23 research outputs found

    Human Factors and the Road to Single Pilot Operations

    Get PDF
    The purpose of this research paper is to shed light on the feasibility and implications concerning the introduction of single-pilot operations on air transport category aircraft. As technology has been advancing over the past few decades, autonomous artificial intelligence software has started to become more popular, finding higher demands in various industries. With current issues such as the pilot shortage and raising pilot wages, airlines are looking for ways to cut down on costs and preserve a healthy work force level. The implementation of this artificial intelligence technology on the aircraft flight deck provides a potential solution to this problem. On a functional level, this software could easily prove to take on many of the tasks that current pilots face. There are, however, other considerations that play a large role in the overall feasibility of its implementation, most notably the human factors aspect of removing the first officer. Due to these human factors concerns, the likelihood that this technology can be incorporated effectively is improbable

    Decentralized monitoring for large-scale Software-Defined Networks

    Get PDF
    The Software-Defined Networking (SDN) paradigm can allow network management solutions to automatically and frequently reconfigure network resources. When developing SDN-based management architectures, it is of paramount importance to design a monitoring system that can provide frequent and consistent updates to heterogeneous management applications. For the monitoring functionality to scale according to the requirements of large-scale networks a distributed monitoring approach is required. In this paper we present a decentralized approach for resource monitoring in SDN, which is designed to support a wide range of measurement tasks and requirements in terms of monitoring rates and information granularity levels. Our solution leverages effective processing of the monitoring requests to reduce the consumption of limited resources, such as the control plane bandwidth of OpenFlow switches. To demonstrate the benefits of the proposed approach, our evaluation is based on a realistic and demanding use case, where a distributed management application coordinates a content distribution service in an ISP network

    Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems

    Full text link
    Caller ID spoofing is a global industry problem and often acts as a critical enabler for telephone fraud. To address this problem, the Federal Communications Commission (FCC) has mandated telecom providers in the US to implement STIR/SHAKEN, an industry-driven solution based on digital signatures. STIR/SHAKEN relies on a public key infrastructure (PKI) to manage digital certificates, but scaling up this PKI for the global telecom industry is extremely difficult, if not impossible. Furthermore, it only works with IP-based systems (e.g., SIP), leaving the traditional non-IP systems (e.g., SS7) unprotected. So far the alternatives to the STIR/SHAKEN have not been sufficiently studied. In this paper, we propose a PKI-free solution, called Caller ID Verification (CIV). CIV authenticates the caller ID based on a challenge-response process instead of digital signatures, hence requiring no PKI. It supports both IP and non-IP systems. Perhaps counter-intuitively, we show that number spoofing can be leveraged, in conjunction with Dual-Tone Multi-Frequency (DTMF), to efficiently implement the challenge-response process, i.e., using spoofing to fight against spoofing. We implement CIV for VoIP, cellular, and landline phones across heterogeneous networks (SS7/SIP) by only updating the software on the user's phone. This is the first caller ID authentication solution with working prototypes for all three types of telephone systems in the current telecom architecture. Finally, we show how the implementation of CIV can be optimized by integrating it into telecom clouds as a service, which users may subscribe to.Comment: 25 pages, 12 figures, 2 table

    Investigating The Optimal Presentation Of Feedback In Simulation-based Training An Application Of The Cognitive Theory Of Multimedia Learning

    Get PDF
    There are many different training interventions that can be used in simulation based training systems (e.g., cueing, hinting, highlighting, deliberate practice, etc.). However, the most widely used training intervention in the military is feedback, most often presented in the form of a debrief. With advances in technology, it is possible to measure and diagnose performance in real-time. Thus it is possible to provide immediate feedback during scenarios. However, training systems designers should not consider the timing of feedback in isolation. There are other parameters of feedback that must also be considered which may have an impact on performance. Specifically, feedback content and modality may also have an impact on the appropriate timing of feedback and its’ effectiveness in simulation training environments. Moreno and Mayer (2000) propose a cognitive theory of multimedia learning which describes how instruction is perceived and processed by a trainee. Using this theoretical framework, I investigate the optimal use of feedback while considering the interaction of feedback timing, content, and modality in scenario-based training environments. In order to investigate the relationship between the timing, modality, and content of feedback, a 2 (immediate, delayed) X 2 (visual, auditory) X 2 (process, outcome) betweensubjects design was used (a no feedback control condition was also included). Ninety participants were randomly assigned to the nine experimental groups. These participants performed a visual-spatial military task called the Forward Observer PC-based Simulation. Results indicated that receiving feedback was beneficial to improve performance as compared to receiving no feedback. As hypothesized, during a visual-spatial task, auditory feedback presented during a scenario led to higher performance than visual feedback. Finally, iv while I did not support my hypothesis that an interaction between all three components of feedback would affect performance, it is promising that the pattern of results mirrored the hypothesized pattern. Theoretical and practical implications, as well as limitations of the current study and directions for future research are discussed

    Making intelligent systems team players: Case studies and design issues. Volume 1: Human-computer interaction design

    Get PDF
    Initial results are reported from a multi-year, interdisciplinary effort to provide guidance and assistance for designers of intelligent systems and their user interfaces. The objective is to achieve more effective human-computer interaction (HCI) for systems with real time fault management capabilities. Intelligent fault management systems within the NASA were evaluated for insight into the design of systems with complex HCI. Preliminary results include: (1) a description of real time fault management in aerospace domains; (2) recommendations and examples for improving intelligent systems design and user interface design; (3) identification of issues requiring further research; and (4) recommendations for a development methodology integrating HCI design into intelligent system design

    Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems

    Get PDF
    Caller ID spoofing is a global industry problem and often acts as a critical enabler for telephone fraud. To address this problem, the Federal Communications Commission (FCC) has mandated telecom providers in the US to implement STIR/SHAKEN, an industry-driven solution based on digital signatures. STIR/SHAKEN relies on a public key infrastructure (PKI) to manage digital certificates, but scaling up this PKI for the global telecom industry is extremely difficult, if not impossible. Furthermore, it only works with IP-based systems (e.g., SIP), leaving the traditional non-IP systems (e.g., SS7) unprotected. So far the alternatives to the STIR/SHAKEN have not been sufficiently studied. In this paper, we propose a PKI-free solution, called Caller ID Verification (CIV). CIV authenticates the caller ID based on a challenge-response process instead of digital signatures, hence requiring no PKI. It supports both IP and non-IP systems. Perhaps counter-intuitively, we show that number spoofing can be leveraged, in conjunction with Dual-Tone Multi-Frequency (DTMF), to efficiently implement the challenge-response process, i.e., using spoofing to fight against spoofing. We implement CIV for VoIP, cellular, and landline phones across heterogeneous networks (SS7/SIP) by only updating the software on the user’s phone. This is the first caller ID authentication solution with working prototypes for all three types of telephone systems in the current telecom architecture. Finally, we show how the implementation of CIV can be optimized by integrating it into telecom clouds as a service, which users may subscribe to
    corecore