Journal articles on the topic 'Cyber pilot'

To see the other types of publications on this topic, follow the link: Cyber pilot.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber pilot.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Gamito, Pedro, Jorge Oliveira, Pedro Rosa, Diogo Morais, Nuno Duarte, Susana Oliveira, and Tomaz Saraiva. "PTSD Elderly War Veterans: A Clinical Controlled Pilot Study." Cyberpsychology, Behavior, and Social Networking 13, no. 1 (February 2010): 43–48. http://dx.doi.org/10.1089/cyber.2009.0237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mishna, Faye, Deborah Levine, Marion Bogo, and Melissa Van Wert. "Cyber Counselling: An Innovative Field Education Pilot Project." Social Work Education 32, no. 4 (June 2013): 484–92. http://dx.doi.org/10.1080/02615479.2012.685066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Botella, Cristina, Azucena Garcia-Palacios, Yolanda Vizcaíno, Rocio Herrero, Rosa Maria Baños, and Miguel Angel Belmonte. "Virtual Reality in the Treatment of Fibromyalgia: A Pilot Study." Cyberpsychology, Behavior, and Social Networking 16, no. 3 (March 2013): 215–23. http://dx.doi.org/10.1089/cyber.2012.1572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Veling, Wim, Willem-Paul Brinkman, Emily Dorrestijn, and Mark van der Gaag. "Virtual Reality Experiments Linking Social Environment and Psychosis: A Pilot Study." Cyberpsychology, Behavior, and Social Networking 17, no. 3 (March 2014): 191–95. http://dx.doi.org/10.1089/cyber.2012.0497.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ruoslahti, Harri, and Bríd Davis. "Societal Impacts of Cyber Security Assets of Project ECHO." WSEAS TRANSACTIONS ON ENVIRONMENT AND DEVELOPMENT 17 (January 11, 2022): 1274–83. http://dx.doi.org/10.37394/232015.2021.17.116.

Full text
Abstract:
Solutions on both consumer and state levels have become increasingly vulnerable to sophisticated cyberattacks by e.g. malware, phishing, machine learning and artificial intelligence. As the adoption and integration of information technologies are increasing and solutions are developing, the need to invest in cyber-security is at an all-time high. Investment in cybersecurity is a chief priority within the European Union, and project ECHO is a one initiative that put emphasis on devising, elaborating, implementing and enhancing a series of technological solutions (assets) to counteract cyber-attacks. The research problem of this study is what societal impacts do the ECHO assets have as product, as knowledge use, and as benefits to society. The literature review includes theory and practice from academic papers, EU innovation project and professional reports, and some ECHO project workflows. Relevant academic theoretical approaches that provide a basis for this task are: e-skills and training, Organisational Learning (OL), Societal Impact (SI), Societal Impact Assessment (SIA). This is a qualitative pilot study that evaluates the usefulness of employing a Product/ Knowledge/ Benefit Societal Impact framework to assessment of societal impacts. Data collection involved qualitative participatory observation of a co-creative expert hackathon workshop. This pilot study shows that the methodology path, where societal impact of ICT and AI solutions (e.g. the ECHO assets) are examined as these three elements (product, knowledge use, societal benefit). This pilot study serves as a step to validate this path and design and select practical, rigorous and relevant quantitative methodology to further the understanding of both societal impact assessment of cyber, e-, and AI-based solutions and services. To incorporate societal impacts with cyber and e-skills this study recommends developing and refining actual key performance indicators (KPI) to provide a basis for rigorous and relevant qualitative and quantitative questionnaire based inquiry of cyber, e-, and AI-based solutions and services.
APA, Harvard, Vancouver, ISO, and other styles
6

Kwon, Joon Hee, Narae Hong, Kwanguk (Kenny) Kim, Jiwoong Heo, Jae-Jin Kim, and Eunjoo Kim. "Feasibility of a Virtual Reality Program in Managing Test Anxiety: A Pilot Study." Cyberpsychology, Behavior, and Social Networking 23, no. 10 (October 1, 2020): 715–20. http://dx.doi.org/10.1089/cyber.2019.0651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Szczepańska-Gieracha, Joanna, Sandra Jóźwik, Błażej Cieślik, Justyna Mazurek, and Robert Gajda. "Immersive Virtual Reality Therapy as a Support for Cardiac Rehabilitation: A Pilot Randomized-Controlled Trial." Cyberpsychology, Behavior, and Social Networking 24, no. 8 (August 1, 2021): 543–49. http://dx.doi.org/10.1089/cyber.2020.0297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jeon, Bomyi, Sungkun Cho, and Jang-Han Lee. "Application of Virtual Body Swapping to Patients with Complex Regional Pain Syndrome: A Pilot Study." Cyberpsychology, Behavior, and Social Networking 17, no. 6 (June 2014): 366–70. http://dx.doi.org/10.1089/cyber.2014.0046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gavrilov, Kirill, and Maria Butynko. "The Perception of Cyber and Traditional Risks: Experience of Using the Psychometric Paradigm Approach." Sociological Journal 27, no. 4 (December 29, 2021): 146–68. http://dx.doi.org/10.19181/socjour.2021.27.4.8649.

