International Journal of Research Available at
|
|
- Aubrie Barnett
- 5 years ago
- Views:
Transcription
1 Detection of Intrusion by Using Behaviour Rule Specification Based Technique for Providing Security to MCPS Varun Revuri Assistant Professor, Department of CSE Vaagdevi College of Engineering Abstract: Essentially the most prominent attribute of a medical cyber bodily process (MCPS) is its suggestions loop that acts on the physical atmosphere. In this paper, we are concerned with intrusion detection mechanisms for detecting compromised sensors or actuators embedded in an MCPS for supporting nontoxic and at ease MCPS applications upon which patients and healthcare personnel can depend with extreme self belief. Intrusion detection method (IDS) design for cyber physical systems (CPSs) has attracted enormous concentration when we consider that of the terrible consequence of CPS failure. Nonetheless, an IDS manner for MCPSs is still in its infancy with very little work stated. Intrusion detection methods in basic will also be categorized into 4 varieties: signature, anomaly, trust, and specificationcentered techniques. In this project, we don't forget specification instead than signature and anomaly based detection in order to deal with unknown attacker patterns to prevent making use of resource constrained sensors or actuators in an MCPS for profiling anomaly patterns (e.g., via learning) and to avoid high false positives. Index Terms Intrusion detection system, sensor actuator networks, medical cyber physical systems, healthcare, security, safety. I. INTRODUCTION Security researchers had proved that crucial medical devices connected to a patient is highly susceptible to cyber attacks. Cyber criminals may just aims these devices and could provoke an attack. Hospitals were unaware that those gadgets that they believe is being infiltrated by means of the cyber attackers and is currently working as part of an attack. Detecting an attacker in MCPS is extra problematic challenge. The device makes use of complex algorithms, intelligent patient curing procedures completed inside a blink of an eye fixed [1]. Actually those programs needs high execution cost without compromising precision, zero tolerance when it comes to tolerance. To see and Gondrala Sree Anjani M.Tech, Software Engineering Vaagdevi College of Engineering critical, every gap in every module via a protection reliable in the sort of device is a ordinary mission[2]. From this sort of perspective intrusion detection[3] in such programs are imperative to shield the integrity of MCPS given that of the unrivaled consequences of its failure. To embed an intrusion detection process in MCPS sensor/actuator networks brings further challenges[4]. These sensor/actuator networks are extremely useful resource constrained. Now adding an intrusion detection approach should bypass these challenges. With all these in mind a new methodology for intrusion detection is putforward which uses behavioral rule specificationbased Intrusion detection (BSID) which makes use of behavioral rules for outlining traditional behavioral patterns for a medical device. These behavioral patterns characterize appropriate behaviors of that distinct CPS[5]. Further, these behavioral rules are then transformed into a state laptop, so that any deviation from usual state to an detrimental state may also be quite simply monitored. The have an effect on of various attackers are also investigated to benchmark the effectiveness of MCPS Intrusion Detection method. This system has additionally been proved to show a larger real positives for a lowered false poor as good as false constructive cost. This may further help to identify more elaborate and invisible attackers[6]. A peer to see architecture provides one other uninterrupted operation of Intrusion Detection process. The most important change between constructing an IDSs for healthcare devices and other methods is that the attack occurs on the physical element rather than in the network or communication protocols. So IDS will have to be intently coupled with the physical equipment of the Cyber physical system [7]. II. RELATED WORKS Porras and Neumann [10] be taught a hierarchical multitrust behavior-based IDS called event Monitoring Enabling Responses to Anomalous are living Disturbances (EMERALD) [8] utilizing complementary signature based and anomaly- Available online: P a g e 561
2 founded analysis. The authors establish a signatureestablished analysis exchange between the state space created/runtime burden imposed with the aid of rich rule sets and the expanded false negatives that stem from a much less expressive rule set. Porras and Neumann highlight two special anomaly-situated tactics making use of statistical evaluation: one experiences user sessions (to notice live intruders), and the opposite experiences the runtime behavior of programs (to realize malicious code). Park et al. [9] advise a semi-supervised anomalybased IDS distinct for assisted dwelling environments. Their design is behavior-based and audits series of routine which they call episodes. The authors events are 3-tuples comprising sensor ID, time and duration. Park et al. Scan data units using four similarity capabilities situated on: LCS, depend of customary movements not in LCS, occasion begin times and event periods They control episode size and similarity perform as unbiased variables. The authors furnish best ROC information which we use for a comparative evaluation. Tsang and Kwong [11] endorse a multitrust IDS known as Multi-agent system (MAS) that includes an evaluation perform called Ant Colony Clustering model (ACCM). The authors intend for ACCM to scale down the typically high false positive rate of anomaly-based techniques whereas minimizing the training period through utilizing an unsupervised approach to machine studying. MAS is hierarchical and includes a big quantity of roles: reveal sellers acquire audit information, decision sellers perform