Filtry
wszystkich: 1373
-
Katalog
- Publikacje 512 wyników po odfiltrowaniu
- Czasopisma 76 wyników po odfiltrowaniu
- Konferencje 68 wyników po odfiltrowaniu
- Osoby 61 wyników po odfiltrowaniu
- Projekty 3 wyników po odfiltrowaniu
- Kursy Online 33 wyników po odfiltrowaniu
- Wydarzenia 2 wyników po odfiltrowaniu
- Dane Badawcze 618 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: gis - geographic information systems
-
IEEE/IFIP International Conference on Information Technology for Balanced Automation Systems
Konferencje -
International Workshop on Modelling, Simulation, Verification and Validation of Enterprise Information Systems
Konferencje -
HCist - International Conference on Health and Social Care Information Systems and Technologies
Konferencje -
Adam Przybyłek dr
Osobystopień doktora uzyskany w grudniu 2011 od Wydziału Elektroniki, Telekomunikacji i Informatyki, PG od 2012 zatrudniony jako adiunkt w Katedrze Inżynierii Oprogramowania, WETI PG; wcześniej pracował jako asystent w Katedrze Informatyki Ekonomicznej UG oraz instruktor w Akademii CISCO zainteresowania badawcze: programowanie aspektowe, metodyki zwinne, modelowanie procesów biznesowych więcej informacji na stronie domowej: http://przybylek.wzr.pl
-
Bioelectronic nose: Current status and perspectives
PublikacjaA characteristic feature of human and animal organs of smell is the ability to identify hundreds of thousands of odours. It is accompanied by particular smell sensations, which are a basic source of information about odour mixture. The main structural elements of biological smell systems are the olfactory receptors. Small differences in a structure of odorous molecules (odorants) can lead to significant change of odour, which is...
-
Evaluation and behaviour of slowly biodegradable substrate on mathematical modelling of oxygen uptake rate in activated sludge systems
PublikacjaThe effect of the readily biodegradable (Ss) fraction in activated sludge systems has been extensively investigated, but only minor information can be found about the effect of Xs on OUR in activated sludge systems. The aim of this study was to determine the evaluation and behaviour of Xs on mathematical modelling of OUR using ASM2d and its modification. The essential study was divided into two major parts: experimental investigation...
-
Estimating the Average Speed of Public Transport Vehicles Based on Traffic Control System Data
PublikacjaIntelligent Transport Systems are a valuable source of traffic information, covering both private and public vehicles. The main problem, however, is that very few studies are conducted to determine the speed of buses, trams and trolleys in urban networks in relation to traffic conditions. The paper investigates how ITS systems data could be used to model the speed of Public Transport vehicles. This is now possible thanks to the...
-
Opportunities and challenges for exploiting drones in agile manufacturing systems
PublikacjaDrones have become an advanced supply chain implementation instrument, especially in connecting warehouses to outlet points or even individual customers. However, their potential application in an intra-logistics framework has not been studied, let alone explored so far. Modeling and simulations in virtual environments can help explore and evaluate the opportunities for practical and profitable applications of drones in manufacturing...
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublikacjaThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Cooperative control in production and logistics
PublikacjaClassical applications of control engineering and information and communication technology (ICT) in production and logistics are often done in a rigid, centralized and hierarchical way. These inflexible approaches are typically not able to cope with the complexities of the manufacturing environment, such as the instabilities, uncertainties and abrupt changes caused by internal and external disturbances, or a large number and variety...
-
Influence and development of new kinematic systems in flat surface lapping
PublikacjaThe face grinding and lapping technology is widely used in the field of the precise and ultraprecise manufacturing. It has become an indispensable technology in the manufacture of many parts. An absence of material restrictions allows machining both metal and non-metallic materials, including technical ceramics [1]. Nowadays there are mainly two kinematic systems in lapping machines [2]. The machining plane-parallel surfaces is...
