To see the other types of publications on this topic, follow the link: Manhole Cover Security System.

Journal articles on the topic 'Manhole Cover Security System'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Manhole Cover Security System.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

HORSFALL, O. M., and I. E. ESSENOWO. "MANHOLE COVER SECURITY AND MONITORING SYSTEM." International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE) 11, no. 1 (2024): 31–48. https://doi.org/10.5281/zenodo.10784897.

Full text
Abstract:
<strong>Abstract:</strong> This "Manhole Cover Security and Monitoring System" addresses the issues of theft and vandalism of manhole covers which results in open manholes, and poses a significant safety risk to pedestrians and vehicles. By utilizing a laser light technique and a Light Dependent Resistor (LDR), the system is able to detect the presence or absence of light, indicating whether a manhole cover is open or closed. The functioning of the system is based on the principle that when a manhole cover is in its proper closed position, it blocks the laser light from reaching the LDR. However, if the cover is open or displaced, the laser light falls directly on the LDR, causing it to detect the light. When the LDR detects light, the system is triggered to initiate an alert mechanism. This alert mechanism involves the integration of a SIM800L module, which enables the system to communicate through SMS. Once the LDR senses an open manhole, the system immediately sends an SMS alert to pre-determined recipients, such as relevant authorities or maintenance personnel responsible for resolving the situation. The objective of this design is to provide an efficient and automated solution for detecting and notifying the presence of an open manhole cover, by promptly alerting the appropriate individuals or organizations. The system helps to mitigate potential accidents or hazards caused by open manholes. This contributes to maintaining public safety and preventing injuries or damage to property. <strong>Keywords:</strong> Manhole Cover Security System, Open manhole covers, Laser light technique, Light Dependent Resistor (LDR), SIM800L module. <strong>Title:</strong> MANHOLE COVER SECURITY AND MONITORING SYSTEM <strong>Author:</strong> HORSFALL, O. M., ESSENOWO, I. E. <strong>International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)</strong> <strong>ISSN 2349-7815</strong> <strong>Vol. 11, Issue 1, January 2024 - March 2024</strong> <strong>Page No: 31-48</strong> <strong>Paper Publications</strong> <strong>Website: www.paperpublications.org</strong> <strong>Published Date: 06-March-2024</strong> <strong>DOI: https://doi.org/10.5281/zenodo.10784897</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.paperpublications.org/upload/book/MANHOLE%20COVER%20SECURITY%20AND%20MONITORING%20SYSTEM-06032024-2.pdf</strong>
APA, Harvard, Vancouver, ISO, and other styles
2

Wei, Zhanying, Mengmeng Yang, Liuzhao Wang, Hao Ma, Xuexia Chen, and Ruofei Zhong. "Customized Mobile LiDAR System for Manhole Cover Detection and Identification." Sensors 19, no. 10 (2019): 2422. http://dx.doi.org/10.3390/s19102422.

Full text
Abstract:
Manhole covers, which are a key element of urban infrastructure management, have a direct impact on travel safety. At present, there is no automatic, safe, and efficient system specially used for the intelligent detection, identification, and assessment of manhole covers. In this work, we developed an automatic detection, identification, and assessment system for manhole covers. First, we developed a sequential exposure system via the addition of multiple cameras in a symmetrical arrangement to realize the joint acquisition of high-precision laser data and ultra-high-resolution ground images. Second, we proposed an improved histogram of an oriented gradient with symmetry features and a support vector machine method to detect manhole covers effectively and accurately, by using the intensity images and ground orthophotos that are derived from the laser points and images, respectively, and apply the graph segmentation and statistical analysis to achieve the detection, identification, and assessment of manhole covers. Qualitative and quantitative analyses are performed using large experimental datasets that were acquired with the modified manhole-cover detection system. The detected results yield an average accuracy of 96.18%, completeness of 94.27%, and F-measure value of 95.22% in manhole cover detection. Defective manhole-cover monitoring and manhole-cover ownership information are achieved from these detection results. The results not only provide strong support for road administration works, such as data acquisition, manhole cover inquiry and inspection, and statistical analysis of resources, but also demonstrate the feasibility and effectiveness of the proposed method, which reduces the risk involved in performing manual inspections, improves the manhole-cover detection accuracy, and serves as a powerful tool in intelligent road administration.
APA, Harvard, Vancouver, ISO, and other styles
3

Su, Zhonghua, Xiang Yu, Zhangcheng Yang, Heng Kang, and Jian Ou. "Design, Detection and Management of Mechanical Security Code Manhole Cover." MATEC Web of Conferences 228 (2018): 03007. http://dx.doi.org/10.1051/matecconf/201822803007.

Full text
Abstract:
In this paper, the researches and the application of manhole over as well as the existing problems have been described. The mechanical security code manhole cover with the built-in locking mechanism has been designed. The locking mechanism can withstand the muddy water immersion test, the password design test, the low temperature alternating cycle test, the failure load test and the vibration test. The manhole cover is equipped with an electric key and a mechanical key. The electric key automatically opens the code lock by receiving the password. The mechanical key demands to manually adjust the dial to open the code lock. The key and the password are respectively managed by different people.
APA, Harvard, Vancouver, ISO, and other styles
4

Bokshi, Md Abid Hasan Roni, Aslam Mahmud Siam, Jannatul Ferdouse, Mohammad Shamsul Islam, and Md Suman Reza. "IoT-based Manhole Management System for Open Manhole Covers." International Journal of Information technology and Computer Engineering, no. 36 (September 4, 2023): 1–7. http://dx.doi.org/10.55529/ijitc.36.1.7.

Full text
Abstract:
The IoT based manhole management system for open covers is a system aimed to improve the management of manhole covers in urban infrastructure. The system uses IoT technology to monitor the status of manhole covers in real-time and sends alerts to the authorities if a manhole cover is open or missing or stolen. The system also includes an Android Application to notify the people if they are near an open manhole cover and to ensure their safety. The system was developed using NodeMCU as an instance of Arduino, and for the web application the programming languages used were HTML, CSS, JavaScript, PHP and API. The system provides an efficient and effective solution for the management of manhole covers, reducing the overall cost of maintenance and ensuring public safety.
APA, Harvard, Vancouver, ISO, and other styles
5

R, Dr Rashmi, and Sashwitha K. "Manhole Monitoring System." International Research Journal of Computer Science 12, no. 04 (2025): 183–88. https://doi.org/10.26562/irjcs.2025.v1204.12.

Full text
Abstract:
A smart city is the future goal to have cleaner and better amenities for the society. Smart underground infrastructure is an important feature to be considered while implementing a smart city. Drainage system monitoring plays a vital role in keeping the city clean and healthy. Since manual monitoring is incompetent, this leads to slow handling of problems in drainage and consumes more time to solve. To mitigate all these issues, the system using a wireless sensor network, consisting of sensor nodes is designed. The proposed system is low cost, low maintenance, IoT based real time which alerts the managing station through a message when any manhole crosses its threshold values. This system reduces the death risk of manual scavengers who clean the underground drainage and also benefits the public. Nowadays, accidents due to broken and missing manhole covers are quite frequent. Manholes are not monitored properly in developing countries. These accidents can lead to serious injuries and also death. Hence, here we propose a system to overcome this problem. We have included an array of sensors for complete monitoring of the manhole cover so that such accidents can be prevented. This project includes a gas cover to monitor the gas emitted from the sewage systems so that toxicity can be monitored, the internal temperature is also monitored if a check for a change in the temperature as the property of manhole change.
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Jiajia, Yu Zeng, and Jiahao Wu. "Intelligent Monitoring and Safety Management System Construction of Manhole Cover Hidden Danger Based on YoSwin-Former Model." Applied and Computational Engineering 133, no. 1 (2025): 211–16. https://doi.org/10.54254/2755-2721/2025.20799.

