Filters
total: 1151
displaying 1000 best results Help
Search results for: agile, security, software development methods
-
Mechanics II, W/C, ZiIP, sem. 03, zima 23/24 (PG_00055119)
e-Learning CoursesThe course provides students with basic knowledge of Classical Mechanics. Terms, assumptions, principles and methods of Statics, Kinematics and Kinetics are treated. General methods based on the principles of conservation of momentum and energy are considered for a particle, a body and a system of bodies. The main emphasis is on the development of skills to efficiently schematise, solve and analyse typical problems.
-
Mechanics I, W/C, ZiIP, sem. 02, lato 23/24 (PG_00050273)
e-Learning CoursesThe course provides students with basic knowledge of Classical Mechanics. Terms, assumptions, principles and methods of Statics, Kinematics and Kinetics are treated. General methods based on the principles of conservation of momentum and energy are considered for a particle, a body and a system of bodies. The main emphasis is on the development of skills to efficiently schematise, solve and analyse typical problems.
-
Bridging the gap between business process models and use-case models
PublicationToday's software development methodologies are equipped with a plethora of methods and techniques for business process engineering and Requirements Engineering. However, heavy investments in IT have not brought forth expected results. What seems to be lacking is a systematic approach that consolidates both disciplines to gain a synergistic effect. To address this challenge we extend Use-Case Driven Approach (UCDA) by binding use...
-
Karol Flisikowski dr inż.
PeopleKarol Flisikowski works as Associate Professor at the Department of Statistics and Econometrics, Faculty of Management and Economics, Gdansk University of Technology. He is responsible for teaching descriptive and mathematical statistics (in Polish and English), as well as scientific research in the field of social statistics. He has been a participant in many national and international conferences, where he has presented the results...
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublicationThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Ukraine’s Energy Security in Strategies
PublicationDuring the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...
-
WIKI-WS as a C2 NIWA Web Service Management Platform
PublicationThe Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...
-
Applications of Additively Manufactured Tools in Abrasive Machining—A Literature Review
PublicationHigh requirements imposed by the competitive industrial environment determine the development directions of applied manufacturing methods. 3D printing technology, also known as additive manufacturing (AM), currently being one of the most dynamically developing production methods, is increasingly used in many different areas of industry. Nowadays, apart from the possibility of making prototypes of future products, AM is also used...
-
Ahmer Bin Hafeez
PeopleI have experience in Microbiology & Computational Biology, particularly bioinformatics, homology modeling, phylogenetics, structural biology, and drug discovery. Currently, my interest lies in translatable omics studies and drug discovery against novel protein targets involved in cancer and infectious diseases and Host-Pathogen PPIs. My aim involves the use of computational methods for the identification of novel targets and to...
-
Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network
PublicationIn this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...
-
A place of school in the idea of the sustainable development
PublicationWell designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).
-
Oznaczanie tlenu – od metody Winklera do czujników enzymatycznych (Determination of oxygen – from Winkler Method to enzymatic sensor)
PublicationMonitoring of dioxygen levels is of utmost importance from the view-point of life processes, medical diagnostics, nutrition and chemical industries. In all these measurements both low and high levels of this element are important. The common methods for the determination of dioxygen are the Winkler method, Clark electrode and pulsoxymeters. A new, already strong field of research can be now recognized – the development of miniaturized...
-
Selecting Requirements Documentation Techniques for Software Projects: a Survey Study
PublicationA significant number of techniques dedicated to requirements specification and documentation is described in the available sources. As there is no purpose to use all of them, a selection has to be made, taking into consideration the context of a given software project, for example its size, usage of agile approach or stakeholders' technical competency. This paper is intended to provide guidelines for such selection. We reviewed...
-
Security and Anonymity in Agent Systems
PublicationMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
The impact of security aspects on functional safety analysis = Wpływ aspectów ochrony informacji na wyniki analiz bezpieczeństwa funkcjonalnego
PublicationIt can be said that a distributed control and protection system’s security level may have a significant impact on functional safety analyses and their results. However the issue of integrating those both aspects are difficult and usually is neglected during functional safety analyses. Known methods of functional safety analyses don’t take into consideration this kind of concept also. This paper discusses an attempt to integrate...
-
Towards systemic functional safety and security management in hazardous plants
PublicationThe aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...
