Search results for "Defence"

showing 10 items of 472 documents

Ownership protection of plenoptic images by robust and reversible watermarking

2018

Abstract Plenoptic images are highly demanded for 3D representation of broad scenes. Contrary to the images captured by conventional cameras, plenoptic images carry a considerable amount of angular information, which is very appealing for 3D reconstruction and display of the scene. Plenoptic images are gaining increasing importance in areas like medical imaging, manufacturing control, metrology, or even entertainment business. Thus, the adaptation and refinement of watermarking techniques to plenoptic images is a matter of raising interest. In this paper a new method for plenoptic image watermarking is proposed. A secret key is used to specify the location of logo insertion. Employing discr…

Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION0211 other engineering and technologies02 engineering and technologysymbols.namesakeRobustness (computer science)0202 electrical engineering electronic engineering information engineeringDiscrete cosine transformMedian filterComputer visionElectrical and Electronic EngineeringDigital watermarking021110 strategic defence & security studiesbusiness.industryMechanical EngineeringWatermarkÒpticaPeak signal-to-noise ratioAtomic and Molecular Physics and OpticsElectronic Optical and Magnetic MaterialsGaussian noiseHuman visual system modelsymbols020201 artificial intelligence & image processingArtificial intelligencebusinessImatges Processament Tècniques digitalsOptics and Lasers in Engineering
researchProduct

Passenger Car Equivalents for Heavy Vehicles at Roundabouts. a Synthesis Review

2019

Passenger Car Equivalents (PCEs in the following) are used to transform a mixed fleet of vehicles into a fleet of equivalent passenger cars and to analyze capacity and level-of-service of roads and intersections. Most roundabouts guidelines propose constant values for PCEs but a single PCE value can result improper under heterogeneous traffic conditions. PCEs should be vary with traffic and road conditions and consequently PCEs applied to undersaturated traffic conditions can overestimate the heavy vehicle effect or be not sensitive to the traffic level or characteristics of heavy vehicles. Compared to other at-grade intersections, the interaction between the operational performances of the…

Computer scienceGeography Planning and Development0211 other engineering and technologiesMicrosimulation020101 civil engineering02 engineering and technology0201 civil engineeringTransport engineeringlcsh:HT165.5-169.9roundaboutSettore ICAR/04 - Strade Ferrovie Ed Aeroporti021110 strategic defence & security studiesheavy vehiclescapacitymicrosimulationTraffic simulationBuilding and Constructionlcsh:City planningTraffic flowUrban Studiespassenger car equivalentlcsh:TA1-2040Traffic conditionsRoundaboutstatistical methodsPassenger car equivalentEstimation methodslcsh:Engineering (General). Civil engineering (General)Frontiers in Built Environment
researchProduct

A risk evaluation framework for the best maintenance strategy: the case of a marine salt manufacture firm

2020

Highlights • This paper proposes a MCDM framework to support risk evaluation for maintenance activities. • The ANP is proposed to select the best maintenance strategy on the basis of real systems’ features. • The ELECTRE III is used to prioritise the main risks related to the interventions of the selected maintenance policy. • The proposed framework is applied to a core subsystem of a real-world marine salt manufacture firm.

Computer scienceSalt (cryptography)Analytic network processmedia_common.quotation_subject0211 other engineering and technologies09.- Desarrollar infraestructuras resilientes promover la industrialización inclusiva y sostenible y fomentar la innovación02 engineering and technologyArticleIndustrial and Manufacturing EngineeringSettore ING-IND/17 - Impianti Industriali MeccaniciELECTRESafety Risk Reliability and QualityMaintenance policy selection risk evaluation ANP ELECTRE IIImedia_commonELECTRE III021110 strategic defence & security studies021103 operations researchRisk evaluationMultiple-criteria decision analysisRisk evaluationInterdependenceCore (game theory)Intervention (law)Risk analysis (engineering)Maintenance policy selectionMATEMATICA APLICADAANP
researchProduct

Estimation of Passenger Car Equivalents for Two-Lane and Turbo Roundabouts Using AIMSUN