-
Image Representation for Cognitive Systems Using SOEKS and DDNA: A Case Study for PPE Compliance
PublikacjaCognitive Vision Systems have gained significant interest from academia and industry during the past few decade, and one of the main reasons behind this is the potential of such technologies to revolutionize human life as they intend to work under complex visual scenes, adapting to a comprehensive range of unforeseen changes, and exhibiting prospective behavior. The combination of these properties aims to mimic the human capabilities...
-
Clustering Context Items into User Trust Levels
PublikacjaAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
ENISA Study: Challenges in Securing Industrial Control Systems
PublikacjaIn 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its objective was to obtain the current view on the ICS protectionprimarily in Europe but also in the international context. The portrait' included threats, risks, and challenges in the area of ICS protection as well as national, pan European, and international initiatives on ICS security. The...
-
Integrated functional safety and cyber security analysis
PublikacjaThe chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...
-
Quantitative assessment
PublikacjaThe main trends in the development of analytical chemistry are the determination of increasingly lower concentrations of analytes in samples with complex matrix composition (trace analysis). While the obtained analytical results must be reliable, which means that they must accurately (truly and precisely) reflect the actual content of analytes in a representative sample of the material object under study. However, it is an extremely...
-
Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS
PublikacjaW wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...
-
Koncepcja platformy wymiany informacji o incydentach cyberbezpieczeństwa dla krajowego systemu elektroenergetycznego
PublikacjaArtykuł opisuje wybrane zagadnienia związane z cyberbezpieczeństwem w sektorze elektroenergetyki. Jednym z elementów zapewniania bezpieczeństwa sieci elektro-energetycznej jest efektywna wymiana informacji o incydentach bezpieczeństwa. W jej ramach wszystkie zaangażowane podmioty systemu elektroenergetycznego, tj.: elektrownie, operatorzy systemów przesyłowych, operatorzy systemów dystrybucyjnych, dostawcy rozwiązań bezpieczeństwa,...
-
Greencoin - educational information system for eco-inclusion and empowering urban adaptability.
PublikacjaSARS-CoV19 pandemic exposed a broad spectrum of challenges for modern cities, societies and the environment at large. The post-Covid transformation requires new social and ecological solutions, adjusted to modern challenges, but also equipped with technological advances that allow for digital inclusion and sustainable urban development to benefit the local economy and society. Many information systems are designed to enable...
-
Discovering Rule-Based Learning Systems for the Purpose of Music Analysis
PublikacjaMusic analysis and processing aims at understanding information retrieved from music (Music Information Retrieval). For the purpose of music data mining, machine learning (ML) methods or statistical approach are employed. Their primary task is recognition of musical instrument sounds, music genre or emotion contained in music, identification of audio, assessment of audio content, etc. In terms of computational approach, music databases...
-
A New Direct-Sequence Spread Spectrum Signal Detection Method for Underwater Acoustic Communications in Shallow-Water Channel
PublikacjaDirect-Sequence Spread Spectrum (DSSS) is one of the modulation and coding techniques used in Underwater Acoustic Communication (UAC) systems for reliable data transmision even at low signal levels. However, in a shallow water channel, there is a strong multipath propagation which causes a phase fluctuation of the received signal, affecting the performance of the spread-spectrum system. The article presents a differential method...
-
Seafloor relief reconstruction from side scan sonar data
PublikacjaSide scan sonar is one of the most widely used imaging systems in the underwater environment. It is relatively cheap and easy to deploy, in comparison with more powerful sensors. Although side scan sonar does not provide seafloor bathymetry directly, its records are directly related to seafloor images. In the paper, the method for 3D seafloor relief reconstruction from side scan sonar data is presented. The method is based on the...
-
Design and implementation of GEPON architecture in laboratory testbed
PublikacjaThis paper presents a proposition of GEPON architecture for the didactic purpose. The GEPON architecture is implemented in access networks laboratory testbed. The paper includes a brief description of GEPON standardization, a description of laboratory GEPON equipment architecture and a short presentation of proposed laboratory exercises. The exemplary performance results are included.The proposition of GEPON architecture testbed...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublikacjaThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
Connection matrix theory for discrete dynamical systems
PublikacjaIn [C] and [F1] the connection matrix theory for Morse decomposition is developedin the case of continuous dynamical systems. Our purpose is to study the case of discrete timedynamical systems.
