Filters
total: 1175
filtered: 1010
-
Catalog
Chosen catalog filters
displaying 1000 best results Help
Search results for: agile, security, software development methods
-
Przegląd metod oceny struktur przestrzennych w warunkach zrównoważonego rozwoju
Publicationthe article "the assessment methods' review of urban structures in the sustainable development context" presents various methods along with tools and ways how to apply them. mainly it is based on methods' descriptions contained in bequest programme (building environmental quality evaluation sustainability through time). the assessment should improve formation of the built environment and practical realization of the idea of sustainable...
-
Software-Defined NB-IoT Uplink Framework - The Design, Implementation and Use Cases
PublicationIn the radiocommunication area, we may observe a rapid growth of new technology, such as 5G. Moreover, all the newly introduced radio interfaces, e.g., narrowband Internet of Things (NB-IoT), are strongly dependent on the software. Hence, the radiocommunication software development and optimization, as well as the 3GPP technical specification, should be introduced at the academic level of education. In this paper, a software-defined...
-
Health monitoring services based on off-the-shelf mobile devices
PublicationDevelopment of health monitoring systems usually involves usage of dedicated devices with provided guarantees in terms of their reliability. Those devices raise the cost of the whole system, because of which such platforms are limited only to specific areas and constrained number of users. Usage of off-the- shelf devices could lower the cost and bring those systems to the masses. The paper covers possible uses of common off-the-shelf...
-
Revsable framework for telecontrol protocols. W: Springer Homepage [online] Proceedings. Second International ESPRIT ARES Workshop on Development and Evolution of Software Architectures for Product Families. Las Palmas de Gran Canaria, Spain, February 26-27, 1998. [Dostęp: 20 grudnia**2002]. Ed. F. van der Linden. Dostępny w World Wide Web: http://link.springer.de/link/ /service/series/0558/tocs/t1429.htm [s. 6-13, 5 rys. bibliogr. 6 poz.] Wzorce wielokrotnego wykorzystania oprogramowania protokołów telesterowa- nia.
PublicationZaprezentowano wzorzec COMSOFT wielokrotnego wykorzystania oprogramowania o-pracowany dla protokołów telesterowania. Jego podstawy tworzą: metodologiaobiektowa i wzorce wielokrotnego użycia. Zastosowanie wzorców wspomagają:biblioteka komponentów, wykorzystywanych we wszystkich fazach konstrukcji o-programowania oraz procedury użytkowania i parametryzacji. Opracowane wzorcezostały praktycznie zastosowane do konstrukcji oprogramowania...
-
Koncepcja platformy wymiany informacji o incydentach cyberbezpieczeństwa dla krajowego systemu elektroenergetycznego
PublicationArtykuł opisuje wybrane zagadnienia związane z cyberbezpieczeństwem w sektorze elektroenergetyki. Jednym z elementów zapewniania bezpieczeństwa sieci elektro-energetycznej jest efektywna wymiana informacji o incydentach bezpieczeństwa. W jej ramach wszystkie zaangażowane podmioty systemu elektroenergetycznego, tj.: elektrownie, operatorzy systemów przesyłowych, operatorzy systemów dystrybucyjnych, dostawcy rozwiązań bezpieczeństwa,...
-
Hybrid Finite Element Method Development for Offshore Structures’ Calculation with the Implementation of Industry Standards
PublicationIn the design process of offshore steel structures, it is typical to employ commercial calculation codes in which simulation and evaluation of results are performed on the basis of the available standards (e.g. API, DNV, Lloyds). The modeling and solution rely on finite element methods and cover the simulation of the structure’s properties along with the influence of the marine environment – sea currents, wave and wind loading,...
-
Stradar - Multimedia Dispatcher and Teleinformation System for the Border Guard
PublicationSecurity of national borders requires utilization of multimedia surveillance systems automatically gathering, processing and sharing various data. The paper presents such a system developed for the Maritime Division of the Polish Border Guard within the STRADAR project. The system, apart from providing communication means, gathers data, such as map data from AIS, GPS and radar receivers, videos and photos from camera or audio from...
-
Graph security testing
PublicationSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Analiza obudowy wykopu dla budynku z kondygnacją podziemną
PublicationW pracy poruszono tematykę analizy obudowy wykopu dla budynku z jedną kondygnacją podziemną, zlokalizowanego w gęstej zabudowie śródmiejskiej. Obliczenia przeprowadzono za pomocą dwóch programów obliczeniowych: GEO5 (moduł: Ściana analiza) i Autodesk Robot Structural Analysis Professional. Całość wyników podsumowano, a wnioski sformułowano w odniesieniu do obecnej sytuacji na rynku budowlanym, charakteryzującej się coraz to trudniejszymi...
