Search results for: NUMERY ALARMOWE - Bridge of Knowledge

Search

Search results for: NUMERY ALARMOWE

Filters

total: 4103
filtered: 3085

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: NUMERY ALARMOWE

  • Numerical simulation of natural convection of Glycol-Al2O3 nanofluids from a horizontal cylinder

    Publication

    - HEAT TRANSFER ENGINEERING - Year 2021

    This paper deals with natural convection around a circular cylinder with constant heat flux in a cavity using computational fluid dynamics. As fluids ethylene glycol and a mixture of ethylene glycol with Al2O3 nanoparticles (mass concentrations of nanoparticles: 0.1% and 1%) are chosen. Rayleigh number ranges from 3104 to 3105. The nanofluids are modeled with single-phase approach. For the investigated range of nanoparticle concentration, the...

    Full text available to download

  • 100 lat Laboratorium Maszynowego na Politechnice w Gdańsku.

    Publication

    Wydanie albumowe poświęcone 100-letniej historii Laboratorium Maszynowego na Politechnice w Gdańsku. W opisie omówiono funkcje, jakie pełniło laboratorium w okresie istnienia. Początkowo był to zakład energetyczny zaopatrujący uczelnię w ciepło, energię elektryczną i wodę oraz laboratorium dydaktyczne dla studentów. W ostatnim okresie pełni ono głównie rolę laboratorium dydaktycznego oraz naukowo-badawczego. Część ilustracyjna...

  • Bezprzewodowy system telemedyczny monitorujący parametry życiowe pacjenta

    Wszechobecny monitoring pacjenta jest jednym ze sposobów zniwelowania negatywnych skutków obecnego modelu opieki zdrowotnej i może być dużym krokiem naprzód w rozwoju medycyny. W niniejszym referacie przedstawiono projekt i wykonanie bezprzewodowego systemu telemedycznego, monitorującego parametry życiowe człowieka, takie jak aktywność elektryczna serca, przyspieszenie ciała oraz stan przycisku alarmowego. Składa się on z urządzenia...

    Full text to download in external service

  • Schemat zastępczy i charakterystyki elektrodynamiczne mikrofalowego aplikatora plazmowego typu rezonator wnękowy

    Publication

    Mikrofalowe aplikatory plazmowe wykorzystuje się między innymi do obróbki gazów, w tym do produkcji wodoru poprzez reforming węglowodorów. Omówiony aplikator plazmowy pracuje przy częstotliwości 2,45 GHz. Wyładowanie mikrofalowe powstaje w tym aplikatorze pod ciśnieniem atmosferycznym. Głównym elementem konstrukcyjnym aplikatora jest falowód o obniżonej wysokości, w którym zamontowano dwie elektrody w postaci prętów. Dość dobra...

    Full text to download in external service

  • Modelowanie bezpieczeństwa maszyn i instalacji krytycznych

    Publication

    W rozdziale zostały omówione metody modelowania bezpieczeństwa instalacji krytycznych. W złożonym obiekcie podwyższonego ryzyka wyróżniono warstwy procesu technologicznego, systemów monitorowania i sterowania, alarmów krytycznych i interwencji operatorów, warstwy systemów automatyki zabezpieczeniowej SIS, zabezpieczeń inżynieryjnych, oraz warstwy przeciwdziałań wewnętrznych i zewnętrznych. Zwrócono uwagę na rolę jaką pełnią systemy...

  • Praktyczne aspekty nauczania Inżynierii Systemów Alarmowych

    Głównym celem stawianym systemom alarmowym jest ochrona życia, zdrowia oraz mienia. Systemy te zwiększają poczucie bezpieczeństwa, umożliwiają nadzór nad chronionymi obiektami oraz sygnalizują obecność zagrożenia - stąd też wynika ich coraz większa popularność zarówno wśród klientów biznesowych jak i indywidualnych. Rosnące zainteresowanie tematyką systemów alarmowych spowodowało konieczność wprowadzenia do procesu dydaktycznego...

  • Optymalizacja systemu zarządzania uszkodzeniami węzłów komutacyjnych.

    Publication

    - Year 2004

    W referacie przedstawiono wyniki analizy funkcjonalnej ystemu węzłów komutacyjnych systemu 5ESS. Na podstawie tej analizy dokonano oceny funkcjonowania systemu zarządzania i wskazano obszary jegooptymalizacji. Zaproponowano ssposób wykorzystania narzędzia Action Request System do tworzenia bazy danych raportów alarmowych. Zaproponowano strukturę bazy danych raportów alarmowych i formularza zgłaszania problemu do tworzenia w tej...

