of the theoretical models, a paucity of approximate models...