Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Śliwiński, T." wg kryterium: Autor


Tytuł:
Decision Support under Risk by Optimization of Scenario Importance Weighted OWA Aggregations
Autorzy:
Ogryczak, W.
Śliwiński, T.
Powiązania:
https://bibliotekanauki.pl/articles/308912.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
aggregation methods
decisions under risk
OWA
scenarios
WOWA
Opis:
The problem of evaluation outcomes under several scenarios to form overall objective functions is of considerable importance in decision support under uncertainty. The fuzzy operator defined as the so-called weighted OWA (WOWA) aggregation offers a well-suited approach to this problem. The WOWA aggregation, similar to the classical ordered weighted averaging (OWA), uses the preferential weights assigned to the ordered values (i.e., to the worst value, the second worst and so on) rather than to the specific criteria. This allows one to model various preferences with respect to the risk. Simultaneously, importance weighting of scenarios can be introduced. In this paper we analyze solution procedures for optimization problems with the WOWA objective functions related to decisions under risk. Linear programming formulations are introduced for optimization of theWOWA objective representing risk averse preferences. Their computational efficiency is demonstrated.
Źródło:
Journal of Telecommunications and Information Technology; 2009, 3; 5-13
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On equitable approaches to resource allocation problems: the conditional minimax solutions
Autorzy:
Ogryczak, W.
Śliwiński, T.
Powiązania:
https://bibliotekanauki.pl/articles/309239.pdf
Data publikacji:
2002
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
sieci telekomunikacyjne
telecommunication networks
resource allocation
equity
minmax solution
Opis:
In this paper we introduce and analyze a solution concept of the conditional minimax as a generalization of the minimax solution concept extended to take into account the number of services (the portion of demand) related to the worst performances. Namely, for a specified portion of demand we take into account the corresponding portion of the maximum results and we consider their average as the worst conditional mean to be minimized. We show that, similar to the standard minimax approach, the minimization of the worst conditional mean can be defined by a linear objective and a number of auxiliary linear inequalities. We report some results of initial computational experience with the new solution concept.
Źródło:
Journal of Telecommunications and Information Technology; 2002, 3; 40-48
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Fair resource allocation schemes and network dimensioning problems
Autorzy:
Ogryczak, W.
Śliwiński, T.
Wierzbicki, A.
Powiązania:
https://bibliotekanauki.pl/articles/307704.pdf
Data publikacji:
2003
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
sieci telekomunikacyjne
telecommunication networks
network dimensioning
resource allocation
fairness
Opis:
Resource allocation problems are concerned with the allocation of limited resources among competing activities so as to achieve the best overall performances of the system but providing fair treatment of all the competitors. Telecommunication networks are facing the increasing demand for Internet services. Therefore, a problem of network dimensioning with elastic traffic arises which requires to allocate bandwidth to maximize service flows with fair treatment of all the services. In such applications, the so-called max-min fairness (MMF) solution concept is widely used to formulate the resource allocation scheme. This guarantees the fairness but may lead to significant losses in the overall throughput of the network. In this paper we show how multiple criteria optimization concepts can be used to generate various fair resource allocation schemes. The solution concepts are tested on the network dimensioning problem and their abilities to model various preferences are demonstrated.
Źródło:
Journal of Telecommunications and Information Technology; 2003, 3; 34-42
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Path Diversity Protection in Two-Layer Networks
Autorzy:
Dzida, M.
Śliwiński, T.
Zagożdżon, M.
Ogryczak, W.
Pióro, M.
Powiązania:
https://bibliotekanauki.pl/articles/308914.pdf
Data publikacji:
2009
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
link dimensioning
path diversity
resilient routing
two-layer network optimization
Opis:
The paper addresses an optimization problem related to dimensioning links in a resilient two-layer network. A particular version of the problem which assumes that links of the upper layer are supported by unique paths in the lower layer is considered. Two mixed-integer programming formulations of this problem are presented and discussed. Direct resolving of these formulations requirespre-selection of "good" candidate paths in the upper layer of the network. Thus, the paper presents an alternative approach which is based on decomposing the resolution process into two phases, resolved iteratively. The first phase subproblem is related to designing lower layer path flows that provide the capacities for the logical links of the upper layer. The second phase is related to designing the flow patterns in the upper layer with protection assured through diversity of paths. In this phase we take into account the failures of the logical links that result from the failures of the lower layer links (so called shared risk link groups).