Full text
Abstract:
This article presents the results of using the “psychometric paradigm” methodology (P. Slovic, B. Fischhoff, S. Lichtenstein and others) to study the perception of cyber risks and compare them to other risks designated as “traditional”. The respondents in an online survey were presented seven cyber risks (from computer games to hacker attacks and viruses) and 65 traditional risks (from natural disasters to nuclear power plants and terrorism), assessed based on 8 characteristics. As a result, computer games were perceived differently compared to other cyber risks: first of all, they do not induce fear. Other cyber risks are concentrated in an area of relatively obscure and moderately frightening risks, but they do not form a separate cluster. Radiation therapy, herbicides and pesticides are the closest to cyber risks in the two-dimensional space of risk perception. The results of this pilot survey may be considered a reflection of the sample used, where the main participants were active Internet users who were able to distinguish between the presented cyber risks.
APA, Harvard, Vancouver, ISO, and other styles
10

Chiang, Chang-Po, Shiuh-Jeng Wang, and Yu-Shu Chen. "Manipulating cyber army in pilot case forensics on social media." Journal of Supercomputing 78, no. 6 (January 4, 2022): 7749–67. http://dx.doi.org/10.1007/s11227-021-04172-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Moore, Maria. "Sesanate – a pilot project to explore a therapeutic cyber community." Therapeutic Communities: The International Journal of Therapeutic Communities 34, no. 2/3 (June 24, 2013): 71–82. http://dx.doi.org/10.1108/tc-02-2013-0001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Choi, Kyung-shick, Hannarae Lee, Gibeom Park, and Chiho Han. "Virtual Reality Program in Cybercrime Investigation: A Pilot Study Examining Search and Seizure of Digital Evidence Practice." Cyberpsychology, Behavior, and Social Networking 25, no. 1 (January 1, 2022): 43–50. http://dx.doi.org/10.1089/cyber.2020.0894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Riches, Simon, Philippa Garety, Mar Rus-Calafell, Daniel Stahl, Clare Evans, Nikolaos Sarras, Keren Yeboah, and Lucia Valmaggia. "Using Virtual Reality to Assess Associations Between Paranoid Ideation and Components of Social Performance: A Pilot Validation Study." Cyberpsychology, Behavior, and Social Networking 22, no. 1 (January 2019): 51–59. http://dx.doi.org/10.1089/cyber.2017.0656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Lowe-Calverley, Emily, and Halley M. Pontes. "Challenging the Concept of Smartphone Addiction: An Empirical Pilot Study of Smartphone Usage Patterns and Psychological Well-Being." Cyberpsychology, Behavior, and Social Networking 23, no. 8 (August 1, 2020): 550–56. http://dx.doi.org/10.1089/cyber.2019.0719.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kasatpibal, Nongyao, Nongkran Viseskul, Wimonsiri Srikantha, Warunee Fongkaew, Natthakarn Surapagdee, and Richard M. Grimes. "Developing a Web Site for Human Immunodeficiency Virus Prevention in a Middle Income Country: A Pilot Study from Thailand." Cyberpsychology, Behavior, and Social Networking 15, no. 10 (October 2012): 560–63. http://dx.doi.org/10.1089/cyber.2012.0101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Holmberg, Trine Theresa, Tanja Lilly Eriksen, Rasmus Petersen, Nicklas Nørgård Frederiksen, Ulla Damgaard-Sørensen, and Mia Beck Lichtenstein. "Social Anxiety Can Be Triggered by 360-Degree Videos in Virtual Reality: A Pilot Study Exploring Fear of Shopping." Cyberpsychology, Behavior, and Social Networking 23, no. 7 (July 1, 2020): 495–99. http://dx.doi.org/10.1089/cyber.2019.0295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Mountford, Victoria A., Kate Tchanturia, and Lucia Valmaggia. "“What Are You Thinking When You Look at Me?” A Pilot Study of the Use of Virtual Reality in Body Image." Cyberpsychology, Behavior, and Social Networking 19, no. 2 (February 2016): 93–99. http://dx.doi.org/10.1089/cyber.2015.0169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Chillemi, Kerry, Jo-Anne M. Abbott, David W. Austin, and Ann Knowles. "A Pilot Study of an Online Psychoeducational Program on Cyberbullying That Aims to Increase Confidence and Help-Seeking Behaviors Among Adolescents." Cyberpsychology, Behavior, and Social Networking 23, no. 4 (April 1, 2020): 253–56. http://dx.doi.org/10.1089/cyber.2019.0081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Atanasova, Aneta, and Aleksandra Yosifova. "Adressing Special Educational Needs in Classroom with Cyber Physical Systems." International Journal of Cyber-Physical Systems 1, no. 1 (January 2019): 71–90. http://dx.doi.org/10.4018/ijcps.2019010105.

