Filters
total: 1286
displaying 1000 best results Help
Search results for: agile, security, software development methods
-
Communication methods at selected private universities in Gdańsk, Sopot and Gdynia in 2010
Open Research DataA university, including a private one, is an organization serving the environment. Therefore, a necessary condition (especially in today's market situation) is the development of cooperation between universities and the environment. Creating mutual relations between universities with the environment, belongs to an important area of activity of this...
-
Building Project and Project Team Characteristics For Creating Hybrid Management Processes
PublicationThis paper introduces a method of building the characteristic of Software Development Project. Project characteristic is determined on the basis of several factors such as the complexity of Software Development Project and Project Team, results of historical projects and information on processes and methodologies, which are implemented in analyzed organizations. Information on project complexity can be applied to many different...
-
Virtual Sightseeing in Immersive 3D Visualization Lab
PublicationThe paper describes the modern Immersive 3D Visualization Lab (I3DVL) established at the Faculty of Electronics, Telecommunications and Informatics of the Gdańsk University of Technology (GUT) and its potential to prepare virtual tours and architectural visualizations on the example of the application allowing a virtual walk through the Coal Market in Gdańsk. The paper presents devices of this laboratory (CAVE, walk simulator etc.),...
-
Integration and Dependency in Software Lifecycle Based on Jazz Platform
PublicationSoftware delivery organizations are being asked to meet goals that seem mutually exclusive. Teams are asked to increase product quality, accelerate time to market, and meet increasing mandates from regulatory bodies. As software solutions and software development environments become rapidly more complex. Many business drivers compound these challlenges.
-
Data Domain Adaptation in Federated Learning in the Breast Mammography Image Classification Problem
PublicationWe are increasingly striving to introduce modern artificial intelligence techniques in medicine and elevate medical care, catering to both patients and specialists. An essential aspect that warrants concurrent development is the protection of personal data, especially with technology's advancement, along with addressing data disparities to ensure model efficacy. This study assesses various domain adaptation techniques and federated...
-
Yade-open DEM: an open-source software using a discrete element methodto simulate granular material
PublicationPurpose - YADE-OPEN DEM is an open source software based on the Discrete Element Method which uses object oriented programming techniques. The paper describes the softwarearchitecture.Design/methodology/approach - The DEM chosen uses position, orientation, velocity and angular velocity as independent variables of simulated particles which are subject to explicit leapfrog time-integration scheme (Lagrangian method). The three-dimensional...
-
Piotr Grudowski dr hab. inż.
PeopleProfessor Dr hab. Eng. Piotr Grudowski heads the Department of Quality and Commodity Management at the Faculty of Management and Economics of Gdansk University of Technology. In the years 1987-2009 he worked at the Faculty of Mechanical Engineering of the Gdansk University of Technology, where he obtained a doctoral degree in technical sciences in the discipline of construction and operation of machines and he headed the Department...
-
Exploring ontological approach for user requirements elicitation in design of online virtual agents
PublicationEffective user requirements elicitation is a key factor for the success of software development projects. There are many qualitative and quantitative research studies that promulgate particular methods and show the application of user requirements elicitation in particular domains. However, few try to eliminate the burden of ambiguity in gathered data, naturally occurring in different groups of stakeholders. This paper deals with...
-
Redesign of the Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublicationCritical Infrastructure Systems (CISs) play a key role in modern societies. Their sustainable operation depends heavily on the performance of dedicated structures and algorithms targeting monitoring, control and security aspects. In previous work a Research Platform (RP) for the design and simulation of such systems was presented. This works updates the information on the RP through the description of major hardware and software...
-
Ryszard Strzelecki prof. dr hab. inż.
People -
Talents, Competencies and Techniques of Business Analyst: A Balanced Professional Development Program
PublicationThis paper presents preliminary results of action research in which we search for fundamentals of an universal theory of balanced approaches to software process. It is developed on the basis of balanced approach for professional development program for business analysts which integrates approaches oriented on talents, competencies and techniques. This paper includes the description of key concepts in background approaches, components...
-
Strategies for Dealing With Software Product Management Challenges
PublicationSoftware product management, which involves multiple processes and responsibilities and links to many activities within the organisation, increases the success rate of IT projects. However, the adoption of product management activities and the implementation of the software product manager role itself varies between companies. This research explores the topic of software product managers’ strategies for dealing with challenges...
-
Transmission protocol simulation framework for the resource-constrained sensor network
PublicationIn this paper the simulation framework for simulation of the sensor network protocol is presented. The framework enables the simultaneous development of the sensor network software and the protocol for the wireless data transmission. The advantage of using the framework is the convergence of the simulation with the real software, because the same software is used in real sensor network nodes and in the simulation framework. The...
-
Sustainable Knowledge Sharing Model for IT Agile Projects
PublicationIn order to overcome work environment challenges and remain competitive in the market, organisations must adapt. An organisation's competitiveness can be improved through knowledge sharing; however, improvement without responsibility can have a negative impact on the sociotechnical environment which people cannot fully comprehend. According to researchers, business involvement in sustainable development goals remains minimal [51]....