  • Analiza niezawodności człowieka-operatora w kontekście bezpieczeństwa funkcjonalnego.

    Artykuł przedstawia niektóre kwestie analizy warstwowego systemu zabezpieczeń instalacji podwyższonego ryzyka z uwzględnieniem analizy niezawodności człowieka HRA (human reliability analysis). Działania człowieka operatora w odniesieniu do systemu operatorskiego HSI (human system interface), w tym systemu alarmowego i potencjalnych błędów człowieka mogą mieć istotny wpływ na wyniki analiz probabilistycznych w procesie weryfikacji...

    Full text available to download

  • Certified domination

    Publication

    Imagine that we are given a set D of officials and a set W of civils. For each civil x ∈ W, there must be an official v ∈ D that can serve x, and whenever any such v is serving x, there must also be another civil w ∈ W that observes v, that is, w may act as a kind of witness, to avoid any abuse from v. What is the minimum number of officials to guarantee such a service, assuming a given social network? In this paper, we introduce...

    Full text available to download

  • Effect of Temperature and Nanoparticle Concentration on Free Convective Heat Transfer of Nanofluids

    Publication

    - ENERGIES - Year 2021

    A theoretical analysis of the influence of temperature and nanoparticle concentration on free convection heat transfer from a horizontal tube immersed in an unbounded nanofluid was presented. The Nusselt (Nu) number and heat transfer coefficient were parameters of the intensity of the convective heat transfer. For free convection, the Nu number was a function of the Rayleigh (Ra) number and Prandtl (Pr) number. The Rayleigh (Ra)...

    Full text available to download

  • Investigation of Performance and Configuration of a Selected IoT System—Middleware Deployment Benchmarking and Recommendations

    Publication

    Nowadays Internet of Things is gaining more and more focus all over the world. As a concept it gives many opportunities for applications for society and it is expected that the number of software services deployed in this area will still grow fast. Especially important in this context are properties connected with deployment such as portability, scalability and balance between software requirements and hardware capabilities. In...

    Full text available to download

  • Układ zastępczy i charakterystyki elektrodynamiczne mikrofalowego aplikatora plazmowego typu rezonator wnękowy (915 MHz)

    Publication

    Mikrofalowe aplikatory plazmowe wykorzystuje się m.in. do obróbki gazów, w tym do produkcji wodoru poprzez reforming węglowodorów. W pracy przedstawiono elektryczny schemat zastępczy o stałych skupionych mikrofalowego aplikatora typu rezonator wnękowy, wykonanego z odcinka falowodu prostokątnego WR 975. Omówiony aplikator plazmowy pracuje przy częstotliwości 915 MHz. Wyładowanie mikrofalowe powstaje w tym aplikatorze pod ciśnieniem...

    Full text available to download

  • Warstwowy system zabezpieczeń w przemysłowych instalacjach podwyższonego ryzyka

    Publication

    - Year 2015

    Rozdział poświęcono aktualnym zagadnieniom analizy i projektowania warstw zabezpieczeń w kontekście oceny ryzyka i zarządzania bezpieczeństwem funkcjonalnym w cyklu życia z wyróżnieniem trzech warstw: (1) podstawowego systemu sterowania BPCS (basic process control system), (2) człowieka-operatora korzystającego opcjonalnie z systemu alarmowego AS (alarm system) oraz (3) przyrządowego systemu bezpieczeństwa SIS (safety instrumented...

  • The methodology of design of satellite working mechanism of positive displacement machine

    Publication

    In this paper is described a methodology of design of satellite mechanism consisting of two noncircular gears (externally toothed rotor and internally toothed curvature) and circular gears (satellites). In the presented methodology is assumed that the rotor pitch line is known, and the curvature pitch line is necessary to designate. The presented methodology applies to mechanisms for which the number of the curvature humps is at...

    Full text available to download

  • On simplification of residue scaling process in pipelined Radix-4 MQRNS FFT processor

    Residue scaling is needed in pipelined FFT radix-4 processors based on the Modified Quadratic Residue Number System (MQRNS) at the output of each butterfly. Such processor uses serial connection of radix-4 butterflies. Each butterfly comprises n subunits, one for each modulus of the RNS base and generates four complex residue numbers. In order to prevent arithmetic overflow intermediate results after each butterfly have to be...

