首页 > 最新文献

2021 International Carnahan Conference on Security Technology (ICCST)最新文献

英文 中文
Likelihood of Unintentional Electromagnetic Emanations Compromising IT Equipment Security: Perspectives of Practitioners on Causal Factors 无意电磁辐射危害IT设备安全的可能性:从业者对因果因素的看法
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717369
M. Martín, F. Sunmola, D. Lauder
The study explores the influencing factors that Radio Frequency (RF) Engineers take into consideration when assessing the likelihood of unintentional electromagnetic radiation compromising the security of Information Technology Equipment. A focus group research methodology is adopted, and the results analyzed using a cause-and-effect technique. Two focus groups of RF Engineers identified twenty-six influencing factors they considered when assessing likelihood. Through the cause-and-effect technique it was possible to categorize the factors in terms of threat, vulnerability, and impact (the three constituents of a qualitative risk calculation). This information can be used by cyber security practitioners with little or no RF experience to provide a better understanding of the significance RF Engineers place on specific factors particularly when assessing vulnerability likelihood.
该研究探讨了射频工程师在评估无意电磁辐射危害信息技术设备安全的可能性时要考虑的影响因素。采用焦点小组研究方法,运用因果分析方法对结果进行分析。RF工程师的两个焦点小组确定了他们在评估可能性时考虑的26个影响因素。通过因果技术,可以根据威胁、脆弱性和影响(定性风险计算的三个组成部分)对因素进行分类。这些信息可以被很少或没有射频经验的网络安全从业人员使用,以更好地理解射频工程师对特定因素的重要性,特别是在评估漏洞可能性时。
{"title":"Likelihood of Unintentional Electromagnetic Emanations Compromising IT Equipment Security: Perspectives of Practitioners on Causal Factors","authors":"M. Martín, F. Sunmola, D. Lauder","doi":"10.1109/ICCST49569.2021.9717369","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717369","url":null,"abstract":"The study explores the influencing factors that Radio Frequency (RF) Engineers take into consideration when assessing the likelihood of unintentional electromagnetic radiation compromising the security of Information Technology Equipment. A focus group research methodology is adopted, and the results analyzed using a cause-and-effect technique. Two focus groups of RF Engineers identified twenty-six influencing factors they considered when assessing likelihood. Through the cause-and-effect technique it was possible to categorize the factors in terms of threat, vulnerability, and impact (the three constituents of a qualitative risk calculation). This information can be used by cyber security practitioners with little or no RF experience to provide a better understanding of the significance RF Engineers place on specific factors particularly when assessing vulnerability likelihood.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122190240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Creating effective fingerprint artefacts: a cooperative and a non-cooperative method for bypassing capacitive and optical sensors with high success rate 创建有效的指纹伪迹:一种高成功率绕过电容式和光学传感器的合作和非合作方法
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717377
Ryan Carvalho, Norbert Tihanyi
Many Presentation Attack Detection methods (PAD) were introduced recently to enhance the security of biometric sensors, however, most of them are not implemented in commercial devices. In this paper we present both a cooperative and a non-cooperative direct attack method to bypass fingerprint sensors (optical scanners, capacitive scanners) used in modern embedded devices. Using the cooperative method 86%-100% Impostor Attack Presentation Match Rate (IAPMR) can be achieved on optical and capacitive sensors using a combination of Ethylene-Vinyl Acetate -(C2H4)n(C4H6O2)n- commonly known as “hot glue” and Polyvinyl Acetate -(C4H6O2)n- commonly known as “white glue” or “school glue”. The cooperative method takes 5–10 minutes and costs no more than $5 which makes it very lucrative and accessible to anyone. We were able to achieve these high success rates on the latest hardware such as the Windows Hello Framework or certified high security devices. Using the non-cooperative method we were able to achieve 98% IAPMR on optical sensors. During the experiment the following devices were tested: Suprema Biostation 2, 2019 Macbook Air, 2017 MacBook Pro, HUAWEI P9, HUAWEI P20, Lexar F35 encrypted USB drive, ASUS Zenbook UX461F Z14, iPhone 8. The whole process is precisely documented and disclosed in this paper for the research community.
