Search results for: SAFETY-CRITICAL SOFTWARE - Bridge of Knowledge

Search

Search results for: SAFETY-CRITICAL SOFTWARE

Search results for: SAFETY-CRITICAL SOFTWARE

  • Software development methodologies and practices in start-ups

    Publication

    - IET Software - Year 2019

    Software start-ups are aiming to develop cutting-edge software products under highly uncertain conditions, overcoming fast-growing markets under multiple influences. This study aims to identify and analyse the existing scientific literature regarding software development methodologies and practices in software start-ups published between January 2006 and December 2017 using the systematic mapping study. The results identified 37...

    Full text available to download

  • A comprehensive overview of software product management challenges

    The principal focus of software product management is to ensure the economic success of the product, which means to prolong the product life as much as possible with modest expenditures to maximizs profits. Software product managers play an important role in the software development organization while being responsible for the strategy, business case, product roadmap, high-level requirements, product deployment (release-management),...

    Full text available to download

  • ROAD SAFETY WITHIN THE "INTEGRATED SYSTEM OF TRANSPORT SAFETY"

    Publication

    The concept of the “Integrated System of Transport Safety” in Poland is a novel solution, built upon the best practices available from only a handful of countries in the world. In the last few decades, the extent of applying integrated transport safety systems to improve transport safety systems has varied; nevertheless, studying the experience of the safest countries in the world we can say that enormous progress has been achieved...

  • Safety & Fire Technology

    Journals

    ISSN: 2657-8808 , eISSN: 2658-0810

  • Ontology-Aided Software Engineering

    Publication

    - Year 2012

    This thesis is located between the fields of research on Artificial Intelligence (AI), Knowledge Representation and Reasoning (KRR), Computer-Aided Software Engineering (CASE) and Model Driven Engineering (MDE). The modern offspring of KRR - Description Logic (DL) [Baad03] is considered here as a formalization of the software engineering Methods & Tools. The bridge between the world of formal specification (governed by the mathematics)...

    Full text to download in external service

  • Safety integrity level verification for safety-related functions with security aspects

    The article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...

    Full text to download in external service

  • An empirical study on the impact of AspectJ on software evolvability

    Publication

    Since its inception in 1996, aspect-oriented programming (AOP) has been believed to reduce the effort required to maintain software systems by replacing cross-cutting code with aspects. However, little convincing empirical evidence exists to support this claim, while several studies suggest that AOP brings new obstacles to maintainability. This paper discusses two experiments conducted to evaluate the impact of AspectJ (the most...

    Full text available to download

  • Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...

    Full text to download in external service

  • Improving agility and discipline of software development with the Scrum and CMMI

    Publication

    This study presents a method of combining the Scrum methodology with the CMMI maturity model to improve bothagility and discipline of software development. First, the authors propose the CMMI-Scrum reference model, which maps Scrumpractices onto 123 practices of CMMI staged levels 2 and 3. For 60% of CMMI practices, which are insufficiently covered byScrum they add new practices that improve discipline while maintaining agility....

    Full text available to download

  • Security aspects in functional safety analysis

    A security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...

    Full text to download in external service

  • Determining required safety integrity level

    One of the most important stage of technical system functional safety analysis is defining the safety-related functions as well as determining safety integrity level (SIL) for each defined function. A properly carried out hazard identyfication process is the necessary condition for correct definition of the safety-related functions. Determining the safety integrity level (SIL) is based on risk assessment taking into account risk...

  • Systems Software Design 1

    e-Learning Courses
    • A. Harasimiuk
    • P. Spaleniak

    Systems Software Design  

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publication

    - Year 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Full text to download in external service

  • Health and safety training for students

    e-Learning Courses
    • I. Ziemba-Filip
    • M. Orepuk-Templin
    • M. Sokołowski

    Health and safety training is aimed at all newcoming students of Gdańsk University of Technology.

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publication

    - Year 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Full text to download in external service

  • Jacek Namieśnik prof. dr hab. inż.

    People

    Scientific discipline: chemistryRector in 2016-2019 He was born on 10 December, 1949 in Mogilno. He graduated in 1972 at the Faculty of Chemistry at Gdańsk University of Technology, obtaining a master's degree in chemical engineering. In 1972 he started working at Gdańsk University of Technology, where in 1978 he defended his doctoral thesis and in 1985 he completed his habilitation. He was appointed an associate professor in 1991...

