Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
Drone aircraft --- Situational awareness. --- Situation awareness --- SA (Cognitive psychology) --- Awareness --- Human engineering --- Flight control --- Control systems.
Choose an application
The exchange of orbit information is becoming more important in view of the increasing population of objects in space as well as the increase in parties involved in space operations. The aim of this thesis was to investigate how orbit information maintained by a space surveillance system can be provided to its users. Services like collision avoidance require very accurate information, while other services might be less stringent. An approach was studied, which allows to derive orbit and covariance information of predetermined accuracy from a reference orbit. Using Chebyshev polynomials, continuous state vector and covariance matrix information can be provided. The major advantage is that no inter- or extrapolation on the user's side is required. A method to reduce the data amount by interpolating the variance envelope functions was also studied. The proposed method in this thesis gives access to highly accurate information from the catalogue, where this information is required. On the other hand it can also provide less accurate information, where requirements are less restrictive, thereby allowing for a significantly reduced amount of data to be transferred and stored.
Orbital mechanics. --- Computers. --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Astrodynamics --- Mechanics --- Orbits --- space debris --- space surveillance --- space situational awareness
Choose an application
"Having an accurate understanding of what is going on is a key commodity for teams working within military systems. 'Situation awareness' (SA) is the term that is used within human factors circles to describe the level of awareness that operators have of the situation that they are engaged in; it focuses on how operators develop and maintain a sufficient understanding of 'what is going on' in order to achieve success in task performance. Over the past two decades, the construct has become a fundamental theme within the areas of system design and evaluation and has received considerable attention from the human factors research community. Despite this, there is still considerable debate over how SA operates in complex collaborative systems and how SA achievement and maintenance is best supported through system, procedure and interface design. This book focuses on the recently developed concept of distributed situation awareness, which takes a systems perspective on the concept and moves the focus on situation awareness out of the heads of individual operators and on to the overall joint cognitive system consisting of human and technological agents. Situation awareness is viewed as an emergent property of collaborative systems, something that resides in the interaction between elements of the system and not in the heads of individual operators working in that system. The first part of the book presents a comprehensive review and critique of existing SA theory and measurement approaches, following which a novel model for complex collaborative systems, the distributed SA model, and a new modelling procedure, the propositional network approach, are outlined and demonstrated. The next part focuses on real-world applications of the model and modelling procedure, and presents four case studies undertaken in the land warfare, multinational warfare and energy distribution domains. Each case study is described in terms of the domain in question, the methodology employed, and the findings derived in relation to situation awareness theory. The third and final part of the book then concentrates on theoretical development, and uses the academic literature and the findings from the case study applications to validate and extend the distributed SA model described at the beginning of the book. In closing, the utility of the distributed SA model and modeling procedure are outlined and a series of initial guidelines for supporting distributed SA through system design are articulated."--Provided by publisher.
Command and control systems - Evaluation. --- Cooperativeness - Evaluation. --- Group decision making - Evaluation. --- Psychology, Military. --- Situational awareness - Measurement. --- Teams in the workplace - Evaluation. --- Command and control systems --- Psychology, Military --- Situational awareness --- Group decision making --- Cooperativeness --- Teams in the workplace --- Military Administration --- Military & Naval Science --- Law, Politics & Government --- Evaluation --- Measurement --- Evaluation. --- Measurement. --- Groups, Work --- Team building in the workplace --- Team work in the workplace --- Teambuilding in the workplace --- Teams, Work --- Teamwork in the workplace --- Work groups --- Work teams --- Cooperation (Psychology) --- Collective decision making --- Decision-making, Group --- Situation awareness --- SA (Cognitive psychology) --- Military psychology --- Control and command systems --- Systems, Command and control --- Social groups --- Work environment --- Social psychology --- Decision making --- Awareness --- Human engineering --- Psychology, Applied --- Sociology, Military --- Military morale --- Operational psychology --- Communications, Military --- Sociotechnical systems --- Precision guided munitions --- E-books --- 875.1 Onderzoek en ontwikkeling
Choose an application
Cyberinfrastructure --- Computer networks --- Computer security. --- Situational awareness. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Cyber-based information systems --- Cyber-infrastructure --- Electronic data processing --- Information technology --- Computer systems --- Distributed databases --- High performance computing --- Situation awareness --- SA (Cognitive psychology) --- Awareness --- Human engineering --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security measures. --- Distributed processing --- Protection --- Security measures
Choose an application