analysis, action agents outcomes responses, coordination agents manage multitrust conversation, consumer interface agents engage with human operators and registration retailers manipulate agent appearance and disappearance. We will use Park et al. [9] and Tsang and Kwong [11] as base schemes towards which BSID might be when put next on the grounds that no others furnish significant p fp /p fn knowledge for a comparative evaluation. III. PROPOSED METHODS Intrusion detection methods specifically will also be categorized into 4 varieties: signature, anomaly, trust, and specification-based procedures. Specification as a substitute than signature-based detection to care for unknown attacker patterns. Specification as an alternative than anomaly established tactics to preclude making use of resurce-confined sensors oractuators in an MCPS for profiling anomaly patterns (e.g., through studying) and to preclude highfalse positives. Specification rather than trust-based methods to preclude lengthen due to trust aggregation and propagation to quickly react to malicious behaviors in safeguard relevant MCPSs. To accommodate useful resourceconfined sensors. Actuators in an MCPS, we advise behavior-rule specification based intrusion detection (BSID) which uses the thought of habits ideas for specifying appropriate behaviors of medical instruments in an MCPS. Rule-based intrusion detection for this reason far has been utilized nearby within the context of communication networks which have no trouble of physical environments and the closed-loop control structure as in an MCPS. Fig 1. Block diagram of proposed system MODULES DESCRIPTION: As mentioned earlier implementation is the stage of the task where the theoretical design is turned out to be in working system. Thus it can be regarded to be probably the most vital stage in establishing the successful new method. It presents the boldness to the user that the brand new method will work more effortlessly. So therefore the implementation stage includes careful planning, investigation of the present system and it s constraints on implementation, designing of methods to gain skill over and evaluation of exchange over ways. MODULE: The system implementation consists of the login page and the main modules of the system are given below: 1. MCPS Creation 2. MCPS View 3. Behaviour Rule Generation Available online: P a g e 562
3 4. Monitor 5. Data Reading 6. Actuator 7. Intrusion Detection MCPS Creation: The MCPS creation module allows the user to create the number of Medical Cyber Physical System. It also consists of the following buttons: CD PCA VSM The CD button displays the three mode of operation in the Cardiac Device. They are the passive, pacemaker and defibrillator mode. The PCA displays its control type as Analgesic request. The VSM button displays the type of the sensor that it provides. They are temperature sensor, blood pressure sensor, pulse rate sensor, respiration rate sensor and oxygen saturation sensor. warning and unsafe. The intruder in each unit can be displayed separately. The status is safe in case of no intruder. If there is slight variation in the reading of the trustee and the monitor then the status is displayed as warning. The unsafe status specifies the presence of the intruder in the trustee MCPS. IV. RESULTS Fig 2. Login Page MCPS View: The MCPS view displays the number of MCPS that has been created by the user. It also displays the name of the sensor and the actuators provided in each units. Behaviour Rule Generation: The Behaviour Rule Generation module provides the default rules that are created during the generation of the MCPS. It displays the rule combinations that are to be checked during the process Fig 3. Main Page Monitor: The monitor module provide the facility for the user select the trustee MCPS and the monitor MCPS. The monitor MCPS check the reading of the trustee MCPS reading whether the reading and the control provided by the trustee MCPS is reliable or not. Data Reading: The data reading module provide the facility for the user to choose the corresponding MCPS ID. Then it displays the reading of all the sensor in that sensor unit. Fig 4. MCPS Creation Actuator: The actuator module also allows the user to select the trustee MCPS. It then displays the control of the actuators. Intrusion Detection: The intrusion detection module consists of three buttons. They are the CD, PCA and VSM. When these buttons are selected it displays the details of the trustee and the monitor MCPS. The intrusion status is displayed. Three type of intrusion status is displayed they are safe, Fig 5. MCPS View Available online: P a g e 563
4 Fig 6.Behaviour Rules Fig 10.Intrusion Detection(DC) Fig 7.Monitoring Fig 11.Intrusion Detection(PCA) Fig 8. Data Reading Fig 12.Intrusion Detection(VSM) V. CONCLUSION Fig 9. Actuator In this paper we have proposed a behavior-rule specification-based IDS manner for intrusion detection of medical instruments embedded in a MCPS. We exemplified the utility with VSMs and tested that the detection chance of the medical devices\ methods one (that is, we will normally trap the attacker with out false negatives) even as bounding the false alarm chance to below 5% for reckless attackers and under 25% for random and opportunistic attackers over a extensive variety of environment noise phases. This process provisions 3 stages denoting three phases in the procedure Available online: P a g e 564
