displaying 1000 best results Help
Search results for: geographic information system (gis)
-
Numerical estimation of flood zones in the Vistula River valley, Warsaw, Poland
PublicationPrzedstawiono studium dotyczące wyznaczenia stref zagrożenia powodziowego dla miasta Warszawy wskutek wezbrań rzeki Wisły. Do oszacowania zasięgu stref wykorzystano matematyczny model ustalonego przepływu wolnozmiennego oraz numeryczny model terenu doliny rzeki. Do zobrazowania uzyskanych wyników zastosowano system GIS. Na podstawie uzyskanych wyników zidentyfikowano obszary miasta Warszawy narażone na ewentualną powódź oraz odcinki...
-
Flood zones - a risk for the urban areas
PublicationPrzedstawiono studium dotyczące wyznaczenia stref zagrożenia powodziowego dla miasta Warszawy wskutek wezbrań rzeki Wisły. Do oszacowania zasięgu stref wykorzystano matematyczny model ustalonego przepływu wolnozmiennego oraz numeryczny model terenu doliny rzeki. Do zobrazowania uzyskanych wyników zastosowano system GIS. Na podstawie uzyskanych wyników zidentyfikowano obszary miasta Warszawy narażone na ewentualną powódź oraz odcinki...
-
Arsalan Muhammad Soomar Doctoral Student
PeopleHi, I'm Arsalan Muhammad Soomar, an Electrical Engineer. I received my Master's and Bachelor's Degree in the field of Electrical Engineering from Mehran University of Engineering and Technology, Jamshoro, Sindh, Pakistan. Currently enrolled as a Doctoral student at the Gdansk University of Technology, Gdansk, Poland. Also worked in Yellowlite. INC, Ohio as a Solar Design Engineer. HEADLINE Currently Enrolled as a Doctoral...
-
TRANSFER OF ELECTRIC ENERGY [2023/24]
e-Learning CoursesCourse content: Basic information on the structure of the power system, the major devices (components) for generation, transmission and distribution of electricity. Active and reactive power generation and their sources. Power supply networks. Tasks, structure, parameters. AC and DC transmission of electricity. Equivalent diagrams of the components of the power system. Steady state load flow calculation: currents, voltage,...
-
TRANSFER OF ELECTRIC ENERGY [2022/23]
e-Learning CoursesCourse content: Basic information on the structure of the power system, the major devices (components) for generation, transmission and distribution of electricity. Active and reactive power generation and their sources. Power supply networks. Tasks, structure, parameters. AC and DC transmission of electricity. Equivalent diagrams of the components of the power system. Steady state load flow calculation: currents, voltage,...
-
TRANSFER OF ELECTRIC ENERGY [2024/25]
e-Learning CoursesCourse content: Basic information on the structure of the power system, the major devices (components) for generation, transmission and distribution of electricity. Active and reactive power generation and their sources. Power supply networks. Tasks, structure, parameters. AC and DC transmission of electricity. Equivalent diagrams of the components of the power system. Steady state load flow calculation: currents, voltage, power,...
-
TRANSFER OF ELECTRIC ENERGY [2024/25]
e-Learning CoursesCourse content: Basic information on the structure of the power system, the major devices (components) for generation, transmission and distribution of electricity. Active and reactive power generation and their sources. Power supply networks. Tasks, structure, parameters. AC and DC transmission of electricity. Equivalent diagrams of the components of the power system. Steady state load flow calculation: currents, voltage,...
-
Business applications of geolocation - modern solutions and trends
PublicationThe technological development of geolocation systems has resulted in the utilization of physical location of users by a growing number of entrepreneurs. As mobile technology develops, the use of geolocation in business is becoming widespread with a new range of geomarketing techniques. Entrepreneurs therefore more often utilize geolocation in their promotional and operational activities. In this article mobile-based geolocation...
-
An Innovative New Approach to Light Pollution Measurement by Drone
PublicationThe study of light pollution is a relatively new and specific field of measurement. The current literature is dominated by articles that describe the use of ground and satellite data as a source of information on light pollution. However, there is a need to study the phenomenon on a microscale, i.e., locally within small locations such as housing estates, parks, buildings, or even inside buildings. Therefore, there is an important...
-
Model of management of knowledge bases in the information technology evaluation environment
PublicationThe paper presents the model of management of knowledge bases in multi-agent system for evaluation of information technologies (IT_MAS). Such system is being developed in Gdansk Uni-versity of Technology by Information Technology Management Team. Multi-agent system is supposed to support manager level specialists during decision processes when there is identified need to buy or change any information technology. The main goal of...
