Robert Waszkowski

Robert Waszkowski
Military University of Technology | WAT · Faculty of Cybernetics

Ph.D. Eng.

About

141
Publications
45,376
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
217
Citations
Introduction
Robert Waszkowski currently works at the Faculty of Cybernetics, Military University of Technology. Robert does research in Databases, Information Systems (Business Informatics) and Software Engineering.

Publications

Publications (141)
Article
Full-text available
Increasing the efficiency and effectiveness of maintenance processes is a constant goal of production companies. The elimination of unexpected failures that generate excessive costs and production losses is emphasized. Not only the selection of an appropriate maintenance strategy, but also the use of appropriate methods and tools to support the dec...
Article
Full-text available
In this paper, we introduce the idea of the ‘visibility matrix’ for automated data entry form generation in low-code development platforms. We then focus on the problem of software development productivity in the area of automated software generation as the main factor of the Industry 4.0 concept in the area of business information. In our study, t...
Article
Full-text available
The article discusses the competencies of vocational education teachers, as well as discusses the results of own research, which aimed to determine three types of teachers conceptualized by students - the most liked, the least liked, and the dream one. The research used the interview method, where the research technique was an interview, and the re...
Article
The purpose of this paper is to identify the barriers of I4.0 technologies implementation in maintenance. Based on literature analysis twenty two barriers of I4.0 technologies implementation are determined and classified into five main groups such as “Strategy and Organization”; “Maintenance staff knowledge and training”; “Resources”; “Technology a...
Conference Paper
The paper presents business processes related to the work of sanitary services in cases of an epidemic of foodborne diseases. On their basis, simulation exercises according to given scenarios were developed. The work is related to the implementation of a project financed by the National Center for Research and Development. The activities of the sta...
Conference Paper
The paper introduces overall low-code platform architecture for business process automation. The architecture assumes the division of the platform into subsystems organized in the substantive layer, as well as in the layers of system management and integration. The substantive layer consists of the Design and Development, Metadata Repository, Deplo...
Article
Full-text available
The transport of the winning in deep mines, using the room and pillar mining system, is most often performed with bucket loaders and haul trucks. In the era of attempts to stop rapid climate change, it is crucial to choose the transport means for the winning both in terms of efficiency and cost-effectiveness and to consider its environmental aspect...
Conference Paper
Full-text available
One of the pillars of Lean Management is continuous improvement of production processes. Thus, while designing new workstations, it is worth taking into account the requirements resulting from this management philosophy. The question remains how to formulate these requirements, at what design stage to use them and how to do it. A very important asp...
Article
Full-text available
3D printing methods are constantly gaining in popularity among investors, allowing for the production of products with a complex structure, and also used in the production of products with increasingly longer production series. It is planned to build factories (or those already under construction) in which 3D printing devices are the basic producti...
Chapter
Full-text available
The article presents a solution to the problem of performing some specific tasks in business processes. More specifically, the problem is that there are tasks that are performed by people outside the main business process automation system. Such tasks require building a separate runtime environment and providing all necessary data to complete these...
Article
Full-text available
The paper presents business processes business process models in the area of contract management in a workwear rental and laundry service company. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team consists of IT specialist, subject-matter experts and employees of the rental com...
Chapter
The paper presents system architecture for the RFID-equipped restricted access administrative office. All the facilities in the administrative office are equipped with RFID readers placed in cabinets, desks, copiers and entrance sluices to allow immediately read of documents that are within their reach. Presented hardware and software components as...
Chapter
Full-text available
The article describes a solution for monitoring the presence and movement of workers between production halls in the factory. The physical structure of the monitoring system components based on RFID antennas and chips embedded in every clothing element of an employee is presented. The hardware and software architecture of the solution is also prese...
Chapter
Full-text available
This work considers the problem of choosing the right strategy for clothes distribution in a rental company warehouse. The basic criterion for the clothing arrangement assessment is, among others, optimization of employees’ working time, and thus ergonomics. It is assumed that the incoming orders stream is known.
Chapter
Full-text available
The paper discusses selected problems and issues in the scope of safety and risk of the production process. Various categories of risk factors have been classified and characterized, affecting the level of functional and information security of the production process. A model of quality and safety of the production process was proposed, which indic...
Chapter
Full-text available
Nowadays, almost every modeling notation uses graphical representation to explain the scope of the model. However, graphical symbols are not suitable in every situation. In computer to computer exchange, for instance, there is no need to use graphical symbols. What more, they are not welcome, because it produces only difficulties with writing, exch...
Article
Full-text available
The low-code platform enables quick generation and delivery of business applications with minimum effort to write in a coding language and requires the least possible effort for the installation and configuration of environments, and training and implementation. With a rapidly growing number of companies, the use of low-code solutions can be a sign...
