Filters








158 Hits in 10.7 sec

Fire without Smoke and Other Phantoms of Ambon's Violence: Media Effects, Agency, and the Work of Imagination

Patricia Spyer
2002 Indonesia  
The research on which it is based is ongoing within the context of the "Indonesia in Transition" Program funded by the Dutch Academy of Sciences.  ...  modified version of the inaugural lecture I presented at Leiden University on November 29,2002 as the new Chair of the Anthropology and Sociology of Modern Indonesia.  ...  Interviews with refugees on my tapes from the last two years are replete with phrases like "Acang attacked," "Obet's territory," and so on, testifying to the currency of "Voice of the Heart"'s unforeseen  ... 
doi:10.2307/3351523 fatcat:tuokywe4orgndbm3lrrjjpnvcq

A Cognitive Advanced Driver Assistance Systems (ADAS) Architecture for Autonomous-capable Electrified Vehicles

Kavya Prabha Divakarla, Ali Emadi, Saiedeh Razavi
2018 IEEE Transactions on Transportation Electrification  
One of the other related terms which will be often seen in this thesis as well as in the literature is the Advanced Driver Assistance System or ADAS.  ...  A Cognitive Advanced Driver Assistance Systems (ADAS) Architecture for Autonomous-capable Electrified Vehicles A COGNITIVE ADVANCED DRIVER ASSISTANCE SYSTEMS (ADAS) ARCHITECTURE FOR AUTONOMOUS-CAPABLE  ... 
doi:10.1109/tte.2018.2870819 fatcat:s6gm4k2cbvet5deml6tj3ihxry

Spoofing Attacks Against Vehicular FMCW Radar [article]

Rony Komissarov, Avishai Wool
2021 arXiv   pre-print
The safety and security of the passengers in vehicles in the face of cyber attacks is a key element in the automotive industry, especially with the emergence of the Advanced Driver Assistance Systems (  ...  Using a single rogue radar, our attack system is capable of spoofing the distance and velocity measured by the victim vehicle simultaneously, presenting phantom measurements coherent with the laws of physics  ...  Abstract-The safety and security of the passengers in vehicles in the face of cyber attacks is a key element in the automotive industry, especially with the emergence of the Advanced Driver Assistance  ... 
arXiv:2104.13318v1 fatcat:u5rxro3yp5dwheu4tawxkkxddy

Phantom: A High-Performance Computational Core for Sparse Convolutional Neural Networks [article]

Mahmood Azhar Qureshi, Arslan Munir
2021 arXiv   pre-print
To show support for different types of layers, we evaluate the performance of the Phantom architecture on VGG16 and MobileNet.  ...  We also generate a two-dimensional (2D) mesh architecture of Phantom neural computational cores, which we refer to as Phantom-2D accelerator, and propose a novel dataflow that supports all layers of a  ...  One thing which is common in all these solutions is the use of DNNs for visual perception of the road conditions which is the main back-end technology used in advanced driver assistance systems (ADAS).  ... 
arXiv:2111.05002v1 fatcat:3zu2orr75fbhtcrr4rkort5wva

V2X Misbehavior and Collective Perception Service: Considerations for Standardization [article]

Mohammad Raashid Ansari, Jean-Philippe Monteuuis, Jonathan Petit, Cong Chen
2021 arXiv   pre-print
Indeed, an attacker may send authenticated but wrong data to send false location information, alert incorrect events or report a bogus object endangering the safety of other CAVs.  ...  Currently, Standardization Development Organizations are working on developing security standards against such attacks.  ...  Elovici, verify if the object detected by a sensor has a plausible location “Phantom of the adas: Phantom attacks on driver-assistance systems.” and motion [20].  ... 
arXiv:2112.02184v1 fatcat:loonnmkijvfopnjd5bnx7lwln4

Purposing AAL to an Aging Population: AAW (Walking), AAD (Driving) and the IoV (Internet of Vehicles)

Ciaran Mc Goldrick, R. Vince Rabsatt, Mario Gerla
2015 2015 IEEE Globecom Workshops (GC Wkshps)  
It is distinguished from the "sensorweb" through the capabilities of IoT devices to operate and reason on, and with, inputs from multiple sources.  ...  In this work we postulate that vehicles have a previously unexplored role to play in driving widespread acceptance, and adoption, of mobile cloud, IoT and AAL principles, concepts and systems.  ...  To help in this situation, many Advanced Driver Assistance Systems (ADAS) are implemented in luxury class vehicles.  ... 
doi:10.1109/glocomw.2015.7414192 dblp:conf/globecom/GoldrickRG15 fatcat:jg67kt3oejcy7h3m5jtmlaotie

Millimeter-Wave Automotive Radar Spoofing [article]