-
Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
Publication[Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...
-
ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS
PublicationThe article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...
-
Comparison and Analysis of Service Selection Algorithms
PublicationIn Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...
-
Weryfikacja Poziomów Nienaruszalności Bezpieczeństwa z uwzględnieniem Zagadnień Ochrony Informacji
PublicationNiniejszy rozdział poświęcono wybranym istotnym zagadnieniom analizy bezpieczeństwa funkcjonalnego, w szczególności weryfikacji poziomów nienaruszalności bezpieczeństwa SIL funkcji bezpieczeństwa implementowanych w rozproszonych systemach sterowania i zabezpieczeń z uwzględnieniem zagadnień ochrony informacji. Zaproponowano metodę opartą na informacji ilościowej i jakościowej do weryfikacji SIL (IEC 61508, 61511) z uwzględnieniem...
-
Security of export transactions in the offer of leading banks on the Polish market
PublicationThe following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...
-
EU-Russian Relations and the Eastern Enlargement: Integration or Isolation
Publication -
Democratisation and Institutional Development in Romania after 1989
Publication -
Environmental Protection in Energetics, W, E, sem.01, zimowy 22/23
e-Learning CoursesThe principle of sustainable development. Non-renewable and renewable energy sources. Environmental aspects of the use of different energy sources. Atmospheric pollution. Methods of reducing the emission of pollutants into the atmosphere. Waste and hazardous waste. Water and Wastewater. Legal aspects of environmental protection.
-
On extending open source IMS platform for integrated IPTV and VoIP services over IPv6
PublicationEven when IMS is the most popular platform for multimedia services, the open versions of IMS ecosystem are lacking in specified functionalities for IPTVv6 and VoIPv6 services. In this paper, we extend current client and server open source software in order to provide reliability and security to these multimedia services. As a part of our work the IMS architecture for conferencing system with proposed mechanisms to improve system...
-
Implementation of integrated control In drinking water distribution systems - IT system proposal
PublicationImplementation of integrated control algorithms requires suitable hardware and software platforms. Proposed solution must allow realizing control and monitoring tasks, while ensuring high reliability and security of processed data. Additionally, the software and hardware solutions must be immune to outside influence. This paper presents an approach to implementation of control systems in drinking water distribution system. Presented...
-
System setup and software for cyclic, staircase and square wave voltammetry measurements
PublicationHardware dedicated for electrochemical measurement sometimes does not allow performing certain voltammetry experiments. Staircase and square wave voltammetry, techniques which have many advantages comparing with standard voltammetric techniques, are rarely implemented in software controlling electrochemical measuring equipment. These methods, however, can be relatively easy realized with some addition...
-
Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons
PublicationRecent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublicationModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Accounting for the distributions of input quantities in the procedure for the measurement uncertainty evaluation when calibrating the goniometer
PublicationThe discords concerning the measurement uncertainty evaluation in the Guide to the Expressing of Uncertainty in Measurement (GUM) and its Supplement 1 are considered. To overcome these discords, the authors of the paper propose to use the kurtosis method and the law of the propagation of the expanded uncertainty. Using the example of the goniometer calibration, the features of accounting for the distribution laws of input quantities...
-
IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA
Publication34 IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA Krystyna Gomółka Department of Social Sciences and Philosophy, Faculty of Management and Economics, Gdansk University of Technology Ul. G. Narutowicza 11/12, 80 - 233 Gdańsk, Poland Krystyna.Gomolka@zie.pg.gda.pl Abstract INOGATE Programme is one of the instruments designed for the implementation of the energy policy developed by the EU and...
-
Model-based testing for execution algorithms in the simulation of cyber-physical systems
PublicationThe understanding of simulation semantics of a hybrid system is a challenge for computational engineers as it requires expertise in computer science, engineering, numerical methods, and mathematics at once. The testing methods for the execution of a simulation are being researched but not yet applied on the industrial level. Consequently, the semantics of the simulation becomes a critical artifact in the system development process....
-
Michał Michna dr hab. inż.
PeopleMichal Michna received the M.Sc. and Ph.D. degrees in electrical engineering from the Gdansk University of Technology (GUT), Gdansk, Poland, in 1998 and 2005, respectively. Since 2004, he was employed at the Department of Power Electronics and Electrical Machines of the Gdańsk University of Technology (assistant, assistant professor, senior lecturer). In 2010-2015 he was a deputy of head of the Department of Power Electronics and...