-
Quality of Test Specification by Application of Patterns
PublicationEmbedded system and software testing requires sophisticated methods, which are nowadays frequently supported by application of test patterns. This eases the test development process and contributes to the reusability and maintainability of the test specification. However, it does not guarantee the proper level of quality and test coverage in d ifferent dimensions of the test specification. In this paper the quality of the test...
-
Informal model of the cooperation between the r&d institutions and it companies
PublicationThe purpose of this work is presentation of an informal cooperation model for innovation-oriented environment of R&D institutions and software development companies.
-
Karol Flisikowski dr inż.
PeopleKarol Flisikowski works as Associate Professor at the Department of Statistics and Econometrics, Faculty of Management and Economics, Gdansk University of Technology. He is responsible for teaching descriptive and mathematical statistics (in Polish and English), as well as scientific research in the field of social statistics. He has been a participant in many national and international conferences, where he has presented the results...
-
Comparison of methods for diagnosing marine IC engines based on working medium parameters including exhaust gas specific enthalpy
PublicationArticle points out methods currently used to diagnose marine engines in operation. The development of tools and programs for implementing these methods was pointed out. The problem of unsatisfactory measurement susceptibility of marine engines was highlighted. Three methods of parametric diagnosis are presented: measurement of in-cylinder parameters and in exhaust gas duct, numerical simulation due to computer software and calculations...
-
Mechanics I, W/C, MiBM, sem. 02, lato 22/23 (PG_00050273)
e-Learning CoursesThe course provides students with basic knowledge of Classical Mechanics. Terms, assumptions, principles and methods of Statics, Kinematics and Kinetics are treated. General methods based on the principles of conservation of momentum and energy are considered for a particle, a body and a system of bodies. The main emphasis is on the development of skills to efficiently schematise, solve and analyse typical problems.
-
Mechanics II, W/C, MiBM, sem. 03, zima 22/23 (PG_00055119)
e-Learning CoursesThe course provides students with basic knowledge of Classical Mechanics. Terms, assumptions, principles and methods of Statics, Kinematics and Kinetics are treated. General methods based on the principles of conservation of momentum and energy are considered for a particle, a body and a system of bodies. The main emphasis is on the development of skills to efficiently schematise, solve and analyse typical problems.
-
Mechanics II, W/C, ZiIP, sem. 03, zima 23/24 (PG_00055119)
e-Learning CoursesThe course provides students with basic knowledge of Classical Mechanics. Terms, assumptions, principles and methods of Statics, Kinematics and Kinetics are treated. General methods based on the principles of conservation of momentum and energy are considered for a particle, a body and a system of bodies. The main emphasis is on the development of skills to efficiently schematise, solve and analyse typical problems.
-
Mechanics I, W/C, ZiIP, sem. 02, lato 23/24 (PG_00050273)
e-Learning CoursesThe course provides students with basic knowledge of Classical Mechanics. Terms, assumptions, principles and methods of Statics, Kinematics and Kinetics are treated. General methods based on the principles of conservation of momentum and energy are considered for a particle, a body and a system of bodies. The main emphasis is on the development of skills to efficiently schematise, solve and analyse typical problems.
-
Mechanics II, W/C, ZiIP, sem. 03, zima 24/25 (PG_00055119)
e-Learning CoursesThe course provides students with basic knowledge of Classical Mechanics. Terms, assumptions, principles and methods of Statics, Kinematics and Kinetics are treated. General methods based on the principles of conservation of momentum and energy are considered for a particle, a body and a system of bodies. The main emphasis is on the development of skills to efficiently schematise, solve and analyse typical problems.
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublicationThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Ukraine’s Energy Security in Strategies
PublicationDuring the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...
-
Bridging the gap between business process models and use-case models
PublicationToday's software development methodologies are equipped with a plethora of methods and techniques for business process engineering and Requirements Engineering. However, heavy investments in IT have not brought forth expected results. What seems to be lacking is a systematic approach that consolidates both disciplines to gain a synergistic effect. To address this challenge we extend Use-Case Driven Approach (UCDA) by binding use...
-
WIKI-WS as a C2 NIWA Web Service Management Platform
PublicationThe Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...
-
Applications of Additively Manufactured Tools in Abrasive Machining—A Literature Review
PublicationHigh requirements imposed by the competitive industrial environment determine the development directions of applied manufacturing methods. 3D printing technology, also known as additive manufacturing (AM), currently being one of the most dynamically developing production methods, is increasingly used in many different areas of industry. Nowadays, apart from the possibility of making prototypes of future products, AM is also used...
-
A place of school in the idea of the sustainable development
PublicationWell designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).
-
Selecting Requirements Documentation Techniques for Software Projects: a Survey Study
PublicationA significant number of techniques dedicated to requirements specification and documentation is described in the available sources. As there is no purpose to use all of them, a selection has to be made, taking into consideration the context of a given software project, for example its size, usage of agile approach or stakeholders' technical competency. This paper is intended to provide guidelines for such selection. We reviewed...