2020

The paper addresses issues related to Passenger Car Equivalents (PCEs) at roundabouts. Compared to other road units, the curvilinear elements of roundabout geometric design may impose greater constraints on vehicular trajectories and have a significant effect on the swept envelope of heavy vehicles. Specifically, the aim of the paper is to present the methodological approach which used traffic microsimulation to estimate PCEs. Focus is made on a case study which considered the conversion of a two-lane roundabout into a basic turbo roundabout with comparable size. Empirical capacity functions for both roundabouts were derived as target values to which simulated capacities by lane were compar…

Computer scienceTurboGeography Planning and Development0211 other engineering and technologiesMicrosimulation020101 civil engineering02 engineering and technologyAutomotive engineering0201 civil engineeringlcsh:HT165.5-169.9Highway Capacity ManualSettore ICAR/04 - Strade Ferrovie Ed Aeroporti021110 strategic defence & security studiesbiologycapacitymicrosimulationBuilding and Constructionturbo roundaboutlcsh:City planningTraffic flowbiology.organism_classificationtwo-lane roundaboutUrban StudiesGeometric designpassenger car equivalentlcsh:TA1-2040RoundaboutPassenger car equivalentlcsh:Engineering (General). Civil engineering (General)Envelope (motion)Frontiers in Built Environment
researchProduct

An improvement of NFC-SEC with signed exchanges for an e-prescription-based application

2013

International audience; In the context of an aging population, drug intake can be a potential source of errors leading to death in some cases. Almost all of these errors are unintentional and come from incorrect prescriptions, unsuitable dosages for the patient or incompatibility with other treatments. To limit these risks which are especially important in the elderly or pre-dependency, we propose a secure system for drug treatment through the NFC (Near Field Communication) contact-less communication technology. The proposed system provides security mechanisms such as integrity, authentication, encryption and non-repudiation. To ensure this security, an extension of the international standa…

Computer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]NFC0211 other engineering and technologiesSystème d'exploitationE-signatureRéseaux et télécommunicationsContext (language use)02 engineering and technologyEncryptionComputer securitycomputer.software_genreNear field communication[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Architectures Matérielles0202 electrical engineering electronic engineering information engineeringMedical prescription021110 strategic defence & security studiesAuthentication[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryInternational standard020207 software engineeringPublic key infrastructureSystèmes embarquésElectronic signatureSSTA3. Good healthERISISHealthcare applicationSecurityE-prescriptionISO/IEC 13157businesscomputer
researchProduct

Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection

2017

The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing be…

Computer scienceintrusion detection0211 other engineering and technologiesDecision tree02 engineering and technologycomputer.software_genreComputer securitymobiililaitteet0202 electrical engineering electronic engineering information engineeringsupervised machine learningSoarAndroid (operating system)tietoturvata113021110 strategic defence & security studiesta213business.industrymobile threatsensemble methods020206 networking & telecommunicationsFlow networkEnsemble learninganomaly detectionmachine learningkoneoppiminenMalwareThe InternetbusinesscomputerMobile device
researchProduct

Initiation of deep convection at marginal instability in an ensemble of mesoscale models: a case-study from COPS

2011

The present study investigates the initiation of precipitating deep convection in an ensemble of convection-resolving mesoscale models. Results of eight different model runs from five non-hydrostatic models are compared for a case of the Convective and Orographically-induced Precipitation Study (COPS). An isolated convective cell initiated east of the Black Forest crest in southwest Germany, although convective available potential energy was only moderate and convective inhibition was high. Measurements revealed that, due to the absence of synoptic forcing, convection was initiated by local processes related to the orography. In particular, the lifting by low-level convergence in the planet…

Convection021110 strategic defence & security studiesAtmospheric ScienceConvective inhibition010504 meteorology & atmospheric sciencesMeteorologyPlanetary boundary layer0211 other engineering and technologiesMesoscale meteorologyOrography02 engineering and technologyForcing (mathematics)01 natural sciencesConvective available potential energyFree convective layerPhysics::Fluid Dynamics13. Climate actionClimatologyPhysics::Atmospheric and Oceanic PhysicsGeology0105 earth and related environmental sciencesQuarterly Journal of the Royal Meteorological Society
researchProduct

