International Journal of Research Available at

Size: px
Start display at page:

Download "International Journal of Research Available at"

Transcription

1 Detection of Intrusion by Using Behaviour Rule Specification Based Technique for Providing Security to MCPS Varun Revuri Assistant Professor, Department of CSE Vaagdevi College of Engineering Abstract: Essentially the most prominent attribute of a medical cyber bodily process (MCPS) is its suggestions loop that acts on the physical atmosphere. In this paper, we are concerned with intrusion detection mechanisms for detecting compromised sensors or actuators embedded in an MCPS for supporting nontoxic and at ease MCPS applications upon which patients and healthcare personnel can depend with extreme self belief. Intrusion detection method (IDS) design for cyber physical systems (CPSs) has attracted enormous concentration when we consider that of the terrible consequence of CPS failure. Nonetheless, an IDS manner for MCPSs is still in its infancy with very little work stated. Intrusion detection methods in basic will also be categorized into 4 varieties: signature, anomaly, trust, and specificationcentered techniques. In this project, we don't forget specification instead than signature and anomaly based detection in order to deal with unknown attacker patterns to prevent making use of resource constrained sensors or actuators in an MCPS for profiling anomaly patterns (e.g., via learning) and to avoid high false positives. Index Terms Intrusion detection system, sensor actuator networks, medical cyber physical systems, healthcare, security, safety. I. INTRODUCTION Security researchers had proved that crucial medical devices connected to a patient is highly susceptible to cyber attacks. Cyber criminals may just aims these devices and could provoke an attack. Hospitals were unaware that those gadgets that they believe is being infiltrated by means of the cyber attackers and is currently working as part of an attack. Detecting an attacker in MCPS is extra problematic challenge. The device makes use of complex algorithms, intelligent patient curing procedures completed inside a blink of an eye fixed [1]. Actually those programs needs high execution cost without compromising precision, zero tolerance when it comes to tolerance. To see and Gondrala Sree Anjani M.Tech, Software Engineering Vaagdevi College of Engineering critical, every gap in every module via a protection reliable in the sort of device is a ordinary mission[2]. From this sort of perspective intrusion detection[3] in such programs are imperative to shield the integrity of MCPS given that of the unrivaled consequences of its failure. To embed an intrusion detection process in MCPS sensor/actuator networks brings further challenges[4]. These sensor/actuator networks are extremely useful resource constrained. Now adding an intrusion detection approach should bypass these challenges. With all these in mind a new methodology for intrusion detection is putforward which uses behavioral rule specificationbased Intrusion detection (BSID) which makes use of behavioral rules for outlining traditional behavioral patterns for a medical device. These behavioral patterns characterize appropriate behaviors of that distinct CPS[5]. Further, these behavioral rules are then transformed into a state laptop, so that any deviation from usual state to an detrimental state may also be quite simply monitored. The have an effect on of various attackers are also investigated to benchmark the effectiveness of MCPS Intrusion Detection method. This system has additionally been proved to show a larger real positives for a lowered false poor as good as false constructive cost. This may further help to identify more elaborate and invisible attackers[6]. A peer to see architecture provides one other uninterrupted operation of Intrusion Detection process. The most important change between constructing an IDSs for healthcare devices and other methods is that the attack occurs on the physical element rather than in the network or communication protocols. So IDS will have to be intently coupled with the physical equipment of the Cyber physical system [7]. II. RELATED WORKS Porras and Neumann [10] be taught a hierarchical multitrust behavior-based IDS called event Monitoring Enabling Responses to Anomalous are living Disturbances (EMERALD) [8] utilizing complementary signature based and anomaly- Available online: P a g e 561

2 founded analysis. The authors establish a signatureestablished analysis exchange between the state space created/runtime burden imposed with the aid of rich rule sets and the expanded false negatives that stem from a much less expressive rule set. Porras and Neumann highlight two special anomaly-situated tactics making use of statistical evaluation: one experiences user sessions (to notice live intruders), and the opposite experiences the runtime behavior of programs (to realize malicious code). Park et al. [9] advise a semi-supervised anomalybased IDS distinct for assisted dwelling environments. Their design is behavior-based and audits series of routine which they call episodes. The authors events are 3-tuples comprising sensor ID, time and duration. Park et al. Scan data units using four similarity capabilities situated on: LCS, depend of customary movements not in LCS, occasion begin times and event periods They control episode size and similarity perform as unbiased variables. The authors furnish best ROC information which we use for a comparative evaluation. Tsang and Kwong [11] endorse a multitrust IDS known as Multi-agent system (MAS) that includes an evaluation perform called Ant Colony Clustering model (ACCM). The authors intend for ACCM to scale down the typically high false positive rate of anomaly-based techniques whereas minimizing the training period through utilizing an unsupervised approach to machine studying. MAS is hierarchical and includes a big quantity of roles: reveal sellers acquire audit information, decision sellers perform analysis, action agents outcomes responses, coordination agents manage multitrust conversation, consumer interface agents engage with human operators and registration retailers manipulate agent appearance and disappearance. We will use Park et al. [9] and Tsang and Kwong [11] as base schemes towards which BSID might be when put next on the grounds that no others furnish significant p fp /p fn knowledge for a comparative evaluation. III. PROPOSED METHODS Intrusion detection methods specifically will also be categorized into 4 varieties: signature, anomaly, trust, and specification-based procedures. Specification as a substitute than signature-based detection to care for unknown attacker patterns. Specification as an alternative than anomaly established tactics to preclude making use of resurce-confined sensors oractuators in an MCPS for profiling anomaly patterns (e.g., through studying) and to preclude highfalse positives. Specification rather than trust-based methods to preclude lengthen due to trust aggregation and propagation to quickly react to malicious behaviors in safeguard relevant MCPSs. To accommodate useful resourceconfined sensors. Actuators in an MCPS, we advise behavior-rule specification based intrusion detection (BSID) which uses the thought of habits ideas for specifying appropriate behaviors of medical instruments in an MCPS. Rule-based intrusion detection for this reason far has been utilized nearby within the context of communication networks which have no trouble of physical environments and the closed-loop control structure as in an MCPS. Fig 1. Block diagram of proposed system MODULES DESCRIPTION: As mentioned earlier implementation is the stage of the task where the theoretical design is turned out to be in working system. Thus it can be regarded to be probably the most vital stage in establishing the successful new method. It presents the boldness to the user that the brand new method will work more effortlessly. So therefore the implementation stage includes careful planning, investigation of the present system and it s constraints on implementation, designing of methods to gain skill over and evaluation of exchange over ways. MODULE: The system implementation consists of the login page and the main modules of the system are given below: 1. MCPS Creation 2. MCPS View 3. Behaviour Rule Generation Available online: P a g e 562