-
Techniczne aspekty implementacji nowoczesnej platformy e-learningowej
PublicationZaprezentowano aspekty techniczne implementacji nowoczesnej platformy nauczania zdalnego. Omówiono obszary funkcjonalne takie jak: system zarządzania nauczaniem, serwis informacyjny, dodatkowe oprogramowanie dydaktyczne oraz kolekcja zasobów multimedialnych. Przybliżono zagadnienia związane z bezpieczeństwem takiej platformy. Na końcu przedstawiono parametry techniczne wdrożonej na Politechnice Gdańskiej platformy eNauczanie.
-
A COMPARISON OF THE WIND SPECTRUM ACCORDING TO DIFFERENT METHODS - AN ORIGINAL PROJECT OF A BUILDING ON A CLIFF IN GDYNIA
PublicationThe article presents numerical simulations of the dynamic wind loads on the structure of a building designed on a cliff in Gdynia. The results obtained from the two methods: Davenport’s and Karman’s are compared. The results allowed a comparison of the two methods, and they provided an answer to the question how a construction, designed in such an unusual condition of a cliff behaves under the influence of the gusting wind. The...
-
Hard lessons learned: delivering usability in IT projects
PublicationEffective project management requires the development of a realistic plan which aims to ensure the success of the project and ultimately deliver a high quality product to customers. However, experience shows that the majority of software vendors managing projects suffer from numerous problems to provide usability in IT solutions and complete a project in a given time with success. In this paper we discuss, analyze and synthesize...
-
Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies
PublicationThe aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...
-
Memetic approach for multi-objective overtime planning in software engineering projects
PublicationSoftware projects often suffer from unplanned overtime due to uncertainty and risk incurred due to changing requirement and attempt to meet up with time-to-market of the software product. This causes stress to developers and can result in poor quality. This paper presents a memetic algorithmic approach for solving the overtime-planning problem in software development projects. The problem is formulated as a three-objective optimization...
-
Computational modeling of molecularly imprinted polymers as a green approach to the development of novel analytical sorbents
PublicationThe development of novel molecularly imprinted polymers (MIP) sorbents for specific chemical compounds require a lot of tedious and time-consuming laboratory work. Significant quantities of solvents and reagents are consumed in the course of the verification of appropriate configurations of polymerization reagents. Implementation of molecular modeling in the MIP sorbent development process appears to provide a solution to this...
-
Determination of aminoglycoside antibiotics: current status and future trends
PublicationThe use of aminoglycoside antibiotics is prevalent in medicine and agriculture. Their overuse increases their mobility in the environment, resulting in a need for reliable methods for their determination in a variety of matrices. However, the properties of aminoglycosides, in particular their high polarity, make the development of such methods a non-trivial task, inciting researchers to tackle this complex issue from different...
-
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublicationThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
Psychological inspirations in empirical software engineering.
PublicationSoftware development is people-intensive activity. Incorporation of human factors in empirical studies of software engineering can bring many benefits for both researchers and practitioners. Psychological inspirations can facilitate this task. In this paper, such incorporation is presented in the contexts of the objectives and problems in empirical studies, applicability of the results in the business context of software enterprise,...
-
Application development for Android, iOS and BlackBerry mobile platforms
PublicationMobile devices, along with dedicated operating systems, have become a substantial and rising trend in software development. Computer industry has significantly changed in order to fulfil the needs of this new segment of the market. Authors have participated in projects, which involved programming on Android, iOS and BlackBerry operating systems. In this paper the most popular mobile platforms (and multiplatform Unity3D environment)...
-
Hybrid Technique for the EM Scattering Analysis with the Use of Ring Domain Decomposition
PublicationA hybrid technique combining finite-element and mode-matching methods for the analysis of scattering problems in open space is presented here. The main idea is based on impedance matrix descriptions of the boundary surrounding the discrete computational domain and combine it with external field described analytically. The discrete analysis, which is the most time- and memory-consuming, is limited here only to the close proximity...
-
Multi-Stage Video Analysis Framework
PublicationThe chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....
-
Supporting Compliance with Security Standards by Trust Case Templates
PublicationTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS
PublicationThe paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...
-
Reducing the Environmental Impact of the Public Water Transportation Systems by Parametric Design and Optimization of Vessels’ Hulls. Study of the Gdańsk’s Electric Passenger Ferry (2015-2016).
PublicationThe paper presents the potential and risks of utilizing Rhinoceros and Grasshopper software for parametric design and multi-varietal optimization of the hull of a small sustainable ferry. The sustainability criteria, parametric design flowchart and optimizing methods are described. As the result, the advantages and disadvantages of this approach obtained in the research-by-design process conducted by an intercollegiate team at...