-
Comparison of developed gaze point estimation methods
PublicationThis paper presents the software part of an inexpensive hands-free eye tracking system. The system works using infrared illumination like most of the available eye trackers. Two methods allowing estimation the gaze point on computer screen are compared. Research on effectiveness of these methods is discussed and the better one is indicated.
-
The Impact of Lexicon Adaptation on the Emotion Mining From Software Engineering Artifacts
PublicationSentiment analysis and emotion mining techniques are increasingly being used in the field of software engineering. However, the experiments conducted so far have not yielded high accuracy results. Researchers indicate a lack of adaptation of the methods of emotion mining to the specific context of the domain as the main cause of this situation. The article describes research aimed at examining whether the adaptation of the lexicon...
-
Experimental and Computational Analysis of the Ship Propeller in Open Water Conditions for Inclined Flow
PublicationThe paper presents the results of computational analyses simulating the open water tests of ship propeller in inclined flow. The results of computations are compared with the results of corresponding experimental analyses carried out in the towing tank of Ship Design and Research Centre (CTO S.A.). The object of the research was the model propeller identified as CP469. The aim of the study was to validate the results of numerical...
-
Applicability of Emotion Recognition and Induction Methods to Study the Behavior of Programmers
PublicationRecent studies in the field of software engineering have shown that positive emotions can increase and negative emotions decrease the productivity of programmers. In the field of affective computing, many methods and tools to recognize the emotions of computer users were proposed. However, it has not been verified yet which of them can be used to monitor the emotional states of software developers. The paper describes a study carried...
-
Automatic Incident Detection at Intersections with Use of Telematics
PublicationWhile there are many examples of Intelligent Transport System deployments in Poland, more attention should be paid to traffic incident management and detection on dual-carriageways and urban street networks. One of the aims of CIVITAS DYN@MO, a European Union funded project, is to use TRISTAR (an Urban Transport Management System) detection modules to detect incidents at junctions equipped with traffic signals. First part of paper...
-
Creating IT competence centers
PublicationThis article indicates the need for supporting University Competence Centers. They are specialized centers, which aim to support teaching and development of newest software technologies, educating students, PhD Students and scientific workers also raising competetitiveness of the university at higher education market.
-
Marine autonomous surface ship - control system configuration
PublicationThis paper addresses the problem of marine autonomous surface ship (MASS) control. The contribution of the paper is the development of a control system configuration, done assuming fully autonomous MASS operation under distinct operational conditions. The overview of hardware and software selection is included.
-
Verification and Benchmarking in MPA Coprocessor Design Process
PublicationThis paper presents verification and benchmarking required for the development of a coprocessor digital circuit for integer multiple-precision arithmetic (MPA). Its code is developed, with the use of very high speed integrated circuit hardware description language (VHDL), as an intellectual property core. Therefore, it can be used by a final user within their own computing system based on field-programmable gate arrays (FPGAs)....
-
Study of the influence of the presence of Dr fimbriae on the adherence of cells of the recombinant Escherichia coli strain: AAEC191A/pACYCpBAD to polystyrene in a dynamic system
Open Research DataThe attachment of bacteria begins the process of surface colonization, called biofilm development, characterized by a number of physicochemical and molecular interactions. Adherence to inert surfaces typically involves nonspecific interactions, whereas adherence to biological surfaces is associated with specific ligand-receptor interactions. In this...
-
Study of the influence of the presence of Dr fimbriae on the adherence of cells of the recombinant Escherichia coli strain: AAEC191A/pACYCpBAD to glass in a dynamic system
Open Research DataThe attachment of bacteria begins the process of surface colonization, called biofilm development, characterized by a number of physicochemical and molecular interactions. Adherence to inert surfaces typically involves nonspecific interactions, whereas adherence to biological surfaces is associated with specific ligand-receptor interactions. In this...