Full text
Abstract:
This paper focuses on the safety management of urban manhole covers. In view of the drawbacks of the traditional management model and the frequent occurrence of manhole cover accidents, an intelligent manhole cover hidden danger identification project is proposed. The project is dedicated to solving the problems of high cost, difficult hidden danger detection, and low fault tolerance in the manhole cover hidden danger detection industry. A data set of 13,420 manhole covers in various states is collected through network search, field investigation, etc., and after data cleaning, standardization, annotation, and partitioning, the YoSwin - Former model, which combines the advantages of YOLOv5 and Swin Transformer, is used for training. This model performs excellently in feature extraction and dealing with complex scenes, effectively improving the accuracy and efficiency of manhole cover hidden danger detection, and has far-reaching significance for ensuring the safety of urban residents' lives and property and promoting the intelligence of urban management.
APA, Harvard, Vancouver, ISO, and other styles
7

Mo, Fu, Liang Yu, Zhengkuan Zhang, and Yang Zhao. "Design and Implementation of Manhole Cover Safety Monitoring System based on Smart Light Pole." Mathematical Problems in Engineering 2022 (August 25, 2022): 1–12. http://dx.doi.org/10.1155/2022/3081649.

Full text
Abstract:
Aiming at the current problems in the safety monitoring of urban manhole covers, this paper proposes a safety monitoring system for manhole covers based on smart light poles. The system uses STM32F103C8T6 as the microcontroller, and processes and controls the movement, loss, tilt, flooding, and positioning data of the manhole cover. Then, the data frame is sent to the LoRa gateway of the nearby smart light pole through the LoRa communication protocol, and the LoRa gateway will transmit the abnormal state of the manhole cover to the large screen display of the smart light pole through the bus. At the same time, a voice broadcast is carried out to remind localized road vehicles and pedestrians. Besides, it is sent to the IoT cloud platform KitLink, and the cloud platform will push the abnormal status data to the subscribed management user, and the user will quickly process it according to the positioning data. Among them, the terminal sensing control device of the manhole cover adopts an integrated package, and at the same time, it is installed at the center point under the manhole cover by using a waterproof material. It can not only carry out reliable and accurate installation without changing the original components but also can effectively monitor the safety. Through the design and implementation test of the system, it can be seen that the system can efficiently and accurately realize all-round and multi-modal safety linkage monitoring of urban manhole covers.
APA, Harvard, Vancouver, ISO, and other styles
8

Pradhan, Soumya Priyadarsini, Manoj Kumar Rath, and Rakesh Kumar Jena. "Strengthening of Precast Concrete Manhole Cover using GFRP Wrapping System." Circulation in Computer Science MCSP2017, no. 01 (2017): 1–3. http://dx.doi.org/10.22632/ccs-2017-mcsp024.

Full text
Abstract:
Today’s new high performance composite materials can be engineered to meet specific and critical needs in modern cities and industries. Fiber Reinforced Polymer (FRP) is considered to be the best alternate material for manhole covers as it has longer life span and has the capability to withstand heavy load. The invention related to Strengthening of precast concrete manhole cover by using fiber composite. Three sample of circular manhole cover were constructed for this experimental test program. Two different strengthening schemes were used in this paper. Sample 1 includes strengthened control slabs and other two were strengthened with Glass Fiber Reinforced Polymer (GFRP) Laminates. The strengthening of manhole covers was done with different layers of GFRP wraps. This is why investigation was undertaken to increase the durability of precast concrete covers. The high effectiveness of fiber reinforcement enhancing the load bearing capacity of concrete covers was investigated.
APA, Harvard, Vancouver, ISO, and other styles
9

Sunitha, M., K. Amarender, Dr Purushotham Nayak, and S. Ayesha. "MANHOLE MANAGEMENT SYSTEM." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 2662–67. http://dx.doi.org/10.61841/turcomat.v11i3.14468.

Full text
Abstract:
A smart city is the future goal to have cleaner and better amenities for the society. Smart underground infrastructure is an important feature to be considered while implementing a smart city. Drainage system monitoring plays a vital role in keeping the city clean and healthy. Since manual monitoring is incompetent, this leads to slow handling of problems in drainage and consumes more time to solve. To mitigate all these issues, the system using a wireless sensor network, consisting of sensor nodes is designed. The project aims in designing a manhole management system using IOT which alerts the managing station through web page when any manhole crosses its threshold values and also the system monitor the sensors data on LCD module. This system reduces the death risk of manual scavengers who clean the underground drainage and also benefits the public. The project makes a use of water level sensor, water flow sensor, Temperature sensor, Gas sensor and raspberry pi zero w processor. The controlling device of the whole system is raspberry pi processor. In this rise in temperature, explosion due to toxic gases, overflow, manhole lid left open is detected by the sensors. The signals from the sensors are fed to the raspberry pi, which is programmed to generate alerts. In this we use sensors to detect blockage, floods, and gases. The sensors will identify the clogging inside the drainage system and will give information to the user through email and further actions will be taken care by the municipal.&#x0D; Nowadays, accidents due to broken and missing manhole covers are quite frequent. Manholes are not monitored properly in developing countries. These accidents can lead to serious injuries and also death.&#x0D; Hence, here we propose a system to overcome this problem. We have included an array of sensors for complete monitoring of the manhole cover so that such accidents can be prevented. This project includes a gas cover to monitor the gas emitted from the sewage systems so that toxicity can be monitored, the internal temperature is also monitored if a check for a change in the temperature as the property of manhole change with temperature which could need to crack formation, Also, a float sensor is used to indicate when the water level goes beyond a certain level, in case of any alert due to any of the parameters we check on the IOT website. Also, all the parameters are continuously updated on the website.
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Zhan Bin, Jing Cheng Wang, and Hai Bo Zhang. "A Manhole Covers Intelligent Monitoring Terminal Based on Dual Frequency RFID and Acceleration Sensor." Advanced Materials Research 945-949 (June 2014): 1942–47. http://dx.doi.org/10.4028/www.scientific.net/amr.945-949.1942.

Full text
Abstract:
For management the manhole cover effectively, the manhole covers intelligent monitoring terminal (MCIMT) based on dual frequency RFID and acceleration sensor was proposed in this paper. Through hardware designing, alarm algorithm designing, program debugging and packaging, we developed the MCIMT. The key performance testing and demonstration system operation shown the following results. Firstly, the MCIMT communication distance can achieve 800 meters under the open conditions and 300 meters under the occluded environment reliably. Secondly, the MCIMT embedded special state estimate algorithm can output the correct scene sate of manhole cover. Thirdly, the MCIMT could operation 3 years in manhole cover. Lastly, the demonstration system based on the MCIMT can alarm accurately and timely.
APA, Harvard, Vancouver, ISO, and other styles
11

R, Srinivasulu, Hariprathap Reddy B, Husseini T, and Narasimhulu V. "MANHOLE MANAGEMENT SYSTEM." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 11, no. 3 (2020): 270–2729. http://dx.doi.org/10.61841/turcomat.v11i3.14515.

