Nowadays, the Intruder Alarm system is commonly used to protect the life, health and the possession of people in big companies. However, these systems have limited options for managing and remote control. This lack is very often criticized by big companies which want to use the Intruder Alarm System with other applications like Access and Attendance control. The aim of this article is to design a Control and Indicating Equipment which can be implemented into commercially made Personal Computer as expansion card. The designed card provides the main function of the Intruder Alarm system which can be further extended by other applications. The system consists of external communication like Universal Serial Bus, Ethernet and General Packet Radio Service interface. Each individual part of the system is driven by a single microcontroller ATmega328P which can handle communication and evaluation of the current state obtained by devices connected to it. The design can offer all alarm and non-alarm visualization of smart control like irrigation, lights control, audio system, etc. The whole design is driven by the proper standardization and the design consists of every schematic which comes with the explanation
Feature Analysis of Estimated Causes of Failures in Medical Device Software a...
Background/Objectives
<research>
•383 medical device software failures from 1983 to 1997 are analyzed in “FAILURE MODES IN MEDICAL DEVICE SOFTWARE:AN ANALYSIS OF 15 YEARS OF RECALL DATA” (DOLORES R. WALLACE1 and D. RICHARD KUHN, 2001)
•Medical devices are getting more and more relying on software.
<objectives>
•Analyze 86 medical device software failures in FY 2010 and identify the change of the trend of failure causes from the former analysis
•Confirm whether the International standard issued in 2006, IEC 62304 (Medical device software - Software life cycle processes), is effective to new failure causes or not.
Future Trends of Embedded Systems - Technical Paper Presentation
Runner-Up for the State Level Technical Paper Presentation
Certification: Indian Society for Technical Education
More Details on https://www.kaushikgupta.in
IRJET- Intelligent Traffic Management for Ambulance and VIP Vehicles
An online knowledge base and searchable FAQ database.
2. Support Forum: An online community where you can post questions and get answers from Keil engineers and other users.
3. Support Requests: Submit a request directly to our technical support team.
4. Documentation: Download manuals, data sheets, application notes and more.
5. Training: Learn about our training options, both online and classroom.
6. Updates: Check for the latest software updates and service packs.
7. Contact Us: Email, phone or fax contact information for technical support.
We hope you find these resources helpful. Please let us know if there is any other way we can assist you.
This document describes an IoT-based classroom automation system that allows teachers to remotely control devices in the classroom using a mobile application. The system uses NodeMCU microcontrollers connected to sensors and appliances via relays to enable on/off control. An ultrasonic sensor detects human presence. Commands sent from the mobile app via WiFi are received by the NodeMCU which controls the relays. This allows automation of lighting, A/C, and other devices for improved energy efficiency, convenience and security while providing remote classroom monitoring capabilities.
Home Security System and Door Access Control Based on Face Recognition
This document summarizes a research paper on a home security system using face recognition for door access control and motion detection for intruder alerts. The system uses a Raspberry Pi board to run algorithms for face recognition using PCA for authentication at the door. It also processes video frames from a webcam to detect intruders based on differences between frames. If an intruder is detected, the system automatically sends an alert email to the local police station. The system operates on battery power and wireless internet for remote monitoring. It provides effective home security with low power consumption compared to other existing systems.
Design of Interface Board for Medical Kiosk Based on Off-The-Shelf Platform
This document describes the design of an interface board for a medical kiosk that integrates different commercial off-the-shelf medical modules. The interface board combines measurement results from modules that measure vital signs like blood oxygen saturation, blood pressure, blood glucose, temperature, etc. and transfers the data via a kiosk application to cloud software. The interface board hardware design integrates modules using an ARM microcontroller. The firmware collects data from each module via drivers and sends it to a PC application through a graphical user interface. The design was tested by measuring various health parameters of a subject to validate the integrated system.
A Defense-in-depth Cybersecurity for Smart SubstationsIJECEIAES
The increase of cyber-attacks on industrial and power systems in the recent years make the cybersecurity of supervisory control and data acquisition and substation automation systemsa high important engineering issue. This paper proposes a defense in depth cybersecurity solution for smart substations in different layers of the substation automation system. In fact, it presents possible vulnerabilities in the substation automation system and propose a multiple layer solution based on best practice in cyber security such as the hardening ofdevices, whitelisting, network configuration, network segmentation, role-based account management and cyber security management and deployement.
IRJET- Development of Data Transmission using Smart Sensing Technology for St...IRJET Journal
This document describes a new method for data transmission using smart sensing technology for structural health monitoring. The proposed method includes two coding stages: 1) source coding to compress redundant information in structural health monitoring signals and 2) redundant coding to inject artificial redundancy to enhance transmission reliability over wireless sensors. The method is implemented on an Imote2 smart sensor platform and tested on a cable-stayed bridge, showing it can withstand up to 30% data loss while still reconstructing the original sensor data with high probability. This improves reliability of data transmission for wireless structural health monitoring systems.
An Extended Notation of FTA for Risk Assessment of Software-intensive Medical...Yoshio SAKAI
An extended notation of FTA for risk assessment of software-intensive medical devices
Yoshio Sakai, Seiko Shirasaka and Yasuharu Nishi
It is difficult to assess the risk of software-intensive medical devices. An extended notation of FTA recognizes the risk class before and after the risk control measure and the software in the system affects the top event of FTA.
You can see this content as 6-pages paper from IEEE Website.
Feature Analysis of Estimated Causes of Failures in Medical Device Software a...Yoshio SAKAI
Background/Objectives
<research>
•383 medical device software failures from 1983 to 1997 are analyzed in “FAILURE MODES IN MEDICAL DEVICE SOFTWARE:AN ANALYSIS OF 15 YEARS OF RECALL DATA” (DOLORES R. WALLACE1 and D. RICHARD KUHN, 2001)
•Medical devices are getting more and more relying on software.
<objectives>
•Analyze 86 medical device software failures in FY 2010 and identify the change of the trend of failure causes from the former analysis
•Confirm whether the International standard issued in 2006, IEC 62304 (Medical device software - Software life cycle processes), is effective to new failure causes or not.
Future Trends of Embedded Systems - Technical Paper PresentationKaushik Gupta
Runner-Up for the State Level Technical Paper Presentation
Certification: Indian Society for Technical Education
More Details on https://www.kaushikgupta.in
IRJET- Intelligent Traffic Management for Ambulance and VIP VehiclesIRJET Journal
An online knowledge base and searchable FAQ database.
2. Support Forum: An online community where you can post questions and get answers from Keil engineers and other users.
3. Support Requests: Submit a request directly to our technical support team.
4. Documentation: Download manuals, data sheets, application notes and more.
5. Training: Learn about our training options, both online and classroom.
6. Updates: Check for the latest software updates and service packs.
7. Contact Us: Email, phone or fax contact information for technical support.
We hope you find these resources helpful. Please let us know if there is any other way we can assist you.
IRJET- IoT based Classroom Automation SystemIRJET Journal
This document describes an IoT-based classroom automation system that allows teachers to remotely control devices in the classroom using a mobile application. The system uses NodeMCU microcontrollers connected to sensors and appliances via relays to enable on/off control. An ultrasonic sensor detects human presence. Commands sent from the mobile app via WiFi are received by the NodeMCU which controls the relays. This allows automation of lighting, A/C, and other devices for improved energy efficiency, convenience and security while providing remote classroom monitoring capabilities.