-
Study of the influence of the presence of Dr fimbriae on the adherence of cells of the recombinant Escherichia coli strain: BL21(DE3)/pCC90 to polystyrene in a dynamic system
Open Research DataThe attachment of bacteria begins the process of surface colonization, called biofilm development, characterized by a number of physicochemical and molecular interactions. Adherence to inert surfaces typically involves nonspecific interactions, whereas adherence to biological surfaces is associated with specific ligand-receptor interactions. In this...
-
Study of the influence of the presence of Dr fimbriae on the adherence of cells of the recombinant Escherichia coli strain: BL21(DE3)/pACYCpBAD to glass in a dynamic system
Open Research DataThe attachment of bacteria begins the process of surface colonization, called biofilm development, characterized by a number of physicochemical and molecular interactions. Adherence to inert surfaces typically involves nonspecific interactions, whereas adherence to biological surfaces is associated with specific ligand-receptor interactions. In this...
-
Study of the influence of the presence of Dr fimbriae on the adherence of cells of the recombinant Escherichia coli strain: BL21(DE3)/pCC90 to glass in a dynamic system
Open Research DataThe attachment of bacteria begins the process of surface colonization, called biofilm development, characterized by a number of physicochemical and molecular interactions. Adherence to inert surfaces typically involves nonspecific interactions, whereas adherence to biological surfaces is associated with specific ligand-receptor interactions. In this...
-
Study of the influence of the presence of Dr fimbriae on the adherence of cells of the recombinant Escherichia coli strain: BL21(DE3)/pACYCpBAD to polystyrene in a dynamic system
Open Research DataThe attachment of bacteria begins the process of surface colonization, called biofilm development, characterized by a number of physicochemical and molecular interactions. Adherence to inert surfaces typically involves nonspecific interactions, whereas adherence to biological surfaces is associated with specific ligand-receptor interactions. In this...
-
Study of the influence of the presence of Dr fimbriae on the adherence of cells of the recombinant Escherichia coli strain: AAEC191A/pCC90 to glass in a dynamic system
Open Research DataThe attachment of bacteria begins the process of surface colonization, called biofilm development, characterized by a number of physicochemical and molecular interactions. Adherence to inert surfaces typically involves nonspecific interactions, whereas adherence to biological surfaces is associated with specific ligand-receptor interactions. In this...
-
Study of the influence of the presence of Dr fimbriae on the adherence of cells of the recombinant Escherichia coli strain: AAEC191A/pCC90 to polystyrene in a dynamic system
Open Research DataThe attachment of bacteria begins the process of surface colonization, called biofilm development, characterized by a number of physicochemical and molecular interactions. Adherence to inert surfaces typically involves nonspecific interactions, whereas adherence to biological surfaces is associated with specific ligand-receptor interactions. In this...
-
Gesture-based computer control system
PublicationIn the paper a system for controlling computer applications by hand gestures is presented. First, selected methods used for gesture recognition are described. The system hardware and a way of controlling a computer by gestures are described. The architecture of the software along with hand gesture recognition methods and algorithms used are presented. Examples of basic and complex gestures recognized by the system are given.
-
Creating a modern educational system based on IT competence centers
PublicationThis article indicates the need to support University Competence Centers. These are specialized cen-ters which aim to support teaching and the development of the latest software technologies, educating students, PhD students and scientific workers and also raising the competitiveness of the university on the higher education market. The article presents the characteristics of: IBM Rational RequisitePro, IBM Rational Requirements...
-
CMMI - an Assurance of Transferability of Knowledge andProjects in a Distributed Enterprise
PublicationCMMI (Capability Maturity Model Integrated)is a reference model fordefining and performing processes in software and systems engineeringorganizations.An organization implementing CMMI,among other things,assures thatacit knowledge is properly externalized into formal knowledge.This externalization gives an organization opportunity to assure that knowledge and development projects are easily transferable across adistributed enterprise...
-
Generalized access control in hierarchical computer network
PublicationThe paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...
-
Implementation of IMS/NGN Transport Stratum Based on the SDN Concept
PublicationThe paper presents the development and verification of software and a testbed aiming to demonstrate the ability of two telecommunication network concepts—Next Generation Network (NGN) and Software-Defined Networking (SDN)—to cooperate. The proposed architecture includes components of the IP Multimedia Subsystem (IMS) in its service stratum and of the SDN (controller and programmable switches) in its transport stratum, providing...