为了提高生物识别传感器的安全性,近年来提出了许多表示攻击检测方法(PAD),但大多数方法尚未在商用设备中实现。在本文中,我们提出了一种合作和非合作的直接攻击方法来绕过现代嵌入式设备中使用的指纹传感器(光学扫描仪,电容扫描仪)。使用协作方法,使用乙烯-醋酸乙烯-(C2H4)n(C4H6O2)n(俗称“热胶”)和聚醋酸乙烯-(C4H6O2)n(俗称“白胶”或“学校胶”)的组合,可以在光学和电容传感器上实现86%-100%的冒名顶替攻击呈现匹配率(IAPMR)。这种合作的方法只需要5 - 10分钟,花费不超过5美元,这使得它非常有利可图,任何人都可以使用。我们能够在最新的硬件(如Windows Hello Framework)或经过认证的高安全性设备上实现这些高成功率。使用非合作方法,我们可以在光学传感器上实现98%的IAPMR。实验中测试了以下设备:Suprema Biostation 2、2019 Macbook Air、2017 Macbook Pro、HUAWEI P9、HUAWEI P20、Lexar F35加密USB驱动器、ASUS Zenbook UX461F Z14、iPhone 8。整个过程在本文中被精确地记录和披露给研究界。
{"title":"Creating effective fingerprint artefacts: a cooperative and a non-cooperative method for bypassing capacitive and optical sensors with high success rate","authors":"Ryan Carvalho, Norbert Tihanyi","doi":"10.1109/ICCST49569.2021.9717377","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717377","url":null,"abstract":"Many Presentation Attack Detection methods (PAD) were introduced recently to enhance the security of biometric sensors, however, most of them are not implemented in commercial devices. In this paper we present both a cooperative and a non-cooperative direct attack method to bypass fingerprint sensors (optical scanners, capacitive scanners) used in modern embedded devices. Using the cooperative method 86%-100% Impostor Attack Presentation Match Rate (IAPMR) can be achieved on optical and capacitive sensors using a combination of Ethylene-Vinyl Acetate -(C2H4)n(C4H6O2)n- commonly known as “hot glue” and Polyvinyl Acetate -(C4H6O2)n- commonly known as “white glue” or “school glue”. The cooperative method takes 5–10 minutes and costs no more than $5 which makes it very lucrative and accessible to anyone. We were able to achieve these high success rates on the latest hardware such as the Windows Hello Framework or certified high security devices. Using the non-cooperative method we were able to achieve 98% IAPMR on optical sensors. During the experiment the following devices were tested: Suprema Biostation 2, 2019 Macbook Air, 2017 MacBook Pro, HUAWEI P9, HUAWEI P20, Lexar F35 encrypted USB drive, ASUS Zenbook UX461F Z14, iPhone 8. The whole process is precisely documented and disclosed in this paper for the research community.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125352188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Emotional analysis of safeness and risk perception of London and Rome railway stations during the COVID-19 pandemic COVID-19大流行期间伦敦和罗马火车站安全性和风险认知的情感分析
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717387
F. Garzia, F. Borghini, Luca Canfora, M. Lombardi, S. Ramalingam
The evaluation of perceived safeness and risk by persons is particularly valuable for safety and security handling. Each individual is influenced by others' opinions on safety and security and the Internet embodies the place where these opinions are mostly pursued, acquired, and estimated. From this point of view, social networks play a considerable influential role. For this reason, Opinion Mining and Sentiment Analysis have found noteworthy uses in a variety of situations and one of the most interesting is embodied by public safety and security. The goal of this work is to examine the perception of safety and risk within the railway stations of London (UK) and Rome (Italy) during COVID-19 pandemic. In particular, the railway stations of London Victoria and Waterloo and the railway stations of Rome Termini and Tiburtina were considered, from March 23 to July 9, 2020, highlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, by means of the semantic analysis of the textual contents present in Twitter.