Źródło:
Journal of Telecommunications and Information Technology; 2009, 3; 14-19
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Antioxidant and DNA repair stimulating effect of extracts from Leonurus sibiricus against an induced oxidative stress and DNA damage in CHO cells
Autorzy:
Sitarek, P.
Skala, E.
Wysokinska, H.
Wielanek, M.
Szemraj, J.
Sliwinski, T.
Powiązania:
https://bibliotekanauki.pl/articles/951184.pdf
Data publikacji:
2015
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
conference
antioxidant
DNA repair
stimulating effect
Leonurus sibiricus
oxidative stress
DNA damage
secondary metabolite
polyphenolic acid
flavonoids
Chinese hamster ovary
Źródło:
BioTechnologia. Journal of Biotechnology Computational Biology and Bionanotechnology; 2015, 96, 1
0860-7796
Pojawia się w:
BioTechnologia. Journal of Biotechnology Computational Biology and Bionanotechnology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The influence of selected material and technological factors on mechanical properties and microstructure of reactive powder concrete (RPC)
Wpływ wybranych czynników materiałowych i technologicznych na właściwości mechaniczne i mikrostrukturę betonów z proszków reaktywnych (BPR)
Autorzy:
Zdeb, T.
Śliwiński, J.
Powiązania:
https://bibliotekanauki.pl/articles/230960.pdf
Data publikacji:
2011
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
beton reaktywny
kompozyt cementowy ultrawysokowartościowy
włókno stalowe
współczynnik zbrojenia włóknami
warunki dojrzewania
wytrzymałość
eneria pękania
odporność na kruche pękanie
mikrostruktura
reactive powder concrete
ultra high performance cementitious composites
steel fibres
fibres volume ratio
curing conditions
strength
fracture energy
fracture toughness
microstructure
Opis:
The paper deals with the properties and microstructure of Reactive Powder Concrete (RPC), which was developed at Cracow University of Technology. The influence of three different curing conditions: water (W), steam (S) and autoclave (A) and also steel fibres content on selected properties of RPC was analyzed. The composite characterized by w/s ratio equal to 0.20 and silica fume to cement ratio 20%, depending on curing conditions and fibres content, obtained compressive strength was in the range from 200 to 315 MPa, while modulus of elasticity determined during compression was about 50 GPa. During three-point bending test load-deflection curves were registered. Base on aforementioned measurements following parameters were calculated: flexural strength, stress at limit of proportionality (LOP), stress at modulus of rapture (MOR), work of fracture (WF), and toughness indices I5, I10 and I20. Both amount of steel fibres and curing conditions influence the deflection of RPC during bending.
Artykół dotyczy charakterystyki wybranych właściwośći i mikrostruktury Betonów z Proszków Reaktywowanych (BPR), wytworzonych w Politechnice Krakowskiej. Analizie poddano wpływ trzech warunków dojrzewania: dojrzewanie w wodzie (W), naparzanie niskoprężne (S) oraz autoklawizacja (A), a także zawartości włókien stalowych na wybrane właściwości BPR. Kompozyt charakteryzował się stałym współczynnikiem wodno-spoiwowym 0,20 oraz zawartością pyłu krzemionkowego 20% w stosunku do masy cementu. W zależności od warunków dojrzewania i udziału włókien wytrzymałość na ściskanie wahała się w granicach od 200 do 315 MPa, natomiast moduł sprężystości wyznaczany podczas ściskania wynosił około 50 GPa. Podczas trzypunktowego zginania beleczek RPC rejestrowano zależność siła-ugięcie, na podstawie której wyznaczono następujące parametry: wytrzymałość na rozciąganje przy zginanju, wartość naprężenia w punktach LOP i MOR (opis w tekście), energię zniszczenia WF oraz wartości współczynników toughness indices I5, I10 and I20. Zarówno udział włókien stalowych jak i warunki dojrzewania BPR mają wpływ na odkształcalność kompozytu podczas próby zginania.
Źródło:
Archives of Civil Engineering; 2011, 57, 2; 227-246
1230-2945
Pojawia się w:
Archives of Civil Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Organizational culture as prerequisite of proactive safety and security management in critical infrastructure systems including hazardous plants and ports
Autorzy:
Kosmowski, K. T.
Śliwiński, M.
