Searched for: subject%3A%222015%255C%2BHuman%255C%2B%2526%255C%2BOperational%255C%2BModelling%22
(1 - 20 of 51)

Pages

document
Eisele, C. (author), Seiffer, D. (author), Sucher, E. (author), Ullwer, C. (author), Kociok, T. (author), Sprung, D. (author), van Binsbergen, S. (author), Bijl, P. (author)
In the framework of a NATO research group Fraunhofer IOSB and partners conducted a field trial in an arid shrub land environment in southern New Mexico (USA). The group investigates environmental limitations of fielded EO-TDAs (Electro-Optical Tactical Decision Aids). Main objective of the trial was to study the impact of the atmosphere on...
conference paper 2019
document
Repasi, E. (author), Keßler, S. (author), Bijl, P. (author), ten Hove, R.J.M. (author), Labarre, L. (author), Wegner, D. (author), Wittenstein, W. (author), Bürsing, H. (author)
ECOMOS is a multinational effort within the framework of an EDA Project Arrangement. Its aim is to provide a generally accepted and harmonized European computer model for computing nominal Target Acquisition (TA) ranges of optronic imagers operating in the Visible or thermal Infrared (IR). The project involves close co-operation of defense and...
conference paper 2019
document
van Diggelen, J. (author), van den Broek, J. (author), Schraagen, J.M.C. (author), van der Waa, J.S. (author)
This paper proposes a human-centered approach to Dynamic Position-ing systems which combines multiple technologies in an intelligent operator sup-port system (IOSS). IOSS allows the operator to be roaming and do other tasks in quiet conditions. When conditions become more demanding, the IOSS calls the operator to return to his bridge position....
conference paper 2018
document
Young, H.J. (author), van Vliet, A.J. (author), van de Ven, J.G.S. (author), Jol, S.C. (author), Broekman, C.C.M.T. (author)
The perspective of human factors is largely missing from the wider cyber security dialogue and its scope is often limited. We propose a framework in which we consider cyber security as a state of a system. System change is brought on by an entity’s behavior. Interventions are ways of changing entities’ behavior to inhibit undesirable behavior...
conference paper 2018
document
Laan, C.M. (author), Barros, A.I. (author), Boucherie, R.J. (author), Monsuur, H. (author)
This paper considers a special case of security games dealing with the protection of a large area divided in multiple cells for a given planning period. An intruder decides on which cell to attack and an agent selects a patrol route visiting multiple cells from a finite set of patrol routes such that some given operational conditions on the...
conference paper 2017
document
Luiijf, H.A.M. (author)
De snelle ontwikkelingen van robotisering leiden tot nieuw risico voor de medewerkers op de werkvloer. Welke nieuwe arbogerelateerde dreigingen liggen hieraan ten grondslag? U heeft het antwoord nodig om maatregelen te kunnen nemen die dat risico beheersbaar maken. Wellicht verrassend is dat u ook aandacht moet besteden aan de cybersecurity van...
article 2017
document
Sol, E.J. (author), Luiijf, H.A.M. (author)
article 2017
document
Vreeken, V. (author)
Na zich 42,5 jaar ingezet te hebben voor de digitale veiligheid van onze samenleving, nam vakredacteur ir. Eric Luiijf half november afscheid van TNO, wegens het bereiken van de pensioengerechtigde leeftijd. Bij het instituut ontwikkelde hij zich tot een van Nederlands grootste autoriteiten in cybersecurity en deelde hij wereldwijd zijn kennis...
article 2017
document
Luiijf, H.A.M. (author), van Schie, T.C.C. (author)
Early 2016, the Meridian Process and the GFCE tasked the Netherlands Organisation for Applied Scientific Research TNO to develop a Good Practice Guide on Critical Information Infrastructure Protection (CIIP) for governmental policy-makers [1]. The guide primarily aims at governmental policy-makers, but other stakeholders such as Critical...
article 2017
document
Smilda, F. (author), de Vries, A. (author)
De mondige burger is allang niet meer een passieve volger van de politie en opsporingsdiensten, maar neemt zelf het heft in handen dankzij de mogelijkheden van sociale media. Bijvoorbeeld door vermeende criminaliteit of misdaad te delen met een groot publiek of actief mee te helpen met online zoeken naar daders. Zo verandert door...
bookPart 2017
document
Dijk, J. (author), Bijl, P. (author), Oppeneer, M. (author), ten Hove, R.J.M. (author), van Iersel, M. (author)
The Electro-Optical Signal Transmission and Ranging (EOSTAR) model is an image-based Tactical Decision Aid (TDA) for thermal imaging systems (MWIR/LWIR) developed for a sea environment with an extensive atmosphere model. The Triangle Orientation Discrimination (TOD) Target Acquisition model calculates the sensor and signal processing effects on...
conference paper 2017
document
Rome, E. (author), Luiijf, H.A.M. (author), Rosato, V. (author)
The EU FP7 Network of Excellence project CIPRNet has bundled its ser-vices to the CIP/CIR community in a Virtual Centre of Competence & Ex-pertise in CIP (VCCC). The VCCC services include CIP/CIR knowledge sharing, demonstrations of new technical capabilities, an e-Lear-ning platform, and access to CIPe-dia©, a very popular online glossary of...
article 2017
document
Luiijf, H.A.M. (author), van der Beek, F.A. (author)
Steeds vaker worden robots voor productie en bewakingsdoeleinden gebruikt. Het aantal robots verdubbelt zich inmiddels jaarlijks.Nieuwe typen robots staan niet meer in een veiligheidskooi, maar werken nauw samen met mensen en bewegen zich samen met de medewerkers over dezelfde werkvloer. Daardoor ontstaat er een nieuw arbeidsrisico die een...
article 2017
document
Global Forum on Cyber Expertise (GFCE) (author)
conference paper 2017
document
Schmitz, H.C. (author), Pienemann, R. (author), Deneckere, M. (author)
conference paper 2017
document
Den Hartog, F. (author), Kemper, P.L. (author), Boltjes, B. (author), Raschella, A. (author), Bouhafs, F. (author), Seyedebrahimi, M. (author)
Surprisingly little research has quantified the severity of Wi-Fi congestion in densely populated areas. We performed a high-fidelity 3D simulation of the performance of a realistic Wi-Fi deployment in a typical apartment block. Our results show that congestion leads to significant loss of performance, and that current channel selection...
conference paper 2017
document
Pinto, M.J. (author), Barros, A.I. (author), Noomen, R. (author), van Gelder, P.H.A.J.M. (author), Lamballais Tessensohn, T. (author)
The operational use of satellite systems has been increasing due to technological advances and the reduced costs of satellites and their launching. As such it has become more relevant to determine how to better use these new capabilities which is reflected in an increase in application studies in this area. This work focuses on the problem of...
conference paper 2017
document
Burghouwt, P. (author), Maris, M. (author), van Peski, S. (author), Luiijf, H.A.M. (author), van de Voorde, I. (author), Spruit, M. (author)
conference paper 2017
document
Klaver, M.H.A. (author), Luiijf, H.A.M. (author), Rome, R. (author)
report 2017
document
Tielman, M.L. (author), Neerincx, M.A. (author), Bidarra, R. (author), Kybartas, B. (author), Brinkman, W.P. (author)
Although post-traumatic stress disorder (PTSD) is well treatable, many people do not get the desired treatment due to barriers to care (such as stigma and cost). This paper presents a system that bridges this gap by enabling patients to follow therapy at home. A therapist is only involved remotely, to monitor progress and serve as a safety net....
article 2017
Searched for: subject%3A%222015%255C%2BHuman%255C%2B%2526%255C%2BOperational%255C%2BModelling%22
(1 - 20 of 51)

Pages