Filters
total: 6854
-
Catalog
- Publications 4613 available results
- Journals 577 available results
- Conferences 317 available results
- Publishing Houses 1 available results
- People 311 available results
- Inventions 1 available results
- Projects 24 available results
- Research Teams 1 available results
- Research Equipment 2 available results
- e-Learning Courses 224 available results
- Events 7 available results
- Open Research Data 776 available results
displaying 1000 best results Help
Search results for: SUPERVISORY OR SECURITY SYSTEMS
-
Methodological issues of functional safety and reliability assessment of critical systems in industrial hazardous plants
PublicationThe aim of this article is to identify and discuss some methodological issues that are of interest among functional safety specialists and experts after publication of the second edition of international standards IEC 61508 and IEC 61511, including the design and implementing the safety-related functions of higher safety integrity levels and protection layers. The basic role of safety-related systems is to reduce effectively and...
-
Perspectives of Transport Systems Development in the Light of Radio Communication Systems Evolution Towards 5G
PublicationIn the paper conditions of development and implementation of transport systems with reference to the development of radio communication networks towards 5G are presented. First, general properties of next generation systems are mentioned and their architecture. Moreover, planned characteristics of B4G and 5G systems are depicted which can significantly contribute to the promotion and development of transport systems. In particular...
-
Editorial: Applied intelligence and knowledge based systems: approaches and case studies - part 2
PublicationWydanie Cybernetics and Systems poswiecone zagadnieniom zarzadzania wiedza.
-
Cognitive memory for intelligent systems of decision-making, based on human psychology
PublicationA model of memory, which allows to expand the functionality of autonomous decision-making systems for robotic and human-system-interface purposes, is discussed. The model provides functions and features which make the prospective robotic and interfacing systems more human-like as well as more efficient in solving interactive issues.
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublicationThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Methodological issues of security vulnerability analysis and risk assessment
PublicationArtykuł przedstawia wybrane aspekty metodyczne związane z zarządzaniem bezpieczeństwem i ochroną instalacji podwyższonego ryzyka. Podkreślono, że występują instalacje podwyższonego ryzyka, które wymagają specjalnej uwagi w zarządzaniu bezpieczeństwem. Zaproponowano metodykę opartą na wiedzy do zintegrowanej analizy LOPA (warstw zabezpieczeń) i ROPA (pierścieni zabezpieczeń). Nadrzędnym celem jest opracowanie metod i narzędzi wspomagających...
-
Cryptographic Protocols' Performance and Network Layer Security of RSMAD
PublicationW artykule omówiono architekturę bezpieczeństwa warstwy sieciowej Radiowego Systemu Monitorowania i Akwizycji Danych z urządzeń fotoradarowych (w skrócie RSMAD). Bezpieczeństwo w warstwie sieciowej tego systemu jest zapewniane przede wszystkim dzięki wykorzystaniu Virtual Private Network (w skrócie VPN). W tym celu zaimplementowano dwa protokoły IPsec i L2TP.Zastosowane mechanizmy ochrony danych, w tym typy i parametry VPNów zostały...
-
Survey of Radio Navigation Systems
PublicationAt present, there is a growing demand for radio navigation systems, ranging from pedestrian navigation to consumer behavior analysis. These systems have been successfully used in many applications and have become very popular in recent years. In this paper we present a review of selected wireless positioning solutions operating in both indoor and outdoor environments. We describe different positioning techniques, methods, systems,...
-
Anonymity Architecture for Mobile Agent Systems
PublicationThe paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...
-
Introduction to the special issue on intelligent systems to aid the handicapped.
PublicationWśród wielu zastosowań sztucznej inteligencji i technologii bazodanowych pojawiają się zastosowania wspierające osoby niepełnosprawne. Z chwilą pojawienia są każdej nowej technologii komputerowej świat naukowy proponuje zastosowania tej technologii do celu poprawy komunikacji z osobami niepełnosprawnymi bądź technologie wspierające te osoby bezpośrednio. Niniejsze wydanie specjalne czasopisma Journal of Intelligent Information...