Full text
Abstract:
A smart city is the future goal to have cleaner and better amenities for the society. Smart underground infrastructure is an important feature to be considered while implementing a smart city. Drainage system monitoring plays a vital role in keeping the city clean and healthy. Since manual monitoring is incompetent, this leads to slow handling of problems in drainage and consumes more time to solve. To mitigate all these issues, the system using a wireless sensor network, consisting of sensor nodes is designed.&#x0D; &#x0D; The project aims in designing a manhole management system using IOT which alerts the managing station through web page when any manhole crosses its threshold values and also the system monitor the sensors data on LCD module. This system reduces the death risk of manual scavengers who clean the underground drainage and also benefits the public. The project makes a use of water level sensor, water flow sensor, Temperature sensor, Gas sensor and raspberry pi zero w processor. The controlling device of the whole system is raspberry pi processor. In this rise in temperature, explosion due to toxic gases, overflow, manhole lid left open is detected by the sensors. The signals from the sensors are fed to the raspberry pi, which is programmed to generate alerts. In this we use sensors to detect blockage, floods, and gases. The sensors will identify the clogging inside the drainage system and will give information to the user through email and further actions will be taken care by the municipal.&#x0D; &#x0D; Nowadays, accidents due to broken and missing manhole covers are quite frequent. Manholes are not monitored properly in developing countries. These accidents can lead to serious injuries and also death.&#x0D; Hence, here we propose a system to overcome this problem. We have included an array of sensors for complete monitoring of the manhole cover so that such accidents can be prevented. This project includes a gas cover to monitor the gas emitted from the sewage systems so that toxicity can be monitored, the internal temperature is also monitored if a check for a change in the temperature as the property of manhole change with temperature which could need to crack formation, Also, a float sensor is used to indicate when the water level goes beyond a certain level, in case of any alert due to any of the parameters we check on the IOT website. Also, all the parameters are continuously updated on the website.
APA, Harvard, Vancouver, ISO, and other styles
12

Singh, Ashutosh, Kartikeya Mishra, Sourav Kumar, and Chandra Shankar. "A Smart Manhole Monitoring and Detection System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 6472–79. http://dx.doi.org/10.22214/ijraset.2023.53012.

Full text
Abstract:
Abstract: An intelligent manhole cover management system is a crucial foundation in a smart city to effectively prevent frequent accidents related to manhole covers. Proper management of the drainage system is essential for ensuring the safety of residents. Regular inspections alone can lead to flooding and blockages in the drainage system. The displacement, relocation, and deterioration of manhole covers pose serious risks to personal safety, which contradicts the goals of smart city development. The system incorporates multiple sensors to monitor the status of manholes, including detecting lid openings, cover theft, and temperature variations. Additionally, this paper aims to analyze real-time levels of toxic gases. If the gas levels exceed the predetermined threshold, alerts will be sent to the authorized individuals through their connected mobile devices, even if they are remotely located.
APA, Harvard, Vancouver, ISO, and other styles
13

Guo, Jiahu, Kai Wang, Jianquan Sun, and Youcheng Jia. "Research and Implementation of Low-Power Anomaly Recognition Method for Intelligent Manhole Covers." Electronics 12, no. 8 (2023): 1926. http://dx.doi.org/10.3390/electronics12081926.

Full text
Abstract:
This paper addresses the difficulty of balancing a real-time response and low power consumption in intelligent manhole cover application scenarios. It proposes a method to distinguish normal and abnormal events by segmenting the boundary at which the acceleration of the intelligent manhole cover deviates from a set threshold and lasts for a certain period, based on the difference in the intelligent manhole cover’s vibration patterns when a normal event and an abnormal event occur. This paper uses the autonomous data fusion of digital output motion sensor data to implement a pattern recognition algorithm for the above-mentioned pattern, which reduces the MCU computing and working time and the overall power consumption of the system while meeting real-time response requirements. The test results demonstrate that the method has a high rate of anomaly recognition accuracy. The method ensures the system’s real-time response capability, and the actual low power consumption test demonstrates that the device can operate continuously for 9.5 years. The low power consumption index exceeds the requirements of the existing national standard, thereby resolving the issue that it is challenging to balance intelligent manhole cover abnormality recognition and low power consumption.
APA, Harvard, Vancouver, ISO, and other styles
14

Yu, Liang, Zhengkuan Zhang, Yangbing Lai, Yang Zhao, and Fu Mo. "Edge computing-based intelligent monitoring system for manhole cover." Mathematical Biosciences and Engineering 20, no. 10 (2023): 18792–819. http://dx.doi.org/10.3934/mbe.2023833.

Full text
Abstract:
&lt;abstract&gt; &lt;p&gt;Unusual states of manhole covers (MCs), such as being tilted, lost or flooded, can present substantial safety hazards and risks to pedestrians and vehicles on the roadway. Most MCs are still being managed through manual regular inspections and have limited information technology integration. This leads to time-consuming and labor-intensive identification with a lower level of accuracy. In this paper, we propose an edge computing-based intelligent monitoring system for manhole covers (EC-MCIMS). Sensors detect the MC and send status and positioning information via LoRa to the edge gateway located on the nearby wisdom pole. The edge gateway utilizes a lightweight machine learning model, trained on the edge impulse (EI) platform, which can predict the state of the MC. If an abnormality is detected, the display and voice device on the wisdom pole will respectively show and broadcast messages to alert pedestrians and vehicles. Simultaneously, the information is uploaded to the cloud platform, enabling remote maintenance personnel to promptly repair and restore it. Tests were performed on the EI platform and in Dongguan townships, demonstrating that the average response time for identifying MCs is 4.81 s. Higher responsiveness and lower power consumption were obtained compared to cloud computing models. Moreover, the system utilizes a lightweight model that better reduces read-only memory (ROM) and random-access memory (RAM), while maintaining an average identification accuracy of 94%.&lt;/p&gt; &lt;/abstract&gt;
APA, Harvard, Vancouver, ISO, and other styles
15

Ding, Yanqiong, Baojiang Han, Hua Jiang, et al. "Application of Improved YOLOv8 Image Model in Urban Manhole Cover Defect Management and Detection: Case Study." Sensors 25, no. 13 (2025): 4144. https://doi.org/10.3390/s25134144.

Full text
Abstract:
Manhole covers are crucial for maintaining urban operations and ensuring residents’ travel. The traditional inspection and maintenance management system based on manual judgment has low efficiency and poor accuracy, making it difficult to adapt to the rapidly expanding urban construction and complex environment of manhole covers. To address these challenges, an intelligent management model based on the improved YOLOv8 model is proposed for three types of urban high-frequency defects: “breakage, loss and shift”. We design a lightweight dual-stream feature extraction network and use EfficientNetV2 as the backbone. By introducing the fused MBConv structure, the computational complexity is significantly reduced, while the efficiency of feature extraction is improved. An innovative foreground attention module is introduced to adaptively enhance the features of manhole cover defects, improving the model’s ability to identify defects of various scales. In addition, an optimized feature fusion architecture is constructed by integrating NAS-FPN modules. This structure utilizes bidirectional feature transfer and automatic structure search, significantly enhancing the expressiveness of multi-scale features. A combined loss function design using GIoU loss, dynamically weighted BCE loss, and Distribution Focal Loss (DFL) is adopted to address the issues of sample imbalance and inter-class differences. The experimental results show that the model achieved excellent performance in multiple indicators of manhole cover defect recognition, especially in classification accuracy, recall rate, and F1-score, with an overall recognition accuracy of 98.6%. The application of the improved model in the new smart management system for urban manhole covers can significantly improve management efficiency.
APA, Harvard, Vancouver, ISO, and other styles
16

Utepov, Yelbek, Alexandr Neftissov, Timoth Mkilima, et al. "Prototyping an integrated IoT-based real-time sewer monitoring system using low-power sensors." Eastern-European Journal of Enterprise Technologies 3, no. 5 (123) (2023): 6–23. http://dx.doi.org/10.15587/1729-4061.2023.283393.