Full text
Abstract:
The focus of the current chapter is on humanoid robots as part of an inclusive education. It presents a brief overview of the main features of cyber physical systems which could be used as an advantage with children with special educational needs. Based on the specifics of the main types of special educational needs, a list of suggestions about the practical implications of educational robots to the classroom has been generated. A pilot study of the perception and attitude of children and teachers in a local Bulgarian school towards the application of cyber physical systems in education has been conducted. Based on previous research and the fundings of the pilot study, a few gaps of knowledge have been identified. First, the lack of empirical work on the application of technology to subjects, such as biology, chemistry, history, or to the development of social skills and creativity. Second, the scarce evidence of the long-term effects of interventions with children with special educational needs. Third, the lack of research on the attitudes of teachers with and without special educational needs children in the class towards educational robots. Last, but not least, the need for comparison of the perceptions and expectations of users of such technology across cultures.
APA, Harvard, Vancouver, ISO, and other styles
20

Lau, Erica Y., Patrick W. C. Lau, Pak-Kwong Chung, Lynda B. Ransdell, and Edward Archer. "Evaluation of an Internet–Short Message Service–Based Intervention for Promoting Physical Activity in Hong Kong Chinese Adolescent School Children: A Pilot Study." Cyberpsychology, Behavior, and Social Networking 15, no. 8 (August 2012): 425–34. http://dx.doi.org/10.1089/cyber.2012.0161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Boulton, Michael J., Louise Boulton, Eleonora Camerone, James Down, Joanna Hughes, Chloe Kirkbride, Rachel Kirkham, Peter Macaulay, and Jessica Sanders. "Enhancing Primary School Children's Knowledge of Online Safety and Risks with the CATZ Cooperative Cross-Age Teaching Intervention: Results from a Pilot Study." Cyberpsychology, Behavior, and Social Networking 19, no. 10 (October 2016): 609–14. http://dx.doi.org/10.1089/cyber.2016.0046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Wang, W. M., Benny C. F. Cheung, Zeno C. S. Leung, K. H. Chan, and Eric W. K. See-To. "A Social Media Mining and Analysis Approach for Supporting Cyber Youth Work." International Journal of Knowledge and Systems Science 8, no. 2 (April 2017): 1–16. http://dx.doi.org/10.4018/ijkss.2017040101.

Full text
Abstract:
Cyber youth work is a pioneering and proactive approach used by non-government organizations to address the changing needs of the youth groups, particularly those at-risk and “hidden” young people. This paper describes the development process of a social media mining and analysis method, which is built to facilitate services for cyber youth work. The method incorporates an iterative method for collecting, selecting and extracting domain keywords in selected social media. A hybrid approach which combines heuristic rules and n-gram analysis for bilingual word segmentation has been developed. Then, social network analysis is used to analyze the extracted results. A pilot study has been done by using drug abuse as the study topic. It demonstrated high potential of the method to enhance cyber youth work. The weights deduced by the method have found to have a positive correlation with the benchmarked scores. It helps to understand the characteristic of the network, identify target clients, and provide data support for marking decisions.
APA, Harvard, Vancouver, ISO, and other styles
23

Onufriyenko, G. F. "Volunteer Cyber-Navigators in Libraries." Observatory of Culture 15, no. 3 (August 19, 2018): 282–88. http://dx.doi.org/10.25281/2072-3156-2018-15-3-282-288.

Full text
Abstract:
The article refers to the educational electronic service provided in libraries by volunteer instructors, who help users, mostly those unemployed and elderly, to master computer literacy, work with the Internet , and search for information, especially concerning the labor market. Launched at the Chicago Public Library, in which, under the conditions of manifestation of the so-called phenomenon of library axiom, volunteers act as digital social workers, the CyberNavigator program has become one of the most sought-after and contributed to reducing the digital inequality in this megalopolis. Having familiarized with the American practice in the fi eld of library volunteering, during an educational trip to the United States, Polish specialists, studying foreign experience in the organization of modern volunteering to increase the level of its development in their country, decided to adopt a new service addressed to persons with diffi culties in accessing to information and communication technologies (ICT). To do this, they created and implemented a pilot project called “Information for Citizens — Cyber-Navigators in Libraries”. Its main objective was to introduce a system of continuous electronic training for persons with diffi culties in accessing to ICT by implementing a specifi c service of “cyber-navigators” in libraries. The authors of the project strived to implement digital and media training in libraries, both for those users “delimited by the digit” and for librarians to develop various forms of lessons for visitors like that (trai nings, instructions, consultations, etc.). The authors also wanted to identify the needs in the fi eld of users’ digital training and to attract volunteers in professional library activities, basing on the experience of American libraries and taking into account the Polish realities. The idea of cyber-navigation appeared to be so timely and fruitful, that the libraries have included this informal educational service in their list of permanent ones.
APA, Harvard, Vancouver, ISO, and other styles
24

Su, Wenliang, Xiaoyi Fang, John K. Miller, and Yiyuan Wang. "Internet-Based Intervention for the Treatment of Online Addiction for College Students in China: A Pilot Study of the Healthy Online Self-Helping Center." Cyberpsychology, Behavior, and Social Networking 14, no. 9 (September 2011): 497–503. http://dx.doi.org/10.1089/cyber.2010.0167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Mileski, Joan, Christopher Clott, and Cassia Bomer Galvao. "Cyberattacks on ships: a wicked problem approach." Maritime Business Review 3, no. 4 (November 19, 2018): 414–30. http://dx.doi.org/10.1108/mabr-08-2018-0026.

