Search results for: VERIFICATION
-
Knowledge-based functional safety management using ProSIL software
PublicationIn the article the ProSIL software for computer aided functional safety management is presented. The software consists of three modules for the determination of the required SIL level (ProSILen) and verification of the SIL level (ProSILver). In the ProSIL the calibrated knowledge-based risk graph method for determining the required safety integrity level (SIL) of the safety functions identified in hazard analysis is implemented....
-
Hybrid Fuzzy-Ontological Project Framework of a Team Work Simulation System
PublicationThe aim of this article is to present the project framework for constructing a Software Process Simulation Modeling (SPSM) system. SPSM systems can be used as a virtual environment for the selection of methods and tools of project management in IT support organizations. The constructed system simulates the Scrum methodology, including the management processes and the project roles. For the implementation of Scrum processes, the...
-
INTERLABORATORY COMPARISON OF THE ELECTROMAGNETIC EMISSION MEASUREMENTS USING FAR AND GTEM TEST SITES UP TO 1 GHz
PublicationElectromagnetic emission limiting is one of the basic requirements in the European Directive 2014/30/EU (EMC Directive). Manufacturers often use alternative methods of measurements to make preliminary verification of emission. This paper presents and analyzes problem with comparison between measurements in different test sites: FAR (Fully Anechoic Room) and GTEM (Gigahertz Transverse Electromagnetic cell). FAR is assumed as the...
-
Design and experimental validation of a single-stage PV string inverter with optimal number of interleaved buck-boost cells.
PublicationIncreasing converter power density is a problem of topical interest. This paper discusses an interleaved approach of the efficiency increase in the buck-boost stage of an inverter with unfolding circuit in terms of losses in semiconductors, output voltage ripples and power density. Main trends in the power converter development are reviewed. A losses model was designed and used for the proposed solution to find an optimal number...
-
Texture Features for the Detection of Playback Attacks: Towards a Robust Solution
PublicationThis paper describes the new version of a method that is capable of protecting automatic speaker verification (ASV) systems from playback attacks. The presented approach uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. Our goal is to make the algorithm independent from the contents of the training set as much as possible; we look for the...
-
The concept of research on ecological, energy and reliability effects of modified marine fuel oils application to supply compression-ignition engines in real conditions
PublicationWithin the article, basic assumptions of the research project financed by Regional Fund for Environmental Protection and Water in Gdansk were described. The project concerns the experimental investigations carried out on laboratory compression-ignition engine in conditions of its supply with a non-standard marine fuel oil. Configuration and measuring capability of laboratory test bed presently being constructed were introduced....
-
Selected manufacturing difficulties encountered during setup of machining on cnc multi-axis linear automatic lathe and on cnc multi-spindle turning centers
PublicationThe article presents the observed manufacturing technology implementation difficulties in workshop practice, resulting from the construction and principles of operation on the DMG’s SPRINT 32/5 CNC linear automatic lathe and on the Mazak’s HQR 150 MSY and QTN 200 MS CNC turn - mill centers, and discusses possible rules for solving the production problems encountered. The article also discusses the principles of dividing the machining...
-
Ontology management in the multi-agent system for the it evaluation
PublicationThe team of researchers at the Gdańsk University of Technology is currently developing a model of the multi-agent system (MAS_IT) that would aid the IT managers to find the most appropriate technology to the goals assumed. The knowledge is to be provided by experts and stored in the facts and rules bases. The responsibility of the verification process-on the input and query stages-is given to the ontology, making it to some extend...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublicationIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Implementation of IMS/NGN Transport Stratum Based on the SDN Concept
PublicationThe paper presents the development and verification of software and a testbed aiming to demonstrate the ability of two telecommunication network concepts—Next Generation Network (NGN) and Software-Defined Networking (SDN)—to cooperate. The proposed architecture includes components of the IP Multimedia Subsystem (IMS) in its service stratum and of the SDN (controller and programmable switches) in its transport stratum, providing...