5 they're the safe, warning and the unsafe state. The warning state suggests that there are chances for an intruder and the detrimental state says that there is an outsider. Consequently the presence of the intruder will also be detected with no trouble utilizing the proposed behavior-rule specificationcentered IDS technique. REFERENCES 1] K. Park, Y. Lin, V. Metsis, Z. Le, and F. Makedon. Abnormal human behavioral pattern detection in assisted living environments. In 3rd ACM International Conference on Pervasive Technologies Related to Assistive Environments, pages 9:19:8, [2] E. Tapia, S. Intille, and K. Larson. Activity recognition in the home using simple and ubiquitous sensors. In A. Ferscha and F. Mattern, editors, Pervasive Computing, volume 3001 of Lecture Notes in Computer Science, pages Springer Berlin / Heidelberg, [3] C.-H. Tsang and S. Kwong. Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In IEEE International Conference on Industrial Technology, 2005., pages 5156, December [4] A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. Fovino, and A. Trombetta. A multidimensional critical state analysis for detecting intrusions in scada systems. IEEE Transactions on Industrial Informatics, 7(2): , May [5] H. Al-Hamadi and I. R. Chen. Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks. IEEE Transactions on Network and Service Management, 10(2):189203, [6] I. Lee and O. Sokolsky. Medical cyber physical systems. In 47 th ACM Design Automation Conference, pages , intrusion detection for SCADA networks. In SCADA Security Scientific Symposium, pages , Miami, FL, USA, January [9] K. Park, Y. Lin, V. Metsis, Z. Le, and F. Makedon. Abnormal human behavioral pattern detection in assisted living environments. In 3rd ACM International Conference on Pervasive Technologies Related to Assistive Environments, pages 9:1 9:8, [10] P. Porras and P. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In 20th National Information Systems Security Conference, pages , [11] C.-H. Tsang and S. Kwong. Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In IEEE International Conference onindustrial Technology, 2005., pages 51 56, December Author s Profile: Gondrala Sree Anjani pursuing M.tech in Software Enginnering from Vaagdevi College of Engineering, Bollikunta, Telangana. Varun Revuri working as Assistant Professor, Department of Computer Science of Engineering, Vaagdevi College of Engineering, Bollikunta, Telangana. [7] R. Mitchell and I. R. Chen. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems. IEEE Transactions on Reliability, 62(1):199210, March [8] S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A. Valdes. Using model-based Available online: P a g e 565
Intrusion Detection System: Facts, Challenges and Futures. By Gina Tjhai 13 th March 2007 Network Research Group
Intrusion Detection System: Facts, Challenges and Futures By Gina Tjhai 13 th March 2007 Network Research Group 1 Overview Introduction Challenges of current IDS Potential solutions Alarm Correlation Existing
More informationDetection of Temporal Dependencies in Alarm Time Series of Industrial Plants
Preprints of the 19th World Congress The International Federation of Automatic Control Detection of Temporal Dependencies in Alarm Time Series of Industrial Plants Jens Folmer, Falk Schuricht and Birgit
More informationMinimal Electric Charge Detection Device for Perimeter Security Systems
Journal of Electrical Engineering 5 (2017) 329-334 doi: 10.17265/2328-2223/2017.06.005 D DAVID PUBLISHG Minimal Electric Charge Detection Device for Perimeter Security Systems Odgerel Ayurzana 1 and Hiesik
More informationGMS GRAPHICAL MANAGEMENT SYSTEM
GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS Security management system for multi-site organizations. PACOM Graphical Management System (GMS) is the modular client-server application that integrates all of PACOM
More informationTemperature Control of Heat Exchanger Using Fuzzy Logic Controller
Vo1ume 1, No. 04, December 2014 999 Temperature Control of Heat Exchanger Using Fuzzy Logic Controller Aravind R. Varma and Dr.V.O. Rejini Abstract--- Fuzzy logic controllers are useful in chemical processes
More informationREDUCING FALSE ALARM USING HYBRID INTRUSION DETECTION BASED ON X-MEANS CLUSTERING AND RANDOM FOREST CLASSIFICATION
REDUCING FALSE ALARM USING HYBRID INTRUSION DETECTION BASED ON X-MEANS CLUSTERING AND RANDOM FOREST CLASSIFICATION 1 SUNDUS JUMA, 1 ZAITON MUDA, 2 WARUSIA YASSIN 1 Faculty of Computer Science and Information
More informationOptimized Residential Loads Scheduling Based On Dynamic Pricing Of Electricity : A Simulation Study
Optimized Residential Loads Scheduling Based On Dynamic Pricing Of Electricity : A Simulation Study Chris Ogwumike, Ahmad Modibbo and Mouloud Denai School of Science and Engineering, Teesside University,
More informationEnhance Alarm Management
White Paper Enhance Alarm Management Executive Summary A properly design alarm management system will minimize production losses, safety incidents and environmental excursions. To do this effectively,
More informationBattery Performance Alert
Battery Performance Alert A TOOL FOR IMPROVED PATIENT MANAGEMENT FOR S UNDER BATTERY ADVISORY VERSION 2.0 Abstract BACKGROUND: In October 2016, St. Jude Medical (now Abbott) issued an advisory on a family
More informationBattery Performance Alert: A TOOL FOR IMPROVED PATIENT MANAGEMENT FOR DEVICES UNDER BATTERY ADVISORY
Battery Performance Alert: A TOOL FOR IMPROVED PATIENT MANAGEMENT FOR S UNDER BATTERY ADVISORY VERSION 1.0 AUGUST 8, 2017 Abstract: BACKGROUND: In October 2016, St. Jude Medical issued an advisory on a
More informationAnalysis of freeze protection methods for recuperators used in energy recovery from exhaust air
Analysis of freeze protection methods for recuperators used in energy recovery from exhaust air Anna Pacak 1,*, Andrzej Jedlikowski 1, Demis Pandelidis 1, and Sergey Anisimov 1 1 Wrocław University of
More informationSystem development and performance evaluation of track intrusion in Taipei MRT system
icccbe 2010 Nottingham University Press Proceedings of the International Conference on Computing in Civil and Building Engineering W Tizani (Editor) System development and performance evaluation of track
More informationReduced Order WECC Modeling for Frequency Response and Energy Storage Integration
Reduced Order WECC Modeling for Frequency Response and Energy Storage Integration Pranathi Bhattacharji, Student Member, IEEE, Ted K. A. Brekken, Senior Member, IEEE School of Electrical Engineering and