Modeling of biomass smoke injection into the lower stratosphere by a large forest fire (Part I): reference simulation

2006

Abstract. Wildland fires in boreal regions have the potential to initiate deep convection, so-called pyro-convection, due to their release of sensible heat. Under favorable atmospheric conditions, large fires can result in pyro-convection that transports the emissions into the upper troposphere and the lower stratosphere. Here, we present three-dimensional model simulations of the injection of fire emissions into the lower stratosphere by pyro-convection. These model simulations are constrained and evaluated with observations obtained from the Chisholm fire in Alberta, Canada, in 2001. The active tracer high resolution atmospheric model (ATHAM) is initialized with observations obtained by r…

ConvectionAtmospheric SciencePyrocumulonimbus cloudMeteorology010504 meteorology & atmospheric sciences0211 other engineering and technologies02 engineering and technologySensible heatAtmospheric sciences7. Clean energy01 natural scienceslcsh:ChemistryTropospherePhysics::Fluid DynamicsLatent heatCloud baseAstrophysics::Solar and Stellar AstrophysicsStratospherePhysics::Atmospheric and Oceanic Physics0105 earth and related environmental sciences040101 forestry[SDU.OCEAN]Sciences of the Universe [physics]/Ocean Atmosphere021110 strategic defence & security studies04 agricultural and veterinary sciences15. Life on landlcsh:QC1-999lcsh:QD1-99913. Climate action0401 agriculture forestry and fisheriesEnvironmental scienceTropopauselcsh:Physics
researchProduct

The 1-way on-line coupled atmospheric chemistry model system MECO(n) – Part 3: Meteorological evaluation of the on-line coupled system

2012

Abstract. Three detailed meteorological case studies are conducted with the global and regional atmospheric chemistry model system ECHAM5/MESSy(→COSMO/MESSy)n, shortly named MECO(n), in order to assess the general performance of the on-line coupling of the regional model COSMO to the global model ECHAM5. The cases are characterised by intense weather systems in Central Europe: an intense cold frontal passage in March 2010, a convective frontal event in July 2007, and the high impact winter storm "Kyrill" in January 2007. Simulations are performed with the new on-line-coupled model system and compared to classical, off-line COSMO hindcast simulations driven by ECMWF analyses. Precipitation o…

Convectionmodel evaluationnestingMeteorology010504 meteorology & atmospheric sciencesatmospheric model0207 environmental engineering0211 other engineering and technologies02 engineering and technologyprecipitation01 natural sciencesMESSyHindcastPrecipitationmeteorology020701 environmental engineeringLine (formation)0105 earth and related environmental sciences021110 strategic defence & security studiesglobal modelregional modelCOSMOlcsh:QE1-996.5Stormlcsh:GeologyCold front13. Climate actionAtmospheric chemistryClimatologyEnvironmental sciencemodel couplingDynamik der AtmosphäreLead time
researchProduct

Making Communication Strategy Choices in a Fast Evolving Crisis Situation—Results from a Table-Top Discussion on an Anthrax Scenario

2016

This paper aims at clarifying a timely topic of how communication strategy choices are made in evolving, complex crises, such as those caused by terrorism involving chemical, biological, radiological, or nuclear (CBRN) agents. This is done by examining data gathered from a table-top discussion among crisis communication experts, focusing on a scenario of an anthrax attack and analysed qualitatively. The communication experts followed the evolving crisis situation by gathering inputs from various actors in the crisis management network, thereby creating situational understanding, and interpreted these inputs for decision-making on communication strategies. The underlying process of coping wi…

Coping (psychology)Process managementcommunication strategies; crisis communication; terrorism0211 other engineering and technologies050801 communication & media studies02 engineering and technologyCrisis managementkriisiviestintälcsh:Social Sciences0508 media and communicationsterrorismicommunication strategiesta518Situational ethicscrisis communicationCrisis communication021110 strategic defence & security studiesManagement science05 social sciencesGeneral Social Sciencesviestintästrategiatterrorism16. Peace & justicelcsh:HPreparednessTerrorismPsychology
researchProduct