The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Verification is a costly task, sometimes burdensome and tedious, requiring strong formal background. To reduce the effort and cost invested in verification, we developed a modeldriven approach for automatic verification of service properties, done in the early service design phase. Our approach is based on SEAM, a service modeling method, and it incorporates a verification system called Leon. With...
Large Forest Fires are one of the most destructive and recurring natural disaster types around the world, and year after year they leave environmental, material and human irreparable losses in the social nuclei in which they occur. To face them, it is essential to have a Situation Awareness that allows decisions making according to reality, promoting the collaboration between the all involved and...
During disasters, existing telecommunication infrastructures are often congested or even destroyed. In these situations, mobile devices can be interconnected using wireless ad hoc and disruption-tolerant networking to establish a backup emergency communication system for civilians and emergency services. However, such communication systems entail serious security risks, since adversaries may attempt...
With the spread of the Internet of Things (IoT) technologies, IoT devices such as sensors, appliances, or robots realize various Cyber-Physical Systems (CPSs) including remote monitoring, health care and home security in various environments. To realize advanced CPS which can adapt its behavior autonomously according to changes in the environment and user's demand, this paper proposes a MultiAgent-based...
Smart Home solutions are currently booming and apply to a variety of areas in order to improve inhabitants' quality of life. Many Smart Home solutions are based on service-oriented pervasive platforms providing context services. These services may correspond to devices (a lamp for instance) or to any computing unit providing useful functions (luminosity in a room for example). One of the big issues...
This paper discusses using the chosen systems of information support in dealing with emergencies and crisis situations of Fire Rescue System (FRS) Zlin Region. The first part of the article describes an organization FRS Zlin Region. In the next part are analyzed the selected information systems to support information components of Joint Rescue System (JRS). Subsequently, the selected information systems...
The main purpose of this manuscript is to make the banking process a completely automatic system, which will increase security features and at the same time increase the efficiency in the working of the banks to a great extent. The entire transaction system will be completely automatic, which will make the banking process much faster, thus saving the time of the customers and also making the system...
This paper presents a developed optimization technique based on moth-flame algorithm to determine the optimal placement and parameter setting of Static Synchronous Series Compensator (SSSC) for enhancing power system security under single line contingencies. A contingency analysis is performed on power system to determine the most severe line outage contingencies using performance index which based...
Subway has become one of main means of transportation all over the world. How to deal with sudden subway accident is the serious problem the whole world should face to. In view of subway security issues, choosing one of Beijing metro lines as the research example, building a warning index system include of 14 indexes such as fire warning ability, power system, etc. and using the neural network model...
Problems of safety and security follows the people whole civilization evolution. Nowadays, many kinds of safety or security exist. During the constitution each kind of safety or security, procedure was pragmatic and assigned. Practice overturns theory. Now, there is a time, when we are able to make generalization and also create the theory of safety and security. This theory should be applied for...
Nowadays, with the increasing promotion of Police law enforcement cooperation between the countries, the scale of the overseas master in police affairs is increasing year by year. Apart from criminal law enforcement procedures, administrative cases, community policing, police work mechanism, personnel appointment system and basic national conditions of the police and other professional knowledge and...
Market oriented methodologies have been extensively used for solving dynamic allocation problems in online systems including the Cloud. Despite their extensive use, very little has been known about their security against market specific security threats (e.g. monopoly, shill bidding, etc.). This work follows an experimental driven approach for: (i) promoting the development of threat-aware, market-oriented...
Data characteristics stored in the database evolve over the time. Nowadays, it is inevitable to store all states of the objects over the time. Paradigms of conventional database are based on managing actual states, which are inappropriate. Therefore, temporal approach has been developed. In this paper, we deal with our proposed temporal solution based on attribute level architecture, which can be...
In the contemporary perception, security has ceased to be a luxury in governments or businesses that are concerned with the safeguarding of their sensitive data and privacy. This is as a result of the unswerving emergence of the niggling security threats which are found in dynamic IT systems. The primary purpose of this project is to scrutinize the effect that cyber-attacks has on acute infrastructure...
In this paper, we applied CSMA (Carrier Sense Multiple Access) with infrared communication on leader-follower robot system via hierarchical communication. We define a simple protocol for communication between robots in the system. A home security system with many security modules installed in a house and a group of leader-follower mobile robots in charge of patrolling and monitoring was simulated...
Data anonymization is required before a big-data business can run effectively without compromising the privacy of personal information it uses. It is not trivial to choose the best algorithm to anonymize some given data securely for a given purpose. In accurately assessing the risk of data being compromised, there needs to be a balance between utility and security. Therefore, using common pseudo microdata,...
Many accidents due to short circuits, gas leakages, etc. will not allow an ordinary person to enter the accident area so as to reduce further damage1. Such accidents are increasing day-to-day due to lack of awareness, precautionary measures and ignorance. This paper presents an intelligent security system useful for most of the home and industry applications by using remote controlling techniques...
The paper presents a new component for conventional video monitoring and security systems in air transportation, aiming at improving the overall system performance, eliminate nuisance alarms, optimize network bandwidth and systems storage occupation. Innovative analysis technologies were employed for the development of the new system. The proposed solution relies on a server application referred to...
The preparation of evacuation plans for public buildings and the related training is mandated by law in many countries. The traditional approaches for providing people with the correct emergency information tend to be based on long, written instructions, posted on doors and walls that are not necessarily read by occupants and on evacuation drills that are costly, rarely performed and focused on specific...
The tax change from business tax to Value Added Tax in transportation enterprise in 2013, which is undoubtedly a good opportunity for the future of transportation enterprise's development, but this requires transportation enterprise must be accurately calculating transportation cost. From 10 road long-distance bus terminals in Beijing and Luoyang, we found that transportation cost was not accounted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.