Personalised learning is a crucial key element for promoting lifelong learners. The concept of personalised learning is based on learner-centric approach, represented by different ways of adaptation of the services such as content, support, and presentation to the learner's needs. For any system to support various needs of the learners, it must offer functionality which allows learners to configure the services to meet their needs. Thus facilitates the system adaptability for providing services for each individual based on his/her needs. An adaptive system is usually defined as a system which is capable of adapting its services to meet the requirements of each user. The principles of e-learning and the expectations from learners are revisited, and several existing systems are discussed. Several difficulties of designing intelligent personalize learning machine which maybe solvable and useful in practice are then suggested.
{"title":"Intelligent Personalized Learning System Consideration","authors":"Alex Pongpech","doi":"10.1109/UKSim.2012.18","DOIUrl":"https://doi.org/10.1109/UKSim.2012.18","url":null,"abstract":"Personalised learning is a crucial key element for promoting lifelong learners. The concept of personalised learning is based on learner-centric approach, represented by different ways of adaptation of the services such as content, support, and presentation to the learner's needs. For any system to support various needs of the learners, it must offer functionality which allows learners to configure the services to meet their needs. Thus facilitates the system adaptability for providing services for each individual based on his/her needs. An adaptive system is usually defined as a system which is capable of adapting its services to meet the requirements of each user. The principles of e-learning and the expectations from learners are revisited, and several existing systems are discussed. Several difficulties of designing intelligent personalize learning machine which maybe solvable and useful in practice are then suggested.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122552032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents works involved in developing a three-dimensional lips in a visual speech synthesis system. Several works have been done in similar areas, but a systematic approach of identifying and determining appropriate number of vertices in the lips model were not explained thoroughly. Instead of the development technique, this paper is also presents an experimental set up designed to test the capabilities and flexibility of the lips in deforming speech. This paper explains on the process of capturing the lips and on the relevance measure technique used to identify optimum number of vertices to deform visemes in Standard Malay language. Results shown in this work proves that a systematic degradation by retaining 0.005% of 24,000 vertices into 120 vertices would remain the similar quality of lips deformation. Therefore, the outcome of this study justifies that an appropriate number of vertices which suitable to be used in visual speech synthesis for 3D lips model.
{"title":"Minimizing Vertices in 3D Lips Model Using Relevance Measure","authors":"S. S. Salleh","doi":"10.1109/UKSim.2012.111","DOIUrl":"https://doi.org/10.1109/UKSim.2012.111","url":null,"abstract":"This paper presents works involved in developing a three-dimensional lips in a visual speech synthesis system. Several works have been done in similar areas, but a systematic approach of identifying and determining appropriate number of vertices in the lips model were not explained thoroughly. Instead of the development technique, this paper is also presents an experimental set up designed to test the capabilities and flexibility of the lips in deforming speech. This paper explains on the process of capturing the lips and on the relevance measure technique used to identify optimum number of vertices to deform visemes in Standard Malay language. Results shown in this work proves that a systematic degradation by retaining 0.005% of 24,000 vertices into 120 vertices would remain the similar quality of lips deformation. Therefore, the outcome of this study justifies that an appropriate number of vertices which suitable to be used in visual speech synthesis for 3D lips model.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120833416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There is lot of accessible mobile devices on the market nowadays, which caused significant rise of mobile networks. There are two main types of mobile networks, infrastructure and ad-hoc. This paper is focused on mobile ad-hoc networks also known as MANET, which are easy to build, and do not rely on fixed infrastructure. On the other side, simulation of MANET is really difficult and it is really important to properly design test and simulation scenario. There are various well known simulation environments over there, but this paper aims at OMNeT++[5]. The main contribution of this paper is to introduce ADEUS, support tool used to simplify creation and reduce the time needed to set up OMNeT++ simulation environment, for simulation of public key infrastructure, further referred as PKI, in MANET. ADEUS is graphical add-on for OMNeT++, with simple but powerful user interface.
{"title":"ADEUS: Tool for Rapid Acceleration of Network Simulation in OMNeT++","authors":"P. Vilhan, J. Gajdos","doi":"10.1109/UKSim.2012.90","DOIUrl":"https://doi.org/10.1109/UKSim.2012.90","url":null,"abstract":"There is lot of accessible mobile devices on the market nowadays, which caused significant rise of mobile networks. There are two main types of mobile networks, infrastructure and ad-hoc. This paper is focused on mobile ad-hoc networks also known as MANET, which are easy to build, and do not rely on fixed infrastructure. On the other side, simulation of MANET is really difficult and it is really important to properly design test and simulation scenario. There are various well known simulation environments over there, but this paper aims at OMNeT++[5]. The main contribution of this paper is to introduce ADEUS, support tool used to simplify creation and reduce the time needed to set up OMNeT++ simulation environment, for simulation of public key infrastructure, further referred as PKI, in MANET. ADEUS is graphical add-on for OMNeT++, with simple but powerful user interface.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121819891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Molecular modeling is a basic tool to understand virtually all biological phenomena. It provides a direction to interpret theoretical understanding of structure - activity relationship in terms of physical forces responsible for receptor-ligand binding process. If a three dimensional structure of target receptor is available along with detail knowledge of the nature of the ligand binding site, ligand binding mode, the interactions between the ligand and receptor can be studied extensively in order to design and develop new target specific new compounds in short time. Juvenile Hormone Analogues, sesqui-terpenoid series of compound act as an insect growth regulators and presently in use as a potential environment friendly pesticides. Chemosterlization is the most effectual way to control the vast insect population. Computationally designing of juvenile hormone analogues are new and emerging area to counter the insect problem. We have carried out in-silico comparison between different JHAs containing sulphonamide functionality and Juvabione containing oxa and aza features as juvenile hormone analogues synthesized in our laboratory and studied their interactions against receptor protein of Galleria mellonella insect species using Auto Dock software module on Linux platform.
{"title":"Docking Study of Synthesized Juvenile Hormone Analogues as an Insect Growth Regulators","authors":"P. Awasthi, Priyanka Sharma","doi":"10.1109/UKSim.2012.109","DOIUrl":"https://doi.org/10.1109/UKSim.2012.109","url":null,"abstract":"Molecular modeling is a basic tool to understand virtually all biological phenomena. It provides a direction to interpret theoretical understanding of structure - activity relationship in terms of physical forces responsible for receptor-ligand binding process. If a three dimensional structure of target receptor is available along with detail knowledge of the nature of the ligand binding site, ligand binding mode, the interactions between the ligand and receptor can be studied extensively in order to design and develop new target specific new compounds in short time. Juvenile Hormone Analogues, sesqui-terpenoid series of compound act as an insect growth regulators and presently in use as a potential environment friendly pesticides. Chemosterlization is the most effectual way to control the vast insect population. Computationally designing of juvenile hormone analogues are new and emerging area to counter the insect problem. We have carried out in-silico comparison between different JHAs containing sulphonamide functionality and Juvabione containing oxa and aza features as juvenile hormone analogues synthesized in our laboratory and studied their interactions against receptor protein of Galleria mellonella insect species using Auto Dock software module on Linux platform.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122649983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As high performance clusters (HPC) expand in terms of nodes count and processing cores, internet work congestion and bottlenecks at the host and network levels become one of the main concerns in clustered computing. Considerably, the Infiniband Architecture (IBA) Specification provides six different routing algorithms to better optimize the HPC internet work traffic. In this paper, we present these algorithms and then evaluate QLogic's dispersive routing using a large-scale Infiniband cluster, equipped with Intel's latest Westmere processor. The paper presents the cluster configuration and evaluates its performance using High Performance LINPACK (HPL) and Intel MPI (IMB) benchmarks. Our results show that whilst the default Min Hop algorithm suits most of the serial and point-to-point benchmarks, the dispersive routing algorithm exhibits improved performance when running specific computational and parallel transfer routines.
{"title":"Evaluating Qlogic's Dispersive Routing on High Performance Clusters","authors":"S. M. Sait, R. Al-Shaikh","doi":"10.1109/UKSim.2012.75","DOIUrl":"https://doi.org/10.1109/UKSim.2012.75","url":null,"abstract":"As high performance clusters (HPC) expand in terms of nodes count and processing cores, internet work congestion and bottlenecks at the host and network levels become one of the main concerns in clustered computing. Considerably, the Infiniband Architecture (IBA) Specification provides six different routing algorithms to better optimize the HPC internet work traffic. In this paper, we present these algorithms and then evaluate QLogic's dispersive routing using a large-scale Infiniband cluster, equipped with Intel's latest Westmere processor. The paper presents the cluster configuration and evaluates its performance using High Performance LINPACK (HPL) and Intel MPI (IMB) benchmarks. Our results show that whilst the default Min Hop algorithm suits most of the serial and point-to-point benchmarks, the dispersive routing algorithm exhibits improved performance when running specific computational and parallel transfer routines.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130718410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software design flaws account for 50% software security vulnerability today. As attacks on vulnerable software continue to increase, the demand for secure software is also increasing thereby putting software developers under more pressure. This is especially true for those developers whose primary aim is to produce their software quickly under tight deadlines in order to release it into the market early. While there are many tools focusing on implementation problems during software development lifecycle (SDLC), this does not provide a complete solution in resolving software security problems. Therefore designing software with security in mind will go a long way in developing secure software. In this paper some of the current approaches used in integrating security at the design level of SDLC are discussed briefly and a new method of evaluating software design using neural network is presented. With the aid of the proposed neural network tool, this research found out that software design scenarios can be matched to attack patterns that identify the security flaws in the design scenarios. The result of performance of the neural network is presented in this paper.
{"title":"Applicability of Neural Networks to Software Security","authors":"A. Adebiyi, J. Arreymbi, C. Imafidon","doi":"10.1109/UKSim.2012.14","DOIUrl":"https://doi.org/10.1109/UKSim.2012.14","url":null,"abstract":"Software design flaws account for 50% software security vulnerability today. As attacks on vulnerable software continue to increase, the demand for secure software is also increasing thereby putting software developers under more pressure. This is especially true for those developers whose primary aim is to produce their software quickly under tight deadlines in order to release it into the market early. While there are many tools focusing on implementation problems during software development lifecycle (SDLC), this does not provide a complete solution in resolving software security problems. Therefore designing software with security in mind will go a long way in developing secure software. In this paper some of the current approaches used in integrating security at the design level of SDLC are discussed briefly and a new method of evaluating software design using neural network is presented. With the aid of the proposed neural network tool, this research found out that software design scenarios can be matched to attack patterns that identify the security flaws in the design scenarios. The result of performance of the neural network is presented in this paper.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117096494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wind power plant installations at different scales are in an increasing pattern starting from year 2000. A curiosity has been raised about 4-5 years ago for if wind turbines interfere with radars. The interference occurs when wind turbines reflect radar waves and cause missing targets and blind regions on radar images. Doppler radars are most used to discriminate between the return from a desired target and that from undesired objects, usually ground clutter [1]. There are so many resulting effects of interference such as shadowing, damage to radar equipment, larger radar cross section (RCS) and missing desired targets, etc. Both radar and wind power plant mitigations are available. But still, there is no overall solution, only case by case treatment. RADAR is an acronym for RAdio Detection And Ranging, it will be used as "radar" throughout this paper.
从2000年开始,不同规模的风力发电厂的安装呈增加趋势。大约4-5年前,人们对风力涡轮机是否会干扰雷达产生了好奇。当风力涡轮机反射雷达波时,就会产生干扰,导致雷达图像上的目标缺失和盲区。多普勒雷达最常用于区分来自期望目标和不希望目标(通常是地杂波)的回波[1]。干扰产生的影响有很多,如遮蔽、雷达设备损坏、雷达截面积(RCS)增大和目标丢失等。雷达和风力发电厂的缓解措施都可用。但是,仍然没有全面的解决方案,只能逐个处理。RADAR是RAdio Detection And Ranging(无线电探测与测距)的首字母缩写,在本文中我们将使用它作为“雷达”。
{"title":"Scatter and Doppler Effect of Wind Power Plants to Land Radars","authors":"Derya Sozen, M. Kartal","doi":"10.1109/UKSim.2012.68","DOIUrl":"https://doi.org/10.1109/UKSim.2012.68","url":null,"abstract":"Wind power plant installations at different scales are in an increasing pattern starting from year 2000. A curiosity has been raised about 4-5 years ago for if wind turbines interfere with radars. The interference occurs when wind turbines reflect radar waves and cause missing targets and blind regions on radar images. Doppler radars are most used to discriminate between the return from a desired target and that from undesired objects, usually ground clutter [1]. There are so many resulting effects of interference such as shadowing, damage to radar equipment, larger radar cross section (RCS) and missing desired targets, etc. Both radar and wind power plant mitigations are available. But still, there is no overall solution, only case by case treatment. RADAR is an acronym for RAdio Detection And Ranging, it will be used as \"radar\" throughout this paper.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116155988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distributing digital document through insecure channel leads to the question of the integrity and the ownership of the file on the receiver's side. Employing hash function and digital signature algorithms solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered by illegitimate parties. In this paper, a method to attach digital signature in Portable Document File (PDF) as invisible watermark is proposed. We show that the space character that splits the field in cross-reference table can be overwritten without corrupting the file. The method to embed and extract the signature are proven to be efficient, since the offset index for cross-reference table are available at the end of the file. Our proposed method to embed the signature in the PDF file does not increase the size of the file and offer flexibility for the user to implements the digital signature scheme of his/her own preference.
{"title":"Protection of Integrity and Ownership of PDF Documents Using Invisible Signature","authors":"I. A. Shaikhli, A. Zeki, R. Makarim, A. Pathan","doi":"10.1109/UKSim.2012.81","DOIUrl":"https://doi.org/10.1109/UKSim.2012.81","url":null,"abstract":"Distributing digital document through insecure channel leads to the question of the integrity and the ownership of the file on the receiver's side. Employing hash function and digital signature algorithms solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered by illegitimate parties. In this paper, a method to attach digital signature in Portable Document File (PDF) as invisible watermark is proposed. We show that the space character that splits the field in cross-reference table can be overwritten without corrupting the file. The method to embed and extract the signature are proven to be efficient, since the offset index for cross-reference table are available at the end of the file. Our proposed method to embed the signature in the PDF file does not increase the size of the file and offer flexibility for the user to implements the digital signature scheme of his/her own preference.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121283975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Halim, M. Harun, S. Mohamed, Z. Majid, M. A. Mansor, S. Junid
This paper presents the low power study on trace-back and reconstruction modules for DNA sequences alignment accelerator using ASIC design flow. The objectives of this paper are to construct trace-back and reconstruction modules, to perform low power analysis technique using frequency scaling and clock gating. Another objective is to implement the designs on ASIC. This paper focuses on the power consumption of the trace-back and reconstruction modules . As the number of DNA sequence database increases exponentially, it affects the performance of Smith-Waterman algorithm in computational complexity. Therefore, researchers have explored many methods to implement this algorithm by increasing the speed, reducing the power, minimizing the area and so on . The designs were written in Verilog language and verified on Xilinx FPGA design flow. Later, the designs were functionally verified in VCS, synthesized in DC and implemented on ICC. From the analysis, the designs' power consumptions remained constant at lower frequencies and started to increase exponentially when the clock period cross 20ns and lower. A clock gating technique was implemented on at clock period of 10ns for comparison. The results showed that the power consumption reduced up to 50 percent. The design was successfully implemented on ASIC design flow.
{"title":"Low Power Study on Trace Back and Reconstruction Modules for DNA Sequences Alignment Accelerator","authors":"A. Halim, M. Harun, S. Mohamed, Z. Majid, M. A. Mansor, S. Junid","doi":"10.1109/UKSim.2012.26","DOIUrl":"https://doi.org/10.1109/UKSim.2012.26","url":null,"abstract":"This paper presents the low power study on trace-back and reconstruction modules for DNA sequences alignment accelerator using ASIC design flow. The objectives of this paper are to construct trace-back and reconstruction modules, to perform low power analysis technique using frequency scaling and clock gating. Another objective is to implement the designs on ASIC. This paper focuses on the power consumption of the trace-back and reconstruction modules . As the number of DNA sequence database increases exponentially, it affects the performance of Smith-Waterman algorithm in computational complexity. Therefore, researchers have explored many methods to implement this algorithm by increasing the speed, reducing the power, minimizing the area and so on . The designs were written in Verilog language and verified on Xilinx FPGA design flow. Later, the designs were functionally verified in VCS, synthesized in DC and implemented on ICC. From the analysis, the designs' power consumptions remained constant at lower frequencies and started to increase exponentially when the clock period cross 20ns and lower. A clock gating technique was implemented on at clock period of 10ns for comparison. The results showed that the power consumption reduced up to 50 percent. The design was successfully implemented on ASIC design flow.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Kostopoulos, G. Leventakis, V. Tsoulkas, N. Nikitakos
We provide novel results on the development of an intelligent risk management and threat monitoring visualization tool realized within the EU funded project SERSCIS (Semantically Enhanced, Resilient and Secure Critical Infrastructure Services). After a brief overview of existing risk management methods for Critical Infrastructures (CIs), the SERSCIS objectives, motivation and components we proceed in describing the highly complex task of aircraft management process and the adopted risk assessment and evaluation methodology for the implementation of the threat analysis - monitoring solution in the aircraft surface operations sector. In particular our case study and proof - of - concept prototype concentrates on the technical support and information presentation capacity to decision makers and human - in the loop - operators for optimizing the dynamic and adaptive behavior of the interconnected ICT systems in an Airport Collaborative Decision making (A-CDM) test case scenario of the European Air Traffic System.
{"title":"An Intelligent Fault Monitoring and Risk Management Tool for Complex Critical Infrastructures: The SERSCIS Approach in Air-Traffic Surface Control","authors":"D. Kostopoulos, G. Leventakis, V. Tsoulkas, N. Nikitakos","doi":"10.1109/UKSim.2012.37","DOIUrl":"https://doi.org/10.1109/UKSim.2012.37","url":null,"abstract":"We provide novel results on the development of an intelligent risk management and threat monitoring visualization tool realized within the EU funded project SERSCIS (Semantically Enhanced, Resilient and Secure Critical Infrastructure Services). After a brief overview of existing risk management methods for Critical Infrastructures (CIs), the SERSCIS objectives, motivation and components we proceed in describing the highly complex task of aircraft management process and the adopted risk assessment and evaluation methodology for the implementation of the threat analysis - monitoring solution in the aircraft surface operations sector. In particular our case study and proof - of - concept prototype concentrates on the technical support and information presentation capacity to decision makers and human - in the loop - operators for optimizing the dynamic and adaptive behavior of the interconnected ICT systems in an Airport Collaborative Decision making (A-CDM) test case scenario of the European Air Traffic System.","PeriodicalId":405479,"journal":{"name":"2012 UKSim 14th International Conference on Computer Modelling and Simulation","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122328691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}