Powiązania:
https://bibliotekanauki.pl/articles/2069101.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
behaviour-based safety
organizational culture
proactive safety
security management
Opis:
This article addresses selected aspects of organizational culture to be considered in the context of knowledge based proactive safety and security management of plants, ports and systems of critical infrastructure. It has been often emphasized in the domain literature that business effectiveness of such plants and their resilience against hazards and threats to avoid major accidents depends substantially on human and organizational factors. It becomes obvious that appropriate shaping of these factors is crucial and should be considered in life cycle. Some terms have been also introduced such as safety culture and security culture. Current research topic in this domain includes an interface between safety and security. The article discusses these issues in the context of knowledge based proactive safety and security management being a new challenge, especially in cases of hazardous plants, ports and other complex systems of critical infrastructure. Nevertheless a crucial role plays the human-operator undertaking safety-related decisions during potential abnormal situations and accidents. Below some issues concerning requirements for the alarm system design in context of human factors are outlined and discussed.
Źródło:
Journal of Polish Safety and Reliability Association; 2016, 7, 1; 133--146
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Framework for RIDM within functional safety management process
Autorzy:
Barnert, T.
Kosmowski, K.
Śliwiński, M.
Powiązania:
https://bibliotekanauki.pl/articles/2069134.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
functional safety
functional safety management
FSM
safety integrity level
SIL
risk informed decision making
RIDM
safety
security
uncertainty
Opis:
The functional safety management in life cycle is a complex process starting with identifying hazards and defining safety-related functions (SRFs) with regard to the results of risk assessment oriented at determining the safety integrity level of consecutive functions. Another element of such process is a verification of required SIL for considered architectures of safety-related system that implements given safety function. Due to complexity of the problem, to overcome difficulties in safety-related decision making often under considerable uncertainties, usually without taking into account security aspects, we propose to apply the RIDM methodology oriented on functional safety management of programmable control and protection systems in life cycle taking into some more important risk-related factors identified.
Źródło:
Journal of Polish Safety and Reliability Association; 2012, 3, 2; 217--226
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Knowledge-based functional safety management using ProSIL software
Autorzy:
Barnert, T.
Kosmowski, K.
Śliwiński, M.
Powiązania:
https://bibliotekanauki.pl/articles/2069169.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
hazardous plants
functional safety management
control system
protection systems
safety integrity level (SIL)
Opis:
In the article the ProSIL software for computer aided functional safety management is presented. The software consists of three modules for the determination of the required SIL level (ProSILen) and verification of the SIL level (ProSILver). In the ProSIL the calibrated knowledge-based risk graph method for determining the required safety integrity level (SIL) of the safety functions identified in hazard analysis is implemented. The SILs are then verified for safety-related control and protection systems implementing relevant functions with regard to random failures and potential systematic failures. The assessment methods are compatible with international standards IEC 61508 and IEC 61511. Some current challenges and methodological issues concerning knowledge-based functional safety management in life cycle are also discussed.
Źródło:
Journal of Polish Safety and Reliability Association; 2013, 4, 2; 139--146
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security aspects in functional safety analysis
Autorzy:
Barnert, T.
Kosmowski, K. T.
Piesik, E.
Śliwiński, M.
Powiązania:
https://bibliotekanauki.pl/articles/2069339.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
functional safety
security
safety integrity level
SIL
evaluation assurance level
EAL
security assurance level
SAL
risk assessment
risk graphs
programmable control
protection systems
Opis:
A security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on proposed classification of communication channels used in the computer system / network and the scope of such system distribution. The functional safety analysis is to be performed at every stage of system lifecycle, but one of the most important parts is defining required safety functions and determining the safety integrity level for them. The integration concept might be taken into account at this stage. The basis of a method proposed is the assumption that the security level is considered as a risk parameter in graphs of functional safety analyses.
Źródło:
Journal of Polish Safety and Reliability Association; 2014, 5, 1; 1--8
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Current issue of functional safety and cybersecurity analysis of industrial and critical infrastructures
Autorzy:
Śliwiński, Marcin
Kosmowski, Kazimierz, T.
