The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Insider threats and attacks are a known problem. Within an enterprise it is very difficult to detect and identify insider attacks and abuse against information systems. A study was conducted by observing a group of IS security analysts who detect and identify insider attacks. Commonalities and generalizations were made based on the study to create an insider attack detection model. This model will...
Engineering asset management (EAM) process is a broad discipline and the EAM functions and processes are characterized by its distributed nature. However, engineering asset nowadays mostly relies on self-maintained experiential rule-bases and periodic maintenance, which is lacking a collaborative engineering approach. To enrich the maintenance efficiency and customer relationship, this research proposes...
It is a thesis of my ongoing research for the U.S. Army that robots not only can be better than soldiers in conducting warfare in certain circumstances, but they also can be more humane in the battlefield than humans. It is my contention that robots can be built that do not exhibit fear, anger, frustration, or revenge, and that ultimately (and the key word here is ultimately) behave in a more humane...
This paper aimed at the use change of the bay, a dynamic axis-area analysis method was put forward on the basis of the complex and dynamic characteristics of bays. Firstly, a bay was seen as a systematic structure composed of four axes: baymouth, mean low-tide line, coastline, land boundary, and three areas surrounded by these axes, namely alongshore land area, tidal zone, and alongshore sea area,...
An effective video surveillance system relies on the detection of suspicious activities. In recent times, there has been an increasing focus on detecting anomalies in human behaviour using surveillance cameras as they provide a clue to preventing breaches in security. Human behaviour can be termed as suspicious when it is uncommon in occurrence and deviates from commonly understood behaviour within...
A new man-machine method is proposed for detecting and locating failures in complex dynamic systems. The method compares the power variables of a system with their corresponding variables in an on-line computer model of the system. The model is cut or disaggragated in a special way to enable detection and location of system failures. The human operator is expected to set criteria for automatic discrimination,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.