-
Dynamic Execution of Engineering Processes in Cyber-Physical Systems of Systems Toolchains
PublicationEngineering tools support the process of creating, operating, maintaining, and evolving systems throughout their lifecycle. Toolchains are sequences of tools that build on each others' output during this procedure. The complete chain of tools itself may not even be recognized by the humans who utilize them, people may just recognize the right tool being used at the right place in time. Modern engineering processes, however, do...
-
Geometric methods in dynamical systems modelling: electrical, mechanical and control systems
PublicationRozważono zagadnienia modelowania systemów dynamicznych z zastosowaniem metod geometrii różniczkowej. Równania dynamiczne otrzymano w postaci inkluzji różniczkowych. Przestrzenie konstytucyjne przyjęto w postaci subwiązek włóknistych. Rozważono przestrzenie konstytucyjne układów elektrycznych, układów mechanicznych i układów sterowania. Podstawowe wyniki pracy dotyczą struktury przestrzeni rozwiązań rozważanych systemów.
-
Multi agent grid systems
PublicationThis chapter presents an idea of merging grid and volunteer systemswith multi agent systems. It gives some basics concerning multi agentsystem and the most followed standard. Some deliberations concerningsuch an existing systems were made in order to finally present possibilities of introducing agents into the Comcute system.
-
Developing Methods for Building Intelligent Systems of Information Resources Processing Using an Ontological Approach
PublicationThe problem of developing methods of information resource processing is investigated. A formal procedure description of processing text content is developed. A new ontological approach to the implementation of business processes is proposed. Consider that the aim of our work is to develop methods and tools for building intelligent systems of information resource processing, the core of knowledge bases of which are ontology’s, and...
-
Combined Heat & Power Generating Systems
PublicationSteam cycles in combined heat and power plants. Efficiency of combined heat and power systems. Characteristics of steam-turbine CHP plants. Choice of equipment in CHP generating systems. Economic effects of combined heat and power production. Costs and energy produced CHP generating systems. Future development trends in CHP generating systems.
-
Geographical Information Systems GIS (project) [2022/23]
e-Learning CoursesSubject: Geographical Information Systems GIS, Inter-faculty (field of study: Energy Technologies), undergraduate studies, full-time studies (semester 6) Teacher: dr inż. Andrzej Augusiak, doc. PG Abstract: The course aims to teach the practical implementation of a simple project in the field of GIS geographical information systems. As part of the project, the course participant will learn how to use the basic methods and tools...
-
Identification of Continuous Systems - Practical Issues of Insensitivity to Perturbations
PublicationIn this paper the issue of continuous systems estimation, insensitive to certain perturbations, is discussed. Such an approach has rational advantages, especially when robust schemes are used to assist a target system responsible for industrial diagnostics. This requires that estimated model parameters are generated on-line, and their values are reliable and to a great extent accurate. Practical hints are suggested to challenge...
-
A system automating repairs of IT systems
PublicationThis paper presents two problems that are important nowadays: the problem of IT systems monitoring and the problem of repairing them. It shows the developed solution, aimed to automate the existing industrial repair process and to integrate it with the existing monitoring solutions and mechanisms. Described solution is a part of a bigger whole, called the Repair Management Framework (RMF). This paper presents also briefly a case...
-
Investigation of tracking systems properties in CAVE-type virtual reality systems
PublicationIn recent years, many scientific and industrial centers in the world developed a virtual reality systems or laboratories. One of the most advanced solutions are Immersive 3D Visualization Lab (I3DVL), a CAVE-type (Cave Automatic Virtual Environment) laboratory. It contains two CAVE-type installations: six-screen installation arranged in a form of a cube, and four-screen installation, a simplified version of the previous one. The...
-
2022/2023_zima SCADA Systems in Automatic Control
e-Learning CoursesSCADA Systems in Automatic Control - project materials
-
2021/2022_zima SCADA Systems in Automatic Control
e-Learning CoursesSCADA Systems in Automatic Control - project materials
-
Non-regular, incomplete and singular dynamical systems: impasse points indynamical systems
PublicationRozważono nieregularne, niezupełne i osobliwe różniczkowe systemy dynamicznez zastosowaniem metod geometrii różniczkowej.