-
Comparison of three methods of EPR retrospective dosimetry in watch glass
PublicationIn this article we present results of our follow-up studies of samples of watch glass obtained and examined within a framework of international intercomparison dosimetry project RENEB ILC 2021. We present three methods of dose reconstruction based on EPR measurements of these samples: calibration method (CM), added dose method (ADM) and added dose&heating method (ADHM). The study showed that the three methods of dose reconstruction...
-
Mobile indicators in GIS and GPS positioning accuracy in cities
PublicationThe publication describes the possible use of tele-geoprocessing as a synergy of modern IT solutions, telecommunications and GIS algorithms. The paper presents a possibility of urban traffic monitoring with the use of mobile GIS indicators of dedicated monitoring system designed for taxi corporation. The system is based on a stationary and mobile software package. The optimal and minimal assumptions for the monitoring of urban...
-
Large deformation finite element analysis of undrained pile installation
PublicationIn this paper, a numerical undrained analysis of pile jacking into the subsoil using Abaqus software suit has been presented. Two different approaches, including traditional Finite Element Method (FEM) and Arbitrary Lagrangian–Eulerian (ALE) formulation, were tested. In the first method, the soil was modelled as a two-phase medium and effective stress analysis was performed. In the second one (ALE), a single-phase medium was assumed...
-
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
PublicationAbstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...
-
Preliminary experimental research on stability of truss' joint with positive eccentricity
PublicationRecently, a very large interest in lightweight steel structures made from cold-formed sections has been noticeable. In the design practice, a large emphasis is put on rational shaping of both the thin-walled elements and constructions designed on them. The aim of this paper is to present the methodology for preparation of experimental research that model the behaviour of members in trusses made of cold-formed sections with positive...
-
Development of dynamic method for evaluation of inhibition efficiency on the example of 8-hydroxyquinolin
PublicationSelection of a proper inhibitor should be based on the evaluation of its mechanism and effective concentrations. Mechanism of inhibition usually has dynamic character due to changing physicochemical conditions of the environment and corroding metal surface. Most of actually used methods are stationary or contain assumptions which highly influences obtained values. Development of new dynamic method, based on modified EIS, allows...
-
Tradycyjna versus przyspieszona internacjonalizacja przedsiębiorstw z branż high-tech. Wyniki badań empirycznych
PublicationThe discussion on the role and importance of time in the process of internationalization of firms belongs to the mainstream of research in the field of internationalization. In the literature, the phenomenon of early and rapid internationalization was noticed in the early 1980s; however, the intensive development of the research into this phenomenon began a decade later and continues today. For several years in Poland, the share...
-
Ocena pracy dźwigara zadaszenia Hali Blanika w Gdańsku
PublicationWartykule przedstawiono kompleksowe sprawdzenie nośności stalowej konstrukcji zadaszenia Hali Leszka Blanika w Gdańsku. Dokonano oceny wpływu otworów dużej średnicy w środnikach dźwigara na jego nośność. Oszacowano nośność nietypowego, zginanego styku doczołowego łączącego elementy dwuteowe klasy 4. Obliczenia wykonano na podstawie norm i analiz modeli MES.
-
ZASTOSOWANIE FILTRACJI CZĄSTECZKOWEJ DO ESTYMACJI POŁOŻENIA W SYSTEMIE LOKALIZACYJNYM UWB
PublicationNiniejszy artykuł dotyczy kwestii poprawy dokładności estymacji położenia w systemie lokalizacji wewnątrzbudynkowej, bazującym na radiowych pomiarach odległości realizowanych przez modemy UWB. Proponuje się zastosowanie metody filtracji cząsteczkowej do zmniejszenia błędu wyznaczania pozycji obiektu przy braku bezpośredniej widoczności ze stacją referencyjną. W artykule opisano algorytm filtru cząsteczkowego, jego przykładową implementację...
