|
|
|
Yuan Luo, Jiakai Lu, Yi Zhang, Qiong Qin and Yanyu Liu
This research can be applied to path planning and automatic obstacle avoidance of drone in low altitude complex environments.
|
|
|
|
|
|
|
Alexandros Deloukas, Efthymia Apostolopoulou
Pág. 459 - 466
The paper conceptualises the resilience engineering of the urban transport system (UTS) using the example of the Athens metro. Resilience management guidelines for the UTS have been developed, whereas Athens metro pilots validate the former. The pilots a...
ver más
|
|
|
|
|
|
|
Zeyang Wang, Jun Huang and Mingxu Yi
Unmanned aerial helicopters (UAHs) have been widely used recently for reconnaissance operations and other risky missions. Meanwhile, the threats to UAHs have been becoming more and more serious, mainly from radar and flights. It is essential for a UAH to...
ver más
|
|
|
|
|
|
|
Arslan Munir, Alexander Aved and Erik Blasch
Situational awareness (SA) is defined as the perception of entities in the environment, comprehension of their meaning, and projection of their status in near future. From an Air Force perspective, SA refers to the capability to comprehend and project th...
ver más
|
|
|
|
|
|
|
Elena N. Prokofieva,Klavdiya G. Erdyneeva,Dilyara N. Efremova,Natalia L. Avilova,Elena G. Savina
Pág. 322 - 327
The relevance of the paper is conditioned by the multiple threats for social and personal security in the modern world. The purpose of the paper is aimed at supporting of acceptable security risks in real conditions of educational institutions? functioni...
ver más
|
|
|
|
|
|
|
Zheping Yan, Weidong Liu, Wen Xing and Enrique Herrera-Viedma
How an autonomous underwater vehicle (AUV) performs fully automated task allocation and achieves satisfactory mission planning effects during the search for potential threats deployed in an underwater space is the focus of the paper. First, the task assi...
ver más
|
|
|
|
|
|
|
Subhan Ullah, Zahid Mahmood, Nabeel Ali, Tahir Ahmad and Attaullah Buriro
The exponential growth of the Internet of Things (IoT) has led to the rapid expansion of interconnected systems, which has also increased the vulnerability of IoT devices to security threats such as distributed denial-of-service (DDoS) attacks. In this p...
ver más
|
|
|
|
|
|
|
Avi Shaked and Oded Margalit
The cyber threat landscape is highly dynamic, posing a significant risk to the operations of systems and organisations. An organisation should, therefore, continuously monitor for new threats and properly contextualise them to identify and manage the res...
ver más
|
|
|
|
|
|
|
Zihao Liu, Zhaolin Wu, Zhongyi Zheng and Xianda Yu
With the rapid development of the shipping industry in recent years, the increasing volume of ship traffic makes marine traffic much busier and more crowded, especially in the waterway off the coast. This leads to the increment of the complexity level of...
ver más
|
|
|
|
|
|
|
Lifei Song, Xiaoqian Shi, Hao Sun, Kaikai Xu and Liang Huang
Dynamic collision avoidance between multiple vessels is a task full of challenges for unmanned surface vehicle (USV) movement, which has high requirements on real-time performance and safety. The difficulty of multi-obstacle collision avoidance is that i...
ver más
|
|
|
|
|
|
|
Jian Wang and Ying Li
Ensuring the security of IoT devices and chips at runtime has become an urgent task as they have been widely used in human life. Embedded memories are vital components of SoC (System on Chip) in these devices. If they are attacked or incur faults at runt...
ver más
|
|
|
|
|
|
|
Dohoon Kim
Most recent cyberattacks have employed new and diverse malware. Various static and dynamic analysis methods are being introduced to detect and defend against these attacks. The malware that is detected by these methods includes advanced present threat (A...
ver más
|
|
|
|
|
|
|
Mohammad Taghi Taghavifard, Hannan Amoozad Mahdiraji, Amir Massoud Alibakhshi, Edmundas Kazimieras Zavadskas and Romualdas Bausys
When considering today?s uncertain atmosphere, many people and organizations believe that strategy has lost its meaning and position. When future is predictable, common approaches for strategic planning are applicable; nonetheless, vague circumstances re...
ver más
|
|
|
|
|
|
|
Linda Jessica De Montreuil Carmona,Iara Regina dos Santos Parisotto
Pág. 50 - 68
With increasingly fiercer competition, many industrial firms with similar characteristics are concerned with obtaining competitive advantages that allow them to differentiate themselves for survival, efficiency and profitability. Based on the Dynamic Cap...
ver más
|
|
|
|
|
|
|
Donato Zingaro, Ivan Portoghese, Giacomo Giannoccaro
Pág. 1 - 16
Agriculture and farming worldwide are responsible for numerous environmental threats, including degradation of land and water resource depletion. Underlining the dynamic interaction between bio-physical and socio-economic drivers is the key towards a mor...
ver más
|
|
|
|
|
|
|
Donato Zingaro, Ivan Portoghese and Giacomo Giannoccaro
Agriculture and farming worldwide are responsible for numerous environmental threats, including degradation of land and water resource depletion. Underlining the dynamic interaction between bio-physical and socio-economic drivers is the key towards a mor...
ver más
|
|
|
|
|
|
|
Wojciech Sikorski, Krzysztof Walczak and Piotr Przybylek
Most power transformers operating in a power system possess oil-paper insulation. A serious defect of this type of insulation, which is associated with long operation time, is an increase in the moisture content. Moisture introduces a number of threats t...
ver más
|
|
|
|
|
|
|
Sajida Parveen, Sharifah Mumtazah Syed Ahmad, Nidaa Hasan Abbas, Wan Azizun Wan Adnan, Marsyita Hanafi and Nadeem Naeem
Face spoofing is considered to be one of the prominent threats to face recognition systems. However, in order to improve the security measures of such biometric systems against deliberate spoof attacks, liveness detection has received significant recent ...
ver más
|
|
|
|
|
|
|
R. Mythili,N. Revathi Venkataraman
Pág. 105 - 111
Future Internet comprises of emerging ICT mega-trends (e.g., mobile, social, cloud, and big data) commands new challenges like ubiquitous accessibility, high bandwidth, and dynamic management to meet the data tsunami requirements. In the recent years, th...
ver más
|
|
|
|
|
|
|
P. J.S. Bruwer
AbstractA strategical management approach towards security and control within a complex computerized information system environment In a dynamic technological computer environment it is essential for management to establish a logical and systematic proce...
ver más
|
|
|
|