276,692 research outputs found

    Traffic Sign Recognition System

    Get PDF
    The research group CAOS at the Computing Department of the Carlos III University of Madrid, Spain, offers an efficient recognition system for traffic signs using a set of classifiers. This system can be used as part of an active security system in cars. The fact that the system is based on a set of classifiers facilitates a distributed implementation, resulting in cheaper hardware and an improvement in fault-tolerance.Contrato Programa de Comercialización e Internacionalización. Sistema Regional de Investigación Científica e Innovación Tecnológica. (Comunidad de Madrid; Universidad Carlos III de Madrid

    Information Security Risk Management with Octave Method and ISO/EIC 27001: 2013 (Case Study: Airlangga University)

    Get PDF
    Airlangga University has implemented ISO 27001: 2013 in asset-based information security governance, covering information assets, software assets, hardware assets, and human resources assets. However, many vulnerabilities in university computing systems can not be mitigated properly, as evidenced by the continued hacking of university computing systems. It shows that the results of hacking tests on university computing systems are not identified in more detail and are not included in university risk management. The purpose of this research is to build a university information security risk management framework using OCTAVE method based on ISO / EIC 27001: 2013. This research uses the OCTAVE framework to build a risk management framework model. The measurement method will be done by qualitative method to measure the severity and the likelihood of each asset and quantitative method to measure the potential loss on the cost of each asset. The results of this research are expected to provide an information security risk management framework, so that the vulnerability and financial lost analysis of each asset can be a risk, and risk mitigation plans on each asset may consider vulnerability and return of investmen

    RFID-Based Inventory and Security System

    Get PDF
    During the last decades, the technology of Radio Frequency Identification (hereafter RFID) has been widely used for practical functions in different disciples including; air industry, military, library services, health services, sports, security and many other fields. Within the industry, RFID has been utilized for various functions such as: storing security, personnel and vehicle access/tracking, production and inventory tracking, bagging, delivery and logistics. In this research, a prototype of inventory and security system for the devices and equipment in university labs is implemented. The system uses RFID technology, which is a form of wireless communication that is used to identify tagged objects by a reader. Both hardware and software implementation of the system are described in this paper. Keywords: RFID, Inventory system, RFID Implementation

    THE USE OF ICT FOR SECURITY AND THEFT PREVENTION IN TWO UNIVERSITY LIBRARIES IN NIGERIA

    Get PDF
    The study investigated the use of ICT for security and theft prevention in two university libraries in Nigeria. Population of the study is made up of 80 library staff of the two universities, 40 library staff from Umaru Musa Yar’adua University, Katsina and 40 library staff from Al-Qalam University Katsina. Five research questions guided the study. The data was analyzed with the use of simple statistical tools like frequencies and percentages. Findings of the study revealed that maximum security in the libraries will prevent theft mutilation. It also revealed that a video surveillance system working in conjunction with a barcode and magnetic book control system could help prevent book theft and monitor the move of books and other resources as it moves from one user to another. Lack of literate or skilled personnel: libraries and information Centre’s lack skilled personnel that can operate, teach and instruct the use of these telecommunication security systems even when they are made available in the library. Poor power supply: These telecommunication security systems or devices need electricity to power them and due to the poor power supply, these systems often time are not working and as such are incapable of performing their expected task of securing the library and its collection. Hardware and software failure: This is major threat to the use of telecommunication security system in the library. When there is software failure or hardware breakdown that may require the need for an engineer who may not be available to put them in place as at when due, then the library system and its collections is at risk. Based on the findings of the study, it was recommended that the librarian and information experts should take out time to educate their parent organization on the benefits associated with libraries and information Centre’s in the use of telecommunication security systems and devices so that the library parent body can release adequate fund which will be used for the purchase of telecommunication security devices in the librar

    Integration of UAVS with Real Time Operating Systems and Establishing a Secure Data Transmission

    Get PDF
    Indiana University-Purdue University Indianapolis (IUPUI)In today’s world, the applications of Unmanned Aerial Vehicle (UAV) systems are leaping by extending their scope from military applications on to commercial and medical sectors as well. Owing to this commercialization, the need to append external hardware with UAV systems becomes inevitable. This external hardware could aid in enabling wireless data transfer between the UAV system and remote Wireless Sensor Networks (WSN) using low powered architecture like Thread, BLE (Bluetooth Low Energy). The data is being transmitted from the flight controller to the ground control station using a MAVlink (Micro Air Vehicle Link) protocol. But this radio transmission method is not secure, which may lead to data leakage problems. The ideal aim of this research is to address the issues of integrating different hardware with the flight controller of the UAV system using a light-weight protocol called UAVCAN (Unmanned Aerial Vehicle Controller Area Network). This would result in reduced wiring and would harness the problem of integrating multiple systems to UAV. At the same time, data security is addressed by deploying an encryption chip into the UAV system to encrypt the data transfer using ECC (Elliptic curve cryptography) and transmitting it to cloud platforms instead of radio transmission

    Data Protection and Packet Mode in the Distributed Information Measurement and Control System for Research in Physics

    Get PDF
    The present paper is devoted to creation of cryptographic data security and realization of the packet mode in the distributed information measurement and control system that implements methods of optical spectroscopy for plasma physics research and atomic collisions. This system gives a remote access to information and instrument resources within the Intranet/Internet networks. The system provides remote access to information and hardware resources for the natural sciences within the Intranet/Internet networks. The access to physical equipment is realized through the standard interface servers (PXI, CАМАC, and GPIB), the server providing access to Ethernet devices, and the communication server, which integrates the equipment servers into a uniform information system. The system is used to make research task in optical spectroscopy, as well as to support the process of education at the Department of Physics and Engineering of Petrozavodsk State University

    The Secure Program: Safety Enhanced Communities Utilizing Resident Endeavors - Final Report

    Get PDF
    This report describes a collaborative project between the Illinois Housing Development Authority (IHDA) and the Center for Urban Research and Learning (CURL) at Loyola University Chicago. The project, entitled Safety Enhanced Communities Utilizing Resident Endeavors (SECURE), is designed to evaluate the effectiveness of physical security improvements in affordable housing developments. The project began in August of 1997 and was completed in December of 1998. The focus of the SECURE program was to address the growing security needs and concerns among residents who live in transitional neighborhoods with relatively high crime rates. The SECURE project studied four affordable housing developments in the Chicago area. The housing developments that participated in the program were The Pines of Edgewater, Northpoint, Diversey Square, and Park Apartments. IHDA selected the participating developments based on location, ability to implement the program, neighborhood characteristics, and management capacity. The four developments are geographically dispersed throughout Chicago and each is situated in a unique neighborhood setting. Each development submitted a proposal describing the security concerns at the property and how they planned to address these problems. In addition, the developments were to create a local partnership including the active participation of residents, the integration of local community policing strategies (CAPS), and the collaboration with an existing neighborhood organization to promote safety. In return, IHDA provided funding for physical security improvements at each of the four participating developments. The security upgrades included hardware, such as lighting, fencing, metal doors, and monitoring equipment. The total grant amounts to $435,000, serving a total of 885 units. CURL’s responsibility was to conduct a comprehensive research evaluation of the SECURE program. The evaluation determined the impact of the security improvements in creating a safer environment and reducing residents’ fear of crime
    corecore