Full text
Abstract:
Purpose The maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security vulnerabilities for the maritime industry in cyberspace. Any obstruction in the global supply chain due to a cyberattack can cause catastrophic problems in the global economy. This paper aims to review automatic identification systems (AISs) aboard ships for cyber issues and weaknesses. Design/methodology/approach The authors do so by comparing the results of two receiver systems of the AIS in the Port of Houston; the JAMSS system aboard the Space Station and the “Harborlights” system for traffic control in the Port. Findings The authors find that inconsistent information is presented on the location of same ships at the same time in the Port. Upon further investigation with pilots, the authors find that these inconsistencies may be the result of the strength of power with which an AIS is transmitted. It appears the power may be reduced to the AIS in port but that it varies within port and varies by pilot operators. This practice may open the AIS system for tampering. Originality/value Further, this inconsistency may require further policy regulation to properly address cyber information in a port.
APA, Harvard, Vancouver, ISO, and other styles
26

Herrero, Rocio, Azucena García-Palacios, Diana Castilla, Guadalupe Molinari, and Cristina Botella. "Virtual Reality for the Induction of Positive Emotions in the Treatment of Fibromyalgia: A Pilot Study over Acceptability, Satisfaction, and the Effect of Virtual Reality on Mood." Cyberpsychology, Behavior, and Social Networking 17, no. 6 (June 2014): 379–84. http://dx.doi.org/10.1089/cyber.2014.0052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Mishna, Faye, Lea Tufford, Charlene Cook, and Marion Bogo. "Research Note—A Pilot Cyber Counseling Course in a Graduate Social Work Program." Journal of Social Work Education 49, no. 3 (June 6, 2013): 515–24. http://dx.doi.org/10.1080/10437797.2013.796855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kee, Keh-Kim, Simon Lau Boung Yew, Yun Seng Lim, Yip Ping Ting, and Ramli Rashidi. "Universal cyber physical system, a prototype for predictive maintenance." Bulletin of Electrical Engineering and Informatics 11, no. 1 (February 1, 2022): 42–49. http://dx.doi.org/10.11591/eei.v11i1.3216.

Full text
Abstract:
Industrial 4.0 technology of cyber-physical system enables real-time monitoring, sensing and actuating of physical machinery for predictive maintenance that replaces the conventional labor-intensive approach. This paper presents the design and development of a universal, cost-effective and internet of thing (IoT)-based proof-of-concept prototype universal cyber-physical system (UniCPS) with a cloud platform with an open and modular-based design of three-tier system architecture. The prototype demonstrates promising precision and accuracy for predictive maintenance on a pilot use case with MAPE of 3.77%, and average RMSE of 0.50. Besides, real-time visualization and detection of anomaly were also demonstrated with a cloud-based solution. The maintenance alert sent out by the actuator serves to notify the authorized personnel immediately for corrective action. As an extension to this work, a wireless sensor network can be incorporated in future work to acquire various data from diverse locations to overcome the limitations of sensor data.
APA, Harvard, Vancouver, ISO, and other styles
29

Jantunen, Erkki, Unai Gorostegui, Urko Zurutuza, Michele Albano, Luis Lino Ferreira, Csaba Hegedűs, and Jaime Campos. "Remote maintenance support with the aid of cyber-physical systems and cloud technology." Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering 232, no. 6 (May 9, 2018): 784–94. http://dx.doi.org/10.1177/0959651818772939.

Full text
Abstract:
This article discusses how a business model based on traditional maintenance can evolve to generate servitization strategies, with the help of remote maintenance support. The application of cyber-physical systems and cloud technologies play a key role for such maintenance purposes. In fact, the utilization of large quantities of data collected on machines and their processing by means of advanced techniques such as machine learning enable novel techniques for condition-based maintenance. New sensor solutions that could be used in maintenance and interaction with cyber-physical systems are also presented. Here, data models are an important part of these techniques because of the huge amounts of data that are produced and should be processed. These data models have been used in a real case, supported by the Machinery Information Management Open System Alliance Open System Architecture for Condition-Based Maintenance standard architecture, for streamlining the modeling of collected data. In this context, an industrial use case is described, to enlighten the application of the presented concepts in a working pilot. Finally, current and future directions for application of cyber-physical systems and cloud technologies to maintenance are discussed.
APA, Harvard, Vancouver, ISO, and other styles
30

Nikolcheva, Galina. "ANALYSIS OF PROSPECTS AND OPPORTUNITIES OF CYBER-PHYSICAL SYSTEMS EDUCATION." Proceedings of CBU in Natural Sciences and ICT 1 (November 16, 2020): 60–65. http://dx.doi.org/10.12955/pns.v1.122.

Full text
Abstract:
The readiness for digital transformation of industry is highly dependent from the existence of enough ICT experts with profiles to industrial applications and cyber-physical systems as well as the widespread promotion and application of existing industry standards and practices in the domain of Industry 4.0. The raising of the digital readiness index for the industry requires the development of educational and scientific initiatives in order to create capacity for institutional and organizational acceptance of the requirements and prerequisites of Industry 4.0 as well the creation of pilot projects and demonstration installations for the purpose of visualizing and presenting good practices. This paper analyses prospects and opportunities of Cyber-physical system education in order to prepare well-trained and capable specialists for Industry 4.0. Some good practices in this area are outlined. Ideas for building the foundation of the training as well as the organization of the laboratory practice are presented.
APA, Harvard, Vancouver, ISO, and other styles
31

Bigazzi, Luca, Stefano Gherardini, Giacomo Innocenti, and Michele Basso. "Development of Non Expensive Technologies for Precise Maneuvering of Completely Autonomous Unmanned Aerial Vehicles." Sensors 21, no. 2 (January 8, 2021): 391. http://dx.doi.org/10.3390/s21020391.