Full text
Abstract:
Improper monitoring of sewage networks may raise various issues such as overflows, pipe blockages, theft of manhole covers, leading to flooding and pollution, infrastructure damage, vehicles accidents, injury, and even death from falling into open manholes. The key objective of this research was to examine different elements and create a prototype architecture for a real-time sewer monitoring system. Implementation of the architecture involved constructing a data gathering station and experimenting with various wireless sensing devices to assess the precision of the sensors. In addition, the study sought to design a geographic information system that integrates algorithms capable of identifying sewer overflow, blocked pipes, and the presence of manhole covers. The performance of Sharp GP2Y0A41SK0F infrared, TF-Luna Benewake LiDar, TOF400 VL53L1X laser, JSN-SR04T ultrasonic distance sensors was tested in terms of their ability to monitor water level and manhole cover. Tests revealed the most favorable results in TOF400 VL53L1X at distances between 0.2 and 1.0 m (presumed distance to the manhole cover) with a standard deviation of 0.13–0.24, and in TF-Luna Benewake at distances between 1.0 and 5.0 m (presumed distance to the chamber bottom) with a standard deviation of 0.44–1.15. The deviation analysis has yielded equations that can be utilized to provide rough estimates of the accuracy levels of the aforementioned sensors, based on the measured distance. Additionally, the FC-28 analog and YL-63 infrared sensors were evaluated for detecting pipe blockages, with the YL-63 being more suitable. The outcomes of this study furnish valuable insights that can aid in achieving sustainable resolutions for issues related to sewer monitoring
APA, Harvard, Vancouver, ISO, and other styles
17

Kim, Eun-Hee, Hae-Won Son, Hoyong Kang, and In-hwan Lee. "Manhole-cover Shaped Antenna Design for Underground Facilities Monitoring System." Procedia Computer Science 110 (2017): 40–45. http://dx.doi.org/10.1016/j.procs.2017.06.112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Himanshu, S. "IOT based Manhole Detection and Monitoring System." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 1608–13. http://dx.doi.org/10.22214/ijraset.2022.43862.

Full text
Abstract:
Abstract: The sewage system must be monitored in order to maintain the city clean. Uneven sewage system monitoring causes drainage to become clogged. Blockages in the sewer system are a major source of sewer flooding and pollution. Workers may be involved in an accident as a result of their ignorance of the situation inside the manhole. To get the necessary output from the module, this model uses a regulator circuit, sensor driver circuit, microcontroller, serial communication devices, and IoT module. Overflowing drains in the sewage system are one of the most prevalent difficulties identified, which become more severe during the monsoon seasons when the authorities are ignorant of the overflowing drains. It is unsanitary for the adjacent residents and creates waterlogging, which leads to bug breeding. Our answer to this problem is an IoT system that warns municipal officials about overflowing drains immediately by email or notification at the city control centre, as well as citizens via social media or a mobile app. The essential component of this system is a low-power IoT-based portable gadget that is mounted below the manhole cover. [2][7]
APA, Harvard, Vancouver, ISO, and other styles
19

Kim, Jikyum, Sumin Lee, and Joo-Hyun Moon. "A Two-Stage, Self-Pressure-Controlled Smart Manhole System with Motor-Driven and Lifting Mechanisms for Enhanced Flood Disaster Preparedness." Water 17, no. 7 (2025): 978. https://doi.org/10.3390/w17070978.

Full text
Abstract:
Frequent extreme rainfall events by climate change have substantially heightened drainage system loads, often resulting in manhole cover dislodgment, property damage, and injuries from open manholes. To address this escalating risk, this study proposes a self-pressure-controlled smart manhole system comprising a motor-driven rotating blade for initial pressure regulation and a lid-lifting mechanism for secondary relief under high-intensity flows. By offering two distinct opening stages, the design successfully mitigates excessive internal pressures and velocities that would otherwise endanger public safety. Through computational fluid dynamics (CFD) simulations and verification using a 3D-printed prototype, the system demonstrated the capacity to reduce internal pressures by up to 99.5% and lower peak flow velocities by approximately 93.4% compared to conventional closed-cover conditions. These results underscore the effectiveness of the multi-phase approach in managing both moderate and severe inflow scenarios, providing a viable strategy for improving urban drainage resilience against increasingly frequent and intense rainfall events.
APA, Harvard, Vancouver, ISO, and other styles
20

Jia, Gangyong, Guangjie Han, Huanle Rao, and Lei Shu. "Edge Computing-Based Intelligent Manhole Cover Management System for Smart Cities." IEEE Internet of Things Journal 5, no. 3 (2018): 1648–56. http://dx.doi.org/10.1109/jiot.2017.2786349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ishitsuka, Kei, Makoto Kawakami, Yuki Kuwahara, and Nobuhiro Kai. "Performance of manhole under severe condition in Japan." ce/papers 6, no. 6 (2023): 1534–40. http://dx.doi.org/10.1002/cepa.2959.

Full text
Abstract:
AbstractJapan is prone to natural disasters such as earthquakes and torrential rains. Since those disasters have become more severe, extending the life of infrastructure is an urgent issue. Modern sewer system in Japan have been constructed since 1884, and regular inspection, cleaning, and repair are essential to prolonging the life of sewage pipes. Manholes, which are entrances to sewage systems, can be regarded to be one of the important structures that support our safe, secure, and comfortable lives.In this paper, two main parts composed of a manhole, a cover and its bottom, are introduced. The cover made of spheroidal graphite cast iron (cast iron cover) and the manhole bottom made of resin concrete have been developed to extend the life and performance of manholes. The cast iron cover has been made lighter by optimizing the material and structure, does not rattle even when automobiles pass through it at high speed, and automatically releases pressure when the pressure in pipe rises. In addition, the introduction of resin concrete compensates for the shortcomings of cement concrete, such as low curing speed, salt damage, and freezethaw characteristics. Finally, examples of implementations and achievements with the developed materials and structures are presented and discussed.
APA, Harvard, Vancouver, ISO, and other styles
22

Guo, Huijuan. "Research on Ecological Design of Intelligent Manhole Covers Based on Fuzzy Analytic Hierarchy Process." Sustainability 16, no. 13 (2024): 5310. http://dx.doi.org/10.3390/su16135310.

Full text
Abstract:
In response to the global demand for sustainable development in urban areas, there is an urgent need to enhance the ecological environment of urban areas. Urban renewal through sponge cities has become an effective method for achieving this goal. As one of the most dynamic elements in urban spaces, manhole covers play a crucial role in enhancing the city’s image. To facilitate urban redevelopment effectively, improve the functionality of urban manhole covers, and promote sustainable urban development, this study explores ecological design factors for urban manhole covers, providing recommendations for future designs in China. Grounded on existing literature research and the urban redevelopment planning of the central district in Maanshan City, the FAHP method was used to determine the weights of five indicators containing environmental esthetics, ecological sustainability, intelligent detection, intelligent interaction, and safety, and scientifically constructed the ecological design and evaluation index system of intelligent grass pot manhole cover. The weighted average algorithm was used to obtain the index priority ranking, and the most critical elements were selected for design and refinement. The evaluation results indicate that safety, ecological sustainability, and the enhancement of the ecological design of intelligent manhole covers show the most significant improvement. The research outcomes can be used as a reference for enhancing urban ecological environments, promoting urban regeneration, and advancing sponge city construction.
APA, Harvard, Vancouver, ISO, and other styles
23

Lin, Junran, Cuimei Yang, Yi Lu, Yuxing Cai, Hanjie Zhan, and Zhen Zhang. "An Improved Soft-YOLOX for Garbage Quantity Identification." Mathematics 10, no. 15 (2022): 2650. http://dx.doi.org/10.3390/math10152650.

Full text
Abstract:
Urban waterlogging is mainly caused by garbage clogging the sewer manhole covers. If the amount of garbage at a sewer manhole cover can be detected, together with an early warning signal when the amount is large enough, it will be of great significance in preventing urban waterlogging from occurring. Based on the YOLOX algorithm, this paper accomplishes identifying manhole covers and garbage and building a flood control system that can automatically recognize and monitor the accumulation of garbage. This system can also display the statistical results and send early warning information. During garbage identification, it can lead to inaccurate counting and a missed detection if the garbage is occluded. To reduce the occurrence of missed detections as much as possible and improve the performance of detection models, Soft-YOLOX, a method using a new detection model for counting, was used as it can prevent the occurrence of missed detections by reducing the scores of adjacent detection frames reasonably. The Soft-YOLOX improves the accuracy of garbage counting. Compared with the traditional YOLOX, the mAP value of Soft-YOLOX for garbage identification increased from 89.72% to 91.89%.
APA, Harvard, Vancouver, ISO, and other styles
24

Matos, Rita Ventura, Filipa Ferreira, and José Saldanha Matos. "Influence of ventilation in H2S exposure and emissions from a gravity sewer." Water Science and Technology 81, no. 10 (2020): 2043–56. http://dx.doi.org/10.2166/wst.2020.253.