-
Neural network model of ship magnetic signature for different measurement depths
PublicationThis paper presents the development of a model of a corvette-type ship’s magnetic signature using an artificial neural network (ANN). The capabilities of ANNs to learn complex relationships between the vessel’s characteristics and the magnetic field at different depths are proposed as an alternative to a multi-dipole model. A training dataset, consisting of signatures prepared in finite element method (FEM) environment Simulia...
-
Simulation Model for Application of the SDN Concept in IMS/NGN Network Transport Stratum
PublicationThe paper presents a simulation model allowing examination of cooperation between two currently used telecommunication networks concepts: IP Multimedia Subsystem/Next Generation Network (IMS/NGN) and Software-Defined Networking (SDN). Application of the SDN architecture elements in IMS/NGN networks will enable unified control and management of transport resources for various transport technologies and equipment manufacturers. However,...
-
Accuracy of marine gravimetric measurements in terms of geodetic coordinates of land reference benchmark
PublicationThe article presents how the values of (3D) coordinates of land reference points affect the results of gravimetric measurements made from the ship in sea areas. These measurements are the basis for 3D maritime inertial navigation, improving ships' operational safety. The campaign verifying the network absolute point coordinates used as a reference point for relative marine gravity measurements was described. The obtained values...
-
An analytical approach to determine the health benefits and health risks of consuming berry juices
PublicationFood products composition analysis is a prerequisite for verification of product quality, fulfillment of regulatory enforcements, checking compliance with national and international food standards, contracting specifications, and nutrient labeling requirements and providing quality assurance for use of the product for the supplemen- tation of other foods. These aspects also apply to the berry fruit and berry juice. It also must...
-
Rapid surrogate-assisted statistical analysis of compact microstrip couplers
PublicationIn this paper, a technique for low-cost statistical analysis and yield estimation of compact microwave couplers has been presented. The analysis is executed at the level of a fast surrogate model representing selected characteristic points of the coupler response that are critical to determine satisfaction/violation of the prescribed design specifications. Because of less nonlinear dependence of the characteristic points on geometry...
-
Model of the double-rotor induction motor in terms of electromagnetic differential
PublicationThe paper presents a concept, a construction, a circuit model and experimental results of the double-rotor induction motor. This type of a motor is to be implemented in the concept of the electromagnetic differential. At the same time it should fulfill the function of differential mechanism and the vehicle drive. One of the motor shafts is coupled to the direction changing mechanical transmission. The windings of the external rotor...
-
Operating system security by integrity checking and recovery using write-protected storage
PublicationThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
Analytical Expression for the Time-Domain Discrete Green's Function of a Plane Wave Propagating in the 2-D FDTD Grid
PublicationIn this letter, a new closed-form expression for the time-domain discrete Green's function (DGF) of a plane wave propagating in the 2-D finite-difference time-domain (FDTD) grid is derived. For the sake of its verification, the time-domain implementation of the analytic field propagator (AFP) technique was developed for the plane wave injection in 2-D total-field/scattered-field (TFSF) FDTD simulations. Such an implementation of...
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Three-Dimensional Printing of Bone Models
PublicationThe trabecular bone occurs, for example, in the femoral heads. Understanding the phenomenon of bone tissue degeneration can be the basis for the possibility of looking for alternative methods of surgical treatment of bone loss. The paper presents the results of the trabecular bone model, which was produced in additive manufacturing method with fused filament fabrication technology. The verification of the mechanical behavior of...
-
Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure
PublicationSafety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...
-
THE METHOD OF ENERGY-EFFICIENCY INVESTIGATIONS OF THE NEWLY PRODUCED MARINE FUELS THROUGH AN APPLICATION OF THE LABORATORY DIESEL ENGINE
PublicationThe article deals with one of the scientific issue solved within frames of the research project financed by Voivodeship Fund for Environmental Protection and Water Management in Gdansk, namely, in particular, the method of energy investigations of the self-ignition engine in conditions of its supply with a non-standard (modified) marine fuel. The representative results of engine tests worked out on the especially built laboratory...