Full text
Abstract:
In this paper, solutions for precise maneuvering of an autonomous small (e.g., 350-class) Unmanned Aerial Vehicles (UAVs) are designed and implemented from smart modifications of non expensive mass market technologies. The considered class of vehicles suffers from light load, and, therefore, only a limited amount of sensors and computing devices can be installed on-board. Then, to make the prototype capable of moving autonomously along a fixed trajectory, a “cyber-pilot”, able on demand to replace the human operator, has been implemented on an embedded control board. This cyber-pilot overrides the commands thanks to a custom hardware signal mixer. The drone is able to localize itself in the environment without ground assistance by using a camera possibly mounted on a 3 Degrees Of Freedom (DOF) gimbal suspension. A computer vision system elaborates the video stream pointing out land markers with known absolute position and orientation. This information is fused with accelerations from a 6-DOF Inertial Measurement Unit (IMU) to generate a “virtual sensor” which provides refined estimates of the pose, the absolute position, the speed and the angular velocities of the drone. Due to the importance of this sensor, several fusion strategies have been investigated. The resulting data are, finally, fed to a control algorithm featuring a number of uncoupled digital PID controllers which work to bring to zero the displacement from the desired trajectory.
APA, Harvard, Vancouver, ISO, and other styles
32

Bigazzi, Luca, Stefano Gherardini, Giacomo Innocenti, and Michele Basso. "Development of Non Expensive Technologies for Precise Maneuvering of Completely Autonomous Unmanned Aerial Vehicles." Sensors 21, no. 2 (January 8, 2021): 391. http://dx.doi.org/10.3390/s21020391.

Full text
Abstract:
In this paper, solutions for precise maneuvering of an autonomous small (e.g., 350-class) Unmanned Aerial Vehicles (UAVs) are designed and implemented from smart modifications of non expensive mass market technologies. The considered class of vehicles suffers from light load, and, therefore, only a limited amount of sensors and computing devices can be installed on-board. Then, to make the prototype capable of moving autonomously along a fixed trajectory, a “cyber-pilot”, able on demand to replace the human operator, has been implemented on an embedded control board. This cyber-pilot overrides the commands thanks to a custom hardware signal mixer. The drone is able to localize itself in the environment without ground assistance by using a camera possibly mounted on a 3 Degrees Of Freedom (DOF) gimbal suspension. A computer vision system elaborates the video stream pointing out land markers with known absolute position and orientation. This information is fused with accelerations from a 6-DOF Inertial Measurement Unit (IMU) to generate a “virtual sensor” which provides refined estimates of the pose, the absolute position, the speed and the angular velocities of the drone. Due to the importance of this sensor, several fusion strategies have been investigated. The resulting data are, finally, fed to a control algorithm featuring a number of uncoupled digital PID controllers which work to bring to zero the displacement from the desired trajectory.
APA, Harvard, Vancouver, ISO, and other styles
33

Joerger, Guillaume, Shannon Furr, and Marc Garbey. "IMPROVING ENDOSCOPY UNIT THROUGHPUT USING AN AUTOMATED CYBER-PHYSICAL MONITORING SYSTEM : A PILOT STUDY." Gastrointestinal Endoscopy 95, no. 6 (June 2022): AB128. http://dx.doi.org/10.1016/j.gie.2022.04.353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Ogu, Emmanuel C., Olusegun A. Ojesanmi, Oludele Awodele, and Shade O. Kuyoro. "Supporting features for flow-level packet analysis towards cyber threat detection: a pilot study." International Journal of Information and Computer Security 16, no. 1/2 (2021): 137. http://dx.doi.org/10.1504/ijics.2021.117399.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kuyoro, Shade O., Emmanuel C. Ogu, Oludele Awodele, and Olusegun A. Ojesanmi. "Supporting features for flow-level packet analysis towards cyber threat detection: a pilot study." International Journal of Information and Computer Security 16, no. 1/2 (2021): 137. http://dx.doi.org/10.1504/ijics.2021.10040717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Hatzivasilis, George, Sotiris Ioannidis, Michail Smyrlis, George Spanoudakis, Fulvio Frati, Ludger Goeke, Torsten Hildebrandt, et al. "Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees." Applied Sciences 10, no. 16 (August 17, 2020): 5702. http://dx.doi.org/10.3390/app10165702.

Full text
Abstract:
Nowadays, more-and-more cyber-security training is emerging as an essential process for the lifelong personnel education in organizations, especially for those which operate critical infrastructures. This is due to security breaches on popular services that become publicly known and raise people’s security awareness. Except from large organizations, small-to-medium enterprises and individuals need to keep their knowledge on the related topics up-to-date as a means to protect their business operation or to obtain professional skills. Therefore, the potential target-group may range from simple users, who require basic knowledge on the current threat landscape and how to operate the related defense mechanisms, to security experts, who require hands-on experience in responding to security incidents. This high diversity makes training and certification quite a challenging task. This study combines pedagogical practices and cyber-security modelling in an attempt to support dynamically adaptive training procedures. The training programme is initially tailored to the trainee’s needs, promoting the continuous adaptation to his/her performance afterwards. As the trainee accomplishes the basic evaluation tasks, the assessment starts involving more advanced features that demand a higher level of understanding. The overall method is integrated in a modern cyber-ranges platform, and a pilot training programme for smart shipping employees is presented.
APA, Harvard, Vancouver, ISO, and other styles
37

Nie, Dong, Zheng Yan, Nan Zhao, and Tingshao Zhu. "A Pilot Study of Comparing Social Network Behaviors between Onlies and Others." International Journal of Cyber Behavior, Psychology and Learning 5, no. 3 (July 2015): 56–66. http://dx.doi.org/10.4018/ijcbpl.2015070105.