-
Spectrum-based modal parameters identification with Particle Swarm Optimization
PublikacjaThe paper presents the new method of the natural frequencies and damping identification based on the Artificial Intelligence (AI) Particle Swarm Optimization (PSO) algorithm. The identification is performed in the frequency domain. The algorithm performs two PSO-based steps and introduces some modifications in order to achieve quick convergence and low estimation error of the identified parameters’ values for multi-mode systems....
-
Computer -Aided Local Energy Planning Using ALEP-PL Software
PublikacjaThe issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...
-
Artificial Intelligence Technologies in Education: Benefits, Challenges and Strategies of Implementation
PublikacjaSince the education sector is associated with highly dynamic business environments which are controlled and maintained by information systems, recent technological advancements and the increasing pace of adopting artificial intelligence (AI) technologies constitute a need to identify and analyze the issues regarding their implementation in education sector. However, a study of the contemporary literature reveled that relatively...
-
Jerzy Proficz dr hab. inż.
OsobyJerzy Proficz – dyrektor Centrum Informatycznego Trójmiejskiej Akademickiej Sieci Komputerowej (CI TASK) na Politechnice Gdańskiej. Uzyskał stopień naukowy doktora habilitowanego (2022) w dyscyplinie: Informatyka techniczna i telekomunikacja. Autor i współautor ponad 50 artykułów w czasopismach i na konferencjach naukowych związanych głównie z równoległym przetwarzaniem danych na komputerach dużej mocy (HPC, chmura obliczeniowa). Udział...
-
Fake VIP Attacks and Their Mitigation via Double-Blind Reputation
PublikacjaIn a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...
-
Student model representation for pedagogical virtual mentors
PublikacjaThe paper concerns technological aspects of virtual mentors construction, especially concentrating on the student model representation. The article distinguishes several types of information that is gathered by the pedagogical agents and other educational platforms, including student knowledge model, student progress tracking, interaction process patterns and learner preferences. A set of technologies used for the student model...
-
Devices for the production of reference gas mixtures
PublikacjaFor many years there has been growing demand for gaseous reference materials, which is connected with development in many fields of science and technology. As a result, new methodological and instrumental solutions appear that can be used for this purpose. Appropriate quality assurance/quality control (QA/QC) must be used to make sure that measurement data are a reliable source of information. Reference materials are a significant...
-
Studies on the influence of β-cyclodextrin derivatives on the physical stability of famotidine
PublikacjaThe usage of Fourier transform infrared spectroscopy, near infrared spectroscopy, differential scanning calorimetry and microscopy is presented in this work focused on the exploration of the effect of CD on the physical stability of famotidine (FAM). The most significant information was achieved by analysis of the second derivatives ofnear infrared (NIR) spectra recorded. Changes in the shape of spectra derivatives allow...
-
Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure
PublikacjaSafety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...
-
Deep Learning: A Case Study for Image Recognition Using Transfer Learning
PublikacjaDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
Deep Learning
PublikacjaDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
ADAPTIVE BACKSTEPPING TRACKING CONTROL FOR OVER-ACTUATED DP MARINE VESSEL WITH INERTIA UNCERTAINTIES
PublikacjaDesigning a tracking control system for an over-actuated dynamic positioning marine vessel in the case of insufficient information on environmental disturbances, hydrodynamic damping, Coriolis forces and vessel inertia characteristics is considered. The designed adaptive MIMO backstepping control law with control allocation is based on Lyapunov control theory for cascaded systems to guarantee stabilization of the marine vessel...
-
Comparison of target strength (TS) distributions obtained by means of the use of direct and indirect techniques in sea cages
PublikacjaThe aim of this study is to verify the reliability of a processing application developed for the indirect measurement of target strength (TS), with a view to the integration into a single-beam system for its utilization in fish farms. Dorsal and ventral measurements are carried out for gilt-head sea-bream (Spams Aurata) for 5 size classes using a split-beam EK60 echosounder and single-beam data obtained from one of the channels...
