scholarly journals INTRODUCTION AND IMPACT OF CYBER SECURITY FOR MODERN MAINTENANCE OF EQUIPMENT OF SHIPS AND SHIPPING COMPANIES

Author(s):  
A. Slysarenko

The article considers the MMC (Machinery Maintenance Connect) equipment maintenance system, factors that affect the key competence, the ability to regularly audit vessels and the time before the audit of vessels, the analysis of the company's risks associated with the possibility of cyber security threats against the resources of the IT information network, the possibility of implementing and using modern technologies in achieving modern cyber security and safe business operations of the Commission, the constant protection of critical it infrastructure. establishing a specific AI system, the human-machine interaction (ergatic system) and machine-machine (machine-to-Machine, M2M) and their interdependence with the corresponding application schemes, careful attention to the study of these interactions. The influence of factors on the change and their display in different types of work efficiency, risk management DNV GL of the AI system was studied.

2013 ◽  
Vol 765-767 ◽  
pp. 591-594
Author(s):  
Chao Ying Zhang ◽  
Hu Liu

Using interactive virtual simulation methods and combining numerical calculation software, the 3D airline emergency evacuation simulation system is established in Virtools platform according to the received data. The system takes full account of the passengers' individual differences during the evacuation process, setting up different member parameters, which influence the passengers evacuation behavior. In order to fulfill the different types of evacuation requirements in various simulation, it can change evacuation path algorithm, cabin layout data and evacuees component parameters, to get the corresponding evacuation simulation results. Meanwhile, the system interface can change visual angle to realize human-machine interaction freely and reflect the evacuation of the evacuation process accurately. Also the reliability of the system simulation result is verified by compared with the results of actual certification trial.


2018 ◽  
Vol 2018 ◽  
pp. 1-16
Author(s):  
Alexandre Alapetite ◽  
Emilie Møllenbach ◽  
Anders Stockmarr ◽  
Katsumi Minakata

We contribute to a project introducing the use of a large single touch-screen as a concept for future airplane cockpits. Human-machine interaction in this new type of cockpit must be optimised to cope with the different types of normal use as well as during moments of turbulence (which can occur during flights varying degrees of severity). We propose an original experimental setup for reproducing turbulence (not limited to aviation) based on a touch-screen mounted on a rollercoaster. Participants had to repeatedly solve three basic touch interactions: a single click, a one-finger drag-and-drop, and a zoom operation involving a 2-finger pinching gesture. The completion times of the different tasks as well as the number of unnecessary interactions with the screen constitute the collected user data. We also propose a data analysis and statistical method to combine user performance with observed turbulence, including acceleration and jerk along the different axes. We then report some of the implications of severe turbulence on touch interaction and make recommendations as to how this can be accommodated in future design solutions.


Author(s):  
S. Leelalakshmi, Et. al.

The cyber security field has more challenges and analysing pcap files for identifying the network traces provides important details. The web traffic consists of different types of transfer. Some data can be malicious and it can fall into different categories. Analysing and extracting features and applyying machine learning algorithms can prove to be more useful for indentifying the network information. Todays’ big data environment provides more way to security threats.


2021 ◽  
Vol 8 ◽  
Author(s):  
Franz A. Van-Horenbeke ◽  
Angelika Peer

Recognizing the actions, plans, and goals of a person in an unconstrained environment is a key feature that future robotic systems will need in order to achieve a natural human-machine interaction. Indeed, we humans are constantly understanding and predicting the actions and goals of others, which allows us to interact in intuitive and safe ways. While action and plan recognition are tasks that humans perform naturally and with little effort, they are still an unresolved problem from the point of view of artificial intelligence. The immense variety of possible actions and plans that may be encountered in an unconstrained environment makes current approaches be far from human-like performance. In addition, while very different types of algorithms have been proposed to tackle the problem of activity, plan, and goal (intention) recognition, these tend to focus in only one part of the problem (e.g., action recognition), and techniques that address the problem as a whole have been not so thoroughly explored. This review is meant to provide a general view of the problem of activity, plan, and goal recognition as a whole. It presents a description of the problem, both from the human perspective and from the computational perspective, and proposes a classification of the main types of approaches that have been proposed to address it (logic-based, classical machine learning, deep learning, and brain-inspired), together with a description and comparison of the classes. This general view of the problem can help on the identification of research gaps, and may also provide inspiration for the development of new approaches that address the problem in a unified way.


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2017 ◽  
Vol 2 (3) ◽  
pp. 1
Author(s):  
Hanane Bennasar ◽  
Mohammad Essaaidi ◽  
Ahmed Bendahmane ◽  
Jalel Benothmane

Cloud computing cyber security is a subject that has been in top flight for a long period and even in near future. However, cloud computing permit to stock up a huge number of data in the cloud stockage, and allow the user to pay per utilization from anywhere via any terminal equipment. Among the major issues related to Cloud Computing security, we can mention data security, denial of service attacks, confidentiality, availability, and data integrity. This paper is dedicated to a taxonomic classification study of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed.


Author(s):  
Chris Reeves ◽  
Geoff Davis ◽  
David D. Ward ◽  
Tim Edwards ◽  
Alastair R. Ruddle

2020 ◽  
Vol 8 (2) ◽  
pp. 264-266
Author(s):  
Zhe Liu ◽  
Kim-Kwang Raymond Choo ◽  
Weiqiang Liu ◽  
Muhammad Khurram Khan

Sign in / Sign up

Export Citation Format

Share Document