Full text
Abstract:
Abstract This study was carried out to evaluate the effect of natural ventilation and intermittent pumping events in hydrogen sulfide and methane dynamics, in terms of system operation and risk of gas exposure. Work was conducted in a full scale gravity sewer downstream of pumping stations, in Portugal. Different ventilation rates and locations were assessed, as well as H2S removal rates and potential exposure risk, through the opening of distinct manhole covers. Increased ventilation, resulting from opening of one manhole cover, saw a 38% increase in average pipe air velocity peaks, doubling the estimated rate of air turnovers per day, accompanied by an increase of nearly 20% in H2S average removal rate. Simultaneous opening of two manhole covers induced similar airflow rates through the vent stack, but different rates throughout the pipe. H2S removal rates were also found to differ, according to location of open manholes, but also initial H2S headspace concentration. Under more unfavourable conditions, natural ventilation did not suffice in attaining recommended safety concentrations, regardless of number and location of open manhole covers. H2S concentrations above defined thresholds were verified for all studied setups. Headspace oxygen concentrations below an 18.5% asphyxiation threshold also occasionally occurred, even at manholes immediately downstream of ventilation point.
APA, Harvard, Vancouver, ISO, and other styles
25

石, 林鑫. "Design of an Intelligent Manhole Cover with Automatic Alarm System Based on STM32." Modeling and Simulation 14, no. 05 (2025): 946–54. https://doi.org/10.12677/mos.2025.145447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Luo, Ping, Huajun Wang, Changcheng Xiang, and Chengbing Huang. "A WSN system for high-precision cable manhole cover movement detection uses TDOA ranging method." Journal of Physics: Conference Series 1971, no. 1 (2021): 012024. http://dx.doi.org/10.1088/1742-6596/1971/1/012024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Zhang, Kaiyu, Baohua Wang, Hongyan Chen, et al. "Inspection Cover Damage Warning System Using Deep Learning Based on Data Fusion and Channel Attention." Electronics 14, no. 12 (2025): 2383. https://doi.org/10.3390/electronics14122383.

Full text
Abstract:
This paper explores the application of artificial intelligence in urban energy infrastructure construction and enhances the operation and maintenance safety of infrastructure through edge computing and advanced sensors. At present, urban manhole covers cover a large number of roads, but there is a lack of effective real-time monitoring methods. In order to effectively solve these problems, this study proposes a domain adaptive network algorithm (EDDNet) based on data fusion. By optimizing the loss function, the attention mechanism is used to make the model pay more attention to the deep features related to the abnormal state of the inspection cover. The algorithm solves the problem of broadband vibration analysis and reduces the misclassification rate in various behavioral scenarios, including pedestrian traffic, slow-moving vehicles, and intentional surface collisions. A data acquisition sensor network is established, and a six-degree-of-freedom coupled vibration model and a structural vibration model of the inspection cover are established. The vibration peak under high load conditions is modeled and simulated using impact load data, and a fitting curve is generated to achieve deep optimization of the model and enhance robustness. The experimental results show that the classification accuracy of the network reaches 95.23%, which is at least 10.2% higher than the baseline model.
APA, Harvard, Vancouver, ISO, and other styles
28

Aung, Myint Aye. "LSB Based Image Steganography for Information Security System." International Journal of Trend in Scientific Research and Development 3, no. 1 (2018): 394–400. https://doi.org/10.31142/ijtsrd18995.

Full text
Abstract:
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye &quot;LSB Based Image Steganography for Information Security System&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: https://www.ijtsrd.com/papers/ijtsrd18995.pdf
APA, Harvard, Vancouver, ISO, and other styles
29

Pratik, R. Dhende, S. Mohitkar Karan, A. Mohitkar Hrishikesh, S. Gorwade Shubham, and Bavachkar Seema. "Laser Security System." Research and Applications: Emerging Technologies 3, no. 2 (2020): 1–6. https://doi.org/10.5281/zenodo.3899672.

Full text
Abstract:
<em>This research paper is to analyze, that now a day&rsquo;s security is an important aspect. Technology develops day by day in the world. Now days the crime gang also improves their technology to carry out their operation. So technology of security should be modern with time to protect the world from crime. We decide to make a security issue as our project. In this project we have used laser beam to cover a large area. We know laser light goes to long distance without scattering effect. It&#39;s additionally obvious just at source and occurrence point, in any case invisible. These two properties help us to develop a modern security system, which may name as &quot;Laser Security System.&quot; When any person or object crossover the laser light, automatically the buzzer starts ringing. Laser beam goes through long distance without scattering effect and the ray is almost invisible. The project involves the use of Arduino UNO, Laser light, Buzzer, LDR and a simple program. With this equipment&rsquo;s we can easily set up a security alarm anywhere for unwanted intruders. A Laser Security System goes about as a standalone system, which makes sound or commotion when it distinguishes any sporadic action or can be part of a much bigger security or any other automation system which can alert owner. </em>
APA, Harvard, Vancouver, ISO, and other styles
30

AbdulJabbar, Israa, and Wala’a Abdul Ghafoor. "Proposed Watermarking System Using Genetic Algorithm and Security Measures." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 2 (October 6, 2021): 279–303. http://dx.doi.org/10.55562/jrucs.v43i2.154.

Full text
Abstract:
This paper produces a proposed watermarking system to be used for protecting images from tampering by attackers and other third parties. This proposed system consists of three stages: pattern generation, watermark embedding and watermarking extracting. In the first stage, two patterns (primary and secondary) are generated from some features of the image that used as a watermark, then applying a genetic algorithm to get random, unique and robust primary pattern, This unique pattern that is generated from image used as a watermark and embeds this pattern in the original cover image instead of embedding the whole watermarking image inside the cover image. The primary pattern will be embedded in different three locations mainly diagonal, vertical and horizontal lines in the middle of the cover image. The receiver can retrieve this pattern to ensure that it is the same pattern that is generated from the watermark image. In addition to generate and embed secondary pattern that used to confirm between the sender and the recipient, if the secondary pattern doesn’t match, the recipient tells the sender to resend the image again. Different experiments are applied to test the system and the results show the watermark is random, imperceptible, and robust enough against image cropping attacks, fully secure, and Peak Signal to Noise Ratio (PSNR) value of the watermarked image is better than the watermarked image of many previous watermarking system when compared with them.
APA, Harvard, Vancouver, ISO, and other styles
31

Hubaut, Rémy, Romain Guichard, Julia Greenfield, and Mathias Blandeau. "Validation of an Embedded Motion-Capture and EMG Setup for the Analysis of Musculoskeletal Disorder Risks during Manhole Cover Handling." Sensors 22, no. 2 (2022): 436. http://dx.doi.org/10.3390/s22020436.

