Purpose: As cyber-attacks continue to grow, organisations adopting the internet-of-things (IoT) have continued to react to security concerns that threaten their businesses within the current highly competitive environ...
详细信息
Purpose: As cyber-attacks continue to grow, organisations adopting the internet-of-things (IoT) have continued to react to security concerns that threaten their businesses within the current highly competitive environment. Many recorded industrial cyber-attacks have successfully beaten technical security solutions by exploiting human-factor vulnerabilities related to security knowledge and skills and manipulating human elements into inadvertently conveying access to critical industrial assets. Knowledge and skill capabilities contribute to human analytical proficiencies for enhanced cybersecurity readiness. Thus, a human-factored security endeavour is required to investigate the capabilities of the human constituents (workforce) to appropriately recognise and respond to cyber intrusion events within the industrial control system (ICS) environment. Design/methodology/approach: A quantitative approach (statistical analysis) is adopted to provide an approach to quantify the potential cybersecurity capability aptitudes of industrial human actors, identify the least security-capable workforce in the operational domain with the greatest susceptibility likelihood to cyber-attacks (i.e. weakest link) and guide the enhancement of security assurance. To support these objectives, a Human-factored Cyber Security Capability Evaluation approach is presented using conceptual analysis techniques. Findings: Using a test scenario, the approach demonstrates the capacity to proffer an efficient evaluation of workforce security knowledge and skills capabilities and the identification of weakest link in the workforce. Practical implications: The approach can enable organisations to gain better workforce security perspectives like security-consciousness, alertness and response aptitudes, thus guiding organisations into adopting strategic means of appropriating security remediation outlines, scopes and resources without undue wastes or redundancies. Originality/value: This paper demonstrat
Camera calibration represents an important step in 3D reconstruction process. A lot of linear camera calibration techniques exist which try to compute the camera intrinsic and extrinsic parameters with a close form so...
详细信息
ISBN:
(纸本)188933524X
Camera calibration represents an important step in 3D reconstruction process. A lot of linear camera calibration techniques exist which try to compute the camera intrinsic and extrinsic parameters with a close form solution. This close form solution arise form the minimization of a linear cost function. Since the noise in the points' coordinates, the computed parameters are an approximation of the real ones. Therefore, this cost function can include some restrictions in order to improve the robustness of the algorithm. In this paper a summary of the most important linear camera calibration techniques is done. Afterwards, an evaluation of its performance is carried out. This evaluation is done from the point of view of the parameters which have more influence in the results. These are the number of points and the noise level.
Boolean networks are an important formalism for modelling biological systems and have attracted much attention in recent years. An important challenge in Boolean networks is to exhaustively find attractors,which repre...
详细信息
Boolean networks are an important formalism for modelling biological systems and have attracted much attention in recent years. An important challenge in Boolean networks is to exhaustively find attractors,which represent steady states of a biological network. In this paper, we propose a new approach to improve the efficiency of BDD-based attractor detection. Our approach includes a monolithic algorithm for small networks,an enumerative strategy to deal with large networks, a method to accelerate attractor detection based on an analysis of the network structure, and two heuristics on ordering BDD variables. We demonstrate the performance of our approach on a number of examples and on a realistic model of apoptosis in hepatocytes. We compare it with one existing technique in the literature.
A multi-modal emotion recognition method based on facial multi-scale features and cross-modal attention (MS-FCA) network is proposed. The MSFCA model improves the traditional single-branch ViT network into a two-branc...
详细信息
ISBN:
(数字)9798331521950
ISBN:
(纸本)9798331521967
A multi-modal emotion recognition method based on facial multi-scale features and cross-modal attention (MS-FCA) network is proposed. The MSFCA model improves the traditional single-branch ViT network into a two-branch ViT architecture by using classification tokens in each branch to interact with picture embeddings in the other branch, which facilitates effective interactions between different scales of information. Subsequently, audio features are extracted using ResNet18 network. The cross-modal attention mechanism is used to obtain the weight matrices between different modal features, making full use of inter-modal correlation and effectively fusing visual and audio features for more accurate emotion recognition. Two datasets are used for the experiments: eNTERFACE'05 and REDVESS dataset. The experimental results show that the accuracy of the proposed method on the eNTERFACE'05 and REDVESS datasets is 85.42% and 83.84% respectively, which proves the effectiveness of the proposed method.
The research work presents a original solution for increasing the efficiency on management Supplied-Customer Services (SCS), based on a causal graph configuration. This approach expresses the connection, interaction, ...
详细信息
Camera calibration process is very sensitive to noise. Errors' coming from noisy measurements of the points coordinates, their situation in the world and the calibration algorithm itself creates a deviated solutio...
详细信息
ISBN:
(纸本)188933524X
Camera calibration process is very sensitive to noise. Errors' coming from noisy measurements of the points coordinates, their situation in the world and the calibration algorithm itself creates a deviated solution from the real one. Therefore, it is more interesting to obtain the standard deviation and the mean value of a parameter, than only a value. This value is always false because of the input data is corrupted with noise. This standard deviation represents the quality of the computed parameter. In this paper a method to compute this standard deviation of the projection matrix elements is presented. In this case, the projection matrix is computed with the non homogeneous solution based on the least squares technique.
In this paper a practical new approach to the topic of guarantee closed loop stability of constrained predictive controllers is proposed. The problem is addressed for the case when, due to disturbances, inadequate con...
详细信息
Instead of seeking a structure mapping from a fuzzy reasoning system to a neural network, this paper is intended to find a functional mapping from a fuzzy logic-based algorithm to the network-based approach. By viewin...
Instead of seeking a structure mapping from a fuzzy reasoning system to a neural network, this paper is intended to find a functional mapping from a fuzzy logic-based algorithm to the network-based approach. By viewing the given rule-base as defining a global linguistic association constrained by fuzzy sets, approximate reasoning is implemented here by a Backpropagation Neural Network (BNN) with the aid of fuzzy set theory. By paying particular attention to the generalization capability of the BNN, the underlying principles have been examined in detail using two examples: a small demonstration at the linguistic level, and a more realistic problem of multivariable fuzzy control of blood pressure. The simulation results not only indicate the feasibility of the BNN-based approach, but also reveal some deeper similarities which exist in the two methods, which may have some important implications for future studies into fuzzy control. In addition, this work may be considered as another application example of the BNN in the case of continuous outputs and on a relatively larger scale (in the second example the BNN has 26 inputs and 13 outputs, with a total of 2013 weights and thresholds).
This paper addresses a novel combination between mixed-integer representations and potential field constructions for typical multi-agent marine control problems. First, we prove that for any kind of repulsive function...
详细信息
One challenging and not extensively studied issue in obstacle avoidance is the corner cutting problem. Avoidance constraints are usually imposed at the sampling time without regards to the intra-sample behavior of the...
详细信息
暂无评论