Wyniki wyszukiwania dla: safety-critical software - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: safety-critical software

Wyniki wyszukiwania dla: safety-critical software

  • Software development methodologies and practices in start-ups

    Publikacja

    - IET Software - Rok 2019

    Software start-ups are aiming to develop cutting-edge software products under highly uncertain conditions, overcoming fast-growing markets under multiple influences. This study aims to identify and analyse the existing scientific literature regarding software development methodologies and practices in software start-ups published between January 2006 and December 2017 using the systematic mapping study. The results identified 37...

    Pełny tekst do pobrania w portalu

  • A comprehensive overview of software product management challenges

    The principal focus of software product management is to ensure the economic success of the product, which means to prolong the product life as much as possible with modest expenditures to maximizs profits. Software product managers play an important role in the software development organization while being responsible for the strategy, business case, product roadmap, high-level requirements, product deployment (release-management),...

    Pełny tekst do pobrania w portalu

  • ROAD SAFETY WITHIN THE "INTEGRATED SYSTEM OF TRANSPORT SAFETY"

    The concept of the “Integrated System of Transport Safety” in Poland is a novel solution, built upon the best practices available from only a handful of countries in the world. In the last few decades, the extent of applying integrated transport safety systems to improve transport safety systems has varied; nevertheless, studying the experience of the safest countries in the world we can say that enormous progress has been achieved...

  • Safety & Fire Technology

    Czasopisma

    ISSN: 2657-8808 , eISSN: 2658-0810

  • Ontology-Aided Software Engineering

    Publikacja

    - Rok 2012

    This thesis is located between the fields of research on Artificial Intelligence (AI), Knowledge Representation and Reasoning (KRR), Computer-Aided Software Engineering (CASE) and Model Driven Engineering (MDE). The modern offspring of KRR - Description Logic (DL) [Baad03] is considered here as a formalization of the software engineering Methods & Tools. The bridge between the world of formal specification (governed by the mathematics)...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Safety integrity level verification for safety-related functions with security aspects

    The article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • An empirical study on the impact of AspectJ on software evolvability

    Since its inception in 1996, aspect-oriented programming (AOP) has been believed to reduce the effort required to maintain software systems by replacing cross-cutting code with aspects. However, little convincing empirical evidence exists to support this claim, while several studies suggest that AOP brings new obstacles to maintainability. This paper discusses two experiments conducted to evaluate the impact of AspectJ (the most...

    Pełny tekst do pobrania w portalu

  • Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Improving agility and discipline of software development with the Scrum and CMMI

    Publikacja

    This study presents a method of combining the Scrum methodology with the CMMI maturity model to improve bothagility and discipline of software development. First, the authors propose the CMMI-Scrum reference model, which maps Scrumpractices onto 123 practices of CMMI staged levels 2 and 3. For 60% of CMMI practices, which are insufficiently covered byScrum they add new practices that improve discipline while maintaining agility....

    Pełny tekst do pobrania w portalu

  • Security aspects in functional safety analysis

    A security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Determining required safety integrity level

    One of the most important stage of technical system functional safety analysis is defining the safety-related functions as well as determining safety integrity level (SIL) for each defined function. A properly carried out hazard identyfication process is the necessary condition for correct definition of the safety-related functions. Determining the safety integrity level (SIL) is based on risk assessment taking into account risk...

  • Systems Software Design 1

    Kursy Online
    • A. Harasimiuk
    • P. Spaleniak

    Systems Software Design  

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publikacja

    - Rok 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Health and safety training for students

    Kursy Online
    • I. Ziemba-Filip
    • M. Orepuk-Templin
    • M. Sokołowski

    Health and safety training is aimed at all newcoming students of Gdańsk University of Technology.

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publikacja

    - Rok 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Jacek Namieśnik prof. dr hab. inż.

    Osoby

    Urodził się 10 grudnia 1949 r. w Mogilnie, zmarł 14 kwietnia 2019 r. w Gdańsku – polski chemik, profesor nauk chemicznych, specjalizujący się w chemii analitycznej i środowiskowej. Rektor Politechniki Gdańskiej w latach 2016–2019. Studia wyższe ukończył w 1972 r. na Wydziale Chemicznym Politechniki Gdańskiej, uzyskując tytuł magistra inżyniera chemika. W 1972 r. rozpoczął pracę na Politechnice Gdańskiej, gdzie w 1978 r. obronił...

