Configuration Management and Performance Verification of Explosives-Detection Systems

10.17226/6245 ◽  
1998 ◽  
2015 ◽  
Vol 24 (03) ◽  
pp. 1541001 ◽  
Author(s):  
Johannes Wettinger ◽  
Uwe Breitenbücher ◽  
Frank Leymann

Leading paradigms to develop, deploy, and operate applications such as continuous delivery, configuration management, and the merge of development and operations (DevOps) are the foundation for various techniques and tools to implement automated deployment. To make such applications available for users and customers, these approaches are typically used in conjunction with Cloud computing to automatically provision and manage underlying resources such as storage and virtual servers. A major class of these automation approaches follow the idea of converging toward a desired state of a resource (e.g. a middleware component deployed on a virtual machine). This is achieved by repeatedly executing idempotent scripts to reach the desired state. Because of major drawbacks of this approach, we discuss an alternative deployment automation approach based on compensation and fine-grained snapshots using container virtualization. We perform an evaluation comparing both approaches in terms of difficulties at design time and performance at runtime. Moreover, we discuss concepts, strategies, and implementations to effectively combine different deployment automation approaches.


2008 ◽  
Vol 1124 ◽  
Author(s):  
Gerald Hans Nieder-Westermann ◽  
Robert H. Spencer ◽  
Robert W Andrews ◽  
Neil Brown

AbstractThe Yucca Mountain repository combines multiple barriers, both natural and engineered, which work both individually and collectively to limit the movement of water and the potential release and movement of radionuclides to the accessible environment. Engineered structures, systems and components (SSCs) are designed to function in the natural environment utilizing materials chosen to perform their intended functions in order to meet the postclosure performance objectives. Similarly, the features of the natural environment are expected to respond to the presence of the repository through geomechanical, hydrogeologic and geochemical changes. At Yucca Mountain, specific features, both engineered and natural have been identified as requiring design control during repository construction and operations. The integration between design and postclosure safety analysis is facilitated using design control parameters. The term “design control parameters” includes functions and performance requirements allocated to SSCs through the design process, as well as the attributes of SSCs that are developed during design (e.g., dimensions; weights; materials; fabrication and quality-control processes; and operating conditions). These control parameters provide an interface between the design and the analyzed postclosure safety bases, which needs to be maintained through the licensing process. Maintenance of the design is controlled through configuration management and procedural safety controls. The design control parameters serve three key purposes. First, they identify key aspects of the design that serve as the design bases for the designers of the SSCs of the facility. Second, they provide a useful input to the analyses of relevant postclosure features, events and processes (FEPs) and are used to either exclude FEPs from the postclosure safety analysis or as an input to models of included FEPs in the safety analysis. Finally, they provide important controlled interface constraints between the design and safety analyses organizations that are amenable to configuration management. Several examples of such design controls will be presented in this briefing. The first type of design controls relates to the location of the underground facility, including standoffs from faults and the ground surface. The second type of design controls relates to the configuration of the engineered features including the spacing of emplacement driftsand drip shield dimensions and characteristics. A third type of design controls relates to constraints on handling, loading and emplacing waste forms in canisters and waste packages in the emplacement drifts.


Author(s):  
Zafar Sultan ◽  
Paul Kwan

In this paper, a hybrid identity fusion model at decision level is proposed for Simultaneous Threat Detection Systems. The hybrid model is comprised of mathematical and statistical data fusion engines; Dempster Shafer, Extended Dempster and Generalized Evidential Processing (GEP). Simultaneous Threat Detection Systems improve threat detection rate by 39%. In terms of efficiency and performance, the comparison of 3 inference engines of the Simultaneous Threat Detection Systems showed that GEP is the better data fusion model. GEP increased precision of threat detection from 56% to 95%. Furthermore, set cover packing was used as a middle tier data fusion tool to discover the reduced size groups of threat data. Set cover provided significant improvement and reduced threat population from 2272 to 295, which helped in minimizing the processing complexity of evidential processing cost and time in determining the combined probability mass of proposed Multiple Simultaneous Threat Detection System. This technique is particularly relevant to on-line and Internet dependent applications including portals.


2010 ◽  
Vol 2 (2) ◽  
pp. 51-67
Author(s):  
Zafar Sultan ◽  
Paul Kwan

In this paper, a hybrid identity fusion model at decision level is proposed for Simultaneous Threat Detection Systems. The hybrid model is comprised of mathematical and statistical data fusion engines; Dempster Shafer, Extended Dempster and Generalized Evidential Processing (GEP). Simultaneous Threat Detection Systems improve threat detection rate by 39%. In terms of efficiency and performance, the comparison of 3 inference engines of the Simultaneous Threat Detection Systems showed that GEP is the better data fusion model. GEP increased precision of threat detection from 56% to 95%. Furthermore, set cover packing was used as a middle tier data fusion tool to discover the reduced size groups of threat data. Set cover provided significant improvement and reduced threat population from 2272 to 295, which helped in minimizing the processing complexity of evidential processing cost and time in determining the combined probability mass of proposed Multiple Simultaneous Threat Detection System. This technique is particularly relevant to on-line and Internet dependent applications including portals.


Electronics ◽  
2020 ◽  
Vol 9 (4) ◽  
pp. 629 ◽  
Author(s):  
Junaid Arshad ◽  
Muhammad Ajmal Azad ◽  
Roohi Amad ◽  
Khaled Salah ◽  
Mamoun Alazab ◽  
...  

Internet of Things (IoT) forms the foundation of next generation infrastructures, enabling development of future cities that are inherently sustainable. Intrusion detection for such paradigms is a non-trivial challenge which has attracted further significance due to extraordinary growth in the volume and variety of security threats for such systems. However, due to unique characteristics of such systems i.e., battery power, bandwidth and processor overheads and network dynamics, intrusion detection for IoT is a challenge, which requires taking into account the trade-off between detection accuracy and performance overheads. In this context, we are focused at highlighting this trade-off and its significance to achieve effective intrusion detection for IoT. Specifically, this paper presents a comprehensive study of existing intrusion detection systems for IoT systems in three aspects: computational overhead, energy consumption and privacy implications. Through extensive study of existing intrusion detection approaches, we have identified open challenges to achieve effective intrusion detection for IoT infrastructures. These include resource constraints, attack complexity, experimentation rigor and unavailability of relevant security data. Further, this paper is envisaged to highlight contributions and limitations of the state-of-the-art within intrusion detection for IoT, and aid the research community to advance it by identifying significant research directions.


Sign in / Sign up

Export Citation Format

Share Document