The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Studies have estimated that irregular operations (flights affected by a disruption) can cost between 2% and 3% of the airline annual revenue and that a better recovery process could result in cost reductions of at least 20%. Even for small airlines this can represent millions of Euros. In this paper we propose a multi-agent system (MAS) whose members represent the roles, functionalities and competences...
In this paper, we propose a crowd density estimation algorithm based on multi-class Adaboost using spectral texture features. Conventional methods based on self-organizing maps have shown unsatisfactory performance in practical scenarios, and in particular, they have exhibited abrupt degradation in performance under special conditions of crowd densities. In order to address these problems, we have...
The goal is to monitor binding of viruses to a model membrane - lipid bilayer - by using Infrared (IR) spectroscopy. IR spectroscopy is a useful spectroscopic tool: it monitors bio-molecular vibrations and provides for molecular fingerprinting. It also provides information on the direction of formed hydrogen bonds when using polarized IR beams. We used graphene-coated IR mesh-screens as substrates...
An innovative automatic door control system is proposed in this paper to overcome the drawback of frequent false actions among the present devices while increasing their added values for security applications. Through human detection and trajectory tracking techniques, the proposed system can precisely identify those people with intention of entering or leaving the door, and then control opening and...
An increasing number of connectable devices have been used in our everyday living environments. However, their working status usually cannot be remotely monitored in a ubiquitous way, leading to potential inefficiency in energy consumption. In this paper, we conducted a case study to investigate the effectiveness of connecting devices into social networks for status monitoring. In our study, we developed...
Availability of low cost sensor nodes has made Wireless Sensor Networks (WSNs) a viable choice for monitoring critical infrastructure such as power grid, civil structures and others. There are quite a few approaches in the literature that use WSN to monitor pipelines (water, gas, oil, and various other types of pipelines). The primary goal of all these protocols is to detect device malfunctions such...
In this paper, we challenge the notion espoused by Huntington's Clash of Civilizations theory that international conflict arises from circumstances beyond our control. Instead, we propose that the study of human agents, and specifically their intentions and the way they form perceptions, can shed significant light on the problem of conflict escalation, political signaling and effective diplomacy.
Li Ning applies information technology into all aspects of its corporate governance, combing with its actual situation continuously in the process of information development, which greatly improves its corporate governance ability. Enhancement of such ability lays a foundation for the development of information in the company and forms the mutual promotion of the two. In such an era of changing information,...
Humans are poorly equipped to perform repetitive tasks without adversely affecting the efficiency with which they are performing the task. Assets within a secure environment are usually protected with various controls that are enforced by users who follow operational controls associated to those assets. The current approach to security monitoring by means of video cameras are performed by a person...
The results of application of differential geometry in the processing of human biosignals are presented. Using accelerometric sensors placed under the mattress the ballistocardiogram was measured together with the related ECG signal. The R-R intervals were calculated and compared with the accelerometric data. We shown, that the accelerometric sensors acquire sufficient accuracy to acquire the heart...
In this research, we propose a method of improving on the accuracy of detecting nasal cavity location in far infrared images for non-contact measurement of human breathing. We found that although our previous method for far infrared imaging can detect regions that include nasal cavities well, several false alarms occur. In order to reduce false alarms, we propose to apply false alarm classification...
The number of elderly population is increasing worldwide and often they need assistance in their daily activities. In many situations, these elders are placed in elderly care facilities in order to receive continuous assistance from the human caregivers. The caregivers usually keep a watchful eye on the elders and help them in their activities of daily living. However, study shows that the human caregivers...
In this paper, we present Roman Tutor, an intelligent tutoring simulator to train astronauts on manipulating the SSRMS, an articulated robot arm deployed on the International Space Station. Roman Tutor incorporates a model of the system operations curriculum, a kinematic simulation of the robotics equipment and the ISS, a high performance path planner and an automatic task demonstration generator...
Recently, software practitioners, using model-based engineering and similar methods, have begun developing software from models. After creating a model of the required system behavior, a developer can obtain assurance of the model by validating that it captures the intended behavior and verifying that it satisfies critical properties. Invariants are important to both validation, as a check that the...
Organisations believe that IT projects are the key to deliver solution in any challenges they have. Consciously or unconsciously, many organisations focuses more on technology, and take for granted that IT Project does not happen in isolation. The deployments of IT projects are results of people's action which are carried out through processes. IT projects are intended for the support ad enabling...
In this paper, we present an embedded real-time parking lot monitoring video surveillance system, automatically dimming and brightening the illumination depending on whether people or vehicles are detected in the monitored area. The system helps saving money by significantly reducing energy consumption, while maintaining appropriate levels of illumination for basic safety.
Insider threats are a growing problem in today's organizations. Detecting such attacks is especially challenging because most system owners and system administrators use networks to remotely manage the systems they are responsible for. In previous work, we introduced the Autonomic Violation Prevention System (AVPS) that has a scalable architecture to deal with such threats. This system uses low level...
This paper proposes a method for constituting the formation of a multi-robot system according to dynamically changing environments. First, we apply a method of multi-objective behavior coordination for integrating behavior outputs from the fuzzy control for collision avoidance and target tracing. Second, we apply a spring model to calculate the temporary target position of each robot for the formation...
This fast abstract outlines a novel mechanism for monitoring the security state of a system, using intelligent testing agents to instigate and then depress security activities.
Human-intensive cyber-physical systems involve software applications and hardware devices, but also depend upon the expertise of human participants to achieve their goal. In this paper. we describe a project we have started to improve the effectiveness of such systems by providing Smart Checklists to support and guide human participants in carrying out their tasks, including their interactions with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.