-
Edible black ant Smith (Carebara vidua) as human food – A systematic review
PublicationMeeting food security is one of the major global challenges to ensure sufficient supply of food for current and future generations, considering increasing population growth and climate change issues. Consequently, the consumption of edible insects as an alternative food source has recently gained global attention for combating global food insecurity. The present review aims to provide information on the recent progress in consumption...
-
A comprehensive overview of software product management challenges
PublicationThe principal focus of software product management is to ensure the economic success of the product, which means to prolong the product life as much as possible with modest expenditures to maximizs profits. Software product managers play an important role in the software development organization while being responsible for the strategy, business case, product roadmap, high-level requirements, product deployment (release-management),...
-
Bibliometric approach to tracking the concept of international competitiveness
PublicationThe main aim of paper is to identify the growth pattern in the international competitiveness literature, its core publications and key research domains on the basis of bibliometric data from the years 1945–2015. Citation data is collected from the ISI Web of Science Website, Scopus and Google Scholar, and analysed using HistCite, Pajek and VOSviewer software. Bibliometric indicators, network citation, key-route path methods and...
-
Jan Kozicki dr hab. inż. arch.
PeopleIn year 2002 after obtaining master's degree in construction was employed on Faculty of Civil and Environmental Engineering. In 2004 obtained master's degree in architecture on Faculty of Architecture focusing on a research outpost on Mars. Defended PhD in year 2007 in the field of numerical modeling. In 2013 obtained Licentiate degree in theoretical physics on University of Gdańsk. In year 2014 obtained habilitation in technical...
-
Computer-Aided Greenery Design—Prototype Green Structure Improving Human Health in Urban Ecosystem
PublicationIncreasing population and urbanization, with climate change consequences, such as rising temperatures, influence public health and well-being. The search to improve the quality of life in cities becomes one of the priority objectives. A solution can be found in the role of greenery in an urban environment and its impact on human health. This opens a path toward experimentation on microclimate green structures that can be inserted...
-
A review on carbon storage via mineral carbonation: Bibliometric analysis, research advances, challenge, and perspectives
PublicationMineral carbonation as a way of carbon storage has received a particular attention in the reduction of carbon dioxide (CO2) emission . This work gives a comprehensive description of the research trends and hotspots in the field of mineral carbonation for carbon storage based on bibliometric analysis. A total of 1507 articles were collected from the Web of Science database from 2010 to 2022 and analyzed in details, using a Citepace...
-
A1-S6 Rebielcz Raduńska 2016 - video data
Open Research DataThe video cameras installed on the Expressway S6 and motorway A1: 4 cameras in both directions, location: main road registered vehicles along the entire length of the road section. Cameras were mounted on 5-7 meter high masts. Date 29-31.07.2016
-
Active IR-Thermal Imaging in Medicine
PublicationIn this paper we summarize results of several research projects devoted to development of new diagnostic methods and procedures based on quantitative infrared thermography in medical applications. First, basics of active dynamic thermography are presented. Described are both, instrumentation and software comprising measurement procedures including collection of series of IR-images after external excitation, data treatment with...
-
DS-CDMA receiver in Software Defined Radio technology. Admission to the implementation of a RAKE receiver
PublicationProgrammable radio is one of the latest trends in the construction of multi-standard receivers. The technology, called Software Defined Radio (SDR), is also an ideal test platform that allows to try out different algorithms of signal receiving. This particular feature led to choose this platform to implement a DS-CDMA receiver (Direct Sequence Code Division Multiple Access). The use of SDR allows for a gradual upgrade of data processing...
-
Innovative method of localization airplanes in VCS (VCS-MLAT) distributed system
PublicationThe article presents the concept and the structure of the localization module. The prototype module is the part of the VCS (VCS-MLAT) localization distributed system. The device receives the audio signal transmitted in airplanes band (118 MHz – 136 MHz). Received data with the timestamps are send to the main server. The data from multiple devices estimates the localization of the airplane. The main aim of the project is the analysis...
-
Standards Conformity Framework in comparison with contemporary methods supporting standards application
PublicationAchieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...