3 4. Monitor 5. Data Reading 6. Actuator 7. Intrusion Detection MCPS Creation: The MCPS creation module allows the user to create the number of Medical Cyber Physical System. It also consists of the following buttons: CD PCA VSM The CD button displays the three mode of operation in the Cardiac Device. They are the passive, pacemaker and defibrillator mode. The PCA displays its control type as Analgesic request. The VSM button displays the type of the sensor that it provides. They are temperature sensor, blood pressure sensor, pulse rate sensor, respiration rate sensor and oxygen saturation sensor. warning and unsafe. The intruder in each unit can be displayed separately. The status is safe in case of no intruder. If there is slight variation in the reading of the trustee and the monitor then the status is displayed as warning. The unsafe status specifies the presence of the intruder in the trustee MCPS. IV. RESULTS Fig 2. Login Page MCPS View: The MCPS view displays the number of MCPS that has been created by the user. It also displays the name of the sensor and the actuators provided in each units. Behaviour Rule Generation: The Behaviour Rule Generation module provides the default rules that are created during the generation of the MCPS. It displays the rule combinations that are to be checked during the process Fig 3. Main Page Monitor: The monitor module provide the facility for the user select the trustee MCPS and the monitor MCPS. The monitor MCPS check the reading of the trustee MCPS reading whether the reading and the control provided by the trustee MCPS is reliable or not. Data Reading: The data reading module provide the facility for the user to choose the corresponding MCPS ID. Then it displays the reading of all the sensor in that sensor unit. Fig 4. MCPS Creation Actuator: The actuator module also allows the user to select the trustee MCPS. It then displays the control of the actuators. Intrusion Detection: The intrusion detection module consists of three buttons. They are the CD, PCA and VSM. When these buttons are selected it displays the details of the trustee and the monitor MCPS. The intrusion status is displayed. Three type of intrusion status is displayed they are safe, Fig 5. MCPS View Available online: P a g e 563

4 Fig 6.Behaviour Rules Fig 10.Intrusion Detection(DC) Fig 7.Monitoring Fig 11.Intrusion Detection(PCA) Fig 8. Data Reading Fig 12.Intrusion Detection(VSM) V. CONCLUSION Fig 9. Actuator In this paper we have proposed a behavior-rule specification-based IDS manner for intrusion detection of medical instruments embedded in a MCPS. We exemplified the utility with VSMs and tested that the detection chance of the medical devices\ methods one (that is, we will normally trap the attacker with out false negatives) even as bounding the false alarm chance to below 5% for reckless attackers and under 25% for random and opportunistic attackers over a extensive variety of environment noise phases. This process provisions 3 stages denoting three phases in the procedure Available online: P a g e 564

5 they're the safe, warning and the unsafe state. The warning state suggests that there are chances for an intruder and the detrimental state says that there is an outsider. Consequently the presence of the intruder will also be detected with no trouble utilizing the proposed behavior-rule specificationcentered IDS technique. REFERENCES 1] K. Park, Y. Lin, V. Metsis, Z. Le, and F. Makedon. Abnormal human behavioral pattern detection in assisted living environments. In 3rd ACM International Conference on Pervasive Technologies Related to Assistive Environments, pages 9:19:8, [2] E. Tapia, S. Intille, and K. Larson. Activity recognition in the home using simple and ubiquitous sensors. In A. Ferscha and F. Mattern, editors, Pervasive Computing, volume 3001 of Lecture Notes in Computer Science, pages Springer Berlin / Heidelberg, [3] C.-H. Tsang and S. Kwong. Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In IEEE International Conference on Industrial Technology, 2005., pages 5156, December [4] A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. Fovino, and A. Trombetta. A multidimensional critical state analysis for detecting intrusions in scada systems. IEEE Transactions on Industrial Informatics, 7(2): , May [5] H. Al-Hamadi and I. R. Chen. Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks. IEEE Transactions on Network and Service Management, 10(2):189203, [6] I. Lee and O. Sokolsky. Medical cyber physical systems. In 47 th ACM Design Automation Conference, pages , intrusion detection for SCADA networks. In SCADA Security Scientific Symposium, pages , Miami, FL, USA, January [9] K. Park, Y. Lin, V. Metsis, Z. Le, and F. Makedon. Abnormal human behavioral pattern detection in assisted living environments. In 3rd ACM International Conference on Pervasive Technologies Related to Assistive Environments, pages 9:1 9:8, [10] P. Porras and P. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In 20th National Information Systems Security Conference, pages , [11] C.-H. Tsang and S. Kwong. Multi-agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction. In IEEE International Conference onindustrial Technology, 2005., pages 51 56, December Author s Profile: Gondrala Sree Anjani pursuing M.tech in Software Enginnering from Vaagdevi College of Engineering, Bollikunta, Telangana. Varun Revuri working as Assistant Professor, Department of Computer Science of Engineering, Vaagdevi College of Engineering, Bollikunta, Telangana. [7] R. Mitchell and I. R. Chen. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems. IEEE Transactions on Reliability, 62(1):199210, March [8] S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A. Valdes. Using model-based Available online: P a g e 565

Intrusion Detection System: Facts, Challenges and Futures. By Gina Tjhai 13 th March 2007 Network Research Group

Intrusion Detection System: Facts, Challenges and Futures. By Gina Tjhai 13 th March 2007 Network Research Group Intrusion Detection System: Facts, Challenges and Futures By Gina Tjhai 13 th March 2007 Network Research Group 1 Overview Introduction Challenges of current IDS Potential solutions Alarm Correlation Existing

More information

Detection of Temporal Dependencies in Alarm Time Series of Industrial Plants

Detection of Temporal Dependencies in Alarm Time Series of Industrial Plants Preprints of the 19th World Congress The International Federation of Automatic Control Detection of Temporal Dependencies in Alarm Time Series of Industrial Plants Jens Folmer, Falk Schuricht and Birgit

