Filtry
wszystkich: 159
Wyniki wyszukiwania dla: TRUST LEVELS
-
Clustering Context Items into User Trust Levels
PublikacjaAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
User Trust Levels and Their Impact on System Security and Usability
PublikacjaA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Belief in the importance of socially responsible behaviors – the significance of trust and personal experiences with COVID-19
PublikacjaA vast number of studies have shown that trust is related to socially desirable traits and behaviors. In the present research we have investigated the relationship between generalized trust and beliefs about the importance of socially responsible behaviors (SRB) during the pandemic – namely, following the sanitary regime and getting vaccinated. Basing on the previous findings we assumed that trustful people...
-
Expedited Trust-Region-Based Design Closure of Antennas by Variable-Resolution EM Simulations
PublikacjaThe observed growth in the complexity of modern antenna topologies fostered a widespread employment of numerical optimization methods as the primary tools for final adjustment of the system parameters. This is mainly caused by insufficiency of traditional design closure approaches, largely based on parameter sweeping. Reliable evaluation of complex antenna structures requires full-wave electromagnetic (EM) analysis. Yet, EM-driven...
-
The importance of trust and altruistic social orientation for COVID-19 distress
PublikacjaBackground: The COVID-19 pandemic, the biggest global health crisis in decades, has been a difficult experience for nations all over the world. In the present study we wanted to assess to what extent a positive attitude towards others, expressed in altruistic social orientation and a high level of trust, would be linked to lower levels of COVID-19 distress in infected and non-infected individuals. Participants and procedure:...
-
Otwarte innowacje w inicjatywach klastrowych
PublikacjaSpecyfika funkcjonowania inicjatyw klastrowych czyni z nich idealne podłoże do wcielania w życie idei open innovation – ułatwiają bowiem nawiązywanie kontaktów z innymi podmiotami, stawiają na otwartość swoich członków i budowę relacji opartych na zaufaniu, stanowią platformę wymiany zasobów (w tym przede wszystkim informacji i wiedzy) oraz wspólnego kreowania rozwiązań innowacyjnych. W artykule podjęto rozważania teoretyczne dotyczące...
-
Rapid design closure of linear microstrip antenna array apertures using response features
PublikacjaA simple yet reliable approach to a rapid design closure of linear antenna array apertures at the electromagnetic (EM)-simulation level is proposed. Our methodology exploits an underlying array factor (AF) model suitably corrected by means of characteristic points (angles and levels) of the radiation pattern of the EM model of the antenna array aperture. This conveniently allows for controlling both the side lobe levels...
-
Rapid design optimization of antennas using variable-fidelity EM models and adjoint sensitivities
PublikacjaPurpose – Development of techniques for expedited design optimization of complex and numerically expensive electromagnetic (EM) simulation models of antenna structures validated both numerically and experimentally. The paper aims to discuss these issues. Design/methodology/approach – The optimization task is performed using a technique that combines gradient search with adjoint sensitivities, trust region framework, as well as...
-
Accelerated Gradient-Based Optimization of Antenna Structures Using Multi-Fidelity Simulations and Convergence-Based Model Management Scheme
PublikacjaThe importance of numerical optimization has been steadily growing in the design of contemporary antenna structures. The primary reason is the increasing complexity of antenna topologies, [ a typically large number of adjustable parameters that have to be simultaneously tuned. Design closure is no longer possible using traditional methods, including theoretical models or supervised parameter sweeping. To ensure reliability, optimization...
-
Optimization-Based Robustness Enhancement of Compact Microwave Component Designs with Response Feature Regression Surrogates
PublikacjaThe ability to evaluate the effects of fabrication tolerances and other types of uncertainties is a critical part of microwave design process. Improving the immunity of the device to parameter deviations is equally important, especially when the performance specifications are stringent and can barely be met even assuming a perfect manufacturing process. In the case of modern miniaturized microwave components of complex topologies,...
-
Bodybuilders and high-level meat consumers’ behavior towards rabbit, beef, chicken, turkey, and lamb meat: A comparative review
PublikacjaIn bodybuilders’ diets, protein plays a crucial role in supporting muscle growth and repairing damaged muscle tissue. These individuals meet their protein needs by combining dietary sources with supplements. Animal-based proteins are often preferred over plant-based proteins because they are believed to better support muscle protein synthesis. This review explores the meat consumption patterns of bodybuilders and high-level meat...
-
Trust triggers and barriers in intercultural teams
PublikacjaIntercultural teams are more and more popular nowadays — they constitute a serious challenge in terms of effective cooperation and trust building, however. The article presents the potential problems that can affect intercultural cooperation and stresses the power of trust in cultural diversity conditions. The ten-factor model of intercultural team trust is presented. The main aim was to answer the questions: what are the differences...