More informationEfficiency of Non-Azeotropic Refrigerant Cycle
Purdue University Purdue e-pubs International Refrigeration and Air Conditioning Conference School of Mechanical Engineering 1998 Efficiency of Non-Azeotropic Refrigerant Cycle X. Liu Carrier Corporation
More informationChapter 1 Introduction
Chapter 1 Introduction This chapter presents an introductory background to the research work undertaken, the problem statement, research issues involved and objectives of the research work. The contribution
More informationSC-IDT: SOFT COMPUTING BASED INTRUSION DETECTION TECHNOLOGY IN SMART HOME SECURITY SYSTEM
SC-IDT: SOFT COMPUTING BASED INTRUSION DETECTION TECHNOLOGY IN SMART HOME SECURITY SYSTEM Ravi Sharma 1, Dr. Balkishan 2 1 M.Tech Student, D.C.S.A., Maharshi Dayanand University, Rohtak, Haryana, India
More informationApplications of Smart Home system for disabled people for using wireless network
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676, p-issn: 2320-3331, Volume 13, Issue 4, Ver. XX (Jul. Aug. 2018), PP XX-XX Applications of Smart Home system for disabled
More informationOVERVIEW AND FUTURE DEVELOPMENT OF THE NEUTRON SENSOR SIGNAL SELF-VALIDATION (NSV) PROJECT
OVERVIEW AND FUTURE DEVELOPMENT OF THE NEUTRON SENSOR SIGNAL SELF-VALIDATION (NSV) PROJECT Jean-Christophe Trama, Alain Bourgerette, Eric Barat, Bernard Lescop LETI (CEA - Advanced Technologies) CEA/Saclay
More informationFunctional Safety: the Next Edition of IEC 61511
HazAus2015/1507 Functional Safety: the Next Edition of IEC 61511 Mirek Generowicz Engineering Manager I&E Systems Pty Ltd Level 2, 445 Hay Street Perth WA 6000 Abstract The functional safety standard IEC
More informationAn improved Algorithm of Generating Network Intrusion Detector Li Ma 1, a, Yan Chen 1, b
An improved Algorithm of Generating Network Intrusion Detector Li Ma 1, a, Yan Chen 1, b 1 Department of Information Engineering Guilin University of Aerospace Technology, Guilin China a E-mail: woshiml@sina.com,
More informationImplementation of Auto Car Washing System Using Two Robotic Arms
Implementation of Auto Car Washing System Using Two Robotic Arms Pranoti Utekar 1, Sayali Naik 2, Monika Wadekar 3, S.G. Watve 4 U.G. Students, Department of Electronics and Telecommunication Engineering,
More informationHome appliances simulator for smart home systems testing
Home appliances simulator for smart home systems testing PETER JANIGA, MARTIN LIŠKA, ANTON BELÁŇ, VLADIMÍR VOLČKO, MARIAN IVANIČ Department of Electrical Power Engineering Slovak University of Technology
More informationGSM Based Computer Lab Security System Using PIR Sensors
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationReducing the Carbon Footprint of Existing Domestic Heating: A Non-Disruptive Approach
EEDAL 2009 16-18 June 2009 Reducing the Footprint of Existing Domestic Heating: A Non-Disruptive Approach Martin O Hara Danfoss Randall Limited Abstract There is insufficient time between today and 2020
More informationIntelligent Fire Detection and Visual Guided Evacuation System Using Arduino and GSM
Intelligent Fire Detection and Visual Guided Evacuation System Using Arduino and GSM Naresh Kumar 1,Poonam Kumari 2 1 M.Tech(Instrumentation), UCIM, Panjab University, Chandigarh, India 2 Assistant Professor,
More informationSession Four Functional safety: the next edition of IEC Mirek Generowicz Engineering Manager, I&E Systems Pty Ltd
Abstract Session Four Functional safety: the next edition of IEC 61511 Mirek Generowicz Engineering Manager, I&E Systems Pty Ltd The functional safety standard IEC 61511 provides a framework for managing
More informationResearch on the Monitor and Control System of Granary Temperature and Humidity Based on ARM
Research on the Monitor and Control System of Granary Temperature and Humidity Based on ARM Liu Yang 1, Xinrong Cheng 2, Zhijie Jiang 3, and Zhijun Ren 1 1 Engineering College, China Agricultural University,
More informationImportant Considerations When Selecting a Fan for Forced Air Cooling. By: Jeff Smoot, CUI Inc
Important Considerations When Selecting a Fan for Forced Air Cooling By: Jeff Smoot, CUI Inc Designing an appropriate thermal management solution requires a systemic approach; each component on a circuit
More informationFuzzy Logic Based Coolant Leak Detection
Volume 118 No. 5 2018, 825-832 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Fuzzy Logic Based Coolant Leak Detection 1 J.Suganthi, M.E., 2 G. Nithya,
More informationAbout Esri NeA. Esri NeA Training Profile 2012
About Esri NeA Stemming from Esri s commitment to meet the needs and demands of the GIS community in the Middle East and North Africa, Esri established Esri Northeast Africa (Esri NeA). Esri NeA is a free
More information6367(Print), ISSN (Online) Volume (IJCET) 3, Issue 2, July- September (2012), IAEME
INTERNATIONAL International Journal JOURNAL of Computer OF Engineering COMPUTER and Technology ENGINEERING (IJCET), & ISSN TECHNOLOGY 0976 6367(Print), ISSN 0976 6375(Online) Volume (IJCET) 3, Issue 2,
More informationDesign and Development of Industrial Pollution Monitoring System using LabVIEW and GSM
Design and Development of Industrial Pollution Monitoring System using LabVIEW and GSM Dr. Channappa Bhyri¹, Eliyaz Ahmed² 2 Student, Dept. of Electronics and Instrumentation, PDACE, Kalaburgi, Karnataka,
More informationURBAN PROJECT CARNIDE AV. LUSÍADA BENFICA
URBAN PROJECT CARNIDE AV. LUSÍADA BENFICA Infrastructure, Public Space, Urban Continuity José Rafael Garcia dos Santos Rosa Capelão Extended Abstract ARQUITECTURE October 2012 01 INTRODUCTION 01.01 Aims
More informationContents of ANSI/AAMI HE75:2009 Page
Contents of ANSI/AAMI HE75:2009 Page Glossary of equivalent standards...xiii Committee representation...xv Acknowledgments...xvi Foreword...xvii Introduction...1 1 Scope...5 1.1 General...5 1.2 Inclusions...5
More informationImpact of Fire-Sprinkler Trade-offs on Occupant and Building Safety. An AMCA International White Paper r.classen/shutterstock.
June 2018 Impact of Fire-Sprinkler Trade-offs on Occupant and Building Safety An AMCA International White Paper r.classen/shutterstock Air Movement and Control Association (AMCA) International Inc. 30
More informationINTREPID Perimeter Intrusion Detection System
TM INTREPID Perimeter Intrusion Detection System Next Generation Perimeter Protection icropoint Cable combines patented Southwest Microwave technology with microprocessor power and laptop computer convenience.
More informationRLDS - Remote LEAK DETECTION SYSTEM
RLDS - Remote LEAK DETECTION SYSTEM Asel-Tech has spent considerable time and resources over the past 8 years to improve our technology, to the point where it is unparalleled in reliability and performance
More informationCertification Report of the ST 3000 Pressure Transmitter with HART 6
Certification Report of the ST 3000 Pressure Transmitter with HART 6 Revision No.: 2.4 Date: Report Number: 2010-Mar-18 SAS-190/2006T Product: ST 3000 Pressure Transmitter with HART 6 Customer: Order Number:
More informationApplication of Fuzzy Control in Central Air-conditioning Terminal Units Energy-saving
www.ijcsi.org 123 Application of Fuzzy Control in Central Air-conditioning Terminal Units Energy-saving Yanqiu Zhao 1, Yingli Lv 1, Yong Gu 1, Shucheng Liu 2 1 Department of Electrical Engineer, Hebei
More informationAVOID CATASTROPHIC SITUATIONS: EXPERT FIRE AND GAS CONSULTANCY OPTIMIZES SAFETY
AVOID CATASTROPHIC SITUATIONS: EXPERT FIRE AND GAS CONSULTANCY OPTIMIZES SAFETY World-class services help reduce incidents, protect the environment, and keep people and plants safe White Paper PAGE 1 Introduction
More informationResearch Article Footstep and Vehicle Detection Using Seismic Sensors in Wireless Sensor Network: Field Tests
Distributed Sensor Networks Volume 213, Article ID 12386, 8 pages http://dx.doi.org/1.1155/213/12386 Research Article Footstep and Vehicle Detection Using Seismic Sensors in Wireless Sensor Network: Field
More informationMODELLING AND OPTIMIZATION OF DIRECT EXPANSION AIR CONDITIONING SYSTEM FOR COMMERCIAL BUILDING ENERGY SAVING
MODELLING AND OPTIMIZATION OF DIRECT EXPANSION AIR CONDITIONING SYSTEM FOR COMMERCIAL BUILDING ENERGY SAVING V. Vakiloroaya*, J.G. Zhu, and Q.P. Ha School of Electrical, Mechanical and Mechatronic Systems,
More informationDEVELOPMENT OF THE TANGO ALARM SYSTEM
10th ICALEPCS Int. Conf. on Accelerator & Large Expt. Physics Control Systems. Geneva, 10-14 Oct 2005, WE3B.1-70 (2005) DEVELOPMENT OF THE TANGO ALARM SYSTEM L. Pivetta Sincrotrone Trieste, Trieste, Italy
More informationAndroid Controlled Fire Fighting Robot
IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 09 March 2017 ISSN (online): 2349-784X Android Controlled Fire Fighting Robot S. Sakthi Priyanka R. Sangeetha Department
More informationAVOID CATASTROPHIC SITUATIONS: EXPERT FIRE AND GAS CONSULTANCY OPTIMIZES SAFETY
AVOID CATASTROPHIC SITUATIONS: EXPERT FIRE AND GAS CONSULTANCY OPTIMIZES SAFETY World-class services help reduce incidents, protect the environment, and keep people and plants safe White Paper PAGE 1 Introduction
More informationEVALUATING LOOP HEAT PIPE PERFORMANCE IMPROVEMENT USING CIRCUMFERENTIAL GROOVES. Nadjara dos Santos, Roger R. Riehl
Abstract EVALUATING LOOP HEAT PIPE PERFORMANCE IMPROVEMENT USING CIRCUMFERENTIAL GROOVES Nadjara dos Santos, Roger R. Riehl National Institute for Space Research INPE - Space Mechanics and Control Division-DMC
More informationThe Mode of Urban Renewal Base on the Smart City Theory under the Background of New Urbanization
Frontiers of Engineering Management DOI 10.15302/J-FEM-2015035 ENGINEERING MANAGEMENT THEORIES AND METHODOLOGIES Yi-hua Mao, Hong-yu Li, Qin-rui Xu The Mode of Urban Renewal Base on the Smart City Theory
More informationWest Yorkshire Fire & Rescue Authority. Fire Protection Policy
West Yorkshire Fire & Rescue Authority Fire Protection Policy Risk Based Inspection Program 2017-2020 West Yorkshire Fire & Rescue Service Oakroyd Hall Birkenshaw Bradford BD11 2DY Date Issued: 28/03/2018
More informationALCATEL-LUCENT OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS AND PERSONAL SAFETY
ALCATEL-LUCENT OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS AND PERSONAL SAFETY In healthcare, education, high-risk industries and the hospitality sector, you must know immediately
More informationVideo Smoke Detection using Deep Domain Adaptation Enhanced with Synthetic Smoke Images
Video Smoke Detection using Deep Domain Adaptation Enhanced with Synthetic Smoke Images Gao Xu, Qixing Zhang, Gaohua Lin, Jinjun Wang, Yongming Zhang State Key Laboratory of Fire Science, University of
More informationResearch on Evaluation of Fire Detection Algorithms
Research on Evaluation of Fire Detection Algorithms JIAN LI 1,2, WENHUI DONG 1, ZHIBIN MEI 1, and ZHUOFU WANG 1 1 Shenyang Fire Research Institute Ministry of Public Security China, 110031 2 Dalian University
More informationfor family composition, time allocation of people, ownership and specification of home appliances. This paper first presents the simulation procedure
Validation of an Energy Demand Model of Residential Buildings Yohei Yamaguchi 1*, Yoshiyuki Shimoda 1 1 Graduate School of Engineering Osaka University, S4 Building, 2-1 Yamadaoka, Suita, Osaka, 565-871,
More informationAdvanced Pattern Recognition for Anomaly Detection Chance Kleineke/Michael Santucci Engineering Consultants Group Inc.
Advanced Software Technologies Advanced Pattern Recognition for Anomaly Detection Chance Kleineke/Michael Santucci Engineering Consultants Group Inc. August 16, 2017 Tampa Convention Center Tampa, Florida
More informationLOCAL FIRE AND RESCUE PLAN FOR NORTH LANARKSHIRE
Working together for a safer Scotland LOCAL FIRE AND RESCUE PLAN FOR NORTH LANARKSHIRE 2017 DRAFT FOR CONSULTATION Contents Introduction... 1 Partnership Working... 3 Reduction of Accidental Dwelling Fires...
More informationSurvey on Cooling Costs and Related Factors for Apartments in an Urban. Area of Osaka
Survey on Cooling Costs and Related Factors for Apartments in an Urban Area of Osaka Noriko Umemiya Xiaoyong Lin Ginjirou Inoue Associate Professor Graduate student Graduate student Osaka City University
More informationCrime Central Station Burglary Alarm Systems
Page 1 of 10 Scope This criteria is intended to provide Loss Control Representatives with specific guidelines and information for evaluating central station burglar alarm systems for risks carrying crime
More informationAlarm Management Plan
John E. Bogdan, Susan F. Booth, & David P. Garcia Abstract Why prepare an Alarm Management Plan just to meet PHMSA requirements (49 CFR Parts 192.631 and 195.446) when, for essentially the same effort,
More informationOptions for Developing a Compliant PLC-based BMS
Options for Developing a Compliant PLC-based BMS Jack Boone aesolutions Greenville, South Carolina, United States of America ABSTRACT Facilities are focusing on improving the reliability of their burner
More informationCoupling Multiple Hypothesis Testing with Proportion Estimation in Heterogeneous Categorical Sensor Networks
Advancing the Science of Information Coupling Multiple Hypothesis Testing with Proportion Estimation in Heterogeneous Categorical Sensor Networks DTRA SBIR Phase II Contract: W911SR-10-C-0038 Chris Calderon,
More informationUV measurements for medical applications using SiC photodiodes
UV measurements for medical applications using SiC photodiodes Abstract Dr. Niklas Papathanasiou, Gabriel Hopfenmüller, and Dr. Tilman Weiss sglux GmbH, Berlin, 12489, Germany E-mail: papathanasiou@sglux.de
More informationCertification Report of the ST3000 Pressure Transmitter
Certification Report of the ST3000 Pressure Transmitter Revision No.: 1.0 Date: Report Number: Product: Customer: Order Number: Authority: Responsible: 2006-Dec-12 SAS-128/2006T ST3000 Pressure Transmitter
More informationPerformance Neuro-Fuzzy for Power System Fault Location
International Journal of Engineering and Technology Volume 3 No. 4, April, 2013 Performance Neuro-Fuzzy for Power System Fault Location 1,2 Azriyenni, 1 M.W. Mustafa 1 Electrical Engineering, Fakulti Kejuruteraan
More informationBRIDGING THE SAFE AUTOMATION GAP PART 1
BRIDGING THE SAFE AUTOMATION GAP PART 1 Angela E. Summers, Ph.D., P.E, President, SIS-TECH Solutions, LP Bridging the Safe Automation Gap Part 1, Mary Kay O Conner Process Safety Center, Texas A&M University,
More informationPerformance Evaluation of Event Detection Solutions: the CREDS experience
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Performance Evaluation of Event Detection Solutions: the CREDS experience F Ziliani, S. Velastin, F. Porikli, L. Marcenaro, T. Kelliher, A.
More informationS INTRUSION&FIRE ALARM AND ACCESS CONTROL PANEL
S2000-4 INTRUSION&FIRE ALARM AND ACCESS CONTROL PANEL Installer s and User s manual S2000-4 INTRUSION&FIRE AND ACCEESS CONTROL PANEL ATTENTION! To modify configuration parameters use the program uprog.exe
More informationAlarm Fatigue in the ICU. Lynn Maguire MS, RN, PMC, NE-BC
Alarm Fatigue in the ICU Lynn Maguire MS, RN, PMC, NE-BC Objectives At the completion of this lecture the participant will: Define Alarm Fatigue Discuss the Joint Commission s Patient Safety Goal regarding
More informationDangerous Assumptions
Dangerous Assumptions In light of the lessons learned from the Lakanal House fire, the on-going competent inspection of passive fire protection is crucial to safeguarding those who put their trust in social
More informationHigh Integrity Pressure Protection System
High Integrity Pressure Protection System 412748_CCI_HIPPS.indd 1 A CCI HIPPS offering is unique in its: Innovative custom engineered system approach Variety of actuator and valve solutions for an optimized
More informationMedical devices and electromagnetic compatibility. Addressing the requirements of IEC , 4 th Edition
Medical devices and electromagnetic compatibility Addressing the requirements of IEC 60601-1-2, 4 th Edition Executive Summary Risk of electromagnetic interference and immunity have long been important
More informationWireless Sensor Network Based Bank Monitoring System Using LabVIEW
Proceedings of the 2015 International Conference on Industrial Engineering and Operations Management Dubai, United Arab Emirates (UAE), March 3 5, 2015 Wireless Sensor Network Based Bank Monitoring System
More informationLaird Engineered Thermal Systems Application Note. Liquid to Liquid Ambient Cooling Systems for Semiconductor Tools
Laird Engineered Thermal Systems Application Note Liquid to Liquid Ambient Cooling Systems for Semiconductor Tools March 2017 Table of Contents Introduction...3 Cooling Systems...3 Technical Requirements...4
More informationSecuring and Protecting Process Plants in the Digital Age Functional safety requires IT security
Securing and Protecting Process Plants in the Digital Age Functional safety requires IT security In 2014, a German steel mill fell victim to a targeted cyberattack. Hackers used spear phishing and social
More informationLogbook. Precept EN Fire Detection/Alarm Panel. & Precept EN Repeater
APPROVED BY: JBJ Precept EN Fire Detection/Alarm Panel & Precept EN Repeater Logbook PAGE 1 of 19 List of Contents 1. FIRE ALARM SYSTEM MAINTENANCE... 3 2. USER RESPONSIBILITIES... 3 2.1. RESPONSIBLE PERSON...
More informationThe evolution of level switches and detectors
Introduction Improving maintenance practices is vital in process industries, bringing significant gains in terms of safety, production up-time and reduction in unscheduled downtime. Increasing efficiency
More informationUNIVERSAL REMOTE CONTROL SYSTEM FOR KITCHEN AUTOMATION USING IoT
. UNIVERSAL REMOTE CONTROL SYSTEM FOR KITCHEN AUTOMATION USING IoT Amita Thakare 1 Pooja R. Gandhe 2 1 Professor, Dept. of ECE, Priyadarshini Bhagwati College of Engineering. Nagpur, Maharashtra, India
More informationResearch on Decision Tree Application in Data of Fire Alarm Receipt and Disposal
Research Journal of Applied Sciences, Engineering and Technology 5(22): 5217-5222, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: October 09, 2012 Accepted: December
More informationFalse Alarm Suppression in Early Prediction of Cardiac Arrhythmia
IEEE International Conference on Bioinformatics & Bioengineering 2015 False Alarm Suppression in Early Prediction of Cardiac Arrhythmia Shoumik Roychoudhury, Mohamed F. Ghalwash, Zoran Obradovic Presented
More informationIntegrating Control and Safety: Where to draw the line.
Integrating Control and Safety: Where to draw the line. Robin McCrea-Steele, TÜV FSExpert Invensys-Premier Consulting Services New digital technology now makes it feasible to integrate process control
More informationIEC Functional Safety Assessment
IEC 61508 Functional Safety Assessment Project: Detcon IR-700 Combustible Hydrocarbon Gas Sensor Customer: Detcon The Woodlands, TX USA Contract No.: Q13/06-003 Report No.: DC 13-06-003 R002 Version V1,
More informationFailure Modes, Effects and Diagnostic Analysis
Failure Modes, Effects and Diagnostic Analysis Project: Detcon FP-700 Combustible Gas Sensor Customer: Detcon The Woodlands, TX USA Contract No.: DC 06/08-04 Report No.: DC 06/08-04 R001 Version V1, Revision
More informationIntrusion Detection: Eliminating False Alarms
Intrusion Detection: Eliminating False Alarms MAFTIA Final Review Andreas Wespi 18/19 February 2003 Newcastle Overview! MAFTIA and Intrusion Detection! Eliminating False Alarms! Demonstrator of an Intrusion-Tolerant
More informationADIPEC 2013 Technical Conference Manuscript
ADIPEC 2013 Technical Conference Manuscript Name: Heidi Fuglum Company: ABB AS Job title: Deployment Manager Address: Ole Deviksvei, Oslo, Norway Phone number: +47 91 36 98 70 Email: Heidi.Fuglum@no.abb.com
More informationINTRODUCTIONOVERVIEW How Hochiki can help you with your BIM project
World Class Leaders in Fire Detection Since 1918 BIM INTRODUCTIONOVERVIEW How Hochiki can help you with your BIM project WHAT IS BIM? Building Information Modelling (BIM) is a process for managing the
More informationFIRE AND RESCUE. Intent
FIRE AND RESCUE Intent The Fire and Rescue Plan is designed to maintain Prince William County as a safe community, reducing loss of life, injury, and property from fire and/or accident. The mission of
More informationMRI Advanced Cooling System
MRI Advanced Cooling System Imaging Solutions has partnered with PREH to bring you the absolute best in MRI room cooling. PREH has been an expert in healthcare cooling for over 10 years. They have experience
More informationIMPORTANCE of FIREGROUND VENTILATION PRACTICES and DYNAMICS IN FIREFIGHTING (PART I)
IMPORTANCE of FIREGROUND VENTILATION PRACTICES and DYNAMICS IN FIREFIGHTING (PART I) By Lt. Mike Mason As we have stated previously there are two prominent areas that drive every fire ground and that is
More informationIntrusion sensors. We listened to you
Intrusion sensors We listened to you Advanced technology, makes it a simple choice Whether you choose Passive Infrared (PIR), Dual or Vector technology, our motion sensors have a number of intrinsic advantages:
More informationBURGLAR ALARM USING ARDUINO AND PIR SENSOR WITH SMS ALERT Burgoji Santhosh Kumar 1, S.Ramesh 2 1
BURGLAR ALARM USING ARDUINO AND PIR SENSOR WITH SMS ALERT Burgoji Santhosh Kumar 1, S.Ramesh 2 1 Assistant Professor, Dept of ECE, Anurag Group of Institutions, Telangana, India. 2 Assistant Professor,
More informationEE04 804(B) Soft Computing Ver. 1.2 Class 1. Introduction February 21st,2012. Sasidharan Sreedharan
EE04 804(B) Soft Computing Ver. 1.2 Class 1. Introduction February 21st,2012 Sasidharan Sreedharan www.sasidharan.webs.com 1 Syllabus Artificial Intelligence Systems- Neural Networks, fuzzy logic, genetic
More informationAUTOMATIC STREET LIGHT CONTROL SYSTEM USING MICROCONTROLLER
AUTOMATIC STREET LIGHT CONTROL SYSTEM USING MICROCONTROLLER S.M.Ghayas Hasan 1, Fazil Alam 2, Amrish Dubey 3 1, 2 Students, Electrical Engineering Department Greater Noida Institutes of Technology, Gr.Noida,
More informationSafety Instrumented Systems
Safety Instrumented Systems What is a Safety Instrumented System? A Safety Instrumented System SIS is a new term used in standards like IEC 61511 or IEC 61508 for what used to be called Emergency Shutdown
More informationProfessional Security Officer Program(PSOP)
Professional Security Officer Program(PSOP) Unit descriptions and lesson learning objectives. The Professional Security Officer Program course consists of 11 units, with each unit having between two and
More informationImproved occupancy detection accuracy using PIR and door sensors for a smart thermostat
Improved occupancy detection accuracy using and door sensors for a smart thermostat Sun Ho Kim 1, Hyeun Jun Moon 1, Young Ran Yoon 1 1 Department of Architectural Engineering, Dankook University, Yongin,
More informationLPG GAS LEAKAGE DETECTION, MONITORING AND CONTROL USING LabVIEW
LPG GAS LEAKAGE DETECTION, MONITORING AND CONTROL USING LabVIEW M.J.Kesavan 1, R.Rajesh Kannan 2,S.Vijay vishwanath 3, P.Sathya 4. UG Students, Instrumentation & control engg, Asst. professor, Instrumentation
More information6 th Pipeline Technology Conference 2011
6 th Pipeline Technology Conference 2011 Pipeline Leak Detection and Theft Detection Using Rarefaction Waves Authors: Dr Alex Souza de Joode, VP International Operations; ATMOS International, UK. Andrew
More informationCOUNTY OF BERGEN DEPARTMENT OF PUBLIC SAFETY LAW AND PUBLIC SAFETY INSTITUTE POLICE, FIRE & EMS ACADEMIES 281 Campgaw Road Mahwah, N.J.
COUNTY OF BERGEN DEPARTMENT OF PUBLIC SAFETY LAW AND PUBLIC SAFETY INSTITUTE POLICE, FIRE & EMS ACADEMIES 281 Campgaw Road Mahwah, N.J. 07430 (201)785-6000 Police FAX (201)785-6036 Fire FAX (201)785-6036
More informationConstruction of An Automatic Power Switch using Infrared Motion Sensor
Journal of Informatics and Mathematical Sciences Vol. 9, No. 2, pp. 331 337, 2017 ISSN 0975-5748 (online); 0974-875X (print) Published by RGN Publications http://www.rgnpublications.com Proceedings of
More informationFin-Fan Control System
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 02, 2014 ISSN (online): 2321-0613 Fin-Fan Control System Pankaj Shah 1 Jignesh Vaghela 2 1, 2 Student 1, 2 Instrumentation
More informationRemote Monitoring of Offshore Structures using Acoustic Emission.
11th European Conference on Non-Destructive Testing (ECNDT 2014), October 6-10, 2014, Prague, Czech Republic Remote Monitoring of Offshore Structures using Acoustic Emission. More Info at Open Access Database
More informationAn Overview of Extinguishing Systems for Computer Equipment
Risk Solutions An Overview of Extinguishing Systems for Computer Equipment Various types of automatic suppression systems are available for protecting computer equipment. This report discusses the uses
More information