Journal articles on the topic 'Automatic countermeasures'

To see the other types of publications on this topic, follow the link: Automatic countermeasures.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Automatic countermeasures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bayrak, Ali Galip, Francesco Regazzoni, David Novo, Philip Brisk, Francois-Xavier Standaert, and Paolo Ienne. "Automatic Application of Power Analysis Countermeasures." IEEE Transactions on Computers 64, no. 2 (February 2015): 329–41. http://dx.doi.org/10.1109/tc.2013.219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wojtal, Remigiusz M., and Laurence R. Rilett. "Development of a statistically-based methodology for analyzing automatic safety treatments at isolated high-speed signalized intersections." Archives of Transport 44, no. 4 (November 30, 2017): 75–88. http://dx.doi.org/10.5604/01.3001.0010.6163.

Full text
Abstract:
Crashes at isolated rural intersections, particularly those involving vehicles traveling perpendicularly to each other, are especially dangerous due to the high speeds involved. Consequently, transportation agencies are interested in reducing the occurrence of this crash type. Many engineering treatments exist to improve safety at isolated, high-speed, signalized intersections. Intuitively, it is critical to know which safety treatments are the most effective for a given set of selection criteria at a particular intersection. Without a well-defined decision making methodology, it is difficult to decide which safety countermeasure, or set of countermeasures, is the best option. Additionally, because of the large number of possible intersection configurations, traffic volumes, and vehicle types, it would be impossible to develop a set of guidelines that could be applied to all signalized intersections. Therefore, a methodology was developed in in this paper whereby common countermeasures could be modeled and analyzed prior to being implemented in the field. Due to the dynamic and stochastic nature of the problem, the choice was made to employ microsimulation tools, such as VISSIM, to analyze the studied countermeasures. A calibrated and validated microsimulation model of a signalized intersection was used to model two common safety countermeasures. The methodology was demonstrated on a test site located just outside of Lincoln, Nebraska. The model was calibrated to the distribution of observed speeds collected at the test site. It was concluded that the methodology could be used for the preliminary analysis of safety treatments based on select safety and operational measures of effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Fang, and Wei Zhang. "OTU Plate Heat Countermeasures of Automatic Test Platform Design." Advanced Materials Research 740 (August 2013): 676–79. http://dx.doi.org/10.4028/www.scientific.net/amr.740.676.

Full text
Abstract:
By improving the optical module internal thermal test platform for media and increase cooling efficiency, solve LASER_TCT/CCT OTU class plate temperature warning faults such as, and has been tested. Test results showed that the improvement to meet design requirements.
APA, Harvard, Vancouver, ISO, and other styles
4

Hu, Shengshan, Xingcan Shang, Zhan Qin, Minghui Li, Qian Wang, and Cong Wang. "Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures." IEEE Communications Magazine 57, no. 10 (October 2019): 120–26. http://dx.doi.org/10.1109/mcom.2019.1900006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wu, Zhizheng, Junichi Yamagishi, Tomi Kinnunen, Cemal Hanilci, Mohammed Sahidullah, Aleksandr Sizov, Nicholas Evans, Massimiliano Todisco, and Hector Delgado. "ASVspoof: The Automatic Speaker Verification Spoofing and Countermeasures Challenge." IEEE Journal of Selected Topics in Signal Processing 11, no. 4 (June 2017): 588–604. http://dx.doi.org/10.1109/jstsp.2017.2671435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kinnunen, Tomi, Hector Delgado, Nicholas Evans, Kong Aik Lee, Ville Vestman, Andreas Nautsch, Massimiliano Todisco, et al. "Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals." IEEE/ACM Transactions on Audio, Speech, and Language Processing 28 (2020): 2195–210. http://dx.doi.org/10.1109/taslp.2020.3009494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yamagishi, Junichi, Tomi H. Kinnunen, Nicholas Evans, Phillip De Leon, and Isabel Trancoso. "Introduction to the Issue on Spoofing and Countermeasures for Automatic Speaker Verification." IEEE Journal of Selected Topics in Signal Processing 11, no. 4 (June 2017): 585–87. http://dx.doi.org/10.1109/jstsp.2017.2698143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Altuwayjiri, Sarah Mohammed, Ouiem Bchir, and Mohamed Maher Ben Ismail. "Generalized Replay Spoofing Countermeasure Based on Combining Local Subclassification Models." Applied Sciences 12, no. 22 (November 18, 2022): 11742. http://dx.doi.org/10.3390/app122211742.

Full text
Abstract:
Automatic speaker verification (ASV) systems play a prominent role in the security field due to the usability of voice biometrics compared to alternative biometric authentication modalities. Nevertheless, ASV systems are susceptible to malicious voice spoofing attacks. In response to such threats, countermeasures have been devised to prevent breaches and ensure the safety of user data by categorizing utterances as either genuine or spoofed. In this paper, we propose a new voice spoofing countermeasure that seeks to improve the generalization of supervised learning models. This is accomplished by alleviating the problem of intraclass variance. Specifically, the proposed approach addresses the generalization challenge by splitting the classification problem into a set of local subproblems in order to lessen the supervised learning task. The system outperformed existing state-of-the-art approaches with an EER of 0.097% on the ASVspoof challenge corpora related to replaying spoofing attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

You Yu, Huang. "Research on Psychological Problems and Countermeasures of Contemporary College Students Based on Data Analysis." Mobile Information Systems 2022 (February 23, 2022): 1–7. http://dx.doi.org/10.1155/2022/3366837.

Full text
Abstract:
Due to absence of good and high prevalence rate of the comprehensive method of automatic assessment, the current mental health assessment is still subject to manual answer questionnaires. The main drawback of this is that the detection of mental health issues of contemporary college students through the manual answer questionnaire is not satisfactory. Mental health problems of the students cannot be properly detected, and as a result, they remain deprived of timely psychological counseling and treatment. At the same time, in order to improve the accuracy of automatic selection of mental health and the popularity of this solution, this study first presents a detailed analysis of the possible mental health problems encountered by contemporary college students. A radial basis function (radial basis function, RBF) neural network application in the automatic selection of mental health status and comparative verification. The results proved the higher accuracy and warning of the RBF nervous system in comparison to the mental health of contemporary college students. The research further investigates the dependence of the psychological problems and solutions of contemporary college students on data analysis. It can be rightly said that the study is of great importance due to its provision of new research direction and relevant countermeasures for the psychological problems of college students.
APA, Harvard, Vancouver, ISO, and other styles
10

Alam. "On the Use of Fisher Vector Encoding for Voice Spoofing Detection." Proceedings 31, no. 1 (November 20, 2019): 37. http://dx.doi.org/10.3390/proceedings2019031037.