Home Security System and Door Access Control Based on Face RecognitionIRJET Journal
This document summarizes a research paper on a home security system using face recognition for door access control and motion detection for intruder alerts. The system uses a Raspberry Pi board to run algorithms for face recognition using PCA for authentication at the door. It also processes video frames from a webcam to detect intruders based on differences between frames. If an intruder is detected, the system automatically sends an alert email to the local police station. The system operates on battery power and wireless internet for remote monitoring. It provides effective home security with low power consumption compared to other existing systems.
Design of Interface Board for Medical Kiosk Based on Off-The-Shelf PlatformIRJET Journal
This document describes the design of an interface board for a medical kiosk that integrates different commercial off-the-shelf medical modules. The interface board combines measurement results from modules that measure vital signs like blood oxygen saturation, blood pressure, blood glucose, temperature, etc. and transfers the data via a kiosk application to cloud software. The interface board hardware design integrates modules using an ARM microcontroller. The firmware collects data from each module via drivers and sends it to a PC application through a graphical user interface. The design was tested by measuring various health parameters of a subject to validate the integrated system.
This document discusses cyber security in smart grids. It begins with an introduction to smart grids and their reliance on information and communication technologies (ICT). It then discusses three security objectives for smart grids: data availability, confidentiality, and integrity. Several types of cyber attacks on smart grids are described, including denial-of-service attacks, random attacks, and false data injection attacks. The document concludes by evaluating techniques for detecting attacks, such as using chi-square tests and cosine similarity matching to compare expected and measured smart grid data.
Fuel Station Monitoring and Automation based on WSN IJECEIAES
The document describes a proposed system to automate and monitor a fuel station using a wireless sensor network. The system aims to [1] save fuel quantities and qualities, [2] keep the fuel station and workers safe, and [3] make the fuel station operate under normal conditions. Sensors monitor factors like temperature, smoke, water levels, and power sources. The data is sent wirelessly to a main controller built using LabVIEW software. The controller analyzes the data and sends commands to actuators to automate systems for fire protection, temperature control, power switching, and liquid level regulation. The overall system is designed to automate key fuel station operations and provide monitoring through an interactive interface.
An electronic switch sensor with a point to-point intrusive monitoring systemZac Darcy
Sophistications in theft and other criminal damages necessitates for the symbiotic blending of technology with security needs. In this research, electronic switches in the form of sensors were used to implement a point-to point intrusive monitoring system for the detection of an unauthorized access to commercial and residential buildings. The system is a simple and reliable security system and uses switch sensor technology to revolutionize the standards of living. The system is also simple, adaptable and cost-effective. It is designed in six major units which include; the power supply, the input/sensor micro-switches, the monitoring and indicator, the timing, the tone generation and output units. To ensure steady power supply in the circuit, the power unit constitutes both the mains and DC supplies. The alarm unit are being activated by the normally closed sensor micro-switches unit which is connected in an electronic/door mat at both the entrance and exit of buildings. In order to facilitate easy location of the intruder, the exact point of intrusion is being determined by the monitoring and indicator unit which constitutes the quad R/S flip-flop IC and LED’s. The timing/tone generation unit is built on the 555 timer IC, in the Astable mode, which output keeps changing as far as there is a breakage of the sensors. The output of the system is mainly the LEDs and buzzer, which gives electrical light and audio signal to notify the owner of an intruder in the building. Major design issues considered include; efficiency, portability, cost-effectiveness, durability, compatibility as well as the availability of required materials. This system works on the principle of the micro-switch sensor and dependent on the condition that an intruder entered through the door and stepped in any one of the switches under the mat. Verification and validation of the system indicate compliances to design specification hence the output requirements were met.
IRJET- Applications of Wireless Sensor Networks in Healthcare: An Overview of...IRJET Journal
This document discusses applications of wireless sensor networks in healthcare and related challenges. It describes how wireless sensor networks are being used for vital sign monitoring in hospitals, at-home and mobile health monitoring, and assistance with motor and sensory decline. Examples discussed include monitoring systems called CODEBLUE, HEALTHGEAR, and AMON. It also discusses an epilepsy monitoring smart clothing system called WEMU and a wearable health care system called WEALTHY. The document outlines challenges at the physical, MAC, network, transport and application layers and security threats involving confidentiality, integrity and availability. Physical layer challenges include bandwidth limitations while security threats include eavesdropping, traffic analysis and denial of service attacks.
The document describes a Short Message Service (SMS) based wireless home appliance control system (HACS) that allows users to remotely control home appliances and monitor security via SMS using GSM technology. The system uses a PC connected to a GSM modem to send and receive SMS instructions to simulate appliances and send security alerts. Test results showed the system could successfully turn appliances on/off in response to SMS commands from authorized numbers and send breach alerts upon intrusion detection. The authors propose expanding the system to integrate additional sensors and detection systems for improved security monitoring and remote control of more appliances.
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET Journal
This document describes a home appliance controlling and monitoring system using an IoT mobile application. The system allows users to control home appliances like fans, lights, and AC remotely via an Android app connected to a microcontroller over WiFi. Sensors like a DHT11 temperature and humidity sensor are connected to the microcontroller to monitor environmental conditions. The microcontroller is programmed to connect to the local WiFi router and send messages to the Android app. Relays connect appliances to the microcontroller so they can be turned on/off remotely. The system provides convenience, energy savings, and increased home security by allowing remote monitoring and control of appliances via a mobile device connected to the IoT network.
IRJET- Remote HRV Monitoring System for Hypertensive Patients using IoTIRJET Journal
This document proposes a remote heart rate variability (HRV) monitoring system for hypertensive patients using Internet of Things technology. The system uses a wireless zigbee-based pulse sensor to derive HRV parameters, which are indicators of cardiovascular risk. If emergency conditions are detected based on HRV parameters and heart rate, the system sends SMS alerts to caregivers and doctors for medical assistance. The system aims to track patients' conditions remotely without hospital visits and help doctors monitor treatment effectiveness. It combines zigbee and WiFi technologies to remotely and securely transmit sensor data to doctors in a low-cost and easy-to-use manner.
Electrical Appliances Control using Wi-Fi and LaptopIRJET Journal
This document summarizes a research paper on controlling electrical appliances using Wi-Fi and a laptop. The system allows a supervisor to control devices remotely using a laptop and Wi-Fi connection. The system includes an ARM7 microcontroller connected to electrical devices. A software application installed on the laptop allows the user to send commands over Wi-Fi to control the devices. This provides flexibility to control appliances from anywhere without needing to be near the traditional switchboard. The system is intended to save time, manpower, and energy compared to conventional control methods.
This document provides lecture notes on embedded systems design. It covers various topics such as introduction to embedded systems including definitions, characteristics, applications and classifications. It also discusses typical embedded system components like processors, memory, sensors, communication interfaces. Additionally, it covers embedded firmware, RTOS based design, task communication and synchronization. The document provides detailed information on concepts related to embedded systems in a structured manner through different sections and units.
security and privacy for medical implantable devicesAjay Ohri
The document discusses security and privacy concerns for implantable medical devices (IMDs) as they increasingly incorporate wireless capabilities and coordination between devices. It presents a framework for balancing traditional goals of IMD design like safety and utility with new security and privacy goals. Some key tensions identified include restricting unauthorized access to device data and settings while still allowing necessary access in emergencies, and keeping IMD operations secure without compromising energy efficiency. The framework can help manufacturers and regulators address challenges from evolving IMD technologies.
