15,432 research outputs found
Key technologies for safe and autonomous drones
Drones/UAVs are able to perform air operations that are very difficult to be performed by manned aircrafts. In addition, drones' usage brings significant economic savings and environmental benefits, while reducing risks to human life. In this paper, we present key technologies that enable development of drone systems. The technologies are identified based on the usages of drones (driven by COMP4DRONES project use cases). These technologies are grouped into four categories: U-space capabilities, system functions, payloads, and tools. Also, we present the contributions of the COMP4DRONES project to improve existing technologies. These contributions aim to ease drones’ customization, and enable their safe operation.This project has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No 826610. The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Spain, Austria, Belgium, Czech Republic, France, Italy, Latvia, Netherlands. The total project budget is 28,590,748.75 EUR (excluding ESIF partners), while the requested grant is 7,983,731.61 EUR to ECSEL JU, and 8,874,523.84 EUR of National and ESIF Funding. The project has been started on 1st October 2019
Recommended from our members
Ensuring Access to Safe and Nutritious Food for All Through the Transformation of Food Systems
Corporate Social Responsibility: the institutionalization of ESG
Understanding the impact of Corporate Social Responsibility (CSR) on firm performance as it relates to industries reliant on technological innovation is a complex and perpetually evolving challenge. To thoroughly investigate this topic, this dissertation will adopt an economics-based structure to address three primary hypotheses. This structure allows for each hypothesis to essentially be a standalone empirical paper, unified by an overall analysis of the nature of impact that ESG has on firm performance. The first hypothesis explores the evolution of CSR to the modern quantified iteration of ESG has led to the institutionalization and standardization of the CSR concept. The second hypothesis fills gaps in existing literature testing the relationship between firm performance and ESG by finding that the relationship is significantly positive in long-term, strategic metrics (ROA and ROIC) and that there is no correlation in short-term metrics (ROE and ROS). Finally, the third hypothesis states that if a firm has a long-term strategic ESG plan, as proxied by the publication of CSR reports, then it is more resilience to damage from controversies. This is supported by the finding that pro-ESG firms consistently fared better than their counterparts in both financial and ESG performance, even in the event of a controversy. However, firms with consistent reporting are also held to a higher standard than their nonreporting peers, suggesting a higher risk and higher reward dynamic. These findings support the theory of good management, in that long-term strategic planning is both immediately economically beneficial and serves as a means of risk management and social impact mitigation. Overall, this contributes to the literature by fillings gaps in the nature of impact that ESG has on firm performance, particularly from a management perspective
Intermodal Terminal Subsystem Technology Selection Using Integrated Fuzzy MCDM Model
Intermodal transportation is the use of multiple modes of transportation, which can lead to
greater sustainability by reducing environmental impact and traffic congestion and increasing the
efficiency of supply chains. One of the preconditions for efficient intermodal transport is the efficient
intermodal terminal (IT). ITs allow for the smooth and efficient handling of cargo, thus reducing the
time, cost, and environmental impact of transportation. Adequate selection of subsystem technologies
can significantly improve the efficiency and productivity of an IT, ultimately leading to cost savings
for businesses and a more efficient and sustainable transportation system. Accordingly, this paper
aims to establish a framework for the evaluation and selection of appropriate technologies for IT
subsystems. To solve the defined problem, an innovative hybrid multi-criteria decision making
(MCDM) model, which combines the fuzzy factor relationship (FFARE) and the fuzzy combinative
distance-based assessment (FCODAS) methods, is developed in this paper. The FFARE method
is used for obtaining criteria weights, while the FCODAS method is used for evaluation and a
final ranking of the alternatives. The established framework and the model are tested on a real-life
case study, evaluating and selecting the handling technology for a planned IT. The study defines
12 potential variants of handling equipment based on their techno-operational characteristics and
evaluates them using 16 criteria. The results indicate that the best handling technology variant is
the one that uses a rail-mounted gantry crane for trans-shipment and a reach stacker for horizontal
transport and storage. The results also point to the conclusion that instead of choosing equipment
for each process separately, it is important to think about the combination of different handling
technologies that can work together to complete a series of handling cycle processes. The main
contributions of this paper are the development of a new hybrid model and the establishment of
a framework for the selection of appropriate IT subsystem technologies along with a set of unique
criteria for their evaluation and selection
Countermeasures for the majority attack in blockchain distributed systems
La tecnología Blockchain es considerada como uno de los paradigmas informáticos más importantes posterior al Internet; en función a sus características únicas que la hacen ideal para registrar, verificar y administrar información de diferentes transacciones. A pesar de esto, Blockchain se enfrenta a diferentes problemas de seguridad, siendo el ataque del 51% o ataque mayoritario uno de los más importantes. Este consiste en que uno o más mineros tomen el control de al menos el 51% del Hash extraído o del cómputo en una red; de modo que un minero puede manipular y modificar arbitrariamente la información registrada en esta tecnología. Este trabajo se enfocó en diseñar e implementar estrategias de detección y mitigación de ataques mayoritarios (51% de ataque) en un sistema distribuido Blockchain, a partir de la caracterización del comportamiento de los mineros. Para lograr esto, se analizó y evaluó el Hash Rate / Share de los mineros de Bitcoin y Crypto Ethereum, seguido del diseño e implementación de un protocolo de consenso para controlar el poder de cómputo de los mineros. Posteriormente, se realizó la exploración y evaluación de modelos de Machine Learning para detectar software malicioso de tipo Cryptojacking.DoctoradoDoctor en Ingeniería de Sistemas y Computació
Application of fuzzy controllers in automatic ship motion control systems
Automatic ship heading control is a part of the automatic navigation system. It is charged with the task of maintaining the actual ship’s course angle or actual ship’s course without human intervention in accordance with the set course or setting parameter and maintaining this condition under the effect of disturbing influences. Thus, the corrective influence on deviations from a course can be rendered by the position of a rudder or controlling influence that leads to the rotary movement of a vessel around a vertical axis that represents a problem, which can be solved with the use of fuzzy logic. In this paper, we propose to consider the estimation of the efficiency of fuzzy controllers in systems of automatic control of ship movement, obtained by analysis of a method of the formalized record of a logic conclusion and structure of the fuzzy controller. The realization of this allows to carry out effective stabilization of a course angle of a vessel taking into account existing restrictions
Valtionavustustoiminnan sanasto : 2. laajennettu laitos
Valtionavustustoiminnan sanastossa määritellään valtionavustustoimintaa koskevat keskeiset käsitteet ja annetaan näille valtakunnalliset termisuositukset sekä niiden vastineet ruotsiksi ja englanniksi. Tavoitteena on selkeyttää ja yhdenmukaistaa yli 90 valtionapuviranomaisen käyttämät käsitteet.
