7 research outputs found

    Robust Traffic Sign Detection by means of Vision and V2I Communications

    Get PDF
    14th International IEEE Annual Conference on Intelligent Transportation Systems - ITSC, , 05/10/2011-07/10/2011, Washington DC, Estados UnidosThis paper presents a complete traffic sign recognition system, including the steps of detection, recognition and tracking. The Hough transform is used as detection method from the information extracted in contour images, while the proposed recognition system is based on Support Vector Machines (SVM), and is able to recognize up to one hundred of the main road signs. Besides a novel solution to the problem of discarding detected signs that do not pertain to the host road is proposed, for that purpose vehicle-to-infrastructure (V2I) communication and stereo information is used. This paper presents plenty of tests in real driving conditions, both day and night, in which a high success rate and low number of false negatives and true positives were obtained, and an average runtime of 35 ms, allowing real-time performance

    Introducing the CYSAS-S3 Dataset for Operationalizing a Mission-Oriented Cyber Situational Awareness

    Get PDF
    The digital transformation of the defence sector is not exempt from innovative requirements and challenges, with the lack of availability of reliable, unbiased and consistent data for training automatisms (machine learning algorithms, decision-making, what-if recreation of operational conditions, support the human understanding of the hybrid operational picture, personnel training/education, etc.) being one of the most relevant gaps. In the context of cyber defence, the state-of-the-art provides a plethora of data network collections that tend to lack presenting the information of all communication layers (physical to application). They are synthetically generated in scenarios far from the singularities of cyber defence operations. None of these data network collections took into consideration usage profiles and specific environments directly related to acquiring a cyber situational awareness, typically missing the relationship between incidents registered at the hardware/software level and their impact on the military mission assets and objectives, which consequently bypasses the entire chain of dependencies between strategic, operational, tactical and technical domains. In order to contribute to the mitigation of these gaps, this paper introduces CYSAS-S3, a novel dataset designed and created as a result of a joint research action that explores the principal needs for datasets by cyber defence centres, resulting in the generation of a collection of samples that correlate the impact of selected Advanced Persistent Threats (APT) with each phase of their cyber kill chain, regarding mission-level operations and goals

    Introducing the CYSAS-S3 Dataset for Operationalizing a Mission-Oriented Cyber Situational Awareness

    Get PDF
    The digital transformation of the defence sector is not exempt from innovative requirements and challenges, with the lack of availability of reliable, unbiased and consistent data for training automatisms (machine learning algorithms, decision-making, what-if recreation of operational conditions, support the human understanding of the hybrid operational picture, personnel training/education, etc.) being one of the most relevant gaps. In the context of cyber defence, the state-of-the-art provides a plethora of data network collections that tend to lack presenting the information of all communication layers (physical to application). They are synthetically generated in scenarios far from the singularities of cyber defence operations. None of these data network collections took into consideration usage profiles and specific environments directly related to acquiring a cyber situational awareness, typically missing the relationship between incidents registered at the hardware/software level and their impact on the military mission assets and objectives, which consequently bypasses the entire chain of dependencies between strategic, operational, tactical and technical domains. In order to contribute to the mitigation of these gaps, this paper introduces CYSAS-S3, a novel dataset designed and created as a result of a joint research action that explores the principal needs for datasets by cyber defence centres, resulting in the generation of a collection of samples that correlate the impact of selected Advanced Persistent Threats (APT) with each phase of their cyber kill chain, regarding mission-level operations and goals

    Importance of the small in a change ocean: understanding short term variability and role of small plankton (i-small)

    No full text
    1 poster.-- VI International Symposium on Marine Sciences, Vigo (Spain), 20-22th June 2018.-- C. G. Castro ... et al.This poster is a contribution of the project ‘i-SMALL: Importancia de lo pequeño en un océano en cambio: desentrañando la variabilidad de corta escala y el papel del plancton pequeño’ funded by Spanish Ministry of Science and Innovation (CTM2014-56119-R)Peer reviewe

    Peer review versus editorial review and their role in innovative science

    No full text
    corecore