SECURITY SYSTEMS IN HYDRAULIC MODELING AT THE DESIGN STAGE

2017 ◽  
Vol 9 (4) ◽  
pp. 58-62
Author(s):  
Svetlana Sazonova
Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8451
Author(s):  
Dmitry Levshun ◽  
Andrey Chechulin ◽  
Igor Kotenko

This paper describes an original methodology for the design of microcontroller-based physical security systems and its application for the system of mobile robots. The novelty of the proposed methodology lies in combining various design algorithms on the basis of abstract and detailed system representations. The suggested design approach, which is based on the methodology, is modular and extensible, takes into account the security of the physical layer of the system, works with the abstract system representation and is looking for a trade-off between the security of the final solution and the resources expended on it. Moreover, unlike existing solutions, the methodology has a strong focus on security. It is aimed at ensuring the protection of the system against attacks at the design stage, considers security components as an integral part of the system and checks if the system can be designed in accordance with given requirements and limitations. An experimental evaluation of the methodology was conducted with help of its software implementation that consists of Python script, PostgreSQL database, Tkinter interface and available for download on our GitHub. As a use case, the system of mobile robots for perimeter monitoring was chosen. During the experimental evaluation, the design time was measured depending on the parameters of the attacker against which system security must be ensured. Moreover, the software implementation of the methodology was analyzed in compliance with requirements and compared with analogues. The advantages and disadvantages of the methodology as well as future work directions are indicated.


2020 ◽  
Author(s):  
M.A. D’Avanzo ◽  
G.M. Contessa ◽  
G. Cocomello ◽  
M. Mattozzi ◽  
M. Pacilio ◽  
...  

Purpose. In this article, the authors propose useful operational indications to approach in the best possible way the issues concerning the design of a facility for manufacturing radiopharmaceuticals, with focus on organizational and safety aspects. Methods. Several documents produced by authoritative bodies, national and international scientific institutions and associations were examined and referenced, to the purpose of reviewing all available information in the field. Results. Indications are gathered for the design stage, including the organization of accesses and routes and characteristics and requirements of premises and systems. Conclusions. Main goal is to guide the reader in evaluating and choosing the most suitable features and equipment to limit the risks due to ionizing radiation and to prevent contamination of the workers and the environment.


2015 ◽  
Author(s):  
Ron Miller ◽  
Tracey Liberi ◽  
John Scioscia

2006 ◽  
Vol 34 (3) ◽  
pp. 170-194 ◽  
Author(s):  
M. Koishi ◽  
Z. Shida

Abstract Since tires carry out many functions and many of them have tradeoffs, it is important to find the combination of design variables that satisfy well-balanced performance in conceptual design stage. To find a good design of tires is to solve the multi-objective design problems, i.e., inverse problems. However, due to the lack of suitable solution techniques, such problems are converted into a single-objective optimization problem before being solved. Therefore, it is difficult to find the Pareto solutions of multi-objective design problems of tires. Recently, multi-objective evolutionary algorithms have become popular in many fields to find the Pareto solutions. In this paper, we propose a design procedure to solve multi-objective design problems as the comprehensive solver of inverse problems. At first, a multi-objective genetic algorithm (MOGA) is employed to find the Pareto solutions of tire performance, which are in multi-dimensional space of objective functions. Response surface method is also used to evaluate objective functions in the optimization process and can reduce CPU time dramatically. In addition, a self-organizing map (SOM) proposed by Kohonen is used to map Pareto solutions from high-dimensional objective space onto two-dimensional space. Using SOM, design engineers see easily the Pareto solutions of tire performance and can find suitable design plans. The SOM can be considered as an inverse function that defines the relation between Pareto solutions and design variables. To demonstrate the procedure, tire tread design is conducted. The objective of design is to improve uneven wear and wear life for both the front tire and the rear tire of a passenger car. Wear performance is evaluated by finite element analysis (FEA). Response surface is obtained by the design of experiments and FEA. Using both MOGA and SOM, we obtain a map of Pareto solutions. We can find suitable design plans that satisfy well-balanced performance on the map called “multi-performance map.” It helps tire design engineers to make their decision in conceptual design stage.


2017 ◽  
Vol 5 (1) ◽  
pp. 8-15
Author(s):  
Sergii Hilgurt ◽  

The multi-pattern matching is a fundamental technique found in applications like a network intrusion detection system, anti-virus, anti-worms and other signature- based information security tools. Due to rising traffic rates, increasing number and sophistication of attacks and the collapse of Moore’s law, traditional software solutions can no longer keep up. Therefore, hardware approaches are frequently being used by developers to accelerate pattern matching. Reconfigurable FPGA-based devices, providing the flexibility of software and the near-ASIC performance, have become increasingly popular for this purpose. Hence, increasing the efficiency of reconfigurable information security tools is a scientific issue now. Many different approaches to constructing hardware matching circuits on FPGAs are known. The most widely used of them are based on discrete comparators, hash-functions and finite automata. Each approach possesses its own pros and cons. None of them still became the leading one. In this paper, a method to combine several different approaches to enforce their advantages has been developed. An analytical technique to quickly advance estimate the resource costs of each matching scheme without need to compile FPGA project has been proposed. It allows to apply optimization procedures to near-optimally split the set of pattern between different approaches in acceptable time.


2017 ◽  
Vol 14 (1) ◽  
pp. 67
Author(s):  
Fadila Mohd Yusof ◽  
Azmir Mamat Nawi ◽  
Azhari Md Hashim ◽  
Ahmad Fazlan Ahmad Zamri ◽  
Abu Hanifa Ab Hamid ◽  
...  

Design development is one of the processes in the teaching and learning of industrial design. This process is important during the early stage of ideas before continuing to the next design stage. This study was conducted to investigate the comparison between  academic  syllabus  and  industry  practices  whether  these  processes  are  highly dependent on the idea generation and interaction related to the designer or to the student itself. The data were gathered through an observation of industry practice during conceptual design phase, teaching and learning process in academic through Video Protocol Analysis (VPA) method and interviews with industry practitioners via structured and unstructured questionnaires. The data were analysed by using NVivo software in order to formulate the results. The findings may possibly contribute to the teaching and learning processes especially in the improvement of industrial design syllabus in order to meet the industry demands. Keywords: design development, industrial design, industry demands


2020 ◽  
Vol 16 (6) ◽  
pp. 998-1012
Author(s):  
G.V. Fedotova ◽  
D.D. Tkachenko

Subject. The article discusses the modeling of preventive protection of IT systems and evaluates their cyber resilience. Objectives. The study evaluates the existing threats and determines how informatization processes may unfold in the credit segment. Methods. Research is based on methods of regulatory and legislative analysis. We evaluate today’s public administration of cybersecurity in the financial and credit sector. To give a view of the existing situation and sum up the sector’s performance for the recent years, we performed the content analysis of statistics on data hacking and leakages. Results. The article highlights new trends in the financial and credit sector and the growing complexity of data security systems. As proposed by the Bank of Russia, the integration of smart technologies is showed to reinforce the cybersecurity of banking systems. Conclusions and Relevance. The informatization of all banking operation systems, growing complexity of procedures and work logs require new robust resources to be integrated into financial technologies. Stronger cybersecurity should lay a trend in the financial and credit sector in the nearest future. The findings can be used to flag strategic milestones of the banking development in the information-driven society.


Sign in / Sign up

Export Citation Format

Share Document