-
State-of-the-art framework for high-speed camera and photogrammetric use in geometry evaluation of prestressed concrete failure process
PublicationPrestressed structures are a key to the realization of the boldest architectural ideas, regardless of shape complexity, great height and large span. A characteristic feature of the prestressed structure is the better use of concrete material properties by insertion of internal forces. The internal forces are opposed to external loads effects (forces and deformations of structure). Prestressed reinforced concrete beams are characterized...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublicationBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Knowledge management in the processes of project requirements analysis
PublicationAuthors, based on one of popular software project management methods as RUP fo-cused on one of most important discipline in project management as requirements management. Authors decomposed the role of the business analyst and present methodological and realizational processes of knowledge managament in traditional and applied sources of knowledge tied with this role. An experiment was conducted in four project teams of all sizes,...
-
Developments in Green Chromatography
PublicationGreen analytical chemistry is a widely recognized concept that has led to the development of new analytical methods with reduced environmental impact and minimized analyst occupational exposure. Achievements include the development of microextraction, ultrasound-assisted extraction (UAE), and microwave-assisted extraction (MAE) techniques. Research towards greener separation processes focuses on the elimination of toxic solvents...
-
The investment process in the power supply industry
PublicationThe basis for power supply industry programming in a market economy should be the principle of sustainable development, which must take into account maintaining an adequate level of energy security on the one hand, and the aim to preserve the maximum degree of non-renewable resources on the other hand. Therefore, the overriding aim should be a strive to meet the current and prospective demand for energy and fuel, in conjugation...
-
Solving the Problem of Dynamic Adaptability of Artificial Intelligence Systems that Control Dynamic Technical Objects
PublicationThis paper investigates the increase in the response speed and stability of artificial intelligence systems that control dynamic technical objects. The problem of calculating the optimal time of switching an artificial intelligence system between software classes by the criterion of the rigidity degree of the model of a control object is considered. The solution of this problem is proposed for the general case of the control object...
-
A derivatisation agent selection guide
PublicationThe development of new tools for providing high quality information in a cost-effective and expeditious way is one of the main aims of analytical chemistry. Remarkably, the introduc- tion of the 12 principles of green chemistry paved the way forward for the development of analytical methodologies that are, ideally, inherently safe for the operator and the environ- ment, with the least possible consumption of energy and chemicals,...
-
Testbed for development and verification of hybrid localization systems
PublicationIn this paper a testbed for development and verification of hybrid localization systems is presented. It allows for systematic analysis of hybrid localization methods and speed up the development of new schemes. The proposed testbed platform is composed of subsystem for sequential data collection and testing infrastructure that can be used for investigating the localization mechanisms in controllable environment.
-
Public spaces connecting cities. Green and Blue Infrastructures potential.
PublicationA city fragmentation causes a lot of negative effects in urban environment such as: disconnecting the environmental, functional and compositional relations, a loss of urban compactness, chaotic development, visual chaos, a domination of technical landscape, reduction of security. This is why one of main challenges for urban planners is to connect the fragmented structures by creating friendly, attractive and safe public space....
-
Knowledge-based functional safety management using ProSIL software
PublicationIn the article the ProSIL software for computer aided functional safety management is presented. The software consists of three modules for the determination of the required SIL level (ProSILen) and verification of the SIL level (ProSILver). In the ProSIL the calibrated knowledge-based risk graph method for determining the required safety integrity level (SIL) of the safety functions identified in hazard analysis is implemented....
-
Low-Cost Flight Simulator with Possibility of Modeling of Flight Controls Failures
PublicationThe goal of this paper is to present a development of a low cost flight simulator, that allows to simulate flight controls failures. Cessna 172 has been chosen as an example of a general aviation aircraft and the flight model has been implemented in Simulink. The model allows for easy integration of an experimental autopilot, using various strategies. Aerodynamic coefficients have been calculated using software called DATCOM. Such...
-
Hybrid Finite Element Method Development for Offshore Structures’ Calculation with the Implementation of Industry Standards
PublicationIn the design process of offshore steel structures, it is typical to employ commercial calculation codes in which simulationand evaluation of results are performed on the basis of the available standards (e.g. API, DNV, Lloyds). The modelingand solution rely on finite element methods and cover the simulation of the structure’s properties along with the influenceof the marine environment – sea currents, wave...
-
Edible dragonflies and damselflies (order Odonata) as human food – A comprehensive review
PublicationThe rapid growth of the human population leads to a big concern about the food y and demand worldwide. However, due to the reduction in global arable land area, humans need to find alternative food sources to fulfil their needs. Consequently, edible insects have been identified as a promising solution to ameliorate food security and increase global nutrition. Among more than 2,100 identified edible insect species, dragonflies and...
-
Integrating web site services into application through user interface
PublicationThe issue of integrating applications which are only accessible through visual user interface is not thoroughly researched. Integration of web applications running remotely and controlled by separate organizations becomes even more complicated, as their user interface can display differently in different browsers or change without prior notification as a result of application maintenance. While possible, it is generally not common...