人们对感知到的安全和风险的评估对于安全和安保处理特别有价值。每个人都受到他人对安全和保障的看法的影响,而互联网体现了这些意见主要被追求、获得和估计的地方。从这个角度来看,社交网络扮演着相当有影响力的角色。出于这个原因,意见挖掘和情感分析已经在各种情况下发现了值得注意的用途,其中最有趣的一个是公共安全和安全。这项工作的目的是研究2019冠状病毒病大流行期间伦敦(英国)和罗马(意大利)火车站内的安全和风险认知。特别是,通过对推特上的文本内容进行语义分析,从2020年3月23日至7月9日,对伦敦维多利亚和滑铁卢火车站以及罗马特米尼和蒂布尔蒂纳火车站进行了研究,突出了两国在所考虑的时期内三个不同大流行阶段的情感成分。
{"title":"Emotional analysis of safeness and risk perception of London and Rome railway stations during the COVID-19 pandemic","authors":"F. Garzia, F. Borghini, Luca Canfora, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717387","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717387","url":null,"abstract":"The evaluation of perceived safeness and risk by persons is particularly valuable for safety and security handling. Each individual is influenced by others' opinions on safety and security and the Internet embodies the place where these opinions are mostly pursued, acquired, and estimated. From this point of view, social networks play a considerable influential role. For this reason, Opinion Mining and Sentiment Analysis have found noteworthy uses in a variety of situations and one of the most interesting is embodied by public safety and security. The goal of this work is to examine the perception of safety and risk within the railway stations of London (UK) and Rome (Italy) during COVID-19 pandemic. In particular, the railway stations of London Victoria and Waterloo and the railway stations of Rome Termini and Tiburtina were considered, from March 23 to July 9, 2020, highlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, by means of the semantic analysis of the textual contents present in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114018246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multiple Criteria Decision-making: Risk Analyses for Cultural Events as one of the Soft Target Categories 多准则决策:作为软目标类别之一的文化事件风险分析
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717382
Dora Kotkova, L. Kralik, Lukas Kotek
This article is focused on risk analysis with the help of multi-criteria decision making. We create many risk analyses for Soft targets, and we continually try to find new methods for objective evaluation of the risks. Many risk analyses are subjective, which is a problem for planning security measures and comparing the results (other events, object, place etc.). In this article, we pre-sent our case study, which deals with the utilization of fuzzy TOPSIS. We have chosen one cate-gory of the Soft targets - the cultural events. Our goal was to find the most endangered localization for the violent attacks in the cultural event selected - musical concert. Then we started to cooperate with three experts. They filled in data in our risk analysis, and then we compared the results with practice. We have chosen fuzzy TOPSIS because we assumed this method would be more objective. In the end, this hypothesis has confirmed. The results were objectively and in line with practice.
本文主要研究多准则决策下的风险分析。我们为软目标创建了许多风险分析,并不断尝试寻找客观评估风险的新方法。许多风险分析都是主观的,这对于规划安全措施和比较结果(其他事件、对象、地点等)来说是一个问题。在本文中,我们提出了一个案例研究,该研究涉及模糊TOPSIS的应用。我们选择了一类软目标——文化活动。我们的目标是在选择的文化活动中找到暴力袭击最危险的本地化-音乐会。然后我们开始与三位专家合作。他们在我们的风险分析中填写数据,然后我们将结果与实践进行比较。我们选择模糊TOPSIS是因为我们认为这种方法会更客观。最后,这一假设得到了证实。结果客观、符合实际。
{"title":"Multiple Criteria Decision-making: Risk Analyses for Cultural Events as one of the Soft Target Categories","authors":"Dora Kotkova, L. Kralik, Lukas Kotek","doi":"10.1109/ICCST49569.2021.9717382","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717382","url":null,"abstract":"This article is focused on risk analysis with the help of multi-criteria decision making. We create many risk analyses for Soft targets, and we continually try to find new methods for objective evaluation of the risks. Many risk analyses are subjective, which is a problem for planning security measures and comparing the results (other events, object, place etc.). In this article, we pre-sent our case study, which deals with the utilization of fuzzy TOPSIS. We have chosen one cate-gory of the Soft targets - the cultural events. Our goal was to find the most endangered localization for the violent attacks in the cultural event selected - musical concert. Then we started to cooperate with three experts. They filled in data in our risk analysis, and then we compared the results with practice. We have chosen fuzzy TOPSIS because we assumed this method would be more objective. In the end, this hypothesis has confirmed. The results were objectively and in line with practice.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117174154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study of Cryptographic and Biometric Signatures 密码与生物特征签名的比较研究
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717373
V. Smejkal, J. Kodl