Sanastoa on valmisteltu yhteistyössä eri hallinnonaloilla toimivien valtionavustustoiminnan asiantuntijoiden ja valtionavustuksen hakijoiden kanssa. Terminologista sanastotyötä on toteuttanut Sanastokeskuksen terminologi yhdessä CSC – Tieteen tietotekniikan keskuksen asiantuntijan kanssa. Ruotsin ja englannin kieliversioista on vastannut valtioneuvoston kanslian käännös- ja kielitoimiala. Jatkossa työryhmätyöskentely painottuu sanaston ylläpitämiseen ja kehittämiseen.
Julkaisu täydentää aikaisempaa sanaston versiota, joka julkaistiin vuonna 2021. Sanastoa on täydennetty luvuilla 7—8, joissa määritellään valtionavustuksella rahoitettavaan toimintaan, vaikuttavuuteen ja arviointiin sekä talouteen ja toiminnan resursseihin liittyviä käsitteitä. Sanastosta aiemmin julkaistu osa (luvut 1—6) sisältää valtionavustuslajeihin sekä valtionapuviranomaisten ja valtionavustusten hakijoiden väliseen toimintaan liittyviä käsitteitä. Näihin käsitteisiin on tehty tarkennuksia ja uusia käsitesuhdeviittauksia sanaston uusien osuuksien valmistelun aikana
Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review
Globally, the external Internet is increasingly being connected to the
contemporary industrial control system. As a result, there is an immediate need
to protect the network from several threats. The key infrastructure of
industrial activity may be protected from harm by using an intrusion detection
system (IDS), a preventive measure mechanism, to recognize new kinds of
dangerous threats and hostile activities. The most recent artificial
intelligence (AI) techniques used to create IDS in many kinds of industrial
control networks are examined in this study, with a particular emphasis on
IDS-based deep transfer learning (DTL). This latter can be seen as a type of
information fusion that merge, and/or adapt knowledge from multiple domains to
enhance the performance of the target task, particularly when the labeled data
in the target domain is scarce. Publications issued after 2015 were taken into
account. These selected publications were divided into three categories:
DTL-only and IDS-only are involved in the introduction and background, and
DTL-based IDS papers are involved in the core papers of this review.
Researchers will be able to have a better grasp of the current state of DTL
approaches used in IDS in many different types of networks by reading this
review paper. Other useful information, such as the datasets used, the sort of
DTL employed, the pre-trained network, IDS techniques, the evaluation metrics
including accuracy/F-score and false alarm rate (FAR), and the improvement
gained, were also covered. The algorithms, and methods used in several studies,
or illustrate deeply and clearly the principle in any DTL-based IDS subcategory
are presented to the reader
Digital Health Transformation of Integrated Care in Europe: Overarching Analysis of 17 Integrated Care Programs
Background: Digital health tools comprise a wide range of technologies to support health processes. The potential of these technologies to effectively support health care transformation is widely accepted. However, wide scale implementation is uneven among countries and regions. Identification of common factors facilitating and hampering the implementation process may be useful for future policy recommendations. Objective: The aim of this study was to analyze the implementation of digital health tools to support health care and social care services, as well as to facilitate the longitudinal assessment of these services, in 17 selected integrated chronic care (ICC) programs from 8 European countries. Methods: A program analysis based on thick descriptions including document examinations and semistructured interviews with relevant stakeholders of ICC programs in Austria, Croatia, Germany, Hungary, the Netherlands, Norway, Spain, and the United Kingdom was performed. A total of 233 stakeholders (ie, professionals, providers, patients, carers, and policymakers) were interviewed from November 2014 to September 2016. The overarching analysis focused on the use of digital health tools and program assessment strategies. Results: Supporting digital health tools are implemented in all countries, but different levels of maturity were observed among the programs. Only few ICC programs have well-established strategies for a comprehensive longitudinal assessment. There is a strong relationship between maturity of digital health and proper evaluation strategies of integrated care. Conclusions: Notwithstanding the heterogeneity of the results across countries, most programs aim to evolve toward a digital transformation of integrated care, including implementation of comprehensive assessment strategies. It is widely accepted that the evolution of digital health tools alongside clear policies toward their adoption will facilitate regional uptake and scale-up of services with embedded digital health tools
- …