Search results for: PROBABILISTIC METHODS
-
Average Size of a Suffix Tree for Markov Sources
PublicationWe study a suffix tree built from a sequence generated by a Markovian source. Such sources are more realistic probabilistic models for text generation, data compression, molecular applications, and so forth. We prove that the average size of such a suffix tree is asymptotically equivalent to the average size of a trie built over n independentsequences from the same Markovian source. This equivalenceis only known for memoryless...
-
Application of Pierson-Moskowitz wave spectrum to solution differential equations of multihull vessel
PublicationMotion of a dynamic system can be generated by different external or internal factors. At mathematical modelling external excitation factors of the most significant effect on the system, are selected. Such external factors are usually called excitations. Response of the system to given excitations is mathematically characterized by a definite transformation called operator of a system. For a broad class of dynamic systems the...
-
Methodological issues of functional safety and reliability assessment of critical systems in industrial hazardous plants
PublicationThe aim of this article is to identify and discuss some methodological issues that are of interest among functional safety specialists and experts after publication of the second edition of international standards IEC 61508 and IEC 61511, including the design and implementing the safety-related functions of higher safety integrity levels and protection layers. The basic role of safety-related systems is to reduce effectively and...
-
SENSITIVITY ANALYSIS IN THE REHABILITATION OF HISTORIC TIMBER STRUCTURES ON THE EXAMPLES OF GREEK CATHOLIC CHURCHES IN POLISH SUBCARPATHIA
PublicationThis work concerns structural and sensitivity analysis of carpentry joints used in historic wooden buildings in south-eastern Poland and western Ukraine. These are primarily sacred buildings and the types of joints characteristic for this region are saddle notch and dovetail joints. Thus, in the study the authors focus on these types of corner log joints. Numerical models of the joints are defined and finite element simulations...
-
The point estimate method in a reticulated shell reliability analysis
PublicationThe objective of this paper is to present an application of the point estimate method (PEM) that can determine the probabilistic moments for engineering structures. The method is reasonably robust and adequately accurate for a wide range of practical problems. It is a special case of numerical quadrature based on orthogonal polynomials. The main advantage of this method is that, unlike FORM or SORM, it is not necessary to carry...
-
Application of algorithms for reasoning from imperfect knowledge in it evaluation environment
PublicationThe paper describes concept of building multi-agent system dedicated for information technology evaluation or selection for IT enterprises management (IT_MAS). Authors present the model of Knowledge Processing Environment, which is one of main components of the solution. Either facts or rules will be based on IT specialists' experience. However, knowledge which is being acquisited from IT domain is mostly imperfect - uncertain...
-
Application of a stochastic compartmental model to approach the spread of environmental events with climatic bias
PublicationWildfires have significant impacts on both environment and economy, so understanding their behaviour is crucial for the planning and allocation of firefighting resources. Since forest fire management is of great concern, there has been an increasing demand for computationally efficient and accurate prediction models. In order to address this challenge, this work proposes applying a parameterised stochastic model to study the propagation...
-
Development of Local IDF-formula Using Controlled Random Search Method for Global Optimization
PublicationThe aim of the study is to present the effective and relatively simple empirical approach to rainfall Intensity-Duration-Frequency-formulas development, based on Controlled Random Search (CRS) for global optimization. The approach is mainly dedicated to the cases in which the commonly used IDF-relationships do not provide satisfactory fit between simulations and observations, and more complex formulas with higher number of parameters...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Eurozone or National Inflation Projections: Which has Greater Impact on Consumer Expectations?
PublicationWe compare the dependence of consumer inflation expectations on European Central Bank (ECB) inflation projections with that on national central bank (NCB) projections in four economies: Austria, Belgium, Finland, and Germany. We aim to assess whether the information published by central banks affects consumers, and whether inflation projections published by NCBs are more relevant to consumers than those published for the entire...
-
Current issues of functional safety and cybersecurity analysis of the industrial and critical infrastructures
PublicationThis article addresses some functional safety assessment procedures with cybersecurity aspects in critical industrial installations with regard to the functional safety requirements specified in standards IEC 61508 and IEC 61511. The functional safety management includes hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on the risk assessment...