EMBEDDED BASED REMOTE ACCESS AND CONTROL SYSTEM THROUGH 3G COMMUNICATIONAM Publications
Robbery is a danger encountered several times. Modern electronics yields itself for robbery; also it shows ways to avoid it. We have, therefore, in this project, attempted to develop an integrated system that combines the features of a Embedded controller, GSM and IoT devices to be useful in detecting, monitoring and protecting through internet. The ultra modern micro electronics has made opportunities for the development of such security system with the advent of sensors for sensing the presence of a person. We use PIR sensor unit to detect the presence of any Person. Our system consists of three sections detecting, monitoring and protecting. Here detecting system consists of PIR sensor to indicate the motion of the human being. Smoke sensor to detect the smoke. Temperature sensor to sense the temperature variations. Vibration sensor to sense vibration level. Door breakage detector to detect the breaking of door to rob. Second section is monitoring, when the intruder enters into the monitoring area this sensor detect the intruder and immediately send the indication to the user through mail to reveal the message and also send the alert SMS to the user for notification. By this user can able to understand something has happened in his place and he can proceed for further action. Last section is protective section, it consists of spray control system which is controlled through internet to make the opponent unconscious for certain interval. Hence the electronic system which provides these three sections helps to prevent the properties from robbery and other unnecessary problem and also provides solution to the user to live a secured life.
A review of security protocols in m health wireless body area networks (wban)...James Kang
Kang, J. J., & Adibi, S. (2015). A Review of Security Protocols in mHealth Wireless Body Area Networks (WBAN). In W. Zhou, & R. Doss (Eds.), Future Network Systems and Security 2015 (FNSS 2015) Vol. 523 (pp. 61-83). Paris, France: Springer International Publishing. doi: http://dx.doi.org/10.1007/978-3-319-19210-9_5
Cyber-Defensive Architecture for Networked Industrial Control SystemsIJEACS
This paper deals with the inevitable consequence of the convenience and efficiency we benefit from the open, networked control system operation of safety-critical applications: vulnerability to such system from cyber-attacks. Even with numerous metrics and methods for intrusion detection and mitigation strategy, a complete detection and deterrence of internal code flaws and outside cyber-attacks has not been found and would not be found anytime soon. Considering the ever incompleteness of detection and prevention and the impact and consequence of mal-functions of the safety-critical operations caused by cyber incidents, this paper proposes a new computer control system architecture which assures resiliency even under compromised situations. The proposed architecture is centered on diversification of hardware systems and unidirectional communication from the proposed system in alerting suspicious activities to upper layers. This paper details the architectural structure of the proposed cyber defensive computer control system architecture for power substation applications and its validation in lab experimentation and on a cybersecurity testbed.
This document presents a preliminary study on developing a Wide Area Protection Monitoring System (WAPMS) that would automatically collect and analyze data from protection devices. The proposed system would gather information through various communication protocols, analyze the data to determine fault types and locations, and generate reports with diagnoses for operators. This would provide operators a comprehensive overview of the power system's behavior during faults to help make better decisions. The system is currently being tested in Colombia and future work involves predictive analytics to identify potential protection device failures.
Practical analysis of the cybersecurity of European smart gridsSergey Gordeychik
This paper summarizes the experience gained during a series of
practical cybersecurity assessments of various components of Europe’s
smart electrical grids.
Wireless Sensor Network for Patient Health Monitoring SystemIRJET Journal
This document describes a wireless sensor network for patient health monitoring. It discusses how sensors can monitor a patient's vital signs like pulse rate, body temperature, and heart rate. The sensor data is transmitted wirelessly via nodes to a central node, typically a computer at a hospital. This allows medical staff to remotely monitor patients' health conditions without needing to be right next to the patient. The system aims to provide automatic, low-cost monitoring so that fewer medical resources are needed for continual observation of stable patients.
In this research work an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) will be implemented to detect and prevent critical networks infrastructure from cyber-attacks. To strengthen network security and improve the network's active defense intrusion detection capabilities, this project will consist of intrusion detection system using honey token based encrypted pointers and intrusion prevention system which based on the mixed interactive honeypot. The Intrusion Detection System (IDS) is based on the novel approach of Honey Token based Encrypted Pointers. This honey token inside the frame will serve as a trap for the attacker. All nodes operating within the working domain of critical infrastructure network are divided into four different pools. This division is based per their computational power and level of vulnerability. These pools are provided with different levels of security measures within the network. IDS use different number of Honey Tokens (HT) per frame for every different pool e.g. Pool-A contains 4 HT/frame, Pool-B contains 3 HT/frame, Pool-C contains 2 HT/frame and Pool-D contain 1 HT/frame. Moreover, every pool uses different types of encryption schemes (AES-128,192,256). Our critical infrastructure network of 64 nodes is under the umbrella of unified security provided by this single Network Intrusion Detection System (NIDS). After the design phase of IDS, we analyze the performance of IDS in terms of True Positives (TP) and False Negatives (FN). Finally, we test these IDS through Network Penetration Testing (NPT) phase. The detection rate depends on the number of honey tokens per frame. Our proposed IDS are a scalable solution and it can be implemented for any number of nodes in critical infrastructure network. However, in case of Intrusion Prevention System (IPS) we use Virtual honeypot technology which is the best active prevention technology among all honeypot technologies. By using the original operating system and virtual technology, the honeypot lures attackers in a pre-arranged manner, analyzes and audits various attacking behavior, tracks the attack source, obtains evidence, and finds effective solutions.
Autonomous sensor nodes for Structural Health Monitoring of bridgesIRJET Journal
This document discusses using autonomous sensor nodes and wireless sensor networks for structural health monitoring of bridges. It aims to detect damage in structures early through continuous monitoring. Sensor nodes containing microcontrollers, temperature, vibration and pressure sensors would be attached to bridges and transmit data wirelessly. This would make inspections more efficient and improve safety by identifying issues early. The document reviews related work using similar wireless sensor network systems for structural monitoring. It discusses the need for such monitoring in India given the increasing construction of large buildings and infrastructure. The objectives are outlined as detecting, locating, identifying and quantifying any damage. Hardware and software components are listed including ESP32 microcontrollers and sensors to measure temperature, vibration and pressure.
This document provides an overview of power system automation and SCADA (Supervisory Control and Data Acquisition) systems. It defines SCADA and describes its typical components like HMIs, RTUs, PLCs and communication infrastructure. It also outlines applications of SCADA in power generation, distribution and transmission systems. Benefits of SCADA include increased efficiency, reliability and reduced manual labor through remote monitoring and control of power systems. The document concludes that SCADA provides a common framework for experiment control and ensures consistent operator experience across different parts of complex power systems.
An active technique for power saving in WSN under additive white gaussian noi...IJECEIAES
The work with feature of self-power supply by solar cell or by the battery or together at the same time. Therefore, the power dissipation is the big problem in wireless sensor network (WSN) especially when it is works for long time. The efficient method for reducing the power consumption within working is needed. The process of reducing waste power is one of the top priorities of scientists and designers of wireless sensor networks. The aim of this paper is to find the dominant method to reduce the power consumption in the wireless sensor network in order to stay works for long time and maintain the links with other nodes without loss of connection and transfer the information correctly. In this paper, a modified method was invented to minimize power utilization per data bit in a connection. This new method depends on the optimization process for reducing the power consumption as low as possible. All the tests of simulation process were done in additive white Gaussian noise (AWGN) channel. Numerical results demonstrated that the new method reduce the power when different values of noise are present with different types of modulation. Also the distance that the WSN will reach the information to it will be increase with presence of various noise amounts with different types of modulation. As a result, the power was decreased and the signal was reach more distance.
