Filters
total: 2288
displaying 1000 best results Help
Search results for: INTERNET OF VEHICLES, SAFETY PROTECTION TECHNOLOGY, INTRUSION DETECTION SYSTEM,
-
Problems in designing and operating the functional safety solutions of higher integriity levels
PublicationThe aim of this article is to identify and discuss some problems that have been encountered in designing and operating the functional safety solutions of higher safety integrity levels (SIL 3 and SIL 4) in the light of analyses outlined in a new version of the international standard IEC 61508:2010. Examples of such solutions are the electric / electronic / programmable electronic systems (E/E/PESs) and the safety instrumented systems...
-
Radio system for monitoring and acquisition of data from traffic enforcement cameras - features and assumptions of the system
PublicationThe study presents the architecture and selected functional assumptions of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (RSMAD). Ultimately, the system will be used for transmission and archiving image data of traffic offenses, but can also perform other duties related to traffic safety. Implementation of the RSMAD system will facilitate, inter alia, issuing the fine process and supervision...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublicationThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
Mine counter vehicles for Baltic navy. W: [CD-ROM] Conference proceedings. UDT EUROPE 2002. Undersea Defence Technology Conference and Exhibition. La Spezia, Italy, 18-20 June 2002. Classified Conference, La Spezia, Italy, 21 June 2002 [B.m.w.]**2002 [6 s. 3 rys.]. Pojazdy przeciwminowe dla marynarki dzialającej na Bałtyku.
PublicationW opracowaniu omówiono przeciwminowe systemy opracowane przez PolitechnikęGdańską dla potrzeb Marynarki Wojennej RP. Przedstawiono podstawowe wymaga-nia rozwiązań konstrukcyjnych i zasady użycia.
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublicationThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Performance analysis of power swing blocking feature in ABB 670 series impedance relays
PublicationThis paper presents test results of a distance protection’s PSD power swing detection feature in ABB 670 series relays. A RED670 relay was tested, which is part of the hydroelectric set protection in Żarnowiec Pumped Storage Plant. The power swing blocking feature’s performance was analysed on the basis of the results of object tests made with an Omicron digital tester. Also presented are simulation results that illustrate the...
-
Opportunities and challenges for exploiting drones in agile manufacturing systems
PublicationDrones have become an advanced supply chain implementation instrument, especially in connecting warehouses to outlet points or even individual customers. However, their potential application in an intra-logistics framework has not been studied, let alone explored so far. Modeling and simulations in virtual environments can help explore and evaluate the opportunities for practical and profitable applications of drones in manufacturing...
-
Crowdsourcing and Volunteer Computing as Distributed Approach for Problem Solving
PublicationIn this paper, a combination between volunteer computing and crowdsourcing is presented. Two paradigms of the web computing are described, analyzed and compared in detail: grid computing and volunteer computing. Characteristics of BOINC and its contribution to global Internet processing are shown with the stress put onto applications the system can facilitate and problems it can solve. An alternative instance of a grid computing...
-
Visual Traffic Noise Monitoring in Urban Areas
PublicationThe paper presents an advanced system for railway and road traffic noise monitoring in metropolitan areas. This system is a functional part of a more complex solution designed for environmental monitoring in cities utilizing analyses of sound, vision and air pollution, based on a ubiquitous computing approach. The system consists of many autonomous, universal measuring units and a multimedia server, which gathers, processes and...
-
To i-vote or not to i-vote: Drivers and barriers to the implementation of internet voting
PublicationThis paper investigates the drivers and barriers of internet voting and the implications of a global pandemic for the development of the respective technology. In contrast to the expected uptake in the early 2000s of internet voting, the technology is still rather seldomly used in election systems around the world. The paper at hand explores the different forces that drive or impede internet voting adoption from a political, social,...
-
Possible directions for development of C-ITS services in cities on the example of the TRISTAR System
PublicationDuring the previous EU financial perspective (2007 - 2013), we observed an intensification of the evelopment of transport management systems using ITS services in Polish cities. One of the biggest territorially and functionally system is Tri-city TRISTAR system, the implementation of which was completed in 2015. The concept of the TRISTAR system and its architecture was developed in the years 2002-2007. Currently, we can observe...