-
Multiuser Stereoscopic Projection Techniques for CAVE-Type Virtual Reality Systems
PublicationDespite the development of increasingly popular head mounted displays, CAVE-type systems may still be considered one of the most immersive virtual reality systems with many advantages. However, a serious limitation of most CAVE-type systems is the generation of a three-dimensional (3-D) image from the perspective of only one person. This problem is significant because in some applications, the participants must cooperate with each...
-
Investigation of optical properties of Infitec and Active Stereo stereoscopic techniques for CAVE-type virtual reality systems
PublicationIn recent years, many scientific and industrial centres in the world developed virtual reality systems or laboratories. At present, among the most advanced virtual reality systems are CAVE-type (Cave Automatic Virtual Environment) installations. Such systems usually consist of four, five, or six projection screens arranged in the form of a closed or hemi-closed space. The basic task of such systems is to ensure the effect of user...
-
Enterprise Information Systems
e-Learning Courses -
Intelligent Measurement Systems
e-Learning Courses -
Geographic Information Systems
e-Learning CoursesWydział Chemii, studia magisterskie, kierunek Green Technologies and Monitoring
-
Intelligent Measurement Systems
e-Learning Courses -
Systems Software Design
e-Learning Courses -
Flood Security Strategy - Case Studies from Gdańsk Region
Publication.
-
An untraceability protocol for mobile agents and its enhanced security study
PublicationArtykuł przedstawia rozszerzoną analizę bezpieczeństwa zaproponowanego przez nas protokołu ochrony przed tropieniem (ang. untraceability protocol) dla agentów mobilnych. Jak dotąd, tak systematyczna analiza bezpieczeństwa nie została przeprowadzona. Co więcej, istniejące znane analizy bezpieczeństwa koncentrują się wyłącznie na atakujących wewnętrznych. Uważamy, że stworzona przez nas lista kontrolna ataków może posłużyć jako...
-
Decisional DNA, reflexive ontologies, and security: developing decisional trust
PublicationOmowiono model osiagania zaufania decyzjnego opartego na decyzyjnym DNA, refleksyjnych ontologiach oraz na bezpieczenstwie technologicznym.
-
Imminent threats analysis and security level evaluation in social networks
PublicationRozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...
-
The Poland-United States Security Relations in the light of Asymmetry Theory
Publication -
The practical implementation of security models and strategies in an academic network infrastuctures
PublicationArtykuł prezentuje modele i strategie bezpieczeństwa dotyczące infrastruktury sieciowej. Rozważone zostały typowe zagrożenia oraz mechanizmy bezpieczeństwa sieci komputerowej. Wymienione zostały także różnice w polityce bezpieczeństwa pomiędzy komputerową siecią komercyjną a akademicką. Opisano proces analizy ryzyka dla akademickiej sieci komputerowej oraz wskazany został sposób oszacowania wymaganego poziomu bezpieczeństwa sieci.
-
Ad hoc routing protocols - security objectives, threats and solution
PublicationZaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.
-
Adaptation of various persons' identification techniques as a solution for security and safety
PublicationPrzedstawiono różne metody identyfikacji osób w oparciu o ich cechy biometryczne w zastosowaniu do bezpieczeństwa i zabezpieczeń. Takimi biometrycznymi cechami mogą być właściwości fizjologiczne jak odciski palców, kształt dłoni, właściwości tęczówki jak również cechy behawioralne jak sposób pisania lub wypowiadania się.
-
A model-based approach to analysis of security protocols - a case study
PublicationArtykuł przedstawia zintegrowane środowisko analizy protokołów bezpieczeństwa. Środowisko zostało oparte o znaną metodę formalną CSP oraz wspierające ją narzędzia: Casper oraz FDR. Integralną częścią opisywanego środowiska jest pół-formalne zorientowane obiektowo podejście do modelowania protokołów kryptograficznych, ich kontekstu aplikacyjnego oraz wymagań bezpieczeństwa. Modelowanie obiektowe zostało oparte o język UML oraz...