The document describes an IoT-based protection relay system. It discusses:
1) How IoT enables relays to be controlled remotely via the internet from anywhere.
2) A literature review of existing smart circuit breaker systems and their limitations in remote control capabilities.
3) The motivation for the project to reduce electrical accidents by enabling remote power cutoff and communication between substations and maintenance staff.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Whenyour computer isconnected to the Internet, you expose your computer to a variety of potentialthreats. The Internet isdesigned in such a waythat if you have access to the Internet, all other computers on the Internet canconnect to yourcomputer.Thisleavesyouvulnerable to variouscommonattacks. This isespeciallytroubling as severalpopular programs open services on your computer thatallowothers to view files on your computer! Whilethisfunctionalityisexpected, the difficultyisthatsecurityerrors are detectedthatalwaysallow hackers to attackyour computer with the ability to view or destroy sensitive information stored on your computer. To protectyour computer fromsuchattacksyouneed to "teach" your computer to ignore or resistexternaltestingattempts. The commonname for such a program is Firewall. A firewall is software thatcreates a secureenvironmentwhosefunctionis to block or restrictincoming and outgoing information over a network. These firewalls actually do not work and are not suitable for business premises to maintain information securitywhilesupporting free exchange of ideas. Firewall are becoming more and more sophisticated in the day, and new features are beingadded all the time, sothat, despitecriticism and intimidatingdevelopmentmethods, they are still a powerfuldefense. In thispaper, weread a network firewall thathelps the corporateenvironment and other networks thatwant to exchange information over the network. The firewall protects the flow of trafficthrough the internet and limits the amount of external and internal information and provides the internal user with the illusion of anonymous FTP and www online communications.
Standards based security for energy utilitiesNirmal Thaliyil
The document discusses standards for cybersecurity in the energy sector. It notes that threats are increasing as energy infrastructure becomes more connected and data-driven. The document outlines some key cybersecurity standards for the energy industry including NERC CIP, IEEE1686, and IEC 62351. It maps these standards based on their level of technical detail and completeness. The document also discusses best practices for cybersecurity including technological and operational controls and how standards relate to controls for protection, detection and response.
Survey on Security Aspects Related to DOIPIRJET Journal
This document discusses security aspects related to diagnostics over IP (DoIP) in connected vehicles. It first provides background on DoIP and the increasing connectivity of vehicles. It then analyzes potential security threats and attacks in different DoIP communication scenarios. Next, it evaluates security requirements like data authenticity, integrity, and availability. It also examines security issues in the DoIP protocol header and proposes mechanisms to protect against attacks like modification, fingerprinting and buffer overflows. In conclusion, the document provides a security analysis of DoIP and identifies measures needed to safely enable remote vehicle diagnostics over IP networks.
introduction to #OT cybersecurity for O&M teams.pdfPrabaKaran649935
The document discusses the importance of operational technology (OT) cybersecurity to protect industrial control systems from cyber threats and ensure their continued availability and integrity. It notes that OT environments face different risks and priorities than information technology (IT) networks. The document advocates applying a defense-in-depth strategy through effective risk assessment and selecting appropriate countermeasures informed by standards like ISA/IEC 62443.
Are your industrial networks protected...Ethernet Security Firewalls Schneider Electric
Security incidents rise at an alarming rate each year. As the complexity of the threats increases, so do the security measures required to protect industrial networks. Plant operations personnel need to understand security basics as plant processes integrate with outside networks. This paper reviews network security fundamentals, with an emphasis on firewalls specific to industry applications. The variety of firewalls is defined, explained, and compared.
Augmentation of a SCADA based firewall against foreign hacking devices IJECEIAES
This document summarizes a research paper that implemented a SCADA-based firewall to protect data transmission from external hacking devices. The paper first discusses a case study where an industrial control system was hacked 46 times. It then provides an overview of industrial firewalls and the differences between industrial and IT firewalls. The paper describes configuring a Tofino industrial firewall with SCADA-HMI and PLC assets. It tests the firewall by simulating scenarios without and with the firewall, showing the firewall prevents an attacker from accessing the PLC simulator based on communication protocols. The paper concludes customized industrial firewalls are needed and protocols must be regularly updated as cyber attacks evolve.
FIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATIONIRJET Journal
1. The document describes a proposed wireless fire alarm system based on Internet of Things technology using a microcontroller and infrared flame sensor.
2. When a fire is detected by the sensor, the system activates a local alarm, sends an SMS to the user, and calls the user. It also allows the user to check the home's status by sending an SMS to the system.
3. A prototype of the proposed system was created that successfully implemented the intended functionalities of detecting fire and alerting the user with an average latency of less than 30 seconds.
Ultra-Low Power, Secure IoT Platform for Predicting Cardiovascular DiseasesBHAVANA KONERU
This article proposes an ultra-low power and secure IoT platform for predicting cardiovascular diseases using ECG signals. The platform can predict the onset of critical cardiovascular events up to 3 hours in advance with 86% accuracy while consuming 62.2% less power and occupying 16% less area than state-of-the-art approaches. It extracts a chip-specific ECG key to enable secure communication and integrates this key with an existing design-for-trust solution to provide multi-layered security, thwarting hardware attacks like reverse engineering and counterfeiting, with only 9.5% area and 0.7% power overhead and no speed impact.
Similar to Control and indicating equipment communicating via the peripheral component interconnect express bus (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionBert Blevins
Cybersecurity breaches are a growing threat in today’s interconnected digital landscape, affecting individuals, businesses, and governments alike. These breaches compromise sensitive information and erode trust in online services and systems. Understanding the causes, consequences, and prevention strategies of cybersecurity breaches is crucial to protect against these pervasive risks.
Cybersecurity breaches refer to unauthorized access, manipulation, or destruction of digital information or systems. They can occur through various means such as malware, phishing attacks, insider threats, and vulnerabilities in software or hardware. Once a breach happens, cybercriminals can exploit the compromised data for financial gain, espionage, or sabotage. Causes of breaches include software and hardware vulnerabilities, phishing attacks, insider threats, weak passwords, and a lack of security awareness.
The consequences of cybersecurity breaches are severe. Financial loss is a significant impact, as organizations face theft of funds, legal fees, and repair costs. Breaches also damage reputations, leading to a loss of trust among customers, partners, and stakeholders. Regulatory penalties are another consequence, with hefty fines imposed for non-compliance with data protection regulations. Intellectual property theft undermines innovation and competitiveness, while disruptions of critical services like healthcare and utilities impact public safety and well-being.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
A vernier caliper is a precision instrument used to measure dimensions with high accuracy. It can measure internal and external dimensions, as well as depths.