Memory disorders --- Memory --- Psychological Phenomena and Processes --- Cognition --- Learning --- Psychiatry and Psychology --- Awareness --- Mental Processes --- Medicine --- Health & Biological Sciences --- Neurology --- Executive Function --- Human Information Processing --- Information Processing, Human --- Situation Awareness --- Situational Awareness --- Awareness, Situation --- Awareness, Situational --- Awarenesses --- Awarenesses, Situation --- Awarenesses, Situational --- Situation Awarenesses --- Situational Awarenesses --- Memory Training --- Phenomenography --- Training, Memory --- Memory Consolidation --- Education --- Cognitive Function --- Cognitions --- Cognitive Functions --- Function, Cognitive --- Functions, Cognitive --- Psychologic Processes --- Psychologic Processes and Principles --- Psychological Processes --- Phenomena, Psychological --- Processes, Psychologic --- Processes, Psychological --- Psychological Phenomenas --- Psychological Processe --- Retention (Psychology) --- Intellect --- Psychology --- Thought and thinking --- Comprehension --- Executive functions (Neuropsychology) --- Mnemonics --- Perseveration (Psychology) --- Reproduction (Psychology) --- Impairment, Memory --- Memory, Disorders of --- Memory impairment --- Paramnesia --- Cognition disorders --- Psychological Phenomena
Choose an application
"Examines the European border-and the various actors and institutions involved behind the maintenance of a border--as an infrastructure, with particular attention to the refugee crisis of 2014-2016"--
Border security --- Infrastructure (Economics) --- Refugees --- Technological innovations --- Europe --- Boundaries. --- Emigration and immigration --- Government policy. --- Politics and government --- Border control --- Border management --- Boundaries --- Cross-border security --- National security --- Security measures --- Council of Europe countries --- Eastern Hemisphere --- Eurasia --- Border security - Technological innovations - Europe --- Infrastructure (Economics) - Europe --- Europe - Politics and government --- Europe - Emigration and immigration - Government policy --- Borders --- migration --- infrastructure --- technology --- politics --- security --- EU --- Schengen --- surveillance --- mobility --- boundary --- frontier --- border control --- bordering --- migrants --- refugees --- Frontex --- border guards --- search and rescue --- rescue operations --- airport --- counter-surveillance --- border deaths --- Mediterranean --- mixed movements --- territory --- sovereignty --- state --- state of exception --- detention --- fingerprint --- biometrics --- database --- interoperability --- situational awareness
Choose an application
The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization''s staff of the risk and educate them on how to protect your organization''s data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up. Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management sup
Information storage and retrieval systems -- Security measures. --- Occupational training. --- Online social networks -- Security measures. --- Safety education. --- Situational awareness. --- Information storage and retrieval systems --- Online social networks --- Safety education --- Occupational training --- Situational awareness --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures --- Security measures. --- Situation awareness --- SA (Cognitive psychology) --- Awareness --- Human engineering --- Accidents --- Safety training programs --- Electronic social networks --- Social networking Web sites --- Virtual communities --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Job training --- Manpower development and training --- Manpower training programs --- Vocational training --- Education --- Training --- Education and training services industry --- Practice firms --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Computer systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Prevention --- Study and teaching --- Data centers --- Communities, Online (Online social networks) --- Communities, Virtual (Online social networks) --- Online communities (Online social networks)
Choose an application
Consciousness. --- Experience. --- Consciousness --- Experience --- Psychophysiology --- Cognition --- Mental Processes --- Psychological Phenomena and Processes --- Psychiatry and Psychology --- Awareness --- Philosophy & Religion --- Philosophy --- Mind-Body Relationship (Physiology) --- Physiologic Psychology --- Physiological Psychology --- Psychology, Physiologic --- Mind-Body Relations (Physiology) --- Psychology, Physiological --- Mind Body Relations (Physiology) --- Mind Body Relationship (Physiology) --- Mind-Body Relation (Physiology) --- Mind-Body Relationships (Physiology) --- Physiologic Psychologies --- Psychologies, Physiologic --- Relation, Mind-Body (Physiology) --- Relations, Mind-Body (Physiology) --- Relationship, Mind-Body (Physiology) --- Relationships, Mind-Body (Physiology) --- Psychosomatic Medicine --- Mind-Body Relations, Metaphysical --- Consciousnesses --- Situation Awareness --- Situational Awareness --- Awareness, Situation --- Awareness, Situational --- Awarenesses --- Awarenesses, Situation --- Awarenesses, Situational --- Situation Awarenesses --- Situational Awarenesses --- Psychologic Processes --- Psychologic Processes and Principles --- Psychological Processes --- Phenomena, Psychological --- Processes, Psychologic --- Processes, Psychological --- Psychological Phenomenas --- Psychological Processe --- Human Information Processing --- Information Processing, Human --- Cognitive Function --- Cognitions --- Cognitive Functions --- Function, Cognitive --- Functions, Cognitive --- Knowledge, Theory of --- Psychology --- Reality --- Pragmatism --- Apperception --- Mind and body --- Perception --- Spirit --- Self --- Psychological Phenomena --- Psychiatry
Choose an application
Cyber-physical system (CPS) innovations, in conjunction with their sibling computational and technological advancements, have positively impacted our society, leading to the establishment of new horizons of service excellence in a variety of applicational fields. With the rapid increase in the application of CPSs in safety-critical infrastructures, their safety and security are the top priorities of next-generation designs. The extent of potential consequences of CPS insecurity is large enough to ensure that CPS security is one of the core elements of the CPS research agenda. Faults, failures, and cyber-physical attacks lead to variations in the dynamics of CPSs and cause the instability and malfunction of normal operations. This reprint discusses the existing vulnerabilities and focuses on detection, prevention, and compensation techniques to improve the security of safety-critical systems.
