Search results for: agile, security, software development methods - Bridge of Knowledge

Search

Search results for: agile, security, software development methods

Search results for: agile, security, software development methods

  • Karol Flisikowski dr inż.

    Karol Flisikowski works as Associate Professor at the Department of Statistics and Econometrics, Faculty of Management and Economics, Gdansk University of Technology. He is responsible for teaching descriptive and mathematical statistics (in Polish and English), as well as scientific research in the field of social statistics. He has been a participant in many national and international conferences, where he has presented the results...

  • Transmission protocol simulation framework for the resource-constrained sensor network

    Publication

    - Year 2014

    In this paper the simulation framework for simulation of the sensor network protocol is presented. The framework enables the simultaneous development of the sensor network software and the protocol for the wireless data transmission. The advantage of using the framework is the convergence of the simulation with the real software, because the same software is used in real sensor network nodes and in the simulation framework. The...

  • Strategies for Dealing With Software Product Management Challenges

    Publication

    Software product management, which involves multiple processes and responsibilities and links to many activities within the organisation, increases the success rate of IT projects. However, the adoption of product management activities and the implementation of the software product manager role itself varies between companies. This research explores the topic of software product managers’ strategies for dealing with challenges...

    Full text available to download

  • Sustainable Knowledge Sharing Model for IT Agile Projects

    Publication

    - Year 2022

    In order to overcome work environment challenges and remain competitive in the market, organisations must adapt. An organisation's competitiveness can be improved through knowledge sharing; however, improvement without responsibility can have a negative impact on the sociotechnical environment which people cannot fully comprehend. According to researchers, business involvement in sustainable development goals remains minimal [51]....

    Full text available to download

  • Quality of Test Specification by Application of Patterns

    Publication

    - Year 2008

    Embedded system and software testing requires sophisticated methods, which are nowadays frequently supported by application of test patterns. This eases the test development process and contributes to the reusability and maintainability of the test specification. However, it does not guarantee the proper level of quality and test coverage in d ifferent dimensions of the test specification. In this paper the quality of the test...

    Full text to download in external service

  • Informal model of the cooperation between the r&d institutions and it companies

    Publication

    The purpose of this work is presentation of an informal cooperation model for innovation-oriented environment of R&D institutions and software development companies.

  • Mechanics I, W/C, MiBM, sem. 02, lato 22/23 (PG_00050273)

    e-Learning Courses
    • O. Nosko

    The course provides students with basic knowledge of Classical Mechanics. Terms, assumptions, principles and methods of Statics, Kinematics and Kinetics are treated. General methods based on the principles of conservation of momentum and energy are considered for a particle, a body and a system of bodies. The main emphasis is on the development of skills to efficiently schematise, solve and analyse typical problems.

  • Mechanics II, W/C, MiBM, sem. 03, zima 22/23 (PG_00055119)

    e-Learning Courses
    • O. Nosko

    The course provides students with basic knowledge of Classical Mechanics. Terms, assumptions, principles and methods of Statics, Kinematics and Kinetics are treated. General methods based on the principles of conservation of momentum and energy are considered for a particle, a body and a system of bodies. The main emphasis is on the development of skills to efficiently schematise, solve and analyse typical problems.

  • Mechanics II, W/C, ZiIP, sem. 03, zima 23/24 (PG_00055119)

    e-Learning Courses
    • O. Nosko

    The course provides students with basic knowledge of Classical Mechanics. Terms, assumptions, principles and methods of Statics, Kinematics and Kinetics are treated. General methods based on the principles of conservation of momentum and energy are considered for a particle, a body and a system of bodies. The main emphasis is on the development of skills to efficiently schematise, solve and analyse typical problems.

  • Mechanics I, W/C, ZiIP, sem. 02, lato 23/24 (PG_00050273)

    e-Learning Courses
    • O. Nosko

    The course provides students with basic knowledge of Classical Mechanics. Terms, assumptions, principles and methods of Statics, Kinematics and Kinetics are treated. General methods based on the principles of conservation of momentum and energy are considered for a particle, a body and a system of bodies. The main emphasis is on the development of skills to efficiently schematise, solve and analyse typical problems.

  • Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment

    Publication

    - Year 2015

    The smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...

