The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the key issues of security is fast and accurate analyses of different threats in above ground and underground structures of different applications. Among the most dangerous threats, that may end with fatal and destructive results are fires and explosions. Modern threat identification systems must be quick-acting and reliable. The development of contemporary detection devices is oriented to...
Agents technology plays an important role in the development of many major service applications. However, balancing between the flexible features agents provide, and their vulnerability to many security oriented attacks are considered a great challenge. In this paper we review trust models that are proposed in the literature to provide trustworthiness and security to Multi Agent Systems (MAS). We...
In this article the features using the programming language Java ME to implement “smart home”. Examples of the use of the language for the computer Raspberry Pi and various sensors. The paper reviewed the principle of building of home automation system
This paper, firstly, based on a research on the forming process of public fire safety quality, the requirements of public fire safety education are studied. Secondly, based on the investigation and analysis of present situation, a desired administrative system required for efficient implementation of public fire safety education together with the enforcement mechanism based on a developed information...
Revision of the Criminal Procedure Law proposed higher requirement for normalization of the public security's law enforcement. How to adapt to the new requirements is a new question for the public fire agent which responsible for investigating the fire liability accident case. Based on the spirit of the Criminal Procedure Law's revision, combined with experience of fire liability accident case investigation,...
In recent years, extraordinary bad and bad chemical accidents caused by hazardous chemicals leak become frequent in China, but fire brigades are very short of pressure emergency leakage sealing test device and simulated training device for response. Shanghai Fire Research Institute of the Ministry of Public Security has developed a set of multi-functional pressure emergency leakage sealing test and...
A fire safety evaluation index system of underground parking area was proposed. To solve the problem of uncertainty in underground parking area fire safety assessment, the paper introduced D-S evidence theory and AHP to the assessment. The weights of each index were obtained by AHP and the quantitative value of the security level of each evaluation index was calculated using the D-S evidence theory...
Evaluation of reliability, availability and capability of electric supply is left to skill and expertise of single engineers. Standardizations of single line diagrams integrated with predicted immunity of fault common causes, thanks to a faults analysis, could help to save culture of strategic aspects, spread good practice in different industrial disciplines and sectors, constitute a tool to certificate...
The object of this work is to study and analyze the dependability of a real petrochemical system (TK102 storage system, GL1K complex, Skikda) based on experimental data. We use the dysfunctional analysis method FMEA (Failure mode, effects and criticality analysis). We give a real and detailed description of the system with a refined identification of different undesirable events. Then we apply the...
In order to solve the unreasonable fire control emergency rescue resources allocation based on local government's administrative level and improve the efficiency of the use of fire control emergency rescue resources, 9175 alarm receiving and summoning of Yunnan Fire Force of China in 2012 is analyzed by national fire statistics and management system. It shows that fire control emergency rescue resources...
Mine security detecting crawling robot is a kind of remote-controlled security detecting robot with multiple sensors, which can replace human work in such complex environments as special places of coal mines, undesirable conditions unaccessible to humans or disasters of fire, earthquake and mining. It can carry out medium range search, fixed-point detection, real-time data transmission in a remote...
The main contribution of this paper is to use an integrated approach to propose the model of strategic alliances for both heterogeneous property and casualty insurance companies and security companies, and propose the added seventh business functions “business expansion” with a value chain and contracting strategies associated with the value chain analysis to satisfy the consumer's integrated service...
This report describes an ongoing Russian research program, which aimed at development of a methodological framework for a nation-wide multi-hazard crisis management «system of systems» (SoS) for built environment. In addition to a currently available system of separate departmental legacy cyber systems, targeted, mainly, at disaster response and recovery only, the proposed SoS shall provide a shared...
Location and time are two critical aspects of most security-related events, and thus, spatiotemporal data analysis plays a central role in many security-related applications. The human brain has great capabilities of developing invariant representations of objects by taking advantage of both spatial similarity of features of objects/events and their relative timings (temporal information). Trace learning...
According to the specific demand of the construction of the information network confrontation defense system, this paper proposes a new network defense in-depth model of APR-WPDRRC based on closed-loop control mechanism. Since the model integrates variety of network defense in-depth new technology, it can achieve cooperation linkage and closed-loop control of quick pre-warning, active protection,...
With the deep research to the packet filtering technology, this paper designs the double filtering technology program combining NDIS intermediate driver filter technology with SPI interface filter technology. It implements the system architecture and function module for the mixed firewall, proposes the mixed protection method based on the combination of user and kernel mode, and uses database to achieve...
Application developers require cloud solutions that offer a highly scalable and secure development environment. Some Platform-as-a-Service (PaaS) solutions fail to meet the security requirements of developers, administrators, and final users in a satisfactory and flexible manner. While some providers do offer secure cloud solutions, users are obliged to redesign and adapt their applications in order...
Increasing deployment of computer systems in critical applications has made study and quantifiable analysis of these systems as an important issue. This analysis can either be done on real system or by developing analytic models. First approach is less desirable, since such an analysis is typically done in a post-facto manner after any problem has occurred. The modeling approach on the other hand,...
Based on in-depth analysis of the status of construction method of security evaluation index system and the operating system of special dangerous goods destruction, this paper obtained the purpose of safety evaluation index system and principles. At the same time, by improving the quantitative research of the traditional pre-hazard analysis (PHA), it created analysis mode of risk factors based on...
Deploying IPv6 in the enterprise network will increase the security issues since some of IPv6 features bring vulnerabilities. Thus, mitigating them with appropriate security policy is vital. By having attack scenario testing, it will expose network administrators to the IPv6 potential attack. For example, Bad ACK-Reset attack is used by an attacker to reset a new connection after exploiting network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.