-
The effects of relational and psychological capital on work engagement: the mediation of learning goal orientation
PublikacjaPurpose – This paper proposes a research model in which learning goal orientation (LGO) mediates the impacts of relational capital and psychological capital (PsyCap) on work engagement. Design/methodology/approach – Data obtained from 475 managers and employees in the manufacturing and service industries in Poland were utilized to assess the linkages given above. Common method variance was controlled by the unmeasured latent method...
-
Trust case - a case for trustworthiness of IT infrastructures
PublikacjaArtykuł prezentuje podejście do budowy argumentów (trust case) uzasadniających zaufanie do systemów i infrastruktur IT. Wprowadza system pojęć związanych ze strukturą i treścią trust case, identyfikuje udziałowców trust case oraz dyskutuje możliwość wsparcia narzędziowego procesu zarządzanie trust case. Omawia równiez krótko dotychczasowe zastosowania tego podejścia.
-
Trust in Electronic Word-of-Mouth (eWOM): the concept and the most important determinants
PublikacjaeWOM and trust in it is now the most important factor in determining buyers' purchasing behavior. Familiarity with the determinants of trust establishes the formation of appropriate marketing activities. However, the growing number of new forms of eWOM and its increasingly complex and multidimensional nature have created a lot of confusion. The article aims to organize the concepts related to trust in eWOM, to indicate the most...
-
Trust Dynamics Analysis of CTR Scheme Subversion under Virtual Anonymity and Trust-Unaware Partner Selection
PublikacjaWe propose a framework to study Markovian trust value dynamics in a centralized Computational Trust and Reputation (CTR) scheme under trust-unaware partner selection using a mean-value approximation. Analytically founded answers are sought to questions like: Can dishonest agents subvert the CTR scheme (i.e., acquire higher trust values than honest agents)? Is indirect reciprocity incentivized? Is there a qualitative impact of a...
-
Dis/Trust and data-driven technologies
PublikacjaThis concept paper contextualises, defines, and systematises the concepts of trust and distrust (and their interrelations), providing a critical review of existing literature so as to identify gaps, disjuncture, and continuities in the use of these concepts across the social sciences and in the context of the consolidation of the digital society. Firstly, the development of the concept of trust is explored by looking at its use...
-
Implementing decisional trust: a first approach for smart reliable systems
PublikacjaIn this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...
-
Representing and appraising Toulmin model arguments in trust cases
PublikacjaThe paper presents a Toulmin-based argument model used in trust cases, which allows to argue various properties of IT systems. Argument patterns encountered in trust cases are discussed together with some real-life examples. A method of argument appraisal is introduced together with the corresponding aggregation mechanism. Practical applications of trust cases in industrial and research projects are outlined.
-
Supporting compliance with safety standards by trust case templates
PublikacjaStandard Compliance (SC) Framework presented in this paper encompasses methods and tools which provide support for application of standards. The framework is based on trust case methodology. A trust case is a data structure which represents a justification that an object (a system, an infrastructure, an organization) exhibits certain properties. It contains an argument and related evidence which support claimed properties. A trust...
-
How can we justify trust in software based systems?
PublikacjaArtykuł wprowadza pojęcie ''trust case'' i wyjasnia jego znaczenie w kontekście systemów informatycznych. Przedstawia również doświadczenia zdobyte w trakcie budowy trust case dla złożonego systemu IT przeznaczonego do wspomagania procesów dystrybucji i stosowania leków. Przedstawia również szereg otwartych problemów badawczych dotyczacych budowy i zarządzanie dowodami zaufania (trust case).
-
Supporting Compliance with Security Standards by Trust Case Templates
PublikacjaTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
An approach to evaluation of arguments in trust cases
PublikacjaTrustworthiness of IT systems can be justified using the concept of a trust case. A trust case is an argument structure which encompasses justification and evidence supporting claimed properties of a system. It represents explicitly an expert's way of assessing that a certain object has certain properties. Trust cases can be developed collaboratively on the basis of evidence and justification of varying quality. They can be complex...
-
An Approach to Trust Case Development
PublikacjaIn the paper we present an approach to the architectural trust case development for DRIVE, the IT infrastructure supporting the processes of drugs distribution and application. The objectives of DRIVE included safer and cheaper drugs distribution and application. A trust case represents an argument supporting the trustworthiness of the system. It is decomposed into claims that postulate some trust related properties. Claims differ...