Full text
Abstract:
Recently, the vulnerability of automatic speaker recognition systems to spoofing attacks has received significant interest among researchers. A robust speaker recognition system demands not only high recognition accuracy but also robustness to spoofing attacks. Several spoofing and countermeasure challenges have been organized to draw attention to this problem among the speaker recognition communities. Low-level descriptors designed to detect artifacts in spoofed speech are found to be the most effective countermeasures against spoofing attacks. In this work, we used Fisher vector encoding of low-level descriptors extracted from speech signals. The idea behind Fisher vector encoding is to determine the amount of change induced by the descriptors of the signal on a background probability model which is typically a Gaussian mixture model. The Fisher vector encodes the amount of change of the model parameters to optimally fit the new- coming data. For performance evaluation of the proposed approach we carried out spoofing detection experiments on the 2015 edition of automatic speaker verification spoofing and countermeasure challenge (ASVspoof2015) and report results on the evaluation set. As baseline systems, we used the standard Gaussian mixture model and i-vector/PLDA paradigms. For a fair comparison, in all systems, Constant Q cepstral coefficient (CQCC) features were used as low-level descriptors. With the Fisher vector-based approach, we achieved an equal error rate (EER) of 0.1145% on the known attacks, 1.223% on the unknown attacks, and 0.668% on the average. Moreover, with a single decision threshold this approach yielded an EER of 1.05% on the evaluation set.
APA, Harvard, Vancouver, ISO, and other styles
11

IVANYTSKA, Olga. "International cooperation in the field of combating tax avoidance and implementation of the Common Reporting Standard." Fìnansi Ukraïni 2022, no. 9 (December 28, 2022): 7–21. http://dx.doi.org/10.33763/finukr2022.09.007.

Full text
Abstract:
Introduction. The strengthening of globalization processes caused significant changes in the international taxation system. The negative consequences of globalization include large-scale tax avoidance and erosion of the tax base. These phenomena caused systematic steps by international organizations in the direction of substantiating the scope of action for the realisation of the process of automatic exchange of information on financial accounts in accordance with the General Reporting Standard and other documents. Ukraine has joined the initiatives of the international community and is consistently implementing measures for their adaptation and implementation. At the same time, there are some limitations in the application of the developed standards, which can be used by unscrupulous taxpayers as a loophole for harmful tax practices. Problem Statement. The scientific basis for the implementation of the BEPS Plan, in particular, the introduction of the process of automatic exchange of information on financial accounts in accordance with the General Reporting Standard. Purpose. Identification of key milestones in the formation and implementation of the BEPS Plan, as well as identification of some limitations and shortcomings in the provisions and procedures of automatic exchange of information on financial accounts, which may lead to abuse, improper actions, violations of confidentiality and security. Methods: analysis and synthesis, comparative analysis, analytical, implementation of a systemic approach to the study of issues Results. The systemic steps of international organizations regarding the implementation of the BEPS Countermeasures Plan and the development of relevant decisions and documents were analyzed. Some limitations in the application of the developed solutions, which can be used by unscrupulous taxpayers as a loophole for the continuation of harmful tax practices, have been identified. The actions of the Ukrainian government regarding joining the international community in the matter of automatic exchange of information on financial accounts are outlined. Conclusions. Therefore, systemic measures for the implementation of the BEPS Countermeasures Plan provide for the formation of a methodology for the application of mechanisms for such countermeasures, in particular principles, directions, tools, procedures and technologies that make impossible or complicate the processes of blurring the tax base and avoiding taxation. For this purpose, key international organizations, in particular the OECD, the Council of Europe, the G20 and the G8, have decided and prepared a number of documents, as well as standards, model and standard agreements to involve national governments in the implementation of joint efforts to counter BEPS, among which a special place is occupied by the Model Competent Authority Agreement (CAA) for automatic exchange of information and Common Reporting Standard. At the same time, when implementing agreements and standards, risks arise due to: avoidance of reporting by some financial institutions and other subjects of legal relations; breach of confidentiality; departure of some countries from general practice and standard procedures, etc. While developing a platform for legal, administrative, financial and economic, technical and technological support for the implementation of BEPS countermeasures, Ukraine should take into account the lessons of negative experience and prevent limitations of the specified standards.
APA, Harvard, Vancouver, ISO, and other styles
12

Wang, Gang. "Design and Realization of Network Gambling Crime Investigation System." Applied Mechanics and Materials 687-691 (November 2014): 1712–15. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1712.

Full text
Abstract:
The article discusses the investigation of net gambling. In the world, according to different states have different attitude; the section concludes the illegality of net gambling. Initiation of investigation has two categories: automatic initiation and compelling initiation, we should choose the latter, but it should have exception. The specific countermeasures are collecting leads from citizens’ reports or the public security organs’ conduct. Then the public security organs should find out the truth of the case, arrest the suspects and obtain the evidence. When the investigations were concluded, the organs should remove it to procurator ate for examination, or quash the case, in accordance with the following elements: the facts, evidence and legality. At the last of the section, specific investigation countermeasures for different kinds of net gambling are discussed.
APA, Harvard, Vancouver, ISO, and other styles
13

Wang, Qi Heng. "Study of Fire Control Safety of High-Rise Building and Countermeasures." Advanced Materials Research 418-420 (December 2011): 2308–11. http://dx.doi.org/10.4028/www.scientific.net/amr.418-420.2308.

Full text
Abstract:
For the current Chinese high-rise building fire prevention safety, the present situation and the problem of high-rise building fire prevention safety are expounded from the view of characteristics and cause of high-rise building fire; fire prevention safety management measures and countermeasures for high-rise building are also proposed. Directed analysis is raised from the state policies, high-rise building design, medium construction, equipment of fire control facilities, and later period management; appropriate measures are taken from the general layout, fire prevention division of evacuation staircase, fire-resistant limit, evacuation passages, and automatic warning system.
APA, Harvard, Vancouver, ISO, and other styles
14

Yang, Zhi Zheng, Yan Feng Wang, Jiang Ping Rao, and Zhu Gang Peng. "Control and Optimizing of Unstable State in Continuous Casting Process with Automatic System." Advanced Materials Research 472-475 (February 2012): 3057–62. http://dx.doi.org/10.4028/www.scientific.net/amr.472-475.3057.