    Full text to download in external service

  • Ukraine’s Energy Security in Strategies

    During the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...

    Full text available to download

  • Bridging the gap between business process models and use-case models

    Publication

    - Year 2014

    Today's software development methodologies are equipped with a plethora of methods and techniques for business process engineering and Requirements Engineering. However, heavy investments in IT have not brought forth expected results. What seems to be lacking is a systematic approach that consolidates both disciplines to gain a synergistic effect. To address this challenge we extend Use-Case Driven Approach (UCDA) by binding use...

    Full text to download in external service

  • WIKI-WS as a C2 NIWA Web Service Management Platform

    Publication

    - TASK Quarterly - Year 2015

    The Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...

    Full text available to download

  • Applications of Additively Manufactured Tools in Abrasive Machining—A Literature Review

    Publication

    - Materials - Year 2021

    High requirements imposed by the competitive industrial environment determine the development directions of applied manufacturing methods. 3D printing technology, also known as additive manufacturing (AM), currently being one of the most dynamically developing production methods, is increasingly used in many different areas of industry. Nowadays, apart from the possibility of making prototypes of future products, AM is also used...

    Full text available to download

  • A place of school in the idea of the sustainable development

    Publication

    Well designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).

    Full text to download in external service

  • Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network

    In this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...

    Full text available to download

  • The impact of security aspects on functional safety analysis = Wpływ aspectów ochrony informacji na wyniki analiz bezpieczeństwa funkcjonalnego

    It can be said that a distributed control and protection system’s security level may have a significant impact on functional safety analyses and their results. However the issue of integrating those both aspects are difficult and usually is neglected during functional safety analyses. Known methods of functional safety analyses don’t take into consideration this kind of concept also. This paper discusses an attempt to integrate...

    Full text available to download

  • Security and Anonymity in Agent Systems

    Publication

    - Year 2012

    Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...

    Full text to download in external service

  • Towards systemic functional safety and security management in hazardous plants

    The aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...

  • Oznaczanie tlenu – od metody Winklera do czujników enzymatycznych (Determination of oxygen – from Winkler Method to enzymatic sensor)

    Publication

    - Wiadomości Chemiczne - Year 2015

    Monitoring of dioxygen levels is of utmost importance from the view-point of life processes, medical diagnostics, nutrition and chemical industries. In all these measurements both low and high levels of this element are important. The common methods for the determination of dioxygen are the Winkler method, Clark electrode and pulsoxymeters. A new, already strong field of research can be now recognized – the development of miniaturized...

  • Selecting Requirements Documentation Techniques for Software Projects: a Survey Study

    Publication

    A significant number of techniques dedicated to requirements specification and documentation is described in the available sources. As there is no purpose to use all of them, a selection has to be made, taking into consideration the context of a given software project, for example its size, usage of agile approach or stakeholders' technical competency. This paper is intended to provide guidelines for such selection. We reviewed...

    Full text available to download

  • Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments

    Publication

    - SENSORS - Year 2023

    [Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...

    Full text available to download

  • Weryfikacja Poziomów Nienaruszalności Bezpieczeństwa z uwzględnieniem Zagadnień Ochrony Informacji

    Publication

    Niniejszy rozdział poświęcono wybranym istotnym zagadnieniom analizy bezpieczeństwa funkcjonalnego, w szczególności weryfikacji poziomów nienaruszalności bezpieczeństwa SIL funkcji bezpieczeństwa implementowanych w rozproszonych systemach sterowania i zabezpieczeń z uwzględnieniem zagadnień ochrony informacji. Zaproponowano metodę opartą na informacji ilościowej i jakościowej do weryfikacji SIL (IEC 61508, 61511) z uwzględnieniem...

  • ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS

    The article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...

    Full text available to download

  • Comparison and Analysis of Service Selection Algorithms

    Publication

    - Year 2013

    In Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...

