53,067 research outputs found
Increasing resilience of ATM networks using traffic monitoring and automated anomaly analysis
Systematic network monitoring can be the cornerstone for
the dependable operation of safety-critical distributed
systems. In this paper, we present our vision for informed
anomaly detection through network monitoring and
resilience measurements to increase the operators'
visibility of ATM communication networks. We raise the
question of how to determine the optimal level of
automation in this safety-critical context, and we present a
novel passive network monitoring system that can reveal
network utilisation trends and traffic patterns in diverse
timescales. Using network measurements, we derive
resilience metrics and visualisations to enhance the
operators' knowledge of the network and traffic behaviour,
and allow for network planning and provisioning based on
informed what-if analysis
A study on stryhcnos potatorum and pisum sativum as natural coagulants for meat food processing wastewater
Wastewater generated from meat food processing industry has significant effects on the environment. Many methods have been reported for removing turbidity, total suspended solids (TSS), chemical oxygen demand (COD), oil and grease (O&G) and colour from meat food processing wastewater (MFPW). The most common method among them is flocculation-coagulation process which is widely used. Although inorganic coagulants are prominent in wastewater treatments, its application may cause toxic residual. In this study, the attempt has been made to study the performance of S. Potatorum (nirmali) and P. Sativum (pea) seed as natural coagulants in the flocculation process. A further aim is to determine the optimum conditions for the treatment of MFPW effluents such as coagulant dosage, mixing rate and pH. An adsorption study was also carried out to study the adsorption potential of these coagulants to treat MFPW. A lab-scale treatment tank was developed to evaluate the effectiveness in MFPW treatment. Jar test results showed that optimum dosage, pH and mixing rate for S. Potatorum were pH 8 with dosage of 150 mg/L and 150 rpm mixing rate with the removal of turbidity, TSS, COD, O&G and colour are 91%, 97.6%, 58.4%, 79.9% and 84.3% respectively. Meanwhile, for P. Sativum, the optimum condition were observed at pH 8 with dosage of 150 mg/L and 150 rpm mixing rate with the removal of turbidity, TSS, COD, O&G and colour 87.8%, 97.3%, 65.5%, 77.9% and 76.5% respectively. The adsorption study was found that the analysis fitted well to the Langmuir isotherm for both natural coagulants. Results show that the percentage of turbidity, TSS, COD, O&G removal by chemical coagulants are quite similar than natural coagulants when lab-scale treatment tank was used to treat the MFPW. This indicated that these natural coagulants have a potential to use as alternative in wastewater treatment
Recommended from our members
MobileTrust: Secure Knowledge Integration in VANETs
Vehicular Ad hoc NETworks (VANET) are becoming popular due to the emergence of the Internet of Things and ambient intelligence applications. In such networks, secure resource sharing functionality is accomplished by incorporating trust schemes. Current solutions adopt peer-to-peer technologies that can cover the large operational area. However, these systems fail to capture some inherent properties of VANETs, such as fast and ephemeral interaction, making robust trust evaluation of crowdsourcing challenging. In this article, we propose MobileTrustâa hybrid trust-based system for secure resource sharing in VANETs. The proposal is a breakthrough in centralized trust computing that utilizes cloud and upcoming 5G technologies to provide robust trust establishment with global scalability. The ad hoc communication is energy-efficient and protects the system against threats that are not countered by the current settings. To evaluate its performance and effectiveness, MobileTrust is modelled in the SUMO simulator and tested on the traffic features of the small-size German city of Eichstatt. Similar schemes are implemented in the same platform to provide a fair comparison. Moreover, MobileTrust is deployed on a typical embedded system platform and applied on a real smart car installation for monitoring traffic and road-state parameters of an urban application. The proposed system is developed under the EU-founded THREAT-ARREST project, to provide security, privacy, and trust in an intelligent and energy-aware transportation scenario, bringing closer the vision of sustainable circular economy
Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation
Owing to a growing number of attacks, the assessment of Industrial Control
Systems (ICSs) has gained in importance. An integral part of an assessment is
the creation of a detailed inventory of all connected devices, enabling
vulnerability evaluations. For this purpose, scans of networks are crucial.
Active scanning, which generates irregular traffic, is a method to get an
overview of connected and active devices. Since such additional traffic may
lead to an unexpected behavior of devices, active scanning methods should be
avoided in critical infrastructure networks. In such cases, passive network
monitoring offers an alternative, which is often used in conjunction with
complex deep-packet inspection techniques. There are very few publications on
lightweight passive scanning methodologies for industrial networks. In this
paper, we propose a lightweight passive network monitoring technique using an
efficient Media Access Control (MAC) address-based identification of industrial
devices. Based on an incomplete set of known MAC address to device
associations, the presented method can guess correct device and vendor
information. Proving the feasibility of the method, an implementation is also
introduced and evaluated regarding its efficiency. The feasibility of
predicting a specific device/vendor combination is demonstrated by having
similar devices in the database. In our ICS testbed, we reached a host
discovery rate of 100% at an identification rate of more than 66%,
outperforming the results of existing tools.Comment: http://dx.doi.org/10.14236/ewic/ICS2018.
Simulation of undular bores evolution with damping
Propagation of undular bores with damping is considered in the framework of perturbed extended Korteweg-de Vries (peKdV) equation. Two types of damping terms for the peKdV equation, namely linear and Chezy frictional terms, which describe the turbulent boundary layers in the ïŹuid ïŹow are considered. Solving the peKdV equation numerically using the method of lines shows that under the inïŹuence of damping, the lead-ing solitary wave of the undular bores will split from the nonlinear wavetrain, propagates and behaves like an isolated solitary wave. The amplitude of the leading wave will remain the same for some times before it starts to decay again at a larger time. In general the amplitude of the leading wave and the mean level across the undular bore decreases due to the eïŹect of damping
Smart Technologies for Environmental Safety and Knowledge Enhancement in Intermodal Transport
International concerns about security in transport systems are leading to a new international regulation in this field. This introduces new requirements for operators and authorities as well as it opens new challenges, in particular when referred to seaports and maritime transport in the Mediterranean area, where many seaport terminals and infrastructures are affected by a noteworthy technological divide from North European contexts. In such contexts, the adoption of the new regulations can represent the right chance for upgrading the local operative standards, increasing latu sensu the quality of maritime transport performances, while conferring a greater level to security and safety checks. This paper explores the chances for increasing the level of Mediterranean seaport competitiveness allowed by technological innovations in transport systems, both in operations and organization of these infrastructures. The aim of the work is to study the effects of the adoption of technological solutions such as wireless communications and radiofrequency identification on the competitiveness of Mediterranean seaport infrastructures. Technological solutions designed to identify good items help operators in organizing activities in terminals and make maritime transport faster in delivering goods, by cutting the handling time and costs in seaport terminals. Seaports that adopt this kind of technologies, and the surrounding economic areas connected to seaports, have a greater attractiveness on shipping companies and operators, since they allow faster handling activities and easier checks on goods. Besides, the analysis of direct and indirect effects of the use of such technologies specifically focuses on the contribution that the use of these solutions gives in ensuring higher security levels, by increasing the level of information and knowledge associated to goods. The different types of security provided (e.g. for people, environment and goods) and the extreme flexibility of the technologies involved give the overall worth of the challenge. It seems to be a great chance of growth for the Mediterranean area, more than a mere compliance to the international security regulations.
WiFi-based PCL for monitoring private airfields
In this article, the potential exploitation of WiFi-based PCL systems is investigated with reference to a real-world civil application in which these sensors are expected to nicely complement the existing technologies adopted for monitoring purposes, especially when operating against noncooperative targets. In particular, we consider the monitoring application of small private airstrips or airfields. With this terminology, we refer to open areas designated for the takeoff and landing of small aircrafts that, unlike an airport, have generally short and possibly unpaved runways (e.g., grass, dirt, sand, or gravel surfaces) and do not necessarily have terminals. More important, such areas usually are devoid of conventional technologies, equipment, or procedures adopted to guarantee safety and security in large aerodromes.There exist a huge number of small, privately owned, and unlicensed airfields around the world. Private aircraft owners mainly use these âairportsâ for recreational, single-person, or private flights for small groups and training flight purposes. In addition, residential airparks have proliferated in recent years, especially inthe United States, Canada, and South Africa. A residential airpark, or âfly-in community,â features common airstrips where homes with attached hangars allow owners to taxi from their hangar to a shared runway. In many cases, roads are dual use for both cars and planes.In such scenarios, the possibility to employ low-cost, compact, nonintrusive, and nontransmitting sensors as a way to improve safety and security with limited impact on the airstrips' users would be of great potential interest. To this purpose, WiFi-based passive radar sensors appear to be good candidates [23]. Therefore, we investigate their application against typical operative conditions experienced in the scenarios described earlier. The aim is to assess the capability to detect, localize, and track authorized and unauthorized targets that can be occupying the runway and the surrounding areas
WSN and RFID integration to support intelligent monitoring in smart buildings using hybrid intelligent decision support systems
The real time monitoring of environment context aware activities is becoming a standard in the service delivery in a wide range of domains (child and elderly care and supervision, logistics, circulation, and other). The safety of people, goods and premises depends on the prompt reaction to potential hazards identified at an early stage to engage appropriate control actions. This requires capturing real time data to process locally at the device level or communicate to backend systems for real time decision making. This research examines the wireless sensor network and radio frequency identification technology integration in smart homes to support advanced safety systems deployed upstream to safety and emergency response. These systems are based on the use of hybrid intelligent decision support systems configured in a multi-distributed architecture enabled by the wireless communication of detection and tracking data to support intelligent real-time monitoring in smart buildings. This paper introduces first the concept of wireless sensor network and radio frequency identification technology integration showing the various options for the task distribution between radio frequency identification and hybrid intelligent decision support systems. This integration is then illustrated in a multi-distributed system architecture to identify motion and control access in a smart building using a room capacity model for occupancy and evacuation, access rights and a navigation map automatically generated by the system. The solution shown in the case study is based on a virtual layout of the smart building which is implemented using the capabilities of the building information model and hybrid intelligent decision support system.The Saudi High Education Ministry and Brunel University (UK
Wireless communication, identification and sensing technologies enabling integrated logistics: a study in the harbor environment
In the last decade, integrated logistics has become an important challenge in
the development of wireless communication, identification and sensing
technology, due to the growing complexity of logistics processes and the
increasing demand for adapting systems to new requirements. The advancement of
wireless technology provides a wide range of options for the maritime container
terminals. Electronic devices employed in container terminals reduce the manual
effort, facilitating timely information flow and enhancing control and quality
of service and decision made. In this paper, we examine the technology that can
be used to support integration in harbor's logistics. In the literature, most
systems have been developed to address specific needs of particular harbors,
but a systematic study is missing. The purpose is to provide an overview to the
reader about which technology of integrated logistics can be implemented and
what remains to be addressed in the future
Denial of service attacks and challenges in broadband wireless networks
Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and
Wireless Mesh Network (WMN). Security attacks and
vulnerabilities vary amongst these broadband wireless networks because of differences in topologies, network operations and physical setups. Amongst the various security risks, Denial of Service (DoS) attack is the most severe security threat, as DoS can compromise the availability and integrity of broadband
wireless network. In this paper, we present DoS attack issues in broadband wireless networks, along with possible defenses and future directions
- âŠ