Conference Paper
Full-text available
The testing stage, creating great opportunities to verify and shape software reliability, significantly increases the cost of its production. The effectiveness of the work related to testing, expressed by the interdependence of the level of program product reliability and the cost of testing it, strongly depends on the adopted testing strategy, spe...
Article
Full-text available
The paper describes the use of new possibilities of the Spread Page notation for knowledge representation, such as Three-dimensional Representation, Time-varying Representation, Layered Representation, Scaled Detail Representation, Aspect-oriented Representation to describe activities and data in business processes. The knowledge representation met...
Conference Paper
Models of artificial neural networks can be used to control a production system, and thus to ensure its stability. Such models are very useful tools, because they can be built quickly and easily. The paper presents the possibility to use an artificial neural network for forecasting the production volume. A production plant manufacturing flywheels w...
Conference Paper
Full-text available
The paper describes the use of new possibilities of the Spread Page notation for knowledge representation, such as Three-dimensional Representation, Time-varying Representation, Layered Representation, Scaled Detail Representation, Aspect-oriented Representation to describe metadata and the dynamics of displacement of documents in the restricted ac...
Conference Paper
Full-text available
This paper describes the concept and system design of the classified document flow management module. It considers tracking and visualizing of on-premises and off-premises documents displacement. The requirements model connected with documents traceability as far as the methods of documents tracking visualization were developed and presented in thi...
Conference Paper
Full-text available
Due to the fact that the quality of the entire process is more and more dependent on the maintenance process, must be carefully designed and effectively implemented. There are various techniques and approaches that may be applied for efficient and effective maintenance management. This study presents the application of the modeling tools and proces...
Article
Full-text available
The paper outlines the concept for using the Business Process Management System (BPMS) to improve processes in a rental company. It also presents a case study of the implementation of the process approach in a medium-sized company dealing in the production, rental and service of work and protective clothing. The aim of the paper is to prepare refer...
Article
Full-text available
The paper outlines the concept for using the Business Process Management System (BPMS) to improve back office processes in an organization. The BPM system allows organization of all back-office tasks into processes that could be measured and improved. The aim of the paper is to prepare reference business process models for common back office activi...
Conference Paper
Full-text available
This article presents the implementation of “14 Quality Principles for Value Streams” in the company from the automotive industry. The Bosch Company has created a set of 14 principles and special criteria that it considered most important for its production system. Deploying them to all positions has become a superior goal for the entire organizati...
Conference Paper
Full-text available
Growing process maturity of Polish organizations, causes a growing demand for information technology to meet business expectations. The answer to these needs is Business Process Management. This article brings together the functionality of Business Process Management systems and the benefits of their implementation. Tools are compared according to...
Conference Paper
Full-text available
The paper attempts to describe a method of using formal evaluating the impact of testing of software on the level of its reliability. Presented method has been developed on the basis of formal model of software testing process that has been constructed in the paper for some assumed testing scheme. Using the discrete-time software reliability-growth...
Conference Paper
Full-text available
This article outlines methods of business process automation for the purpose of the RFID-equipped restricted access administrative office. The events, which constitute part of the Business Process Model and Notation (BPMN), were extended in such a manner so as to allow performance of automated actions during their occurrence. Additionally, an analo...
Conference Paper
Full-text available
The paper presents the system architecture for the access control subsystem for the RFID-equipped restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secret o...
Conference Paper
Full-text available
Task execution duration depends on the employee who performs the task. Specifically in IT projects, an experienced employee can perform assigned tasks several times faster than a novice worker can. Preparing the schedule, project manager should take into account individuals’ productivity determined by analyzing historical data of tasks implementati...
Chapter
Full-text available
WSTĘP. Kontrola dostępu do dokumentów o różnych poziomach wrażliwości jest jednym z kluczowych wymagań systemu wspomagającego pracę Kancelarii. System informatyczny wspierający pracę Kancelistów powinien posiadać odpowiednio rozbudowany i opracowany moduł zarządzania uprawnieniami osób, pracujących na dokumentach o różnych poziomach wrażliwości. W...
Chapter
Full-text available
WPROWADZENIE. Podstawowym elementem w analizie własności systemu w kancelarii z dokumentami ze znacznikami RFID jest pojęcie zdarzenia. Zdarzenie powoduje wywołanie sekwencji działań pracowników kancelarii lub odpowiedniej reakcji systemu komputerowego wspomagającego działania personelu kancelarii. Ze zdarzeniami wiążą się zarówno badania niezawodn...
Chapter
Full-text available
WSTĘP. Jednym z kluczowych zadań Kancelarii jest przechowywanie oraz lokalizacja dokumentów o różnych poziomach wrażliwości. System wspomagający pracę Kancelarii powinien umożliwiać lokalizację dokumentu oraz w pełni kontrolować przemieszczanie dokumentu pomiędzy kolejnymi strefami. Wcelu zapewnienia kontroli przepływu dokumentów zaprojektowano or...
Article
Full-text available