The paper compares the two primary methods of electronic signature: (a) cryptographic electronic signature (CES), and b) dynamic biometric signature (DBS) in terms of key features such as: data used for signature, the possibility of counterfeiting, theft or misuse of the signature, time limitations of signature, test if signing person is alive, environmental influences during signing process, verification checks of signature authenticity, security of methods, ability to verify document integrity, necessity of use of special devices, complexity of implementation, ease of deployment in organization, simplicity of use for users, level of general method acceptance, limitations from the point of view of personal data protection and limitations determined in specific legal acts. Based on many practical observations the listed properties of both methods were scored. The results showed that both types of signatures were satisfactory in all of the above mentioned criteria, however, the overall score was higher in case of DBS. The EU legislation currently prefers CES over DBS by placing the signatures based on a qualified certificate within a hierarchy of signatures higher than the signatures created without using these certificates. Despite the fact that the possibility of separating certificates from the signing person can be considered as a major weakness of this method. The strong preference of CES has neither legal nor technological justification because the requirements for signatures in electronic documents are much stricter than for signature on paper. According to the authors, DBS should be considered more as a traditional signing method that is supplemented by indisprovable attributes in the form of a biometric trace unique to each person.
本文比较了两种主要的电子签名方法:(a)加密电子签名(CES)和(b)动态生物特征签名(DBS),主要特征如下:用于签名的数据、伪造、盗窃或滥用签名的可能性、签名的时间限制、签名人是否活着的测试、签名过程中的环境影响、签名真实性的验证检查、方法的安全性、验证文件完整性的能力、使用特殊设备的必要性、实现的复杂性、组织部署的便利性、用户使用的简单性、通用方法的接受程度。个人数据保护方面的限制和具体法律行为中确定的限制。根据许多实际观察,对这两种方法列出的属性进行了评分。结果表明,两种类型的签名在上述所有标准中都是令人满意的,但DBS的总体得分更高。欧盟立法目前倾向于使用CES而不是DBS,将基于合格证书的签名置于签名层次结构中,而不是不使用这些证书创建的签名。尽管将证书与签署人分离的可能性被认为是这种方法的主要缺点。CES的强烈偏好既没有法律上的理由,也没有技术上的理由,因为电子文档中的签名要求比纸上签名严格得多。根据作者的说法,DBS应该更多地被视为一种传统的签名方法,它以每个人独特的生物特征痕迹的形式补充了不可证伪的属性。
{"title":"Comparative Study of Cryptographic and Biometric Signatures","authors":"V. Smejkal, J. Kodl","doi":"10.1109/ICCST49569.2021.9717373","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717373","url":null,"abstract":"The paper compares the two primary methods of electronic signature: (a) cryptographic electronic signature (CES), and b) dynamic biometric signature (DBS) in terms of key features such as: data used for signature, the possibility of counterfeiting, theft or misuse of the signature, time limitations of signature, test if signing person is alive, environmental influences during signing process, verification checks of signature authenticity, security of methods, ability to verify document integrity, necessity of use of special devices, complexity of implementation, ease of deployment in organization, simplicity of use for users, level of general method acceptance, limitations from the point of view of personal data protection and limitations determined in specific legal acts. Based on many practical observations the listed properties of both methods were scored. The results showed that both types of signatures were satisfactory in all of the above mentioned criteria, however, the overall score was higher in case of DBS. The EU legislation currently prefers CES over DBS by placing the signatures based on a qualified certificate within a hierarchy of signatures higher than the signatures created without using these certificates. Despite the fact that the possibility of separating certificates from the signing person can be considered as a major weakness of this method. The strong preference of CES has neither legal nor technological justification because the requirements for signatures in electronic documents are much stricter than for signature on paper. According to the authors, DBS should be considered more as a traditional signing method that is supplemented by indisprovable attributes in the form of a biometric trace unique to each person.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134407627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Electrocardiogram Biometric Verification Models Based on Short Enrollment Time on Medical and Wearable Recorders 基于医疗和可穿戴记录仪短登记时间的心电图生物特征验证模型评估
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717372
H. Bıçakcı, Marco Santopietro, Matthew James Boakes, R. Guest
Biometric authentication is nowadays widely used in a multitude of scenarios. Several studies have been conducted on electrocardiogram (ECG) for subject identification or verification among the various modalities. However, none have considered a typical implementation with a mobile device and the necessity for a fast-training model with limited recording time for the signal. This study tackles this issue by exploring various classification models on short recordings and evaluating the performance varying the sample length and the training set size. We run our tests on two public datasets collected from wearable and medical devices and propose a pipeline for ECG authentication with limited data required for competitive usage across applications.