More information

Minimal Electric Charge Detection Device for Perimeter Security Systems

Minimal Electric Charge Detection Device for Perimeter Security Systems Journal of Electrical Engineering 5 (2017) 329-334 doi: 10.17265/2328-2223/2017.06.005 D DAVID PUBLISHG Minimal Electric Charge Detection Device for Perimeter Security Systems Odgerel Ayurzana 1 and Hiesik

More information

GMS GRAPHICAL MANAGEMENT SYSTEM

GMS GRAPHICAL MANAGEMENT SYSTEM GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS Security management system for multi-site organizations. PACOM Graphical Management System (GMS) is the modular client-server application that integrates all of PACOM

More information

Temperature Control of Heat Exchanger Using Fuzzy Logic Controller

Temperature Control of Heat Exchanger Using Fuzzy Logic Controller Vo1ume 1, No. 04, December 2014 999 Temperature Control of Heat Exchanger Using Fuzzy Logic Controller Aravind R. Varma and Dr.V.O. Rejini Abstract--- Fuzzy logic controllers are useful in chemical processes

More information

REDUCING FALSE ALARM USING HYBRID INTRUSION DETECTION BASED ON X-MEANS CLUSTERING AND RANDOM FOREST CLASSIFICATION

REDUCING FALSE ALARM USING HYBRID INTRUSION DETECTION BASED ON X-MEANS CLUSTERING AND RANDOM FOREST CLASSIFICATION REDUCING FALSE ALARM USING HYBRID INTRUSION DETECTION BASED ON X-MEANS CLUSTERING AND RANDOM FOREST CLASSIFICATION 1 SUNDUS JUMA, 1 ZAITON MUDA, 2 WARUSIA YASSIN 1 Faculty of Computer Science and Information

More information

Optimized Residential Loads Scheduling Based On Dynamic Pricing Of Electricity : A Simulation Study

Optimized Residential Loads Scheduling Based On Dynamic Pricing Of Electricity : A Simulation Study Optimized Residential Loads Scheduling Based On Dynamic Pricing Of Electricity : A Simulation Study Chris Ogwumike, Ahmad Modibbo and Mouloud Denai School of Science and Engineering, Teesside University,

More information

Enhance Alarm Management

Enhance Alarm Management White Paper Enhance Alarm Management Executive Summary A properly design alarm management system will minimize production losses, safety incidents and environmental excursions. To do this effectively,

More information

Battery Performance Alert

Battery Performance Alert Battery Performance Alert A TOOL FOR IMPROVED PATIENT MANAGEMENT FOR S UNDER BATTERY ADVISORY VERSION 2.0 Abstract BACKGROUND: In October 2016, St. Jude Medical (now Abbott) issued an advisory on a family

More information

Battery Performance Alert: A TOOL FOR IMPROVED PATIENT MANAGEMENT FOR DEVICES UNDER BATTERY ADVISORY

Battery Performance Alert: A TOOL FOR IMPROVED PATIENT MANAGEMENT FOR DEVICES UNDER BATTERY ADVISORY Battery Performance Alert: A TOOL FOR IMPROVED PATIENT MANAGEMENT FOR S UNDER BATTERY ADVISORY VERSION 1.0 AUGUST 8, 2017 Abstract: BACKGROUND: In October 2016, St. Jude Medical issued an advisory on a

More information

Analysis of freeze protection methods for recuperators used in energy recovery from exhaust air

Analysis of freeze protection methods for recuperators used in energy recovery from exhaust air Analysis of freeze protection methods for recuperators used in energy recovery from exhaust air Anna Pacak 1,*, Andrzej Jedlikowski 1, Demis Pandelidis 1, and Sergey Anisimov 1 1 Wrocław University of

More information

System development and performance evaluation of track intrusion in Taipei MRT system

System development and performance evaluation of track intrusion in Taipei MRT system icccbe 2010 Nottingham University Press Proceedings of the International Conference on Computing in Civil and Building Engineering W Tizani (Editor) System development and performance evaluation of track

More information

Reduced Order WECC Modeling for Frequency Response and Energy Storage Integration

Reduced Order WECC Modeling for Frequency Response and Energy Storage Integration Reduced Order WECC Modeling for Frequency Response and Energy Storage Integration Pranathi Bhattacharji, Student Member, IEEE, Ted K. A. Brekken, Senior Member, IEEE School of Electrical Engineering and

More information

Efficiency of Non-Azeotropic Refrigerant Cycle

Efficiency of Non-Azeotropic Refrigerant Cycle Purdue University Purdue e-pubs International Refrigeration and Air Conditioning Conference School of Mechanical Engineering 1998 Efficiency of Non-Azeotropic Refrigerant Cycle X. Liu Carrier Corporation

More information

Chapter 1 Introduction

Chapter 1 Introduction Chapter 1 Introduction This chapter presents an introductory background to the research work undertaken, the problem statement, research issues involved and objectives of the research work. The contribution

More information

SC-IDT: SOFT COMPUTING BASED INTRUSION DETECTION TECHNOLOGY IN SMART HOME SECURITY SYSTEM

SC-IDT: SOFT COMPUTING BASED INTRUSION DETECTION TECHNOLOGY IN SMART HOME SECURITY SYSTEM SC-IDT: SOFT COMPUTING BASED INTRUSION DETECTION TECHNOLOGY IN SMART HOME SECURITY SYSTEM Ravi Sharma 1, Dr. Balkishan 2 1 M.Tech Student, D.C.S.A., Maharshi Dayanand University, Rohtak, Haryana, India

More information

Applications of Smart Home system for disabled people for using wireless network

Applications of Smart Home system for disabled people for using wireless network IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676, p-issn: 2320-3331, Volume 13, Issue 4, Ver. XX (Jul. Aug. 2018), PP XX-XX Applications of Smart Home system for disabled

More information

OVERVIEW AND FUTURE DEVELOPMENT OF THE NEUTRON SENSOR SIGNAL SELF-VALIDATION (NSV) PROJECT

OVERVIEW AND FUTURE DEVELOPMENT OF THE NEUTRON SENSOR SIGNAL SELF-VALIDATION (NSV) PROJECT OVERVIEW AND FUTURE DEVELOPMENT OF THE NEUTRON SENSOR SIGNAL SELF-VALIDATION (NSV) PROJECT Jean-Christophe Trama, Alain Bourgerette, Eric Barat, Bernard Lescop LETI (CEA - Advanced Technologies) CEA/Saclay

