Experimental Results in Multi-UAV Coordination for Disaster Management and Civil Security Applications

2010 ◽  
Vol 61 (1-4) ◽  
pp. 563-585 ◽  
Author(s):  
Iván Maza ◽  
Fernando Caballero ◽  
Jesús Capitán ◽  
J. R. Martínez-de-Dios ◽  
Aníbal Ollero
2010 ◽  
pp. 563-585 ◽  
Author(s):  
Iván Maza ◽  
Fernando Caballero ◽  
Jesús Capitán ◽  
J. R. Martínez-de-Dios ◽  
Aníbal Ollero

Author(s):  
Xuguo Wang ◽  
Shengzhe Kan ◽  
Yeli Xu

Abstract At present, embedded devices have been widely used in people’s daily life, which makes more convenience for the public. However, embedded devices still have security problems, such as automatic driving accidents that may cause casualties. In the field of embedded device security, there are many studies, for instance, OPENTEE for ARM handheld devices, providing a secure execution environment for payment devices, and SGX for Intel desk top devices, for security-critical applications, such as bank teller systems, build a safe operating environment. But it is a lack of correlation between these new and existing technologies. In our opinion, through the combination of mature technology accumulation and embedded devices, the antivirus industry can create a more secure user environment. In this paper, we propose a source isolation method to make the resources used by key processes exclusive. This method uses antivirus software and builds a more comprehensive embedded security system in critical security applications. The experimental results show that the proposed method is effective and safe.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Yu Xiao ◽  
Zhengyuan Zhang ◽  
Xiyi Liao ◽  
Feiyu Jiang ◽  
Yan Wang

To quickly destroy electronic devices and ensure information security, a destruction mechanism of transient electronic devices was designed in this paper. By placing the Ni-Cr film resistance and the energetic material between the chip and the package and heating the resistance by an electric current, the energetic material expanded and the chip cracked. The information on the chip was destroyed. The author simulated the temperature distribution and stress of the power-on structure in different sizes by ANSYS software. The simulation results indicate that the chip cracks within 50 ms under the trigger current of 0.5 A when a circular groove with an area of 1 mm2 and depth of 0.1 mm is filled with an expansion material with an expansion coefficient of 10−5°C−1. Then, the author prepared a sample for experimental verification. Experimental results show that the sample chip quickly cracks and fails within 10 ms under the trigger current of 1 A. The simulation and experimental results confirm the feasibility of the structure in quick destruction, which lays the foundation for developing instantaneous-failure integrated circuit products to meet information security applications.


2020 ◽  
Vol 2020 (6) ◽  
pp. 72-1-72-7
Author(s):  
Sultan Daud Khan ◽  
Maqsood Mahmud ◽  
Habib Ullah ◽  
Mohib Ullah ◽  
Faouzi Alaya Cheikh

Automatic detection of crowd congestion in high density crowds is a challenging problem, with substantial interest for safety and security applications. In this paper, we propose a method that can automatically identify and localize congested regions in crowded videos. Our proposed method is based on the notion that pedestrians in the congested region follow a particular behavior. Pedestrians in the congested areas cannot move freely due to space unavailability and tend to undergo lateral oscillations. In our method, we first extract trajectories by using particle advection technique and then compute oscillatory features for each trajectory. Trajectories with higher oscillation values and with less proximity are clustered, indicating the congested regions. We perform experiments on a diversity of challenging scenarios. From the experimental results, we show that our method provides precise localization of congested regions in crowd videos.


2019 ◽  
pp. 1085-1112
Author(s):  
Imen Bizid ◽  
Nibal Nayef ◽  
Sami Faiz ◽  
Patrice Boursier

This chapter proposes a new approach for microblog information retrieval during unexpected disasters. This approach consists of identifying prominent microblog users who are susceptible to share relevant and exclusive information during a specific disaster. By tracking these users, emergency first responders would benefit from a direct access to the valuable information shared in real time in microblogs. In order to identify such users, we represent each microblog user according to his behavior at each particular disaster phase. Through the proposed users' representation, different prediction models are learned in order to identify prominent users at an early stage of each disaster phase. We experimented with different user representations, taking into account both the microblog user behavior and disaster context specificities. We also analyzed the importance of the different microblog users' features categories according to the disaster phase context. The achieved experimental results show the efficiency of our phase-aware-user characterization approach.


Author(s):  
Imen Bizid ◽  
Nibal Nayef ◽  
Sami Faiz ◽  
Patrice Boursier

This chapter proposes a new approach for microblog information retrieval during unexpected disasters. This approach consists of identifying prominent microblog users who are susceptible to share relevant and exclusive information during a specific disaster. By tracking these users, emergency first responders would benefit from a direct access to the valuable information shared in real time in microblogs. In order to identify such users, we represent each microblog user according to his behavior at each particular disaster phase. Through the proposed users' representation, different prediction models are learned in order to identify prominent users at an early stage of each disaster phase. We experimented with different user representations, taking into account both the microblog user behavior and disaster context specificities. We also analyzed the importance of the different microblog users' features categories according to the disaster phase context. The achieved experimental results show the efficiency of our phase-aware-user characterization approach.


2021 ◽  
Author(s):  
Abdu Saif ◽  
Kaharudin Dimyati ◽  
Kamarul Ariffin Noordin ◽  
S. H. Alsamhi ◽  
Ammar Haubani

2007 ◽  
Vol 60 (12) ◽  
pp. 986-991 ◽  
Author(s):  
Otto Koudelka ◽  
P. Schrotter

Author(s):  
Maria Terzi ◽  
Antreas Anastasiou ◽  
Panayiotis Kolios ◽  
Christos Panayiotou ◽  
Theocharis Theocharides

Sign in / Sign up

Export Citation Format

Share Document