15,432 research outputs found

    Key technologies for safe and autonomous drones

    Get PDF
    Drones/UAVs are able to perform air operations that are very difficult to be performed by manned aircrafts. In addition, drones' usage brings significant economic savings and environmental benefits, while reducing risks to human life. In this paper, we present key technologies that enable development of drone systems. The technologies are identified based on the usages of drones (driven by COMP4DRONES project use cases). These technologies are grouped into four categories: U-space capabilities, system functions, payloads, and tools. Also, we present the contributions of the COMP4DRONES project to improve existing technologies. These contributions aim to ease drones’ customization, and enable their safe operation.This project has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No 826610. The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Spain, Austria, Belgium, Czech Republic, France, Italy, Latvia, Netherlands. The total project budget is 28,590,748.75 EUR (excluding ESIF partners), while the requested grant is 7,983,731.61 EUR to ECSEL JU, and 8,874,523.84 EUR of National and ESIF Funding. The project has been started on 1st October 2019

    Corporate Social Responsibility: the institutionalization of ESG

    Get PDF
    Understanding the impact of Corporate Social Responsibility (CSR) on firm performance as it relates to industries reliant on technological innovation is a complex and perpetually evolving challenge. To thoroughly investigate this topic, this dissertation will adopt an economics-based structure to address three primary hypotheses. This structure allows for each hypothesis to essentially be a standalone empirical paper, unified by an overall analysis of the nature of impact that ESG has on firm performance. The first hypothesis explores the evolution of CSR to the modern quantified iteration of ESG has led to the institutionalization and standardization of the CSR concept. The second hypothesis fills gaps in existing literature testing the relationship between firm performance and ESG by finding that the relationship is significantly positive in long-term, strategic metrics (ROA and ROIC) and that there is no correlation in short-term metrics (ROE and ROS). Finally, the third hypothesis states that if a firm has a long-term strategic ESG plan, as proxied by the publication of CSR reports, then it is more resilience to damage from controversies. This is supported by the finding that pro-ESG firms consistently fared better than their counterparts in both financial and ESG performance, even in the event of a controversy. However, firms with consistent reporting are also held to a higher standard than their nonreporting peers, suggesting a higher risk and higher reward dynamic. These findings support the theory of good management, in that long-term strategic planning is both immediately economically beneficial and serves as a means of risk management and social impact mitigation. Overall, this contributes to the literature by fillings gaps in the nature of impact that ESG has on firm performance, particularly from a management perspective

    Intermodal Terminal Subsystem Technology Selection Using Integrated Fuzzy MCDM Model

    Get PDF
    Intermodal transportation is the use of multiple modes of transportation, which can lead to greater sustainability by reducing environmental impact and traffic congestion and increasing the efficiency of supply chains. One of the preconditions for efficient intermodal transport is the efficient intermodal terminal (IT). ITs allow for the smooth and efficient handling of cargo, thus reducing the time, cost, and environmental impact of transportation. Adequate selection of subsystem technologies can significantly improve the efficiency and productivity of an IT, ultimately leading to cost savings for businesses and a more efficient and sustainable transportation system. Accordingly, this paper aims to establish a framework for the evaluation and selection of appropriate technologies for IT subsystems. To solve the defined problem, an innovative hybrid multi-criteria decision making (MCDM) model, which combines the fuzzy factor relationship (FFARE) and the fuzzy combinative distance-based assessment (FCODAS) methods, is developed in this paper. The FFARE method is used for obtaining criteria weights, while the FCODAS method is used for evaluation and a final ranking of the alternatives. The established framework and the model are tested on a real-life case study, evaluating and selecting the handling technology for a planned IT. The study defines 12 potential variants of handling equipment based on their techno-operational characteristics and evaluates them using 16 criteria. The results indicate that the best handling technology variant is the one that uses a rail-mounted gantry crane for trans-shipment and a reach stacker for horizontal transport and storage. The results also point to the conclusion that instead of choosing equipment for each process separately, it is important to think about the combination of different handling technologies that can work together to complete a series of handling cycle processes. The main contributions of this paper are the development of a new hybrid model and the establishment of a framework for the selection of appropriate IT subsystem technologies along with a set of unique criteria for their evaluation and selection

    Countermeasures for the majority attack in blockchain distributed systems

    Get PDF
    La tecnología Blockchain es considerada como uno de los paradigmas informáticos más importantes posterior al Internet; en función a sus características únicas que la hacen ideal para registrar, verificar y administrar información de diferentes transacciones. A pesar de esto, Blockchain se enfrenta a diferentes problemas de seguridad, siendo el ataque del 51% o ataque mayoritario uno de los más importantes. Este consiste en que uno o más mineros tomen el control de al menos el 51% del Hash extraído o del cómputo en una red; de modo que un minero puede manipular y modificar arbitrariamente la información registrada en esta tecnología. Este trabajo se enfocó en diseñar e implementar estrategias de detección y mitigación de ataques mayoritarios (51% de ataque) en un sistema distribuido Blockchain, a partir de la caracterización del comportamiento de los mineros. Para lograr esto, se analizó y evaluó el Hash Rate / Share de los mineros de Bitcoin y Crypto Ethereum, seguido del diseño e implementación de un protocolo de consenso para controlar el poder de cómputo de los mineros. Posteriormente, se realizó la exploración y evaluación de modelos de Machine Learning para detectar software malicioso de tipo Cryptojacking.DoctoradoDoctor en Ingeniería de Sistemas y Computació