Full text
Abstract:
Extensive research reported that only children (“Onlies”) have different daily behavior from children with siblings (“Others”) in the real world. However, little is known about whether Onlies and Others behave differently in the cyber world, especially on the social network. A pilot study has been conducted to compare the behaviors of Onlies and Others on Sina Weibo, a leading social network platform in China. Through analyzing both online Weibo data and survey data from 1792 Weibo users (52% Onlies), several differences between Onlies' and Others' Weibo behaviors were found: Onlies tended to be more willing to express themselves and be more active in social communication within a smaller social circle than Others. More explorations should be done to fully understand these differences between the two groups.
APA, Harvard, Vancouver, ISO, and other styles
38

Leedahl, Skye, Alexandria Capolino, Melanie Brasher, Kristin Fratoni-Souza, and Erica Estus. "EXAMINATION OF THE DIGIAGE CYBER-SENIORS PILOT STUDY FOR OLDER ADULTS FROM LOWER INCOME COMMUNITIES." Innovation in Aging 6, Supplement_1 (November 1, 2022): 585–86. http://dx.doi.org/10.1093/geroni/igac059.2197.

Full text
Abstract:
Abstract The University of Rhode Island (URI) team implemented a pilot program designed to bridge the digital divide between older adults and younger generations. Through this project, the goal was for older Rhode Islanders to become digitally literate by engaging them in a formal program that provides digital devices (i.e., Apple iPads), connectivity (i.e., internet connection through HotSpots), and training by supervised and trained university student mentors. This project specifically worked to promote social and economic equity by recruiting participants from lower-income communities and areas hit hardest by the COVID-19 pandemic, including those who speak English and Spanish. The final sample (N=124) for the study was primarily female (79%) and low income (82%). They were 41% Non-White and 23% Spanish speaking with 23% having a college degree or more. We conducted preliminary analysis on the first 38 participants who completed both a pre- and post-survey. Based on these analyses, the program participants have shown statistically significant improvements in frequency of tablet use (p<.05), digital competency across all questions (p<.05), quality of life (p<.05), and social isolation (p<.05). In addition, the loneliness and depression questions/variables are trending in the expected direction, so it is possible that with a more robust sample size we may see significant improvement in these areas as well. This presentation will describe the key elements of the pilot intervention and explain the findings from the full sample. The presentation will also discuss the plan for state-wide implementation of the program.
APA, Harvard, Vancouver, ISO, and other styles
39

Lam, Cecilia Wing Chi, and Erica Frydenberg. "Coping in the Cyberworld: Program Implementation and Evaluation – A Pilot Project." Australian Journal of Guidance and Counselling 19, no. 2 (December 1, 2009): 196–215. http://dx.doi.org/10.1375/ajgc.19.2.196.

Full text
Abstract:
AbstractAs increasing numbers of adolescents become involved in online activities, many also become victims of cyberharassment. This pilot project investigates how a program teaching coping skills (Best of Coping program, BOC) and a program teaching cybersafety (Cyber Savvy Teens program, CST) can optimise adolescents' capacity to cope online. Thirty-three adolescents were divided into three groups: control, BOC and CST. Participants completed a questionnaire on cyberknowledge and habits preprogram; the Adolescent Coping scale and the Kessler Psychological Distress scale (K-10) pre- and post-program; and a program evaluation form post-program. Participants in both intervention groups demonstrated improvements in their overall mental health and in making better online choices post-program. The BOC program was found to be a better program for improving general coping than CST alone, while the CST program was better at tackling cyberspecific issues.
APA, Harvard, Vancouver, ISO, and other styles
40

Heikkilä, Tapio, Tuomas Seppälä, Timo Kuula, and Hannu Karvonen. "Remote Robot-Sensor Calibration Service." International Journal of Mobile Devices, Wearable Technology, and Flexible Electronics 10, no. 1 (January 2019): 15–36. http://dx.doi.org/10.4018/ijmdwtfe.2019010102.

Full text
Abstract:
Cyber physical systems (CPSs) are integrating computation, networking, and physical processes. CPSs facilitate improvements especially for asset management. The authors have contributed to robot automation with CPS technologies by a pilot system to support setup and maintenance of sensor-based robot systems with remote calibration services. This paper has focused to support remotely-located technology specialists as well as local field personnel by appropriate user interface design. A design example is given for a remote robot-sensor calibration procedure. In the user interface design, the authors follow loosely the Ecological Interface Design (EID) approach.
APA, Harvard, Vancouver, ISO, and other styles
41

de Mello, Ricardo C., Mario F. Jimenez, Moises R. N. Ribeiro, Rodrigo Laiola Guimarães, and Anselmo Frizera-Neto. "On Human-in-the-Loop CPS in Healthcare: A Cloud-Enabled Mobility Assistance Service." Robotica 37, no. 9 (February 6, 2019): 1477–93. http://dx.doi.org/10.1017/s0263574719000079.