-
Collaborative approach to trustworthiness of it infrastructures
PublikacjaArtykuł wprowadza koncepcję ''trust case'' i wyjaśnia jak jest ona używana w celu uzasadnienia zaufania do systemów i infrastruktur IT. W szczególności skoncentrowano się na procesie budowy trust case, wyjasniono jego strukturę oraz podkreślono konieczność włączenia do procesu właściwych udziałowców. Załączono również informację na temat funkcjonalnej struktury narzedzi wspomagających zarządzanie trust case w ramach jego cyklu...
-
Reduced-Cost Microwave Design Closure by Multi-Resolution EM Simulations and Knowledge-Based Model Management
PublikacjaParameter adjustment through numerical optimization has become a commonplace of contemporary microwave engineering. Although circuit theory methods are ubiquitous in the development of microwave components, the initial designs obtained with such tools have to be further tuned to improve the system performance. This is particularly pertinent to miniaturized structures, where the cross-coupling effects cannot be adequately accounted...
-
Relationships between Trust and Collaborative Culture in The Context of Tacit Knowledge Sharing
PublikacjaThe literature review presents a lot of theoretical and empirical evidence that Trust affects Collaborative Culture. The opposite also proves to be true: Collaborative Culture influences Trust. The main hypothesis presented in this paper says that both these factors are strongly correlated and modify each other. This study examines the mutual relationship of the said variables in the context of Tacit Knowledge Sharing based on...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Impact of Usability Website Attributes on Users’ Trust, Satisfaction and Loyalty
PublikacjaThis paper presents the results of an experimental study aimed at identifying possible relationships among website usability characteristics, consumer satisfaction, trust and loyalty. These factors regard not only customer satisfaction in a transactional sense, but in the long term they may affect e-customer behavior, opinions, recommendations and attitudes toward using on-line services in general. The study was performed with...
-
Argument strategies and patterns of the Trust-IT framework
PublikacjaArtykuł dotyczy metodologicznego i narzędziowego środowiska Trust-IT wspierającego budowę dowodów zaufania (ang. trust case), a w szczególności strategii tworzenia dowodu zaufania. Strategia uzależniona jest od właściwości systemu (lub innego rozważanego obiektu), która podlega analizie w ramach dowodu zaufania. W artykule zaprezentowano dwie strategie: oparta na ryzyku i oparta na standardach oraz omówiono kilka często stosowanych...
-
Using evidence based arguments to support trust
PublikacjaWprowadzono podstawowe koncepcje metodyki TRUST-IT: argumentu i dowodu, modelu argumentacji, szablonu argumentacji, oceny argumentu oraz kontekstu aplikacyjnego. Przedstawiono zakres funkcjonalności, modele udostepniania oraz politykę bezpieczeństwa informacji związane z usługami NOR-STA wspomagającymi zastosowania metodyki TRUST-IT. Przedstawiono również dotychczasowe doświadczenia związane z wdrażaniam uzług NOR-STA w różnych...
-
Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation
PublikacjaIn client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...
-
Trust and Distrust in e-Democracy
PublikacjaIn the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of distrust is almost neglected in such literature but,...
-
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublikacjaThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
Praca z normą Common Criteria wspomagana szablonami Trust Case
PublikacjaTrust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Metoda jest przedmiotem intensywnych badań. Jeden z kierunków rozwoju dotyczy tworzenia szablonów oceny zgodności ze standardami. Szablon Trust Case jest odwzorowaniem wymagań zawartych w normie w strukturę drzewa dowodowego....
-
Trust, Collaborative Culture and Tacit Knowledge Sharing in Project Management–a Relationship Model
PublikacjaThe aim of this research is to study the relationship between Trust, Collaborative Culture, and Tacit Knowledge Sharing in Project Management as a source of Team Creativity in the context of delivering value through knowledge. For this purpose authors conducted a study of 514 Polish professionals with different functions and experience in managing projects in construction industry. The data collected during the study has been analysed...
-
Trust and Distrust in e-Democracy
PublikacjaIn the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of...
-
Supporting Assurance by Evidence-based Argument Services
PublikacjaStructured arguments based on evidence are used in many domains, including systems engineering, quality assurance and standards conformance. Development, maintenance and assessment of such arguments is addressed by TRUST-IT methodology outlined in this paper. The effective usage of TRUST-IT requires an adequate tool support. We present a platform of software services, called NOR-STA, available in the Internet, supporting key activities...
-
Building Confidence and Trust in Ireland's National Maternity Services Workforce –What matters most and how?