    Application of fuzzy controllers in automatic ship motion control systems

    Get PDF
    Automatic ship heading control is a part of the automatic navigation system. It is charged with the task of maintaining the actual ship’s course angle or actual ship’s course without human intervention in accordance with the set course or setting parameter and maintaining this condition under the effect of disturbing influences. Thus, the corrective influence on deviations from a course can be rendered by the position of a rudder or controlling influence that leads to the rotary movement of a vessel around a vertical axis that represents a problem, which can be solved with the use of fuzzy logic. In this paper, we propose to consider the estimation of the efficiency of fuzzy controllers in systems of automatic control of ship movement, obtained by analysis of a method of the formalized record of a logic conclusion and structure of the fuzzy controller. The realization of this allows to carry out effective stabilization of a course angle of a vessel taking into account existing restrictions

    Valtionavustustoiminnan sanasto : 2. laajennettu laitos

    Get PDF
    Valtionavustustoiminnan sanastossa määritellään valtionavustustoimintaa koskevat keskeiset käsitteet ja annetaan näille valtakunnalliset termisuositukset sekä niiden vastineet ruotsiksi ja englanniksi. Tavoitteena on selkeyttää ja yhdenmukaistaa yli 90 valtionapuviranomaisen käyttämät käsitteet. Sanastoa on valmisteltu yhteistyössä eri hallinnonaloilla toimivien valtionavustustoiminnan asiantuntijoiden ja valtionavustuksen hakijoiden kanssa. Terminologista sanastotyötä on toteuttanut Sanastokeskuksen terminologi yhdessä CSC – Tieteen tietotekniikan keskuksen asiantuntijan kanssa. Ruotsin ja englannin kieliversioista on vastannut valtioneuvoston kanslian käännös- ja kielitoimiala. Jatkossa työryhmätyöskentely painottuu sanaston ylläpitämiseen ja kehittämiseen. Julkaisu täydentää aikaisempaa sanaston versiota, joka julkaistiin vuonna 2021. Sanastoa on täydennetty luvuilla 7—8, joissa määritellään valtionavustuksella rahoitettavaan toimintaan, vaikuttavuuteen ja arviointiin sekä talouteen ja toiminnan resursseihin liittyviä käsitteitä. Sanastosta aiemmin julkaistu osa (luvut 1—6) sisältää valtionavustuslajeihin sekä valtionapuviranomaisten ja valtionavustusten hakijoiden väliseen toimintaan liittyviä käsitteitä. Näihin käsitteisiin on tehty tarkennuksia ja uusia käsitesuhdeviittauksia sanaston uusien osuuksien valmistelun aikana

    Deep Transfer Learning Applications in Intrusion Detection Systems: A Comprehensive Review

    Full text link
    Globally, the external Internet is increasingly being connected to the contemporary industrial control system. As a result, there is an immediate need to protect the network from several threats. The key infrastructure of industrial activity may be protected from harm by using an intrusion detection system (IDS), a preventive measure mechanism, to recognize new kinds of dangerous threats and hostile activities. The most recent artificial intelligence (AI) techniques used to create IDS in many kinds of industrial control networks are examined in this study, with a particular emphasis on IDS-based deep transfer learning (DTL). This latter can be seen as a type of information fusion that merge, and/or adapt knowledge from multiple domains to enhance the performance of the target task, particularly when the labeled data in the target domain is scarce. Publications issued after 2015 were taken into account. These selected publications were divided into three categories: DTL-only and IDS-only are involved in the introduction and background, and DTL-based IDS papers are involved in the core papers of this review. Researchers will be able to have a better grasp of the current state of DTL approaches used in IDS in many different types of networks by reading this review paper. Other useful information, such as the datasets used, the sort of DTL employed, the pre-trained network, IDS techniques, the evaluation metrics including accuracy/F-score and false alarm rate (FAR), and the improvement gained, were also covered. The algorithms, and methods used in several studies, or illustrate deeply and clearly the principle in any DTL-based IDS subcategory are presented to the reader

    Digital Health Transformation of Integrated Care in Europe: Overarching Analysis of 17 Integrated Care Programs

    Get PDF
    Background: Digital health tools comprise a wide range of technologies to support health processes. The potential of these technologies to effectively support health care transformation is widely accepted. However, wide scale implementation is uneven among countries and regions. Identification of common factors facilitating and hampering the implementation process may be useful for future policy recommendations. Objective: The aim of this study was to analyze the implementation of digital health tools to support health care and social care services, as well as to facilitate the longitudinal assessment of these services, in 17 selected integrated chronic care (ICC) programs from 8 European countries. Methods: A program analysis based on thick descriptions including document examinations and semistructured interviews with relevant stakeholders of ICC programs in Austria, Croatia, Germany, Hungary, the Netherlands, Norway, Spain, and the United Kingdom was performed. A total of 233 stakeholders (ie, professionals, providers, patients, carers, and policymakers) were interviewed from November 2014 to September 2016. The overarching analysis focused on the use of digital health tools and program assessment strategies. Results: Supporting digital health tools are implemented in all countries, but different levels of maturity were observed among the programs. Only few ICC programs have well-established strategies for a comprehensive longitudinal assessment. There is a strong relationship between maturity of digital health and proper evaluation strategies of integrated care. Conclusions: Notwithstanding the heterogeneity of the results across countries, most programs aim to evolve toward a digital transformation of integrated care, including implementation of comprehensive assessment strategies. It is widely accepted that the evolution of digital health tools alongside clear policies toward their adoption will facilitate regional uptake and scale-up of services with embedded digital health tools
    corecore