-
Oznaczanie tlenu – od metody Winklera do czujników enzymatycznych (Determination of oxygen – from Winkler Method to enzymatic sensor)
PublicationMonitoring of dioxygen levels is of utmost importance from the view-point of life processes, medical diagnostics, nutrition and chemical industries. In all these measurements both low and high levels of this element are important. The common methods for the determination of dioxygen are the Winkler method, Clark electrode and pulsoxymeters. A new, already strong field of research can be now recognized – the development of miniaturized...
-
The impact of security aspects on functional safety analysis = Wpływ aspectów ochrony informacji na wyniki analiz bezpieczeństwa funkcjonalnego
PublicationIt can be said that a distributed control and protection system’s security level may have a significant impact on functional safety analyses and their results. However the issue of integrating those both aspects are difficult and usually is neglected during functional safety analyses. Known methods of functional safety analyses don’t take into consideration this kind of concept also. This paper discusses an attempt to integrate...
-
Towards systemic functional safety and security management in hazardous plants
PublicationThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Security and Anonymity in Agent Systems
PublicationMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network
PublicationIn this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...
-
Weryfikacja Poziomów Nienaruszalności Bezpieczeństwa z uwzględnieniem Zagadnień Ochrony Informacji
PublicationNiniejszy rozdział poświęcono wybranym istotnym zagadnieniom analizy bezpieczeństwa funkcjonalnego, w szczególności weryfikacji poziomów nienaruszalności bezpieczeństwa SIL funkcji bezpieczeństwa implementowanych w rozproszonych systemach sterowania i zabezpieczeń z uwzględnieniem zagadnień ochrony informacji. Zaproponowano metodę opartą na informacji ilościowej i jakościowej do weryfikacji SIL (IEC 61508, 61511) z uwzględnieniem...
-
Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
Publication[Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...
-
An Adversarial Machine Learning Approach on Securing Large Language Model with Vigil, an Open-Source Initiative
PublicationSeveral security concerns and efforts to breach system security and prompt safety concerns have been brought to light as a result of the expanding use of LLMs. These vulnerabilities are evident and LLM models have been showing many signs of hallucination, repetitive content generation, and biases, which makes them vulnerable to malicious prompts that raise substantial concerns in regard to the dependability and efficiency of such...
-
ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS
PublicationThe article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...
-
Advancing electrochemical impedance analysis through innovations in the distribution of relaxation times method
PublicationElectrochemical impedance spectroscopy (EIS) is widely used in electrochemistry, energy sciences, biology, and beyond. Analyzing EIS data is crucial, but it often poses challenges because of the numerous possible equivalent circuit models, the need for accurate analytical models, the difficulties of nonlinear regression, and the necessity of managing large datasets within a unified framework. To overcome these challenges, non-parametric...
-
Comparison and Analysis of Service Selection Algorithms
PublicationIn Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...
-
Security of export transactions in the offer of leading banks on the Polish market
PublicationThe following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...
-
EU-Russian Relations and the Eastern Enlargement: Integration or Isolation
Publication -
Democratisation and Institutional Development in Romania after 1989
Publication -
Environmental Protection in Energetics, W, E, sem.01, zimowy 22/23
e-Learning CoursesThe principle of sustainable development. Non-renewable and renewable energy sources. Environmental aspects of the use of different energy sources. Atmospheric pollution. Methods of reducing the emission of pollutants into the atmosphere. Waste and hazardous waste. Water and Wastewater. Legal aspects of environmental protection.
-
Implementation of integrated control In drinking water distribution systems - IT system proposal
PublicationImplementation of integrated control algorithms requires suitable hardware and software platforms. Proposed solution must allow realizing control and monitoring tasks, while ensuring high reliability and security of processed data. Additionally, the software and hardware solutions must be immune to outside influence. This paper presents an approach to implementation of control systems in drinking water distribution system. Presented...
-
On extending open source IMS platform for integrated IPTV and VoIP services over IPv6
PublicationEven when IMS is the most popular platform for multimedia services, the open versions of IMS ecosystem are lacking in specified functionalities for IPTVv6 and VoIPv6 services. In this paper, we extend current client and server open source software in order to provide reliability and security to these multimedia services. As a part of our work the IMS architecture for conferencing system with proposed mechanisms to improve system...
-
Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons
PublicationRecent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...
-
Michał Michna dr hab. inż.
PeopleMichal Michna received the M.Sc. and Ph.D. degrees in electrical engineering from the Gdansk University of Technology (GUT), Gdansk, Poland, in 1998 and 2005, respectively. Since 2004, he was employed at the Department of Power Electronics and Electrical Machines of the Gdańsk University of Technology (assistant, assistant professor, senior lecturer). In 2010-2015 he was a deputy of head of the Department of Power Electronics and...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublicationModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...