Full text
Abstract:
Features and control methods in processes of unstable continuous casting of the 4th department of general steelmaking factory of WISCO were introduced, including ladle free-opening, tundish auto-casting, liquid level control and submerged nozzle’s quick replacing of mould, slag detection of ladle and so on. Countermeasures including updating facilities, improving accurate of controlling system, developing new technology were proved to be effective in practice, they can minimize the bad effect of the unsteady state to the producing stability and slab quality.
APA, Harvard, Vancouver, ISO, and other styles
15

Leier, Stefan, Raquel Fandos, and Abdelhak M. Zoubir. "Motion Error Influence on Segmentation and Classification Performance in SAS-Based Automatic Mine Countermeasures." IEEE Journal of Oceanic Engineering 40, no. 1 (January 2015): 57–70. http://dx.doi.org/10.1109/joe.2014.2303718.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Sun, Rong Xia, Lei Gao, Jian Kang, Pan Pan Huang, Yi Tian, and Xiao Feng Chen. "Automatic On-Line Detection and Sorting System Design and Implementation for Paper-Making Printing." Advanced Materials Research 383-390 (November 2011): 3–5. http://dx.doi.org/10.4028/www.scientific.net/amr.383-390.3.

Full text
Abstract:
Transforms the papermaking production line to spurt the code automatic detection separation system is the production of impending rapid requirement. This design using the original paper cutter to cut the paper separating function is bad, choose the trigger for separating door action by photoelectric sensor signal, triggering bad signal detection equipments, and complete code identification papers in the test paper separating bad logo. In printing, the PLC control high-speed counter acquisition traction, printing roll encoder pulse signal range. This system includes color standard sensor signal detection, Siemens S7-200 PLC controller, etc. Also gives the system installation problems and presents the corresponding countermeasures. The paper realize online automatic testing equipments, satisfying the function of separation, stable, zero leakage rate of selected control of the production requirement.
APA, Harvard, Vancouver, ISO, and other styles
17

Su, Chun Mei, Qiu Sha, Yong Chun Mou, and Zhi Bin Jiao. "Pre-Warning Pattern for Safety Monitoring of Artificial Islands in Coastal Areas during Operating Period." Applied Mechanics and Materials 482 (December 2013): 419–22. http://dx.doi.org/10.4028/www.scientific.net/amm.482.419.

Full text
Abstract:
During operating period, the safety monitoring of artificial islands greatly relates to the stability of their enclosing structures and the safety of their production and operation. Combined with the development of the first safety monitoring automatic system for artificial islands in coastal areas in China, this article analyzes the characteristics of artificial islands safety monitoring during operating period. The relevant pre-warning indices and pattern are first put forward. The countermeasures for the engineering safety are hierarchically proposed so as to guide similar projects.
APA, Harvard, Vancouver, ISO, and other styles
18

Sturm, Valentin, Dmitry Efrosinin, Manfred Öhlschuster, Erika Gusterer, Marc Drillich, and Michael Iwersen. "Combination of Sensor Data and Health Monitoring for Early Detection of Subclinical Ketosis in Dairy Cows." Sensors 20, no. 5 (March 8, 2020): 1484. http://dx.doi.org/10.3390/s20051484.

Full text
Abstract:
Subclinical ketosis is a metabolic disease in early lactation. It contributes to economic losses because of reduced milk yield and may promote the development of secondary diseases. Thus, an early detection seems desirable as it enables the farmer to initiate countermeasures. To support early detection, we examine different types of data recordings and use them to build a flexible algorithm that predicts the occurence of subclinical ketosis. This approach shows promising results and can be seen as a step toward automatic health monitoring in farm animals.
APA, Harvard, Vancouver, ISO, and other styles
19

Chen, Pengyu, Tengyuan Liang, and Zibin Wu. "Impacts of Ethiopia Dam on Vegetation and Water and Ecological Countermeasures." IOP Conference Series: Earth and Environmental Science 1011, no. 1 (April 1, 2022): 012044. http://dx.doi.org/10.1088/1755-1315/1011/1/012044.

Full text
Abstract:
Abstract Ethiopia is one of the highest lying countries in Africa, known as the “Roof of Africa”. The Grand Ethiopian Renaissance Dam is established to solve the problem of electricity shortage, storing and supplying water. This study analyzes the impacts of the Renaissance Dam in Ethiopia on vegetation and water through random forest model and index map via semi-automatic classification module of QGIS’s plugin. Results show that area of vegetation around the dam decreases and the water area increases during dam construction. Based on previous studies, the dam has variable impacts on surrounding vegetation, water quality and level. Renaissance dam has had a negative impact on the surrounding vegetation and water level for decades of construction, but a positive impact on the water quality. Considering the ecological system and sustainable development as the ultimate goal, it needs to make full use of environmental assessment and establish the ecological operation mode of dam for achieving better results.
APA, Harvard, Vancouver, ISO, and other styles
20

张, 孝兴. "Common Problems and Countermeasures in the Operation of Sublance for the Automatic Control of Converter." Metallurgical Engineering 07, no. 03 (2020): 185–94. http://dx.doi.org/10.12677/meng.2020.73026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Cottrell, Benjamin H., and In-Kyu Lim. "Developing a Process for Deploying Systemic Countermeasures at Unsignalized Intersections: Case Study of Virginia." Transportation Research Record: Journal of the Transportation Research Board 2673, no. 9 (May 9, 2019): 538–47. http://dx.doi.org/10.1177/0361198119846469.

Full text
Abstract:
This paper discusses the process used to develop a safety improvement plan for unsignalized intersections using systemic low-cost countermeasures. The scope of this project focused on unsignalized intersections with stop sign control on the minor approaches. The first objective was to perform an assessment of Virginia’s unsignalized intersection crashes over a five-year period to determine predominant crash trends and collision types to target for treatment. The four focus collision types with the highest frequency of crashes and the greatest potential reduction in crashes were 3-leg angle, 3-leg fixed object off the road, 4-leg angle and 4-leg rear end. Chi-square automatic interaction detection decision tree analysis was used to perform a systemic analysis to identify a group of intersections associated with potential risk factors related to the focus collision types. A tiered list of systemic countermeasures to deploy was developed. The countermeasures were intended to warn of the stop ahead, make the stop sign and stop location more visible on a minor street, and to warn of the intersection ahead on a major street. The potential for safety improvement measure was used to prioritize the candidate treatment intersections. Before deployment, a study of the intersection by district traffic engineering staff was planned to finalize the plan. The output from the research was a safety improvement plan to systemically deploy treatments to unsignalized intersections as part of the safety program.
APA, Harvard, Vancouver, ISO, and other styles
22

Huang, Xinyao. "Research on Computer Assisted Intelligent Emission System of High-rise Building Based on BIM Technology and Wireless Automatic Monitoring." Journal of Physics: Conference Series 2083, no. 4 (November 1, 2021): 042073. http://dx.doi.org/10.1088/1742-6596/2083/4/042073.