More information

Functional Safety: the Next Edition of IEC 61511

Functional Safety: the Next Edition of IEC 61511 HazAus2015/1507 Functional Safety: the Next Edition of IEC 61511 Mirek Generowicz Engineering Manager I&E Systems Pty Ltd Level 2, 445 Hay Street Perth WA 6000 Abstract The functional safety standard IEC

More information

An improved Algorithm of Generating Network Intrusion Detector Li Ma 1, a, Yan Chen 1, b

An improved Algorithm of Generating Network Intrusion Detector Li Ma 1, a, Yan Chen 1, b An improved Algorithm of Generating Network Intrusion Detector Li Ma 1, a, Yan Chen 1, b 1 Department of Information Engineering Guilin University of Aerospace Technology, Guilin China a E-mail: woshiml@sina.com,

More information

Implementation of Auto Car Washing System Using Two Robotic Arms

Implementation of Auto Car Washing System Using Two Robotic Arms Implementation of Auto Car Washing System Using Two Robotic Arms Pranoti Utekar 1, Sayali Naik 2, Monika Wadekar 3, S.G. Watve 4 U.G. Students, Department of Electronics and Telecommunication Engineering,

More information

Home appliances simulator for smart home systems testing

Home appliances simulator for smart home systems testing Home appliances simulator for smart home systems testing PETER JANIGA, MARTIN LIŠKA, ANTON BELÁŇ, VLADIMÍR VOLČKO, MARIAN IVANIČ Department of Electrical Power Engineering Slovak University of Technology

More information

GSM Based Computer Lab Security System Using PIR Sensors

GSM Based Computer Lab Security System Using PIR Sensors Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Reducing the Carbon Footprint of Existing Domestic Heating: A Non-Disruptive Approach

Reducing the Carbon Footprint of Existing Domestic Heating: A Non-Disruptive Approach EEDAL 2009 16-18 June 2009 Reducing the Footprint of Existing Domestic Heating: A Non-Disruptive Approach Martin O Hara Danfoss Randall Limited Abstract There is insufficient time between today and 2020

More information

Intelligent Fire Detection and Visual Guided Evacuation System Using Arduino and GSM

Intelligent Fire Detection and Visual Guided Evacuation System Using Arduino and GSM Intelligent Fire Detection and Visual Guided Evacuation System Using Arduino and GSM Naresh Kumar 1,Poonam Kumari 2 1 M.Tech(Instrumentation), UCIM, Panjab University, Chandigarh, India 2 Assistant Professor,

More information

Session Four Functional safety: the next edition of IEC Mirek Generowicz Engineering Manager, I&E Systems Pty Ltd

Session Four Functional safety: the next edition of IEC Mirek Generowicz Engineering Manager, I&E Systems Pty Ltd Abstract Session Four Functional safety: the next edition of IEC 61511 Mirek Generowicz Engineering Manager, I&E Systems Pty Ltd The functional safety standard IEC 61511 provides a framework for managing

More information

Research on the Monitor and Control System of Granary Temperature and Humidity Based on ARM

Research on the Monitor and Control System of Granary Temperature and Humidity Based on ARM Research on the Monitor and Control System of Granary Temperature and Humidity Based on ARM Liu Yang 1, Xinrong Cheng 2, Zhijie Jiang 3, and Zhijun Ren 1 1 Engineering College, China Agricultural University,

More information

Important Considerations When Selecting a Fan for Forced Air Cooling. By: Jeff Smoot, CUI Inc

Important Considerations When Selecting a Fan for Forced Air Cooling. By: Jeff Smoot, CUI Inc Important Considerations When Selecting a Fan for Forced Air Cooling By: Jeff Smoot, CUI Inc Designing an appropriate thermal management solution requires a systemic approach; each component on a circuit

More information

Fuzzy Logic Based Coolant Leak Detection

Fuzzy Logic Based Coolant Leak Detection Volume 118 No. 5 2018, 825-832 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Fuzzy Logic Based Coolant Leak Detection 1 J.Suganthi, M.E., 2 G. Nithya,

More information

About Esri NeA. Esri NeA Training Profile 2012

About Esri NeA. Esri NeA Training Profile 2012 About Esri NeA Stemming from Esri s commitment to meet the needs and demands of the GIS community in the Middle East and North Africa, Esri established Esri Northeast Africa (Esri NeA). Esri NeA is a free

More information

6367(Print), ISSN (Online) Volume (IJCET) 3, Issue 2, July- September (2012), IAEME

6367(Print), ISSN (Online) Volume (IJCET) 3, Issue 2, July- September (2012), IAEME INTERNATIONAL International Journal JOURNAL of Computer OF Engineering COMPUTER and Technology ENGINEERING (IJCET), & ISSN TECHNOLOGY 0976 6367(Print), ISSN 0976 6375(Online) Volume (IJCET) 3, Issue 2,

More information

Design and Development of Industrial Pollution Monitoring System using LabVIEW and GSM

Design and Development of Industrial Pollution Monitoring System using LabVIEW and GSM Design and Development of Industrial Pollution Monitoring System using LabVIEW and GSM Dr. Channappa Bhyri¹, Eliyaz Ahmed² 2 Student, Dept. of Electronics and Instrumentation, PDACE, Kalaburgi, Karnataka,

More information

URBAN PROJECT CARNIDE AV. LUSÍADA BENFICA

URBAN PROJECT CARNIDE AV. LUSÍADA BENFICA URBAN PROJECT CARNIDE AV. LUSÍADA BENFICA Infrastructure, Public Space, Urban Continuity José Rafael Garcia dos Santos Rosa Capelão Extended Abstract ARQUITECTURE October 2012 01 INTRODUCTION 01.01 Aims

More information

Contents of ANSI/AAMI HE75:2009 Page

Contents of ANSI/AAMI HE75:2009 Page Contents of ANSI/AAMI HE75:2009 Page Glossary of equivalent standards...xiii Committee representation...xv Acknowledgments...xvi Foreword...xvii Introduction...1 1 Scope...5 1.1 General...5 1.2 Inclusions...5

More information

Impact of Fire-Sprinkler Trade-offs on Occupant and Building Safety. An AMCA International White Paper r.classen/shutterstock.

Impact of Fire-Sprinkler Trade-offs on Occupant and Building Safety. An AMCA International White Paper r.classen/shutterstock. June 2018 Impact of Fire-Sprinkler Trade-offs on Occupant and Building Safety An AMCA International White Paper r.classen/shutterstock Air Movement and Control Association (AMCA) International Inc. 30

More information

INTREPID Perimeter Intrusion Detection System

INTREPID Perimeter Intrusion Detection System TM INTREPID Perimeter Intrusion Detection System Next Generation Perimeter Protection icropoint Cable combines patented Southwest Microwave technology with microprocessor power and laptop computer convenience.

