Filtry
wszystkich: 31372
wybranych: 8618
-
Katalog
- Publikacje 8618 wyników po odfiltrowaniu
- Czasopisma 459 wyników po odfiltrowaniu
- Konferencje 212 wyników po odfiltrowaniu
- Wydawnictwa 2 wyników po odfiltrowaniu
- Osoby 323 wyników po odfiltrowaniu
- Wynalazki 22 wyników po odfiltrowaniu
- Projekty 60 wyników po odfiltrowaniu
- Laboratoria 3 wyników po odfiltrowaniu
- Zespoły Badawcze 2 wyników po odfiltrowaniu
- Aparatura Badawcza 8 wyników po odfiltrowaniu
- Kursy Online 254 wyników po odfiltrowaniu
- Wydarzenia 15 wyników po odfiltrowaniu
- Dane Badawcze 21394 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: SAFETY INFORMATION SYSTEM
-
Power System Stabilizer as a Part of a Generator MPC Adaptive Predictive Control System
PublikacjaIn this paper, a model predictive controller based on a generator model for prediction purposes is proposed to replace a standard generator controller with a stabilizer of a power system. Such a local controller utilizes an input-output model of the system taking into consideration not only a generator voltage Ug but also an additional, auxiliary signal (e.g., α, Pg, or ωg). This additional piece of information allows for taking...
-
Information- and Knowledge-Based Approaches to Improve Performance in Organizations : special issue editorial
PublikacjaOmówiono podejścia oparte na bazie informacji i bazie wiedzy w zagadnieniach związanych z usprawnianiem funkcjonowania organizacji. Szczególny nacisk położono na mozliwości usprawnień w aspekcie ekonomicznym.
-
Speed monitoring and management in national road safety program
PublikacjaW referacie przedstawiono system długoterminowych badań prędkości pojazdów umozliwiający śledzenie ich zmian. Zmiany te są analizowane w powiązaniu z wdrażanymi środkami nadzoru oraz edukacyjnymi oddziaływaniami na uczestników ruchu, a także ze zmianami infrastruktury drogowej. Podano też ogólne zalecenia do programu GAMBIT 2005, wynikające z dotychczasowych badań prędkości.
-
INFORMATION SOCIETY DEVELOPMENT TRENDS, FROM DATA THROUGH KNOWLEDGE TO WISDOM
PublikacjaThe paper investigates both the causes and effects of the rapid increase in the data volume(BigData)andtheirimpactonhumancognition.TheroleoftheInternetindistributing and exchanging of such data, and their impact on the growth of the Information Society are emphasized. As a result, Wisdom Science – a new kind of research – emerges which has the potential to facilitate more advanced solutions in the digital world. In consequence,...
-
Extraction of information from born-digital PDF documents for reproducible research
PublikacjaBorn-digital PDF electronic documents might reasonably be expected to preserve useful data units of their source originals that suffice to produce executable papers for reproducible research. Unfortunately, developers of authoring tools may adopt arbitrary PDF generation strategies, producing a plethora of internal data representations. Such common information units as text paragraphs, tables, function graphs and flow diagrams,...
-
Time-series analysis of road safety trends aggregated at national level in Europe for 2000-2010
PublikacjaThe reader will find in this study road safety modelling theory and time-series analysis techniques, applications to long period data of injury accidents and casualities, aggregared at national level
-
Electrical safety in low-voltage DC microgrids with B-type residual current devices
PublikacjaResidual current devices (RCDs) are most popular devices used in low-voltage installations for protection against electric shock and fire. In cases of high risk of electric shock the application of RCDs is mandatory. Currently, the spread of local direct current (DC) microgrids is widely considered. This creates new challenges for protective systems, in particular those based on RCDs. The main purpose of the research is to test...
-
Two-spinors, oscillator algebras, and qubits: aspects of manifestly covariant approach to relativistic quantum information
PublikacjaThe first part of the paper reviews applications of 2-spinor methods to relativistic qubits (analogies between tetrads in Minkowski space and 2-qubit states, qubits defined by means of null directions and their role for elimination of the Peres-Scudo-Terno phenomenon, advantages and disadvantages of relativistic polarization operators defined by the Pauli-Lubanski vector, manifestly covariant approach to unitary representations...
-
Diagnostyka eksploatacyjna okrętowych silników spalinowych - tłokowych i turbinowych
PublikacjaW monografii przedstawiono wybrane zagadnienia diagnostyki technicznej silników spalinowych dużej mocy, zarówno tłokowych, jak i turbinowych, ukierunkowane na eksploatację okrętowych (i nie tylko) systemów energetycznych, w których występują tego typu silniki. W początkowej części opracowania zaproponowano koncepcję systemowego ujęcia diagnostyki eksploatacyjnej silników okrętowych w aspekcie obowiązujących standardów światowych...