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
POLLUTANTS PRESENT IN DIFFERENT COMPONENTS OF THE SVALBARD ARCHIPELAGO ENVIRONMENT
PublicationDuring last years an interest in the processes of transport and fate of pollutants to the polar regions located distantly from industrial centers, has significantly increased. The current analytical techniques enabling conducting studies prove that the Arctic regions (in the past considered as a pollution free area) have become an area of highly intensive anthropopresion. Svalbard archipelago stands out from the other polar regions...
-
MineSens Intelligent system for detection and monitoring of mine workings using satellite and GIS systems (MineSens)"
ProjectsProject realized in University of Agriculture in Krakow according to POIR.01.01.01-00-1465/20-00 agreement from 2021-04-21
-
Generic emergence of classical features in quantum Darwinism
PublicationQuantum Darwinism posits that only specific information about a quantum system that is redundantly proliferated to many parts of its environment becomes accessible and objective, leading to the emergence of classical reality. However, it is not clear under what conditions this mechanism holds true. Here we prove that the emergence of classical features along the lines of quantum Darwinism is a general feature of any quantum dynamics:...
-
Automatic evaluation of information credibility in Semantic Web and Knowledge Grid
PublicationThis article presents a novel algorithm for automatic estimation of information credibility. It concerns information collected in Knowledge Grid and Semantic Web. Possibilities to evaluate the credibility of information in such structures are much greater than those available for WWW sites which use natural language. The rating system presented in this paper estimates credibility automatically on the basis of the following metrics:...
-
RF Indoor Positioning System Supported by Wireless Computer Vision Sensors
PublicationIn this paper the possibility of increase the accuracy of RF fingerprinting indoor tracking system by the use of additional information from simple vision system is examined. As the distances in signal space differs from ones in real environment the ambiguity in decision process of fingerprinting algorithm can occur when set of closest distances between tag and map points in signal space corresponds to big distances differences...
-
Accuracy and Availability of EGNOS - Results of Observations
PublicationAccording to SBAS concept the user should receive timely the correct information about the system integrity and corrections to the pseudoranges measurements, which leads to better accuracyof coordinates. In theory the whole system is permanently monitored by RIMS stations, so it is impossible to deliver the faulty information to the user. The quality of the system is guaranteed inside the border of the system coverage however in...
-
Cybersecurity of Enterprise Infrastructure 2023
e-Learning CoursesThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
Managing enterprise IT infrastructure and security 2022
e-Learning CoursesThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
Cybersecurity of Enterprise Infrastructure 2024
e-Learning CoursesThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
An Impact Analysis of Artificial Light at Night (ALAN) on Bats. A Case Study of the Historic Monument and Natura 2000 Wisłoujście Fortress in Gdansk, Poland
PublicationThe artificial light at night (ALAN) present in many cities and towns has a negative impact on numerous organisms that live alongside humans, including bats. Therefore, we investigated if the artificial illumination of the historic Wisłoujście Fortress in Gdańsk, Poland (part of the Natura 2000 network), during nighttime events, which included an outdoor electronic dance music (EDM) festival, might be responsible for increased...
-
Optymalizacja sceny dla potrzeb interakcyjnej wizualizacji terenu rzeczywistego wykorzystująca klaster obliczeniowy
PublicationInterakcyjny system Wiz3D przeznaczony do wizualizacji terenu rzeczywistego na podstawie danych pochodzących z Geograficznych Systemów Informacyjnych (GIS) wymaga dużych mocy obliczeniowych na etapie upraszczania sceny służącego płynnej generacji kolejnych kadrów animacji. W związku z tym zaplanowano realizację tego etapu przez klaster obliczeniowy. Aby osiągnąć jak najkrótszy czas wykonania należy zadbać o równomierne obciążenie...
-
Maciej Szczodrak dr inż.
People -
Streaming Real-time Data in Distributed Dispatcher and Teleinformation Systems for Visualization of Multimedia Data of the Border Guard
PublicationSurveillance of the sea borders is a very important task for the Border Guard. Monitoring of country maritime border is an important task of the Border Guard. This task can be facilitated with the use of the technology enabling gathering information from distributed sources and its supervision and visualization. This task can be accomplished using a technology that allows to collect information from distributed sensors of different...