-
The Algorithm of Modelling and Analysis of Latent Semantic Relations: Linear Algebra vs. Probabilistic Topic Models
PublicationThis paper presents the algorithm of modelling and analysis of Latent Semantic Relations inside the argumentative type of documents collection. The novelty of the algorithm consists in using a systematic approach: in the combination of the probabilistic Latent Dirichlet Allocation (LDA) and Linear Algebra based Latent Semantic Analysis (LSA) methods; in considering each document as a complex of topics, defined on the basis of separate...
-
Computational modeling of molecularly imprinted polymers as a green approach to the development of novel analytical sorbents
PublicationThe development of novel molecularly imprinted polymers (MIP) sorbents for specific chemical compounds require a lot of tedious and time-consuming laboratory work. Significant quantities of solvents and reagents are consumed in the course of the verification of appropriate configurations of polymerization reagents. Implementation of molecular modeling in the MIP sorbent development process appears to provide a solution to this...
-
Analysis of Properties of an Active Linear Gesture Sensor
PublicationBasic gesture sensors can play a significant role as input units in mobile smart devices. However, they have to handle a wide variety of gestures while preserving the advantages of basic sensors. In this paper a user-determined approach to the design of a sparse optical gesture sensor is proposed. The statistical research on a study group of individuals includes the measurement of user-related parameters like the speed of a performed...
-
Algorytmy wyodrębniania składowych symetrycznych sygnału pomiarowego napięcia w przypadku asymetrii sieci trójfazowej
PublicationW artykule zaprezentowano działanie wybranych algorytmów wykorzystywanych do wyodrębniania składowych symetrycznych z sygnałów pomiarowych napięcia lub prądu w przypadku wystąpienia asymetrii trójfazowej sieci elektroenergetycznej. Weryfikacji działania algorytmów dokonano na podstawie badań symulacyjnych i laboratoryjnych w układzie w którym jako odbiornik zastosowano stojan maszyny asynchronicznej pierścieniowej. Określono wpływ...
-
Possibility of thermal imaging use in studies of natural convection heat transfer on the example of an isothermal vertical plate.
PublicationA new method of infrared (IR) camera use in convective heat transfer studies has been presented. Until now, IR cameras were utilized for temperature field visualizations of flat heated surfaces of solid objects only. Because liquids and gasses do not emit radiation in the infrared range of wave lengths, detection of temperature field in the air was conducted with the use of plastic mesh, which, after heating by hot air, emits infrared...
-
ARTIFICIAL MODEL IN THE ASSESSMENT OF THE ALGORITHM OF OBJECTS RECORDED BY LASER SCANNING SHAPE DETECTION (ALS/TLS)
PublicationBrief description of the study and used methods. Brief description of the study and used As part of the preparatory work aimed to create the application solution allowing for the automation of searching objects in data, obtained in the scanning process using ALS (Airborne Laser Scanning) or TLS (Terrestrial Laser Scanning), the authors prepared a artificial (synthetic, theoretical) model of space, used for the verification of operation...
-
Assessment of the Accuracy of a Virtual Multi-Channel Temperature Measuring Instrument
PublicationThe multi-channel temperature measurement system developed works with NTC thermistors. The article presents the results of theoretical and empirical evaluation of accuracy obtained in measurement channels. The basis for the theoretical assessment is the mathematical model for each of the measurement channels and the characteristics of the system elements included in the circuits of the measurement channel. Two different methods were...
-
Under the Fire of Disinformation. Attitudes Towards Fake News in the Ukrainian Frozen War
PublicationIn this article, we examine individual attitudes towards fake news in the extreme conditions of a propaganda war, taking into account the complex regional social and historical conditions. For this purpose, within the mobile boundary zone during frozen war in Ukraine, we conducted qualitative research among representatives of generations X and Z (high school teachers and students). Being accustomed to fake news turned out to be...
-
QoS Extensions for Flow-Awareness Networks
PublicationThe paper contains a description and research results of the proposal for distributed QoS extensions for Flow-Based Networking. These QoS extensions let the network accept or reject flows based on current network load and QoS promises for each of the flows. Proposed solution consists of two distributed components, each of them performing in every node, measurement system and access control. The solution could be applied in any...
-
Model of a Maturity Capsule in Managing IT Projects
PublicationThe main purpose of this article is to present a report on the development of a model of information technology management (MITM). This model is an answer to the need to support decision making in the selection of methods and information technologies. This article presents a multisequential model (MSM) of technology selection and a model for initial processing procedures (IPP) necessary for the MITM model. The presentation of the...
-
A Perspective on Fast-SPICE Simulation Technology
PublicationThis chapter presents an introduction to the area of accelerated transistor-level (‘fast-SPICE’) simulation for automated verification and characterization of integrated circuits (ICs) from technologist’s perspective. It starts with outlining goals, expectations and typical usage models for fast-SPICE simulators, stressing how they differ from regular SPICE tools. It continues with presenting and classifying core technologies typically...
-
Smart Blue Cities
PublicationThis paper presents the concept of Smart Cities from the perspective of those located by water, considering if there are more major differences in the way the concept is implemented in coastal cities, as opposed to those located anywhere else. It proves possible to point to such differences, in relation to the three key areas of mobility, the environment and living. Further consideration is given to specific legal and cross-cultural...
-
Methodology of Constructing and Analyzing the Hierarchical Contextually-Oriented Corpora
PublicationMethodology of Constructing and Analyzing the Hierarchical structure of the Contextually-Oriented Corpora was developed. The methodology contains the following steps: Contextual Component of the Corpora’s Structure Building; Text Analysis of the Contextually-Oriented Hierarchical Corpus. Main contribution of this study is the following: hierarchical structure of the Corpus provides advanced possibilities for identification of the...
-
Comprehensive dimension scaling of multi-band antennas for operating frequencies and substrate parameters
PublicationIn this paper, low-cost and comprehensive redesign of multi-band antennas with respect to the operating frequencies and material parameters of the substrate is presented. Our approach exploits an inverse surrogate model identified based on a set of reference designs optimized at the level of coarse-discretization EM simulations of the antenna at hand. An iterative correction procedure is also implemented to account for the initial...
-
Implementation of the FOPID Algorithm in the PLC Controller - PWR Thermal Power Control Case Study
PublicationIn the paper authors describe proposition of design and verification procedures of the discrete Fractional Order PID (FOPID) algorithm for control of the Pressurized Water Reactor (PWR) thermal power near its nominal operating point. The FOPID algorithm synthesis consists of: off-line optimal tunning of its parameters in continuous time-domain with LQ (Linear Quadratic) performance index and simplified models of nuclear reactor...
-
Modeling energy consumption of parallel applications
PublicationThe paper presents modeling and simulation of energy consumption of two types of parallel applications: geometric Single Program Multiple Data (SPMD) and divide-and-conquer (DAC). Simulation is performed in a new MERPSYS environment. Model of an application uses the Java language with extension representing message exchange between processes working in parallel. Simulation is performed by running threads representing distinct process...
-
Experimental study of the effect of vertical acceleration component on the slope stability
PublicationThe paper deals with the stability of earth dams subjected to seismic and paraseismic excitations occurring in the close distance to the dam. The Newmark’s stability approach, classified as a simplified dynamic method, has been extended for two directional dynamic loading case and the evolution of the friction coefficient. The paper is focused on the experimental verification of the proposed method for harmonic and cyclic excitations...
-
Displacement measurements during load testing of railway arch bridge
PublicationThe paper discusses issues concerning load tests carried out on a twin-track, arch railway bridge over the Martwa Wisla river in Gdansk. Currently, it is the bridge with the longest span in its class in Poland. The load-bearing structure consists of three no-hinge arches and an orthotropic deck suspended from them. The studies of the structure assumed the performing of static and dynamic tests. The paper presents the method for...
-
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
PublicationAutomatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...