Here is a detailed description of its parts and how to use it.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...IJAEMSJORNAL
This study aimed to profile the coffee shops in Talavera, Nueva Ecija, to develop a standardized checklist for aspiring entrepreneurs. The researchers surveyed 10 coffee shop owners in the municipality of Talavera. Through surveys, the researchers delved into the Owner's Demographic, Business details, Financial Requirements, and other requirements needed to consider starting up a coffee shop. Furthermore, through accurate analysis, the data obtained from the coffee shop owners are arranged to derive key insights. By analyzing this data, the study identifies best practices associated with start-up coffee shops’ profitability in Talavera. These findings were translated into a standardized checklist outlining essential procedures including the lists of equipment needed, financial requirements, and the Traditional and Social Media Marketing techniques. This standardized checklist served as a valuable tool for aspiring and existing coffee shop owners in Talavera, streamlining operations, ensuring consistency, and contributing to business success.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
Unblocking The Main Thread - Solving ANRs and Frozen FramesSinan KOZAK
In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.
Phone Us ❤ X000XX000X ❤ #ℂall #gIRLS In Chennai By Chenai @ℂall @Girls Hotel ...
Control and indicating equipment communicating via the peripheral component interconnect express bus
1. Bulletin of Electrical Engineering and Informatics
Vol. 9, No. 2, April 2020, pp. 729~738
ISSN: 2302-9285, DOI: 10.11591/eei.v9i2.1753 729
Journal homepage: http://beei.org
Control and indicating equipment communicating via
the peripheral component interconnect express bus
Vaclav Mach1
, Milan Adamek2
, Jan Valouch3
, Karla Barcova4
1,2,3
Faculty of Applied Informatics, Tomas Bata University in Zlín, Czech Republic
4
Faculty of Safety Engineering, VSB-Technical University of Ostrava, Czech Republic
Article Info ABSTRACT
Article history:
Received Aug 25, 2019
Revised Oct 12, 2019
Accepted Jan 23, 2020
Nowadays, the Intruder Alarm system is commonly used to protect the life,
health and the possession of people in big companies. However, these
systems have limited options for managing and remote control. This lack
is very often criticized by big companies which want to use the Intruder
Alarm System with other applications like Access and Attendance control.
The aim of this article is to design a Control and Indicating Equipment which
can be implemented into commercially made Personal Computer
as expansion card. The designed card provides the main function
of the Intruder Alarm system which can be further extended by other
applications. The system consists of external communication like Universal
Serial Bus, Ethernet and General Packet Radio Service interface.
Each individual part of the system is driven by a single microcontroller
ATmega328P which can handle communication and evaluation of the current
state obtained by devices connected to it. The design can offer all alarm
and non-alarm visualization of smart control like irrigation, lights control,
audio system, etc. The whole design is driven by the proper standardization
and the design consists of every schematic which comes with
the explanation.
Keywords:
Control and indicating
equipment
Interconnect-express
Peripheral component
Personal computer
Technical security
This is an open access article under the CC BY-SA license.
Corresponding Author:
Václav Mach,
Faculty of Applied Informatics,
Tomas Bata University in Zlín,
Nad Stráněmi 4511, 760 05 Zlín, Czech Republic.
Email: v2mach@utb.cz
1. INTRODUCTION
The main topic of this article is the Intruder Alarm System (IAS) which is a main part
of the technical protection. The main purpose of the IAS is to protect the life, health, and possession
of the person. The concept is driven by the standard CSN CLC/TS 50131 Alarm systems-Intrusion
and hold-up systems which is divided into several parts that describe single components. The physical
security done by a real person is not reliable, and it is very economically inefficient to employ a person
as physical security [1]. According to the author [2] when a person stares at a screen for more than
20 minutes, his attention drops by 30%; and for periods over an hour, this drop can reach 70%. Due to this
problem, technical security with alarm systems is nowadays very popular.
Every alarm system must have assigned a Level of Security. It depends on the device which has
the lowest level of security. Each Level of Security specifies the equipment of the expected intruder.
This standard is given by the CSN EN 50131-1 ed. 2 Alarm systems-Intrusion and hold-up alarm systems
Part 1: System requirements. Every detector has the number which specifies the maximal Level of Security
2. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 2, April 2020 : 729 – 738
730
where it can be applied. [3] Common rules for the application of mechanical and electronic alarm systems
enable to optimize the security of property for specific risks or to assess the level of specific security
or to determine requirements for security of the protected object. The security levels are as follows:
Level 1: Low risk It is assumed that the intruder or burglar has little knowledge of the system and has
a limited range of readily available tools available.
Level 2: Low to Medium Risk It is assumed that the intruder or burglar has limited knowledge of
the system and the use of common tools and portable devices.
Level 3: Medium to High Risk It is assumed that the intruder or burglar is familiar with the system and
has an extensive range of tools and portable electronic devices.
Level 4: High Risk Used when security has priority over all other aspects. It is assumed that the intruder
or burglar is capable or able to prepare a detailed intrusion plan and has a complete range of equipment
including means to replace critical system components [4, 5].
According to mentioned standardization, every Intruder Alarm System should consist of the Control
and Indicating Equipment, Alarm detectors, Uninterruptible Power Supply, and the Communication interface.
All manufacturers of the IAS come to the market as an independent and closed device without any remote
user-friendly interface. The setting of the system is usually done by the technical person during
the installation, and further managing is very limited [6, 7]. However, the information from the system can be
used in other application as well. The author [8] also mentioned that the external connection usually via
the Ethernet is the only way how to manage the system and the manufacturers do not provide any additional
software for further managing. Most of the people using a personal computer for mentioned external
managing of the system. The main goal of this research is to design the Control and Indication Equipment
which can be placed as an expansion card into the Peripheral Component Interconnect Express bus (PCI-E).
As mentioned before, there are four main components of the Intruder Alarm System. The first one
is Control and Indicating Equipment, which periodically evaluates all data from connected devices. This part
usually has a microcontroller for the real-time evaluation, external communication interface such as USB
or Ethernet, and the internal communication interface. The second are detectors, which are detecting
the person in restricted room or area based on the application. There are detectors which have a sensor
focused on the light (Passive Infra-Red), sound (Microwave) contact (Magnetic contact) or vibration
(Glass-break). Each category is suitable for different purpose and location. The third is the Uninterruptible
Power Supply (UPS) which every IAS must-have when a power failure occurs. The UPS must have a battery
which can distribute the power during the power failure for a given time. This time is based on the Level
of Security and the number of connected devices. The last on is the internal interface usually done
by the RS-485 or RS-232 [9].
The most important standard for this article is the CSN CLC/TS 50131-1 Control and Indicating
Equipment, which consists of information and parameters which every product must accomplish [10].
The CIE is the main component of the IAS and it consists of several components which are responsible
for the main function. The main function of the CIE is periodically scanning detectors and the evaluation
of states. According to the authors [5] and [10], commercial CIE can be divided into two groups. First group
using digital interface and second using analog interface. Digital CIE using only one bus which typically
consists of four cables (Ground, Power Voltage, Data+, Data-). This manner allows to connecting several
detectors to one bus. Detector evaluates actual state which is then sent to the CIE in binary form.
There is another type of connection called an analog loop. However, this type is outdated and it is not
recently used.
The incoming signal from the connected detector is the essential information for the whole system,
and the CIE must be able to distinguish between basic states [11]. These states for every CIE are Serenity,
Alarm, Failure, and Sabotage. Serenity and Alarm states are very easy to identify. The tricky part comes with
the detection and distinction between Failure and Sabotage. Failure must be detected as Alarm.
All mentioned states must be implemented into the final model. The connected detectors can have some
additional outputs like tamper or anti-masking.