Full text
Abstract:
Abstract In response to the needs of low-carbon design and carbon emission measurement of public buildings, we use advanced information tools, building information model BIM technology to solve these problems, and from the perspective of strategic development, we will establish a set of home improvement design systems based on BIM technology for unification Three-dimensional home improvement design. The system includes analysis of thermal performance of high-rise building decoration and building light environment, and proposes optimization countermeasures for low-carbon design.
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Xingyu, Xiongwei Zhang, Wei Liu, Xia Zou, Meng Sun, and Jian Zhao. "Waveform level adversarial example generation for joint attacks against both automatic speaker verification and spoofing countermeasures." Engineering Applications of Artificial Intelligence 116 (November 2022): 105469. http://dx.doi.org/10.1016/j.engappai.2022.105469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Takino, Fumiya, Takahiro Ryu, Takashi Nakae, Kenichiro Matsuzaki, and Risa Ueno. "Fundamental study on countermeasures against subharmonic vibration of order 1/2 in automatic transmissions for cars." MATEC Web of Conferences 211 (2018): 13004. http://dx.doi.org/10.1051/matecconf/201821113004.

Full text
Abstract:
In automatic transmissions for cars, a damper is installed in the lock-up clutch to absorb torsional vibrations caused by combustion in the engine. Although a damper with low stiffness reduces the torsional vibration, low-stiffness springs are difficult to use because of space limitations. To address this problem, dampers have been designed using a piecewise-linear spring having three different stages of stiffness. However, a nonlinear subharmonic vibration of order 1/2 occurs because of the nonlinearity of the piecewise-linear spring in the damper. In this study, we experimentally and analytically examined a countermeasure against the subharmonic vibration by increasing the stages of the piecewise-linear spring using the one-degree-of-freedom system model. We found that the gap between the switching points of the piecewise-linear spring was the key to vibration reduction. The experimental results agreed with results of the numerical analyses.
APA, Harvard, Vancouver, ISO, and other styles
25

Jian-Ping, Zheng. "The Problems and Countermeasures in Process for Improving Automatic Level of Large Capacity Thermal Power Station." IFAC Proceedings Volumes 30, no. 17 (August 1997): 191–95. http://dx.doi.org/10.1016/s1474-6670(17)46407-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Bin, Ren, Zhu Ping, Cheng Ying, and Song Lei. "Analysis and Research of Modulation Recognition Algorithm in Satellite Communications." Advanced Materials Research 756-759 (September 2013): 1961–67. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1961.

Full text
Abstract:
Automatic identification of the communication signal modulation mode is a hot topic of research in the signal processing field in recent years. It is an important part of electronic countermeasures, and also a rapidly developed field of signal analysis. Communication signal modulation recognition is widely used in signal confirmation, interference identification, radio listening, signal monitoring, as well as software-defined radio, satellite communications and other fields. This paper proposed a digital modulation signal automatic recognition algorithm for satellite communication applications,. The algorithm uses the higher order cumulants of modulating signal, combined with constellation map features, to classify the signal. It has invariance in signal amplitude and phase deviation, and inhibits the additive Gaussian noise at the same time. Compared with other identification algorithms, it has the characteristics of stability and wide application. Computer simulations show that, under the given data length and moderate SNR conditions, a higher recognition rate (> 95%) can be obtained.
APA, Harvard, Vancouver, ISO, and other styles
27

Li, Yaru, Jiali Qiao, Xiao Han, Zhiying Zhao, Jun Kou, Wenlu Zhang, Shuli Man, and Long Ma. "Needs, Challenges and Countermeasures of SARS-CoV-2 Surveillance in Cold-Chain Foods and Packaging to Prevent Possible COVID-19 Resurgence: A Perspective from Advanced Detections." Viruses 15, no. 1 (December 30, 2022): 120. http://dx.doi.org/10.3390/v15010120.

Full text
Abstract:
The pandemic caused by SARS-CoV-2 has a huge impact on the global economy. SARS-CoV-2 could possibly and potentially be transmitted to humans through cold-chain foods and packaging (namely good-to-human), although it mainly depends on a human-to-human route. It is imperative to develop countermeasures to cope with the spread of viruses and fulfil effective surveillance of cold-chain foods and packaging. This review outlined SARS-CoV-2-related cold-chain food incidents and current methods for detecting SARS-CoV-2. Then the needs, challenges and practicable countermeasures for SARS-CoV-2 detection, specifically for cold-chain foods and packaging, were underlined. In fact, currently established detection methods for SARS-CoV-2 are mostly used for humans; thus, these may not be ideally applied to cold-chain foods directly. Therefore, it creates a need to develop novel methods and low-cost, automatic, mini-sized devices specifically for cold-chain foods and packaging. The review intended to draw people’s attention to the possible spread of SARS-CoV-2 with cold-chain foods and proposed perspectives for futuristic cold-chain foods monitoring during the pandemic.
APA, Harvard, Vancouver, ISO, and other styles
28

Ravindran, Swathika, and K. Geetha. "An Overview of Spoof Detection in ASV Systems." ECS Transactions 107, no. 1 (April 24, 2022): 1963–71. http://dx.doi.org/10.1149/10701.1963ecst.

Full text
Abstract:
In current years, voice based application are used broadly in varied applications for speaker recognition. By and by, there is a wide work in the investigation of parodying and against mocking for Automatic Speaker Verification (ASV) framework. The current advancement within the ASV system ends up interest to secure these voice biometric systems for existent world applications. This paper provides the literature of spoofing detection, novel acoustic feature representations, deep learning, end-to-end systems, etc. Moreover, it conjointly summaries previous studies of spoofing attacks with stress on SS, VC, and replay alongside recent efforts to develop countermeasures for spoof speech detection and speech sound disorder tasks.
APA, Harvard, Vancouver, ISO, and other styles
29

Bernasconi, Eleonora, Fabrizio De Fausti, Francesco Pugliese, Monica Scannapieco, and Diego Zardetto. "Automatic extraction of land cover statistics from satellite imagery by deep learning1." Statistical Journal of the IAOS 38, no. 1 (March 21, 2022): 183–99. http://dx.doi.org/10.3233/sji-190555.

