International Journal of Safety and Security Engineering
Latest Publications


TOTAL DOCUMENTS

512
(FIVE YEARS 206)

H-INDEX

8
(FIVE YEARS 2)

Published By Witpress

2041-904x, 2041-9031

2021 ◽  
Vol 11 (6) ◽  
pp. 635-640
Author(s):  
Hamid Ech-Cheikh ◽  
Saâd Lissane El Haq ◽  
Abdessamad Douraid

2021 ◽  
Vol 11 (6) ◽  
pp. 663-669
Author(s):  
Gaofeng He ◽  
Bingfeng Xu

State/Event Fault Tree (SEFT) can be used for safety modeling and assessment. However, SEFT does not provide adequate semantics for analyzing the minimal scenarios leading to system failures. In this paper, we propose a novel qualitative analysis method for SEFT based on interface automata. Firstly, we propose the concept of guarded interface automata by adding guards on interface automata transitions. Based on this model, we can describe the triggers and guards of SEFT simultaneously. Then, a weak bisimilarity operation is defined to alleviate the state space explosion problem. Based on the proposed guarded interface automata and the weak bisimilarity operation, the semantics of SEFT can be precisely determined. After that, a qualitative analysis process is presented on the basis of the formal semantics of SEFT, and the analyzing result is the minimal cut sequence set representing the causes of system failures. Finally, a fire protection system case study is illustrated step by step to demonstrate the effectiveness of our method.


2021 ◽  
Vol 11 (6) ◽  
pp. 703-711
Author(s):  
Anuja Jana Naik ◽  
Gopalakrishna Madigondanahalli Thimmaiah

Detection of anomalies in crowded videos has become an eminent field of research in the community of computer vision. Variation in scene normalcy obtained by training labeled and unlabelled data is identified as Anomaly by diverse traditional approaches. There is no hardcore isolation among anomalous and non-anomalous events; it can mislead the learning process. This paper plans to develop an efficient model for anomaly detection in crowd videos. The video frames are generated for accomplishing that, and feature extraction is adopted. The feature extraction methods like Histogram of Oriented Gradients (HOG) and Local Gradient Pattern (LGP) are used. Further, the meta-heuristic training-based Self Organized Map (SOM) is used for detection and localization. The training of SOM is enhanced by the Fruit Fly Optimization Algorithm (FOA). Moreover, the flow of objects and their directions are determined for localizing the anomaly objects in the detected videos. Finally, comparing the state-of-the-art techniques shows that the proposed model outperforms most competing models on the standard video surveillance dataset.


2021 ◽  
Vol 11 (6) ◽  
pp. 671-682
Author(s):  
Lokanna Kadakolmath ◽  
Umesh D. Ramu

Nowadays interest in Smart Mass Transit Rail has grown-up to a large extent in a metropolitan area as the need for urban mobility has increased steadily. The reliability of software being used in such mass transit rail is crucial for us, specifically when software crashes may lead to catastrophic loss of human life and assets. For example, when we travel by metro it is essential for us that the interlocking system software controlling the metros are accurate so collisions and derailment are prevented. The reliability and safety of such interlocking systems are made on the precise functional requirements specification and verification respectively. Therefore, the precise functional requirements specification and verification of such interlocking systems represent a challenge in an active research area, so in this paper, we survey various articles in this field and discuss their consequences.


2021 ◽  
Vol 11 (6) ◽  
pp. 653-661
Author(s):  
Preetha Shivanna ◽  
Sheela Samudrala Venkatesiah

In the current era, it is necessary to device authorization and authentication techniques to secure resources in information technology. There are several methods to substantiate authorization and authentication. User authentication is essential for authenticating user access control in WSNs. Biometric recognition error, lack of anonymity and vulnerability to attacks, user verification problem, revocation problem and disclosure of session key by the gateway node are some of the security flaws encountered. In this study, a Multimodal Authentication Scheme for Wireless Sensor Networks (WSN-MAS) is proposed to authenticate legitimate users. The main objective is the fusion of fingerprint and iris biometric features at feature level to enable additional accuracy to verify and match user identity with stored templates. In this paper, multimodal biometric features are used for authentication to improve performance, reduce system error rates to achieve better security in WSN.


