Skip to main content

Showing 1–3 of 3 results for author: Hood, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.04438  [pdf, ps, other

    cs.SE

    On the Practices of Autonomous Systems Development: Survey-based Empirical Findings

    Authors: Katerina Goseva-Popstojanova, Denny Hood, Johann Schumann, Noble Nkwocha

    Abstract: Autonomous systems have gained an important role in many industry domains and are beginning to change everyday life. However, due to dynamically emerging applications and often proprietary constraints, there is a lack of information about the practice of developing autonomous systems. This paper presents the first part of the longitudinal study focused on establishing state-of-the-practice, identi… ▽ More

    Submitted 4 June, 2025; originally announced June 2025.

    Comments: 25 pages

  2. arXiv:2212.01790  [pdf, other

    cs.CV cs.AI

    Kernel Inversed Pyramidal Resizing Network for Efficient Pavement Distress Recognition

    Authors: Rong Qin, Luwen Huangfu, Devon Hood, James Ma, Sheng Huang

    Abstract: Pavement Distress Recognition (PDR) is an important step in pavement inspection and can be powered by image-based automation to expedite the process and reduce labor costs. Pavement images are often in high-resolution with a low ratio of distressed to non-distressed areas. Advanced approaches leverage these properties via dividing images into patches and explore discriminative features in the scal… ▽ More

    Submitted 4 December, 2022; originally announced December 2022.

    Comments: Accepted By ICONIP as Oral paper

  3. IT Security Plan for Flight Simulation Program

    Authors: David Hood, Syed Shawon Rahman

    Abstract: Information security is one of the most important aspects of technology, we cannot protect the best interests of our organizations' assets (be that personnel, data, or other resources), without ensuring that these assetsare protected to the best of their ability. Within the Defense Department, this is vital to the security of not just those assets but also the national security of the United State… ▽ More

    Submitted 7 November, 2011; originally announced November 2011.

    Comments: 24 pages

    Journal ref: International Journal of Computer Science, Engineering and Applications (IJCSEA),Vol.1, No.5, October 2011, 117-140