The following paper presents advanced methods for evaluating the reliability of ADAS module readings, based on an analysis of the transient supply current. Changes in the transient current waveform occur due to environmental conditions and damage to a module's inner circuitry. Specific deviations in the waveforms may indicate a certain eventeither internal or external. This paper presents how to successfully distinguish certain anomalies using artificial neural network-based classification algorithms without having to interfere with the module's internal circuitry.
Barrier machines are a key component of automatic level crossing systems ensuring safety on railroad crossings. Their failure results not only in delayed railway transportation, but also puts human life at risk. To prevent faults in this critical safety element of automatic level crossing systems, it is recommended that fault and anomaly detection algorithms be implemented. Both algorithms are important in terms of safety (information on whether a barrier boom has been lifted/lowered as required) and predictive maintenance (information about the condition of the mechanical components). Here, the authors propose fault models for barrier machine fault and anomaly detection procedures based on current waveform observation. Several algorithms were applied and then assessed such as self-organising maps (SOM), autoencoder artificial neural network, local outlier factor (LOF) and isolation forest. The advantage of the proposed solution is there is no change of hardware, which is already homologated, and the use of the existing sensors (in a current measurement module). The methods under evaluation demonstrated acceptable rates of detection accuracy of the simulated faults, thereby enabling a practical application at the test stage.
Cybersecurity companies from around the world use state-of-the-art technology to provide the best protection against malicious software. Recent times have seen behavioral biometry becoming one of the most popular and widely used components in MFA (Multi-Factor Authentication). The effectiveness and lack of impact on UX (User Experience) is making its popularity rapidly increase among branches in the area of confidential data handling, such as banking, insurance companies, the government, or the military. Although behavioral biometric methods show a high degree of protection against fraudsters, they are susceptible to the quality of input data. The selected behavioral biometrics are strongly dependent on mobile phone IMU sensors. This paper investigates the harmful effects of gaps in data on the behavioral biometry model’s accuracy in order to propose suitable countermeasures for this issue.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.