Full text
Abstract:
In this paper, we address the challenge of producing fully automated land cover estimates from satellite imagery through Deep Learning algorithms. We developed our system according to a tile-based, classify-and-count design. To implement the classification engine of the system, we adopted a cutting-edge Convolutional Neural Network model named Inception-V3, which we customized and trained for scene classification on the EuroSAT dataset. We tested and validated our system on two Sentinel-2 images representing quite different Italian territories (with an area of 751 km2 and 443 km2, respectively). Because no genuine ground-truth is available for the land cover of these sub-regional territories, we built a pseudo ground-truth by integrating land cover information from flagship European projects CORINE and LUCAS. A critical and careful analysis shows that our automatic land cover estimates are in good agreement with the pseudo ground-truth and offers extensive evidence of the remarkable segmentation ability of our system. The limits of our approach are also critically discussed in the paper and possible countermeasures are illustrated. When compared with traditional projects like CORINE and LUCAS, our automatic land cover estimation system exhibits three fundamental advantages: it can dramatically reduce production costs; it can allow delivering very timely and frequent land cover statistics; it can enable land cover estimation for very small territorial areas, well beyond the NUTS-2 level. As an additional outcome of land cover estimation, our system also automatically generates moderate resolution land cover maps that might be used in cartography projects as an agile first-level tool for map update or change detection purposes.
APA, Harvard, Vancouver, ISO, and other styles
30

Shim, Hae-Sup. "Countermeasures against Perfect Single Line-to-Ground Faults Caused by Failures of Rack-Mounted Automatic Transfer Switches." Journal of the Korean Institute of Illuminating and Electrical Installation Engineers 30, no. 12 (December 31, 2016): 39. http://dx.doi.org/10.5207/jieie.2016.30.12.039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Riahi Manesh, Mohsen, and Naima Kaabouch. "Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system." International Journal of Critical Infrastructure Protection 19 (December 2017): 16–31. http://dx.doi.org/10.1016/j.ijcip.2017.10.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Liu, Hui Hai, Xiao Li Zhang, Wei Li, Xiao Yang Wang, and Yi Fan Zhang. "Research on Relay Protection of Distribution Network System with Distributed Generation." Applied Mechanics and Materials 734 (February 2015): 670–74. http://dx.doi.org/10.4028/www.scientific.net/amm.734.670.

Full text
Abstract:
Introduce the current development of distributed generation, the structure and protection configuration of existing distribution network, and the fault current insert of different kinds of distributed generation was introduced. Through the distribution network in different positions to join distributed generation, the influence of the join of distributed generation on the existing protection of distribution network was analyzed, which included the serious interference to the sensitivity and selectivity of the original protection, the refusal of line protection, the action error of non- fault line protection. The influence of distributed generation on automatic reclosing, and the effect between fuses was discussed, to some extent, and base on the discussion some appropriate countermeasures are proposed.
APA, Harvard, Vancouver, ISO, and other styles
33

Dorothy, R., and Sasilatha Sasilatha. "Smart Grid Systems Based Survey on Cyber Security Issues." Bulletin of Electrical Engineering and Informatics 6, no. 4 (December 1, 2017): 337–42. http://dx.doi.org/10.11591/eei.v6i4.862.

Full text
Abstract:
The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.
APA, Harvard, Vancouver, ISO, and other styles
34

Wang, Guang Zheng, and Wen Xing Wang. "Research on Small Synchronous Generator Excited System Based on Fuzzy Control." Applied Mechanics and Materials 120 (October 2011): 524–27. http://dx.doi.org/10.4028/www.scientific.net/amm.120.524.

Full text
Abstract:
This article describes the small synchronous generator excitation control device characteristics and working principle is proposed based on fuzzy control of excitation regulator device on-site test method. Phase compound excitations with voltage corrector by the way of magnetic amplifier were used in excitation devices. The generator terminal voltage, load current and power factor and other parameters were adjusted by fuzzy control through automatic control phase compound excitation transformer. For separate generator, the major factor of terminal voltage change was caused by the change of reactive current, in order to keep constant voltage generator excitation current mast be adjusted. At the end of the paper the problems and countermeasures in the course of debugging process were analyzed.
APA, Harvard, Vancouver, ISO, and other styles
35

Pinchuk, A., M. Garbuz, P. Zeleny, D. Harnets, and D. Ivanov. "ANALYSIS OF EXPERIENCE IN THE APPLICATION OF MISSILE LAUNCH DETECTION SYSTEMS." Наукові праці Державного науково-дослідного інституту випробувань і сертифікації озброєння та військової техніки, no. 9 (December 3, 2021): 118–29. http://dx.doi.org/10.37701/dndivsovt.9.2021.14.

Full text
Abstract:
Analysis of combat losses of aircraft in local armed conflicts in recent decades shows that most cases of aircraft hits are related to the impact of guided surface-to-air and air-to-air missiles equipped with homing warheads. The use of modern guided missiles equipped with homing warheads is one of the main threats to aircraft of various types. This is due to the fact that modern guided missiles are characterized by high speed, maneuverability, accuracy of aiming and difficulty of detection. Solving the problem of protecting aircraft from guided missiles consists of several stages: detection of missile launch; confirmation that the detected missile is heading directly toward the protected object; missile identification and decision-making on the most effective countermeasure system employment. At present, there are no missile launch detection systems that guarantee a 100% probability of threat detection, but an analysis of aviation combat losses in local armed conflicts in recent decades convincingly shows that the number of combat losses of aircraft equipped with such systems is much lower than those in which missile launch detection is carried out visually. For example, most of the Soviet Union's losses during the war in Afghanistan and the United States‟ losses during Operation “Desert Storm” in Iraq were related to the use of portable anti-aircraft missile systems, which missiles were equipped with infrared homing warheads. Realizing the scale of the threat posed by such missiles, most of the world's leading countries have significantly increased the expenses on development new or improvement existing countermeasures. As a result, the aggregate losses of coalition forces in Iraq, Afghanistan and Syria since 2001 clearly suggest that these costs have paid off, with losses from the use of portable anti-aircraft missile systems significantly reduced, while the total number of combat sorties increased. Therefore, in the face of all the challenges and threats posed to Ukraine due to the aggressive actions of the Russian Federation, conducting research in the interests of aviation of the Armed Forces of Ukraine to improve the effectiveness of missile detection systems for ensuring timely detection of threats, warning of aircraft crew and activation in the automatic mode the means of countermeasures is as relevant as ever.
APA, Harvard, Vancouver, ISO, and other styles
36

Li, Jing. "Potential risks and regulatory countermeasures of the development of pass economy in the meta universe." Metaverse 2, no. 1 (March 24, 2021): 16. http://dx.doi.org/10.54517/m.v2i1.1872.