-
Simulating Malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Extreme weather layer method for implementation of nature-based solutions for climate adaptation: Case study Słupsk
PublicationOne of the most severe climate risks that is expected to affect all regions is related to stormwater. Climate models, constructed based on long-term trends, show that extreme weather events such as storms, cloudbursts and a large rise in sea level will be significant in the coming decades. Moreover, even the frequency and intensity of “normal” rainfall events, such as microbursts, are expected to be remarkably higher than today...
-
Exploring contexts of use of cultural objects in virtual museums
PublicationThis paper presents a system which facilitates discovering knowledge about cultural objects. The system is based on semantic modeling of a virtual museum which consists of cultural objects placed in a virtual 3D space. The article describes an extension to the concept of cultural objects which includes information on the use of these objects. This extension enables to place objects in an appropriate context in a virtual museum....
-
Smart innovation process enhancement using SOEKS and decisional DNA
PublicationProduct innovation always requires a foundation based on both knowledge and experience. The production and innovation process of products is very similar to the evolution process of humans. The genetic information of humans is stored in genes, chromosomes and DNA. Similarly, the information about the products can be stored in a system having virtual genes, chromosomes and decisional DNA (DDNA). The present paper proposes...
-
Photovoltaic-Installation Performance in Central Europe on the Example of Poland
PublicationThe amount of the electric energy obtained from a photovoltaic (PV) installation depends on the energy of the radiation. Weather conditions differ strongly between various years even in the same season. Depending on the climatic conditions of a given location, fixed PV solar plants as well as one-axis and dual-axis tracking PV solar plants are being installed worldwide. The aim of this work is to analyse the sunlight intensity...
-
Łukasz Kamiński dr inż.
People -
Modelling and computer animation of geodetic field work
Publication3D modelling of objects is a way of obtaining information, while the visualization of geospatial data is becoming a production task in the scope of surveying. Visualization of geospatial data provides effective tools for analysis information about the land surface, land cover, its features, properties etc. Computer animations, both 2D images and 3D are becoming additional, expected and clear form for presentation results of geodetic...
-
The Conception of Decision-Making Support System for ComplexEnergetic System on Example of Ship Propulsion System
PublicationIn paper, the conception of decision-making support system for complex energetic system on example of ship propulsion system has been presented. Diversity of conditions, information overload and very often contradiction of decision-making criteria and time constraints result in difficulties in making right (rational) decision without using more or less expanded information processing systems (eg. database systems, expert systems,...
-
Kamil Brodnicki dr inż.
PeopleKamil Brodnicki is an assistant at the Department of Applied Informatics in Management at the Faculty of Economics and Management at the Gdańsk University of Technology. From 2017, he is the head of the Customer Experience laboratory. Since 2011, he has been working in one of the Tri-City IT companies as an IT Systems Analyst, implementing projects in the financial sector. His research interests are focused on the following areas:...
-
Work Safety and Ergonomics - L-15/C-0/L-0/P-0, Design and Production Engineering, WIMiO, undergraduate studies, engineering studies, full-time (stationary) studies, 2021/2022, se04, (M:32013W0), summer semester 2023/2024
e-Learning CoursesWydział Mechaniczny Mechanika i budowa maszyn (w języku angielskim). Kurs: Specjalność: Design and Production Engineering (WM), I stopnia - inżynierskie, stacjonarne, 2018/2019 - zimowy (obecnie sem. 4), Semestr: 2019/2020 - letni. Student explains the concepts of ergonomics. Describes its goals and area of application. Defines the human - machine - environment system. Designs the human working environment taking into account...
-
Event-Triggered Communication in Cooperative, Adaptive Model Predictive Control of a Nuclear Power Plant’s Turbo–Generator Set
PublicationThis paper discusses the issue of optimizing the communication between the components of a cooperating control system formed by a pair of MPC controllers of a nuclear power plant turbine set using online recursive least squares identification. It is proposed to use event-triggered communication, i.e., sending information only at selected time instants, as opposed to the standard approach where communication is triggered by time...
-
Framework for Product Innovation Using SOEKS and Decisional DNA
PublicationProduct innovation always requires a foundation based on both knowledge and experience. The production and innovation process of products is very similar to the evolution process of humans. The genetic information of humans is stored in genes, chromosomes and DNA. Similarly, the information about the products can be stored in a system having virtual genes, chromosomes and decisional DNA. The present paper proposes a framework for...
-
Interactive Information Retrieval Algorithm for Wikipedia Articels
PublicationThe article presents an algorithm for retrieving textual information in documents collection. The algorithm employs a category system that organizers the repository and using interaction with user improves search precision. The algorithm was implemented for simple English Wikipedia and the first evaluation results indicates the proposed method can help to retrieve information from large document repositories.
