5 research outputs found

    Real Time Face Detection and Recognition: Overview and Suggested Approach

    Get PDF
    This paper presents the detailed analysis of the existing state-of-the-art real time face detection and recognition approaches and a possible solution to the identified problems. The analysis covers the face detection, pattern recognition and measurement of facial part. The analysis of the Viola-Jones is followed by a possible model approach. This approach is based on a combination of techniques and algorithms working on Viola–Jones object detection platform

    Control System Security: An Issue

    No full text
    Through this paper we have an inclination to apprehend 2 questions: (1) Why ought to we have a tendency to have an interest within the security of control systems? And (2) What are the new and essentially totally different necessities and issues for the protection of control systems? We have a tendency to additionally propose a novel mathematical framework to investigate attacks against control systems. At times, this framework has a tendency to formulate specific analysis issues to (1) find attacks, and (2) survive attacks.

    Resilient Designs of Control Systems: Analysis and Review

    No full text
    Since digital management systems were introduced to the market quite thirty years past, the operational potency and stability gained through their use have fueled our migration and supreme dependence on them for the observance and management of important infrastructure. Whereas these systems are designed for practicality and responsibility, a hostile cyber setting and uncertainties in advanced networks and human interactions have placed further parameters on the expectations for management systems

    Industrial Control System Cyber Security: Review & Recommendations

    No full text
    Through this paper, the need of utilization of hybrid modeling for the development and sustenance of technologies for cyber threats on Industrial Control Systems (ICS) is indicated. In this paper, the review of the existing security systems and the challenges faced by them is portrayed; followed by the recommendations addressing those issues is provided. Later, the description of Virtual Control System Environments (VCSE) is provided which Sandia has implemented

    Fuzzy Logic based Controller for Power Transformer Protection

    No full text
    Power transformers are imperative elements of power system. So it is substantial to evade any mal-operation of required protective system. For many years, differential protection has been used as the primary protection of power systems. It comprises the differential relay, which operate for all internal fault types of power transformer and block due to inrush current. The major disadvantage of the branch of differential protection relays, its potential malfunction resulting from transient inrush current that flows when the transformer is energized. This paper presents a novel technique of relaying algorithm which enhances the fault detection methodology of the orthodox techniques by using fuzzy logic. The proposed relaying technique depends on the principle of harmonic-current restraint. In this method the magnetizing-inrush current is categorized by large 2nd harmonic contents.
    corecore