According to the author [12] and [13], every component of the alarm system which comes
to the market must be constructed according to the standardization. Every device must be tested according
to the standard CSN EN 61000-4-4 ed. 2 Electromagnetic compatibility (EMC)-Part 4-4: Testing
and measurement techniques-Electrical fast transient/burst immunity test. This document describes unified
standards and limits of the maximum permitted interference level for specific types of equipment or accurate
and reproducible conditions for the measurement and verification of the electromagnetic
susceptibility equipment.
The Peripheral component interconnect express is a high-speed serial computer expansion bus
standard, which has characteristics of high speed, low power, and high protocol efficiency [14]. This standard
is widely used as a standard I/O interface for connecting processors, and I/O system devices. High speed,
3. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Control and indicating equipment communicating via the peripheral component… (Václav Mach)
731
low power, and high efficiency are the salient properties of the PCI-E; because of additional properties,
PCI-E is considered as good alternatives to the existing network structures [15].
It also uses a bus topology to enable communication between other devices on the bus,
and it supports multiple lanes of 1x, 2x, 4x, 8x, 16x, and 32x per link. Data rates are 2 Gb/s per lane in PCI-E
Gen 1, 4 Gb/s per lane in PCI-E Gen 2 and 8 Gb/s in Gen3, the bandwidth is 128 Gb/s, and the clock speed
is 8 GHz based on the PCI-E Gen3 16x lane [16, 17]. Every PCI-E slot has a switch which is a collection
of logically connected PCI-PCI bridges. After connecting the additional PCI-PCI bridges downstream,
one PCI-PCI bridge is upstream. It means that switching appears as a hierarchical structure of logical
PCI bridges [16].
PCI-E is one example of the general trend toward replacing parallel buses with serial interconnects
like USB. PCI Express is a serial connection that operates more like a network than a bus. Instead of one bus
that handles data from multiple sources, PCI-E has a switch that controls several point-to-point serial
connections [18]. The physical card must be manufactured by a strict dimension which is listed in Figure 1.
Figure 1. Maximal dimensions of the PCI-express card
2. RESEARCH METHOD AND MATERIALS FOR THE DESIGN
The main goal of this article is to design a functional prototype of Control and Indicating Equipment
which has a PCI-E connection. The system should be built from the same components and built according
to techniques as a common certificated CIE on the market. These elementary components and features
are described in the following individual section.
2.1. The main microcontroller ATmega328P
The main microcontroller is on the top of the created hierarchy of the system. It can receive data
from other devices like detectors or keyboards and it is also able to transmit data to other microcontrollers
or devices. The ATmega328P microcontroller was chosen as the main microcontroller because it has
embedded channels for the UART interface for serial communication. Moreover, the first channel is reserved
only for communication via USB with the computer. However, the microcontroller can handle also function
Software Serial, which can be implemented on any pin and it can provide more serial channels for serial
communication [19, 20].
The main microcontroller takes advantage of CISC and RISC architecture. Microcontrollers use up
to 120 instructions and process the entire instruction in one clock cycle. The combination of these
architectures provides a good implementation of any programs. ATmega328P also consists of an 8-bit
processor that contains two types of memory-data memory that stores the variables and program memory that
stores the program. Data memory is typically Static RAM (SRAM), and the program memory is stored
in the Flash memory [19]. The microcontroller also equipped with 14 pins which can be used for the output
or input and some of these pins support PWM, analog inputs, and connection of a 16 MHz crystal [21].
Every ATmega328P are able to communicate with the computer via UART. For easy
and comfortable communication via the PCI-E, a special integrated circuit called FT232RL is used which can
convert UART communication to USB. This circuit does not require any other special settings. The data from
the USB connector are connected to the USB-DM and USB-DP pins. The converted UART interface is able
on RXD and TXD pins. The _DTR reset pin must be connected to the master reset circuit and all
of the power lines according to the official datasheet.
4. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 2, April 2020 : 729 – 738
732
2.2. The ethernet chip ENC28J60
One of the sub-goal of this article is to integrated easy and suitable Ethernet interface for external
and technical communication. Using another microcontroller which provides the Ethernet communication
makes it very easy to add user interface via a website. It can be reached from all devices connected
to the Ethernet network. At the same time, the connection can be used as an interface to send the alarm signal
to the Alarm Receiving Center (ARC).
Ethernet communication itself is performed by the microcontroller ENC28J60. It is a single-chip
Ethernet controller and no separate operating system is required. The ATmega328P, which is connected
as the command microcontroller, is able to communicate via the SPI. In order to simplify SPI wiring, it was
decided to use this method of communication. [15] The hardest part of this connection is the Ethernet
connector. Physical pins for the Ethernet connection are TPIN+, TPIN- for the receiving and TPOUT+,
TPOUT- for the transmitting part. These pins are directly connected to the Ethernet connector which contains
the isolating transformers. A special filter is added between the parts to protect against electromagnetic
interference. The schematic part of the Ethernet connection with the ENC28J60 is shown in Figure 2.
Figure 2. Schematic part of the ethernet connection via the ENC28J60
2.3. GPRS communication via the SIM900
Another microcontroller was used to control the GPRS communication via the microcontroller
SIM900 using the UART. It allows communication using so-called AT commands which means that text
strings are used for sending commands. No other library is necessary to achieve maximum flexibility.
Physical pins for serial communication are (SIM-TX and SIM-RX). Pin for SIM-TX can be any free pin
for sending AT commands, but the SIM-RX must be connected to the pin which can handle the internal
interrupt. There is a special pin called SIM-PWRKEY which can be used for the starting sequence. The main
usage for this part is to allow sending SMS and email as a notification to the customer. It can be also used
as an input to control temperature, lights or any other devices. The schematic part of the SIM-900 is listed
in Figure 3.
SIM900 is widely used in GSM and is has a complete Quad-band GSM/GPRS module. It has a very
powerful single-chip processor AMR926EJ-S. The chip also has a 32-bit ARM processor-based LPC2148
microcontroller which is connected to LPC2148 through a USB to RS232 driver. [22] As mentioned before,
the communication is done using the AT command set that is specific to the GSM technology.
This communication includes SMS-related commands like AT+CMGS (Send SMS message), AT+CMSS
(Send SMS message from storage), AT+CMGL (List SMS messages), and AT+CMGR (Read SMS messages)
and more [23].
As author [24] mentioned, the SIM900 is developed for Appliances Automation and Security
Control System using the Arduino platform. The developed system is decomposed into two separate entities.
First, the hardware is designed using Arduino with other required electronic components which
5. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Control and indicating equipment communicating via the peripheral component… (Václav Mach)
733
is programmed using embedded C language. Second can be an Android app which provides freedom to
the user to control and access the electronic appliances and the security system without the internet.
Figure 3. Schematic part of the GPRS connection via the SIM900
The antenna for external communication with the Base Stations is needed. On the final board
is installed an antenna connector compatible with GSM, GPRS, UMTS, and 3G. It is ideal to extend
the coverage quality, move the antenna to areas of better coverage, have a better quality of the signal.
The frequency of the antenna is 824-960 and 1710-2170 MHz which is the exact frequency of the SIM900
module. The schematic part is shown in the following Figure 4.
2.4. PCI-express communicator with the USB hub
On the board must be a communication interface which can communicate with the program via
the PCI-E. The standard interface for the communication is done via the USB which is used in this scenario.