-
Information content of systems as a physical principle
PublicationTo explain the conceptual gap between classical and quantum and other, hypothetical descriptions of the world, several principles have been proposed. So far, all these principles have not explicitly included the uncertainty relation. Here we introduce an information content principle ( ICP ) which represents a constrained uncertainty principle. The principle, by taking into account the encoding and decoding properties of a single physical...
-
A Web-GIS tool for diagnosing spatial orientation of young adults: design and evaluation of Geo-Survey
PublicationSpatial orientation is the effectiveness with which one is able to assess the mutual location of objects relative to a point of reference or a system of coordinates. Traditionally, this ability has been evaluated through field navigation tests, which do not take into account the prevailing influence of free online maps and virtual walks on a person’s interpretation of space. In this context, this study presents a Web-GIS tool designed...
-
Innovative mobile method to determine railway track axis position in global coordinate system using position measurements performed with GNSS and fixed base of the measuring vehicle
PublicationThe shape of the railway track axis and its position in the global coordinate system are essential when defining design parameters of the railway. Correct reconstruction of these quantities is vital for both verifying the compliance of real track parameters with the design and for diagnosing, as all track deformations can also be defined as deviations of real parameters from their design values. The measurements of quantities related...
-
Discovering interactions between applications with log analysis
PublicationApplication logs record the behavior of a system during its runtime and their analysis can provide useful information. In this article, we propose a method of automated log analysis to discover interactions taking place between applications in an enterprise. We believe that such an automated approach can greatly support enterprise architects in building an up-to-date view of a governed system in a modern, fast-paced development...
-
The aluminium and polycarbonate covering to the roof over the stadium in Gdańsk
PublicationThis paper presents information about structural elements of the roof covering to the stadium in Gdansk built for the 2012 European Football Championship in Poland and the Ukraine. The paper discusses elements of the polycarbonate covering, the supporting structure and the drainage system. It also provides information about tests and research performed prior to construction, which determined the solutions adopted as well as...
-
ON EGNOS MONITORING IN LOCAL CONDITIONS
PublicationAny SBAS system should deliver to the user corrections to pseudoranges as well as information about the system integrity. In theory, as soon as the system is permanently monitored by RIMS stations, it is impossible to deliver the fault information to the user. However many observations shows that accuracy of EGNOS service in the same time are different in different places, which shows the influence of local conditions on them....
-
Combining Road Network Data from OpenStreetMap with an Authoritative Database
PublicationComputer modeling of road networks requires detailed and up-to-date dataset. This paper proposes a method of combining authoritative databases with OpenStreetMap (OSM) system. The complete route is established by finding paths in the graph constructed from partial data obtained from OSM. In order to correlate data from both sources, a method of coordinate conversion is proposed. The algorithm queries road data from OSM and provides...
-
User Trust Levels and Their Impact on System Security and Usability
PublicationA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Klaudia Skelnik dr
Peopledr Klaudia Skelnik Prodziekan Wydziału Prawa i Administracji Wyższa Szkoła Bankowa w Gdańsku, doktor nauk społecznych w dyscyplinie nauki o bezpieczeństwie, absolwent studiów MBA zarządzanie bezpieczeństwem, mgr politologii w specjalizacji ustrojowo-samorządowej, posiadająca podyplomowe wykształcenie wyższe w zakresie prawa Unii Europejskiej, Edukacji dla bezpieczeństwa, Bezpieczeństwa i Higiena Pracy oraz szereg kursów i szkoleń...
-
Harmonization and Quality Assurance of Income and Wealth Data: The Case of LIS.
PublicationComparability of concepts in survey data harmonization is essential for scientific analyses. LIS – also known as the Luxembourg Income Study or LIS Cross-National Data Center in Luxembourg – acquires and harmonizes income and wealth microdata to provide the scientific community with a comparable database that is unique in the world in its growing temporal and geographic breadth. Over many decades, scholars worldwide have used the...
-
Reliability Analysis of Data Storage Using Survival Signature and Logic Differential Calculus
PublicationThe Data storage system is an important part of any information system. All the necessary data that must be available for the successful operation of the information system are stored here. Therefore, it is advisable to think about the reliability of such a data storage system. As part of reliability engineering, it is possible to perform a reliability analysis of any system. Therefore, the data storage system can be analyzed as...
-
Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System
PublicationA recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...