共查询到20条相似文献,搜索用时 0 毫秒
1.
《Expert systems with applications》2014,41(6):2742-2753
Due to the large volume of data related to vessels, to manually pore through and to analyze the information in a bid to identify potential maritime threat is tedious, if at all possible. This study aims to enhance maritime situational awareness through the use of computational intelligence techniques in detecting anomalies. A knowledge discovery system based on genetic algorithm termed as GeMASS was proposed and investigated in this research. In the development of GeMASS, a machine learning approach was applied to discover knowledge that is applicable in characterizing maritime security threats. Such knowledge is often implicit in datasets and difficult to discover by human analysts. As the knowledge relevant to maritime security may vary from time to time, GeMASS was specified to learn from streaming data and to generate up-to-date knowledge in a dynamic fashion. Based on the knowledge discovered, the system functions to screen vessels for anomalies in real-time. Traditionally in maritime security studies, datasets that are applied as knowledge sources are related to vessels’ geographical and movement information. This study investigated a novel leverage of multiple data sources, including Automatic Identification System, classification societies, and port management and security systems for the enhancement of maritime security. A prototype of GeMASS was developed and employed as a vehicle to study and demonstrate the functions of the proposed methodology. 相似文献
2.
石并 《网络安全技术与应用》2014,(8):156-157
随着科学技术的发展,网络规模在不断的扩大,复杂性也在逐渐的增强,面临的网络安全问题也越来越严峻。传统的网络安全技术已经无法满足网络快速发展的需要,无法全面的防御网络攻击行为,必须对新的网络安全技术进行大力研究和开发。网络安全态势感知能够对影响网络安全的因素进行量化分析,为保障网络安全提供重要的依据,因此,对网络安全态势感知进行研究意义重大。本文将在网络安全态势感知概念模型的基础上,对网络安全态势感知的相关研究进行探讨。 相似文献
3.
4.
Distributed interactive video arrays for event capture and enhanced situational awareness 总被引:1,自引:0,他引:1
Video surveillance activity has dramatically increased over the past few years. Earlier work dealt mostly with single stationary cameras, but the recent trend is toward active multicamera systems. Such systems offer several advantages over single camera systems - multiple overlapping views for obtaining 3D information and handling occlusions, multiple nonoverlapping cameras for covering wide areas, and active pan-tilt-zoom (PTZ) cameras for observing object details. To address these issues, we have developed a multicamera video surveillance approach, called distributed interactive video array. The DIVA framework provides multiple levels of semantically meaningful information ("situational" awareness) to match the needs of multiple remote observers. We have designed DIVA-based systems that can track and identify vehicles and people, monitor perimeters and bridges, and analyze activities. A new video surveillance approach employing a large-scale cluster of video sensors demonstrates the promise of multicamera arrays for homeland security. 相似文献
5.
周星宇 《网络安全技术与应用》2014,(5):168-169
随着网络技术的发展,互联网技术得到突飞猛进的发展,但是在高速发展的背后,给很多网络黑客可乘之机,网络入侵行为逐渐泛滥化,给网络安全带来巨大的挑战.传统的网络维护技术早已不能满足当前技术水平.网络安全态势感知是一门应对网络入侵的新技术,给网络监管人员提供维护网络安全的途径,对当前信息技术的发展有重要的意义.本文将以网络安全态势感知模型的设计为基础,对其提供合理化的建议,以达到维护网络安全的作用. 相似文献
6.
郑毅平 《网络安全技术与应用》2014,(9):51-51
网络安全态势感知主要是站在整体大局的立场上去动态反映信息网络的安全环境,并从根本上对信息网络安全的发展趋势做出了评估和分析.作为网络安全领域的新热点,网络安全态势感知在学术的研究中取得了广泛的进展,但在系统构建和应用方面发展还不够迅速.在此背景下,提出了一种基于知识发现的网络安全态势建模和生成框架,通过一系列的实验过程以及结果分析,表明了该系统能够支持网络安全态势感知的不断发展. 相似文献
7.
8.
Alnusair Awny Zhong Chen Rawashdeh Majdi Hossain M. Shamim Alamri Atif 《Multimedia Tools and Applications》2017,76(21):22823-22843
Multimedia Tools and Applications - The current proliferation of large amounts of multimedia data creates an unprecedented challenge for security analysts in the context of Cyber Situational... 相似文献
9.
10.
11.
《Ergonomics》2012,55(6):824-836
AbstractThe pickup of visual information is critical for controlling movement and maintaining situational awareness in dangerous situations. Altered coordination while wearing protective equipment may impact the likelihood of injury or death. This investigation examined the consequences of load magnitude and distribution on situational awareness, segmental coordination and head gaze in several protective equipment ensembles. Twelve soldiers stepped down onto force plates and were instructed to quickly and accurately identify visual information while establishing marksmanship posture in protective equipment. Time to discriminate visual information was extended when additional pack and helmet loads were added, with the small increase in helmet load having the largest effect. Greater head-leading and in-phase trunk–head coordination were found with lighter pack loads, while trunk-leading coordination increased and head gaze dynamics were more disrupted in heavier pack loads. Additional armour load in the vest had no consequences for Time to discriminate, coordination or head dynamics. This suggests that the addition of head borne load be carefully considered when integrating new technology and that up-armouring does not necessarily have negative consequences for marksmanship performance.Practitioner Summary: Understanding the trade-space between protection and reductions in task performance continue to challenge those developing personal protective equipment. These methods provide an approach that can help optimise equipment design and loading techniques by quantifying changes in task performance and the emergent coordination dynamics that underlie that performance. 相似文献
12.