-
Recognition of hazardous acoustic events employing parallel processing on a supercomputing cluster . Rozpoznawanie niebezpiecznych zdarzeń dźwiękowych z wykorzystaniem równoległego przetwarzania na klastrze superkomputerowym
PublicationA method for automatic recognition of hazardous acoustic events operating on a super computing cluster is introduced. The methods employed for detecting and classifying the acoustic events are outlined. The evaluation of the recognition engine is provided: both on the training set and using real-life signals. The algorithms yield sufficient performance in practical conditions to be employed in security surveillance systems. The...
-
Advanced Potential Energy Surfaces for Molecular Simulation
PublicationAdvanced potential energy surfaces are defined as theoretical models that explicitly include many-body effects that transcend the standard fixed-charge, pairwise-additive paradigm typically used in molecular simulation. However, several factors relating to their software implementation have precluded their widespread use in condensed-phase simulations: the computational cost of the theoretical models, a paucity of approximate models...
-
Low cost set-up for supercapacitors parameters evaluation
PublicationSupercapacitors are capable to store relatively high amount of energy comparing to its mass. Growing number of these devices applications requires development of new testing methods. Standard methods of evaluation of supercapacitor parameters, as cycling voltammetry, CV, galvanostatic cycling with potential limitation, GCPL, impedance measurements, require equipment of high cost...
-
Device-independent quantum key distribution based on measurement inputs
PublicationWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
ProSIL Software for functional saferty management in life cycle = Aplikacja ProSIL do zarządzania bezpieczeństwem funkcjonalnym w cyklu życia
PublicationIn the paper the ProSIL software to aid the functional safety management is presented. The software consists of three modules to aid: determination of the required SIL level (ProSILen), veryfication of the SIL level (ProSILver). In the aplication the method of the calibrated risk graph to determine the required safety integrity level SIL for defined safety instrumented functions is applied. The methods concerning functional safety...
-
Przegląd metod oceny struktur przestrzennych w warunkach zrównoważonego rozwoju
Publicationthe article "the assessment methods' review of urban structures in the sustainable development context" presents various methods along with tools and ways how to apply them. mainly it is based on methods' descriptions contained in bequest programme (building environmental quality evaluation sustainability through time). the assessment should improve formation of the built environment and practical realization of the idea of sustainable...
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublicationThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
Software-Defined NB-IoT Uplink Framework - The Design, Implementation and Use Cases
PublicationIn the radiocommunication area, we may observe a rapid growth of new technology, such as 5G. Moreover, all the newly introduced radio interfaces, e.g., narrowband Internet of Things (NB-IoT), are strongly dependent on the software. Hence, the radiocommunication software development and optimization, as well as the 3GPP technical specification, should be introduced at the academic level of education. In this paper, a software-defined...
-
Automatyczna weryfikacja klienta bankowego w oparciu o multimodalne technologie biometryczne
PublicationW referacie przedstawiono przegląd rozwiązań wykorzystywanych w bankach do weryfikacji tożsamości klientów. Ponadto zawarto opis metod biometrycznych aktualnie wykorzystywanych w placówkach bankowych wraz z odniesieniem do skuteczności i wygody korzystania z dostępnych rozwiązań. Zaproponowano rozszerzenie zakresu wykorzystania technologii biometrycznych, wskazując kierunek rozwoju systemów bezpieczeństwa dla poprawy dostępu do...
-
Health monitoring services based on off-the-shelf mobile devices
PublicationDevelopment of health monitoring systems usually involves usage of dedicated devices with provided guarantees in terms of their reliability. Those devices raise the cost of the whole system, because of which such platforms are limited only to specific areas and constrained number of users. Usage of off-the- shelf devices could lower the cost and bring those systems to the masses. The paper covers possible uses of common off-the-shelf...
-
Revsable framework for telecontrol protocols. W: Springer Homepage [online] Proceedings. Second International ESPRIT ARES Workshop on Development and Evolution of Software Architectures for Product Families. Las Palmas de Gran Canaria, Spain, February 26-27, 1998. [Dostęp: 20 grudnia**2002]. Ed. F. van der Linden. Dostępny w World Wide Web: http://link.springer.de/link/ /service/series/0558/tocs/t1429.htm [s. 6-13, 5 rys. bibliogr. 6 poz.] Wzorce wielokrotnego wykorzystania oprogramowania protokołów telesterowa- nia.
