Nowadays, wireless sensor networks (WSN) are widely used for various Internet of Things applications. The sensor nodes are usually deployed randomly in the field. Thus, searching for node coordinates is one of the req...
ISBN:
(数字)9781728192819
ISBN:
(纸本)9781728192826
Nowadays, wireless sensor networks (WSN) are widely used for various Internet of Things applications. The sensor nodes are usually deployed randomly in the field. Thus, searching for node coordinates is one of the requirements to construct the network structure. With knowing distances between nodes and the coordinates of anchor nodes in a certain network fragment, we propose a method based on the multidimensional scaling for searching for desired node coordinates.
software rejuvenation has been proposed as a strategy to protect cyber-physical systems (CSPs) against unanticipated and undetectable cyber attacks. The basic idea is to refresh the system periodically with a secure a...
详细信息
ISBN:
(纸本)9781538679012;9781538679265
software rejuvenation has been proposed as a strategy to protect cyber-physical systems (CSPs) against unanticipated and undetectable cyber attacks. The basic idea is to refresh the system periodically with a secure and trusted copy of the online software so as to eliminate all effects of malicious modifications to the run-time code and data. This paper considers software rejuvenation design from a control-theoretic perspective. Invariant sets for the Lyapunov function for the safety controller are used to derive bounds on the time that the CPS can operate in mission control mode before the software must be refreshed. With these results it can be guaranteed that the CPS will remain safe under cyber attacks against the run-time system. The approach is illustrated using simulation of the nonlinear dynamics of a quadrotor system. The concluding section discusses directions for further research.
With the increasing complexity of Cyber-Physical Systems, their behavior and decisions become increasingly difficult to understand and comprehend for users and other stakeholders. Our vision is to build self-explainab...
详细信息
ISBN:
(纸本)9781728151267
With the increasing complexity of Cyber-Physical Systems, their behavior and decisions become increasingly difficult to understand and comprehend for users and other stakeholders. Our vision is to build self-explainable systems that can, at run-time, answer questions about the system's past, current, and future behavior. As hitherto no design methodology or reference framework exists for building such systems, we propose the Monitor, Analyze, Build, Explain (MAB-EX) framework for building self-explainable systems that leverage requirements- and explainability models at run-time. The basic idea of MAB-EX is to first Monitor and Analyze a certain behavior of a system, then Build an explanation from explanation models and convey this EXplanation in a suitable way to a stakeholder. We also take into account that new explanations can be learned, by updating the explanation models, should new and yet un-explainable behavior be detected by the system.
This paper presents a novel method for breast density classification in digital mammograms using multifractal spectrum and histogram analysis. The multifractal spectrum is used to capture fibroglandular texture featur...
This paper presents a novel method for breast density classification in digital mammograms using multifractal spectrum and histogram analysis. The multifractal spectrum is used to capture fibroglandular texture features in sub-images extracted from the breast region of mammograms, and feature vectors extracted from multifractal spectrum are used to classify sub-images into fat or dense category and to calculate breast percent density. For enhancing texture features and improving classification accuracy of breast density, standard deviation and skewness analysis of histogram on mammograms are considered. A full-field digital mammography (FFDM) dataset INbreast is used to test our proposed method and experimental results of breast density estimation outperform other reported methods, giving a higher classification accuracy (83.33%).
Object tracking is one of the well-known topic in computer Vision sphere with challenging and problematic tasks that frames come with problems like overlapping, camera motion blur, changing object appearance, environm...
详细信息
ISBN:
(数字)9781728125640
ISBN:
(纸本)9781728125657
Object tracking is one of the well-known topic in computer Vision sphere with challenging and problematic tasks that frames come with problems like overlapping, camera motion blur, changing object appearance, environmental variations and so on. Using OpenCV based CSRT (Channel and Spatial Reliability Tracking) tracker itself, without integration object detection part may face problems which mentioned above. To overcome that challenges we integrated deep learning based object detection with CSRT tracker and got better tracking results.
The demand for efficient genomic data storage and distribution has increased substantially as advanced high-throughput sequencing has dramatically reduced costs and processing time required for genomic data collection...
详细信息
A key challenge that Immersive applications have to overcome is cybersickness. Cybersickness is particularly prevalent in dynamic applications such as vehicles simulators. The work presented here aims to understand th...
详细信息
A key challenge that Immersive applications have to overcome is cybersickness. Cybersickness is particularly prevalent in dynamic applications such as vehicles simulators. The work presented here aims to understand the cause of cybersickness symptoms in an assistive technology (AT) application, the virtual wheelchair training simulator. This evaluation is performed in terms of errors made during experience and post-experience Simulator Sickness Questionnaire (SSQ). The performance metrics analyzed are time to complete the proposal task and number of collisions (errors/mistakes). The post-experience questionnaires (subjective measurements) collected the user’s experience in terms of simulator sickness by applying the Simulator Sickness Questionnaire (SSQ) and immersion questions. The experiments were conducted with 10 participants. In terms of results, analysis of human factors reveals that the average cybersickness score is slightly higher for women compared to men. However, these differences were not statistically significant. There was an inverse correlation between cybersickness symptoms and task performance as well as between cybersickness symptoms and immersion.
This article describes the hardware-software complex for the recognition of smoke and fire from CCTV cameras. The article is conventionally divided into two parts in the first part of the article devoted to hardware d...
详细信息
ISBN:
(数字)9781728125640
ISBN:
(纸本)9781728125657
This article describes the hardware-software complex for the recognition of smoke and fire from CCTV cameras. The article is conventionally divided into two parts in the first part of the article devoted to hardware devices: characteristics and advantages of the computing node of the module. The second part of the article is devoted to the software. In this paper, we used method segmentation for the HSV color space and the detection method based on the YOLOV2 (You Only Look Once) algorithm for smoke and fire recognition.
The development of Internet of Things (IoT) makes the application of smart homes grow rapidly. It is very popular to install smart appliances in the house. However, building a smart control system at home not only cos...
详细信息
A significant task in earthquake reconnaissance is to conduct rapid and accurate assessments of damage to built infrastructure. This can be accomplished, in part, by analyzing the large volumes of high-resolution imag...
详细信息
暂无评论