  • Product Graph Invariants with Applications in the Theory of Information

    Publication

    - Year 2012

    There are a large number of graph invariants. In the paper, we consider some of them, e.g. the independence and chromatic numbers. It is well know that we cannot efficiently calculate these numbers for arbitrary graphs. In the paper we present relations between these invariants and concepts from the theory of information. Concepts such as source coding and transmission over a noisy channel with zero probability of error are modeled...

  • Liczby Ramseya on-line dla różnych klas grafów

    Publication

    - Year 2023

    Rozpatrujemy grę rozgrywaną na nieskończonej liczbie wierzchołków, w której każda runda polega na wskazaniu krawędzi przez jednego gracza - Budowniczego oraz pokolorowaniu jej przez drugiego gracza - Malarkę na jeden z dwóch kolorów, czerwony lub niebieski. Celem Budowniczego jest zmuszenie Malarki do stworzenia monochromatycznej kopii wcześniej ustalonego grafu H w jak najmniejszej możliwej liczbie ruchów. Zakładamy, że gracze...

    Full text available to download

  • 2-bondage in graphs

    A 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The 2-bondage number of G, denoted by b_2(G), is the minimum cardinality among all sets of edges E' subseteq E such that gamma_2(G-E') > gamma_2(G). If for every E' subseteq E we have...

    Full text to download in external service

  • Parity vertex colouring of graphs

    Publication

    - Discussiones Mathematicae Graph Theory - Year 2011

    A parity path in a vertex colouring of a graph is a path along which each colour is used an even number of times. Let Xp(G) be the least number of colours in a proper vertex colouring of G having no parity path. It is proved that for any graph G we have the following tight bounds X(G) <= Xp(G) <=|V(G)|− a(G)+1, where X(G) and a(G) are the chromatic number and the independence number of G, respectively. The bounds are improved for...

    Full text available to download

  • Free Convection Heat Transfer from Horizontal Cylinders

    Publication

    - ENERGIES - Year 2021

    The results of experimental investigation of free convection heat transfer in a rectangular container are presented. The ability of the commonly accepted correlation equations to reproduce present experimental data was tested as well. It was assumed that the examined geometry fulfils the requirement of no-interaction between heated cylinder and bounded surfaces. In order to check this assumption recently published correlation equations...

    Full text available to download

  • Testing the Weibull distribution in road traffic losses analysis

    Publication

    The paper presents an attempt of applying the Weibull distribution for the purpose of analysing road traffic losses (fatalities). The question it asks is whether reliability engineering methods can be applied for the analyses. If this is the case, what should be the interpretation of the numbers and terms? It was assumed that the losses generated by a malfunctioning road transport system are fatalities. Risk exposure to these losses...

  • Lamb wave propagation in a single lap adhesive joint

    Publication

    The aim of the paper is the analysis of Lamb wave propagation in adhesive joints. The research was performed on a single lap adhesive joint of two steel plates. Two types of joints, namely an intact and with defect were considered. In experimental investigations the condition assessment of the joint was performed with the use of antisymmetric Lamb waves excited by a plate piezo actuators and measured by a laser vibrometer. Numeri-cal...

    Full text to download in external service

  • Numerical Study of Turbulent Flow and Heat Transfer of Nanofluids in Pipes

    Publication

    - HEAT TRANSFER ENGINEERING - Year 2018

    In this work, Nusselt number and friction factor are calculated numerically for turbulent pipe flow (Reynolds number between 6000 and 12000) with constant heat flux boundary condition using nanofluids. The nanofluid is modelled with the single-phase approach and the simulation results are compared with experimental data. Ethylene glycol and water, 60:40 EG/W mass ratio, as base fluid and SiO2 nanoparticles are used as nanofluid...

    Full text available to download

  • Curlicues generated by circle homeomorphisms

    Publication

    We investigate the curves in the complex plane which are generated by sequences of real numbers being the lifts of the points on the orbit of an orientation preserving circle homeomorphism. Geometrical properties of these curves such as boundedness, superficiality, local discrete radius of curvature are linked with dynamical properties of the circle homeomorphism which generates them: rotation number and its continued fraction...

