The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently developed algorithms quantify and subsequently evaluate COLREGS performance in collision avoidance scenarios based on vessel track data. Combining these evaluation algorithms with proposed categories of COLREGS rules allows for testing of collision avoidance performance in accordance with protocol requirements. This paper proposes a “road test” framework for autonomous marine vehicles prior...
Networks of systems are pervasive, their behaviour can be highly complex, and network effects are now being perceived as something fundamental to understand what is going around us. This is the reason why networks are receiving a significant attention in physics, biology, climatology, and social, among others. The work undertaken presents a prototype of a low cost and easy to deploy autonomous quadcopter...
Underwater communication and robot technologies have grown rapidly in the last decade. Systems made of underwater unmanned vehicles have moved from single vehicle deployments to systems comprising teams of assets. As of today the possibility to support cooperation and interoperability of heterogeneous platforms is a key issue. The objective of this paper is to present the SUNRISE [1] approach to overcome...
This report is dedicated to a new type of system used for testing electronic modules and designed specifically for the needs of the petroleum industry. After testing the electronic modules, the system makes a decision - suitable - unsuitable. Different communication modules communicate between the fuel dispensers and the POS (point of sale) system. The main goal is to raise the efficiency of the process...
New oil skimming technology is traditionally developed through a cycle of testing undertaken at a small number of tank testing facilities. These facilities strive to emulate a variety of sea conditions, yet lack the wide range of variables encountered in the real world. In lieu of tank testing, an Alaskan company conducted a series of real world tests on an ongoing spill in the Gulf of Mexico known...
The estimated accuracy of an algorithm is the most important element of the typical biometrics research publication. Comparisons between algorithms are commonly made based on estimated accuracies reported in different publications. However, even when the same dataset is used in two publications, there is a very low frequency of the publications using the same protocol for estimating algorithm accuracy...
Randomized controlled trials (RCTs) are the gold standard for scientific research but pose many obstacles for game- based learning (GBL) studies. This poster is intended to foster a discussion about RCTs by summarizing two recent trials performed by the authors and comparing the distinctly different protocols including length of stimulus exposure, levels of internal and external validity, and sample...
Acoustic scene classification (ASC) has attracted growing research interest in recent years. Whereas the previous work has investigated closed-set classification scenarios, the predominant ASC application is open-set in nature. The contributions of the paper are (i) the first investigation of ASC in an open-set scenario, (ii) the formulation of open-set ASC as a detection problem, (iii) a classifier...
In presented paper we describe a design and implementation of an information system based on base of embedded client and Linux application server architecture. Presented information system serves for remote collection, storing and processing information on the number of carried out mechanical cycles for group of older existing fatigue test machines in an automotive components production. This upgrade...
Serious Games (SGs) have been widely adopted in cultural settings and museums, especially the last five years. It is expected that SG can link directly the museum content with target user groups and can fulfill their educational needs. This paper aims to present a systematic mapping study on modern museum gaming technologies and applications. More specifically, focus is given on the use of Serious...
Critical infrastructure such as power plants, oil refineries, and sewage are at the core of modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed to allow human operators supervise, maintain, and control critical infrastructure. Recent years has seen an increase in connectivity of SCADA systems to the Internet. While this connectivity provides an increased level of...
Software integration testing plays an increasingly important role as the software industry has experienced a major change from isolated applications to highly distributed computing environments. Conducting integration testing is a challenging task because it is often very difficult to replicate a real enterprise environment. Emulating testing environment is one of the key solutions to this problem...
The current network anomaly traffic detection technologies usually focus on the rules matching and statistical method which are suitable for the general network environment. For the communication characteristics of the controlled network environment, this paper puts forward a network anomaly traffic detection method based on the flow template, which captures and analyses the real-time network traffic...
In modern networks, faults in the network state, e.g., loops, black holes and access control violations that make services unavailable, arise commonly. To ensure networks' correctness, existing approaches verify network-wide invariants. However, these approaches cannot detect or prevent faults immediately as they arise, so that network performance is not affected. In this paper, we present a data...
Several modes of mechanical ventilation are clinically available. The differences among them in terms of efficacy and patient outcomes are not clear yet. Testing and comparison of mechanical ventilation modes via human or animal trials is a very challenging and costly process. In this paper, we present the patient emulator (PE), a novel system that can be used as a platform for in-silico testing of...
This talk presents results recently published in Software Testing, Verification and Reliability. In recent years, important efforts have been made for offering a dedicated language for modelling and verifying/proving security protocols. However, verifying the security protocol model does not guarantee that the actual implementation of the protocol will fulfil these properties. In this talk we present...
To reduce the effect of the unreliability of UDP communication on the test of the network servo system, this study aims to propose an improved method by adding data preprocessing layer between the application layer and the transport layer on the basis of the UDP communication. According to the different functions of the sender and the recipient in the communication, different improvements are used...
Universities and other educational organizations are adopting computer and Internet-based assessment tools (herein called e-exams) to reach widespread audiences. While this makes examination tests more accessible, it exposes them to new threats. At present, there are very few strategies to check such systems for security, also there is a lack of formal security definitions in this domain. This paper...
Intrusion Detection systems (IDS) are a crucial and necessary aspect of the smart grid, particularly when considering the possible attack vectors and their consequences. While there are many different approaches on IDS for Smart Grid, the benefits of an anomaly detection technique is still in discussion, due to its capability of detecting zero-day attacks and misuse. This paper proposes a weighted...
In this paper, decentralized spectrum sensing in a network of multiple cooperative cognitive nodes is considered. Based on the averaging consensus protocol, we propose a decentralized implementation of the energy detector, which is conventionally applied for spectrum sensing in a centralized fashion. The exact (non-asymptotic) null distribution of the decentralized energy detector test statistic is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.