Search results for "Defence"
showing 10 items of 472 documents
Ownership protection of plenoptic images by robust and reversible watermarking
2018
Abstract Plenoptic images are highly demanded for 3D representation of broad scenes. Contrary to the images captured by conventional cameras, plenoptic images carry a considerable amount of angular information, which is very appealing for 3D reconstruction and display of the scene. Plenoptic images are gaining increasing importance in areas like medical imaging, manufacturing control, metrology, or even entertainment business. Thus, the adaptation and refinement of watermarking techniques to plenoptic images is a matter of raising interest. In this paper a new method for plenoptic image watermarking is proposed. A secret key is used to specify the location of logo insertion. Employing discr…
Passenger Car Equivalents for Heavy Vehicles at Roundabouts. a Synthesis Review
2019
Passenger Car Equivalents (PCEs in the following) are used to transform a mixed fleet of vehicles into a fleet of equivalent passenger cars and to analyze capacity and level-of-service of roads and intersections. Most roundabouts guidelines propose constant values for PCEs but a single PCE value can result improper under heterogeneous traffic conditions. PCEs should be vary with traffic and road conditions and consequently PCEs applied to undersaturated traffic conditions can overestimate the heavy vehicle effect or be not sensitive to the traffic level or characteristics of heavy vehicles. Compared to other at-grade intersections, the interaction between the operational performances of the…
A risk evaluation framework for the best maintenance strategy: the case of a marine salt manufacture firm
2020
Highlights • This paper proposes a MCDM framework to support risk evaluation for maintenance activities. • The ANP is proposed to select the best maintenance strategy on the basis of real systems’ features. • The ELECTRE III is used to prioritise the main risks related to the interventions of the selected maintenance policy. • The proposed framework is applied to a core subsystem of a real-world marine salt manufacture firm.
Estimation of Passenger Car Equivalents for Two-Lane and Turbo Roundabouts Using AIMSUN
2020
The paper addresses issues related to Passenger Car Equivalents (PCEs) at roundabouts. Compared to other road units, the curvilinear elements of roundabout geometric design may impose greater constraints on vehicular trajectories and have a significant effect on the swept envelope of heavy vehicles. Specifically, the aim of the paper is to present the methodological approach which used traffic microsimulation to estimate PCEs. Focus is made on a case study which considered the conversion of a two-lane roundabout into a basic turbo roundabout with comparable size. Empirical capacity functions for both roundabouts were derived as target values to which simulated capacities by lane were compar…
An improvement of NFC-SEC with signed exchanges for an e-prescription-based application
2013
International audience; In the context of an aging population, drug intake can be a potential source of errors leading to death in some cases. Almost all of these errors are unintentional and come from incorrect prescriptions, unsuitable dosages for the patient or incompatibility with other treatments. To limit these risks which are especially important in the elderly or pre-dependency, we propose a secure system for drug treatment through the NFC (Near Field Communication) contact-less communication technology. The proposed system provides security mechanisms such as integrity, authentication, encryption and non-repudiation. To ensure this security, an extension of the international standa…
Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection
2017
The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing be…
Initiation of deep convection at marginal instability in an ensemble of mesoscale models: a case-study from COPS
2011
The present study investigates the initiation of precipitating deep convection in an ensemble of convection-resolving mesoscale models. Results of eight different model runs from five non-hydrostatic models are compared for a case of the Convective and Orographically-induced Precipitation Study (COPS). An isolated convective cell initiated east of the Black Forest crest in southwest Germany, although convective available potential energy was only moderate and convective inhibition was high. Measurements revealed that, due to the absence of synoptic forcing, convection was initiated by local processes related to the orography. In particular, the lifting by low-level convergence in the planet…
Modeling of biomass smoke injection into the lower stratosphere by a large forest fire (Part I): reference simulation
2006
Abstract. Wildland fires in boreal regions have the potential to initiate deep convection, so-called pyro-convection, due to their release of sensible heat. Under favorable atmospheric conditions, large fires can result in pyro-convection that transports the emissions into the upper troposphere and the lower stratosphere. Here, we present three-dimensional model simulations of the injection of fire emissions into the lower stratosphere by pyro-convection. These model simulations are constrained and evaluated with observations obtained from the Chisholm fire in Alberta, Canada, in 2001. The active tracer high resolution atmospheric model (ATHAM) is initialized with observations obtained by r…
The 1-way on-line coupled atmospheric chemistry model system MECO(n) – Part 3: Meteorological evaluation of the on-line coupled system
2012
Abstract. Three detailed meteorological case studies are conducted with the global and regional atmospheric chemistry model system ECHAM5/MESSy(→COSMO/MESSy)n, shortly named MECO(n), in order to assess the general performance of the on-line coupling of the regional model COSMO to the global model ECHAM5. The cases are characterised by intense weather systems in Central Europe: an intense cold frontal passage in March 2010, a convective frontal event in July 2007, and the high impact winter storm "Kyrill" in January 2007. Simulations are performed with the new on-line-coupled model system and compared to classical, off-line COSMO hindcast simulations driven by ECMWF analyses. Precipitation o…
Making Communication Strategy Choices in a Fast Evolving Crisis Situation—Results from a Table-Top Discussion on an Anthrax Scenario
2016
This paper aims at clarifying a timely topic of how communication strategy choices are made in evolving, complex crises, such as those caused by terrorism involving chemical, biological, radiological, or nuclear (CBRN) agents. This is done by examining data gathered from a table-top discussion among crisis communication experts, focusing on a scenario of an anthrax attack and analysed qualitatively. The communication experts followed the evolving crisis situation by gathering inputs from various actors in the crisis management network, thereby creating situational understanding, and interpreted these inputs for decision-making on communication strategies. The underlying process of coping wi…