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublicationNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Adaptive Method for Modeling of Temporal Dependencies between Fields of Vision in Multi-Camera Surveillance Systems
PublicationA method of modeling the time of object transition between given pairs of cameras based on the Gaussian Mixture Model (GMM) is proposed in this article. Temporal dependencies modeling is a part of object re-identification based on the multi-camera experimental framework. The previously utilized Expectation-Maximization (EM) approach, requiring setting the number of mixtures arbitrarily as an input parameter, was extended with the...
-
Basic sensitivity analysis of a telecommunication tower complementing standard reinforcement design process
PublicationThis paper presents straightforward sensitivity assessment of a telecommunication tower. The analysis is set toidentify the elements of the tower which may be reinforced with the greatest structural advantage. As current expertopin ions on structural redesign of similar structures due to a planned addition of extra loads are mainly based ondeterministic computations or engineering intuition,...
-
Procedure based proactive functional safety management for the risk mitigation of hazardous events in the oil port installations including insurance aspects
PublicationThis article addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety requirements specified in standards IEC 61508 and IEC 61511. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on risk assessment results...
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublicationThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
On reliability assessment of ship machinery system in different autonomy degree; A Bayesian-based approach
PublicationAnalyzing the reliability of autonomous ships has recently attracted attention mainly due to epistemic uncertainty (lack of knowledge) integrated with automatic operations in the maritime sector. The advent of new random failures with unrecognized failure patterns in autonomous ship operations requires a comprehensive reliability assessment specifically aiming at estimating the time in which the ship can be trusted to be left unattended....
-
COMPARATIVE ANALYSIS OF RESULTS OF APPLICATION OF MARKOV AND SEMI-MARKOV PROCESSES TO RELIABILITY MODELS OF MULTI-STATE TECHNICAL OBJECTS
PublicationDuring rational operation of technical objects and systems various operational decisions are made and decision-making process itself should be consisted in selecting that considered most favourable out of all possible to be taken. Choice of such decision is possible after taking into account many different information items but it never be completely correct without accounting for data and indices dealing with reliability. In...
-
Incorporating installation effects into the probability analysis of controlled modulus columns
PublicationThis technical report presents the probabilistic analysis which integrates the Monte Carlo simulation (MCS) with random field theory to model the load–displacement behavior of Controlled Modulus Columns (CMCs) in overconsolidated Poznań clay. Presented study focuses on the practical aspects of statistical analysis of geotechnical data, numerical model development, and results evaluation. Variability and spatial distribution of...
-
A framework for onboard assessment and monitoring of flooding risk due to open watertight doors for passenger ships
PublicationPost-accident safety of ships is governed by damage stability, affected by watertight subdivisions which limit accidental flooding. This is important for passenger ships with watertight doors (WTDs) often fitted in the bulkheads. Awareness of the ship flooding risk due to open WTDs and the conditions under which the associated risk level changes are prerequisites for proactive risk mitigation. Accident risk is often expressed as...
-
Diagnostic Model of Crankshaft Seals
PublicationT he paper presents a research stand being a diagnostic model of radial lip seals used, among others, on crankshafts of piston combustion engines in order to identify the correctness of their operation. The possibility of determining the technical condition of lip seals on the basis of the proposed coefficient of correctness of operation has been described. T he basic features of seals influencing their correctness of...
-
Safety integrity level verification for safety-related functions with security aspects
PublicationThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions
PublicationWe consider a generic model of Client-Server interactions in the presence of Sender and Relay, conceptual agents acting on behalf of Client and Server, respectively, and modeling cloud service providers in the envisaged "QoS as a Service paradigm". Client generates objects which Sender tags with demanded QoS level, whereas Relay assigns the QoS level to be provided at Server. To verify an object's right to a QoS level, Relay detects...
-
Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation
PublicationIn client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...