Full text
Abstract:
Musculoskeletal disorders in the workplace are a growing problem in Europe. The measurement of these disorders in a working environment presents multiple limitations concerning equipment and measurement reliability. The aim of this study was to evaluate the use of inertial measurement units against a reference system for their use in the workplace. Ten healthy volunteers conducted three lifting methods (snatching, pushing, and pulling) for manhole cover using a custom-made tool weighting 20 and 30 kg. Participants’ back and dominant arm were equipped with IMU, EMG, and reflective markers for VICON analysis and perception of effort was estimated at each trial using a Visual Analog Scale (VAS). The Bland–Altman method was used and results showed good agreement between IMU and VICON systems for Yaw, Pitch and Roll angles (bias values &lt; 1, −4.4 &lt; LOA &lt; 3.6°). EMG results were compared to VAS results and results showed that both are a valuable means to assess efforts during tasks. This study therefore validates the use of inertial measurement units (IMU) for motion capture and its combination with electromyography (EMG) and a Visual Analogic Scale (VAS) to assess effort for use in real work situations.
APA, Harvard, Vancouver, ISO, and other styles
32

Htet, May, and Su Wai Phyo. "A Novel Text Steganographic Technique Using Specific Alphabets." Journal of Computer Science 2, no. 1 (2016): 1–11. http://dx.doi.org/10.31357/jcs.v2i1.2721.

Full text
Abstract:
In today’s electronic era, wealth of electronic information are accessing over the Internet. Several important information and private data transferring over the Internet are being hacked by attackers via latest communication technology. So, maintaining the security of secret data has been a great challenge. To tackle the security problem, cryptographic methods as well as steganographic techniques are essential. This paper focuses on hybrid security system using cryptographic algorithm and text steganographic technique to achieve a more robust security system. In this work, to overcome the limited data hiding capacity, suspiciousness, and data damaging effect due to modification, of traditional steganographic techniques, a new technique for information hiding in text file is proposed. The proposed approach conceals a message, without degrading cover, by using first, second, second last, and last letter of words of the cover text. Hence, from the embedding capacity point of view, its capacity depends on the similarity of characters of the words in cover text. In addition, as further improvement for security, secret message encryption is performed using Blowfish algorithm before hiding into the innocuous cover text.
APA, Harvard, Vancouver, ISO, and other styles
33

Alshami, Ahmad, Moustafa Elsayed, Saeed Reza Mohandes, et al. "Performance Assessment of Sewer Networks under Different Blockage Situations Using Internet-of-Things-Based Technologies." Sustainability 14, no. 21 (2022): 14036. http://dx.doi.org/10.3390/su142114036.

Full text
Abstract:
This study aims to model the performance of sewage networks under diverse blockage situations in terms of overflow occurrence using internet-of-things-based technologies in Hong Kong. To this end, a multi-stage methodological approach is employed, starting from collecting required data using smart sensors, utilizing novel data mining techniques, and using a case study simulation. From the results obtained, the following conclusions are drawn: (1) several sites under investigation are imbued with partial blockages, (2) the overall performance of the sewer network has a nonlinear relationship with the blockages in terms of the remaining time to overflow, (3) in cases of complete blockages, the sewer only takes few minutes to reach the manhole cover level that causes the system to experience overflow, and (4) cleaning work significantly improve the performance of the sewage network by 86%. The outcomes of this study provide a solid foundation for the concerned environmental engineers and decision-makers towards reducing the magnitude of sewer overflow and improving different aspects of our environment.
APA, Harvard, Vancouver, ISO, and other styles
34

Ogrizović, Mihajlo, Pavle Vuletić, and Žarko Stanisavljević. "Advanced Network and System Security Teaching." Electronics 14, no. 1 (2024): 3. https://doi.org/10.3390/electronics14010003.

Full text
Abstract:
In an attempt to address the growing shortage of cybersecurity specialists in the country, the School of Electrical Engineering, University of Belgrade, started the course entitled Advanced Network and System Security (ANS) in the 2019/2020 school year. The ANS course covers the topics of computer system and network security, intrusion detection and prevention, and ethical hacking methodologies. This paper presents the course organization and associated laboratory environment and exercises and aims to prove that providing such a multidisciplinary laboratory leads to successful learning outcomes and directly improves gained knowledge in cybersecurity. The ANS course differs from all other related courses by covering various cybersecurity topics ranging from hardware through to network to web security. The analysis showed that 13 out of 19 Cyber Security Body of Knowledge classification Knowledge Areas are covered in the ANS course, unlike other related courses which cover up to 8 Knowledge Areas. Ultimately, the students’ practical skills improvement evaluation was performed through quantitative and qualitative analysis in order to prove that improving practical skills in the ANS laboratory resulted in the overall improvement of the gained knowledge.
APA, Harvard, Vancouver, ISO, and other styles
35

Shejole, Prof Sakshi, Priya Sawant, Rohini Jadhav, Jyoti Rajput, and Pratiksha Netke. "Secret Communication Using Multi-Image Steganography with Face Recognition and OTP System." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 3476–81. http://dx.doi.org/10.22214/ijraset.2023.52407.

Full text
Abstract:
Abstract: Our Proposed system is to develop a Web operation for hiding information in any image train to ensure the safety of the exchange of data between different military parties and give better security during communication transmission. We use the LSB fashion. The proposed approach uses a steganography algorithm to bed data in the image lines for military operations. For security purposes, we used modules face Recognition fashion with the AES algorithm for Strong Security purposes. And we use the cover channel fashion as an information-hiding fashion that can be exploited by a process to transfer information in a manner that violates the system security programs. Image steganography is the main aspect of information caching where the ciphertext is bedded into an image called a cover image which is coming to insolvable for the interferers to see with their naked eyes. The retired information can be any textbook, images, audio, or indeed videos inside a cover image. The abstract description ofMulti-image Steganography is that the secret law is divided into multiple corridors and is etched into multiple cover images. So we proposed two image steganography ideas to make it veritably grueling for the hackers to conceal the data. This paper proposes the Least significant bit( LSB) fashion of Steganography and the Advanced Encryption Standard( AES) fashion of Cryptography to make a safe and secure system. Then the sender and the receiver use the same key to encrypt and decipher the data which is popularly nominated a symmetric crucial Keywords AES Algorithm, LSB Algorithm, and Steganography.
APA, Harvard, Vancouver, ISO, and other styles
36

Chalapko, Vladimir Viktorovitch. "INFORMATION SECURITY: TO THE PROBLEM OF PLACE AND ROLE IN THE NATIONAL SECURITY SYSTEM." Bulletin of Yaroslav Mudryi National Law University. Series:Philosophy, philosophies of law, political science, sociology 51, no. 4 (2021): 83–95. https://doi.org/10.21564/2663-5704.51.242004.

Full text
Abstract:
<em>The article substantiates that the information impact carried out using the technologies of control and manipulation of public consciousness causes dysfunctional processes that impede the optimal functioning of state institutions. The main object of protection in this case is the public consciousness. It is noted that the specifics of information security allows it to cover all types of security: economic, socio-political, military and environmental, therefore its provision is a priority in the process of solving national security problems. The conditions for ensuring the main types of state security depend on ensuring information security at the present stage of development of society.</em>
APA, Harvard, Vancouver, ISO, and other styles
37

Schoell, Kyle, Aryan Haratian, Amir Fathi, et al. "Anatomic Repair of a Lateral Collateral Ligament and Anterolateral Capsular Complex Injury With Internal Brace Augmentation." Video Journal of Sports Medicine 2, no. 4 (2022): 263502542210930. http://dx.doi.org/10.1177/26350254221093082.