-
Security of energy supply under the demonopolization of energy production in Poland,
PublicationOmówiono wzrost zapotrzebowania na energie elektryczną, udział nośników energii pierwotnej w pokryciu zapotrzebowania na paliwa. Omówiono pokrótce akty prawne związane z ochrona środowiska i energetyka. Scharakteryzowano proces starzenia się elektrowni w Polsce i rolę dużych elektrowni systemowych. Na tym tle przedstawiono rozproszone źródła energii elektrycznej i ich wpływ na bezpieczeństwo dostaw energii w sytuacjach ekstremalnych,...
-
LRIT - a novel system of vessels monitoring for maritime security and safety
PublicationW artykule przedstawiono propozycję architektury przyszłego, globalnego systemu monitorowania statków LRIT (Long Range ship's Identification and Tracking) podlegających konwencji SOLAS. Przedstawiono i scharakteryzowano poszczególne komponenty systemu ze szczególnym uwzględnieniem aspektów radiokomunikacyjnych.
-
Implementation and testing of Level 2 security architecture for the IIP System
PublicationSystem IIP definiuje kilka równoległych Internetów (PI), w tym jeden oparty na IPv6, dwa na rozwiązaniach post-IP oraz sieć zarządzania, pracujących na wspólnej infastrukturze komunikacyjnej. System ma architekturę 4-poziomową, w której poziom 2 odpowiada za tworzenie zasobów wirtualnych PI. W artykule omawiana jest trójwarstwowa architektura bezpieczeństwa proponowana dla przeciwdziałania zagrożeniom wprowadzania obcego ruchu...
-
INNOVATIVE RUN FLAT SYSTEMS
PublicationOne of the most essential threats to the mobility of wheeled vehicles is their relatively high sensitivity to tire damage. Tires can be damaged as a result at vehicle-targeting fire, after running on a mine or an improvised charge. The purpose of the article is to analyze the current technical solutions in wheeled vehicle tires, allowing for the unobstructed use of the vehicle despite the damage of one or several tires (RUN FLAT...
-
Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure
PublicationSafety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...
-
Implementation of integrated control In drinking water distribution systems - IT system proposal
PublicationImplementation of integrated control algorithms requires suitable hardware and software platforms. Proposed solution must allow realizing control and monitoring tasks, while ensuring high reliability and security of processed data. Additionally, the software and hardware solutions must be immune to outside influence. This paper presents an approach to implementation of control systems in drinking water distribution system. Presented...
-
Research on GNSS satellite navigation systems
PublicationThis article contains results of research on two GNSS systems, i.e. GPS and GLONASS. Architectures, signal structures and navigation messages of both systems have been described. Some selected investigation results, concerning receiver performance in presence of interference, have been presented.
-
Real time operating systems - lectures & exercises, 2023 summer
e-Learning CoursesSupport course for real-time operating systems
-
Piotr Odya dr inż.
PeoplePiotr Odya was born in Gdansk in 1974. He received his M.Sc. in 1999 from the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, Poland. His thesis was related to the problem of sound quality improvement in the contemporary broadcasting studio. He is interested in video editing and multichannel sound systems. The goal of Mr. Odya Ph.D. thesis concerned methods and algorithms for correcting...
-
Measurements of Spectral Spatial Distribution of Scattering Materials for Rear Projection Screens used in Virtual Reality Systems
PublicationRapid development of computing and visualisation systems has resulted in an unprecedented capability to display, in real time, realistic computer-generated worlds. Advanced techniques, including three-dimensional (3D) projection, supplemented by multi-channel surround sound, create immersive environments whose applications range from entertainment to military to scientific. One of the most advanced virtual reality systems are CAVE-type...
-
Real-time Operating Systems - L&E 2023/4
e-Learning CoursesWebsite supporting the course: "Real-time Operating Systems"
-
Systems of Nonlinear Fractional Differential Equations
PublicationUsing the iterative method, this paper investigates the existence of a unique solution to systems of nonlinear fractional differential equations, which involve the right-handed Riemann-Liouville fractional derivatives D(T)(q)x and D(T)(q)y. Systems of linear fractional differential equations are also discussed. Two examples are added to illustrate the results.