-
Data, Information, Knowledge, Wisdom Pyramid Concept Revisited in the Context of Deep Learning
PublikacjaIn this paper, the data, information, knowledge, and wisdom (DIKW) pyramid is revisited in the context of deep learning applied to machine learningbased audio signal processing. A discussion on the DIKW schema is carried out, resulting in a proposal that may supplement the original concept. Parallels between DIWK pertaining to audio processing are presented based on examples of the case studies performed by the author and her collaborators....
-
The Impact of Information and Communication Technology on the Rise of Urban Social Movements in Poland
PublikacjaThe chapter examines the relationship between the use of Information and Communications Technology (ITC) and the emergence of social movements focused on urban agenda in Poland. The aim is to investigate how and to what extent a growing body of smaller activist groups use opportunities provided by the ITC to achieve their political objectives. The research results indicate that Web-based media have helped to raise the profile...
-
The Impact of Information and Communications Technology on the Rise of Urban Social Movements in Poland
PublikacjaThe chapter examines the relationship between the use of Information and Communications Technology (ITC) and the emergence of social movements focused on urban agenda in Poland. The aim is to investigate how and to what extent a growing body of smaller activist groups use opportunities provided by the ITC to achieve their political objectives. The research results indicate that Web-based media have helped to raise the profile of...
-
Risk assessment methodologies for pedestrian crossings without traffic lights – Warsaw case study – pedestrian safety assessment
PublikacjaBased on data from 2015 [1], it was found that 31% of all fatalities in road accidents in Poland were pedestrians. In places accessible to pedestrian traffic 74.2% of total accidents involving pedestrians were recorded. Approximately 53.9% of accidents involving pedestrians take place in the proximity of pedestrian crossings. In the context of improving the safety of vulnerable road users, an assessment of the condition of infrastructure...
-
Monitoring system of the road embankment
PublikacjaThe paper presents the monitoring system of the embankment supported on concrete columns and overlaid by a load transfer platform (LTP) with the embedded steel grid. This field investigation was to study the complex inter-action between the columns, the LTP layer, and steel reinforcement via full-scale in situ measurements during erection of the embankment. The study was focused on the behaviour of steel reinforcement and the behaviour...
-
Information presentation compatibility in a simple digital control panel design: eye-tracking study
Publikacja -
WEB-CAM AS A MEANS OF INFORMATION ABOUT EMOTIONAL ATTEMPT OF STUDENTS IN THE PROCESS OF DISTANT LEARNING
PublikacjaNew methods in education become more popular nowadays. Distant learning is a good example when teacher and student meet in virtual environment. Because interaction in this virtual world might be complicated it seems necessary to assure as much methods of conforming that student is still engaged in the process of learning as it is possible. We would like to present assumption that by means of web-cam we will be able to track facial...
-
WSN for intelligent street lighting system
PublikacjaIn this article authors propose to apply WSN to intelligent street lighting system. As a result of such a combination one obtains a system designed to increase functionality of light installations for a wide range of applications and introduce a platform for new additional services, which meets current and future user needs. The system is composed of WSN nodes integrated with light sources based on high power LED diodes, which...
-
Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies
PublikacjaThe aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...
-
Efficiency of the Use of LTE System Radio Resources in Highway Transport Enironment
PublikacjaThe paper describes the problem of analysis of throughput-coverage characteristics of the LTE system. Simulation results of the efficiency of the use of LTE radio resources are presented. Simulation studies on the basis of original model of the LTE network simulator were carried out. In addition, the evaluation of throughput for a single connection, and available capacity were evaluated in the context of the use of the same...
-
The methods of secure data transmission in the KNX system
PublikacjaThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Information and Communication Technology Management for Global Competitiveness and Economic Growth in Emerging Economies
Publikacja -
Knowledge-based functional safety and security management in hazardous industrial plants with emphasis on human factors
PublikacjaExisting and emerging new hazards have significant potential to impact destructively operation of technical systems, hazardous plants, and systems / networks of critical infrastructure. The programmable control and protection systems play nowadays an important role in reducing and controlling risk in the process of hazardous plant operation. It is outlined how to deal with security related hazards concerning such systems to be...
-
MONITORING SYSTEM OF THE ROAD EMBANKMENT
PublikacjaThe paper presents the analysis of the monitoring system of the embankment supported on concrete columns and overlaid by a load transfer platform with the embedded steel grid. This field investigation was to study the complex interaction among the columns, the load transfer platform layer, and steel grid via in situ measurements during erection and live loading of the embankment. The study was focused on the behaviour of steel...