如今,生物识别认证被广泛应用于许多场景中。一些研究已经在心电图(ECG)上进行,用于各种模式之间的受试者识别或验证。然而,没有人考虑过移动设备的典型实现以及信号记录时间有限的快速训练模型的必要性。本研究通过在短记录上探索各种分类模型并评估不同样本长度和训练集大小的性能来解决这个问题。我们在从可穿戴设备和医疗设备收集的两个公共数据集上运行我们的测试,并提出了一个用于ECG认证的管道,该管道具有跨应用程序竞争性使用所需的有限数据。
{"title":"Evaluation of Electrocardiogram Biometric Verification Models Based on Short Enrollment Time on Medical and Wearable Recorders","authors":"H. Bıçakcı, Marco Santopietro, Matthew James Boakes, R. Guest","doi":"10.1109/ICCST49569.2021.9717372","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717372","url":null,"abstract":"Biometric authentication is nowadays widely used in a multitude of scenarios. Several studies have been conducted on electrocardiogram (ECG) for subject identification or verification among the various modalities. However, none have considered a typical implementation with a mobile device and the necessity for a fast-training model with limited recording time for the signal. This study tackles this issue by exploring various classification models on short recordings and evaluating the performance varying the sample length and the training set size. We run our tests on two public datasets collected from wearable and medical devices and propose a pipeline for ECG authentication with limited data required for competitive usage across applications.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116151314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards human-like kinematics in industrial robotic arms: a case study on a UR3 robot 工业机械臂类人运动学研究:以UR3机器人为例
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717393
A. Wolniakowski, J. J. Quintana, Moisés Díaz, K. Miatliuk, M. A. Ferrer-Ballester
Safety in industrial robotic environments is a hot research topic in the area of human-robot interaction (HRI). Up to now, a robotic arm on an assembly line interacts with other machines away from human workers. Nowadays, robotic arm manufactures are aimed to their robots could increasingly perform tasks collaborating with humans. One of the ways to improve this collaboration is by making the movement of robots more humanlike. This way, it would be easier for a human to foresee the movement of the robot and approach it without fear of contact. The main difference between the movement of a human and of a robotic arm is that the former has a bell-shaped speed profile while the latter has a uniform speed one. To generate this speed profile, the kinematic theory of rapid human movements and its Sigma-Lognormal model has been used. This model is widely used to explain most of the basic phenomena related to the control of human movements. Both human-like and robotic-like movements are transferred to the UR3 robot. In this paper we detail the how the UR3 robot was programmed to produce both kinds of movement. The dissimilarities result between the input motion and output motion to the robot confirm the possibility to develop human-like velocities in the UR3 robot.