Full text
Abstract:
Background: Lateral collateral ligament (LCL) injuries are implicated in varus instability of the knee. Often, these accompany other ligamentous injuries including anterior cruciate ligament (ACL), posterior cruciate ligament (PCL) tears, and injury to the anterolateral capsular complex (ALCC). Use of internal brace augmentation with anatomic repair is an alternative to reconstruction to improve patient outcomes and facilitate early range of motion and weight bearing. Indications: We present a case of an anatomic repair of a LCL and an ALCC injury with internal brace augmentation. Technique Description: A curvilinear incision centered over the lateral epicondyle is used. The avulsed LCL and biceps tendon was exposed and a placed #5 FiberWire was placed into the distal LCL, biceps tendon, and the popliteofibular ligament. A split was made in the iliotibial (IT) band and a second #5 FiberWire was placed proximally in the LCL/biceps tendon for additional fixation. A tunnel was made in the fibular head and tibia using a 2.4-mm beath pin and the two #5 FiberWires were passed to the anteromedial tibia. The FiberWires were fixed to the tibia using a 14-mm attachable button system (ABS) manhole cover for suspensory fixation. Repair and internal bracing of the anterolateral capsular complex was accomplished with 2 interlocked TightRopes and a #2 FiberTape. This fixation method achieved repair by compressing the anterolateral capsular complex onto its tibial origin. The suture devices also served to augment the repair and were fixed proximally to the femur using another 14-mm ABS manhole cover. The FiberTape was fixed to the anterolateral tibia distally with a 4.5 mm SwiveLock. The TightRopes were passed through a tunnel to the anterolateral tibia and secured using an ABS Dog Bone. The construct was tensioned in near full extension and gapping was matched fluoroscopically to the contralateral knee. Results: Patient was cleared for full return to sports 9 months postoperatively. At the final follow up visit, the patient had excellent strength, stability, and 135° range of motion on the operative knee. Patient had returned to exercise at home but was unable to return to sports due to COVID-19 restrictions. Conclusion: Anatomic repair of the LCL and the ALCC with internal brace augmentation can serve as an effective alternative to reconstruction and demonstrates excellent patient outcomes regarding restoring stability, ROM, and return to preoperative sports.
APA, Harvard, Vancouver, ISO, and other styles
38

Djordjević, S., D. Prodanović, Č. Maksimović, M. Ivetić, and D. Savić. "SIPSON – Simulation of Interaction between Pipe flow and Surface Overland flow in Networks." Water Science and Technology 52, no. 5 (2005): 275–83. http://dx.doi.org/10.2166/wst.2005.0143.

Full text
Abstract:
The new simulation model, named SIPSON, based on the Preissmann finite difference method and the conjugate gradient method, is presented in the paper. This model simulates conditions when the hydraulic capacity of a sewer system is exceeded, pipe flow is pressurized, the water flows out from the piped system to the streets, and the inlets cannot capture all the runoff. In the mathematical model, buried structures and pipelines, together with surface channels, make a horizontally and vertically looped network involving a complex interaction of flows. In this paper, special internal boundary conditions related to equivalent inlets are discussed. Procedures are described for the simulation of manhole cover loss, basement flooding, the representation of street geometry, and the distribution of runoff hydrographs between surface and underground networks. All these procedures are built into the simulation model. Relevant issues are illustrated on a set of examples, focusing on specific parameters and comparison with field measurements of flooding of the Motilal ki Chal catchment (Indore, India). Satisfactory agreement of observed and simulated hydrographs and maximum surface flooding levels is obtained. It is concluded that the presented approach is an improvement compared to the standard “virtual reservoir” approach commonly applied in most of the models.
APA, Harvard, Vancouver, ISO, and other styles
39

Jarmakiewicz, Jacek, Krzysztof Maślank, and Krzysztof Parobczak. "Evaluation of the Cyber Security Provision System for Critical Infrastructure." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2015): 22–29. http://dx.doi.org/10.26636/jtit.2015.4.980.

Full text
Abstract:
The paper presents an assessment of the functional mechanisms that are part of the security system for the power grid control. The security system, its components, and the real time processes for the control of electricity supply were defined. In particular, SCADA protocols used in the control system and mechanisms for transferring them between the control center and actuators were identified. The paper also includes presentation of a test environment that is used for developed security mechanisms evaluation. In the last fragment of the paper, the test scenarios were formulated and the results obtained in the cyber security system were shown, which cover security probes reaction delay, forged malicious IEC 60870-5-104 traffic detection, DarkNet and HoneyPot interception of adversary actions, and dynamic firewall rules creation.
APA, Harvard, Vancouver, ISO, and other styles
40

Shintania, Mira, Wiyanto Wiyanto, and Sanudin Sanudin. "Integrasi Sistem Monitoring Pengemasan Document Security dengan Barcode Berbasis Web." Journal of Information System Research (JOSH) 5, no. 4 (2024): 1371–80. https://doi.org/10.47065/josh.v5i4.5687.

Full text
Abstract:
Rapid technological developments demand innovation and creativity in utilizing and creating new solutions. This also applies to PT Xyz, which is facing digital transformation to integrate its systems. One of the challenges faced is that the packaging monitoring process is still carried out manually using queries on the database, causing limited access and lack of work efficiency Since the only individual with access to the database is the IT division. Research was carried out to build a web-based platform intended for monitoring packaging processes results using barcode numbers where there are 3 packages used, namely small cover, large cover and box cover. This system was developed using the waterfall methodology and SQL Server for the database. It aims to simplify data access for employees, reducing their dependence on the IT department, and enhance the accuracy and efficiency of their workflow by allowing direct data monitoring. Unified Modeling Language (UML) was utilized for system design modeling. The research outcomes include the integration of the packaging monitoring system with current packaging applications. Blackbox testing was employed, and the results confirmed that the barcode-based packaging monitoring system operated correctly without any errors.
APA, Harvard, Vancouver, ISO, and other styles
41

Jasim Halboos, Estabraq Hussein, and Abbas M. Albakry. "Improve steganography system using agents software based on statistical and classification technique." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1595–606. http://dx.doi.org/10.11591/eei.v12i3.4540.

Full text
Abstract:
In digital communications, information security is a paramount necessity. In the hiding algorithm, there are three basic parameters: security, capacity, and imperceptibility. Therefore, there are many ways to design the steganography algorithm, such as least significant bit (LSB), discrete wave transformation (DWT), and discrete cosine transform (DCT). The aim of this paper is to improve agent software design based on a steganography system. It proposed an agent system based on a support vector machine (SVM) classifier to hide a secret message in a certain cover image. The common dataset for steganography uses 80% training and 20% testing to get accurate results. Developing an agent system depends on six statistical parameters such as energy, standard deviation, histogram, variance, mean, and entropy. This resulted in features classified by the SVM classifier to predict the best cover image to be nominated for embedding. Worthy results were obtained in terms of imperceptibility, attack, and cover image prediction by statistical issues.
APA, Harvard, Vancouver, ISO, and other styles
42

Estabraq, Hussein Jasim Halboos, and M. Albakry Abbas. "Improve steganography system using agents software based on statistical and classification technique." Bulletin of Electrical Engineering and Informatics 12, no. 3 (2023): 1595–606. https://doi.org/10.11591/eei.v12i3.4540.

Full text
Abstract:
In digital communications, information security is a paramount necessity. In the hiding algorithm, there are three basic parameters: security, capacity, and imperceptibility. Therefore, there are many ways to design the steganography algorithm, such as least significant bit (LSB), discrete wave transformation (DWT), and discrete cosine transform (DCT). The aim of this paper is to improve agent software design based on a steganography system. It proposed an agent system based on a support vector machine (SVM) classifier to hide a secret message in a certain cover image. The common dataset for steganography uses 80% training and 20% testing to get accurate results. Developing an agent system depends on six statistical parameters such as energy, standard deviation, histogram, variance, mean, and entropy. This resulted in features classified by the SVM classifier to predict the best cover image to be nominated for embedding. Worthy results were obtained in terms of imperceptibility, attack, and cover image prediction by statistical issues.
APA, Harvard, Vancouver, ISO, and other styles
43

Wails, Ryan, Andrew Stange, Eliana Troper, et al. "Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (2022): 179–99. http://dx.doi.org/10.56553/popets-2022-0068.