-
The Effect of the Selection of Three-Dimensional Random Numerical Soil Models on Strip Foundation Settlements
PublicationThis paper delivers a probabilistic attempt to prove that the selection of a random three-dimensional finite element (FE) model of a subsoil affects the computed settlements. Parametricanalysis of a random soil block is conducted, assuming a variable subsoil Young’s modulus inparticular finite elements. The modulus is represented by a random field or different-sized setsof random variables; in both cases, the same truncated...
-
Dynamic Bayesian Networks for Symbolic Polyphonic Pitch Modeling
PublicationSymbolic pitch modeling is a way of incorporating knowledge about relations between pitches into the process of an- alyzing musical information or signals. In this paper, we propose a family of probabilistic symbolic polyphonic pitch models, which account for both the “horizontal” and the “vertical” pitch struc- ture. These models are formulated as linear or log-linear interpo- lations of up to fi ve sub-models, each of which is...
-
Impact Assessment of Electric Vehicles Integration and Optimal Charging Schemes Under Uncertainty: A Case Study of Qatar
PublicationThe integration of electric vehicles (EVs) is rapidly growing compared to conventional vehicles in Qatar. To assess how these electric vehicles will impact Qatar’s distribution network, it is necessary to accurately model EV loads. However, EV loads exhibit uncertainties due to driving behaviour in charging time, state of charge (SOC), number of trips, and distance travelled. This necessitates the development of a probabilistic...
-
Multi-layered mineral glass units used as viewport elements of underwater ship structures
PublicationIn the paper, Authors deals with viewport elements of underwater marine constructions. If a single-plate viewport constructions are considered, big thicknesses of the glass plate are required to resist the pressure. To build the viewports from the commercially accessible glass panes, multi-layered glass units are proposed in the paper. Numerical calculations are presented, summarized and compared with experimental tests. Focusing...
-
Contextual Knowledge to Enhance Workplace Hazard Recognition and Interpretation in a Cognitive Vision Platform
PublicationThe combination of vision and sensor data together with the resulting necessity for formal representations builds a central component of an autonomous Cyber Physical System for detection and tracking of laborers in workplaces environments. This system must be adaptable and perceive the environment as automatically as possible, performing in a variety of plants and scenes without the necessity of recoding the application for each...
-
Problemy zarządzania bezpieczeństwem obiektu przemysłowego podwyższonego ryzyka
PublicationW rozdziale przedstawiono wybrane zagadnienia dotyczące zarządzania bezpieczeństwem w zautomatyzowanym złożonym obiekcie podwyższonego ryzyka. Pokazano, że ryzyko strat można istotnie ograniczyć stosując odpowiednie rozwiązania techniczne w postaci warstwowego systemu zabezpieczeń, który obejmuje podstawowy system sterowania procesem, człowieka-operatora i system automatyki zabezpieczeniowej. Podkreślono znaczenie właściwego zaprojektowania...
-
The Employment of Ukrainians as an Opportunity to Fill the Labour Market in Poland – Selected Issues
PublicationThe labour market in Poland has undergone signifi cant transformations over the past two decades. The observed changes have been infl uenced by various factors related to, among other things, the possibility of free movement of the population resulting from membership of EU structures, demographic changes, technological changes, and the automation and robotisation of production processes. Demographic change is becoming a signifi...
-
Managing safety of industrial hazardous installations with emphasis on the control systems, interfaces and human factors
PublicationIn the paper a procedure for the layer of protection analysis (LOPA) as a tool to evaluate the risk of accident scenarios occurrence in hazardous installations is outlined. In such installations several protection layers exist. Human operator performance in each layer is unavoidable, but the role and tasks are different and depend on the context of situation. Based on suggestions form literature (EEMUA, CREAM) and own proposals...
-
Functional safety analysis including human factors
PublicationThe article addresses selected aspects of human factors that should be taken into account during the design of safety-related functions for a complex hazardous installation and its protections. In such installations the layer of protection analysis (LOPA) methodology is often used for simplified risk analysis based on defined accident scenarios. To control the risk the safety instrumented functions (SIFs) are identified and their...