performance problems and workplace hazards during inspection, practical robotic deployment systems, their instrumentation packages, and our progress toward developing image enhancement and understanding techniques that could help aircraft inspectors to find cracks, corrosion, and other visually detectable damage. KEYWORDS: automated robot visual NDI inspection enhanced remote stereoscopic multiresolution 1. INTRODUCTION Pressurization and de-pressurization of an airplane during each takeoff and landing
Words: 10694 - Pages: 43
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without express written permission. Interested in learning more? Check out the list of upcoming events offering "Security Essentials Bootcamp Style (Security 401)" at http://www.giac.org/registration/gsec Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SA NS
Words: 5538 - Pages: 23
Special Publication 800-48 Wireless Network Security Tom Karygiannis Les Owens 802.11, Bluetooth and Handheld Devices NIST Special Publication 800-48 Wireless Network Security 802.11, Bluetooth and Handheld Devices Recommendations of the National Institute of Standards and Technology Tom Karygiannis and Les Owens C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930
Words: 52755 - Pages: 212
transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Professional Group Cengage Learning Customer
Words: 229697 - Pages: 919
universe evolves quickly, with a speed that is unprecedented even for engineers. Naturally, researchers follow the evolution of their artifacts by adjusting their research interests. We want to capture this vibrant co-evolution in this paper. 1 Introduction
Words: 15250 - Pages: 61
Technovation 34 (2014) 339–341 Contents lists available at ScienceDirect Technovation journal homepage: www.elsevier.com/locate/technovation Editorial The challenge of cyber supply chain security to research and practice – An introduction a b s t r a c t The tremendous potential to assist or degrade economic and national security performance make security in the cyber supply chain a topic of critical importance. This is reflected by the tremendous activity in the public and private
Words: 2975 - Pages: 12
Abstract The Retail Banking Industry has been severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics
Words: 56858 - Pages: 228
Decision Support Systems 50 (2011) 491–500 Contents lists available at ScienceDirect Decision Support Systems j o u r n a l h o m e p a g e : w w w. e l s ev i e r. c o m / l o c a t e / d s s Detection of financial statement fraud and feature selection using data mining techniques P. Ravisankar a, V. Ravi a,⁎, G. Raghava Rao a, I. Bose b a b Institute for Development and Research in Banking Technology, Castle Hills Road #1, Masab Tank, Hyderabad 500 057, AP, India School of Business
Words: 10935 - Pages: 44
standards and practices. These policies define the University’s objectives for managing operations and controlling activities. These top-level policies represent the plans or protocols for achieving and maintaining internal control over information systems as well as compliance with the requirements imposed on the University. INFORMATION SECURITY PLAN Approval by Information Security Board of Review Members Information Security Plan Rev: 3 – 10/13/2011 Page 1 Information Security Plan
Words: 10423 - Pages: 42
Virtual Private Network IS 311 Dr. Gray Tuesday 7pm November 19, 2002 By: Germaine Bacon Lizzi Beduya Jun Mitsuoka Betty Huang Juliet Polintan Table of Contents I. Introduction ……………………………………………….. 1 - 2 II. VPN Topology……………………………………………... 2 - 3 III. Types of VPNs……………………………………………... 3 - 5 IV. Components of VPNs………………………………………. 5 - 7 V. Productivity and Cost Benefit…………………………….... 7 - 9 VI. Quality of
Words: 4870 - Pages: 20