PublikacjaNational surveys on care experiences are increasingly adopted as regulatory mechanisms for improving care quality and increasing public trust in healthcare services. Based on data collected as part of Ireland's 2020 National Maternity Experience Survey, this study investigates care-related factors that contribute most to confidence and trust in the professional workforce (or carers) within Irish maternity services. The survey covered...
-
The effects of perceived risk, brand value, and brand trust on eWOM
PublikacjaUnrestricted access to the Internet, mobile devices, social applications and offering shopping comment options via online stores and platforms, encourages customers to generate online reviews about brands. That is why it became important to learn about the factors that motivate customers to create electronic word of mouth (eWOM). The survey aimed to check if there are links between perceived brand value, perceived risk, brand trust...
-
Zastosowanie szablonów Trust Case w pracy z normą BS 7799
PublikacjaTrust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...
-
A theoretical framework for understanding trust and distrust in internet voting
PublikacjaEach and every case of success and failure in the implementation of internet voting is permeated by a common element: the concept of trust. Several researchers highlighted the relevance of creating trust for the successful implementation of technology [15] and, in particular, of internet voting [13]. But the concept itself is complex and challenging to define, for one fundamental reason: it is a concept of everyday social use...
-
Practical Evaluation of Internet Systems' Security Mechanisms
PublikacjaA proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.
-
Trust Management Method for Wireless Sensor Networks
PublikacjaA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Do personality traits influence the user’s behavioral intention to adopt and use Open Government Data (OGD)? An empirical investigation
PublikacjaThe academic interest in the Open Government Data (OGD) domain has been burgeoning over the years. Conceding that the prime focus of an OGD initiative is its further re-use for value creation and innovation by stakeholders, the present study seeks to underscore the role of HEXACO personality traits on behavioral intention (BI) to adopt and use OGD in developing countries' context. We investigate the direct, indirect, and moderating...
-
Expedited Design Closure of Antennas By Means Of Trust-Region-Based Adaptive Response Scaling
PublikacjaIn the letter, a reliable procedure for expedited design optimization of antenna structures by means of trust-region adaptive response scaling (TR-ARS) is proposed. The presented approach exploits two-level electromagnetic (EM) simulation models. A predicted high-fidelity model response is obtained by applying nonlinear frequency and amplitude correction to the low-fidelity model. The surrogate created this way is iteratively rebuilt...
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublikacjaNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks
PublikacjaThe aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...
-
Dempster-shafer theory-based trust and selfishness evaluation in mobile ad hoc networks
PublikacjaThe paper addresses the problem of selfishness detec-tion in mobile ad hoc networks. It describes an approach based on Dempster-Shafer theory of evidence. Special attention is paid to trust evaluation and using it as a metric for coping with (weighted) recommendations from third-party nodes. Efficiency and robustness of the pre-sented solution is discussed with an emphasis on resil-iency to false recommendations.
-
On EM-driven size reduction of antenna structures with explicit constraint handling
PublikacjaSimulation-driven miniaturization of antenna components is a challenging task mainly due to the presence of expensive constraints, evaluation of which involves full-wave electromagnetic (EM) analysis. The recommended approach is implicit constraint handling using penalty functions, which, however, requires a meticulous selection of penalty coefficients, instrumental in ensuring optimization process reliability. This paper proposes...
-
Fast Antenna Optimization Using Gradient Monitoring and Variable-Fidelity EM Models
PublikacjaAccelerated simulation-driven design optimization of antenna structures is proposed. Variable-fidelity electromagnetic (EM) analysis is used as well as the trust-region framework with limited sensitivity updates. The latter are controlled by monitoring the changes of the antenna response gradients. Our methodology is verified using three compact wideband antennas. Comprehensive benchmarking demonstrates its superiority over both...
-
Trust, Tacit Knowledge Sharing, Project Performance and their Managerial Implications
PublikacjaTacit Knowledge Sharing is increasingly attracting the attention of scientists and managers intrigued by their potential application for creating innovative solutions. Project management as a set of methodologies and best practices need to be charged by knowledge. The research problem tackled in this article refers to a current managerial problem regarding tacit knowledge sharing execution in project based organizations. The objective...
-
A Novel Trust-Region-Based Algorithm with Flexible Jacobian Updates for Expedited Optimization of High-Frequency Structures
PublikacjaSimulation-driven design closure is mandatory in the design of contemporary high-frequency components. It aims at improving the selected performance figures through adjustment of the structure’s geometry (and/or material) parameters. The computational cost of this process when employing numerical optimization is often prohibitively high, which is a strong motivation for the development of more efficient methods. This is especially...