  • Preliminary Results of a System-theoretic Assessment of Maritime Autonomous Surface Ships' Safety

    While a system‐theoretic approach to the safety analysis of innovative socio‐technical systems gains a growing acceptance among academia, safety issues of Maritime Autonomous Surface Ships (MASS) remain largely unexplored. Therefore, we applied a System‐Theoretic Process Analysis to develop and analyze a preliminary model of the unmanned shipping system in order to elaborate safety recommendations for...

    Pełny tekst do pobrania w portalu

  • Integrity level verification for safety-related functions

    This article describes methods for safety integrity level (SIL) verification of safety-related functions with regard to probabilistic criteria given international standards IEC 61508 and IEC 61511. These functions are to be realized using the electrical, electronic and programmable electronic (E/E/PE) systems or safety instrumented systems (SIS). Some methods are proposed for quantitative probabilistic modelling taking into account...

  • Integrated functional safety and cyber security analysis

    Publikacja

    - IFAC-PapersOnLine - Rok 2018

    The chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...

  • ECOTOXICOLOGY AND ENVIRONMENTAL SAFETY

    Czasopisma

    ISSN: 0147-6513 , eISSN: 1090-2414

  • Framework for RIDM within functional safety management process

    The functional safety management in life cycle is a complex process starting with identifying hazards and defining safety-related functions (SRFs) with risk assessment oriented at determining the safety integrity level. Another element of such life cycle is a verification of required SIL for designed safety-related system which implements safety function. Due to complexity of the problem, to overcome difficulties in safety-related...

  • Procedure based functional safety and information security management of industrial automation and control systems on example of the oil port installations

    The approach addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety and security requirements specified in standards IEC 61508, IEC 61511 and IEC 62443. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of...

    Pełny tekst do pobrania w portalu

  • Safety PL - a support tool for Road Safety Impact Assessment

    Published on 19 November 2008, the European Union's Directive 2008/96/EC is one of the most important EU documents setting out a road safety orientation, in particular, road infrastructure safety management. It identifies four main areas of activity: road safety impact assessment, road safety audit, ranking of high accident concentration sections and network safety ranking and road infrastructure safety inspection. The Directive...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Functional safety and managing competence

    Publikacja

    - Rok 2007

    Są nowe wyzwania związane z badaniami, edukacją i szkoleniem w obszarach bezpieczeństwa i ochrony systemów i sieci krytycznych. W rozdziale podkreśla się, że kompetencje specjalistów powinny być kształtowane w zintegrowanych procesach edukacji i szkolenia. Dlatego uzasadnione jest, aby opracować w Europie standardy i programy kształcenia na bazie odpowiednich prac badawczych i najlepszych doświadczeń z praktyki przemysłowej w celu...

  • Rigorous numerics for critical orbits in the quadratic family

    Publikacja

    - CHAOS - Rok 2020

    We develop algorithms and techniques to compute rigorous bounds for finite pieces of orbits of the critical points, for intervals of parameter values, in the quadratic family of one-dimensional maps fa(x)=a−x2. We illustrate the effectiveness of our approach by constructing a dynamically defined partition P of the parameter interval Ω=[1.4,2] into almost 4 million subintervals, for each of which we compute to high precision the...

    Pełny tekst do pobrania w portalu

  • JAKOŚĆ I JEJ ZASTOSOWANIA 2023 | QUALITY AND ITS APPLICATIONS 2023 TOWARDS SUSTAINABLE FUTURE

    Wydarzenia

    23-11-2023 09:30 - 24-11-2023 15:30

      Politechnika Gdańska i Uniwersytet Gdański  oraz Związek Uczelni Fahrenheita zapraszają do wzięcia udziału w  III Międzynarodowej Konferencji Naukowej    Gdańsk University of Technology and the University of Gdańsk and the Fahrenheit University Association invite you to take part in the 3rd International...

  • Kazimierz Kosmowski prof. dr hab. inż.

    Osoby

    Kazimierz Tadeusz Kosmowski (ur. 12 maja 1947 r. w Nakle nad Notecią) – specjalizacja z zakresu niezawodności i bezpieczeństwa systemów technicznych. Prowadzi badania dotyczące metod identyfikacji zagrożeń oraz analizy i oceny ryzyka ukierunkowanych na obiekty przemysłowe i systemy infrastruktury krytycznej w cyklu życia. Aktualne zainteresowania naukowe dotyczą współdziałania systemów OT i IT oraz bezpieczeństwa funkcjonalnego...