More information

RLDS - Remote LEAK DETECTION SYSTEM

RLDS - Remote LEAK DETECTION SYSTEM RLDS - Remote LEAK DETECTION SYSTEM Asel-Tech has spent considerable time and resources over the past 8 years to improve our technology, to the point where it is unparalleled in reliability and performance

More information

Certification Report of the ST 3000 Pressure Transmitter with HART 6

Certification Report of the ST 3000 Pressure Transmitter with HART 6 Certification Report of the ST 3000 Pressure Transmitter with HART 6 Revision No.: 2.4 Date: Report Number: 2010-Mar-18 SAS-190/2006T Product: ST 3000 Pressure Transmitter with HART 6 Customer: Order Number:

More information

Application of Fuzzy Control in Central Air-conditioning Terminal Units Energy-saving

Application of Fuzzy Control in Central Air-conditioning Terminal Units Energy-saving www.ijcsi.org 123 Application of Fuzzy Control in Central Air-conditioning Terminal Units Energy-saving Yanqiu Zhao 1, Yingli Lv 1, Yong Gu 1, Shucheng Liu 2 1 Department of Electrical Engineer, Hebei

More information

AVOID CATASTROPHIC SITUATIONS: EXPERT FIRE AND GAS CONSULTANCY OPTIMIZES SAFETY

AVOID CATASTROPHIC SITUATIONS: EXPERT FIRE AND GAS CONSULTANCY OPTIMIZES SAFETY AVOID CATASTROPHIC SITUATIONS: EXPERT FIRE AND GAS CONSULTANCY OPTIMIZES SAFETY World-class services help reduce incidents, protect the environment, and keep people and plants safe White Paper PAGE 1 Introduction

More information

Research Article Footstep and Vehicle Detection Using Seismic Sensors in Wireless Sensor Network: Field Tests

Research Article Footstep and Vehicle Detection Using Seismic Sensors in Wireless Sensor Network: Field Tests Distributed Sensor Networks Volume 213, Article ID 12386, 8 pages http://dx.doi.org/1.1155/213/12386 Research Article Footstep and Vehicle Detection Using Seismic Sensors in Wireless Sensor Network: Field

More information

MODELLING AND OPTIMIZATION OF DIRECT EXPANSION AIR CONDITIONING SYSTEM FOR COMMERCIAL BUILDING ENERGY SAVING

MODELLING AND OPTIMIZATION OF DIRECT EXPANSION AIR CONDITIONING SYSTEM FOR COMMERCIAL BUILDING ENERGY SAVING MODELLING AND OPTIMIZATION OF DIRECT EXPANSION AIR CONDITIONING SYSTEM FOR COMMERCIAL BUILDING ENERGY SAVING V. Vakiloroaya*, J.G. Zhu, and Q.P. Ha School of Electrical, Mechanical and Mechatronic Systems,

More information

DEVELOPMENT OF THE TANGO ALARM SYSTEM

DEVELOPMENT OF THE TANGO ALARM SYSTEM 10th ICALEPCS Int. Conf. on Accelerator & Large Expt. Physics Control Systems. Geneva, 10-14 Oct 2005, WE3B.1-70 (2005) DEVELOPMENT OF THE TANGO ALARM SYSTEM L. Pivetta Sincrotrone Trieste, Trieste, Italy

More information

Android Controlled Fire Fighting Robot

Android Controlled Fire Fighting Robot IJSTE - International Journal of Science Technology & Engineering Volume 3 Issue 09 March 2017 ISSN (online): 2349-784X Android Controlled Fire Fighting Robot S. Sakthi Priyanka R. Sangeetha Department

More information

AVOID CATASTROPHIC SITUATIONS: EXPERT FIRE AND GAS CONSULTANCY OPTIMIZES SAFETY

AVOID CATASTROPHIC SITUATIONS: EXPERT FIRE AND GAS CONSULTANCY OPTIMIZES SAFETY AVOID CATASTROPHIC SITUATIONS: EXPERT FIRE AND GAS CONSULTANCY OPTIMIZES SAFETY World-class services help reduce incidents, protect the environment, and keep people and plants safe White Paper PAGE 1 Introduction

More information

EVALUATING LOOP HEAT PIPE PERFORMANCE IMPROVEMENT USING CIRCUMFERENTIAL GROOVES. Nadjara dos Santos, Roger R. Riehl

EVALUATING LOOP HEAT PIPE PERFORMANCE IMPROVEMENT USING CIRCUMFERENTIAL GROOVES. Nadjara dos Santos, Roger R. Riehl Abstract EVALUATING LOOP HEAT PIPE PERFORMANCE IMPROVEMENT USING CIRCUMFERENTIAL GROOVES Nadjara dos Santos, Roger R. Riehl National Institute for Space Research INPE - Space Mechanics and Control Division-DMC

More information

The Mode of Urban Renewal Base on the Smart City Theory under the Background of New Urbanization

The Mode of Urban Renewal Base on the Smart City Theory under the Background of New Urbanization Frontiers of Engineering Management DOI 10.15302/J-FEM-2015035 ENGINEERING MANAGEMENT THEORIES AND METHODOLOGIES Yi-hua Mao, Hong-yu Li, Qin-rui Xu The Mode of Urban Renewal Base on the Smart City Theory

More information

West Yorkshire Fire & Rescue Authority. Fire Protection Policy

West Yorkshire Fire & Rescue Authority. Fire Protection Policy West Yorkshire Fire & Rescue Authority Fire Protection Policy Risk Based Inspection Program 2017-2020 West Yorkshire Fire & Rescue Service Oakroyd Hall Birkenshaw Bradford BD11 2DY Date Issued: 28/03/2018

More information

ALCATEL-LUCENT OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS AND PERSONAL SAFETY

ALCATEL-LUCENT OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS AND PERSONAL SAFETY ALCATEL-LUCENT OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS AND PERSONAL SAFETY In healthcare, education, high-risk industries and the hospitality sector, you must know immediately

More information

Video Smoke Detection using Deep Domain Adaptation Enhanced with Synthetic Smoke Images

Video Smoke Detection using Deep Domain Adaptation Enhanced with Synthetic Smoke Images Video Smoke Detection using Deep Domain Adaptation Enhanced with Synthetic Smoke Images Gao Xu, Qixing Zhang, Gaohua Lin, Jinjun Wang, Yongming Zhang State Key Laboratory of Fire Science, University of

More information

Research on Evaluation of Fire Detection Algorithms

Research on Evaluation of Fire Detection Algorithms Research on Evaluation of Fire Detection Algorithms JIAN LI 1,2, WENHUI DONG 1, ZHIBIN MEI 1, and ZHUOFU WANG 1 1 Shenyang Fire Research Institute Ministry of Public Security China, 110031 2 Dalian University

More information

for family composition, time allocation of people, ownership and specification of home appliances. This paper first presents the simulation procedure

for family composition, time allocation of people, ownership and specification of home appliances. This paper first presents the simulation procedure Validation of an Energy Demand Model of Residential Buildings Yohei Yamaguchi 1*, Yoshiyuki Shimoda 1 1 Graduate School of Engineering Osaka University, S4 Building, 2-1 Yamadaoka, Suita, Osaka, 565-871,

More information

Advanced Pattern Recognition for Anomaly Detection Chance Kleineke/Michael Santucci Engineering Consultants Group Inc.

Advanced Pattern Recognition for Anomaly Detection Chance Kleineke/Michael Santucci Engineering Consultants Group Inc. Advanced Software Technologies Advanced Pattern Recognition for Anomaly Detection Chance Kleineke/Michael Santucci Engineering Consultants Group Inc. August 16, 2017 Tampa Convention Center Tampa, Florida

More information

LOCAL FIRE AND RESCUE PLAN FOR NORTH LANARKSHIRE

LOCAL FIRE AND RESCUE PLAN FOR NORTH LANARKSHIRE Working together for a safer Scotland LOCAL FIRE AND RESCUE PLAN FOR NORTH LANARKSHIRE 2017 DRAFT FOR CONSULTATION Contents Introduction... 1 Partnership Working... 3 Reduction of Accidental Dwelling Fires...

More information

Survey on Cooling Costs and Related Factors for Apartments in an Urban. Area of Osaka

Survey on Cooling Costs and Related Factors for Apartments in an Urban. Area of Osaka Survey on Cooling Costs and Related Factors for Apartments in an Urban Area of Osaka Noriko Umemiya Xiaoyong Lin Ginjirou Inoue Associate Professor Graduate student Graduate student Osaka City University

More information

Crime Central Station Burglary Alarm Systems

Crime Central Station Burglary Alarm Systems Page 1 of 10 Scope This criteria is intended to provide Loss Control Representatives with specific guidelines and information for evaluating central station burglar alarm systems for risks carrying crime

More information

Alarm Management Plan

Alarm Management Plan John E. Bogdan, Susan F. Booth, & David P. Garcia Abstract Why prepare an Alarm Management Plan just to meet PHMSA requirements (49 CFR Parts 192.631 and 195.446) when, for essentially the same effort,

More information

Options for Developing a Compliant PLC-based BMS

Options for Developing a Compliant PLC-based BMS Options for Developing a Compliant PLC-based BMS Jack Boone aesolutions Greenville, South Carolina, United States of America ABSTRACT Facilities are focusing on improving the reliability of their burner

More information

Coupling Multiple Hypothesis Testing with Proportion Estimation in Heterogeneous Categorical Sensor Networks

Coupling Multiple Hypothesis Testing with Proportion Estimation in Heterogeneous Categorical Sensor Networks Advancing the Science of Information Coupling Multiple Hypothesis Testing with Proportion Estimation in Heterogeneous Categorical Sensor Networks DTRA SBIR Phase II Contract: W911SR-10-C-0038 Chris Calderon,

More information

UV measurements for medical applications using SiC photodiodes

UV measurements for medical applications using SiC photodiodes UV measurements for medical applications using SiC photodiodes Abstract Dr. Niklas Papathanasiou, Gabriel Hopfenmüller, and Dr. Tilman Weiss sglux GmbH, Berlin, 12489, Germany E-mail: papathanasiou@sglux.de

More information

Certification Report of the ST3000 Pressure Transmitter

Certification Report of the ST3000 Pressure Transmitter Certification Report of the ST3000 Pressure Transmitter Revision No.: 1.0 Date: Report Number: Product: Customer: Order Number: Authority: Responsible: 2006-Dec-12 SAS-128/2006T ST3000 Pressure Transmitter

More information

Performance Neuro-Fuzzy for Power System Fault Location

Performance Neuro-Fuzzy for Power System Fault Location International Journal of Engineering and Technology Volume 3 No. 4, April, 2013 Performance Neuro-Fuzzy for Power System Fault Location 1,2 Azriyenni, 1 M.W. Mustafa 1 Electrical Engineering, Fakulti Kejuruteraan

More information

BRIDGING THE SAFE AUTOMATION GAP PART 1

BRIDGING THE SAFE AUTOMATION GAP PART 1 BRIDGING THE SAFE AUTOMATION GAP PART 1 Angela E. Summers, Ph.D., P.E, President, SIS-TECH Solutions, LP Bridging the Safe Automation Gap Part 1, Mary Kay O Conner Process Safety Center, Texas A&M University,

More information

Performance Evaluation of Event Detection Solutions: the CREDS experience

Performance Evaluation of Event Detection Solutions: the CREDS experience MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Performance Evaluation of Event Detection Solutions: the CREDS experience F Ziliani, S. Velastin, F. Porikli, L. Marcenaro, T. Kelliher, A.

More information

S INTRUSION&FIRE ALARM AND ACCESS CONTROL PANEL

S INTRUSION&FIRE ALARM AND ACCESS CONTROL PANEL S2000-4 INTRUSION&FIRE ALARM AND ACCESS CONTROL PANEL Installer s and User s manual S2000-4 INTRUSION&FIRE AND ACCEESS CONTROL PANEL ATTENTION! To modify configuration parameters use the program uprog.exe

More information

Alarm Fatigue in the ICU. Lynn Maguire MS, RN, PMC, NE-BC

Alarm Fatigue in the ICU. Lynn Maguire MS, RN, PMC, NE-BC Alarm Fatigue in the ICU Lynn Maguire MS, RN, PMC, NE-BC Objectives At the completion of this lecture the participant will: Define Alarm Fatigue Discuss the Joint Commission s Patient Safety Goal regarding

More information

Dangerous Assumptions

Dangerous Assumptions Dangerous Assumptions In light of the lessons learned from the Lakanal House fire, the on-going competent inspection of passive fire protection is crucial to safeguarding those who put their trust in social

More information

High Integrity Pressure Protection System

High Integrity Pressure Protection System High Integrity Pressure Protection System 412748_CCI_HIPPS.indd 1 A CCI HIPPS offering is unique in its: Innovative custom engineered system approach Variety of actuator and valve solutions for an optimized

More information

Medical devices and electromagnetic compatibility. Addressing the requirements of IEC , 4 th Edition

Medical devices and electromagnetic compatibility. Addressing the requirements of IEC , 4 th Edition Medical devices and electromagnetic compatibility Addressing the requirements of IEC 60601-1-2, 4 th Edition Executive Summary Risk of electromagnetic interference and immunity have long been important

More information

Wireless Sensor Network Based Bank Monitoring System Using LabVIEW

Wireless Sensor Network Based Bank Monitoring System Using LabVIEW Proceedings of the 2015 International Conference on Industrial Engineering and Operations Management Dubai, United Arab Emirates (UAE), March 3 5, 2015 Wireless Sensor Network Based Bank Monitoring System

More information

Laird Engineered Thermal Systems Application Note. Liquid to Liquid Ambient Cooling Systems for Semiconductor Tools

Laird Engineered Thermal Systems Application Note. Liquid to Liquid Ambient Cooling Systems for Semiconductor Tools Laird Engineered Thermal Systems Application Note Liquid to Liquid Ambient Cooling Systems for Semiconductor Tools March 2017 Table of Contents Introduction...3 Cooling Systems...3 Technical Requirements...4

More information

Securing and Protecting Process Plants in the Digital Age Functional safety requires IT security

Securing and Protecting Process Plants in the Digital Age Functional safety requires IT security Securing and Protecting Process Plants in the Digital Age Functional safety requires IT security In 2014, a German steel mill fell victim to a targeted cyberattack. Hackers used spear phishing and social

More information

Logbook. Precept EN Fire Detection/Alarm Panel. & Precept EN Repeater

Logbook. Precept EN Fire Detection/Alarm Panel. & Precept EN Repeater APPROVED BY: JBJ Precept EN Fire Detection/Alarm Panel & Precept EN Repeater Logbook PAGE 1 of 19 List of Contents 1. FIRE ALARM SYSTEM MAINTENANCE... 3 2. USER RESPONSIBILITIES... 3 2.1. RESPONSIBLE PERSON...

More information

The evolution of level switches and detectors

The evolution of level switches and detectors Introduction Improving maintenance practices is vital in process industries, bringing significant gains in terms of safety, production up-time and reduction in unscheduled downtime. Increasing efficiency

More information

UNIVERSAL REMOTE CONTROL SYSTEM FOR KITCHEN AUTOMATION USING IoT

UNIVERSAL REMOTE CONTROL SYSTEM FOR KITCHEN AUTOMATION USING IoT . UNIVERSAL REMOTE CONTROL SYSTEM FOR KITCHEN AUTOMATION USING IoT Amita Thakare 1 Pooja R. Gandhe 2 1 Professor, Dept. of ECE, Priyadarshini Bhagwati College of Engineering. Nagpur, Maharashtra, India

More information

Research on Decision Tree Application in Data of Fire Alarm Receipt and Disposal

Research on Decision Tree Application in Data of Fire Alarm Receipt and Disposal Research Journal of Applied Sciences, Engineering and Technology 5(22): 5217-5222, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: October 09, 2012 Accepted: December

More information

False Alarm Suppression in Early Prediction of Cardiac Arrhythmia

False Alarm Suppression in Early Prediction of Cardiac Arrhythmia IEEE International Conference on Bioinformatics & Bioengineering 2015 False Alarm Suppression in Early Prediction of Cardiac Arrhythmia Shoumik Roychoudhury, Mohamed F. Ghalwash, Zoran Obradovic Presented

More information

Integrating Control and Safety: Where to draw the line.

Integrating Control and Safety: Where to draw the line. Integrating Control and Safety: Where to draw the line. Robin McCrea-Steele, TÜV FSExpert Invensys-Premier Consulting Services New digital technology now makes it feasible to integrate process control

More information

IEC Functional Safety Assessment

IEC Functional Safety Assessment IEC 61508 Functional Safety Assessment Project: Detcon IR-700 Combustible Hydrocarbon Gas Sensor Customer: Detcon The Woodlands, TX USA Contract No.: Q13/06-003 Report No.: DC 13-06-003 R002 Version V1,

More information

Failure Modes, Effects and Diagnostic Analysis

Failure Modes, Effects and Diagnostic Analysis Failure Modes, Effects and Diagnostic Analysis Project: Detcon FP-700 Combustible Gas Sensor Customer: Detcon The Woodlands, TX USA Contract No.: DC 06/08-04 Report No.: DC 06/08-04 R001 Version V1, Revision

More information

Intrusion Detection: Eliminating False Alarms

Intrusion Detection: Eliminating False Alarms Intrusion Detection: Eliminating False Alarms MAFTIA Final Review Andreas Wespi 18/19 February 2003 Newcastle Overview! MAFTIA and Intrusion Detection! Eliminating False Alarms! Demonstrator of an Intrusion-Tolerant

More information

ADIPEC 2013 Technical Conference Manuscript

ADIPEC 2013 Technical Conference Manuscript ADIPEC 2013 Technical Conference Manuscript Name: Heidi Fuglum Company: ABB AS Job title: Deployment Manager Address: Ole Deviksvei, Oslo, Norway Phone number: +47 91 36 98 70 Email: Heidi.Fuglum@no.abb.com

More information

INTRODUCTIONOVERVIEW How Hochiki can help you with your BIM project

INTRODUCTIONOVERVIEW How Hochiki can help you with your BIM project World Class Leaders in Fire Detection Since 1918 BIM INTRODUCTIONOVERVIEW How Hochiki can help you with your BIM project WHAT IS BIM? Building Information Modelling (BIM) is a process for managing the

More information

FIRE AND RESCUE. Intent

FIRE AND RESCUE. Intent FIRE AND RESCUE Intent The Fire and Rescue Plan is designed to maintain Prince William County as a safe community, reducing loss of life, injury, and property from fire and/or accident. The mission of

More information

MRI Advanced Cooling System

MRI Advanced Cooling System MRI Advanced Cooling System Imaging Solutions has partnered with PREH to bring you the absolute best in MRI room cooling. PREH has been an expert in healthcare cooling for over 10 years. They have experience

More information

IMPORTANCE of FIREGROUND VENTILATION PRACTICES and DYNAMICS IN FIREFIGHTING (PART I)

IMPORTANCE of FIREGROUND VENTILATION PRACTICES and DYNAMICS IN FIREFIGHTING (PART I) IMPORTANCE of FIREGROUND VENTILATION PRACTICES and DYNAMICS IN FIREFIGHTING (PART I) By Lt. Mike Mason As we have stated previously there are two prominent areas that drive every fire ground and that is

More information

Intrusion sensors. We listened to you

Intrusion sensors. We listened to you Intrusion sensors We listened to you Advanced technology, makes it a simple choice Whether you choose Passive Infrared (PIR), Dual or Vector technology, our motion sensors have a number of intrinsic advantages:

More information

BURGLAR ALARM USING ARDUINO AND PIR SENSOR WITH SMS ALERT Burgoji Santhosh Kumar 1, S.Ramesh 2 1

BURGLAR ALARM USING ARDUINO AND PIR SENSOR WITH SMS ALERT Burgoji Santhosh Kumar 1, S.Ramesh 2 1 BURGLAR ALARM USING ARDUINO AND PIR SENSOR WITH SMS ALERT Burgoji Santhosh Kumar 1, S.Ramesh 2 1 Assistant Professor, Dept of ECE, Anurag Group of Institutions, Telangana, India. 2 Assistant Professor,

More information

EE04 804(B) Soft Computing Ver. 1.2 Class 1. Introduction February 21st,2012. Sasidharan Sreedharan

EE04 804(B) Soft Computing Ver. 1.2 Class 1. Introduction February 21st,2012. Sasidharan Sreedharan EE04 804(B) Soft Computing Ver. 1.2 Class 1. Introduction February 21st,2012 Sasidharan Sreedharan www.sasidharan.webs.com 1 Syllabus Artificial Intelligence Systems- Neural Networks, fuzzy logic, genetic

More information

AUTOMATIC STREET LIGHT CONTROL SYSTEM USING MICROCONTROLLER

AUTOMATIC STREET LIGHT CONTROL SYSTEM USING MICROCONTROLLER AUTOMATIC STREET LIGHT CONTROL SYSTEM USING MICROCONTROLLER S.M.Ghayas Hasan 1, Fazil Alam 2, Amrish Dubey 3 1, 2 Students, Electrical Engineering Department Greater Noida Institutes of Technology, Gr.Noida,

More information

Safety Instrumented Systems

Safety Instrumented Systems Safety Instrumented Systems What is a Safety Instrumented System? A Safety Instrumented System SIS is a new term used in standards like IEC 61511 or IEC 61508 for what used to be called Emergency Shutdown

More information

Professional Security Officer Program(PSOP)

Professional Security Officer Program(PSOP) Professional Security Officer Program(PSOP) Unit descriptions and lesson learning objectives. The Professional Security Officer Program course consists of 11 units, with each unit having between two and

More information

Improved occupancy detection accuracy using PIR and door sensors for a smart thermostat

Improved occupancy detection accuracy using PIR and door sensors for a smart thermostat Improved occupancy detection accuracy using and door sensors for a smart thermostat Sun Ho Kim 1, Hyeun Jun Moon 1, Young Ran Yoon 1 1 Department of Architectural Engineering, Dankook University, Yongin,

More information

LPG GAS LEAKAGE DETECTION, MONITORING AND CONTROL USING LabVIEW

LPG GAS LEAKAGE DETECTION, MONITORING AND CONTROL USING LabVIEW LPG GAS LEAKAGE DETECTION, MONITORING AND CONTROL USING LabVIEW M.J.Kesavan 1, R.Rajesh Kannan 2,S.Vijay vishwanath 3, P.Sathya 4. UG Students, Instrumentation & control engg, Asst. professor, Instrumentation

More information

6 th Pipeline Technology Conference 2011

6 th Pipeline Technology Conference 2011 6 th Pipeline Technology Conference 2011 Pipeline Leak Detection and Theft Detection Using Rarefaction Waves Authors: Dr Alex Souza de Joode, VP International Operations; ATMOS International, UK. Andrew

More information

COUNTY OF BERGEN DEPARTMENT OF PUBLIC SAFETY LAW AND PUBLIC SAFETY INSTITUTE POLICE, FIRE & EMS ACADEMIES 281 Campgaw Road Mahwah, N.J.

COUNTY OF BERGEN DEPARTMENT OF PUBLIC SAFETY LAW AND PUBLIC SAFETY INSTITUTE POLICE, FIRE & EMS ACADEMIES 281 Campgaw Road Mahwah, N.J. COUNTY OF BERGEN DEPARTMENT OF PUBLIC SAFETY LAW AND PUBLIC SAFETY INSTITUTE POLICE, FIRE & EMS ACADEMIES 281 Campgaw Road Mahwah, N.J. 07430 (201)785-6000 Police FAX (201)785-6036 Fire FAX (201)785-6036

More information

Construction of An Automatic Power Switch using Infrared Motion Sensor

Construction of An Automatic Power Switch using Infrared Motion Sensor Journal of Informatics and Mathematical Sciences Vol. 9, No. 2, pp. 331 337, 2017 ISSN 0975-5748 (online); 0974-875X (print) Published by RGN Publications http://www.rgnpublications.com Proceedings of

More information

Fin-Fan Control System

Fin-Fan Control System IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 02, 2014 ISSN (online): 2321-0613 Fin-Fan Control System Pankaj Shah 1 Jignesh Vaghela 2 1, 2 Student 1, 2 Instrumentation

More information

Remote Monitoring of Offshore Structures using Acoustic Emission.

Remote Monitoring of Offshore Structures using Acoustic Emission. 11th European Conference on Non-Destructive Testing (ECNDT 2014), October 6-10, 2014, Prague, Czech Republic Remote Monitoring of Offshore Structures using Acoustic Emission. More Info at Open Access Database

More information

An Overview of Extinguishing Systems for Computer Equipment

An Overview of Extinguishing Systems for Computer Equipment Risk Solutions An Overview of Extinguishing Systems for Computer Equipment Various types of automatic suppression systems are available for protecting computer equipment. This report discusses the uses

More information