-
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions
PublikacjaWe consider a generic model of Client-Server interactions in the presence of Sender and Relay, conceptual agents acting on behalf of Client and Server, respectively, and modeling cloud service providers in the envisaged "QoS as a Service paradigm". Client generates objects which Sender tags with demanded QoS level, whereas Relay assigns the QoS level to be provided at Server. To verify an object's right to a QoS level, Relay detects...
-
Trust-IT - a framework for trust cases
PublikacjaArtykul prezentuje wyniki uzyskane w ramach prac zmierzających do wytworzenia zintegrowanego srodowiska wspomagającego analizę zaufania do systemów i infrastruktur informatycznych. Elementy tego środowiska obejmują język i metodykę trorzenia i pielęgnacji dowodów zaufania (ang. trust case), mtode integrowania z nimi materiału dowodowego, narzędzia wspomagajace zarządzanie dowodami zaufania oraz scenariusze ich wykorzystania w różnych...
-
SCF - a Framework Supporting Achieving and Assessing Conformity with Standards
PublikacjaStandards Conformity Framework (SCF) presented in this paper encompasses methods and tools whichprovide support for application of standards and other normative documents. The approach taken focuses ondevelopment, assessment and maintenance of an electronic document which demonstrates conformity. Sucha document contains an argument structure developed in accordance with the Trust-IT methodology. Thepaper discusses details of the...
-
Exploring COVID-19 Conspiracy Theories: Education, Religiosity, Trust in Scientists, and Political Orientation in 26 European countries
PublikacjaThe COVID-19 virus disseminated globally at an accelerated pace, culminating in a worldwide pandemic; it engendered a proliferation of spurious information and a plethora of misinformation and conspiracy theories (CTs). While many factors contributing to the propensity for embracing conspiracy ideation have been delineated, the foremost determinant influencing individuals’ proclivity towards CT endorsement appears to be their...
-
Standard Compliance Framework for effective requirements communication
PublikacjaStandard Compliance Framework (SCF) is a framework, which supports application of standards at the stages of achieving, assessing and maintaining the compliance. It uses Trust Case language to develop argument structures demonstrating compliance with standards. The paper presents how SCF is applied to increase effectiveness of requirements communication. Relevant mechanisms of the framework are thoroughly described referring to...
-
Dual-band antenna with improved gain for WLAN and ISM applications
PublikacjaIn this Letter, a dual-band antenna with an improved gain is proposed. The structure features 9.7 and 10.4 dBi gain within 2.4 GHz to 2.5 GHz and 5 GHz to 6 GHz bands, respectively. This makes it suitable for WLAN and ISM applications. The structure comprises an asymmetrical pair of radiators and slots suspended over a reflector. The antenna is optimised in a two-stage process using a trust-region-based gradient search algorithm....
-
Comparative conformance cases for monitoring multiple implementations of critical requirements
PublikacjaThe paper presents the concept and the mechanism of comparative conformance cases which support conformance monitoring in situations where a standard or other set of requirements are being implemented at multiple sites. The mechanism is enabled by NOR-STA services which implement the TRUST-IT methodology and are deployed in the cloud in accordance with the SaaS model. In the paper we introduce the concept of comparative conformance...
-
Validation of Services Supporting Healthcare Standards Conformance
PublikacjaThe paper presents the results of experimental validation of a set of innovative software services supporting processes of achieving, assessing and maintaining conformance with standards and regulations. The study involved several hospitals implementing the Accreditation Standard promoted by the Polish Ministry of Health. First we introduce NOR-STA services that implement the TRUST-IT methodology of argument management. Then we...
-
Standards Conformity Framework in comparison with contemporary methods supporting standards application
PublikacjaAchieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...
-
Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks
PublikacjaThe paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...
-
Intelligence Augmentation and Amplification: Approaches, Tools, and Case Studies
PublikacjaMost experts agree that truly intelligent artificial system is yet to be developed. The main issue that still remains a challenge is imposing trust and explainability into such systems. However, is full replication of human intelligence really desirable key aim in intelligence related technology and research? This is where the concept of augmented intelligence comes into play. It is an alternative conceptualization of artificial...
-
Molecular dynamics and verisimilitude - to what extent can one trust a computational simulation?
PublikacjaFor the last several tens of years, computer simulations have become of undeniable importance. Molecular Dynamics (MD) simulation techniques are used to examine the phenomena which occur at the level that cannot be observed directly. Thus, they can be successfully exploited in many different scientific fields such as: materials science, applied mathematics and theoretical physics, biochemistry, biophysics or drug design. Despite...