Full text
Abstract:
<p>The rise of Metaverse provides a new opportunity for the development of communication economy. Metaverse provides an ideal digital space for the equal participation of pass economic subjects, the economic value of creators, and the realization of rights and obligations by consensus rules. The potential risks associated with the development of the new economic form should be prevented. For example, the price fluctuation of the pass may infringe the rights and interests of creators, consumers and other subjects. The virtual space of the Metaverse may breed behaviors that violate laws and public order and good customs. Metaverse may be controlled by capital to form monopoly, etc. The combination of meta universe and pass economy can be used to regulate “law + technology”, including legal registration/certification + blockchain technology verification, legal procedure + automatic execution of smart contract, governance according to law + Dao autonomy. Specifically, the administrative organ uses blockchain technology to verify digital identity and digital property, review participant identity and activity content, supervise operator monopoly behavior and formulate national standards.</p>
APA, Harvard, Vancouver, ISO, and other styles
37

Li, Jing. "Potential risks and regulatory countermeasures of the development of pass economy in the meta universe." Metaverse 2, no. 1 (March 24, 2021): 16. http://dx.doi.org/10.54517/met.v2i1.1872.

Full text
Abstract:
<p>The rise of Metaverse provides a new opportunity for the development of communication economy. Metaverse provides an ideal digital space for the equal participation of pass economic subjects, the economic value of creators, and the realization of rights and obligations by consensus rules. The potential risks associated with the development of the new economic form should be prevented. For example, the price fluctuation of the pass may infringe the rights and interests of creators, consumers and other subjects. The virtual space of the Metaverse may breed behaviors that violate laws and public order and good customs. Metaverse may be controlled by capital to form monopoly, etc. The combination of meta universe and pass economy can be used to regulate “law + technology”, including legal registration/certification + blockchain technology verification, legal procedure + automatic execution of smart contract, governance according to law + Dao autonomy. Specifically, the administrative organ uses blockchain technology to verify digital identity and digital property, review participant identity and activity content, supervise operator monopoly behavior and formulate national standards.</p>
APA, Harvard, Vancouver, ISO, and other styles
38

Hu, Lian, and Jing Hu. "Exploration of the Problems and Solutions Based on the Translation of Computer Software into Japanese Language." Mathematical Problems in Engineering 2022 (September 6, 2022): 1–9. http://dx.doi.org/10.1155/2022/3712090.

Full text
Abstract:
At present, the research on machine translation mainly focuses on English-Chinese translation, while the research on Japanese college students using Japanese Chinese machine translation software is relatively few. In order to solve the above problems in Chinese Japanese bilingual translation, this paper proposes a phrase translation method based on sequence intersection. This method regards sentences as word sequences and aligns the sequence intersection of all source sentences corresponding to the target sentence in the corpus with Chinese and Japanese sentences containing the phrases to be translated. By fully mining the information of sentence alignment bilingual corpus without word alignment resources, we can obtain high-quality phrase translation, syntactic analysis, and dictionary. Then, we focus on the automatic construction of sentence level aligned bilingual corpus and explore the automatic sentence alignment technology of Chinese and Japanese bilinguals. A ten-year alignment model based on combination cues and core extended square matching is proposed. The preprocessing of the computer corpus and the basic construction of the corpus are completed. This paper also puts forward corresponding countermeasures and approaches to the problems encountered in the construction of computer translation.
APA, Harvard, Vancouver, ISO, and other styles
39

Shahraki, Farideh Foroozandeh, Ali Pour Yazdanpanah, Emma E. Regentova, and Venkatesan Muthukumar. "A Trajectory Based Method of Automatic Counting of Cyclist in Traffic Video Data." International Journal on Artificial Intelligence Tools 26, no. 04 (August 2017): 1750015. http://dx.doi.org/10.1142/s0218213017500154.

Full text
Abstract:
Due to the growing number of cyclist accidents on urban roads, methods for collecting information on cyclists are of significant importance to the Department of Transportation. The collected information provides insights into solving critical problems related to transportation planning, implementing safety countermeasures, and managing traffic flow efficiently. Intelligent Transportation System (ITS) employs automated tools to collect traffic information from traffic video data. One of the important factors that influence cyclists safety is their counts. In comparison to other road users, such as cars and pedestrians, the automated cyclist data collection is relatively a new research area. In this work, we develop a vision-based method for gathering cyclist count data at intersections and road segments. We implement a robust cyclist detection method based on a combination of classification features. We implement a multi-object tracking method based on the Kernelized Correlation Filters (KCF) in cooperation with the bipartite graph matching algorithm to track multiple cyclists. Then, a trajectory rebuilding method and a trajectory comparison model are applied to refine the accuracy of tracking and counting. The proposed method is the first cyclist counting method, that has the ability to count cyclists under different movement patterns. The trajectory data obtained can be further utilized for cyclist behavioral modeling and safety analysis.
APA, Harvard, Vancouver, ISO, and other styles
40

Li, Zong-Xun, Yu-Jun Li, Yi-Wei Liu, Cheng Liu, and Nan-Xin Zhou. "K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph." Symmetry 15, no. 2 (January 25, 2023): 337. http://dx.doi.org/10.3390/sym15020337.