  • Road Safety Observatories within the Structure of Integrated Transport Safety Systems

    Publikacja

    Accurate knowledge about the causes, circumstances and place of transport accidents is the prerequisite to take the correct action to improve transport safety. Developing appropriate organizational structures, forms and methods of management and implementation of safety measures in the sectoral approach condition the success. Therefore the Safety Information System is one of the integral areas of the Integrated Transport Safety...

  • Input files for the Floodsar software

    Dane Badawcze
    open access

    Input files for the Floodsar softwareAuthor: Tomasz Berezowski, Gdansk University of Technology, tomberez@eti.pg.edu.pl

  • Modelling selected road safety measures at the regional level in Europe

    Regions are Europe’s basic levels of management. The literature was reviewed to identify regional safety analyses and some of the factors that are important for road safety in the regions. Next, data were collected atthe regional NUTS 2 level in Europe for the years 1999-2008. An analysis of the data helped identify f actors which have the strongest bearing on fatalities and other safety measures. This paper presents the initial...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Jakub Miler dr inż.

    Kariera akademicka: 2000: mgr inż. Wydział ETI, Politechnika Gdańska, praca pt. "Computer system for supporting risk management in a software engineering project", promotor prof. Janusz Górski 2005: dr inż. Wydział ETI, Politechnika Gdańska, rozprawa pt. "A Method of Software Project Risk Identification and Analysis", obroniona z wyróżnieniem, dziedzina nauki techniczne, dyscyplina informatyka, promotor prof. Janusz Górski Zainteresowania...

  • TRWAŁOŚĆ PROJEKTU ERASMUS+ SP4CE - STUDIUM PRZYPADKU

    Projekt ERASMUS+ Partnerstwo Strategiczne na Rzecz Kreatywności i Przedsiębiorczości (ang. Strategic Partnership for Creativity and Entrepreneurship - SP4CE) dotyczył wdrażania i upowszechniania innowacyjnych rozwiązań wzmacniających współpracę europejską w dziedzinie kształcenia i szkolenia zawodowego. Działania projektowe były związane z promowaniem innowacyjnych praktyk w edukacji oraz szkoleniach poprzez wspieranie spersonalizowanych...

    Pełny tekst do pobrania w portalu

  • Towards systemic functional safety and security management in hazardous plants

    The aim of this article is to identify and discuss some issues related to functional safety and security management in hazardous industrial plants. The safety functions are to be realised using the electric / electronic / programmable electronic systems (E/E/PESs) or the safety instrumented systems (SISs) that are designed and operated respectively according to IEC 61508 and IEC 61511 requirements in life cycle. Although the role...

  • Shipping Safety Management on Polish Inland Waterways

    Publikacja

    - Archives of Transport System Telematics - Rok 2018

    Over the past years, the role of inland waterway transport has increased compared to other modes of transport. The increasing intensity of the inland vessel traffic significantly affects the safety of navigation. The article analyses the main causes of accidents and incidents that occurred on the Odra Waterway and Lower Vistula. The authors have classified those accidents and suggested possible directions for the development of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • 8. Critical Management Studies

    Kursy Online
    • A. Karalus

  • Cognition and Decisional Experience to Support Safety Management in Workplaces

    Publikacja

    Hazards are present in all workplaces and can result in serious injuries, short and long-term illnesses, or death. In this context, management of safety is essential to ensure the occupational health of workers. Aiming to assist the safety management process, especially in industrial environments, a Cognitive Vision Platform for Hazard Control (CVP-HC) is proposed. This platform is a Cyber Physical system, capable of identifying...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Problems in designing and operating the functional safety solutions of higher integriity levels

    The aim of this article is to identify and discuss some problems that have been encountered in designing and operating the functional safety solutions of higher safety integrity levels (SIL 3 and SIL 4) in the light of analyses outlined in a new version of the international standard IEC 61508:2010. Examples of such solutions are the electric / electronic / programmable electronic systems (E/E/PESs) and the safety instrumented systems...