  • EU-Russian Relations and the Eastern Enlargement: Integration or Isolation

    Publication
    • M. Bharti

    - Journal of Scientific Papers "Social development and Security" - Year 2021

    Full text to download in external service

  • Democratisation and Institutional Development in Romania after 1989

    Publication
    • M. Bharti

    - Journal of Scientific Papers "Social development and Security" - Year 2022

    Full text to download in external service

  • Environmental Protection in Energetics, W, E, sem.01, zimowy 22/23

    e-Learning Courses
    • P. Bzura

    The principle of sustainable development. Non-renewable and renewable energy sources. Environmental aspects of the use of different energy sources. Atmospheric pollution. Methods of reducing the emission of pollutants into the atmosphere. Waste and hazardous waste. Water and Wastewater. Legal aspects of environmental protection.

  • Security of export transactions in the offer of leading banks on the Polish market

    Publication

    - Year 2018

    The following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...

  • Implementation of integrated control In drinking water distribution systems - IT system proposal

    Publication

    Implementation of integrated control algorithms requires suitable hardware and software platforms. Proposed solution must allow realizing control and monitoring tasks, while ensuring high reliability and security of processed data. Additionally, the software and hardware solutions must be immune to outside influence. This paper presents an approach to implementation of control systems in drinking water distribution system. Presented...

    Full text to download in external service

  • On extending open source IMS platform for integrated IPTV and VoIP services over IPv6

    Publication

    - Year 2012

    Even when IMS is the most popular platform for multimedia services, the open versions of IMS ecosystem are lacking in specified functionalities for IPTVv6 and VoIPv6 services. In this paper, we extend current client and server open source software in order to provide reliability and security to these multimedia services. As a part of our work the IMS architecture for conferencing system with proposed mechanisms to improve system...

  • Michał Michna dr hab. inż.

    Michal Michna received the M.Sc. and Ph.D. degrees in electrical engineering from the Gdansk University of Technology (GUT), Gdansk, Poland, in 1998 and 2005, respectively. Since 2004, he was employed at the Department of Power Electronics and Electrical Machines of the Gdańsk University of Technology (assistant, assistant professor, senior lecturer). In 2010-2015 he was a deputy of head of the Department of Power Electronics and...

  • Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons

    Publication

    Recent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...

    Full text available to download

  • Integrated monitoring, control and security of Critical Infrastructure Systems

    Publication

    Modern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...

    Full text to download in external service

  • System setup and software for cyclic, staircase and square wave voltammetry measurements

    Publication

    Hardware dedicated for electrochemical measurement sometimes does not allow performing certain voltammetry experiments. Staircase and square wave voltammetry, techniques which have many advantages comparing with standard voltammetric techniques, are rarely implemented in software controlling electrochemical measuring equipment. These methods, however, can be relatively easy realized with some addition...

  • IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA

    34 IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA Krystyna Gomółka Department of Social Sciences and Philosophy, Faculty of Management and Economics, Gdansk University of Technology Ul. G. Narutowicza 11/12, 80 - 233 Gdańsk, Poland Krystyna.Gomolka@zie.pg.gda.pl Abstract INOGATE Programme is one of the instruments designed for the implementation of the energy policy developed by the EU and...

    Full text available to download

  • Accounting for the distributions of input quantities in the procedure for the measurement uncertainty evaluation when calibrating the goniometer

    Publication

    - Ukrainian Metrological Journal - Year 2023

    The discords concerning the measurement uncertainty evaluation in the Guide to the Expressing of Uncertainty in Measurement (GUM) and its Supplement 1 are considered. To overcome these discords, the authors of the paper propose to use the kurtosis method and the law of the propagation of the expanded uncertainty. Using the example of the goniometer calibration, the features of accounting for the distribution laws of input quantities...

    Full text available to download

  • Model-based testing for execution algorithms in the simulation of cyber-physical systems

    Publication

    - Year 2013

    The understanding of simulation semantics of a hybrid system is a challenge for computational engineers as it requires expertise in computer science, engineering, numerical methods, and mathematics at once. The testing methods for the execution of a simulation are being researched but not yet applied on the industrial level. Consequently, the semantics of the simulation becomes a critical artifact in the system development process....

    Full text to download in external service

  • The Impact of Lexicon Adaptation on the Emotion Mining From Software Engineering Artifacts

    Publication

    - IEEE Access - Year 2020

    Sentiment analysis and emotion mining techniques are increasingly being used in the field of software engineering. However, the experiments conducted so far have not yielded high accuracy results. Researchers indicate a lack of adaptation of the methods of emotion mining to the specific context of the domain as the main cause of this situation. The article describes research aimed at examining whether the adaptation of the lexicon...