Full text
Abstract:
Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with security threats. Considering the growth of cyber threat intelligence, the quick analysis of threats has become a hot topic at present. Researchers have proposed some machine learning and deep learning models to automatically analyze these immense amounts of cyber threat intelligence. However, due to a large amount of network security terminology in CTI, these models based on open-domain corpus perform poorly in the CTI automatic analysis task. To address this problem, we propose an automatic CTI analysis method named K-CTIAA, which can extract threat actions from unstructured CTI by pre-trained models and knowledge graphs. First, the related knowledge in knowledge graphs will be supplemented to the corresponding position in CTI through knowledge query and knowledge insertion, which help the pre-trained model understand the semantics of network security terms and extract threat actions. Second, K-CTIAA reduces the adverse effects of knowledge insertion, usually called the knowledge noise problem, by introducing a visibility matrix and modifying the calculation formula of the self-attention. Third, K-CTIAA maps corresponding countermeasures by using digital artifacts, which can provide some feasible suggestions to prevent attacks. In the test data set, the F1 score of K-CTIAA reaches 0.941. The experimental results show that K-CTIAA can improve the performance of automatic threat intelligence analysis and it has certain significance for dealing with security threats.
APA, Harvard, Vancouver, ISO, and other styles
41

Chen, Junhan. "MiniWarner: An Novel and Automatic Malicious Phishing Mini-apps Detection Approach." Computer and Information Science 15, no. 1 (January 21, 2022): 57. http://dx.doi.org/10.5539/cis.v15n1p57.

Full text
Abstract:
WeChat mini-apps are &ldquo;sub-applications&rdquo; built within the WeChat platform. Unlike full-function native applications, they are streamlined, &ldquo;light&rdquo; versions of the apps, and enable users to open and use them inside WeChat without downloading and installation. Since being introduced by WeChat in 2017, 4.3 million WeChat mini-programs have been developed, and they attract around 410 million daily active users Up to 2021. However, motivated by financial gains, many malicious mini-app developers use some intended description and icon to mislead users to click and open their mini-apps. These mini-apps are full of annoying advertisements and collect users&rsquo; privacy information stealthily, which can expose users to privacy risks and financial losses. Although security personnel of WeChat has enforced various countermeasures to prevent malicious phishing mini-apps sneaking into WeChat, rampant malicious leading mini-apps still have been observed recently. In this paper, we present MiniWarner, a novel approach that leverages Natural Language Processing and a number of reverse engineering techniques to detect whether a mini-app is malicious and phishing when users open it. MiniWarner will only ask users whether to continue to open the malicious phishing mini-app, thus it can protect users against the intended misleading by attackers, and still preserve the original user experience. Besides, this approach is implemented as an Xposed module, making it practical to be quickly deployed on a large number of user devices. Our paper will introduce how we developed MiniWarner and the measurement results of MiniWarner in detail.
APA, Harvard, Vancouver, ISO, and other styles
42

Tamachkiarow, A., and H. C. Flemming. "On-line monitoring of biofilm formation in a brewery water pipeline system with a fibre optical device." Water Science and Technology 47, no. 5 (March 1, 2003): 19–24. http://dx.doi.org/10.2166/wst.2003.0270.

Full text
Abstract:
Any advanced anti-fouling strategy must be based on early warning systems which allow for timely, precisely directed and optimized countermeasures. Such systems must be able to detect biofilm growth on representative surfaces. In order to meet this requirement, a fibre optical device (FOS) has been developed. It is based on light which is scattered by objects deposited on the tip of an optical fibre. A receiving fibre collects the signal and forwards it to a detection and quantification unit. Both the sending and the receiving fibre are mounted in a measuring head which is integrated evenly on the inner surface of a water pipeline at representative sites. This device was applied to a water system of a brewery in order to put its reliability to test under practical conditions. The FOS detected the build-up of a deposit which was identified independently as consisting of microorganisms, i.e., a biofilm. A stable, well detectable and reproducible signal could be obtained above a colonization of 105 cells cm−2. Adjustment of the sensitivity of the amplifier allowed for detection of biofilms up to 1010 cells cm−2. Cleaning countermeasures could be detected clearly by a decrease of backscattered light intensity. The system proved to be suitable for on-line, non-destructive, real-time and automatic monitoring for a period of almost two years, and thus, provides an important constituent for an advanced anti-fouling strategy.
APA, Harvard, Vancouver, ISO, and other styles
43

Abe, Takehiko, Norifumi Yoshida, Tetsuo Shimada, Masanao Nakashima, and Atsushi Nagai. "Respiratory frequency-tunable dynamic imaging for lung function: New exam method using chest X-ray cine imaging considering various respiratory diseases." PLOS ONE 17, no. 11 (November 17, 2022): e0276859. http://dx.doi.org/10.1371/journal.pone.0276859.

Full text
Abstract:
Objectives A convenient way to conduct pulmonary function tests while preventing infectious diseases was proposed, together with countermeasures for severe coronavirus disease 2019 (COVID-19). The correlation between diagnosis result and diagnosis result was examined for patients with mild chronic obstructive pulmonary disease (COPD) of the most abounding as a subject of spirometry, and the possibility of using this method as an alternative to spirometry was examined. Setting This study was conducted in Kanagawa, Japan. Participants Ten normal volunteers and 15 volunteers with mild COPD participated in this study. Outcome measures All images were taken by EXAVISTA (Hitachi, Japan) between October 2019 and February 2020. Continuous fluoroscopic images were taken in 12.5 frames per second for 10–20 s per subject. Images that do not adopt the automatic image processing of the equipment and only carry out the signal correction of each pixel were used for the analysis. Results The mean total dose for all volunteers was 0.2 mGy. There was no major discrepancy in the detection of lung field geometry, and no diagnostic problems were noted by the radiologist and physician. Conclusions Existing X-ray cine imaging was used to extract frequency-tunable imaging. It is possible to identify abnormal regions on the images compared to spirometry, and it does not require maximum effort respiration; therefore, it is possible to perform a stable examination because the patient’s physical condition and the ability of laboratory technicians on the day are less affected. This can also be used as a countermeasure in examining patients with infectious diseases. Trial registration UMIN UMIN000043868.
APA, Harvard, Vancouver, ISO, and other styles
44

Adil Dheyab, Omar, Ahmed Ibrahim Turki, and B. Rahmatullah B. Rahmatullah. "Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq." Journal of Social Sciences Research, SPI6 (December 25, 2018): 599–606. http://dx.doi.org/10.32861/jssr.spi6.599.606.