    Full text available to download

  • Stany nadzwyczajne i „niezwyczajne”

    Konstytucja Rzeczypospolitej Polskiej jako ustawa zasadnicza definiuje trzy stany nadzwyczajne, które mogą być wprowadzone w sytuacjach szczególnych zagrożeń, jeżeli zwykłe środki konstytucyjne są niewystarczające. Dodatkowo w systemie prawnym Rzeczypospolitej Polskiej funkcjonują stan zagrożenia epidemicznego i stan epidemii, a także stany gotowości obronnej państwa i stopnie alarmowe wprowadzane w związku z zagrożeniami o...

    Full text to download in external service

  • Minimum order of graphs with given coloring parameters

    Publication

    - DISCRETE MATHEMATICS - Year 2015

    A complete k-coloring of a graph G=(V,E) is an assignment F: V -> {1,...,k} of colors to the vertices such that no two vertices of the same color are adjacent, and the union of any two color classes contains at least one edge. Three extensively investigated graph invariants related to complete colorings are the minimum and maximum number of colors in a complete coloring (chromatic number χ(G) and achromatic number ψ(G), respectively),...

    Full text available to download

  • Asymmetric Renyi Problem and > PATRICIA Tries

    Publication

    - Year 2016

    In 1960 R´enyi asked for the number of random queries necessary to recover a hidden bijective labeling of n distinct objects. In each query one selects a random subset of labels and asks, what is the set of objects that have theselabels? Weconsider here anasymmetric version of the problem in which in every query an object is chosenwith probability p > 1/2 and we ignore “inconclusive” queries. We study the number of queries needed...

    Full text to download in external service

  • System Zarządzania Energią w zakładzie przemysłowym

    W ramach prac badawczo-rozwojowych z firmą Nowa Energia Sp. z o.o. powstał System Zarządzania Energią, w postaci systemu informatycznego i sprzętowego koncentratora danych tzw. IED (ang. Inteligent Electronics Devices). Produkt ten został wdrożony w przemyśle do Zarządzania Energią w zakładach przemysłowych. System jest zainstalowany w stacji energetycznej 15kV/0,4kV, zaś główny serwer z oprogramowaniem znajduje się na Politechnice...

    Full text available to download

  • THREE-DIMENSIONAL numerical investigation of MHD nanofluid convective heat transfer inside a CUBIC porous container with corrugated bottom wall

    Publication

    - Year 2022

    Simultaneous use of porous media and nanofluid as a heat transfer improvement method has recently captivated a great deal of attention. The heat transfer and entropy production of the Cu-water nanofluid inside a cubic container with a heated bottom wavy wall and an elliptic inner cylinder were numerically analyzed in this study. The container is partitioned into two sections: the left side is filled with permeable media and...

    Full text to download in external service

  • Teaching High Performance Computing Using BeesyCluster and Relevant Usage Statistics

    Publication

    - Year 2014

    The paper presents motivations and experiences from using the BeesyCluster middleware for teaching high performance computing at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. Features of BeesyCluster well suited for conducting courses are discussed including: easy-to-use WWW interface for application development and running hiding queuing systems, publishing applications as services...

    Full text to download in external service

  • Issues related to noise and protection against noise against the background of hazards present in the working environment

    Publication

    - Year 2023

    Noise is one of the physical factors that poses the greatest threat in the working environment. In order to reduce the noise exposure, noise reduction at the source should be considered. Next, the engineering and administrative controls are being developed. Finally, hearing protectors are used. Issues related to protection against noise are part of the topics in the field of occupational...

  • Asking Data in a Controlled Way with Ask Data Anything NQL

    Publication
    • A. Seganti
    • P. Kapłański
    • J. Campo
    • K. Cieśliński
    • J. Koziołkiewicz
    • P. Zarzycki

    - Year 2016

    While to collect data, it is necessary to store it, to understand its structure it is necessary to do data-mining. Business Intelligence (BI) enables us to make intelligent, data-driven decisions by the mean of a set of tools that allows the creation of a potentially unlimited number of machine-generated, data-driven reports, which are calculated by a machine as a response to queries specified by humans. Natural Query Languages...

    Full text to download in external service

  • Double bondage in graphs

    Publication

    A vertex of a graph is said to dominate itself and all of its neighbors. A double dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of G is dominated by at least two vertices of D. The double domination number of a graph G, denoted by gamma_d(G), is the minimum cardinality of a double dominating set of G. The double bondage number of G, denoted by b_d(G), is the minimum cardinality among all sets...

