Automated Event Registration System in Corporation



Similar documents
IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

APPENDIX III THE ENVELOPE PROPERTY

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

Numerical Methods with MS Excel

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

1. The Time Value of Money

A Parallel Transmission Remote Backup System

Green Master based on MapReduce Cluster

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

Banking (Early Repayment of Housing Loans) Order,

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

An Effectiveness of Integrated Portfolio in Bancassurance

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Study on prediction of network security situation based on fuzzy neutral network

Fault Tree Analysis of Software Reliability Allocation

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

CHAPTER 2. Time Value of Money 6-1

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

Agent-based modeling and simulation of multiproject

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

6.7 Network analysis Introduction. References - Network analysis. Topological analysis

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

10.5 Future Value and Present Value of a General Annuity Due

T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

The Digital Signature Scheme MQQ-SIG

Location Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6)

Simple Linear Regression

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal

On Error Detection with Block Codes

Classic Problems at a Glance using the TVM Solver

Commercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

OPTIMAL KNOWLEDGE FLOW ON THE INTERNET

Optimal Packetization Interval for VoIP Applications Over IEEE Networks

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Average Price Ratios

Online Appendix: Measured Aggregate Gains from International Trade

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

MDM 4U PRACTICE EXAMINATION

Optimization Model in Human Resource Management for Job Allocation in ICT Project

A particle swarm optimization to vehicle routing problem with fuzzy demands

A Bayesian Networks in Intrusion Detection Systems

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

of the relationship between time and the value of money.

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

Evaluating the Network and Information System Security Based on SVM Model

Load and Resistance Factor Design (LRFD)

Load Balancing Control for Parallel Systems

RUSSIAN ROULETTE AND PARTICLE SPLITTING

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

Software Reliability Index Reasonable Allocation Based on UML

Application of Grey Relational Analysis in Computer Communication

Integrating Production Scheduling and Maintenance: Practical Implications

AP Statistics 2006 Free-Response Questions Form B

10/19/2011. Financial Mathematics. Lecture 24 Annuities. Ana NoraEvans 403 Kerchof

How To Value An Annuity

Analysis of real underkeel clearance for Świnoujście Szczecin waterway in years

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

Construction of a system scanning the movement of human upper limbs

Response surface methodology

Resource Management Model of Data Storage Systems Oriented on Cloud Computing

Chapter Eight. f : R R

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES

Business continuity management

Network dimensioning for elastic traffic based on flow-level QoS

Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements

Impact of Interference on the GPRS Multislot Link Level Performance

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy

Common p-belief: The General Case

Efficient Compensation for Regulatory Takings. and Oregon s Measure 37

Discrete-Event Simulation of Network Systems Using Distributed Object Computing

AnySee: Peer-to-Peer Live Streaming

How To Make A Supply Chain System Work

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

EBIZ GAME: A SCALABLE ONLINE BUSINESS SIMULATION GAME FOR ENTREPRENEURSHIP TRAINING

USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Mixed Distributions for Loss Severity Modelling with zeros in the Operational Risk losses

Bayesian Network Representation

The simple linear Regression Model

ON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo.

Report 52 Fixed Maturity EUR Industrial Bond Funds

Transcription:

teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee Kg Saud Uversty/Computer Scece Departmet zalmakhadmee@ksu.edu.sa Abstract - Moder securty systems of corporatos are urged to solve very comple ad multdmesoal challege of esurg the mamum safety o obect at all stages of ts fuctog at the orgazato of optmum respose to arsg stuatos. Creato of uversal mathematcal model whch wll cosder all features of securty obect ad geerate the optmum decso o elmato of emergecy stuatos of ay type ad ay place, s the relevat task demadg deep study of questos ot oly detecto, but also optmum respose to arsg stuatos. Keywords - Securty Obect, Vector Aalyss, Decso- Makg Support, Evet Regstrato NTRODUCTON For esurg protecto ad a securty t s ecessary to solve a comple problem of a choce, stallato ad operato of securty hardware. The obect securty system s teded for use the bakg, credt ad facal ad other large sttutos havg brached frastructure ad dffcult maagemet. The developed system has to easly ad wth the smallest chages the estg software SW) to be tegrated to a automated cotrol system for securty obect []. The system has to keep surely the obectve oural of the evets whch have occurred durg watch, whch the persos who are keepg watch ca't correct. t has to provde coecto of sesors of dfferet types ad vdeo cameras, to cope from a workplace of the operator by meas of the computer or remotely []. Necessary codto of creato of obect securty systems s mplemetato of the followg geeral requremets: a) tegrato to a automated cotrol system for establshmet; b) esurg dagosg of emergecy stuatos ad rapd respose to ther emergece. Thus probably two cases: ) the geeral sgs of a stuato ca be descrbed by meas of estg model, however developmet of a stuato ca happe the varous drectos, to forecast whch t s uambguously mpossble; ) the geeral sgs of a stuato do't ft to estg model of fuctog of the securty obect; c) possblty of cofgurg ad self-cofgurg of obect securty system; d) the automated regstrato of evets o securty obect ad operatoal maagemet of work of that, partcular hs employees, formato securty from uauthorzed access []. TASK DEFNTON codtos whe emergecy stuatos ca arse varous parts of orgazato ad brg varous degree of damage, t s ecessary to cosder that factor at desg of system that the securty obect represets large orgazato whch separate elemets of system departmets, servces, etc.) are dstrbuted space. Besdes, t s ecessary to cosder that obect securty systems ca be developed two aspects: a) orgazato already ests ad ts spatal orgazato should't chage. ths case a task of the developer - moderzato re-egeerg) of estg system of safety of obect; b) establshmet s't costructed yet or ts archtectural recostructo or movemet of separate elemets of system wth securty obect s possble. ths case the problem of creato of securty system eteds o sythess of spatal ad orgazatoal structure of securty obect. Takg to accout stated, wth the real work the problem of creato of system of regstrato of evets s formulated as follows []. t s set: set of dvsos ad ther spatal arragemet the terrtory of securty obect; workg hours of dvsos; levels of access to rooms; requremets to dcators of qualty of system safety of people ad esurg safety of property of securty obect); ecoomc dcators of developmet ew or moderzatos of estg system. t s ecessary to develop: model ad algorthm of fuctog of a subsystem of automatc regstrato of evets securty system of corporato at varous modes of ts fuctog. such geeral statemet the soluto of a task dffcult for the followg reasos: a) lack of tal formato: some characterstcs of system ca be defed oly the course of ts operato; b) evoluto developmet of the system, partcular ot stable character of system fuctog modes. The specfed dffcultes ca be overcome wth methodology of the system aalyss by meas of decomposto of a tal problem o a lttle codtoally depedet sub problems whch are tur dvded to complees of tasks, tasks, subtasks, etc. Cosderg the above, the real work the followg herarchy of problems of sythess of evet regstrato system s accepted at creato of securty system of corporato) see Fg. ):

teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa a) mathematcal modelg of spatal ad orgazatoal structure of orgazato; b) developmet of model ad algorthms of work of system at specfcato ad regstrato of the arse stuato. Corporato space-orgazatoal structure model developmet Evet ouralg system model the case of abormal stuato appearaces model developmet Evet ouralg system operato algorthm the case of abormal stuato appearaces developmets Fg : Research structure. Developmet of models of evet regstrato system. Modelg of spatal ad orgazatoal structure of corporato Whe modelg spatal ad orgazatoal structure the securty obect ca be preseted the form of a vector [] A ) A,,..., ),.) A,..., - elemets of the set formed of a set of premses of corporato. Cotguty of rooms s descrbed by double sets where,,,,, f : A ) A ) ; 0, f : A ) A ),.) f trasto s possble, ad "0" f trasto s mpossble that s f rooms are't adacet see a formula.)). The ma lack of ths represetato s that t does't provde dvso of access rghts to varous rooms of varous categores of people that at the emergecy stuato ca reduce securty of obect essetally. For elmato of ths shortcomg the vector F u) F u, u,..., u,..., u ) whch each member of a set represets "" f ths room belogs to category of rooms to whch access for all people s allowed, ad "0" - otherwse s etered. The followg factor havg mpact o work of securty obect, s the mode of ts work. t cossts that all the tme of fuctog of obect securty system ca be dvded to two ma modes: a) protecto mode; b) supervso mode. At the frst mode all protectve fuctos of securty system have to be actvated. the secod case part of fuctos of securty system ca be passve or be gored. The reaso of t cossts that, for eample, presece of people doors durg the workg day ca't be cosdered as vaso as t there ca be workers or vstors. At the same tme part of fuctos ca be stll actve for eample, the detector of a smoke, glass breakg, etc.). From here follows: a) the state of all sesors of obect securty system has to be actve rrespectve of, whether ths sesor the correspodg tme-pot s used, or ot; b) t s ecessary to defe, what mode there s the approprate room: ) a protecto mode a tme off or ot workg festve) days; ) a supervso mode workg tme for ths room. Thus, the operatg mode of the room s descrbed by a vector B ) B b ), b ),..., b )),.) where - statemet s true, - statemet s false;, - codtoal umbers of the rooms eterg to securty obect. From epresso.) follows that coucto of ay double set of a vector A, s equal to "" f trasto from the placemet of to room s possble. Otherwse, ths coucto s equal to zero. The vector A, looks lke a two-dmesoal matr whch codtoal umbers of rooms - sources rooms from whch trasto s supposed) are colums, ad across there are codtoal umbers of target rooms of securty obect rooms where trasto s carred out). O crossg of the correspodg colum ad a le of a matr settles dow "", b - elemets of the set formed of a set of rooms, ad each of elemets t s equal "" f the approprate room s a mode of protecto ad "0" f ths room s a supervso mode. Usg vectors A, A, B, и F, we ca defe et: a) the room whch there was a possble evet the emergecy stuato whch s subect to regstrato formato system of corporato); b) category of the room, from the pot of vew of dvso of access rghts the geeral access, lmted access); c) operatg mode of ths room protecto mode, supervso mode); d) what rooms are adacet to ths room from the pot of vew of defto of ways of evacuato or possble dstrbuto of a emergecy stuato). where B b b,...,

teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Data of a vector descrbe the geeral spatal ad The for evet detectg ay premses of corporato t s orgazatoal structure of corporato ad ca be used for ecessary to preset each elemet of a vector A as a vector maagemet of evet regstrato system. descrbg possble emergecy stuatos. The we wll get MODELNG OF WORK OF EVENT REGSTRATON SYSTEM AT EMERGENCY STUATON ths subsecto t s ecessary to cosder how t s possble to use the offered vector represetato of spatal ad orgazatoal structure of corporato for modelg of work of system of automatc evet detectg at possble emergecy stuato. Thus t s ecessary to cosder that wth corporato possbly appearace of several emergecy stuatos at the same tme. Therefore the purpose of automatc evet detectg corporato s stuato ragg from the pot of vew of ts possble mportace for the geeral safety of obect. For mplemetato of such ragg t s ecessary to take the followg steps: a) to detect a possble emergecy stuato ad to defe ts arragemet; b) to defe category of a emergecy stuato; c) to defe level of access to ths room, partcular, to defe, there are there oly employees or there ca be ordary vstors; d) to defe the possble drectos of dstrbuto of a emergecy stuato ad a evacuato way; e) to defe a rak of the arse stuato ad a prorty of regstrato of ths evet. The evet s cosdered arse f at least oe of members of a vector.) became ozero. Number of the member of ths vector, correspods to room umber the archtectural pla whch there was a possble emergecy stuato. Emergecy coflct) stuatos ca be geerally preseted the form of a vector C z) C z, z, z, z, z, )..) z ad set of vector Cz) ca be formatted as table. Table : Set of Cz) vector Desgato Deomato z Force maeure z truso at the securty mode z truso the supervso mode z Volato by meas of truso to the computer etwork z Attack put-output volato z A C z)) A C z), C z),..., C )..) z Accordg to a formula.), the state of each room of corporato s descrbed by a vector.) whch the correspodg elemet s equal "" f ths category of a evet takes place ad "0", otherwse. Presece the room of people represets a varable descrbed by logcal fucto, ) 0, whe H whe H ;.) 0 where H - umber of peoples the premse. The the fact of presece of people the approprate rooms of securty obect corporatos), t s possble to preset the form of a vector smlar to the prevous vectors D ) D d ), d ),..., d ))..7) Each elemet of a set of a vector D accepts value "" f doors there are people ad "0" f people doors are't preset. Thus, for ths purpose, carryg out coucto of vectors A C z)) ad D) step-by-step, we ca defe ot oly umber of the room whch there was a evet whch s subect to regstrato, but also ad, whether there are ths room people. The combato of category of a emergecy stuato ad presece at the room of people allows to defe more precsely degree of dager of a stuato ad to establsh ts rak accordg to whch t s possble to defe a prorty of trasfer of the mage trasfer the case whe smultaeous hgh-qualty trasfer of mages o all arse evets s mpossble. The crtero of degree of evet mportace s for ths purpose etered. Ths crtero looks lke K C z) C z) C z) C z) C z) C z),.8) where k, k,..., k - coeffcets of degree of mportace of a stuato evet) whch are defed o the bass of estmates of eperts ad represetatves of top maagemet of corporato; - umber of the room whch there was a evet terestg us.

teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa DEVELOPMENT OF ALGORTHM OF EVENT At frst the frst room gets out. our model t REGSTRATON AT EMERGENCY STUATON N correspods to the frst colum of a matr.). The CORPORATON Ths algorthm provdes performace of the followg stages: a) automatc detectg of a evet by meas of the correspodg hardware-software comple; b) defto of degree of mportace of the occurred evet o the bass of models developed secto ; c) defto of the rooms adacet to the room whch there was a emergecy stuato evet); d) trasfer of mages from vdeo cameras o the cetral server of obect securty system. The aalyss algorthm of a oe room state s gve fgure. Automatc detectg of a evet s made by meas of the correspodg hardware-software comple. formato that the emergecy stuato of a certa category s detected by the automated system, s formed the form of a vector.). Ths vector has a form of a matr whch colums correspod to room umber, ad les - categores of a possble emergecy stuato evet). The problem of system of regstrato cossts scag ths matr formed automatcally by evet detectg system. readg of ths colum of a matr for the purpose of recevg a code of a evet s made. The task of the program of detectg that case cossts defg, whether equally the receved -bt umber to zero or ot. f s't preset, the system passes to readg of a codto of the followg room of corporato. f the code s't equal to zero, the system carres out sedg the message o emergecy stuato ad trasfers cotrol to the followg module of the program - to defto of degree of evet mportace. rrespectve of result of codto cotrol of the approprate room the system cotues to sca a matr.) tll the ed whe rooms ay more dd't rema). Ths scag allows to fd ay quatty of emergecy stuatos whch could arse corporato securty obect). For defto of degree of mportace of a evet the result of operato of the evet detectg program module ad earler developed elemets of model used system of regstrato of evets s used. After the evet the approprate premse of corporato s detected, we get a umber of the room ad a evet code. The operatg mode of the room s a bt of formato. For defto of degree of mportace of a evet from the pot of vew of a room operatg mode, t s eough to supervse bt of a operatg mode of the room ad to use t for defto of degree of mportace of a stuato. We accept that case the room s a protecto mode, mportace of a stuato doubles, that s the fal crtero has to be multpled by. Presece at the room of people s used the same way, as well as a room operatg mode: f doors there are people, the crtero of mportace doubles. Thus, to defe degree of mportace of a evet, t s ecessary a formula.8) to add two addtoal coeffcets, descrbed earler. The for room degree of mportace of a evet s determed by a formula K d ) b ) C z) C z) k C z) C z) C z) C z ),V.) Fg - Aalyss algorthm of a room state where d ) ad b ) are specfed earler. Whe developg algorthm of defto of the rooms adacet to the room whch there was a evet whch s subect to regstrato o the cetral corporato securty server, we use earler developed formulas.) ad.). Usg these formulas.) ad.), t s possble to defe, to what rooms trasto from the room where there was a evet s possble. t s ecessary to defe ways of possble dstrbuto of a emergecy stuato. order that to make t, the matr whch umbers of les ad colums correspod to umbers of placemets to corporatos s formed.

teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa O crossg of umbers of les ad colums are "" These model ad algorthm ca be used whe f trasto from oe room aother ad back s possble, schedulg securty system of ay obect by determato of ad "0" f such trasto s mpossble. the basc parameters offered the real work. Here case the room s adacet, formato about t goes to the ma program ad s used for defto of what REFERENCES cameras have to be actvated. CONCLUSONS The ma advatages of developed model ad algorthm are ther uversalty. The usg of all operatg modes of securty obect ad the dfferetated approach to defto of degree of mportace ad dager of the correspodg evet allow provdg optmum work of obect securty system ad most effectvely to use techcal resources of corporato at regstrato of arsg evets. [] Access Rghts Admstrato Role-Based Securty Systems. M.Nyachama, S.Osbor// Uversty of Wester Otaro.- p. [] System ad method for Motorg Securty Systems by Usg Vdeo mages. M.J.Saylor, A.Slav, J.P. Hugues Mart. US Patet No US,00,, 00 - p. [] Creatg Proes for Dstrbuted Beas ad Evet Obects. V.Shh- Chua Cha, P.Kwog-Hug Yu. US Patet No,0.0 B, 00 - p. [] G.Muller. System Modelg ad Aalyss: a Practcal Approach. Baskerud Uversty College, 0-7 p. [] M. Hutto. Vector Aalyss Notes. Autum 00 Lectures.