Full text
Abstract:
SummaryDespite recent advancements on cloud-enabled and human-in-the-loop cyber-physical systems, there is still a lack of understanding of how infrastructure-related quality of service (QoS) issues affect user-perceived quality of experience (QoE). This work presents a pilot experiment over a cloud-enabled mobility assistive device providing a guidance service and investigates the relationship between QoS and QoE in such a system. In our pilot experiment, we employed the CloudWalker, a system linking smart walkers and cloud platforms, to physically interact with users. Different QoS conditions were emulated to represent an architecture in which control algorithms are performed remotely. Results point out that users report satisfactory interaction with the system even under unfavorable QoS conditions. We also found statistically significant data linking QoE degradation to poor QoS conditions. We finalize discussing the interplay between QoS requirements, the human-in-the-loop effect, and the perceived QoE in healthcare applications.
APA, Harvard, Vancouver, ISO, and other styles
42

Krutwig, Michael, Bernhard Kölmel, Adrian Tantau, and Kejo Starosta. "Standards for Cyber-Physical Energy Systems—Two Case Studies from Sensor Technology." Applied Sciences 9, no. 3 (January 28, 2019): 435. http://dx.doi.org/10.3390/app9030435.

Full text
Abstract:
Cyber-physical energy systems (CPES) describe a specialization of the cyber-physical system concept, in which energy systems are transformed into intelligent energy networks. These systems provide the basis for the realization of smart microgrids and smart grids. In the last decade, numerous research projects have intensively explored the fundamentals and modeling of CPES and validated them in pilot projects. In the meantime, more and more CPES solutions have been appearing on the market and the battle for the most suitable standards has begun. This paper gives an overview of the currently available standards for CPES sensor technologies and assesses the suitability for implementation. In two case studies in the application area of operational energy management in German companies, a sensor retrofitting is described—once with proprietary technology and once using the standards Long Range (LoRa) Wide Area Network and OPC Unified Architecture (OPC UA). As a result, the shortcomings of the standards for their use in CPES are shown and discussed. OPC UA, which was originally developed for the manufacturing industry, turns out to be to be a suitable standard for a wide range of CPES implementations.
APA, Harvard, Vancouver, ISO, and other styles
43

Edwards, Susan, Andrea Nolan, Michael Henderson, Helen Skouteris, Ana Mantilla, Pamela Lambert, and Jo Bird. "Developing a measure to understand young children’s Internet cognition and cyber-safety awareness: a pilot test." Early Years 36, no. 3 (July 2, 2016): 322–35. http://dx.doi.org/10.1080/09575146.2016.1193723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Barone, M., J. Tzanis, P. Harper, K. Levin, D. Silverman, and C. Cook. "Cyber-solutions for global problems: Pilot testing computer-based infection prevention training for low resource settings." International Journal of Gynecology & Obstetrics 70 (2000): D99. http://dx.doi.org/10.1016/s0020-7292(00)84476-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Chow, Daniel H. K., and Stephen K. F. Mann. "Effect of Cyber-Golfing on Balance Amongst the Elderly in Hong Kong: A Pilot Randomised Trial." Hong Kong Journal of Occupational Therapy 26, no. 1 (December 2015): 9–13. http://dx.doi.org/10.1016/j.hkjot.2015.08.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Chaghazardi, Zahra, and Rolf Wüthrich. "Design and Deployment of a Data Lake at a Pilot Plant Scale for a Smart Electropolishing Process." ECS Meeting Abstracts MA2022-01, no. 25 (July 7, 2022): 1219. http://dx.doi.org/10.1149/ma2022-01251219mtgabs.

Full text
Abstract:
In order to remain competitive and satisfy the demands of today’s customers in a timely manner, manufacturing industries are embracing the Industry 4.0 philosophy where automation is pushed beyond robotics to new technologies emerging from data science and artificial intelligence. The aim is to reduce time spent on none added value tasks and help learning from past experience in order to enhance efficiency and quality of manufacturing processes. Traditional industries, such as electropolishing, need to find ways to automate their, often heavily artisanal-based techniques and develop an intelligent network of machines and processes taking advantage of information and communication technology such as Big Data, IoT (Internet of Things), or Artificial Intelligence (AI). This digital transition can be realized through the application of an IIoT (Industrial Internet of Things) platform that constructs a massive, sophisticated information network of interconnected sensors, equipment, and processes known as cyber-physical systems. Within this network, large amounts of data (for example process bath attributes such as temperature or viscosity and part characteristics such as roughness or brightness) can be collected automatically via sensors and through user-friendly applications from manual measurements and observations. All data are uploaded automatically into a cloud-based data storage system. In order for this collected information to be useful, the data needs to be processed to allow pattern discovery and extraction of useful information regarding the system performance, probable faults in the process, and product quality. Besides others, machine learning algorithms play a key role in extracting useful information. Classification and processing of such massive, diverse, and rapidly arriving data sets are known to be challenging. As a result, the concept of data lake has arisen in the last decade as an appealing and cost-effective approach for companies to manage large amounts of data. It consists of a large repository of datasets designed to transform raw and unstructured data into structured, usable information to allow further processing. A data lake, organized typically in four layers (ingestion, distillation, processing, and insights layers), stores both old and near real-time data in one location for initial assessment, with comprehensive data organization, analysis, and visualization being performed only when necessary 1,2. This promotes agility by allowing data to be accessed by everyone in the company. 2 In this work, a data lake is designed and implemented in conjunction with a pilot plant to demonstrate how in the electropolishing process of stainless-steel samples in an aging electrolyte, data can be collected and organized for further processing using machine learning techniques in order to optimize the process and part quality based on the data analysis results. References: N. Miloslavskaya and A. Tolstoy, Procedia Comput. Sci., 88, 300–305 (2016). H. Fang, in 2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER),, p. 820–824 (2015). Figure 1
APA, Harvard, Vancouver, ISO, and other styles
47