The paper presents models of data flow between tasks in business processes describing work of a modern restricted access administrative office. The presented models are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secre...
Article
Full-text available
Spread Page is our code name for a new, more efficient way of conveying technical information and scientific knowledge – freed form the text-centered mindset and focused on graphical, interactive, multidimensional representation. The article presents an overview of current concepts and solutions that seem applicable in crafting the idea of Spread P...
Article
Full-text available
Recently, we have observed a slow departure from printed texts towards electronic publications. Such content may be presented in many ways, including time-dependent 3D representation, aspect representation, layer representation and multi-resolution representation. Spread Page Initiative refers to the development of notation and tools for knowledge...
Chapter
Full-text available
The paper describes the human-computer interaction principles for each of the teams participating in computer-aided simulation exercises for the State Sanitary Inspection. The exercises relate to activities undertaken during the crisis connected with a large outbreak of food poisoning or food-borne disease. The GUI design and ergonomics for the Tra...
Article
Full-text available
Background: The information exchange process within the supply chain management is considered key to managing physical product flow and improving cost and service performance of enterprises. There are many different types of information that can be shared within the supply chain. In some cases, the information shared has to be strongly secured. The...
Article
Full-text available
This paper presents the method for examining the properties of the RFID-tagged document management system. The system is composed of computers, where the software for supporting processes of the RFID-tagged documents was installed. Furthermore, the system cooperates with many other elements of the office (cabinets, sluices, copiers, try rider, end...
Conference Paper
Full-text available
Abstract. The paper presents models of data flow between tasks in business processes describing work of a modern restricted access administrative office. The presented models are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of...
Article
Full-text available
Strategic management must now be closely linked to the management at the operational level, because only in such a situation the company can be flexible and can quickly respond to emerging opportunities and pursue ever-changing strategic objectives. In these conditions industrial enterprises seek constantly new methods, tools and solutions which he...
Article
Full-text available
Epidemiological investigation during an outbreak of food-borne disease requires taking a number of activities carried out in the field. This results in a restriction of access to current data about the epidemic and reducing the possibility of transferring information from the field to headquarters. This problem can be solved by using an appropriate...
Article
Full-text available
The paper presents procedures performed in the administrative office processing open and secret documents. It is assumed that office is equipped with devices and software for automatic identification documents based on RFID tags. Office procedures have been presented in the form of business processes in BPMN.
Article
Full-text available
The study outlines the method for examining the properties of the RFID-tagged document management system. The system is composed of computers, where the software for supporting processes of the RFID-tagged doc-uments was installed. Furthermore, the system cooperates with many other elements of the secret office (cabinets, sluices, photocopiers, des...
Article
Full-text available
The paper presents models of data flow between RFID devices in a modern restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secret office. The presented model...
Article
Full-text available
The deliberations presented in this study refer to the method for assessing software reliability of the docu-ment management system, using the RFID technology. A method for determining the reliability structure of the dis-cussed software, understood as the index vector for assessing reliability of its components, was proposed. The model of the anal...
Article
Full-text available
The study is devoted to the issue of optimization of the document placement in a single RFID cabinet. It has been assumed that the optimization problem means the reduction of archivization time with respect to the information on all documents with RFID tags. Since the explicit form of the criterion function remains unknown, for the purpose of its a...
Article
Full-text available
The paper presents business processes in the RFID-equipped restricted access administrative office. The presented diagrams are the result of the analytical work performed by the multidisciplinary team of experts. The team was composed of IT specialist, security systems specialists and employees of the secret office. The presented models include the...
Article
Full-text available
Summary The paper presents the concept of performance characteristics investigation of an innovative electronic system for managing document tracking. The presented solution focuses on the use of the latest information and communication technologies related to Radio-Frequency Identification (RFID). The focus of the research concerns not only docume...
Chapter
Full-text available
The rapid growth of the IT market and of the related new technologies prompts companies to invest in IT systems that are continually upgraded and designed to accelerate, enhance and automate their corporate procedures. Therefore, numerous process modelling tools have been designed as an indispensable support to organizational development and one of...
Article
Full-text available
This paper presents the concept of an innovative electronic system for managing confidential document tracking. The research results are part of an R&D project partially supported by the National Centre for Research and Development under grant no. DOBR-BIO4/006/13143/2013. Both increasing the security level of documents and raising the security le...
Article
W artykule przedstawiono procedury realizowane w kancelarii przetwarzającej dokumenty jawne i niejawne o różnych poziomach wrażliwości. Założono, że kancelaria wyposażona jest w urządzenia i oprogramowanie pozwalające na automatyczną identyfikację dokumentów na podstawie znaczników RFID. Procedury kancelarii przedstawione zostały w postaci procesów...