  • Preliminary Results of a System-theoretic Assessment of Maritime Autonomous Surface Ships' Safety

    While a system‐theoretic approach to the safety analysis of innovative socio‐technical systems gains a growing acceptance among academia, safety issues of Maritime Autonomous Surface Ships (MASS) remain largely unexplored. Therefore, we applied a System‐Theoretic Process Analysis to develop and analyze a preliminary model of the unmanned shipping system in order to elaborate safety recommendations for...

    Full text available to download

  • Integrity level verification for safety-related functions

    This article describes methods for safety integrity level (SIL) verification of safety-related functions with regard to probabilistic criteria given international standards IEC 61508 and IEC 61511. These functions are to be realized using the electrical, electronic and programmable electronic (E/E/PE) systems or safety instrumented systems (SIS). Some methods are proposed for quantitative probabilistic modelling taking into account...

  • Integrated functional safety and cyber security analysis

    Publication

    - IFAC-PapersOnLine - Year 2018

    The chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...

  • ECOTOXICOLOGY AND ENVIRONMENTAL SAFETY

    Journals

    ISSN: 0147-6513 , eISSN: 1090-2414

  • Framework for RIDM within functional safety management process

    The functional safety management in life cycle is a complex process starting with identifying hazards and defining safety-related functions (SRFs) with risk assessment oriented at determining the safety integrity level. Another element of such life cycle is a verification of required SIL for designed safety-related system which implements safety function. Due to complexity of the problem, to overcome difficulties in safety-related...

  • Procedure based functional safety and information security management of industrial automation and control systems on example of the oil port installations

    The approach addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety and security requirements specified in standards IEC 61508, IEC 61511 and IEC 62443. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of...

    Full text available to download

  • Safety PL - a support tool for Road Safety Impact Assessment

    Published on 19 November 2008, the European Union's Directive 2008/96/EC is one of the most important EU documents setting out a road safety orientation, in particular, road infrastructure safety management. It identifies four main areas of activity: road safety impact assessment, road safety audit, ranking of high accident concentration sections and network safety ranking and road infrastructure safety inspection. The Directive...

    Full text to download in external service

  • Functional safety and managing competence

    Publication

    - Year 2007

    Są nowe wyzwania związane z badaniami, edukacją i szkoleniem w obszarach bezpieczeństwa i ochrony systemów i sieci krytycznych. W rozdziale podkreśla się, że kompetencje specjalistów powinny być kształtowane w zintegrowanych procesach edukacji i szkolenia. Dlatego uzasadnione jest, aby opracować w Europie standardy i programy kształcenia na bazie odpowiednich prac badawczych i najlepszych doświadczeń z praktyki przemysłowej w celu...

  • Kazimierz Kosmowski prof. dr hab. inż.

    People

    Kazimierz Tadeusz Kosmowski (ur. 12 maja 1947 r. w Nakle nad Notecią) – specjalizacja z zakresu niezawodności i bezpieczeństwa systemów technicznych. Prowadzi badania dotyczące metod identyfikacji zagrożeń oraz analizy i oceny ryzyka ukierunkowanych na obiekty przemysłowe i systemy infrastruktury krytycznej w cyklu życia. Aktualne zainteresowania naukowe dotyczą współdziałania systemów OT i IT oraz bezpieczeństwa funkcjonalnego...

  • JAKOŚĆ I JEJ ZASTOSOWANIA 2023 | QUALITY AND ITS APPLICATIONS 2023 TOWARDS SUSTAINABLE FUTURE

    Events

    23-11-2023 09:30 - 24-11-2023 15:30

      Politechnika Gdańska i Uniwersytet Gdański  oraz Związek Uczelni Fahrenheita zapraszają do wzięcia udziału w  III Międzynarodowej Konferencji Naukowej    Gdańsk University of Technology and the University of Gdańsk and the Fahrenheit University Association invite you to take part in the 3rd International...

  • Rigorous numerics for critical orbits in the quadratic family

    Publication

    - CHAOS - Year 2020

    We develop algorithms and techniques to compute rigorous bounds for finite pieces of orbits of the critical points, for intervals of parameter values, in the quadratic family of one-dimensional maps fa(x)=a−x2. We illustrate the effectiveness of our approach by constructing a dynamically defined partition P of the parameter interval Ω=[1.4,2] into almost 4 million subintervals, for each of which we compute to high precision the...

    Full text available to download

  • Road Safety Observatories within the Structure of Integrated Transport Safety Systems

    Publication

    - Year 2011

    Accurate knowledge about the causes, circumstances and place of transport accidents is the prerequisite to take the correct action to improve transport safety. Developing appropriate organizational structures, forms and methods of management and implementation of safety measures in the sectoral approach condition the success. Therefore the Safety Information System is one of the integral areas of the Integrated Transport Safety...

  • Input files for the Floodsar software

    Open Research Data
    open access

    Input files for the Floodsar softwareAuthor: Tomasz Berezowski, Gdansk University of Technology, tomberez@eti.pg.edu.pl

  • Modelling selected road safety measures at the regional level in Europe

    Regions are Europe’s basic levels of management. The literature was reviewed to identify regional safety analyses and some of the factors that are important for road safety in the regions. Next, data were collected atthe regional NUTS 2 level in Europe for the years 1999-2008. An analysis of the data helped identify f actors which have the strongest bearing on fatalities and other safety measures. This paper presents the initial...

    Full text to download in external service

  • Jakub Miler dr inż.

    Academic career: 2000: Master of Science - Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics, thesis "Computer system for supporting risk management in a software engineering project", supervisor prof. Janusz Górski 2005: PhD - Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics, thesis "A Method of Software Project Risk Identification and Analysis",...

  • TRWAŁOŚĆ PROJEKTU ERASMUS+ SP4CE - STUDIUM PRZYPADKU

    Projekt ERASMUS+ Partnerstwo Strategiczne na Rzecz Kreatywności i Przedsiębiorczości (ang. Strategic Partnership for Creativity and Entrepreneurship - SP4CE) dotyczył wdrażania i upowszechniania innowacyjnych rozwiązań wzmacniających współpracę europejską w dziedzinie kształcenia i szkolenia zawodowego. Działania projektowe były związane z promowaniem innowacyjnych praktyk w edukacji oraz szkoleniach poprzez wspieranie spersonalizowanych...

    Full text available to download

  • Towards systemic functional safety and security management in hazardous plants

    The aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...

  • Shipping Safety Management on Polish Inland Waterways

    Publication

    - Archives of Transport System Telematics - Year 2018

    Over the past years, the role of inland waterway transport has increased compared to other modes of transport. The increasing intensity of the inland vessel traffic significantly affects the safety of navigation. The article analyses the main causes of accidents and incidents that occurred on the Odra Waterway and Lower Vistula. The authors have classified those accidents and suggested possible directions for the development of...

    Full text to download in external service

  • 8. Critical Management Studies

    e-Learning Courses
    • A. Karalus

  • Cognition and Decisional Experience to Support Safety Management in Workplaces

    Publication

    Hazards are present in all workplaces and can result in serious injuries, short and long-term illnesses, or death. In this context, management of safety is essential to ensure the occupational health of workers. Aiming to assist the safety management process, especially in industrial environments, a Cognitive Vision Platform for Hazard Control (CVP-HC) is proposed. This platform is a Cyber Physical system, capable of identifying...

    Full text to download in external service

  • Problems in designing and operating the functional safety solutions of higher integriity levels

    The aim of this article is to identify and discuss some problems that have been encountered in designing and operating the functional safety solutions of higher safety integrity levels (SIL 3 and SIL 4) in the light of analyses outlined in a new version of the international standard IEC 61508:2010. Examples of such solutions are the electric / electronic / programmable electronic systems (E/E/PESs) and the safety instrumented systems...

  • Review of ship safety domains: Models and applications

    Ship safety domain is a term which is widely used in research on collision avoidance and traffic engineering among others. Classic ship domains have been compared in multiple reports. However, up till now there has been no work summing up contemporary research in this field. The paper offers a systematic and critical review of the newer ship domain models and related research. It discusses multiple differences in approach to ship...