-
Intercultural Challenges in Virtual Teams
Publikacja: Virtual teams are usually geographically dispersed and consist of members from different countries and cultures. They influences internal communication processes and can cause personal conflicts, misunderstandings or lack of trust. Intercultural diversity is also significant for goal setting and team effectiveness. The aim of this article is to check if virtual team members appreciate the cultural diversity or rather suffer from lack...
-
Using argument structures to create a measurement plan
PublikacjaWhile planning an experiment the same question always arises: What are the goals of the experiment and which measurements are needed to demonstrate that the goals have been achieved? Deciding about the extent of raw data to be collected, the metrics to be constructed on those data and the interpretation of the metrics with respect to the assumed goals is by no means a trivial task. In this paper we show how a well known Gal-Question-Metrics...
-
Fast EM-driven size reduction of antenna structures by means of adjoint sensitivities and trust regions
PublikacjaIn this letter, a simple yet robust and computationally efficient optimization technique for explicit size reduction of antenna structures is presented. Our approach directly handles the antenna size as the main design objective, while ensuring satisfactory electrical performance by means of suitably defined penalty functions. For the sake of accuracy, the antenna structure is evaluated using high-fidelity EM simulation. In order...
-
Trust Case: justifying trust in an IT solution
PublikacjaW artykule prezentujemy podejście wykorzystane przy budowie dowodu zaufania (ang. trust case) do DRIVE, infrastruktury informatycznej wspomagającej dystrybucję i podawanie leków. Cele DRIVE obejmowały bezpieczniejszą i mniej kosztowną dystrybucję leków. Dowód zaufania reprezentuje argumentację przemawiającą za tym, że DRIVE jest godne zaufania. Składa się on z żądań (ang. claims) postulujących pewne związane z zaufaniem własności...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublikacjaAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
To i-vote or not to i-vote: Drivers and barriers to the implementation of internet voting
PublikacjaThis paper investigates the drivers and barriers of internet voting and the implications of a global pandemic for the development of the respective technology. In contrast to the expected uptake in the early 2000s of internet voting, the technology is still rather seldomly used in election systems around the world. The paper at hand explores the different forces that drive or impede internet voting adoption from a political, social,...
-
Reduced-cost constrained miniaturization of wideband antennas using improved trust-region gradient search with repair step
PublikacjaIn the letter, an improved algorithm for electromagnetic (EM)-driven size reduction of wideband antennas is proposed. Our methodology utilizes variable-fidelity EM simulation models, auxiliary polynomial regression surrogates, as well as multi-point response correction. The constraint handling is implicit, using penalty functions. The core optimization algorithm is a trust-region gradient search with a repair step added in order...
-
Low-fidelity model considerations for simulation-based optimisation of miniaturised wideband antennas
PublikacjaHere, variable-fidelity electromagnetic (EM)-based design optimisation of miniaturised antennas is discussed. The authors focus on an appropriate selection of discretisation density of the low-fidelity EM model, which results in good performance of the optimisation algorithm in terms of its computational complexity and reliability. Trust-region gradient search with low-fidelity model corrected by means of non-linear frequency scaling...
-
On low-fidelity models for variable-fidelity simulation-driven design optimization of compact wideband antennas
PublikacjaThe paper addresses simulation-driven design optimization of compact antennas involving variable-fidelity electromagnetic (EM) simulation models. Comprehensive investigations are carried out concerning selection of the coarse model discretization density. The effects of the low-fidelity model setup on the reliability and computational complexity of the optimization process are determined using a benchmark set of three ultra-wideband...
-
Tacit Knowledge Sharing and Value Creation in the Network Economy: Socially Driven Evolution of Business
PublikacjaKey factors which affect competitive advantage in the network economy are innovation, relationships, cooperation, and knowledge. Sharing knowledge is not easy. Companies find it problematic. Presented studies show that the essence of the value creation today is not in sharing explicit but rather tacit knowledge, which is a source of creativity and innovation. Delivering value through knowledge does not only require efficient Transactive...
-
Zaufanie w zespole badawczym – studium przypadku (projekt CD NIWA realizowany na Politechnice Gdańskiej)
PublikacjaArtykuł dotyczy tematyki klimatu pracy zespołowej, ze szczególnym uwzględnieniem zaufania w zespole jako czynnika warunkującego zaangażowanie, efektywność i innowacyjność zespołu. Przeanalizowano znaczenie oraz wymiary zaufania w zespole badawczym na podstawie koncepcji International Team Trust Indicator, czyli dziesięciowymiarowego modelu zaufania. Celem artykułu jest analiza klimatu współpracy i poziomu zaufania w interdyscyplinarnym...