PublicationZaprezentowano wzorzec COMSOFT wielokrotnego wykorzystania oprogramowania o-pracowany dla protokołów telesterowania. Jego podstawy tworzą: metodologiaobiektowa i wzorce wielokrotnego użycia. Zastosowanie wzorców wspomagają:biblioteka komponentów, wykorzystywanych we wszystkich fazach konstrukcji o-programowania oraz procedury użytkowania i parametryzacji. Opracowane wzorcezostały praktycznie zastosowane do konstrukcji oprogramowania...
-
Koncepcja platformy wymiany informacji o incydentach cyberbezpieczeństwa dla krajowego systemu elektroenergetycznego
PublicationArtykuł opisuje wybrane zagadnienia związane z cyberbezpieczeństwem w sektorze elektroenergetyki. Jednym z elementów zapewniania bezpieczeństwa sieci elektro-energetycznej jest efektywna wymiana informacji o incydentach bezpieczeństwa. W jej ramach wszystkie zaangażowane podmioty systemu elektroenergetycznego, tj.: elektrownie, operatorzy systemów przesyłowych, operatorzy systemów dystrybucyjnych, dostawcy rozwiązań bezpieczeństwa,...
-
Hybrid Finite Element Method Development for Offshore Structures’ Calculation with the Implementation of Industry Standards
PublicationIn the design process of offshore steel structures, it is typical to employ commercial calculation codes in which simulation and evaluation of results are performed on the basis of the available standards (e.g. API, DNV, Lloyds). The modeling and solution rely on finite element methods and cover the simulation of the structure’s properties along with the influence of the marine environment – sea currents, wave and wind loading,...
-
Stradar - Multimedia Dispatcher and Teleinformation System for the Border Guard
PublicationSecurity of national borders requires utilization of multimedia surveillance systems automatically gathering, processing and sharing various data. The paper presents such a system developed for the Maritime Division of the Polish Border Guard within the STRADAR project. The system, apart from providing communication means, gathers data, such as map data from AIS, GPS and radar receivers, videos and photos from camera or audio from...
-
Video traffic data - Interchange Piotrkow Trybunalski East (S8-12), weaving, Poland
Open Research DataThe data includes video traffic data registered with 2 video cameras at weaving area (weaving section type A) of the Piotrkow Trybunalski East interchange within S8 expressway in Poland (interchange of expressway S8 and national road 12), located in the Piotrkow Trybunalski area. The data covers the one day: 21.06.2017. (expressway S8).
-
Graph security testing
PublicationSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Analiza obudowy wykopu dla budynku z kondygnacją podziemną
PublicationW pracy poruszono tematykę analizy obudowy wykopu dla budynku z jedną kondygnacją podziemną, zlokalizowanego w gęstej zabudowie śródmiejskiej. Obliczenia przeprowadzono za pomocą dwóch programów obliczeniowych: GEO5 (moduł: Ściana analiza) i Autodesk Robot Structural Analysis Professional. Całość wyników podsumowano, a wnioski sformułowano w odniesieniu do obecnej sytuacji na rynku budowlanym, charakteryzującej się coraz to trudniejszymi...
-
Techniczne aspekty implementacji nowoczesnej platformy e-learningowej
PublicationZaprezentowano aspekty techniczne implementacji nowoczesnej platformy nauczania zdalnego. Omówiono obszary funkcjonalne takie jak: system zarządzania nauczaniem, serwis informacyjny, dodatkowe oprogramowanie dydaktyczne oraz kolekcja zasobów multimedialnych. Przybliżono zagadnienia związane z bezpieczeństwem takiej platformy. Na końcu przedstawiono parametry techniczne wdrożonej na Politechnice Gdańskiej platformy eNauczanie.
-
Milena Marycz dr inż.
People -
A COMPARISON OF THE WIND SPECTRUM ACCORDING TO DIFFERENT METHODS - AN ORIGINAL PROJECT OF A BUILDING ON A CLIFF IN GDYNIA
PublicationThe article presents numerical simulations of the dynamic wind loads on the structure of a building designed on a cliff in Gdynia. The results obtained from the two methods: Davenport’s and Karman’s are compared. The results allowed a comparison of the two methods, and they provided an answer to the question how a construction, designed in such an unusual condition of a cliff behaves under the influence of the gusting wind. The...