The PCI-E slot has complete USB interface using all USB 3.0 features. The pins HSOp(0) and HSOn(0)
are responsible for the transmitting part of the channel and the pins HSIp (0) and HSIn (0) are responsible
for the receiving part. There are also pins for the USB 2.0 REFCLK+ and REFCLK-. All mentioned pins can
be used for further communication via the PCI-E.
All mentioned microcontrollers are connected to the USB bus. The USB 2.0 interface was used due
to a small amount of information that is passing through the line. However, there is only one USB 2.0 line
on the PCI-E 1x, three active microcontrollers, and each one must be connected to the separate line.
Due to this problem, a USB Hub was installed on the board to provide enough lines for all microcontrollers.
In this case, the TUSB2046 USB hub was used. This device can make four independent USB 2.0 lines.
Each line has also termination resistor which helps with the stability. The PCI-E connector has also
the power pins for the power supply. These pins are +12V and +3V3 and it can be used as a power supply
for all components on the board. However, these pins have limited power consumption of 10 W. It means
that there must be an external power supply on the board. The card will be placed inside of the common PC
case which has the power supply with the power cables. Classical Molex connector was added to the board
to power all devices on the board. Only the power voltage +3V3 must be stabilized from the +5V using
a stabilizing device.
The chip itself contains overcurrent circuits that can detect overload of each line. This protection
is very often used for the protection of an unknown connected device. However, this design is not used due
to the concept where all components are connected and there is no possible way to connect other devices
which can cause overload. The schematic part of the USB hub TUSB2046 can be found in Figure 4.
6. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 2, April 2020 : 729 – 738
734
Figure 4. Schematic part of the USB hub TUSB2046 connection
2.5. The schema of the UPS
According to the mentioned standardization, every IAS must have a UPS in case of power failure.
During this event, the UPS must power the whole system from the battery in it. The battery must be able
to power CIE and also all connected devices. The capacity of the battery is calculated from the total power
consumptions which must be available during the failure. All needed information can be found
in the standardization and every scenario can have different capacity of the battery. The final schema
of the UPC can be found in Figure 5.
This simple UPS schema can deliver 12V unregulated, 5V regulated, and 3.3V regulated. The power
from the PC Power Supply is smoothed by the capacitor C33. When the PC supply is available the battery
will be charged via diode D2 and the regulator gets supply via diode D1. Voltages 5V and 3.3V will be
available at the output terminals. When the PC Power Supply is not available the battery supplies current
to the regulator and the 12V terminal through diode D3. Also, the diode D2 blocks the reverse flow of current
during battery mode. Capacitors C2 and C3 act as filters.
Figure 5. Schematic part of the UPS
3. REQUIREMENTS FOR THE DESIGN
Every section of the final schematic must be designed according to all mentioned standardization.
The final product of this paper should be an independent board which can be connected to the mainboard via
the PCI-E interface. The system should be also protected against the power failure by the UPS module
on the board. All main requirements for the system are the following:
7. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Control and indicating equipment communicating via the peripheral component… (Václav Mach)
735
- final IAS placed in a PC case as PCI-E card
- programming and communication via the PCI-E
- external communication via the Ethernet, USB, and the GPRS
- internal communication with the detectors using the RS-485 and RS-232
- a UPS installed on the board
The board should consist of three independent microcontrollers each for one main function like
GPRS communication, Ethernet interface, and the evaluation of connected devices to the system.
Each microcontroller should be able to communicate with others using the serial interface like Serial
Peripheral Interface (SPI). This organization can help with overloading the microcontroller with
a time-consuming task which can lead to total system failure. The overload can be caused for example by
the internet connection and if the system operates only on a single chip, the Ethernet communication can
affect for example the evaluation of the alarm messages. The same applies to the GPRS communication.
The block schema for better understanding is shown in Figure 6.
Figure 6. Block Schematic diagram of the designed system
As mentioned before, the main communication interface with the computer is done by the USB
standard which can be directly used from the PCI-E interface. Just one data lane for the USB cam be used
due to the relatively small amount of the exchanged data between the PC and the board.
However, there are three microcontrollers and just one USB line, which cannot be physically divided.
This problem should be solved by the USB bus which can extend the one line in three more needed by
the microcontrollers. In case of the power failure, the system must operate normally using the UPS
with the battery.
4. THE FINAL DESIGN OF THE PCI-E-CARD
The whole card must fit in a common PC case which has a limited amount of the space in it.
Due to this limitation, the dimensions of the card are strictly limited. However, the number of components
is not very huge and there was no problem with space. The communication interface will be transmitting only
the string of the text which can be handled by the USB 2.0 though the PCI-E interface. The PCI-E 1x
connector was used in this design, and the card can be plugged in any version of the PCI-E connector.
The final design of the card can be found in Figure 7.
8. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 2, April 2020 : 729 – 738
736
Figure 7. The final design of the PCI-express card for IAS applications
The final card is very compacted and small. Typical design with the components on top
and the copper lines on the bottom was used. On the board is a slot for the classic SIM card, on the side
of the board is installed an RSMA antenna connector, and there is also installed the Ethernet connector
(RJ45). There must be placed a terminal where interface for alarm detectors and other alarm devices can be
connected. All microcontrollers must be separately programmed via the In-System Programming using
the 6-pin- header on the board.
On the top of the board is installed the UPS terminal where the battery can be connected. The typical
capacity of the battery is about 2000 mAh which can power a small system for tens of hours. This problem
must be considered with the Level of Security if the Security which has a minimal time of charging
and discharging of the battery in the system. The battery can be placed inside of the PC case due to small
dimensions. When the power failure occurs, the PC shut down and the battery powers only the CIE
and connected devices.
5. COMPARISON WITH JABLOTRON JA-82K
Hybrid control and Indicating Equipment of the electronic security system with a maximum capacity
of 50 loops of which up to 14 wires. The control panel has 2 subsystems, 4 outputs, up to 50 users identifying
PIN codes or RFID chips. The memory of the JA-82K is 256 events. Meets standardization safety
2 according to mentioned EN 50131. Power supply JA-82K is 230V, reserve. power supply max 700 mA,
battery compartment max. 12V/2,6Ah. The system can be extended by wireless module JA-82R
and by the JA-82C wired input module connector. It uses the common communication bus based
on the RS-485. The physical design of the Jablotron JA-82K can be found in Figure 8.
Figure 8. The model of the control and indicating equipment Jablotron JA-82K [25]
9. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Control and indicating equipment communicating via the peripheral component… (Václav Mach)
737
As mentioned before, the commercially made CIE cannot support any external interfaces like
Ethernet, GPRS or USB. Several interfaces can be added to the system using the expansion slots, however,
this number is very limited. The installation and the management of the system can be done only
by the external keypad which has only the numerical keypad and the 16x2 LCD. This type of management
is very limited, complicated and it does not provide any external connectivity with other devices
or applications.
6. RESULTS AND DISCUSSION
The designed system is assembled as a common CIE which can be found on the marketplace
and it is constructed according to the standardization. The final board has dimension and connection
for the placement into standard PCI-E expansion slot in the PC. Compared to the mentioned CIE JA-82K,
the new design has the microcontroller ATmega328P for the main evaluation of the alarm messages which
is an equivalent to the microcontroller used in JA-82K. It uses the same communication bus for the alarm
detectors, However, the new design intentionally lacks the terminal for the analog loop connection which
is outdated. The communication interface is extended by the Ethernet, GPRS and USB standard. The power
supply is already placed inside of the PC case and the battery can be connected to the board in case
of the power failure.