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Framework for Integration Decentralized and Untrusted Multi-vendor IoMT Environments
PublikacjaLack of standardization is highly visible while we use historical data sets or compare our model with others that use IoMT devices from different vendors. The problem also concerns the trust in highly decentralized and anonymous environments where sensitive data are transferred through the Internet and then are analyzed by third-party companies. In our research we propose a standard that has been implemented in the form of framework...
-
How do personality traits influence Open Government Data (OGD) adoption and usage? Investigating the indirect and moderating effects
PublikacjaOpen Government Data (OGD) research has focused for a long on the adoption and usage from the perspectives of users across different contexts. The underlying rationale for this specific focus is that OGD initiatives are undertaken to further citizen engagement with OGD for value generation and innovation purposes. Conceding that usage propensity is different across individuals, it is important to understand the influence of personality...
-
Extending GQM by argument structures
PublikacjaEffective metrics definition methods are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-Metric (GQM) method of systematic metrics derivation from measurement goals can be extended by applying argument structures. The proposed approach is called Goal-Argument-Metric (GAM). We briefly introduce general ideas of GQM...
-
Extending GQM by Argument Structures
PublikacjaEffective methods for metrics definition are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-Metric (GQM) method of systematic metrics derivation from measurement goals can be extended by applying argument structures. The proposed approach is called Goal-Argument-Metric (GAM). The general ideas of GQM and GAM are...
-
Complementary green analytical procedure index (ComplexGAPI) and software
PublikacjaIt is not easy to find appropriate tools for the evaluation of the “green”nature of analytical methodologies which involve the use of compounds, materials, or chemicals manufactured prior to the analytical step. Here, we propose a new metric for the evaluation of analytical procedures based on the GAC attributes. The proposed solution expands on the well-known green analytical procedure index by adding additional fields pertaining...
-
Informal projects management with volunteers participation
PublikacjaThe article briefly presents some experiences and results of research which has been conducted in order to identify key elements influencing the success of projects managed in informal way with volunteers’ participation. These experiences were collected during the realization of several “soft” projects. The general aims of these projects were sports competitions’ organisation, cultural events and charity projects for...
-
Problem wspólnotowego kształtowania środowiska mieszkaniowego
PublikacjaCommunity based shaping of housing environmentA sustainable development of housing environment depends on socio-economical context. Interest towards locality in western countries has a completely different basis than in the post-communist ones. Social capital, which shows e.g. in trust, as well as ecological awareness are totally different. We do not belong to saturated societies. There is a distinct issue of community shaping...
-
Under the Fire of Disinformation. Attitudes Towards Fake News in the Ukrainian Frozen War
PublikacjaIn this article, we examine individual attitudes towards fake news in the extreme conditions of a propaganda war, taking into account the complex regional social and historical conditions. For this purpose, within the mobile boundary zone during frozen war in Ukraine, we conducted qualitative research among representatives of generations X and Z (high school teachers and students). Being accustomed to fake news turned out to be...
-
EM-driven topology evolution for bandwidth enhancement of hybrid quadrature patch couplers
PublikacjaA broad operational bandwidth is one of the key performance figures of hybrid patch couplers. Due to the lack of systematic design procedures, bandwidth enhancement is normally obtained through manual modifications of the structure geometry. In this work, an optimization-based topology evolution for EM-driven design of patch couplers with enhanced bandwidth has been proposed. The method exploits a novel spline-based EM model where...
-
Characteristics of odors emitted from municipal wastewater treatment plant and methods for their identification and deodorization techniques
PublikacjaOdors emitted from municipal wastewater treatment plants belong to a group of pollutants, which is the main cause of people complaining about atmospheric air quality. The limitation of emissions of unpleasant odors generated by wastewater treatment plants by using appropriate deodorization methods is omitted on numerous occasions. This can have a negative inflence on public trust and the quality of atmospheric air. The article...
-
Model Correction and Optimization Framework for Expedited EM-Driven Surrogate-Assisted Design of Compact Antennas
PublikacjaDesign of compact antennas is a numerically challenging process that heavily relies on electromagnetic (EM) simulations and numerical optimization algorithms. For reliability of simulation results, EM models of small radiators often include connectors which—despite being components with fixed dimensions—significantly contribute to evaluation cost. In this letter, a response correction method for antenna models without connector,...
-
Reduced-cost design closure of antennas by means of gradient search with restricted sensitivity update
PublikacjaDesign closure, i.e., adjustment of geometry parameters to boost the performance, is a challenging stage of antenna design process. Given complexity of contemporary structures, reliable parameter tuning requires numerical optimization and can be executed using local algorithms. Yet, EM-driven optimization is a computationally expensive endeavour and reducing its cost is highly desirable. In this paper, a modification of the trust-region...