-
Emotional distress, burnout and sense of safety during the COVID-19 pandemic in teachers after the reopening of schools
PublikacjaThe COVID-19 pandemic is having a significant impact on people's psychological well-being and mental health. This study aimed to identify factors linked to emotional distress, burnout and sense of safety in teachers related to the reopening of Polish schools after lockdown, remote work, and the holiday period between March and August 2020. A total of 1,286 teachers from different educational institutions participated in the...
-
Uniform Model Interface for Assurance Case Integration with System Models
PublikacjaAssurance cases are developed and maintained in parallel with corresponding system models and therefore need to reference each other. Managing the correctness and consistency of interrelated safety argument and system models is essential for system dependability and is a nontrivial task. The model interface presented in this paper enables a uniform process of establishing and managing assurance case references to various types...
-
Building Information Modeling in Small and Middle Sized Buildings – Case Study
PublikacjaBuilding Information Modeling (BIM) is a technology designed to improve and integrate all engineering aspects in the construction design process. Tools that incorporate the idea of BIM are becoming more advanced and also more popular. Available software solutions have already reached an assumable high level of development, but still are not as widespread and used on nearly as many construction projects as could be expected. Therefore...
-
The System of the Supervision and the Visualization of Multimedia Data for BG
PublikacjaMonitoring of country maritime border is an important task of the Border Guard. This task can be facilitated with the use of the technology enabling gathering information from distributed sources and its supervision and visualization. The system presented in the paper is an extension and enhancement of the previously developed distributed system map data exchange system. The added functionalities allow supplementation of map data...
-
Voltage control in a power system with renewable sources of energy
PublikacjaIntensive development of distributed generation in power systems, caused by the European Union energy policy, gives possibility for improving safety in power delivery as well as optimizing the costs of the systems functioning. In this context, distributed generation can be used for voltage control in power systems – it can be performed by the control of reactive power of each source of energy or a group of energy sources. This...
-
Current challenges and methodological issues of functional safety and security management in hazardous technical systems
PublikacjaCelem artykułu jest zidentyfikowanie problemów oceny ryzyka w kontekście stosowania systemów elektrycznych / elektronicznych / programowalnych elektronicznych (E/E/PE) z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego i zabezpieczeń (ochrony). Zadaniem rozwiązań bezpieczeństwa funkcjonalnego jest efektywne redukowanie ryzyka wychodząc z poziomu nieakceptowanego. Ryzyko jest definiowane jako kombinacja prawdopodobieństwa wystąpienia...
-
Human factor and functional Safety analysis = Czynniki ludzkie i analiza bezpieczeństwa funkcjonalnego
Publikacja -
Risk analysis and functional safety management = Analiza ryzyka i zarządzanie bezpieczeństwem funkcjonalnym
Publikacja -
Supporting compliance with safety standards by trust case templates
PublikacjaStandard Compliance (SC) Framework presented in this paper encompasses methods and tools which provide support for application of standards. The framework is based on trust case methodology. A trust case is a data structure which represents a justification that an object (a system, an infrastructure, an organization) exhibits certain properties. It contains an argument and related evidence which support claimed properties. A trust...
-
Deduplication of Tracked Objects Position Data at Single Observation Point of a Vessel Monitoring System
PublikacjaVessel Monitoring System (VMS) play a major role in safety navigation. In most cases they are based on two data sources, namely Automatic Identification System (AIS) and Automatic Radar Plotting Aids (ARPA). Integration of data obtained from these sources is an important problem, which needs to be solved in order to ensure the correct performance of a given VMS. In this paper basic functions which should be implemented in a tracked...
-
Calculation of Induced Sheath Voltages in Power Cables – Single Circuit System versus Double Circuit System
PublikacjaThis paper presents comparison of values of induced sheath voltages in power cable metallic sheaths when one or two cables per phase are used. Calculation of voltages is performed for various phase sequences of the power cables. Three types of the sheaths bonding and earthing are considered. Shock hazard and voltage stress of non-metallic outer sheath of cables are evaluated. The proposed, optimal configuration of the power cable...
-
Verification of agent system for it project management support
PublikacjaThis article is a continuation of article series telling about research about possibility of using agent system to information technology evaluation. Following article presents full conception of exploiting agent system and shows how it can support some managers works, especially in taking correct management method and information tool for project management. In this article the agent system that based on knowledge and can process...