Full text
Abstract:
Cloud computing offers many benefits including enhanced flexibility, disaster recovery, free capital expenditures, automatic software updates, sustainability, and work anytime, anywhere. In addition, many other features and services can be offered to customers. However, cloud computing still suffers many threats which may cause vulnerabilities. Therefore, today many organizations are still hesitant to adopt cloud computing because of fear for privacy of their data and confidentiality. Understanding and addressing security threats are a prerequisite for unleashing the huge potential of cloud computing. In this study, a survey is conducted on some cloud service providers and users to explore security threats and vulnerabilities in cloud computing experienced by many organizations in Iraq. Consequently, many countermeasures are proposed. Descriptive research methodology is adopted in this research. The results of the study showed that privacy, confidentiality, control of data are the main obstacle to cloud computing adoption.
APA, Harvard, Vancouver, ISO, and other styles
45

Okubo, Keisuke, Takashi Ito, Kentaro Okamoto, Ichiro Yamamoto, Hajime Mizutani, Yusuke Kawata, Yasuyoshi Shiota, et al. "Evaluation of the simulator with automatic irrigation control system designed for countermeasures of internal contamination in dental unit water lines." Heliyon 6, no. 6 (June 2020): e04132. http://dx.doi.org/10.1016/j.heliyon.2020.e04132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Hsu, Yu-Ting, and Cheng-Yong Liu. "Study about Law Multi-Issue Automatic Negotiation Method Based on Artificial Intelligence and Multiagent Evolutionary Algorithm." Mobile Information Systems 2021 (September 4, 2021): 1–10. http://dx.doi.org/10.1155/2021/7236900.

Full text
Abstract:
Multiagent System (MAS) is a self-learning intelligent system formed by many single agents. Each agent in the MAS works independently of the other, and they have all the characteristics of an agent system. It can respond to changes and countermeasures based on its own external environmental conditions. When solving a complex problem, multiple agents can form a group to solve the problem together. In this paper, the agent’s evolutionary algorithm is integrated into the actual problem—multi-issue autonegotiation of law. According to this problem, the autonegotiation solution process and corresponding model are designed. In addition, a new type of solution is proposed for multiple legal issues. Compared with traditional solutions, the applicability has great advantages. Among them, the autonegotiation result of all the agent’s total utility can be quickly found. In the changing environment, this article focuses on the multiagent system negotiation problem. According to the distributed information sharing of multiple agents, even if the case reveals incomplete information, the multiagent can be generated while ignoring the incomplete information. Optimal solution is proposed. The experimental results show that the success rate of the system in analyzing multiple legal issues and autonegotiations reached 67.56% under the condition of incomplete information from the outside world.
APA, Harvard, Vancouver, ISO, and other styles
47

Patel, Mitesh, R. Edward Roberts, Mohammed U. Riyaz, Maroof Ahmed, David Buckwell, Karen Bunday, Hena Ahmad, Diego Kaski, Qadeer Arshad, and Adolfo M. Bronstein. "Locomotor adaptation is modulated by observing the actions of others." Journal of Neurophysiology 114, no. 3 (September 2015): 1538–44. http://dx.doi.org/10.1152/jn.00446.2015.

Full text
Abstract:
Observing the motor actions of another person could facilitate compensatory motor behavior in the passive observer. Here we explored whether action observation alone can induce automatic locomotor adaptation in humans. To explore this possibility, we used the “broken escalator” paradigm. Conventionally this involves stepping upon a stationary sled after having previously experienced it actually moving (Moving trials). This history of motion produces a locomotor aftereffect when subsequently stepping onto a stationary sled. We found that viewing an actor perform the Moving trials was sufficient to generate a locomotor aftereffect in the observer, the size of which was significantly correlated with the size of the movement (postural sway) observed. Crucially, the effect is specific to watching the task being performed, as no motor adaptation occurs after simply viewing the sled move in isolation. These findings demonstrate that locomotor adaptation in humans can be driven purely by action observation, with the brain adapting motor plans in response to the size of the observed individual's motion. This mechanism may be mediated by a mirror neuron system that automatically adapts behavior to minimize movement errors and improve motor skills through social cues, although further neurophysiological studies are required to support this theory. These data suggest that merely observing the gait of another person in a challenging environment is sufficient to generate appropriate postural countermeasures, implying the existence of an automatic mechanism for adapting locomotor behavior.
APA, Harvard, Vancouver, ISO, and other styles
48

Faham Ali Zaidi, Syed, and Longting Xu. "Implementation of Multiple Feature Selection Algorithms for Speech Spoofing Detection." Journal of Physics: Conference Series 2224, no. 1 (April 1, 2022): 012119. http://dx.doi.org/10.1088/1742-6596/2224/1/012119.

Full text
Abstract:
Abstract The ASVspoof challenge sequences were proposed to lead the research in anti-spoofing to a new level for automatic speaker verification (ASV). It’s verified that constant Q cepstral coefficients (CQCC) processes speech in variable frequencies with adjustable resolution and outperforms the other generally used features and Linear Frequency Cepstral Coefficient (LFCC) is used in high-frequency areas. The feature selection algorithm is offered to decrease computational complexity and overfitting for spoofed utterance detection. Precisely, there’s a demand for feature selection algorithms that are computationally effective and sensitive to feature interactions so that useful features aren’t falsely excluded during the ranking process. We experiment on the ASVspoof 2019 challenge for the assessment of spoofing countermeasures. After the evaluation of our given algorithms and data gives us an equal error rate (EER) and tandem discovery cost function (t-DCF) values. Experimental results on ASVspoof 2019 physical access referring to multiple feature selection approaches show a breakthrough compared to the baseline.
APA, Harvard, Vancouver, ISO, and other styles
49

Riveiro, Maria, and Göran Falkman. "Detecting anomalous behavior in sea traffic: A study of analytical strategies and their implications for surveillance systems." International Journal of Information Technology & Decision Making 13, no. 02 (March 2014): 317–60. http://dx.doi.org/10.1142/s021962201450045x.

Full text
Abstract:
Surveillance operators normally analyze vast amounts of sensor data in order to find conflict situations, and threatening or unusual activities while allowing the continuous flow of goods and people. Semi-automatic support may reduce the time needed for the detection of such situations, generating early warnings that can prevent accidents or provide time to prepare countermeasures. In order to provide adequate cognitive support for operators and guide the design of more efficient surveillance systems, this paper investigates the human analytical reasoning process of detecting anomalous behavior through a case study, the surveillance of sea areas. The analysis of data gathered during interviews and participant observations at three maritime control centers and the inspection of video recordings of real incidents lead to a characterization of operators' analytical processes. We suggest how to support these processes using data mining and visualization, and we derive recommendations for designers and developers of future maritime control systems.
APA, Harvard, Vancouver, ISO, and other styles
50

ZHU, Jian, and BaoChen GU. "Reason analysis of long queue-up time for outpatients to get prescribed drugs in the automatic outpatient dispensary and related countermeasures." Pharmaceutical Care and Research 15, no. 6 (December 31, 2015): 463–65. http://dx.doi.org/10.5428/pcar20150619.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography