|
|
|
Md Whaiduzzaman, Adnan Sakib, Nisha Jaman Khan, Sudipto Chaki, Labiba Shahrier, Sudipto Ghosh, Md. Saifur Rahman, Md. Julkar Nayeen Mahi, Alistair Barros, Colin Fidge, Scott Thompson-Whiteside and Tony Jan
This paper delves into the complex task of evaluating a website user interface (UI) and user experience (UX), a process complicated by gaps in research. To bridge this, we introduced an innovative human?computer interaction (HCI) framework that synergize...
ver más
|
|
|
|
|
|
|
Elena Basan, Alexandr Basan, Alexey Nekrasov, Colin Fidge, Evgeny Abramov and Anatoly Basyuk
The data analysis subsystem of an Unmanned Aerial Vehicle (UAV) includes two main modules: a data acquisition module for data processing and a normalization module. One of the main features of an adaptive UAV protection system is the analysis of its cybe...
ver más
|
|
|
|
|
|
|
Alexey Nekrasov, Alena Khachaturian and Colin Fidge
Currently, unmanned aerial vehicles (UAVs) are widely used due to their low cost and flexibility. In particular, they are used in remote sensing as airborne platforms for various instruments. Here, we investigate the capability of a conical scanning rada...
ver más
|
|
|
|
|
|
|
Elena Basan, Alexandr Basan, Alexey Nekrasov, Colin Fidge, Nikita Sushkin and Olga Peskova
Here, we developed a method for detecting cyber security attacks aimed at spoofing the Global Positioning System (GPS) signal of an Unmanned Aerial Vehicle (UAV). Most methods for detecting UAV anomalies indicative of an attack use machine learning or ot...
ver más
|
|
|
|
|
|
|
Fidge, Colin; Kearney, Peter; Utting, Mark
Pág. 99 - 106
|
|
|
|