-
Innovative Web-Based Geographic Information System for Municipal Areas and Coastal Zone Security and Threat Monitoring Using EO Satellite Data
PublicationThe paper presents a novel design of a Web-based Safe City & Coastal Zone GIS (SCCZ-GIS). The system integrates data acquired from different remote sensing and geospatial data sources for the purpose monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilises several innovative technologies and solutions, and is capable of direct co-operation with different remote sensing data sources...
-
Analysis of server-side and client-side Web-GIS data processing methods on the example of JTS and JSTS using open data from OSM and geoportal
PublicationThe last decade has seen a rapid evolution of processing, analysis and visualization of freely available geographic data using Open Source Web-GIS. In the beginning, Web-based Geographic Information Systems employed a thick-client approach which required installation of platform-specific browser plugins. Later on, research focus shifted to platform-independent thin client solutions in which data processing and analysis was performed...
-
The evaluation of eGlasses eye tracking module as an extension for Scratch
PublicationIn this paper we present the possibility of using eGlasses eye tracking module as an extension for Scratch programming tool which is a visual programming language supporting computer skills learning. The main concept behind this project is to setup the interface for rapid interaction design. Eye tracking is a powerful tool for hands free communication but for that requires a dedicated software. This software is rarely tailored...
-
Automatic audio signal mixing system based on one-dimensional Wave-U-Net autoencoders
PublicationThe purpose of this dissertation is to develop an automatic song mixing system that is capable of automatically mixing a song with good quality in any music genre. This work recalls first the audio signal processing methods used in audio mixing, and it describes selected methods for automatic audio mixing. Then, a novel architecture built based on one-dimensional Wave-U-Net autoencoders is proposed for automatic music mixing. Models...
-
SACAM A Model for Describing and Classifying Sentiment Analysis Methods
PublicationIn this paper we introduce SACAM — a model for describing and classifying sentiment analysis (SA) methods. The model focuses on the knowledge used during processing textual opinions. SACAM was designed to create informative descriptions of SA methods (or classes of SA methods) and is strongly integrated with its accompanying graphical notation suited for presenting the descriptions in diagrammatical form. The paper discusses applications...
-
A New Approach to Capacitive Sensor Measurements Based on a Microcontroller and a Three-Gate Stable RC Oscillator
PublicationA complete smart capacitive sensor solution basedA complete smart capacitive sensor solution based on a microcontroller was developed. This approach includes the development of both the hardware and software. The hardware part comprises an 8-bit microcontroller equipped with two timers/counters and a three-gate stable RC relaxation oscillator. The software part handles system configuration, measurement control, communication control,...
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublicationAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
Trim Optimisation - Theory and Practice
PublicationForce Technology has been working intensively with trim optimisation tests for almost last 10 years. Focus has primarily been put on the possible power savings and exhaust gases reduction. This paper describes the trim optimisation process for a large cargo vessel. The physics behind changed propulsive power is described and the analyses in order to elaborate the optimum trimmed conditions are presented. Different methods for prediction...
-
Overview of Scalability and Reliability Problem in SDN Networks
PublicationIn the paper an overview of scalability and reliability in the SDN (Software Defined Networks) networks has been presented. Problems and limitations for guaranteeing scalability and reliability in SDN networks have been indicated. Known methods for assuring scalability and reliability in SDN networks have been described. Projects from research communities for resolving issues with scalability and reliability in SDN networks have...
-
AGREEprep – Analytical greenness metric for sample preparation
PublicationThis work proposes for the first time, a metric tool that gives prominence to sample preparation. The developed metric (termed AGREEprep) was based on 10 categories of impact that were recalculated to 0 e1 scale sub-scores, and then used to calculate the final assessment score. The criteria of assessment evaluated, among others, the choice and use of solvents, materials and reagents, waste generation, energy consumption, sample...
-
Model of a Maturity Capsule in Managing IT Projects
PublicationThe main purpose of this article is to present a report on the development of a model of information technology management (MITM). This model is an answer to the need to support decision making in the selection of methods and information technologies. This article presents a multisequential model (MSM) of technology selection and a model for initial processing procedures (IPP) necessary for the MITM model. The presentation of the...
-
E-experiments in physics. Proper business process management, collaborative development process and project management guidance – remedy for avoiding the main IT project’s failure
PublicationOnly a few of learning aids and simulations of physical phenomena allow for building interactive experiments; experiments similar to those that should be conducted in physics laboratories at schools. Group of staff from Gdansk University of Technology decided to fill this market niche by designing and constructing a set of virtual experiments – so called e-experiments. To avoid common problems that a lot of IT products brought...