-
Propagation Loss and Interference Analysis for 5G Systems in the Context of C-ITS System Implementation
PublicationThe article presents the concept of implementing subsequent phases of services for the C-ITS system (the Cooperative Intelligent Transport Systems), based on the European Parliament resolution of March 2018. Next, the 5G systems, in the context of their possible cooperation with C-ITS systems, were discussed. Numerical propagation analysis was performed for V2V and V2I type communication based on two different propagation models....
-
3D Machine Vision System for Inspection of Contact Strips in Railway Vehicle Current Collectors
PublicationConstruction and technical condition of current collectors is crucial to reliability and safety of railway transportation. According to the Technical Specifications for Interoperability railway vehicles in the European Union should be equipped with carbon contact strips. Excessive wear or defects of contact strips degrade the capability of undisturbed power transmission, cause faster wear of contact wire, and can even result in...
-
Identification of safety hazards and their sources in tram transport
PublicationBoth in Poland and in most countries of the European Union, the tram infrastructure is extensively expanding. Contemporary low-floor trams are constructed according to different technical assumptions than typical railway vehicles or high floor trams. In Poland such vehicles rides often on lines designed according to standards developed to the classical vehicles. At the same time, the intensity of road traffic and the number of...
-
Sensing Direction of Human Motion Using Single-Input-Single-Output (SISO) Channel Model and Neural Networks
PublicationObject detection Through-the-Walls enables localization and identification of hidden objects behind the walls. While numerous studies have exploited Channel State Information of Multiple Input Multiple Output (MIMO) WiFi and radar devices in association with Artificial Intelligence based algorithms (AI) to detect and localize objects behind walls, this study proposes a novel non-invasive Through-the-Walls human motion direction...
-
Battery Technologies in Electric Vehicles: Improvements in Electric Battery Packs
PublicationRestrictions on fossil fuels and related environmental pollution issues motivate many organizations and countries to set their focus on electric vehicles (EVs) rather than conventional internal combustion engine vehicles [1], [2]. EVs require an energy storage system to store converted electric power in another form of energy and then reconvert the stored energy to electric power whenever it is required. The energy stored can be...
-
Safety assessment of a concrete viaduct damaged by vehicle impact and an evaluation of the repair
PublicationDamage to lower parts of viaducts caused by impact from under-passing high vehicles is relatively frequent. One such incident, in which a viaduct was damaged by the impact from a truck with an improperly assembled hydraulic crane, is considered in this work. The analysis is based on a detailed object damage evaluation, 3D laser scanning, and numerical simulations. The aim of the study is to accurately model the vehicle impact into...
-
Broadband communication solutions for maritime ITSs: Wider and faster deployment of new e-navigation services
Publicationn its initial part, the paper presents an overview of popular technologies and systems currently developed or employed in maritime communication. These solutions are used to provide both ship-to-ship and ship-to-shore communication for the purpose of supporting specific services, often dedicated to maritime safety and e-navigation. Utility of such communication systems have been thoroughly verified over the years and their strengths...
-
THE COST ANALYSIS OF CORROSION PROTECTION SOLUTIONS FOR STEEL COMPONENTS IN TERMS OF THE OBJECT LIFE CYCLE COST
PublicationSteel materials, due to their numerous advantages - high availability, easiness of processing and possibility of almost any shaping are commonly applied in construction for carrying out basic carrier systems and auxiliary structures. However, the major disadvantage of this material is its high corrosion susceptibility, which depends strictly on the local conditions of the facility and the applied type of corrosion protection system....
-
Technology and democracy: the who and how in decision-making. The cases of Estonia and Catalonia
PublicationThis paper focuses on the use of technology to improve democracy, comparing the cases of Estonia and Catalonia. Both examples are closely related in their use of technology to further democratize the decision-making processes but have opposite starting points. Estonia’s internet voting system is an offshoot of the comprehensive e-governance system developed by the Estonian government. It is meant to make it more convenient for...
-
Tomasz Goluch mgr inż.
People -
Supporting Assurance by Evidence-based Argument Services
PublicationStructured arguments based on evidence are used in many domains, including systems engineering, quality assurance and standards conformance. Development, maintenance and assessment of such arguments is addressed by TRUST-IT methodology outlined in this paper. The effective usage of TRUST-IT requires an adequate tool support. We present a platform of software services, called NOR-STA, available in the Internet, supporting key activities...