工业机器人环境下的安全问题是人机交互领域的一个研究热点。到目前为止,装配线上的机械臂与其他机器相互作用,远离人类工人。如今,机械臂制造商的目标是让他们的机器人能够越来越多地与人类合作完成任务。改善这种合作的方法之一是使机器人的运动更像人类。这样一来,人类就更容易预见机器人的运动,并在不害怕接触的情况下接近它。人和机械臂运动的主要区别在于前者具有钟形速度曲线,而后者具有匀速曲线。为了生成这个速度剖面,使用了人体快速运动的运动学理论及其西格玛-对数正态模型。该模型被广泛用于解释与人体运动控制有关的大多数基本现象。类似人类和机器人的动作都被转移到UR3机器人上。在本文中,我们详细介绍了如何编写UR3机器人来产生这两种运动。机器人的输入运动和输出运动之间的差异结果证实了UR3机器人发展类人速度的可能性。
{"title":"Towards human-like kinematics in industrial robotic arms: a case study on a UR3 robot","authors":"A. Wolniakowski, J. J. Quintana, Moisés Díaz, K. Miatliuk, M. A. Ferrer-Ballester","doi":"10.1109/ICCST49569.2021.9717393","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717393","url":null,"abstract":"Safety in industrial robotic environments is a hot research topic in the area of human-robot interaction (HRI). Up to now, a robotic arm on an assembly line interacts with other machines away from human workers. Nowadays, robotic arm manufactures are aimed to their robots could increasingly perform tasks collaborating with humans. One of the ways to improve this collaboration is by making the movement of robots more humanlike. This way, it would be easier for a human to foresee the movement of the robot and approach it without fear of contact. The main difference between the movement of a human and of a robotic arm is that the former has a bell-shaped speed profile while the latter has a uniform speed one. To generate this speed profile, the kinematic theory of rapid human movements and its Sigma-Lognormal model has been used. This model is widely used to explain most of the basic phenomena related to the control of human movements. Both human-like and robotic-like movements are transferred to the UR3 robot. In this paper we detail the how the UR3 robot was programmed to produce both kinds of movement. The dissimilarities result between the input motion and output motion to the robot confirm the possibility to develop human-like velocities in the UR3 robot.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128588030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Masks Usage Monitoring for Public Health Security using Computer Vision on Hardware 基于硬件计算机视觉的公共卫生安全口罩使用监测
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717402
Dimitrios Kolosov, I. Mporas
Wearing face masks is one of the direct measures that can help tackling the spread of the new coronavirus. In this paper we presented an architecture for face mask wearing detection using pre-trained deep learning models for computer vision and implementation of them on embedded hardware platforms. Three object detection models were fine-tuned and optimized to run on 4 different hardware platforms. The fine tuning and optimization of the models resulted in significant reduction of the inference time, thus making the use of this technology in IoT based security systems for real-time automatic monitoring of face masks wearing realisable.
戴口罩是帮助应对新型冠状病毒传播的直接措施之一。在本文中,我们提出了一种使用预训练的计算机视觉深度学习模型进行口罩佩戴检测的架构,并在嵌入式硬件平台上实现。对三个目标检测模型进行了微调和优化,以在4个不同的硬件平台上运行。模型的微调和优化大大缩短了推理时间,从而使该技术在基于物联网的安全系统中用于实时自动监控口罩佩戴情况成为可能。
{"title":"Face Masks Usage Monitoring for Public Health Security using Computer Vision on Hardware","authors":"Dimitrios Kolosov, I. Mporas","doi":"10.1109/ICCST49569.2021.9717402","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717402","url":null,"abstract":"Wearing face masks is one of the direct measures that can help tackling the spread of the new coronavirus. In this paper we presented an architecture for face mask wearing detection using pre-trained deep learning models for computer vision and implementation of them on embedded hardware platforms. Three object detection models were fine-tuned and optimized to run on 4 different hardware platforms. The fine tuning and optimization of the models resulted in significant reduction of the inference time, thus making the use of this technology in IoT based security systems for real-time automatic monitoring of face masks wearing realisable.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116771742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Emotional analysis of safeness and risk perception of transports and travels by car and motorcycle in London and Rome during the COVID-19 pandemic COVID-19大流行期间伦敦和罗马交通工具和汽车和摩托车旅行的安全性和风险认知的情感分析
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717374
F. Garzia, F. Borghini, Antonio Moretti, M. Lombardi, S. Ramalingam
The estimation of perceived safeness and risk by people is especially invaluable for security and safety managing. Everyone is based on the opinion of other persons to do selections of any kind and the Internet personifies the location where these opinions are primarily tracked, obtained, and assessed. From this point of view, social networks are considered of huge impact. For this reason, Opinion Mining and Sentiment Analysis reached remarkable applications in a diversity of circumstances and one of the most remarkable is expressed by public security and safety. The purpose of the present work is to investigate the perception of risk with transports and travels by car and motorcycles in London (UK) and Rome (Italy) during COVID-19 pandemic, from March 23 to July 9, 2020, underlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, via the semantic analysis of the textual contents existing in Twitter.
