53,067 research outputs found

    Increasing resilience of ATM networks using traffic monitoring and automated anomaly analysis

    Get PDF
    Systematic network monitoring can be the cornerstone for the dependable operation of safety-critical distributed systems. In this paper, we present our vision for informed anomaly detection through network monitoring and resilience measurements to increase the operators' visibility of ATM communication networks. We raise the question of how to determine the optimal level of automation in this safety-critical context, and we present a novel passive network monitoring system that can reveal network utilisation trends and traffic patterns in diverse timescales. Using network measurements, we derive resilience metrics and visualisations to enhance the operators' knowledge of the network and traffic behaviour, and allow for network planning and provisioning based on informed what-if analysis

    A study on stryhcnos potatorum and pisum sativum as natural coagulants for meat food processing wastewater

    Get PDF
    Wastewater generated from meat food processing industry has significant effects on the environment. Many methods have been reported for removing turbidity, total suspended solids (TSS), chemical oxygen demand (COD), oil and grease (O&G) and colour from meat food processing wastewater (MFPW). The most common method among them is flocculation-coagulation process which is widely used. Although inorganic coagulants are prominent in wastewater treatments, its application may cause toxic residual. In this study, the attempt has been made to study the performance of S. Potatorum (nirmali) and P. Sativum (pea) seed as natural coagulants in the flocculation process. A further aim is to determine the optimum conditions for the treatment of MFPW effluents such as coagulant dosage, mixing rate and pH. An adsorption study was also carried out to study the adsorption potential of these coagulants to treat MFPW. A lab-scale treatment tank was developed to evaluate the effectiveness in MFPW treatment. Jar test results showed that optimum dosage, pH and mixing rate for S. Potatorum were pH 8 with dosage of 150 mg/L and 150 rpm mixing rate with the removal of turbidity, TSS, COD, O&G and colour are 91%, 97.6%, 58.4%, 79.9% and 84.3% respectively. Meanwhile, for P. Sativum, the optimum condition were observed at pH 8 with dosage of 150 mg/L and 150 rpm mixing rate with the removal of turbidity, TSS, COD, O&G and colour 87.8%, 97.3%, 65.5%, 77.9% and 76.5% respectively. The adsorption study was found that the analysis fitted well to the Langmuir isotherm for both natural coagulants. Results show that the percentage of turbidity, TSS, COD, O&G removal by chemical coagulants are quite similar than natural coagulants when lab-scale treatment tank was used to treat the MFPW. This indicated that these natural coagulants have a potential to use as alternative in wastewater treatment

    Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation

    Full text link
    Owing to a growing number of attacks, the assessment of Industrial Control Systems (ICSs) has gained in importance. An integral part of an assessment is the creation of a detailed inventory of all connected devices, enabling vulnerability evaluations. For this purpose, scans of networks are crucial. Active scanning, which generates irregular traffic, is a method to get an overview of connected and active devices. Since such additional traffic may lead to an unexpected behavior of devices, active scanning methods should be avoided in critical infrastructure networks. In such cases, passive network monitoring offers an alternative, which is often used in conjunction with complex deep-packet inspection techniques. There are very few publications on lightweight passive scanning methodologies for industrial networks. In this paper, we propose a lightweight passive network monitoring technique using an efficient Media Access Control (MAC) address-based identification of industrial devices. Based on an incomplete set of known MAC address to device associations, the presented method can guess correct device and vendor information. Proving the feasibility of the method, an implementation is also introduced and evaluated regarding its efficiency. The feasibility of predicting a specific device/vendor combination is demonstrated by having similar devices in the database. In our ICS testbed, we reached a host discovery rate of 100% at an identification rate of more than 66%, outperforming the results of existing tools.Comment: http://dx.doi.org/10.14236/ewic/ICS2018.

    Simulation of undular bores evolution with damping

    Get PDF
    Propagation of undular bores with damping is considered in the framework of perturbed extended Korteweg-de Vries (peKdV) equation. Two types of damping terms for the peKdV equation, namely linear and Chezy frictional terms, which describe the turbulent boundary layers in the ïŹ‚uid ïŹ‚ow are considered. Solving the peKdV equation numerically using the method of lines shows that under the inïŹ‚uence of damping, the lead-ing solitary wave of the undular bores will split from the nonlinear wavetrain, propagates and behaves like an isolated solitary wave. The amplitude of the leading wave will remain the same for some times before it starts to decay again at a larger time. In general the amplitude of the leading wave and the mean level across the undular bore decreases due to the eïŹ€ect of damping

    Smart Technologies for Environmental Safety and Knowledge Enhancement in Intermodal Transport

    Get PDF
    International concerns about security in transport systems are leading to a new international regulation in this field. This introduces new requirements for operators and authorities as well as it opens new challenges, in particular when referred to seaports and maritime transport in the Mediterranean area, where many seaport terminals and infrastructures are affected by a noteworthy technological divide from North European contexts. In such contexts, the adoption of the new regulations can represent the right chance for upgrading the local operative standards, increasing latu sensu the quality of maritime transport performances, while conferring a greater level to security and safety checks. This paper explores the chances for increasing the level of Mediterranean seaport competitiveness allowed by technological innovations in transport systems, both in operations and organization of these infrastructures. The aim of the work is to study the effects of the adoption of technological solutions such as wireless communications and radiofrequency identification on the competitiveness of Mediterranean seaport infrastructures. Technological solutions designed to identify good items help operators in organizing activities in terminals and make maritime transport faster in delivering goods, by cutting the handling time and costs in seaport terminals. Seaports that adopt this kind of technologies, and the surrounding economic areas connected to seaports, have a greater attractiveness on shipping companies and operators, since they allow faster handling activities and easier checks on goods. Besides, the analysis of direct and indirect effects of the use of such technologies specifically focuses on the contribution that the use of these solutions gives in ensuring higher security levels, by increasing the level of information and knowledge associated to goods. The different types of security provided (e.g. for people, environment and goods) and the extreme flexibility of the technologies involved give the overall worth of the challenge. It seems to be a great chance of growth for the Mediterranean area, more than a mere compliance to the international security regulations.

    WiFi-based PCL for monitoring private airfields

    Get PDF
    In this article, the potential exploitation of WiFi-based PCL systems is investigated with reference to a real-world civil application in which these sensors are expected to nicely complement the existing technologies adopted for monitoring purposes, especially when operating against noncooperative targets. In particular, we consider the monitoring application of small private airstrips or airfields. With this terminology, we refer to open areas designated for the takeoff and landing of small aircrafts that, unlike an airport, have generally short and possibly unpaved runways (e.g., grass, dirt, sand, or gravel surfaces) and do not necessarily have terminals. More important, such areas usually are devoid of conventional technologies, equipment, or procedures adopted to guarantee safety and security in large aerodromes.There exist a huge number of small, privately owned, and unlicensed airfields around the world. Private aircraft owners mainly use these “airports” for recreational, single-person, or private flights for small groups and training flight purposes. In addition, residential airparks have proliferated in recent years, especially inthe United States, Canada, and South Africa. A residential airpark, or “fly-in community,” features common airstrips where homes with attached hangars allow owners to taxi from their hangar to a shared runway. In many cases, roads are dual use for both cars and planes.In such scenarios, the possibility to employ low-cost, compact, nonintrusive, and nontransmitting sensors as a way to improve safety and security with limited impact on the airstrips' users would be of great potential interest. To this purpose, WiFi-based passive radar sensors appear to be good candidates [23]. Therefore, we investigate their application against typical operative conditions experienced in the scenarios described earlier. The aim is to assess the capability to detect, localize, and track authorized and unauthorized targets that can be occupying the runway and the surrounding areas

    WSN and RFID integration to support intelligent monitoring in smart buildings using hybrid intelligent decision support systems

    Get PDF
    The real time monitoring of environment context aware activities is becoming a standard in the service delivery in a wide range of domains (child and elderly care and supervision, logistics, circulation, and other). The safety of people, goods and premises depends on the prompt reaction to potential hazards identified at an early stage to engage appropriate control actions. This requires capturing real time data to process locally at the device level or communicate to backend systems for real time decision making. This research examines the wireless sensor network and radio frequency identification technology integration in smart homes to support advanced safety systems deployed upstream to safety and emergency response. These systems are based on the use of hybrid intelligent decision support systems configured in a multi-distributed architecture enabled by the wireless communication of detection and tracking data to support intelligent real-time monitoring in smart buildings. This paper introduces first the concept of wireless sensor network and radio frequency identification technology integration showing the various options for the task distribution between radio frequency identification and hybrid intelligent decision support systems. This integration is then illustrated in a multi-distributed system architecture to identify motion and control access in a smart building using a room capacity model for occupancy and evacuation, access rights and a navigation map automatically generated by the system. The solution shown in the case study is based on a virtual layout of the smart building which is implemented using the capabilities of the building information model and hybrid intelligent decision support system.The Saudi High Education Ministry and Brunel University (UK

    Wireless communication, identification and sensing technologies enabling integrated logistics: a study in the harbor environment

    Get PDF
    In the last decade, integrated logistics has become an important challenge in the development of wireless communication, identification and sensing technology, due to the growing complexity of logistics processes and the increasing demand for adapting systems to new requirements. The advancement of wireless technology provides a wide range of options for the maritime container terminals. Electronic devices employed in container terminals reduce the manual effort, facilitating timely information flow and enhancing control and quality of service and decision made. In this paper, we examine the technology that can be used to support integration in harbor's logistics. In the literature, most systems have been developed to address specific needs of particular harbors, but a systematic study is missing. The purpose is to provide an overview to the reader about which technology of integrated logistics can be implemented and what remains to be addressed in the future

    Denial of service attacks and challenges in broadband wireless networks

    Get PDF
    Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN). Security attacks and vulnerabilities vary amongst these broadband wireless networks because of differences in topologies, network operations and physical setups. Amongst the various security risks, Denial of Service (DoS) attack is the most severe security threat, as DoS can compromise the availability and integrity of broadband wireless network. In this paper, we present DoS attack issues in broadband wireless networks, along with possible defenses and future directions
    • 

    corecore