    Full text to download in external service

  • SAFETY SCIENCE

    Journals

    ISSN: 0925-7535 , eISSN: 1879-1042

  • Cognitive engineering and functional safety technology for reducing risks in hazardous plants

    Cognitive engineering is considered nowadays as interesting multidisciplinary domain that focuses on improving the relations between humans and the systems that are supervised and operated. The industrial automation and control systems (IACS) in hazardous plants are increasingly computerized and perform various safety functions. These are designed and implemented according to the functional safety concept. The objective is to maintain...

    Full text to download in external service

  • Rafał Leszczyna dr hab. inż.

    Dr hab. Rafal Leszczyna is an associate professor at Gdansk University of Technology, Faculty of Management and Economics. He holds the M.Sc. degrees of Computer Science and Business Management. In December, 2006 he earned a Ph.D. in Computer Science, specialisation - Computer Security at the Faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. Between 2004 and 2008 he worked in the European...

  • Preliminary safety assessment of Polish interchanges

    Publication

    - Archives of Transport - Year 2021

    Interchanges are a key and the most complex element of a road infrastructure. The safety and functionality of interchanges determine the traffic conditions and safety of the entire road network. This applies particularly to motorways and express-ways, for which they are the only way to access and exchange traffic. A big problem in Poland is the lack of comprehensive tools for designers at individual stages of the design process....

    Full text available to download

  • Software Factory project for enhancement of student experiential learning

    Publication

    - Year 2019

    Providing opportunities for students to work on real-world software development projects for real customers is critical to prepare students for the IT industry. Such projects help students to understand what they will face in the industry and experience real customer interaction and challenges in collaborative work. To provide this opportunity in an academic environment and enhance the learning and multicultural teamwork experience,...

  • The control software of the portable raman spectrometer

    The paper contains a description of the control software of a portable Raman spectrometer which was built in the Department of Optoelectronics and Electronic Systems Faculty of Electronics, Telecommunications and Informatics Gdansk University of Technology. The software has modular structure, which includes the laser control module and the spectrum acquisition module (laser power selection, working mode and data acquisition time)...

    Full text available to download

  • Elective Project I _ Shelter_learning by doing

    e-Learning Courses
    • G. Rembarz
    • B. Bou Kalfouni

    Elective Project I _ Shelter - learning by doing “Your creativity and skills play an important role in making an impact in responding to humanitarian challenges and global crises” The world seems to be reeling from one crisis to another. Recently we experienced climate crises, global pandemic (Covid-19), economic uncertainty, wars, floods, wildfire, and earthquakes. Proceeding from the challenges facing humanity at the global...

  • Modern Methods of Software Development

    Publication

    - TASK Quarterly - Year 2015

    Software development methods consist of such activities like analysis, planning, development, testing, deployment, maintenance and retirement. All of them can be divided into two main categories - traditional and agile. The objective of this paper is to review some of the most popular traditional, agile and open source development methods. Special attention was paid to the common stages of all methods - testing and maintenance.

    Full text available to download

  • Resilience and Security in Software Defined Networking

    Publication
    • C. Mas Machuca
    • P. Vizarreta
    • R. Durner
    • J. Rak

    - Year 2018

    This paper gives an overview of the most important issues on resilience and security in Software Defined Networking

    Full text to download in external service

  • Strategies for Dealing With Software Product Management Challenges

    Publication

    Software product management, which involves multiple processes and responsibilities and links to many activities within the organisation, increases the success rate of IT projects. However, the adoption of product management activities and the implementation of the software product manager role itself varies between companies. This research explores the topic of software product managers’ strategies for dealing with challenges...

    Full text available to download

  • Enhancing Availability for Critical Services

    Publication
    • T. Gomes
    • L. Martins
    • R. Girão-Silva
    • D. Tipper
    • A. Pašić
    • B. Vass
    • L. Garrote
    • U. J. Nunes
    • M. Zachariasen
    • J. Rak

    - Year 2020

    Traditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...

    Full text to download in external service

  • Approach to security assessment of critical infrastructures' information systems

    Publication

    - IET Information Security - Year 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Full text to download in external service