A novel radar-based system for longwall coal mine machine localisation is described. The system, based on a radar-ranging sensor and designed to localise mining equipment with respect to the mine tunnel gate road infr...A novel radar-based system for longwall coal mine machine localisation is described. The system, based on a radar-ranging sensor and designed to localise mining equipment with respect to the mine tunnel gate road infrastructure, is developed and trialled in an underground coal mine. The challenges of reliable sensing in the mine environment are considered, and the use of a radar sensor for localisation is justified. The difficulties of achieving reliable positioning using only the radar sensor are examined. Several probabilistic data processing techniques are explored in order to estimate two key localisation parameters from a single radar signal, namely along-track position and across-track position, with respect to the gate road structures. For the case of across-track position, a conventional Kalman filter approach is sufficient to achieve a reliable estimate. However for along-track position estimation, specific infrastructure elements on the gate road rib-wall must be identified by a tracking algorithm. Due to complexities associated with this data processing problem, a novel visual analytics approach was explored in a 3D interactive display to facilitate identification of significant features for use in a classifier algorithm. Based on the classifier output, identified elements are used as location waypoints to provide a robust and accurate mining equipment localisation estimate.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
文摘A novel radar-based system for longwall coal mine machine localisation is described. The system, based on a radar-ranging sensor and designed to localise mining equipment with respect to the mine tunnel gate road infrastructure, is developed and trialled in an underground coal mine. The challenges of reliable sensing in the mine environment are considered, and the use of a radar sensor for localisation is justified. The difficulties of achieving reliable positioning using only the radar sensor are examined. Several probabilistic data processing techniques are explored in order to estimate two key localisation parameters from a single radar signal, namely along-track position and across-track position, with respect to the gate road structures. For the case of across-track position, a conventional Kalman filter approach is sufficient to achieve a reliable estimate. However for along-track position estimation, specific infrastructure elements on the gate road rib-wall must be identified by a tracking algorithm. Due to complexities associated with this data processing problem, a novel visual analytics approach was explored in a 3D interactive display to facilitate identification of significant features for use in a classifier algorithm. Based on the classifier output, identified elements are used as location waypoints to provide a robust and accurate mining equipment localisation estimate.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].