Robert J. Houghton Chris Baber Malcolm Cowton Guy H. Walker Neville A. Stanton 《Cognition, Technology & Work》2008,10(3):199-207
Modern developments in the use of information technology within command and control allow unprecedented scope for flexibility in the way teams deal with tasks. These developments, together with the increased recognition of the importance of knowledge management within teams present difficulties for the analyst in terms of evaluating the impacts of changes to task composition or team membership. In this paper an approach to this problem is presented that represents team behaviour in terms of three linked networks (representing task, social network structure and knowledge) within the integrative WESTT software tool. In addition, by automating analyses of workload and error based on the same data that generate the networks, WESTT allows the user to engage in the process of rapid and iterative “analytical prototyping”. For purposes of illustration an example of the use of this technique with regard to a simple tactical vignette is presented. 相似文献
13.
14.
Matthias Farwick Christian M. Schweda Ruth Breu Inge Hanschke 《Software and Systems Modeling》2016,15(2):397-426
The business capabilities of modern enterprises crucially rely on the enterprises’ information systems and underlying IT infrastructure. Hence, optimization of the business-IT alignment is a key objective of Enterprise Architecture Management (EAM). To achieve this objective, EAM creates, maintains and analyzes a model of the current state of the Enterprise Architecture. This model covers different concepts reflecting both the business and the IT perspective and has to be constantly maintained in response to ongoing transformations of the enterprise. In practice, EA models grow large and are difficult to maintain, since many stakeholders from various backgrounds have to contribute architecture-relevant information. EAM literature and two practitioner surveys conducted by the authors indicate that EA model maintenance, in particular the manual documentation activities, poses one of the biggest challenges to EAM in practice. Current research approaches target the automation of the EA documentation based on specific data sources. These approaches, as our systematic literature review showed, do not consider enterprise specificity of the documentation context or the variability of the data sources from organization to organization. The approach presented in this article specifically accounts for these factors and presents a situational method for EA documentation. It builds on four process-supported documentation techniques which can be selected, composed and applied to design an organization-specific documentation process. The techniques build on a meta-model for EA documentation, which is implemented in an EA-repository prototype that supports the configuration and execution of the documentation techniques. We applied our documentation method assembly process at a German insurance company and report the findings from this case study in particular regarding practical applicability and usability of our approach. 相似文献
15.
《Behaviour & Information Technology》2012,31(6):584-593
Using various social-engineering techniques, criminals run havoc on the Internet and defraud many people in a number of different ways. This puts various organisational communities at risk. Therefore, it is important that people within such communities should learn how to protect themselves when active in cyberspace, or when dealing with cyber-related technologies. Training can indeed play a big role in this regard, and consequently, assist by altering the insecure behaviour of many people. The objective of this article is to ascertain whether simulating phishing attacks together with embedded training can contribute towards cultivating users’ resistance towards ‘phishing attacks’. In order to achieve this objective, a phishing exercise at an institution in South Africa was conducted. 相似文献
16.
Macromedia公司推出的Dreamweaver、Flash、Fire-works被称为“网页制作三剑客”,这一说法,既点明了它们的功能和用处,也形象地说明,如果能够将它们配合使用,将会发挥出更大的作用。我们将会在今后的教学中,逐一为大家讲解关于Dreamweaver和Flash的用法和技巧,这次首先来看看三剑客中不大为人所注意的Fireworks。 Fireworks主要用做图像的制作及处理,并以其简单 相似文献
17.
Techniques for visualizing several climate variables, particularly clouds and wind velocities, are discussed. The techniques are volume rendering, textured contour surfaces, and vector field rendering. The application of these techniques is discussed in the context of a high-definition television (HDTV) animation produced to show global cloud motion during ten simulated days in January. The computational grid is defined by nearly a million grid points-320 evenly spaced longitudes, 160 unevenly spaced latitudes, and 19 unevenly spaced surfaces of constant geopotential. The climate variables at every grid point were output at every hour of simulated time, resulting in 380 MB of data per simulated day 相似文献
18.
19.
This paper presents a systematic literature review to gain insight into the growing area of awareness maintenance. A systematic review of papers from 1970 to 2010 examines the background and trends of research in this area. The results establish a framework for awareness maintenance and demonstrate trends, gaps, and potentially fruitful areas for future research. In particular, based on 131 papers, the present work proposes a four-phase framework for awareness maintenance that shows promise for real-world applications. 相似文献
20.
基于VTK的医学图像可视化三维重建 总被引:1,自引:0,他引:1
医学三维数据场可视化是当前科学计算可视化应用的重点,具有重要的学术意义和应用价值.体绘制是该技术的一个主要的方法.在VTK(Visualization Toolkit)类库提供可视化与显示功能的基础上,主要讨论了光线投射算法进行体数据的绘制的特点,同时采用了包围盒技术改善了光线投射算法的绘制速度.实验结果表明,图像的质量在没有受到影响的前提下,图像的绘制速度得到了大幅度的提高,同时证明了VTK是医学三维数据场可视化的有力工具. 相似文献