Matches in Nanopublications for { ?s ?p ?o <https://w3id.org/np/RAoDt68HqCMzZGlY8NzWjNTj1Mme6GLzLMWtND0exghPs/assertion>. }
- 2b2aa580-cb31-4fad-b70a-0ba329df9537 type NASA assertion.
- 2c8675b3-4243-4969-a521-dd9cd1c9c7e5 type Concept assertion.
- 2e780392-b00f-48a1-9399-8082a2f12a7c type NASA assertion.
- 2f6f73ef-de54-4311-bdee-a1e466dbc91e type NASA assertion.
- 33acd928-1da5-40d7-8ff9-4e42f88a0e3c type Phrase assertion.
- 344288be-e839-499d-8ae3-82d5437cc35f type Concept assertion.
- 35e5b93c-0517-4585-8537-c07df358b387 type Sentence assertion.
- 366bcafd-805a-4401-9b8a-277bb5723cae type Concept assertion.
- 39945a58-4717-44b4-9f44-4bca319d445e type Phrase assertion.
- 3cb80108-1601-4fe5-922e-04b907fd13f9 type Concept assertion.
- 44126094-11d1-4e66-a696-9b42f501242f type Domain assertion.
- 4845831e-e90c-4df0-8105-44b0533a9503 type IPTC assertion.
- 4890851f-06c5-41ea-8b0f-7763f4735b18 type Place assertion.
- 4bd2e8c7-7c9a-4095-802e-d408a38722ba type FieldOfResearch assertion.
- 4da0c2c4-808f-492d-8bd1-ac152a54618c type Concept assertion.
- 4e5e569d-1904-4f91-873b-015381c4ad18 type Phrase assertion.
- 4f91c9d4-046f-4c40-b0db-f72d93580e36 type Concept assertion.
- 531127a9-3a8d-469f-8af8-39d1009cca79 type Lemma assertion.
- 56769f8f-eeca-47de-a56a-486fa233b600 type IPTC assertion.
- 573d3ce3-f554-4b9f-9e14-cb9838f84cdf type IPTC assertion.
- 5daf77a3-bbf5-470d-84d1-6a6d5f6293af type IPTC assertion.
- 5e5510f7-4cf5-4040-aad7-57c94ff2dfc0 type Lemma assertion.
- 5f2910cf-c1dc-411e-98b2-bcc96c9103e7 type Place assertion.
- 631cf1c9-a8be-4257-88c6-6ba15e61b353 type IPTC assertion.
- 67ce154b-8550-48ed-8697-78c68f1bb2f4 type Lemma assertion.
- 6df98d08-422f-41cd-9e8a-97a3a03bf7f0 type Lemma assertion.
- 6e03b17e-e0d8-4581-b3b3-ad86c4a8fd6c type TimeReference assertion.
- 77e11ce5-f594-4bcd-be70-16d67a6e14a1 type Sentence assertion.
- 798daf6b-509b-4db0-9561-2dfc77847c0e type Concept assertion.
- 798f9c74-5063-4fea-a5d5-c91662c7f759 type Sentence assertion.
- 7f086873-080c-4732-ae54-9ffac4e3cc2f type IPTC assertion.
- 7f5fab8a-892f-496f-b3ea-5bcbbd0f6f72 type Domain assertion.
- 82015d22-5bb1-4352-b6eb-2f3165175aa0 type Phrase assertion.
- 867ae333-96ba-4558-813d-a56de53e7a29 type Sentence assertion.
- 8691aff0-a0a0-488e-a7ea-46b914e52ed4 type Phrase assertion.
- 899b07b2-b55f-40d4-bc93-8161b7668aad type Phrase assertion.
- 8b163d3d-918c-4a68-b2a0-4bcb57375de8 type Sentence assertion.
- 8c8fd292-f36f-4717-9957-574c76b29ef7 type Sentence assertion.
- 919aa4af-fa60-4b7b-9526-7ad6dc552807 type IPTC assertion.
- 932d91bb-a7bc-49bb-9b6c-eff5d190b8f9 type Concept assertion.
- 9e845c12-e9ca-497d-afb9-2df07b304163 type NASA assertion.
- a494aa34-fe8d-413a-a4dd-6f70d2c7c33b type Place assertion.
- a854a6ed-9c0f-45e5-aeaa-33dead69470b type Phrase assertion.
- af3d2d66-b45f-4bbc-9075-94f53652f207 type Lemma assertion.
- b3180788-9c04-4413-acca-f938ff2a0636 type Domain assertion.
- b5f61870-5dff-4eae-bab2-91dc22fbac3e type Lemma assertion.
- b6067c90-84f6-4dc9-b96c-a41135fc676e type FieldOfResearch assertion.
- b928c03f-9ffd-4e28-8291-13ef5295c0af type Concept assertion.
- c2ae66a8-52cb-4855-b53c-e14b855fbc00 type Place assertion.
- c7160cf7-4aa9-409d-b9b7-5b7572b0646e type Concept assertion.
- c8cf9404-2294-4b1f-a4a3-ce93eee79f58 type Concept assertion.
- cd5990c8-aff4-4979-a370-c9f8dd33a885 type Concept assertion.
- ced5b15e-d817-408a-97fd-b8d9e18f511d type Phrase assertion.
- d21eac9b-1655-4e66-a207-bc24e6b84423 type Organization assertion.
- d3e6d06d-c72b-46d0-ae84-c1229b2cfc88 type Phrase assertion.
- d66c6103-347f-435d-8bd5-fea8f261b5ca type Lemma assertion.
- d8c6b5cb-c11e-4629-8146-c31203b4b02a type TimeReference assertion.
- dc40c113-3a4f-4c73-8c60-7f5c8995f90e type Concept assertion.
- e22f6bd5-b6c4-475c-aa46-d03510f68745 type Lemma assertion.
- e35de860-bab9-40db-9cf3-4e7172929d1e type IPTC assertion.
- e3a38c92-5f8a-4c9a-9c6a-0d55284041f0 type Lemma assertion.
- e4487471-f3c8-4eb4-ba5d-12ddcaa45372 type Concept assertion.
- e76761ee-e45f-4e3b-b091-c4b6b955750f type Concept assertion.
- ebfed4df-c1ab-40b0-8765-95fa48ba1509 type Lemma assertion.
- f1184a07-b822-4eca-8794-48e7e7a68a8b type Phrase assertion.
- f1a9629a-cb63-43f0-a143-0913fc15e29b type Lemma assertion.
- f237b9a7-207c-473c-8c35-9c225f071142 type FieldOfResearch assertion.
- fc7899f0-529a-4fbc-a4e5-a038a41a9c7d type Concept assertion.
- fd228f1f-0ec8-4ba1-af1d-fd973fdb0a82 type IPTC assertion.
- jmse10010112 type Paper assertion.
- jmse10010112 type Resource assertion.
- jmse10010112 type MediaObject assertion.
- 00vn06n10 type Organization assertion.
- 00vn06n10 type Agent assertion.
- 3949 type DefinedTerm assertion.
- 0000-0002-1784-2920 type Agent assertion.
- c_a935cf3f type DefinedTerm assertion.
- 7998d851-41e8-4c51-aa06-deff6fd5f09a template "http://w3id.org/ro/earth-science#ExecutableResearchObjectTemplate" assertion.
- 42613c9d-9bea-4bc9-b475-1ac886a05d57 wasDerivedFrom 7998d851-41e8-4c51-aa06-deff6fd5f09a assertion.
- 88fba8bd-f2f0-402e-8147-b73b71e8691a description "Research Object with sample AIS data (in-situ)" assertion.
- response-ais.html description "VTexplorer API (https://www.vtexplorer.com) documentation. This documentation can be useful to understand how AIS data can be processed." assertion.
- tle-fmt.php description "This document describes the NORA Two-Line Element Set Format (TLE) where data for each satellite consists of three lines with a fixed format (see document)." assertion.
- edit?usp=sharing description "Main document (Google doc) provided when willing to start with TSAR Overview." assertion.
- view?usp=sharing description "Slides (private) presenting the T-SAR project." assertion.
- view?usp=sharing description "In maritime traffic surveillance, detecting illegal activities, such as illegal fishing or transshipment of illicit products is a crucial task of the coastal administration. In the open sea, one has to rely on Automatic Identification System (AIS) message transmitted by on-board transponders, which are captured by surveillance satellites. However, insincere vessels often intentionally shut down their AIS transponders to hide illegal activities. In the open sea, it is very challenging to differentiate intentional AIS shutdowns from missing reception due to protocol limitations, bad weather conditions or restricting satellite positions. This paper presents a novel approach for the detection of abnormal AIS missing reception based on self-supervised deep learning techniques and transformer models. Using historical data, the trained model predicts if a message should be received in the upcoming minute or not. Afterwards, the model reports on detected anomalies by comparing the prediction with what actually happens. Our method can process AIS messages in real-time, in particular, more than 500 Millions AIS messages per month, corresponding to the trajectories of more than 60 000 ships. The method is evaluated on 1-year of real-world data coming from four Norwegian surveillance satellites. The results show that the method can detect confirmed real-world intentional AIS shutdown operations." assertion.
- tsar-project description "Here we gather information about the project (notes taken during meetings, etc.). We use hackmd.io and text is written in markdown." assertion.
- Two-line_element_set description "Description of Two-Line Element Set (TLE) from Wikipedia." assertion.
- master description "Gitlab repository set up for reproducibility purposes." assertion.
- marivisu-v2 description "Marivisu serves as a demonstrator of the machine learning model developed to detect anomalies in the vessel trajectory. This work was supported by the Norwegian Research Council (RCN) TSAR project under contract 287893. Satellite AIS data used for model development and testing has been made available courteously by its owner, the Norwegian Coastal Administration (Kystverket)." assertion.
- pre-processing description "n maritime traffic surveillance, detecting illegal activities, such as illegal fishing or transhipment of illicit products is a crucial task of the coastal administration. In the open sea, one has to rely on Automatic Identification System (AIS) messages transmitted by on-board transponders, which are captured by surveillance satellites. However, insincere vessels often intentionally shut down their AIS transponders to hide illegal activities. In the open sea, it is very challenging to differentiate intentional AIS shutdowns from missing reception due to protocol limitations, bad weather conditions or restricting satellite positions. This paper presents a novel approach for the detection of abnormal AIS missing reception based on self-supervised deep learning techniques and transformer models. Our method can process AIS messages in real-time, in particular, more than 500 Millions AIS messages per month, corresponding to the trajectories of more than 60 000 ships. The method is evaluated on 1-year of real-world data coming from four Norwegian surveillance satellites. The results show that the method can detect confirmed real-world intentional AIS shutdown operations." assertion.
- vesseltype_identification_dae description "Private repository containing Anomaly Detection in Vessels Trajectories using Context-Aware Autoencoders" assertion.
- 0AI6umItIl7BxUk9PVA description "Internally shared google drive with data and documents for T-SAR project" assertion.
- apprentissage_auto_supervise_pour_detecter_les_deconnections_ais_volontaires.pdf description "The surveillance of maritime traffic is confronted with very important difficulties in detecting illegal activities at sea. In this article, we present the first results of a self-supervised learning method which aims to detect voluntary disconnec- tions of the identification’ system of vessels. By processing data from four Norwegian surveillance satellites, our lear- ning model aims to identify vessels suspected of illegal acti- vities such as fishing in protected areas or crossing econo- mic exclusion zones in real time. In this article, we present an approach based on self-supervised learning techniques, and experienced from real data." assertion.
- 7998d851-41e8-4c51-aa06-deff6fd5f09a description "In transport infrastructures, vessel traffic services, air traffic management, and connected cars all rely on unauthenticated and unencrypted messages transfer that renders these services vulnerable to cyberattacks. Typical attacks such as False Data Injection Attacks (FDIA) are challenging to detect as they alter the semantics of the data (e.g., by adding/removing/multiplying elements on real-time control equipment), while preserving the syntactical correctness of the messages. Identifying these attacks and classifying them as serious threats or unintentional false data has become a significant challenge of traffic monitoring authorities. The TSAR project aims at demonstrating that recent advances in Artificial Intelligence (AI) can be leveraged in the automatic detection of FDIA in transport infrastructures. By combining realistic threat data generation based on constraint-based software testing techniques and automatic detection with deep reinforcement learning, TSAR will propose a new technology for automatic FDIA generation and detection. This technology will be empirically evaluated with end-users from the maritime domain and with open and accessible data in two other domains, namely air traffic control, and connected cars. By leveraging automatic detection of FDIA in traffic management systems, TSAR will also prepare the ground for the upcoming revolution in traffic management, which concerns, self-driving vessels, self-driving aircraft, and self-driving cars." assertion.
- 5bffb6c2-45e3-4a80-9242-5afd61c21063 description "papers, conference proceeding generated by the TSAR project." assertion.
- 636a64a4-ba87-4d16-8a67-455bfd74e7d6 description "Documentation and existing information about surveillance and detection of anomalies using Automatic Identification System data (ground and satellite)." assertion.
- bc6ab0f0-c443-4b11-a772-03fbcdb452c4 description "Bibliography collected on Automatic Identification System and detection of anomalies from AIS data (ground/satellite)." assertion.
- 3e6f07ae-3da5-43ab-a7f9-4334ee01b8d2 description "Distribution of samples on the surface of the globe." assertion.
- c7d9b7cb-7192-471b-82f4-13fe89dc6906 description "The NorSat-3 microsatellite will be launched into space during spring 2021 with a radar detector developed at the Norwegian Defence Research Establishment (FFI). It will provide improved surveillance capability of the shipping traffic in Norwegian national waters. File downloaded from the Norwegian Defence Research Establishment (https://publications.ffi.no/nb/item/asset/dspace:7059/FFI-Facts_NorSat_Engelsk_web_v2.pdf)." assertion.
- ed59cb0a-e359-4f95-932d-88375b08daa7 description "Major transportation surveillance protocols have not been specified with cyber securityin mind and therefore provide no encryption nor identification. These issues expose air and seatransport to false data injection attacks (FDIAs), in which an attacker modifies, blocks or emits fakesurveillance messages to dupe controllers and surveillance systems. There has been growing interestin conducting research on machine learning-based anomaly detection systems that address these newthreats. However, significant amounts of data are needed to achieve meaningful results with this typeof model. Raw, genuine data can be obtained from existing databases but need to be preprocessedbefore being fed to a model. Acquiring anomalous data is another challenge: such data is muchtoo scarce for both the Automatic Dependent Surveillance–Broadcast (ADS-B) and the AutomaticIdentification System (AIS). Crafting anomalous data by hand, which has been the sole methodapplied to date, is hardly suitable for broad detection model testing. This paper proposes an approachbuilt upon existing libraries and ideas that offers ML researchers the necessary tools to facilitatethe access and processing of genuine data as well as to automatically generate synthetic anomaloussurveillance data to constitute broad, elaborated test datasets. We demonstrate the usability of theapproach by discussing work in progress that includes the reproduction of related work, creation ofrelevant datasets and design of advanced anomaly" assertion.