    Full text to download in external service

  • The influence of microjet array area ratio on heat transfer in the compact heat exchanger

    The paper describes the comprehensive study on the effect of microjet array geometrical parameters on the heat transfer enhancement in the modular heat exchanger. The conducted experimental study provides an experimental database on single phase submerged microjet heat transfer. The Wilson plot method was applied to determine the heat transfer coefficients in the laminar and transition flow regimes of a liquid-to-liquid heat exchanger....

    Full text available to download

  • Increasing accuracy of frequency estimation by decimation. W: [CD-ROM]EUSIPCO 2002. XI European Signal Processing Conference. Toulouse, France, September 3-6, 2002. [B.m.]: New Medias**2002 [4 s. 3 rys. bibliogr. 6 poz.] Page numbers in the proceedings: Volume 3, s. 135-138. Zwiększanie dokładności estymacji częstotliwości poprzez decymację.

    Publication

    - Year 2002

    Artykuł rozważa problem estymacji częstotliwości zaszumionego, sinusoidalne-go sygnału zespolonego. Częstotliwość wyznaczana jest w oparciu o autoregre-syjny model sygnału. W pracy wykazano, że wprowadzenie decymacji sygnału po-zwala na redukcję rzędu modelu autoregresyjnego, a tym samym powoduje znacz=ne zmniejszenie złożoności obliczeniowej metody.

  • An Efficient Noisy Binary Search in Graphs via Median Approximation

    Publication

    - LECTURE NOTES IN COMPUTER SCIENCE - Year 2021

    Consider a generalization of the classical binary search problem in linearly sorted data to the graph-theoretic setting. The goal is to design an adaptive query algorithm, called a strategy, that identifies an initially unknown target vertex in a graph by asking queries. Each query is conducted as follows: the strategy selects a vertex q and receives a reply v: if q is the target, then =, and if q is not the target, then v is a...

    Full text to download in external service

  • Benchmarking Parallel Chess Search in Stockfish on Intel Xeon and Intel Xeon Phi Processors

    Publication

    - Year 2018

    The paper presents results from benchmarking the parallel multithreaded Stockfish chess engine on selected multi- and many-core processors. It is shown how the strength of play for an n-thread version compares to 1-thread version on both Intel Xeon and latest Intel Xeon Phi x200 processors. Results such as the number of wins, losses and draws are presented and how these change for growing numbers of threads. Impact of using particular...

    Full text to download in external service

  • Three-dimensional numerical investigation of hybrid nanofluids in chain microchannel under electrohydrodynamic actuator

    Energy efficiency enhancement methods have received considerable attentionwithin the industry and scientific community, owing to the rising concern ofglobal energy sustainability. The present article attempts to scrutinize the effectsof electrohydrodynamics and nanofluids on the rate of heat transfer and fluidflow in the 3-D chain microchannels. Improved heat exchangers (e.g., chainmicrochannel) would have a key role in increasing...

    Full text available to download

  • Non-isolating 2-bondage in graphs

    A 2-dominating set of a graph G=(V,E) is a set D of vertices of G such that every vertex of V(G)D has at least two neighbors in D. The 2-domination number of a graph G, denoted by gamma_2(G), is the minimum cardinality of a 2-dominating set of G. The non-isolating 2-bondage number of G, denoted by b_2'(G), is the minimum cardinality among all sets of edges E' subseteq E such that delta(G-E') >= 1 and gamma_2(G-E') > gamma_2(G)....

    Full text available to download

  • Non-isolating bondage in graphs

    A dominating set of a graph $G = (V,E)$ is a set $D$ of vertices of $G$ such that every vertex of $V(G) \setminus D$ has a neighbor in $D$. The domination number of a graph $G$, denoted by $\gamma(G)$, is the minimum cardinality of a dominating set of $G$. The non-isolating bondage number of $G$, denoted by $b'(G)$, is the minimum cardinality among all sets of edges $E' \subseteq E$ such that $\delta(G-E') \ge 1$ and $\gamma(G-E')...

    Full text available to download

  • Open source solution LMS for supporting e-learning/blended learning engineers

    Publication

    - Year 2005

    W artykule zaprezentowano darmowe systemy zarządzania kształceniem na odległość wspomagające e-learningowe/mieszane nauczanie inżynierów. Pierwszy system TeleCAD został opracowany w ramach projektu Leonardo da Vinci (1998-2001). System TeleCAD był propozycją w projekcie V Ramowy CURE (2003-2006). W roku 2003 dzięki projektowi Leonardo da Vinci EMDEL (2001-2005) Centrum Edukacji Niestacjonarnej Politechniki Gdańskiej wybrało system...