-
Hard lessons learned: delivering usability in IT projects
PublicationEffective project management requires the development of a realistic plan which aims to ensure the success of the project and ultimately deliver a high quality product to customers. However, experience shows that the majority of software vendors managing projects suffer from numerous problems to provide usability in IT solutions and complete a project in a given time with success. In this paper we discuss, analyze and synthesize...
-
Paweł Burdziakowski dr inż.
PeoplePaweł Burdziakowski, PhD, is a professional in low-altitude aerial photogrammetry and remote sensing, marine and aerial navigation. He is also a licensed flight instructor and software developer. His main areas of interest are digital photogrammetry, navigation of unmanned platforms and unmanned systems, including aerial, surface, underwater. He conducts research in algorithms and methods to improve the quality of spatial measurements...
-
Memetic approach for multi-objective overtime planning in software engineering projects
PublicationSoftware projects often suffer from unplanned overtime due to uncertainty and risk incurred due to changing requirement and attempt to meet up with time-to-market of the software product. This causes stress to developers and can result in poor quality. This paper presents a memetic algorithmic approach for solving the overtime-planning problem in software development projects. The problem is formulated as a three-objective optimization...
-
Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies
PublicationThe aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...
-
Computational modeling of molecularly imprinted polymers as a green approach to the development of novel analytical sorbents
PublicationThe development of novel molecularly imprinted polymers (MIP) sorbents for specific chemical compounds require a lot of tedious and time-consuming laboratory work. Significant quantities of solvents and reagents are consumed in the course of the verification of appropriate configurations of polymerization reagents. Implementation of molecular modeling in the MIP sorbent development process appears to provide a solution to this...
-
Determination of aminoglycoside antibiotics: current status and future trends
PublicationThe use of aminoglycoside antibiotics is prevalent in medicine and agriculture. Their overuse increases their mobility in the environment, resulting in a need for reliable methods for their determination in a variety of matrices. However, the properties of aminoglycosides, in particular their high polarity, make the development of such methods a non-trivial task, inciting researchers to tackle this complex issue from different...
-
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublicationThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation
Conferences -
Psychological inspirations in empirical software engineering.
PublicationSoftware development is people-intensive activity. Incorporation of human factors in empirical studies of software engineering can bring many benefits for both researchers and practitioners. Psychological inspirations can facilitate this task. In this paper, such incorporation is presented in the contexts of the objectives and problems in empirical studies, applicability of the results in the business context of software enterprise,...
-
Anna Zielińska dr
PeopleIn 2016, she started her work at the Faculty of Management and Economics of the Gdańsk University of Technology. Since 2018, a member of the board of the International Project Management Association Young Crew Polska. Author of numerous scientific publications in the field of crisis management, project and health program management, and improvement of business entities. Scientific and research interests include program and project...
-
Application development for Android, iOS and BlackBerry mobile platforms
PublicationMobile devices, along with dedicated operating systems, have become a substantial and rising trend in software development. Computer industry has significantly changed in order to fulfil the needs of this new segment of the market. Authors have participated in projects, which involved programming on Android, iOS and BlackBerry operating systems. In this paper the most popular mobile platforms (and multiplatform Unity3D environment)...
-
Hybrid Technique for the EM Scattering Analysis with the Use of Ring Domain Decomposition
PublicationA hybrid technique combining finite-element and mode-matching methods for the analysis of scattering problems in open space is presented here. The main idea is based on impedance matrix descriptions of the boundary surrounding the discrete computational domain and combine it with external field described analytically. The discrete analysis, which is the most time- and memory-consuming, is limited here only to the close proximity...
-
Reducing the Environmental Impact of the Public Water Transportation Systems by Parametric Design and Optimization of Vessels’ Hulls. Study of the Gdańsk’s Electric Passenger Ferry (2015-2016).
PublicationThe paper presents the potential and risks of utilizing Rhinoceros and Grasshopper software for parametric design and multi-varietal optimization of the hull of a small sustainable ferry. The sustainability criteria, parametric design flowchart and optimizing methods are described. As the result, the advantages and disadvantages of this approach obtained in the research-by-design process conducted by an intercollegiate team at...
-
Multi-Stage Video Analysis Framework
PublicationThe chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....
-
Supporting Compliance with Security Standards by Trust Case Templates
PublicationTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....