smart grids --- device authentication --- situational awareness --- home area networks --- time-delay switch attack --- networked control systems --- secure control design --- Lyapunov theory --- attack estimation --- hardware-in-the-loop testing --- machine learning --- industrial control systems --- anomaly detection --- fault detection --- intrusion detection system --- blockchain --- security --- privacy --- financial transactions --- transportation systems --- autonomous vehicles --- power system resilience --- disaster --- Federated Learning --- edge intelligence --- resilience management systems --- resource-limitations --- demand response --- remedial testing --- greybox fuzzing --- vulnerability detection --- enhanced security --- traffic microsimulation tool --- cooperative automated driving systems --- vehicle powertrain --- safety --- road capacity --- contested environments --- anomaly isolation --- artificial neural networks --- Cyber Physical System --- out-of-bounds --- vulnerable detection --- patch --- inverter-based energy resources --- islanded microgrids --- resilient control design --- secondary control --- false data injection
Choose an application
The Special Issue entitled “Remote Sensing in Vessel Detection and Navigation” comprises 15 articles on many topics related to remote sensing with navigational sensors. The sequence of articles included in this Special Issue is in line with the latest scientific trends. The latest developments in science, including artificial intelligence, were used. It can be said that navigation and vessel detection remain important and hot topics, and a lot of work will continue to be done worldwide. New techniques and methods for analyzing and extracting information from navigational sensors and data have been proposed and verified. Some of these will spark further research, and some are already mature and can be considered for industrial implementation and development.
autonomous navigation --- automatic radar plotting aid --- safe objects control --- game theory --- computer simulation --- Sentinel-2 --- multispectral --- temporal offsets --- ship --- aircraft --- velocity --- altitude --- parallax --- jet stream --- Unmanned Surface Vessel (USV) --- multi-Global Navigation Satellite System (GNSS) receiver --- bathymetric measurements --- cross track error (XTE) --- SSL --- six-degrees-of-freedom motion --- motion attitude model --- edge detection --- straight-line fitting --- visual saliency --- vessel detection --- video monitoring --- inland waterway --- real-time detection --- neural network --- target recognition --- HRRP --- residual structure --- loss function --- trajectory tracking --- unmanned surface vehicle --- navigation --- bathymetry --- hydrographic survey --- real-time communication --- maritime situational awareness --- ship detection --- Iridium --- on-board --- image processing --- flight campaign --- position estimation --- ranging mode --- single shore station --- AIS --- bag-of-words mechanism --- machine learning --- image analysis --- ship classification --- marine system --- river monitoring system --- feature extraction --- synthetic aperture radar (SAR) ship detection --- multi-stage rotational region based network (MSR2N) --- rotated anchor generation --- multi-stage rotational detection network (MSRDN) --- convolutional neural network (CNN) --- synthetic aperture radar (SAR) --- multiscale and small ship detection --- complex background --- false alarm --- farbon dioxide peaks --- midwave infrared --- FTIR --- adaptive stochastic resonance (ASR) --- matched intrawell response --- nonlinear filter --- line enhancer --- autonomous underwater vehicles (AUVs) --- target tracking --- group targets --- GLMB --- structure --- formation --- remote sensing
Listing 1 - 10 of 11 | << page >> |
Sort by
|