-
Visual content representation and retrieval for Cognitive Cyber Physical Systems
PublikacjaCognitive Cyber Physical Systems have gained significant attention from academia and industry during the past few decade. One of the main reasons behind this interest is the potential of such technologies to revolutionize human life since they intend to work robustly under complex visual scenes, which environmental conditions may vary, adapting to a comprehensive range of unforeseen changes, and exhibiting prospective behavior...
-
Human System Interaction in Review: Advancing the Artificial Intelligence Transformation
PublikacjaThe industrial advancement of human society has been fundamentally driven by diverse ‘systems’ that facilitate ‘human interaction’ within physical, digital, virtual, social and artificial environments, and upon the hyper-connected layers of system-system interactions across these environments. The research and practice of Human System Interaction (HSI) has undergone exponential development due to the enhanced capabilities, increased...
-
Działalność w obszarze grantów realizowana przez Katedrę Sieci Teleinformacyjnych
PublikacjaPrzedstawiono działalność Katedry Sieci Teleinformacyjnych PG WETI w obszarze grantów finansowanych przez instytucje centralne, przy czym główny nacisk położono na scharakteryzowanie aktualnie realizowanych projektów. Opisano dwa projekty finansowane przez NCBiR. Pierwszy dotyczy koncepcji oraz implementacji integracji informacji w rozproszonych elementach systemu wymiany danych Straży Granicznej, natomiast drugi strumieniowej...
-
Information Systems &Technologies /SPIE Conference on Digital Video Compression Algorithms & Techniques
Konferencje -
DoA Estimation Using Reconfigurable Antennas in Millimiter-Wave Frequency 5G Systems
PublikacjaTo achieve low latency and high throughputs, future 5G systems will have to utilize complex antenna systems able to provide beamforming and direction-of-arrival (DoA) estimation capabilities. Most of the concepts available in the literature rely on analog or digital beamforming, which is well developed and can be used both at a base station and in a user terminal. However, in applications, in which...
-
Distinguishing of cocrystals from simple eutectic mixtures: phenolic acids as potential pharmaceutical coformers
PublikacjaThe multiparameter model comprising 1D and 2D QSPR/QSAR descriptors was proposed and validated for phenolic acid binary systems. This approach is based on the optimization of regression coefficients for maximization of the percentage of true positives in the pool of systems comprising either simple binary eutectics or cocrystals. The training set consisted of 58 eutectics and 168 cocrystals. The solid dispersions collection used...
-
Application of artificial intelligence into/for control of flexible manufacturing cell
PublikacjaThe application of artificial intelligence in technological processes control is usually limited. One problem is how to respond to changes in the environment of manufacturing system. A way to overcome the above shortcoming is to use fuzzy logic for representation of the inexact information. In this paper fundamentals of artificial intelligence and fuzzy logic are introduced from a theoretical point of view. Still more the fuzzy...
-
Adsorption onto zeolites: molecular perspective
Publikacja2D minerals are among key elements of advanced systems, but the need for understanding their interactions/reactions with materials and systems in which they are involved necessitates tracking their molecular and atomic monitoring. Zeolitic structures are microporous materials formed in the nature through volcanic activities or synthesis. Because of their outstanding physicochemical properties like cation exchange capacity and excellent...
-
Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym
PublikacjaNiniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...
-
Acoustic radar employing particle velocity sensors
PublikacjaA concept, practical realization and applications of a passive acoustic radar to automatic localization, tracking of sound sources were presented in the paper. The device consist of the new kind of multichannel miniature sound intensity sensors and a group of digital signal processing algorithms. Contrary to active radars, it does not emit the scanning beam but after receiving surroundings sounds it provide information about the...
-
Contextual Knowledge to Enhance Workplace Hazard Recognition and Interpretation in a Cognitive Vision Platform
PublikacjaThe combination of vision and sensor data together with the resulting necessity for formal representations builds a central component of an autonomous Cyber Physical System for detection and tracking of laborers in workplaces environments. This system must be adaptable and perceive the environment as automatically as possible, performing in a variety of plants and scenes without the necessity of recoding the application for each...