Ockerman, Melissa S., Constance Kramer, and Michelle Bruno. "From the School Yard to Cyber Space: A Pilot Study of Bullying Behaviors among Middle School Students." RMLE Online 37, no. 6 (January 2014): 1–18. http://dx.doi.org/10.1080/19404476.2014.11462109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Ibrahim, Yasser, Mohammed Abdel Razek, and Nasser El-Sherbeny. "Social cyber-criminal, towards automatic real time recognition of malicious posts on Twitter." Indonesian Journal of Electrical Engineering and Computer Science 25, no. 2 (February 1, 2022): 1199. http://dx.doi.org/10.11591/ijeecs.v25.i2.pp1199-1207.

Full text
Abstract:
Easy access to the internet throughout the world has fully reformed the usage of social communication such as Facebook, Twitter, Linked In which are becoming a part of our life. Accordingly, cybercrime has become a vital problem, especially in developing countries. The dissemination of information with no risk of being discovered and fetched leads to an increase in cyber-criminal. Meanwhile, the huge amount of data continuously produced from Twitter made the discovery process of cyber-criminals is a tough assignment. This research will contribute in determined on the build the comparable vectors for (positive and negative classes) and then the classify incoming tweets to predicate his class (positive or negative). The proposed routines staring with the construct super comparable vectors (SCV) (positive and negative vectors), and the construct vector for the incoming tweet, and then calculate similarities with both SCV and compare calculated similarities to predicate class of incoming tweet. In this research, we used some common techniques for calculating the weight of terms in tweets to construct SCV. To ensure the successful operation of the proposed system, we performed a pilot analysis on a real example of an examination. Research Improves precision, recall, and F1 values by 87%, 59%, 69.99%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
49

Aysina, R. M. "Possibility of cyber technologies’ application in psychological support of elderly people: a review of researches." Современная зарубежная психология 6, no. 3 (2017): 30–38. http://dx.doi.org/10.17759/jmfp.2017060304.

Full text
Abstract:
This article analyzes the modern foreign studies on development in the application of various types of cyber technologies used for a wide range of tasks of psychological support for old people. It shows that the majority of foreign authors attribute virtual reality system as the most promising cybertechnology, allowing elder computer users to successfully integrate the existing and acquire new experience through opportunities of controlled changes in sensory, perceptual, cognitive and affective processes. The article considers the spheres of psychological accompaniment of elderly people in which the introduction of computer technologies provides such benefits as prophylaxis and therapy of senile asthenia, cognitive dysfunction, emotional disorders. It reveals, that the question of the effectiveness of cybertechnologies in gerontic psychology’s practice remains open today because of a small number of pilot studies. However, the results are already available.
APA, Harvard, Vancouver, ISO, and other styles
50

Vailland, Guillaume, Yoren Gaffary, Louise Devigne, Valérie Gouranton, Bruno Arnaldi, and Marie Babel. "Power Wheelchair Virtual Reality Simulator with Vestibular Feedback." Modelling, Measurement and Control C 81, no. 1-4 (December 31, 2020): 35–42. http://dx.doi.org/10.18280/mmc_c.811-407.

Full text
Abstract:
Autonomy and the ability to maintain social activities can be challenging for people with disabilities experiencing reduced mobility. In the case of disabilities that impact mobility, power wheelchairs can help such people retain or regain autonomy. Nonetheless, driving a power wheelchair is a complex task that requires a combination of cognitive, visual and visuo-spatial abilities. In practice, people need to pass prior ability tests and driving training before being prescribed a power wheelchair by their therapist. Still, conventional training in occupational therapy can be insufficient for some people with severe cognitive and/or visio-spatial functions. As such, these people are often prevented from obtaining a power wheelchair prescription from their therapist due to safety concerns. In this context, driving simulators might be efficient and promising tools to provide alternative, adaptive, flexible, and safe training. In previous work, we proposed a Virtual Reality (VR) driving simula-integrating vestibular feedback to simulate wheelchair motion sensations. The performance and acceptability of a VR simulator rely on satisfying user Quality of Experience (QoE). Therefore, our simulator is designed to give the user a high Sense of Presence (SoP) and low Cyber-sickness. This paper presents a pilot study assessing the impact of the vestibular feedback provided on user QoE. Participants were asked to perform a driving task whilst in the simulator under two conditions: with and without vestibular feedback. User QoE is assessed through subjective questionnaires measuring user SoP and cyber-sickness. The results show that vestibular feedback activation increases SoP and decreases cyber-sickness. This study constitutes a mandatory step before clinical trials and, as such, only enrolled people without disabilities.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography