The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of information technology, the computer has been more and more important in our lives. Especially it makes our working, learning and entertainments, and even consumptions dependent on the computer increasingly because of the popularity of network. However, the computer has brought us a lot of convenience, while it also makes us face with a variety of security risks. Computer...
In view of that the current security system cannot quickly respond to remote warning, a remonitoring system based on STM32 and GSM/GPRS technology was developed. The alarm signal is sent to the mailbox or the user's mobile phone. The actual application results show that the system is stable, fast to response, high in performance and may be widely used in the family and enterprise.
The conventional design of home security systems typically monitors only the property and lacks physical control aspects of the house itself. Also, the term security is not well defined because there is a time delay between the alarm system going on and actual arrival of the security personnel. This paper discusses the development of a home security and monitoring system that works where the traditional...
The outline of this paper is to implement real-time analysis and security monitoring in the smart power system. Security is the ability of the power system to withstand contingencies. The principal role of Wide Area Monitoring, Protection and Control (WAMPAC) system is to maintain a secure system state, i.e. the system that can withstand each specified contingency. The advanced WAM system uses real-time...
The rapid growth of broadband connections and home networks has created new application opportunities such as video streaming and remote health care. However, managing and securing the increasingly complicated home networks has remained a serious challenge for most home users who have little technical expertise to manage their home networks and connected devices. Towards this end, we will demonstrate...
The increasing safety-critical role of real-time systems requires increased attention to their security and reliability. Several recent studies have shown that parallel run-time monitoring of programs can significantly improve the security and reliability of computing systems. However, these techniques cannot be applied to real-time systems without first estimating their impact on worst-case execution...
Smart distribution grid is an important part of smart grid, which connects the main network and user-oriented supply. As an “immune system”, self-healing is the most important feature of smart grid. Major problem of self-healing control is the ‘uninterrupted power supply problem’, that is, real-time monitoring of network operation, predicting the state power grid, timely detection, rapid diagnosis...
Nowadays, many influential security-related facts are reported multiple times by different sources and in different languages. Therefore, in the recent years, the research on advancing event extraction technology shifted from classical single-document extraction toward cross-document information aggregation and fact validation. However, relatively little work has been reported on cross-lingual information...
In the past, control networks were completely isolated from exterior attack with the use of proprietary control protocols running on specialized hardware and software. Since then, TCP/IP based systems have made their way into the industrial control system. Control networks based on TCP/IP provide better connectivity and remote access capabilities, making the industrial control system vulnerable to...
For the existing problems of configuration software and the special requirements of mine security monitoring system, this paper presents the design of mine security monitoring configuration software platform composed of developing environment and running environment. It builds the software's general framework, analyzes the design method of picture configuration module, real-time database, I/O device...
This paper addresses the problem of security monitoring and situation awareness in very large interconnected transmission systems, with particular emphasis on the continental European grid. An innovative approach of situation adapted displaying of the operational state of a large network is proposed, which is based on state-of-the-art cognitive methods. This approach is able to be processed online...
Smart meter network is one of the backbone for modern power grid or smart grid. It is very critical to have the right technologies for the efficient operation of smart meter network. Smart meter network requibres the right bidirectional communications medium and interoperability capability. As thousands of meters will be interconnected to the distribution power network, it is vital to combine communications...
In order to make up for deficiencies in the current mine-security monitoring system, the paper proposes a mine-security real-time monitoring system based on 6LoWPAN. In the system, WSN achieves the direct access to the internet and does not need a specific gateway to fulfil the protocol conversion or the protocol bearing, and in the meanwhile WSN achieves the end-to-end communication with the Internet...
Due to the increased complexity of the power infrastructure and its growing dependence on information and communication technologies (ICT), the requirement to meet a high level of power system security has become a challenging issue. The heavy reliance on the ICT systems renders the entire infrastructure more vulnerable to information failures and malicious attacks. This paper analyses the impact...
With the advancement of sensor, communication and information technologies, Wide Area Monitoring, Protection and Control (WAMPAC) systems have been identified as the new generation of solutions to improve power system planning, operation and protection. There are a number of Southern California Edison (SCE) advanced initiatives that are related to the WAMPAC systems. Despite differences among various...
Critical infrastructure (CI) services are consumed by the society constantly and we expect them to be available 24 hours a day. A common definition is that CIs are so vital to our society that a disruption or destruction would have a severe impact on the social well-being and the economy on a national and an international level. CI sectors include, amongst others, the electricity, telecommunication,...
In this paper, we are proposing a four-layer enterprise architecture model for service management. The aim of the proposed architecture is to provide a framework for the automated, centralized, real-time enterprise service management solution. We developed a component model to address the functional requirements for different integrated service management functions.
Sensor networks are critical infrastructures for monitoring environmental variables, allowing evaluation of long-term trends and changes in the interaction of atmospheric, ecologic, and hydrologic processes. However, due to lack of coordination between large-scale environmental observation systems that have been set up around the globe, the wealth of information collected by sensor networks is not...
Keeping our ports and waterways safe from threats has become increasingly relevant. Hull and harbor infrastructure inspections are not performed regularly as they are time consuming, require careful planning and involve a huge amount of risk as well as human and monetary resources. An Autonomous Underwater Vehicle (AUV)-based approach will speed up operations and help locate and identify possible...
CTEEP - Transmissao Paulista actually operates 105 substations geographically distributed across Sao Paulo State. These substations are remotely operated by two Operating Centers - Transmission Operating Center (COT Centro de Operacao da Transmissao), Bom Jardim SP, and Back-end Operating Center (COR - Centro de Operacao Retaguarda), Cabreiiva SP. Through the years, CTEEP has been deploying its high...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.