人们对感知到的安全和风险的估计对于安全和安全管理尤其宝贵。每个人都是基于他人的意见来做任何选择,而互联网使这些意见主要被跟踪、获取和评估的地点具体化。从这个角度来看,社交网络被认为具有巨大的影响。因此,意见挖掘和情感分析在各种情况下都得到了显著的应用,其中最显著的应用之一是公共安全。本研究的目的是调查2020年3月23日至7月9日COVID-19大流行期间伦敦(英国)和罗马(意大利)的交通工具和汽车和摩托车旅行的风险感知,通过对Twitter中现有文本内容的语义分析,突出两国所考虑的三个不同大流行阶段的情感成分。
{"title":"Emotional analysis of safeness and risk perception of transports and travels by car and motorcycle in London and Rome during the COVID-19 pandemic","authors":"F. Garzia, F. Borghini, Antonio Moretti, M. Lombardi, S. Ramalingam","doi":"10.1109/ICCST49569.2021.9717374","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717374","url":null,"abstract":"The estimation of perceived safeness and risk by people is especially invaluable for security and safety managing. Everyone is based on the opinion of other persons to do selections of any kind and the Internet personifies the location where these opinions are primarily tracked, obtained, and assessed. From this point of view, social networks are considered of huge impact. For this reason, Opinion Mining and Sentiment Analysis reached remarkable applications in a diversity of circumstances and one of the most remarkable is expressed by public security and safety. The purpose of the present work is to investigate the perception of risk with transports and travels by car and motorcycles in London (UK) and Rome (Italy) during COVID-19 pandemic, from March 23 to July 9, 2020, underlighting the emotional components in three distinct pandemic phases of the considered period in the two countries, via the semantic analysis of the textual contents existing in Twitter.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128300548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Variable Reflective Properties of UK Number Plates and Impact on ANPR 英国车牌的可变反射特性及其对ANPR的影响
Pub Date : 2021-10-11 DOI: 10.1109/ICCST49569.2021.9717378
Mike Rhead, Robert Gurney, W. E. Martin
This paper considers fitness for purpose of revised and existing Legislation and British Standard for retroreflective number plates. The paper considers the basic purpose of registration plates and how such variability and legal interpretation interpreted under commercial pressure for sales, market share and product differentiation by both private and public sector. The variable reflectivity of UK registration plates increases the probability of a fail to capture for ANPR systems.
本文考虑了修订的和现有的立法和英国标准对反光车牌的适用性。本文考虑了车牌登记的基本目的,以及在私营和公共部门对销售、市场份额和产品差异化的商业压力下,如何解释这种可变性和法律解释。英国注册车牌的可变反射率增加了ANPR系统捕获失败的可能性。
{"title":"The Variable Reflective Properties of UK Number Plates and Impact on ANPR","authors":"Mike Rhead, Robert Gurney, W. E. Martin","doi":"10.1109/ICCST49569.2021.9717378","DOIUrl":"https://doi.org/10.1109/ICCST49569.2021.9717378","url":null,"abstract":"This paper considers fitness for purpose of revised and existing Legislation and British Standard for retroreflective number plates. The paper considers the basic purpose of registration plates and how such variability and legal interpretation interpreted under commercial pressure for sales, market share and product differentiation by both private and public sector. The variable reflectivity of UK registration plates increases the probability of a fail to capture for ANPR systems.","PeriodicalId":101539,"journal":{"name":"2021 International Carnahan Conference on Security Technology (ICCST)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122483981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 International Carnahan Conference on Security Technology (ICCST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1