  • Euro 2012 economic impact on host cities in Poland

    Publication

    - Year 2013

    The UEFA European Championship (Euro) is among the world's most important sporting events staged nowadays. Apart from tremendous excitement among football fans, such a major event has a number of other implications, above all of economic nature. This study, as one of the few concerned with the Polish circumstances, is intended to determine what significance should be attributed to stage the Euro 2012 in Polish host cities. aware...

  • Free randomness amplification using bipartite chain correlations

    Publication
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • M. Pawłowski
    • R. Ramanathan

    - PHYSICAL REVIEW A - Year 2014

    A direct analysis of the task of randomness amplification from Santha-Vazirani sources using the violation of the chained Bell inequality is performed in terms of the convex combination of no-signaling boxes required to simulate quantum violation of the inequality. This analysis is used to find the exact threshold value of the initial randomness parameter from which perfect randomness can be extracted in the asymptotic limit of...

    Full text available to download

  • DEEP CONVOLUTIONAL NEURAL NETWORKS AS A DECISION SUPPORT TOOL IN MEDICAL PROBLEMS – MALIGNANT MELANOMA CASE STUDY

    The paper presents utilization of one of the latest tool from the group of Machine learning techniques, namely Deep Convolutional Neural Networks (CNN), in process of decision making in selected medical problems. After the survey of the most successful applications of CNN in solving medical problems, the paper focuses on the very difficult problem of automatic analyses of the skin lesions. The authors propose the CNN structure...

    Full text to download in external service

  • Experimental investigations on heat transfer enhancement in shell coil heat exchanger with VARIABLE Baffles GEOMETRY

    The paper presents the possibility of using passive intensification of heat transfer in the form of baffles to increase the energy efficiency of the shell and coil heat exchanger. The experiment was carried out by using a modular coil heat exchanger in the form of an electric heater. Water was used as a working fluid with constant thermal-flow parameters at the inlet of the module. It should be noted that experiments were made...

    Full text to download in external service

  • Performance assessment of OpenMP constructs and benchmarks using modern compilers and multi-core CPUs

    Publication

    - Year 2023

    Considering ongoing developments of both modern CPUs, especially in the context of increasing numbers of cores, cache memory and architectures as well as compilers there is a constant need for benchmarking representative and frequently run workloads. The key metric is speed-up as the computational power of modern CPUs stems mainly from using multiple cores. In this paper, we show and discuss results from running codes such as:...

    Full text to download in external service

  • On configuration of residue scaling process in pipelined radix-4 MQRNS FFT processor

    Residue scaling is needed in pipelined FFT radix-4 processors based on the Modified Quadratic Residue Number System (MQRNS) at the output of each butterfly. Such processor uses serial connection of radix-4 butterflies. Each butterfly comprises n subunits, one for each modulus of the RNS base and outputs four complex residue numbers. In order to prevent the arithmetic overflow in the succesive stage, every number has to be scaled,...

    Full text available to download

  • Terminal charging scheduling of battery electric buses based on vehicle routing problem

    Publication

    - Year 2023

    Electric buses are considered to be a viable solution for reducing emission in dense urban areas. However, the greater charging time is a huge challenge for operators. In this paper, charging scheduling method was elaborated based on vehicle routing problem using mixed-integer linear programming model. The main novelty of the paper is the combination of modelling aspect, namely flexible turn sequence and heterogeneous shared charging...

    Full text to download in external service

  • Benchmarking Scalability and Security Configuration Impact for A Distributed Sensors-Server IOT Use Case

    Publication

    - Year 2021

    Internet of Things has been getting more and more attention and found numerous practical applications. Especially important in this context are performance, security and ability to cope with failures. Especially crucial is to find good trade-off between these. In this article we present results of practical tests with multiple clients representing sensors sending notifications to an IoT middleware – DeviceHive. We investigate performance...

    Full text available to download

  • Przeszłość-teraźniejszość-przyszłość Inżynierii Morskiej i Geotechniki

    Publication

    Historia założenia czasopisma i jego zakres tematyczny, skład kolegium redakcyjnego, numery specjalne czasopisma (konferencyjne i jubileuszowe) i perspektywy rozwoju czasopisma.

    Full text available to download