Mihai Ordean, Flavio D. Garcia
2022 arXiv   pre-print
Millimeter-wave radar systems are one of the core components of the safety-critical Advanced Driver Assistant System (ADAS) of a modern vehicle.  ...  We evaluate the viability of our attacks in two ways.  ...  of Advanced Driver Assistant Systems (ADAS).  ... 
arXiv:2205.06567v1 fatcat:4mncdpqf3fgelcmnjat3dz47xi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
by accidental power shutoff, downing most of the UK Internet (R 19 13,14) VSH PING-of-death attacks from Serbia on NATO Web server, counterattacks on www.gov.yu (R 20 31) .....  ...  Hess and others accused of KGB computer espionage (S 14 2); Three of the Wily Hackers indicted on espionage charges (S 14 6), 'mild' convictions on espionage, not 'hacker' attacks [15Feb1990] (S 15 2)  ...  2) fi System deletes a file; each step makes sense, but the result is broken (R 19 57) -Beware of bogus diploma mills on the Net (R 19 52) h Univ.  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1992 Software engineering notes  
by accidental power shutoff, downing most of the UK Internet (R 19 13,14) VSH PING-of-death attacks from Serbia on NATO Web server, counterattacks on www.gov.yu (R 20 31) .....  ...  Hess and others accused of KGB computer espionage (S 14 2); Three of the Wily Hackers indicted on espionage charges (S 14 6), 'mild' convictions on espionage, not 'hacker' attacks [15Feb1990] (S 15 2)  ...  2) fi System deletes a file; each step makes sense, but the result is broken (R 19 57) -Beware of bogus diploma mills on the Net (R 19 52) h Univ.  ... 
doi:10.1145/134292.134293 fatcat:ayrwcbvvljhrdeav5kvrxaycs4

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1996 Software engineering notes  
by accidental power shutoff, downing most of the UK Internet (R 19 13,14) VSH PING-of-death attacks from Serbia on NATO Web server, counterattacks on www.gov.yu (R 20 31) .....  ...  Hess and others accused of KGB computer espionage (S 14 2); Three of the Wily Hackers indicted on espionage charges (S 14 6), 'mild' convictions on espionage, not 'hacker' attacks [15Feb1990] (S 15 2)  ...  2) fi System deletes a file; each step makes sense, but the result is broken (R 19 57) -Beware of bogus diploma mills on the Net (R 19 52) h Univ.  ... 
doi:10.1145/381790.381797 fatcat:kcxte3luzrg57ms3gwwbqzs5ji

Proposal for an Integrated Framework for Electronic Control Unit Design in the Automotive Industry

Aleksander Buczacki, Piotr Piątek
2021 Energies  
Based on current standards, drafts of future standards, and an analysis of the performance of a real design process for the ECU of an electrical vehicle, we propose an integrated design framework from  ...  Therefore, a stronger emphasis is placed on correct estimations of cybersecurity activity processes.  ...  All authors have read and agreed to the published version of the manuscript. Conflicts of Interest: The authors declare no conflicts of interest. Energies 2021, 14, 3816  ... 
doi:10.3390/en14133816 fatcat:fep4nwgkyvfyvh32x3nohm5gmu

Prosiding Penyelidikan Prasiswazah, Issue No. 1, 2021

Aqilah Baseri Huddin, Asma Abu-Samah, Badariah Bais, Charis Teoh Yi En, Chia Tieng Tieng, Gan Kok Beng, Harhiviin A/L Ganesan, Huda Abdullah, Iskandar Yahya, Izzuan Ismail, Kalaivani Chellapan, Kaliswaran A/L Ganesan (+14 others)
2021 Zenodo  
input and the steering angle of the robot as sensors, drivers, controller design.  ...  Overall, the developed system has the capability in detecting hemorrhagic stroke accurately in the head phantom model by using a microwave system.  ... 
doi:10.5281/zenodo.5771476 fatcat:r74w7ktrnbeglcsquirfsfw4p4

Prosiding Penyelidikan Prasiswazah, Issue No. 1, 2021

Aqilah Baseri Huddin, Asma Abu-Samah, Badariah Bais, Charis Teoh Yi En, Chia Tieng Tieng, Gan Kok Beng, Harhiviin A/L Ganesan, Huda Abdullah, Iskandar Yahya, Izzuan Ismail, Kalaivani Chellapan, Kaliswaran A/L Ganesan (+14 others)
2021 Zenodo  
input and the steering angle of the robot as sensors, drivers, controller design.  ...  Overall, the developed system has the capability in detecting hemorrhagic stroke accurately in the head phantom model by using a microwave system.  ... 
doi:10.5281/zenodo.5771566 fatcat:lgrttq6krzhwtp54qdmqqxueoy

Prosiding Penyelidikan Prasiswazah, Issue No. 1, 2021

Aqilah Baseri Huddin, Asma Abu-Samah, Badariah Bais, Charis Teoh Yi En, Chia Tieng Tieng, Gan Kok Beng, Harhiviin A/L Ganesan, Huda Abdullah, Iskandar Yahya, Izzuan Ismail, Kalaivani Chellapan, Kaliswaran A/L Ganesan (+14 others)
2021 Zenodo  
input and the steering angle of the robot as sensors, drivers, controller design.  ...  Overall, the developed system has the capability in detecting hemorrhagic stroke accurately in the head phantom model by using a microwave system.  ... 
doi:10.5281/zenodo.5771436 fatcat:gwlbmjtgrjae7jbtjwuksnavoi

Drone Detection and Defense Systems: Survey and a Software-Defined Radio-Based Solution

Florin-Lucian Chiper, Alexandru Martian, Calin Vladeanu, Ion Marghescu, Razvan Craciunescu, Octavian Fratu
2022 Sensors  
The DronEnd system is based on RF methods and uses SDR platforms as the main hardware elements.  ...  In this paper, we perform a survey regarding the different drone detection and defense systems that were proposed in the literature, based on different types of methods (i.e., radio frequency (RF), acoustical  ...  Two Nema 17 stepper motors, controlled using Texas instruments DRV8825 drivers, were used; one to adjust the azimuth and one to adjust the elevation of the jamming signal antenna.  ... 
doi:10.3390/s22041453 pmid:35214355 pmcid:PMC8879497 fatcat:h67kp7xl6vcd3dqazzxmdz7olu
« Previous Showing results 1 — 15 out of 158 results