-
The formal safety assessment and influence of human factor in application to chosen ship's type
PublikacjaTragedia jednego ze statków typu ro-ro pokazała podatność tego typu statków na utratę stateczności, przewrócenie się, a w ostateczności zatonięcie. Wszystkie ro-rowce charakteryzują się małym zanurzeniem, a wynurzona część kadłuba podatna jest na działanie wiatru. Jeżeli dodatkowo w takich warunkach dochodzi element nieprawidłowego rozmieszczenia pojazdów i ich słabego zamocowania to groźba przesunięcia ładunku staje się realna....
-
Unconditional privacy over channels which cannot convey quantum information
PublikacjaQuantum cryptography enables one to verify that the state of the quantum system has not been tampered with and thus one can obtain privacy regardless of the power of the eavesdropper. All previous protocols relied on the ability to faithfully send quantum states or equivalently to share pure entanglement. Here we show this need not be the case-one can obtain verifiable privacy even through some channels which cannot be used to...
-
Parallel immune system for graph coloring
PublikacjaThis paper presents a parallel artificial immune system designed forgraph coloring. The algorithm is based on the clonal selection principle. Each processor operates on its own pool of antibodies and amigration mechanism is used to allow processors to exchange information. Experimental results show that migration improves the performance of the algorithm. The experiments were performed using a high performance cluster on a set...
-
Analysis and comparision of safety of children and adult passanger in car based on crash tests results
PublikacjaThis paper presents analysis and comparision of safety of children and adult passanger in car based on crash tests results. The car crash test with four dummies, including two car seats allowed a direct comparison of the security under the same conditions of children and passengers directly to the car seat. Analysis of acceleration and video from the test allows to understand the phenomena during the collision, the air bags influence,...
-
RF Indoor Positioning System Supported by Wireless Computer Vision Sensors
PublikacjaIn this paper the possibility of increase the accuracy of RF fingerprinting indoor tracking system by the use of additional information from simple vision system is examined. As the distances in signal space differs from ones in real environment the ambiguity in decision process of fingerprinting algorithm can occur when set of closest distances between tag and map points in signal space corresponds to big distances differences...
-
Implementation of spatial information for monitoring and analysis of the area around the port using laser scanning techniques
PublikacjaNowadays, maritime infrastructure is heavily exploited, which requires monitoring. The article presents the implementation of spatial information which are point clouds for monitoring and analysis of the area around the port (buildings and wharves). For this study, point clouds coming from terrestrial (TLS) and airborne laser scanning (ALS), each of them having different accuracy, were used. An important part of the analysis was...
-
Operating system security by integrity checking and recovery using write-protected storage
PublikacjaThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
AgileSafe – a method of introducing agile practices into safety-critical software development processes
PublikacjaThis article introduces AgileSafe, a new method of incorporating agile practices into critical software development while still maintaining compliance with the software assurance requirements imposed by the application domain. We present the description of the method covering the process of its application and the input and output artefacts.
-
The structure of the data flow in integrated urban traffic management systems – the case of TRISTAR system
PublikacjaThe purpose of the article is to offer some insight into the data flow architecture in the Tri-City’s integrated traffic management system called TRISTAR. To that end selected elements of TRISTAR are identified and described as well as the structure for collecting and exchanging data within different sub-systems. Finally, the article highlights how the TRISTAR system can be extended by adding new elements and modules.
-
Words context analysis for improvement of information retrieval
PublikacjaIn the article we present an approach to improvement of retrieval informationfrom large text collections using words context vectors. The vectorshave been created analyzing English Wikipedia with Hyperspace Analogue to Language model of words similarity. For test phrases we evaluate retrieval with direct user queries as well as retrieval with context vectors of these queries. The results indicate that the proposed method can not...
-
Enterprise Information Management in Cultural Heritage Domain
Publikacja -
Short-Period Information in GPS Time Series
Publikacja -
Termodynamics of quantum information systems - Hamiltonian description.
PublikacjaPrzy użyciu podejścia hamiltonowskiego wyprowadzono wzór na pracę dla układów kwantowych zanurzonych w ciepłym otoczeniu.
-
Application of Soft Computing to Automatic Music Information.
PublikacjaArtykuł przedstawia problemy związane z automatyczną klasyfikacją instrumentów muzycznych. Przedstawiono w nim przegląd metod, które moga służyć temu celowi oraz przykłady eksperymentów.
-
Information management. Modelling, analysis and simulation persepctive.
PublikacjaW książce poruszono zagadnienia związane z zarządzaniem informacją w społączeństwie informacyjnym. Szczególny nacisk położono na metody wspomagania przepływów informacji w systemach złożonych.