security control
Recently Published Documents


TOTAL DOCUMENTS

524
(FIVE YEARS 177)

H-INDEX

20
(FIVE YEARS 5)

2022 ◽  
Vol 6 (1) ◽  
pp. 100-108
Author(s):  
Husna Amiliansyah ◽  
Mia Galina ◽  
Joni Welman

Smartphone technology can be applied not only to establish communication needs but also to support other purposes. One of them is related to personal safety and security functions. It is undeniable that criminal acts can occur anytime and anywhere. Even in a private or residential area, theft could happen. Smartphone and sensor technology can be used as a solution to encounter this problem. In this case, it can be utilized to improve the security control system of the gate or garage door at home. This research presents a prototype of a gate and garage door control and security system that operates through an application on an android smartphone. The application of HC-05 Bluetooth is used to send signals from the smartphone to the Arduino Uno microcontroller, while the micro servo acts as a locking mechanism on the gate itself. The buzzer function is presented to notify homeowners when the gate or garage door is open for more than 15 seconds. This prototype can control gates and garage doors with an average connection time of only about 5 seconds. Thus, this prototype is feasible to use as an alternative to control and improve housing security systems.


2021 ◽  
Author(s):  
Zhaoyang Cuan ◽  
Dawei Ding ◽  
Heng Wang

Abstract This paper is concerned with the event-based control problem for nonlinear cyber-physical systems (CPSs) with state constraints. A novel security control strategy consisting of a self-triggered mechanism is developed to decrease the network communication loads to the most extent on the basis of ensuring system safety and stability. The maximum capability of the designed self-triggered mechanism to resist denial-of-service (DoS) attacks occurring in controller-actuator (C-A) and sensor-controller (S-C) channels synchronously is also analyzed. In particular, we prove that the security control strategy guarantees the system safety and stability without resulting in Zeno behavior. Finally, a numerical example is provided to demonstrate the prominent effectiveness and the advantages over the existing results.


Agronomy ◽  
2021 ◽  
Vol 11 (12) ◽  
pp. 2529
Author(s):  
Renata Retkute ◽  
Rebekah G. K. Hinton ◽  
Keith Cressman ◽  
Christopher A. Gilligan

The desert locust remains a major threat to global food security. Control operations are a crucial tool to manage crisis; this research investigated the nature of control operations conducted between 2019–2021. Historical data on desert locust and control operations were obtained from the survey reports at the FAO Locust Hub and analysed with respect to survey reports, land cover types, cropland/rangeland extent and crop productivity data. We found that 16.1% of the grid cells with locust presence and 14.9% of the grid cells with control operations had a proportion of rangeland higher than 0.75; while 13.3% of the grid cells with locust presence and 13.2% of the grid cells with control operations had a proportion of croplands higher than 0.75, highlighting that locust presence and control operations were reported in both rangeland and cropland. Control operations continue to be used both to reduce overall locust numbers and to protect crops. Furthermore, through identifying which crops were most at risk, our analyses indicate that wheat production was under the highest strain during periods of increased locust infestations.


PLoS ONE ◽  
2021 ◽  
Vol 16 (12) ◽  
pp. e0258627
Author(s):  
Ling Sun

The Monitoring and Analysis Centre for the fight against money laundering is a valid financial information body which is responsible for collecting, analysing and providing financial information and conducting international exchanges of financial information for relevant undertakings. By constructing the analysis of the monitoring of the local and foreign currency and of the data transmission subsystem in the plan for the transitional period against In the light of the above, the Commission will continue to monitor the implementation of the acquis in the light of the progress made in implementing the acquis future new systems. The purpose of this paper is to study the research and implementation of the security control of the anti-money laundering monitoring and analysis system. This article studies the application of decision tree analysis technology in the anti-money laundering monitoring system of insurance companies to achieve the purpose of improving the anti-money laundering monitoring technology and capabilities of insurance companies. The emergence of data mining technology provides a new system solution for anti-money laundering monitoring. For insurance anti-money laundering, how to find potential money laundering cases in suspicious and large surrender transactions is key. The experimental data show that the decision tree method is the best predictor of the customer category between the insurance application and the surrender days. The decision tree analysis technology has greatly improved the security monitoring capabilities of the insurance in the anti-money laundering monitoring system. Experimental data shows that the security control capabilities of the anti-money laundering monitoring and analysis system make the accuracy of the entire model reach 95%, the accuracy of large and suspicious transactions reaches 88.6%, and the correct classification of customers is about 99.6%.


Author(s):  
Renata Retkute ◽  
Rebekah G.K. Hinton ◽  
Keith Cressman ◽  
Christopher A. Gilligan

The desert locust remains a major threat to global food security. Control operations are a crucial tool to manage crisis; this research investigated the nature of control operations conducted between 2019-2021. Historical data on desert locust and control operations were obtained from the survey reports at the FAO Locust Hub and analysed with respect to survey reports, land cover types, cropland/rangeland extent and crop productivity data. We found that 16.1% of the grid cells with locust presence and 14.9% of the grid cells with control operations had a proportion of rangeland higher than 0.75; while 13.3% of the grid cells with locust presence and 13.2% of the grid cells with control operations had a proportion of croplands higher than 0.75, highlighting that locust presence and control operations were reported in both rangeland and cropland. Control operations continue to be used both to reduce overall locust numbers and to protect crops. Furthermore, through identifying which crops were most at risk, our analyses indicate that wheat production was under the highest strain during periods of increased locust infestations.


Author(s):  
Renata Retkute ◽  
Rebekah G.K. Hinton ◽  
Keith Cressman ◽  
Christopher A. Gilligan

The desert locust remains a major threat to global food security. Control operations are a crucial tool to manage crisis; this research investigated the nature of control operations conducted between 2019-2021. Historical data on desert locust and control operations were obtained from the survey reports at the FAO Locust Hub and analysed with respect to survey reports, land cover types, cropland/rangeland extent and crop productivity data. We found that 16.1% of the grid cells with locust presence and 14.9% of the grid cells with control operations had a proportion of rangeland higher than 0.75; while 13.3% of the grid cells with locust presence and 13.2% of the grid cells with control operations had a proportion of croplands higher than 0.75, highlighting that locust presence and control operations were reported in both rangeland and cropland. Control operations continue to be used both to reduce overall locust numbers and to protect crops. Furthermore, through identifying which crops were most at risk, our analyses indicate that wheat production was under the highest strain during periods of increased locust infestations.


2021 ◽  
Vol 13 (11) ◽  
pp. 283
Author(s):  
Michael Alicea ◽  
Izzat Alsmadi

Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control roles added to the firewall that will control network traffic. In this paper, we evaluated recent research trends and open challenges related to firewalls and access controls in general and misconfiguration problems in particular. With the recent advances in next-generation (NG) firewalls, firewall roles can be auto-generated based on networks and threats. Nonetheless, and due to the large number of roles in any medium to large networks, roles’ misconfiguration may occur for several reasons and will impact the performance of the firewall and overall network and protection efficiency.


Sign in / Sign up

Export Citation Format

Share Document