Most security software tools try to detect malicious components by cryptographic hashes, signatures or based on their behavior. The former, is a widely adopted approach based on Integrity Measurement Architecture (IMA) enabling appraisal and attestation of system components. The latter, however, may induce a very long time until misbehavior of a component leads to a successful detection. Another approach...
For the WSNs lifetime optimization, the non-disjoint set covers (NDSC) based coverage control approach has brought out a better performance. In addition, it yields a promising indicators in term of reliability, resilience and the possibility to be used for heterogeneous WSNs. This paper addresses the WSNs resiliency assessment via NDSC approaches to WSNs lifetime optimization. We investigated the...
Gao [6] conjectured that if a general finite field has qn elements, and m is the smallest power of q greater or equal to n, then there exists a polynomial g (x) ∊ Fq [x] of degree at most 2 ⌈log2 n⌉ such that xm − g (x) has an irreducible factor f (x) of degree n. If the conjecture holds, this guarantees existence of high order elements that are used in the known cryptographic primitives. The conjecture...
In this paper, we investigate global and national level datasets, used to estimate trends in land cover and in land productivity in Ukraine within Land Degradation Neutrality (LDN) Target Setting Programme of United Nations Convention to Combat Desertification (UNCCD). To assess land cover changes, the ESA CCI-LC 2000 and 2010 epochs are used, focusing on changes between the 6 main land cover categories...
This study aims to explore and identify effective communication practices influencing performance of international development projects in Pakistan and also illustrates important project complexity elements which moderates the relationship between effective communication and project performance. After detailed literature review and conducting 9 expert interviews from project managers, project coordinators...
With the ever rising amount of security and alert information, the decision process which incident to address first becomes increasingly important and prioritizing incidents is a common approach towards this problem. Meanwhile, networks and policies have a dynamic and complex nature. Machine learning techniques have successfully been applied in the area of intrusion detection systems (IDS) to cope...
The need for information of the Earth's surface is growing as it is the base for applications such as monitoring the land uses or performing environmental studies, for example. In this context the effective change detection (CD) among multitemporal datasets is a key process that must produce accurate results obtained by computationally efficient algorithms. Most of the CD methods are focused on binary...
We analyze electrical processes in a complex system composed of a large number of elements using statistical computer simulations as a primary tool. This study is important as it helps to understand sophisticated phenomena that take place in various real-world systems such as nanocomposites or conductive polymers. Developed approach and software can be applied in environmental sciences, as mentioned...
Realization of automated reading and video processing to study efficient algorithms for tracking the dynamics of growth and spread of spores of mesophilic and thermophilic microorganisms were studied. The basic steps based on the algorithm of automatic counting and tracking spore colonies in real time were investigated.
The present paper describes a dual approach using pseudo-3D vision for Machine-Awareness in indoor environment. Provided by color and depth cameras of the a Kinect system, the aforementioned duality presents an appealing solution for robots' 3D-vision. Placing the human-robot and in a more general way the human-machine interactions as a key outcome of the expected visual Machine-Awareness, the proposed...
Cities and metropolitan region are becoming the main pattern of organization for civilizations. Therefore, they form socio-economic systems of growing importance. These systems show a high complexity and lack a centralized hierarchical structure. Therefore, de-central, distributed approaches for the management and patterns of self-organization are required. On a technical level, smart system approaches...
We proposes the development of a cyber-secure, Internet of Things (IoT), supply chain risk management architecture. The proposed architecture is designed to reduce vulnerabilities of malicious supply chain risks by applying machine learning (ML), cryptographic hardware monitoring (CHM), and distributed system coordination (DSC) techniques to mitigate the consequences of unforeseen (including general...
This paper presents first results of a project aiming to provide the requirements for enabling elderly people to stay longer in their flats or houses before moving to senior citizen's residences or nursing homes. Using market available devices an Ambient Assisted Living (AAL) system is developed for recording vital sign data. A minimal invasive radio transmission system and smart home sensors are...
This paper presents the architecture and hardware of the developed real time road signs recognition system. Image processing and recognition methods ensuring efficiency of real time road signs recognition system, are offered.
Innovation Project Management has gained a lot of attention in the recent years given its complexity and the challenging questions innovation projects pose to traditional project management. Literature shows high rates of failure, for numerous reasons, when it comes to innovation projects, among which are the project management approach and the inability to tackle the complexity and uncertainty connected...
The mathematical model of clamping electromagnets for clamping force determination on the basis of field theory means is offered for magnetically operated movers of mobile robots (MR) for moving on inclined or vertical ferromagnetic surfaces. The results of experimental investigations of magnetic induction and clamping force measurements in different spatial positions of clamping magnet relative to...
MEMS barometers are often addressed for vertical position detection in navigation systems because of the relatively high accuracy of measurement. This paper presents results of the assessment of two (contemporary) commercial barometric pressure sensors in indoor and outdoor (barometric) altitude measurements. A comparison of the acquired pressure data derived simultaneously from two pairs of sensors...
The paper concerns one of the practical applications of advanced IT in the field of present-day climatology. In particular, we discuss the problem of “missing data” on weather and climate in local urban areas, where “missing data” represent the difference between the available and desired data which seem to be necessary in the context of coming climate changes. Then integration of open-access data...
In the course of the scheduling of a project we always have to face uncertainties in the planned durations of the individual activities. The most frequently used method to handle this situation, is PERT. But PERT offers some detriments like the systematic underestimation of the real risk. Therefore a further development led to the “critical field” approach, which implies the use of Monte Carlo simulation...
The paper presents the system architecture, development and prototype implementation of a new integrated system for simulation of automated industrial processes using advanced technologies, in accordance with CPS/Industry 4.0 principles. The need to develop such a system is underscored by the interest of the educational stakeholders: students, faculty members, high-level industry partners, for an...