  • Review of ship safety domains: Models and applications

    Ship safety domain is a term which is widely used in research on collision avoidance and traffic engineering among others. Classic ship domains have been compared in multiple reports. However, up till now there has been no work summing up contemporary research in this field. The paper offers a systematic and critical review of the newer ship domain models and related research. It discusses multiple differences in approach to ship...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • SAFETY SCIENCE

    Czasopisma

    ISSN: 0925-7535 , eISSN: 1879-1042

  • Cognitive engineering and functional safety technology for reducing risks in hazardous plants

    Cognitive engineering is considered nowadays as interesting multidisciplinary domain that focuses on improving the relations between humans and the systems that are supervised and operated. The industrial automation and control systems (IACS) in hazardous plants are increasingly computerized and perform various safety functions. These are designed and implemented according to the functional safety concept. The objective is to maintain...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Rafał Leszczyna dr hab. inż.

    Dr hab. inż. Rafał Leszczyna jest profesorem uczelni na Wydziale Zarządzania i Ekonomii Politechniki Gdańskiej. W lipcu 2020 r., na podstawie osiągnięcia naukowego w obszarze zarządzania cyberbezpieczeństwem infrastruktur krytycznych w sektorze elektroenergetycznym, uzyskał stopień doktora habilitowanego w dziedzinie nauk inżynieryjno-technicznych, dyscyplina informatyka techniczna i telekomunikacja. W latach 2004–2008 pracował...

  • Preliminary safety assessment of Polish interchanges

    Publikacja

    - Archives of Transport - Rok 2021

    Interchanges are a key and the most complex element of a road infrastructure. The safety and functionality of interchanges determine the traffic conditions and safety of the entire road network. This applies particularly to motorways and express-ways, for which they are the only way to access and exchange traffic. A big problem in Poland is the lack of comprehensive tools for designers at individual stages of the design process....

    Pełny tekst do pobrania w portalu

  • Software Factory project for enhancement of student experiential learning

    Publikacja

    - Rok 2019

    Providing opportunities for students to work on real-world software development projects for real customers is critical to prepare students for the IT industry. Such projects help students to understand what they will face in the industry and experience real customer interaction and challenges in collaborative work. To provide this opportunity in an academic environment and enhance the learning and multicultural teamwork experience,...

  • The control software of the portable raman spectrometer

    The paper contains a description of the control software of a portable Raman spectrometer which was built in the Department of Optoelectronics and Electronic Systems Faculty of Electronics, Telecommunications and Informatics Gdansk University of Technology. The software has modular structure, which includes the laser control module and the spectrum acquisition module (laser power selection, working mode and data acquisition time)...

    Pełny tekst do pobrania w portalu

  • Elective Project I _ Shelter_learning by doing

    Kursy Online
    • G. Rembarz
    • B. Bou Kalfouni

    Elective Project I _ Shelter - learning by doing “Your creativity and skills play an important role in making an impact in responding to humanitarian challenges and global crises” The world seems to be reeling from one crisis to another. Recently we experienced climate crises, global pandemic (Covid-19), economic uncertainty, wars, floods, wildfire, and earthquakes. Proceeding from the challenges facing humanity at the global...

  • Modern Methods of Software Development

    Publikacja

    - TASK Quarterly - Rok 2015

    Software development methods consist of such activities like analysis, planning, development, testing, deployment, maintenance and retirement. All of them can be divided into two main categories - traditional and agile. The objective of this paper is to review some of the most popular traditional, agile and open source development methods. Special attention was paid to the common stages of all methods - testing and maintenance.

    Pełny tekst do pobrania w portalu

  • Resilience and Security in Software Defined Networking

    Publikacja
    • C. Mas Machuca
    • P. Vizarreta
    • R. Durner
    • J. Rak

    - Rok 2018

    This paper gives an overview of the most important issues on resilience and security in Software Defined Networking

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Strategies for Dealing With Software Product Management Challenges

    Publikacja

    Software product management, which involves multiple processes and responsibilities and links to many activities within the organisation, increases the success rate of IT projects. However, the adoption of product management activities and the implementation of the software product manager role itself varies between companies. This research explores the topic of software product managers’ strategies for dealing with challenges...

    Pełny tekst do pobrania w portalu

  • Enhancing Availability for Critical Services

    Publikacja
    • T. Gomes
    • L. Martins
    • R. Girão-Silva
    • D. Tipper
    • A. Pašić
    • B. Vass
    • L. Garrote
    • U. J. Nunes
    • M. Zachariasen
    • J. Rak

    - Rok 2020

    Traditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Approach to security assessment of critical infrastructures' information systems

    Publikacja

    - IET Information Security - Rok 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Pełny tekst do pobrania w serwisie zewnętrznym