-
Pedestrian detection in low-resolution thermal images
PublicationOver one million people die in car accidents worldwide each year. A solution that will be able to reduce situations in which pedestrian safety is at risk has been sought for a long time. One of the techniques for detecting pedestrians on the road is the use of artificial intelligence in connection with thermal imaging. The purpose of this work was to design a system to assist the safety of people and car intelligence with the use...
-
Robert Burczyk mgr inż.
PeopleRobert Burczyk received Eng. degree and M. SC. Eng. degree in electronics and telecommunictions engineering in 2017 and 2018 successively with specialization in radiocommunication systems and networks. The subject of the dissertations was focused on Wireless Body Area Network (WBAN). Currently, he is a PhD student and an employee at the Department of Radiocommunication Systems and Networks, Gdansk University of Technology. His...
-
Analysis of the Suitability of Selected Data Tranmission Systems in RSMAD
PublicationThis paper analyses the suitability of the selected radio communication systems currently used for data transmission, or usable in the future, in Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The paper also presents the advantages and disadvantages of each systems, paying particular attention to features that directly affect the suitability of the solution in the RSMAD system....
-
OSC - domain oriented ontology creation system
PublicationOntologies are, as part of semantic web, a basic component to enrich content available in the Internet with a meaning understandable for computers. In this publication an architecture and functionality of a domain oriented web portal for collaborative creation and storage of ontologies is presented. The system is being created by Gdańsk University of Technology Electronics, Telecommunications and Informatics faculty's Department...
-
Irena Bach-Dąbrowska dr inż.
People -
Camera Orientation-Independent Parking Events Detection
PublicationThe paper describes the method for detecting precise position and time of vehicles parking in a parking lot. This task is trivial in case of favorable camera orientation but gets much more complex when an angle between the camera viewing axis and the ground is small. The method utilizes background subtraction and object tracking algorithms for detecting moving objects in a video stream. Objects are classified into vehicles and...
-
Road Restraint Systems as a Basis for Roadside Safety Improvement
PublicationRoadside-related crashes occur when vehicles run off the road. The majority of the crashes have severe outcomes, especially when an object is hit (tree, pole, supports, front wall of a culvert, barrier). These accidents represent app. 19% of all of Poland's road deaths. Roadside crashes involve: hitting a tree, hitting a barrier, hitting a sign or utility pole, vehicle roll-over on the roadside, vehicle roll-over on a slope and...
-
Fire Protection and Materials Flammability Control by Artificial Intelligence
PublicationFire safety has become a major challenge of materials developers because of the massive production of organic materials, often combustibles, and their use for different purposes. In this sense, fire safety is critically considered in the development of engineering materials [1, 2]. The multiplicity of parameters contributing to the development of formulation of flame-retardant materials from one side and the sustainability concerns...
-
Internet photogrammetry for inspection of seaports
PublicationThis paper intends to point out the possibility of using Internet photogrammetry to construct 3D models from the images obtained by means of UAVs (Unmanned Aerial Vehicles). The solutions may be useful for the inspection of ports as to the content of cargo, transport safety or the assessment of the technical infrastructure of port and quays. The solution can be a complement to measurements made by using laser scanning and traditional...
-
PV installations and the safety of residential buildings
PublicationThe dynamic development of the photovoltaic industry entails threats that have a direct impact on the safety of residential buildings. Appropriate design of a PV installation can be a challenge due to the multifaceted nature of this issue. The designer should take into account issues related to the selection of electrical parameters of the installation, adapting lightning and surge protection in accordance...
-
Impact of Intelligent Transport Systems Services on the Level of Safety and Improvement of Traffic Conditions
PublicationThe positive effects of the services of Intelligent Transport Systems (ITS) on the level of transport systems operation was confirmed by long-term studies conducted, inter alia, in the USA, Japan and Europe. Benefits resulting from the application of ITS services can be presented through performance indicators. The indicators represent in a numerical or qualitative manner to what extent ITS services can contribute to improving...
-
Application of RCD and AFDD in low-voltage electrical installations for protection against fire
PublicationThe paper presents the principles of application of residual current devices (RCDs) in protection against fire. The permissible rated residual operating current of RCDs is discussed. Limitations in the operation of RCDs in this type of protection are indicated. A new type of a protective device against fire – arc fault detection device (AFDD) – is described.