The USB hub can be deleted from the design in case of using at least PCI-E 4x where three
independent USB lines can be found. Moreover, the PCI-E 4x can also help with the stability inside
of the case. However, the used PCI-E 1x connector can be placed in any PCI-E connectors despite
the numbers of lines, which makes PCI-E 1x the most universal. The biggest advantage of the designed
system is the integration of all needed communication interfaces which are not places in others CIEs
on the markets. The capacity of the supporting battery must be calculated before the real-time operation.
The battery must have the voltage 12V and this type of the battery have small dimensions which can fit
inside of the standard PC case. By using simple construction, the battery can be mounted in a 3.5-inch frame.
7. CONCLUSION
The main goal of this article was to design a functional model of the Control and Indicating
Equipment in for of the PCI-E which can be placed in a common PC case. This concept should help
with the remote managing and integrating other non-alarm application to the system. The design is driven
by the current standardization CSN CLC/TS 50131. Alarm systems-Intrusion and hold-up systems.
At the beginning of the study, the idea of the IAS and all needed part of the system are presented. The PCI-E
interface which is used as a communication interface with the PC is described further in the article.
The following sub-sections are focused on the design and schematic of each part of the system. This system
consists of the main part which deals with the alarm connection and further evaluation. The system has
several external communication interfaces such as USB, Ethernet, GPRS, RS-232, and RS-485 interfaces.
One of the chapters consists of the physical design of the system in the form of the Printed Circuit
Board and the last one shows the final design of the system. The board has dimensions and connectors
compatible with the PCI-E standard and it can be placed in any common PC case which has the PCI-E
interface. Further research can be focused on the programming of the interface for the user which can be used
as application management for Integrated Alarm Systems. The designed system also has the UPS which
automatically activates when the power failure occurs. The design was compared witch the real CIE which
can be found on the marketplace.
ACKNOWLEDGEMENTS
This work was supported by the Ministry of Education, Youth and Sports of the Czech Republic
within the National Sustainability Program Project No. LO1303 (MSMT-7778/2014) and also
by the European Regional Development Fund under the project CEBIA-Tech ED2.1.00/03.0089
and by the Internal Grant Agency of Tomas Bata University under the project No. IGA/CebiaTech/2019/003.
REFERENCES
[1] K. Ljubymenko and M. Adámek, "Security personnel of new generation," In: Proceedings-International Carnahan
Conference on Security Technology, Montreal: Institute of Electrical and Electronics Engineers, 2018.
[2] L. Jiang, et al., "Implementation of a Remote Real-Time Surveillance Security System for Intruder Detection," 9th
International Conference on Measuring Technology and Mechatronics Automation, 2017.
10. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 2, April 2020 : 729 – 738
738
[3] CSN EN 50131-1 ed. 2 (334591), "Alarm systems-Intrusion and hold-up alarm systems-Part 1: System
requirements," Prague: The Office for Standards, Metrology and Testing, 2013.
[4] CSN CLC/TS 50131, "Alarm systems-Intrusion and hold-up systems," Prague: The Office for Standards,
Metrology and Testing, 2011.
[5] J. Hart, and V. Hartova, "Testing of combined space detectors in intrusion and hold-up alarm systems,"
Engineering for Rural Development, pp. 905-909, 2018.
[6] J. Hart, et al., "Intrusion and Hold -Up Alarm Systems and Their Reliability Glass Break Detection," 6th
International Conference on Trends in Agricultural Engineering, pp. 171-174, 7-9 September 2016.
[7] M. Blahová and M. Hromada," The Soft Targets in the Czech Republic and Their Security," Trilobit, vol. 10,
no. 2, 2019.
[8] M. Pospisilik, et al., "Remote controlled gate controller using a GSM network and Arduino platform," MATEC Web
of Conferences, pp. 02036, 2016.
[9] E. I. Davies, and V. E. I. Anireh, “Design and Implementation of Smart Home System Using Internet of Things,"
Advances in Multidisciplinary & Scientific Research Journal Publication, vol. 7, no. 1, pp. 33-42, 2019.
[10] J. Valouch, "The Proposal of Methodology for Evaluating the Effectiveness of Alarm Systems," Applied Mechanics
and Materials, vol. 736, pp. 183-188, 2015.
[11] A. Hanacek, and M. Sysel, "The Methods of Testing and Possibility to Overcome the Protection against Sabotage
of Analog Intrusion Alarm Systems," Intelligent Systems in Cybernetics and Automation Theory, pp 119-128, 2015.
[12] H. Urbančoková, et al., "Testing of an intrusion and hold-up systems for electromagnetic susceptibility,"
International Journal of Circuits, Systems and Signal Processing, vol. 9, pp. 40-46, 2015.
[13] S. Kovář, et al., “Electromagnetic compatibility of arduino development platform in near and far-field,”
International Journal of Applied Engineering Research, vol. 12, pp. 5047-5052, 2017.
[14] A. Gabrielli, et al., "A Multi-Channel Pci Express Readout Board for Fast Readout of Large Pixel Detectors,"
Nuclear Instruments and Methods in Physics Research Section A, vol. 924, pp. 279-281, 2019.
[15] Ch. Shim, et al., "Compatibility Enhancement and Performance Measurement for Socket Interface with Pcie
Interconnections," Human-Centric Computing and Information Sciences, vol. 9, no. 1, 2019.
[16] M. Ravindran, "Cabled PCI express-a standard high-speed insterument interconnect," 2007 IEEE Autotestcon,
Baltimore, MD, 2007, pp. 410-417.
[17] R. Neugebauer, et al., "Understanding PCIe performance for end host networking," Proceedings of the 2018
Conference of the ACM Special Interest Group on Data Communication, pp. 327-34, 2018.
[18] T. Du, and Q. Jia. "Design of Universal PCIe Interface Module Based on Vs," IOP Conference Series: Materials
Science and Engineering, pp. 449, 2018.
[19] M. Mazidi, et al., "The Avr Microcontroller and Embedded Systems: Using Assembly and C," Upper Saddle River,
N. J.: Prentice Hall, vol. XIV, pp. 776, 2016.
[20] D. Q. R. Elizalde, R. J. P. Garcia, M. M. S. Mitra and R. G. Maramba, "Wireless Automated Fire Detection System
on Utility Posts Using ATmega328P," 2018 IEEE 10th International Conference on Humanoid, Nanotechnology,
Information Technology,Communication and Control, Environment and Management (HNICEM), Baguio City,
Philippines, 2018, pp. 1-5.
[21] Y. Patil, et al., "Basic Logic Gate Detector Using Atmega328P and Android App," HELIX, vol. 9, no. 3,
pp. 4937-4940, 2019.
[22] T. Nasution, et al., "Electrical appliances control prototype by using GSM module and Arduino," 4th International
Conference on Industrial Engineering and Applications, pp. 355-358, 2017.
[23] V. Bharathkumar, et al., "Microcontroller based digital meter with alert system using GSM," 11th International
Conference on Intelligent Systems and Control, pp. 444-448, 2017.
[24] K. Memon, et al., "GSM based Android Application Appliances Automation and Security Control System using
Arduino," International Journal of Advanced Computer Science and Applications, vol. 8, no. 2, pp. 206-210, 2017.
[25] Jablotron Alarms a.s., "Installation manual of JA-82K control panel," 2014.