Full text
Abstract:
Censorship-resistant communication systems generally use real-world cover protocols to establish a covert channel through which uncensored communication can occur. Unfortunately, many previously proposed systems use cover protocols inconsistently with the way humans normally use those protocols, leading to anomalous network traffic patterns that have been shown to be discoverable by real-world censors. In this paper, we argue that censorship-resistant communication systems should follow two behavior-based design properties: (i) behavioral independence: systems should isolate the operation of their covert channels from the operation of their cover protocols, and (ii) behavioral realism: systems should either opportunistically use existing genuine cover protocol instances or run new protocol instances that are modeled after genuine ones. These properties ensure that the behavior of a system’s users will not degrade its security. We demonstrate how to achieve these properties through the design and evaluation of Raven, a censorship-resistant messaging system that uses email cover protocols identically to the way humans use email. Raven uses a generative adversarial network that is trained on genuine email data to control the timing and sizes of the email messages it sends and receives, and these messages are transferred independently of user actions. Our evaluation shows that, compared to the state-of-the-art email-based Mailet system, Raven raises the false-positive rate from 3% to 50% when detecting covert channel usage with 100% recall.
APA, Harvard, Vancouver, ISO, and other styles
44

Erawan, Elfrin, and Muhammad Salman. "Image based Ubuntu operating system using packer solutions." Gema Wiralodra 14, no. 2 (2023): 961–68. http://dx.doi.org/10.31943/gw.v14i2.475.

Full text
Abstract:
System frequent Linux operations are used on critical systems. Part systems big pay attention to safety and reliability. Ubuntu Linux is one of all Lots common Linux distributions used for system server operation. To improve security on Ubuntu Linux is required to strengthen the security system process. Strengthening security system operation is one solution for the system operation more stand to attacks and vulnerabilities. Center for Internet Security (CIS) is one caring organization for cyber security and provides benchmarks for configuration system safe Ubuntu operation. Benchmarks cover recommended settings for various component systems like file permissions, application, configuration networking, logging, and management of users. The study aims to improve security system operation with the use of control strengthening security based on CIS Benchmark v1.1.0 servers’ level 2 with the automatic model use packers application. The developed methodology consists of four phases. The first phase is Packer server installation and configuration. The second phase is to build a configuration base Ubuntu installation with user data. The third phase is the application Ansible playbook in runtime Packer automation for automation reinforcement at the time of installation and produces image virtual machine. In phase, lastly, apply structure using image virtual machine-generated and verified percentage reinforcement and optimization achieved. After strengthening security, use research methods. This generated a score conformity audit of 218 controls or 99.54% of the total 219 CIS Benchmark controls.
APA, Harvard, Vancouver, ISO, and other styles
45

Abu-Almash, Fadheela Sabri. "New Steganography System Based on Huffman Coding and Fibonacci Decomposition." Ibn AL- Haitham Journal For Pure and Applied Science 31, no. 1 (2018): 231. http://dx.doi.org/10.30526/31.1.1831.

Full text
Abstract:
Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, and HVS attack.&#x0D;
APA, Harvard, Vancouver, ISO, and other styles
46

Sheikh, Muhammad Sameer, and Jun Liang. "A Comprehensive Survey on VANET Security Services in Traffic Management System." Wireless Communications and Mobile Computing 2019 (September 15, 2019): 1–23. http://dx.doi.org/10.1155/2019/2423915.

Full text
Abstract:
Recently, vehicular ad hoc networks (VANETs) embark a great deal of attention in the area of wireless and communication technology and are becoming one of the prominent research areas in the intelligent transportation system (ITS) because they provide safety and precautionary measures to the drivers and passengers, respectively. VANETs are quite different from the mobile ad hoc networks (MANETs) in terms of characteristics, challenges, system architecture, and their application. In this paper, we summarize the recent state-of-the-art methods of VANETs by discussing their architecture, security, and challenges. Secondly, we discuss the detailed analysis of security schemes and the possible measures to provide secure communication in VANETs. Then, we comprehensively cover the authentication schemes, which is able to protect the vehicular network from malicious nodes and fake messages. Thus, it provides security in VANETs. Thirdly, we cover the mobility and network simulators, as well as other simulation tools, followed by the performance of authentication schemes. Finally, we discuss the comfort and safety applications of VANETs. In sum, this paper comprehensively covers the entire VANET system and its applications by filling the gaps of existing surveys and incorporating the latest trends in VANETs.
APA, Harvard, Vancouver, ISO, and other styles
47

Hummady, Muna M., and Ameer Hussein Morad. "Enhancement of System Security by Using LSB and RSA Algorithms." Al-Khwarizmi Engineering Journal 18, no. 1 (2022): 26–37. http://dx.doi.org/10.22153/kej.2022.03.001.

Full text
Abstract:
A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.
APA, Harvard, Vancouver, ISO, and other styles
48

Kadu,, Shrutika. "Weather Forecasting System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41776.

Full text
Abstract:
The IoT-Based Weather Forecasting System is an advanced embedded solution designed for smart agriculture and environmental monitoring. This system leverages IoT and embedded technology to provide real-time data collection and remote-control accessibility across India. It integrates various sensors to monitor real-time temperature, humidity, and soil moisture, ensuring continuous environmental tracking. The collected data is transmitted to a mobile application and a cloud server for seamless monitoring. A key feature of this system is its wild animal detection mechanism, which sends instant alerts to the owner, enhancing farm security. Additionally, the system includes a hazard alarm siren, which can be remotely turned on and off to warn against potential threats. The project also integrates an automated fire response system that activates a water pump upon fire detection, minimizing damage risks. Furthermore, an automatic farm cover mechanism ensures protection against rain by closing the cover when rainfall is detected. Keywords—. Numerical Weather Prediction (NWP). Atmospheric Modeling. Weather Radar. Satellite Imagery
APA, Harvard, Vancouver, ISO, and other styles
49

Gadzhigaibova, Aliya. "GLOBALIZATION PROCESS AND ECONOMIC SECURITY." Labor and social relations 20, no. 2 (2023): 120–26. http://dx.doi.org/10.61764/lasr.2.2023.120-126.

Full text
Abstract:
The article emphasizes that the world economy has become more integrated and unstable, and in connection with this, an increase in global interdependence leads to an increase in the vulnerability of economies, while a higher economic specialization caused by trade leads to instability. The approach of economists to the definition of “economic security”, which should cover the causal consequences of globalization. The approaches of scientists in support of globalization from the point of view of economic security are considered. They came to the conclusion that despite the process of globalization and the erosion of state institutions, thanks to the emergence of new international players, state institutions remain key providers of economic security. Purpose-study of the approaches of academic economists to the definition of economic security, which will cover the consequences of globalization. Methodology-the work used methods of logical and system analysis. Research Findings-significant changes in the international arena, increased globalization, increased economic interdependence, technological development and the revolution in information technology have led to an expansion of the concept of economic security.
APA, Harvard, Vancouver, ISO, and other styles
50

Ouyang, Chun-Juan, Ming Leng, Jie-Wu Xia, and Huan Liu. "Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1790268.

Full text
Abstract:
Security measure is of great importance in both steganography and steganalysis. Considering that statistical feature perturbations caused by steganography in an image are always nondeterministic and that an image is considered nonstationary, in this paper, the steganography is regarded as a fuzzy process. Here a steganographic security measure is proposed. This security measure evaluates the similarity between two vague sets of cover images and stego images in terms of n-order Markov chain to capture the interpixel correlation. The new security measure has proven to have the properties of boundedness, commutativity, and unity. Furthermore, the security measures of zero order, first order, second order, third order, and so forth are obtained by adjusting the order value of n-order Markov chain. Experimental results indicate that the larger n is, the better the measuring ability of the proposed security measure will be. The proposed security measure is more sensitive than other security measures defined under a deterministic distribution model, when the embedding is low. It is expected to provide a helpful guidance for designing secure steganographic algorithms or reliable steganalytic methods.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!