2021 ◽  
Vol 11 (6) ◽  
pp. 691-696
Author(s):  
Halil Dertli ◽  
Didem Saloglu

The emission estimations for vinyl acetate from storage tanks located in Dilovasi and Yumurtalik, Turkey, were completed by using the US EPA standard regulatory storage tanks emission model (TANKS 4.9b). Total annual emission was determined to be 7,603.15 kg/year for Yumurtalik and 6,057.06 kg/year for Dilovasi. In addition, ALOHA software was used in order to define emergency responses required in the case of vinyl acetate leakage based on different scenarios. According to ALOHA program modelling results, the threat regions occurred were 113 and 236 m for the red threat region, 299 and 663 m for the orange threat region, and 790 m and 2.0 km for the yellow threat region for vinyl acetate toxic vapour in Dilovasi and Yumurtalik, respectively. The threat regions determined were 10 and 15 m for the red threat region, 9.14 m for orange threat region, and 20 and 49 m for the yellow threat region for modelling of flammable area for the vapour cloud of vinyl acetate in Dilovasi and Yumurtalik, respectively. The amount of thermal radiation was determined to be 10 kW/m2 at a distance of 9.96 m from the tanks in both Dilovasi and Yumurtalik during a jet fire.


2021 ◽  
Vol 11 (6) ◽  
pp. 697-702
Author(s):  
Seerwan Waleed Jirjees ◽  
Ahmed Raoof Nasser ◽  
Ali Majeed Mahmood

The security of a PIN is largely supported by the authentication process in ATM. Most authentication methods like traditional are based on using PIN as direct entry and this technique has been shown lots of drawbacks such as vulnerability to password space, and shoulder-surfing. In this paper, a new approach is proposed called RoundPIN depends on the appearance of the numerical password through one of the buttons after selecting it by the user and it is done through a number of rounds, the numbers are arranged randomly on the keypad. Due to the variable aspect of the chosen button and the random appearance of the numbers in each connection session and also the selection process will take place through three buttons three auxiliary, the proposed approach can maintain high secure session to enter the PIN to resist shoulder surfing, which is difficult for attackers to observe a user's PIN. The performance evaluation of the proposed approach is achieved in two parts, the first one is based on security analysis. Then a pilot study of thirty users is conducted to evaluate the useability of the proposed approach. It is noticed that the proposed approach can maintain a high level of security as well as acceptable level of useability and user satisfaction compared the conventional keypad system.


2021 ◽  
Vol 11 (6) ◽  
pp. 623-634
Author(s):  
Majeed Mattar Ramal ◽  
Uday Hatem Abdulhameed ◽  
Arkan Dhari Jalal

2021 ◽  
Vol 11 (6) ◽  
pp. 713-719
Author(s):  
Oleg Illiashenko ◽  
Valeriy Mygal ◽  
Galyna Mygal ◽  
Olga Protasenko

The integration of information and industrial technologies, digitalization and differentiation of sciences are accompanied by an increase in various types of complexity. This limits the capabilities of computer modelling, data mining, and predictive analytics. The increasing cognitive complexity of information flows and their diversity creates problems of safety, reliability and stability of the functioning of a complex dynamic system in extreme conditions. Here we show the possibility of cognitive visualization of signals of different nature through their geometrization in the form of a topological 3D model of functioning. Its projections are spatio-temporal signatures, the configurations of which reflect the dynamic, energetic and structural features of the model. An increase in the number of components of the signature configuration and its area under external influence indicates an increase in structural and functional complexity. Therefore, the signal structure can be analyzed in real time using complementary probabilistic and deterministic methods. A set of tools for the synthesis and analysis of 3D models has innovative potential for monitoring the functioning of elements of complex dynamic systems, risk management and predictive analytics.


2021 ◽  
Vol 11 (6) ◽  
pp. 683-689
Author(s):  
Oleksandr Polishchuk ◽  
Yulia Bobrova ◽  
Yuriy Bobrov

Today, the issue of creating conditions for homeland security is relevant, under which any socio-economic system can be comfortable and is not threatened by the negative influence of any external and internal factors. The main purpose of the study is to form a methodological approach to the formation of an appropriate defense ecosystem in the context of ensuring homeland security. To achieve this goal, we applied analysis and synthesis methods to study the current state of the homeland security level and the methodology for the formation of the IDEF0 functional model to represent the proposed defense ecosystem. The methodological approach can have the practical importance for state structures dealing with the issue of ensuring homeland security. The result of the study was the formation of a decomposition of the first, second and third levels of the functional model of the defense ecosystem in the context of ensuring homeland security. The article has limitations which are associated with the choice of the security system of Ukraine, since in the context of a pandemic, it was difficult to gain access to information from other countries. In the future, the proposed methodological approach is planned to be applied to the homeland security systems of other countries.


Sign in / Sign up

Export Citation Format

Share Document