282,362 research outputs found

    Remote Cell Growth Sensing Using Self-Sustained Bio-Oscillations

    Get PDF
    A smart sensor system for cell culture real-time supervision is proposed, allowing for a significant reduction in human effort applied to this type of assay. The approach converts the cell culture under test into a suitable “biological” oscillator. The system enables the remote acquisition and management of the “biological” oscillation signals through a secure web interface. The indirectly observed biological properties are cell growth and cell number, which are straightforwardly related to the measured bio-oscillation signal parameters, i.e., frequency and amplitude. The sensor extracts the information without complex circuitry for acquisition and measurement, taking advantage of the microcontroller features. A discrete prototype for sensing and remote monitoring is presented along with the experimental results obtained from the performed measurements, achieving the expected performance and outcomes

    The provision of fire services in rural areas

    Get PDF
    Fire services have been neglected in discussions of public service provision in rural areas. The way in which they are provided has a broader significance in terms of current debates about risk management. Fire service policy was transferred away from the Home Office, but the Bain Report provided the major stimulus to change. Early central government attempts to stimulate fire service provision in rural area were hampered by a lack of cooperation between local authorities. Rates of death from fire are influenced by attendance times and are particularly high in remote rural areas. The development of national standards of fire cover was focused on protecting property rather than saving lives with disproportionate funding being provided for urban areas. Social changes in rural areas have made it more difficult to secure sufficient numbers of retained fire fighters. It has proved particularly difficult to provide an adequate service in remote rural areas such as the Highlands and Islands of Scotland, despite recent policy initiatives there. Problems of providing fire cover are particularly acute on isolated islands. The development of integrated risk management plans should offer a more fine grained approach to providing fire cover. However, they may be too sophisticated for the task in rural areas and more traditional democratic mechanisms for expressing perceived community needs may have a greater relevance

    Introduction to Security Onion

    Get PDF
    Security Onion is a Network Security Manager (NSM) platform that provides multiple Intrusion Detection Systems (IDS) including Host IDS (HIDS) and Network IDS (NIDS). Many types of data can be acquired using Security Onion for analysis. This includes data related to: Host, Network, Session, Asset, Alert and Protocols. Security Onion can be implemented as a standalone deployment with server and sensor included or with a master server and multiple sensors allowing for the system to be scaled as required. Many interfaces and tools are available for management of the system and analysis of data such as Sguil, Snorby, Squert and Enterprise Log Search and Archive (ELSA). These interfaces can be used for analysis of alerts and captured events and then can be further exported for analysis in Network Forensic Analysis Tools (NFAT) such as NetworkMiner, CapME or Xplico. The Security Onion platform also provides various methods of management such as Secure SHell (SSH) for management of server and sensors and Web client remote access. All of this with the ability to replay and analyse example malicious traffic makes the Security Onion a suitable low cost alternative for Network Security Management. In this paper, we have a feature and functionality review for the Security Onion in terms of: types of data, configuration, interface, tools and system management

    Competent Encryption Framework Based Secure Access Mechanism for Cloud Data Services

    Get PDF
    The demand for remote data storage and computation services is increasing exponentially in our data-driven society; thus, the need for secure access to such data and services. In this paper, we design a new -based authentication protocol to provide secure access to a remote (cloud) server. In the proposed approach, we consider data of a user as a secret credential. We then derive a unique identity from the user’s data, which is further used to generate the user’s private key. In addition, we propose an efficient approach to generate a session key between two communicating parties using for a secure message transmission. Session management in distributed Internet services is traditionally based on username and password, explicit logouts and mechanisms of user session expiration using classic timeouts. Emerging solutions allow substituting username and password with data during session establishment, but in such an approach still a single verification is deemed sufficient, and the identity of a user is considered immutable during the entire session. Additionally, the length of the session timeout may impact on the usability of the service and consequent client satisfaction. This paper explores promising alternatives offered by applying s in the management of sessions. A secure protocol is defined for perpetual authentication through continuous user verification. The protocol determines adaptive timeouts based on the quality, frequency and type of data transparently acquired from the user. The analysis is carried out to assess the ability of the protocol to contrast security attacks exercised by different kinds of attackers

    Reducing vulnerability among smallholder farmers through index-based flood insurance in India: equity matters

    Get PDF
    The Index-based Flood Insurance (IBFI) project, led by the International Water Management Institute (IWMI), aims to develop remote sensing products for IBFI that can accurately depict yield loss due to adverse weather and other disasters on smallholder farms. The overarching goal is to help smallholder farmers better manage their production risks and thereby help contribute to a more secure future for farmers in India. Once these remote sensing products are developed, tried and tested the team aim to ensure that they are scalable to enable them to be used effectively in large scale insurance schemes

    An Improved AMR AMI Approach for Metering & Energy Monitoring

    Get PDF
    The growing demand of e nergy in day to life has also increase the demand of momonitoring and managing it. So connectivity solution for smart metering address the challenge of liable, secure and robust communications for remote metering and home en ergy management , Enabling remote metering with Web connectivity is needed . In this pap er an AMR solution with standalone transceivers to complete systems - on - chip with 32 - bit ARM® core and embedded memory, supporting both sub - GHz frequencies (including 868/915MHz) and 2.4 GHz license - free frequency bands is discussed with other available solution

    A precipitation recycling network to assess freshwater vulnerability : challenging the watershed convention

    Get PDF
    Water resources and water scarcity are usually regarded as local aspects for which a watershed-based management appears adequate. However, precipitation, as a main source of freshwater, may depend on moisture supplied through land evaporation from outside the watershed. This notion of evaporation as a local "green water" supply to precipitation is typically not considered in hydrological water assessments. Here we propose the concept of a watershed precipitation recycling network, which establishes atmospheric pathways and links land surface evaporation as a moisture supply to precipitation, hence contributing to local but also remote freshwater resources. Our results show that up to 74% of summer precipitation over European watersheds depends on moisture supplied from other watersheds, which contradicts the conventional consideration of autarkic watersheds. The proposed network approach illustrates atmospheric pathways and enables the objective assessment of freshwater vulnerability and water scarcity risks under global change. The illustrated watershed interdependence emphasizes the need for global water governance to secure freshwater availability
    corecore