Search results for "Computer Science"
showing 10 items of 22367 documents
Serious Game Design for Flooding Triggered by Extreme Weather
2017
Managing crises with limited resources through a serious game is deemed as one of the ways of training and can be regarded as an alternative to a table-top exercise. This article presents the so-called “Operasjon Tyrsdal” serious game, inspired by a real case of extreme weather that hit the west coast of Norway. This reference case is used to add realism to the game. The game is designed for a single player, while the mechanics are framed in such a way that the player will have limited resources, and elevated event pressure over time. Beside applying an iterative Scrum method with seven Sprint cycles, we combined the development work with desk research and used the involvement of testers, i…
Ensuring the Reliability of an Autonomous Vehicle
2017
International audience; In automotive applications, several components, offering different services, can be composed in order to handle one specific task (autonomous driving for example). Nevertheless, component composition is not straightforward and is subject to the occurrence ofbugs resulting from components or services incompatibilities for instance. Hence, bugs detection in component-based systems at thedesign level is very important, particularly, when the developed system concerns automotive applications supporting critical services.In this paper, we propose a formal approach for modeling and verifying the reliability of an autonomous vehicle system, communicatingcontinuously with of…
A Novel Intelligent Technique for Product Acceptance Process Optimization on the Basis of Misclassification Probability in the Case of Log-Location-S…
2019
In this paper, to determine the optimal parameters of the product acceptance process under parametric uncertainty of underlying models, a new intelligent technique for optimization of product acceptance process on the basis of misclassification probability is proposed. It allows one to take into account all possible situations that may occur when it is necessary to optimize the product acceptance process. The technique is based on the pivotal quantity averaging approach (PQAA) which allows one to eliminate the unknown parameters from the problem and to use available statistical information as completely as possible. It is conceptually simple and easy to use. One of the most important featur…
Exploring relationships between grid cell size and accuracy for debris-flow susceptibility models: a test in the Giampilieri catchment (Sicily, Italy)
2016
Debris flows are among the most hazardous phenomena in nature, requiring the preparation of suscep- tibility models in order to cope with this severe threat. The aim of this research was to verify whether a grid cell-based susceptibility model was capable of predicting the debris- flow initiation sites in the Giampilieri catchment (10 km2), which was hit by a storm on the 1st October 2009, resulting in more than one thousand landslides. This kind of event is to be considered as recurrent in the area as attested by historical data. Therefore, predictive models have been prepared by using forward stepwise binary logistic regression (BLR), a landslide inventory and a set of geo- environmental …
Watermarking for ontologies
2011
In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.
Understanding the Importance of Proper Incentives for Critical Infrastructures Management – How System Dynamics Can Help
2016
International audience; Computer and information systems are now at the core of numerous critical infrastructures. However, their security management is by far not a trivial issue. Further, these systems, by their very nature, belong to the domain of complex systems, where system dynamics (SD) is an established method, which aims at modelling such systems, their analysis and understanding. Further, on this basis it enables simulation of various policies to properly manage complex systems. More precisely, through understanding of the basic elements of the whole mosaic and their interplay, proper incentives can be tested. And this is important, because proper incentives can lead to the desire…
Intelligent Constructing Exact Tolerance Limits for Prediction of Future Outcomes Under Parametric Uncertainty
2021
The problem of constructing one-sided exact statistical tolerance limits on the kth order statistic in a future sample of m observations from a distribution of log-location-scale family on the basis of an observed sample from the same distribution is considered. The new technique proposed here emphasizes pivotal quantities relevant for obtaining tolerance factors and is applicable whenever the statistical problem is invariant under a group of transformations that acts transitively on the parameter space. The exact tolerance limits on order statistics associated with sampling from underlying distributions can be found easily and quickly making tables, simulation, Monte Carlo estimated percen…
A New Intelligent Technique of Constructing Optimal Airline Seat Protection Levels for Multiple Nested Fare Classes of Single-Leg Flights
2019
A new, rigorous formulation of the optimization problem of airline seat protection levels for multiple nested fare classes is presented. A number of results useful for practical application are obtained. A numerical example is given.
Data Sources Handling for Emergency Management: Supporting Information Availability and Accessibility for Emergency Responders
2017
Information is an essential component for better emergency response. Although a lot of information being available at various places during any kind of emergency, many emergency responders (ERs) use only a limited amount of the available information. The reason for this is that the available information heterogeneously distributed, in different formats, and ERs are unable to get access to the relevant information. Moreover, without having access to the needed information, many emergency responders are not able to obtain a sufficient understanding of the emergency situation. Consequently, a lot of time is being used to search for the needed information and poor decisions may be made. Therefo…
Las normas ISO/IEC como mecanismos de responsabilidad proactiva en el Reglamento General de Protección de Datos
2021
El mercado de la certificación ha experimentado un auge sin precedentes tras la entrada en vigor y ulterior aplicación del RGPD. Ello obliga a poner de relieve la relevancia de estos mecanismos como elementos claves en la prevención de potenciales violaciones de la seguridad de los datos personales. En el presente trabajo examinamos cómo la naturaleza técnica de estos instrumentos ha cedido hacia su corregulación a los efectos de garantizar una adaptación efi ciente a los continuos cambios de una gran tipología de productos, servicios o sistemas. Pretende proporcionarse una panorámica holística sobre la práctica totalidad de estándares que afectan a las dimensiones de privacidad y protecció…