-
Perspectives of Telematics Implementation in Tri-City Transport Systems Management and Planning
PublicationIn 2010 the City of Gdynia applied for match funding the project ''Implementation of the Integrated Traffic Management System TRISTAR in Tri-City" under the Operational Programme Infrastructure and Environment. This year the project has been placed on a list approved by the Ministry of Infrastructure. Tri-City proceeds with a tender for the implementation of the system. The project will be implemented in key elements are included...
-
Attitudes to tree removal on private property in rural and urban Polish municipalities.
Open Research DataThe urban-rural divide is an important factor known to affect public opinion on issues related to environmental protection and management. The present data set allows for a deeper understanding of this issue with respect to policies dealing with tree removal on private property in two municipalities located in southern Poland: Racibórz (an urban municipality)...
-
Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń
PublicationW niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...
-
Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń
PublicationW niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...
-
EVALUATION OF THE USE OF M2M-TYPE NB-IoT AND LTE TECHNOLOGIES FOR MARITIME COMMUNICATION SYSTEMS
PublicationThe development of IoT (the Internet of Things) wireless transmission opens a new era in communication systems. In the next years, the development and implementation of IoT systems will be very dynamic. It can be seen that the solutions of LTE – NB-IoT (Long Term Evolution – Narrowband IoT) transmission devices are implemented in a wide range of terrestrial solutions, e.g. smart grids. This paper aims to analyse the possibility...
-
Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego
PublicationW artykule zaprezentowano aspekty bezpieczeństwa nowoczesnych platform nauczania zdalnego. Przedstawiono ich charakterystykę i wyzwania technologiczne. Zdefiniowano bezpieczeństwo i istniejące w tym obszarze zagrożenia. Przybliżono metody oceny poziomu bezpieczeństwa. Na bazie wdrożonej na Politechnice Gdańskiej platformy eNauczanie PG omówiono sposoby zapewniania zakładanego poziomu bezpieczeństwa takich systemów.
-
Clustering Context Items into User Trust Levels
PublicationAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
Reconfigurable Antennas for Trustable Things
PublicationIn modern applications, the Internet of Things plays a significant role in increasing the productivity, effectiveness or safety and security of people and assets. Additionally, the reliability of Internet of Things components is crucial from the application point of view, where a resilient and low-latency network is needed. This can be achieved by utilizing reconfigurable antennas to enhance the capabilities of the wireless sensor...
-
Leszek Jarzębowicz dr hab. inż.
PeopleLeszek Jarzebowicz received the M.Sc., Ph.D. and D.Sc. degrees from Gdansk University of Technology (GUT), Poland, in 2005, 2010 and 2019, respectively. His research areas include control and modeling of electric drives, diagnostics of railway vehicles, analysis of energy efficiency in electrified transport, and microprocessor implementation of control algorithms. His teaching interests focus on electric vehicles, electrical engineering...
-
Andrzej Chybicki dr inż.
PeopleA graduate of the Faculty of Electronics, Telecommunications and Informatics at the Gdańsk University of Technology, PhD in technical sciences in the field of IT specializing in distributed data processing in IT . Aimed at exploiting the achievements and knowledge in the field of industrial research. He cooperated with a number of companies including OpeGieka Elbląg, Reson Inc., Powel Sp. z o. o., Wasat, Better Solutions, the European...
-
Practical Evaluation of Internet Systems' Security Mechanisms
PublicationA proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.
-
Knowledge-based functional safety management using ProSIL software
PublicationIn the article the ProSIL software for computer aided functional safety management is presented. The software consists of three modules for the determination of the required SIL level (ProSILen) and verification of the SIL level (ProSILver). In the ProSIL the calibrated knowledge-based risk graph method for determining the required safety integrity level (SIL) of the safety functions identified in hazard analysis is implemented....
-
Mieczysław Siemiątkowski dr inż.
People -
Concept of an Innovative System for Dimensioning and Predicting Changes in the Coastal Zone Topography Using UAVs and USVs (4DBatMap System)
PublicationThis publication is aimed at developing a concept of an innovative system for dimensioning and predicting changes in the coastal zone topography using Unmanned Aerial Vehicles (UAVs) and Unmanned Surface Vehicles (USVs). The 4DBatMap system will consist of four components: 1. Measurement data acquisition module. Bathymetric and photogrammetric measurements will be carried out with a specific frequency in the coastal zone using...
-
MAlSim - Mobile Agent Malware Simulator
PublicationOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...