    Full text available to download

  • Comparison of developed gaze point estimation methods

    Publication

    - Year 2008

    This paper presents the software part of an inexpensive hands-free eye tracking system. The system works using infrared illumination like most of the available eye trackers. Two methods allowing estimation the gaze point on computer screen are compared. Research on effectiveness of these methods is discussed and the better one is indicated.

  • Experimental and Computational Analysis of the Ship Propeller in Open Water Conditions for Inclined Flow

    Publication

    - Year 2016

    The paper presents the results of computational analyses simulating the open water tests of ship propeller in inclined flow. The results of computations are compared with the results of corresponding experimental analyses carried out in the towing tank of Ship Design and Research Centre (CTO S.A.). The object of the research was the model propeller identified as CP469. The aim of the study was to validate the results of numerical...

    Full text to download in external service

  • Automatic Incident Detection at Intersections with Use of Telematics

    While there are many examples of Intelligent Transport System deployments in Poland, more attention should be paid to traffic incident management and detection on dual-carriageways and urban street networks. One of the aims of CIVITAS DYN@MO, a European Union funded project, is to use TRISTAR (an Urban Transport Management System) detection modules to detect incidents at junctions equipped with traffic signals. First part of paper...

    Full text to download in external service

  • PLC-based Implementation of Stochastic Optimization Method in the Form of Evolutionary Strategies for PID, LQR, and MPC Control

    Programmable logic controllers (PLCs) are usually equipped with only basic direct control algorithms like proportional-integral-derivative (PID). Modules included in engineering software running on a personal computer (PC) are usually used to tune controllers. In this article, an alternative approach is considered, i.e. the development of a stochastic optimizer based on the (μ,λ) evolution strategy (ES) in a PLC. For this purpose,...

    Full text to download in external service

  • Applicability of Emotion Recognition and Induction Methods to Study the Behavior of Programmers

    Publication

    Recent studies in the field of software engineering have shown that positive emotions can increase and negative emotions decrease the productivity of programmers. In the field of affective computing, many methods and tools to recognize the emotions of computer users were proposed. However, it has not been verified yet which of them can be used to monitor the emotional states of software developers. The paper describes a study carried...

    Full text available to download

  • Marine autonomous surface ship - control system configuration

    This paper addresses the problem of marine autonomous surface ship (MASS) control. The contribution of the paper is the development of a control system configuration, done assuming fully autonomous MASS operation under distinct operational conditions. The overview of hardware and software selection is included.

    Full text available to download

  • Creating IT competence centers

    Publication

    - Year 2012

    This article indicates the need for supporting University Competence Centers. They are specialized centers, which aim to support teaching and development of newest software technologies, educating students, PhD Students and scientific workers also raising competetitiveness of the university at higher education market.

  • Jan Kozicki dr hab. inż. arch.

    In year 2002 after obtaining master's degree in construction was employed on Faculty of Civil and Environmental Engineering. In 2004 obtained master's degree in architecture on Faculty of Architecture focusing on a research outpost on Mars. Defended PhD in year 2007 in the field of numerical modeling. In 2013 obtained Licentiate degree in theoretical physics on University of Gdańsk. In year 2014 obtained habilitation in technical...

  • Verification and Benchmarking in MPA Coprocessor Design Process

    Publication

    - Year 2022

    This paper presents verification and benchmarking required for the development of a coprocessor digital circuit for integer multiple-precision arithmetic (MPA). Its code is developed, with the use of very high speed integrated circuit hardware description language (VHDL), as an intellectual property core. Therefore, it can be used by a final user within their own computing system based on field-programmable gate arrays (FPGAs)....

    Full text to download in external service

  • Gesture-based computer control system

    In the paper a system for controlling computer applications by hand gestures is presented. First, selected methods used for gesture recognition are described. The system hardware and a way of controlling a computer by gestures are described. The architecture of the software along with hand gesture recognition methods and algorithms used are presented. Examples of basic and complex gestures recognized by the system are given.

    Full text to download in external service