-
Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
PublikacjaA novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...
-
Buckling and shape control of prestressable trusses using optimum number of actuators
PublikacjaThis paper describes a method to control the nodal displacement of prestressable truss structures within the desired domains. At the same time, the stress in all members is unleashed to take any value between the allowable tensile stress and critical buckling stress. The shape and stresses are controlled by actuating the most active members. The technique considers the members’ initial crookedness, residual stresses, and slenderness...
-
A design framework for rigorous constrained EM-driven optimization of miniaturized antennas with circular polarization
PublikacjaCompact radiators with circular polarization are important components of modern mobile communication systems. Their design is a challenging process which requires maintaining simultaneous control over several performance figures but also the structure size. In this work, a novel design framework for multi-stage constrained miniaturization of antennas with circular polarization is presented. The method involves sequential optimization...
-
Practical I-Voting on Stellar Blockchain
PublikacjaIn this paper, we propose a privacy-preserving i-voting system based on the public Stellar Blockchain network. We argue that the proposed system satisfies all requirements stated for a robust i-voting system including transparency, verifiability, and voter anonymity. The practical architecture of the system abstracts a voter from blockchain technology used underneath. To keep user privacy, we propose a privacy-first protocol that...
-
Efficient Multi-Fidelity Design Optimization of Microwave Filters Using Adjoint Sensitivity
PublikacjaA simple and robust algorithm for computationally efficient design optimiza-tion of microwave filters is presented. Our approach exploits a trust-region (TR)-based algorithm that utilizes linear approximation of the filter response obtained using adjoint sensitivity. The algorithm is sequentially executed on a family of electromagnetic (EM)-simulated models of different fidelities, starting from a coarse-discretization one, and...
-
When Biobanks Meet Religion: Association Between Religiosity and Attitudes of Polish Medical Students Toward Biobanking of Human Biological Material for Research Purposes
PublikacjaWhile biobanking is expanding globally, the empirical evidence concerning the impact of religion on future healthcare professionals’ awareness and willingness to donate biospecimens for biobank research is lacking. To understand how medicalstudents’ religious beliefs can fuel their questions regarding how biospecimens would be stored, cared for, and used, we conducted a survey among 1500 medical students at Poznań University...
-
Attitudes towards Collaboration in Multicultural Teams in the opinion of Polish and Chinese Students
PublikacjaThe main goal of this paper is to present results of research that addresses the issue of attitudes towards working in both multicultural and single culture teams among Polish and Chinese students. The relationship between those attitudes and factors that includes individual experiences of research participants as well as characteristics of team tasks was analyzed. The research was conducted with students of one Polish and one...
-
New Challenges in Management and Economics in 21st century. Selected studies and examples
PublikacjaIn Chapter 1 authors describe the method used to assess the level of readiness of an organization to introduce the Lean Six Sigma concept supporting the Quality 4.0 assumptions, which is gaining more and more interest not only in large organizations, but also in the SME sector. Its use will be illustrated by the example of a small service company. Chapter 2 presents the characteristics of blockchain technology applications in the...
-
Quasi-Global Optimization of Antenna Structures Using Principal Components and Affine Subspace-Spanned Surrogates
PublikacjaParametric optimization is a mandatory step in the design of contemporary antenna structures. Conceptual development can only provide rough initial designs that have to be further tuned, often extensively. Given the topological complexity of modern antennas, the design closure necessarily involves full-wave electromagnetic (EM) simulations and—in many cases—global search procedures. Both factors make antenna optimization a computationally...
-
Kriging metamodels and design re‐utilization for fast parameter tuning of antenna structures
PublikacjaThe paper addresses the problem of computationally efficient electromagnetic (EM)‐driven design closure of antenna structures. The foundations of the presented approach are fast kriging interpolation metamodels, utilized for two purposes: (a) producing a good starting point for further parameter tuning, and (b) yielding a reasonable Jacobian matrix estimate to jump‐start the optimization procedure. The models are rendered using...
-
EM-Driven Multi-Objective Optimization of a Generic Monopole Antenna by Means of a Nested Trust-Region Algorithm
PublikacjaAntenna structures for modern applications are characterized by complex and unintuitive topologies that are difficult to develop when conventional experience-driven techniques are of use. In this work, a method for automatic generation of antenna geometries in a multi-objective setup has been proposed. The approach involves optimization of a generic spline-based radiator with adjustable number of parameters using a nested trust-region-based...