Piesik, Emilian
Powiązania:
https://bibliotekanauki.pl/articles/1955259.pdf
Data publikacji:
2019
Wydawca:
Politechnika Gdańska
Tematy:
cybersecurity
functional safety
safety integrity level
security level
evaluation assurance level
industrial control system
safety instrumented system
Opis:
This article addresses some functional safety assessment procedures with cybersecurity aspects in critical industrial installations with regard to the functional safety requirements specified in standards IEC 61508 and IEC 61511. The functional safety management includes hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on the risk assessment results, the safety integrity level (SIL) is determined for consecutive safety functions. These functions are implemented within the industrial control system (ICS) and/or the distributed control system (DCS) that consists of the basic process control system (BPCS) and/or the safety instrumented system (SIS). The determination of the required SIL related to the required risk mitigation is based on the semi-quantitative evaluation method. Verification of the SIL for the considered architectures o fthe BPCS and/or the SIS is supported by probabilistic models with appropriate data and model parameters including cybersecurity related aspects. The proposed approach is illustrated on the example of critical industrial installations.
Źródło:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk; 2019, 23, 2; 209-232
1428-6394
Pojawia się w:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
Autorzy:
Kosmowski, K. T.
Śliwiński, M.
Piesik, E.
Powiązania:
https://bibliotekanauki.pl/articles/2069111.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
hazardous plants
critical infrastructure
safety and security
protection systems
cyber security
Opis:
This article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology known as the security vulnerability analysis (SVA) developed for hazardous plants of chemical industry. It is based on rings of protection concept to secure widely understood assets. This concept seems to be compatible with layer of protection analysis (LOPA), which is consistent with functional safety concept of the control and protection systems including cyber security aspects. It is outlined how to use these approaches in an integrated way for safety and security analysis of hazardous industrial plants and systems of critical infrastructure.
Źródło:
Journal of Polish Safety and Reliability Association; 2015, 6, 2; 31--46
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Integrated functional safety and cybersecurity. Analysis method for smart manufacturing systems
Autorzy:
Kosmowski, Kazimierz T.
Śliwiński, Marcin
Piesik, Jan
Powiązania:
https://bibliotekanauki.pl/articles/1955260.pdf
Data publikacji:
2019
Wydawca:
Politechnika Gdańska
Tematy:
smart manufacturing systems
Industry 4.0
information technology
operational technology
industrial automation and control systems
functional safety
cybersecurity
risk evaluation
Opis:
This article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental requirements (FRs). A method is proposed for determining and verifying the performance level (PL) or the safety integrity level (SIL) of defined safety functions, and then validating these levels depending on the security level (SL) of a particular domain,e.g.a safety related control system (SRCS). The method is general in the sense that it is based on risk graphs prepared for individual risk and/or societal/group risk with regard to the criteria defined.
Źródło:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk; 2019, 23, 2; 177-207
1428-6394
Pojawia się w:
TASK Quarterly. Scientific Bulletin of Academic Computer Centre in Gdansk
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Procedure based proactive functional safety management for the risk mitigation of hazardous events in the oil port installations including insurance aspects
Autorzy:
Kosmowski, K. T.
Śliwiński, M.
Piesik, E.
Gołębiewski, D.
Powiązania:
https://bibliotekanauki.pl/articles/2069078.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
functional safety
security
industrial control systems
oil port installations
risk evaluation
insurance
Opis:
This article addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety requirements specified in standards IEC 61508 and IEC 61511. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on risk assessment results the safety integrity level (SIL) is determined for consecutive safety functions. These functions are implemented within industrial control system (ICS) that consists of the basic process control system (BPCS) and/or safety instrumented system (SIS). Determination of required SIL related to required risk mitigation is based on semi-quantitative evaluation method. Verification of SIL for considered architectures of BPCS and/or SIS is supported by probabilistic models with appropriate data and model parameters including security-related aspects. The approach proposed is illustrated on example of oil port installations. In final part of the article the insurance aspects are discussed in managing risks, as some risks are to be transferred to an insurance company.
Źródło:
Journal of Polish Safety and Reliability Association; 2016, 7, 1; 147--156
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Dimensioning and Routing in the IP QoS System
Autorzy:
Góralski, W.
Pyda, P.
Dalecki, T.
Mongay Batalla, J.
Śliwiński, J.
Latoszek, W.
Gut, H.
Powiązania:
https://bibliotekanauki.pl/articles/307866.pdf
Data publikacji:
2011
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
IP QoS System
resource dimensioning
routing
Opis:
This article presents dimensioning and routing solutions in IP QoS System designed during the implementation of the PBZ project: "Next Generation Services and Networks - technical, application and market aspects: Traffic management - IP QoS System". The paper presents the functional architecture together to the description of the functions and methods implemented in the system.
Źródło:
Journal of Telecommunications and Information Technology; 2011, 3; 21-28
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies