Security monitoring system of coal mines is indispensable to ensure the safe and efficient production of colliery. Due to the special and narrow underground field of the coal mine, the electromagnetic interference can...Security monitoring system of coal mines is indispensable to ensure the safe and efficient production of colliery. Due to the special and narrow underground field of the coal mine, the electromagnetic interference can cause a series of misstatements and false positives on the monitoring system, which will severely hamper the safe production of coal industry. In this paper, first, the frequency characteristics of the interference source on the power line are extracted when equipment runs normally. Then the finite difference time domain method is introduced to analyze the effects of the electromagnetic interference parameters on the security monitoring signal line. And the interference voltage of the two terminal sides on the single line is taken as evaluating indexes. Finally, the electromagnetic interference parameters are optimized by orthogonal experimental design based on the MATLAB simulation on the normal operation of equipment.展开更多
The current mine safety monitoring system used can only get the air volume change of roadway placed air velocity transducers, as this change is caused by this roadway, or for other roadway, and fault source has one po...The current mine safety monitoring system used can only get the air volume change of roadway placed air velocity transducers, as this change is caused by this roadway, or for other roadway, and fault source has one point or more, which be- longs to the problem of fault source diagnosis for ventilation system. Ventilation system fault can be attributed to the variation of air resistance of branch in the entire network. If the changes of air resistance for each branch in ventilation system are ana- lyzed, then it is impossible to place air velocity transducers in every branch. Therefore, the problem of the minimum quantities and location for placing air velocity transducers should be mainly studied. The relationship of air resistance and air volume variation of matrix method has been proposed, which can reflect the variation relationship between the air volume of the branch and air resistance of the relevant branches. Fault roadway range library of ventilation network built to determine fault roadway range will cause air velocity to exceed the limit. Minimum and full coverage of distribution method has been proposed, and the concept of branch coverage degree and impact roadway range library has also been brought forword to get the macro-distribution of air velocity transducers.展开更多
The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which ...The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which protected data and facilities from being attacked by outside users by means of firewall, security monitor and control system. Firewall was basically the first line of defense for the intranet; the security monitoring system was a kind of IDS (Intrusion Detection System), while security control system provided authentication, authorization,data-encrypted transmission and security management. This architecture provides various security services, such as identification, authentication, authorization, data integrity and confidentiality.展开更多
Crowd density is an important factor of crowd stability.Previous crowd density estimation methods are highly dependent on the specific video scene.This paper presented a video scene invariant crowd density estimation ...Crowd density is an important factor of crowd stability.Previous crowd density estimation methods are highly dependent on the specific video scene.This paper presented a video scene invariant crowd density estimation method using Geographic Information Systems(GIS) to monitor crowd size for large areas.The proposed method mapped crowd images to GIS.Then we can estimate crowd density for each camera in GIS using an estimation model obtained by one camera.Test results show that one model obtained by one camera in GIS can be adaptively applied to other cameras in outdoor video scenes.A real-time monitoring system for crowd size in large areas based on scene invariant model has been successfully used in 'Jiangsu Qinhuai Lantern Festival,2012'.It can provide early warning information and scientific basis for safety and security decision making.展开更多
This paper reports on the current state of an ongoing research project which is aimed at implementing intelligent models for hardly predictable hazard scenarios identification in construction sites. As any programmati...This paper reports on the current state of an ongoing research project which is aimed at implementing intelligent models for hardly predictable hazard scenarios identification in construction sites. As any programmatic actions cannot deal with the unpredictable nature of many risk dynamics, an attempt to improve the current approach for safety management in the construction industry will be presented in this paper. To this aim, the features offered by Bayesian networks have been exploited. The present research has led to the definition of a probabilistic model using elicitation techniques from subjective knowledge. This model, which might be meant as a reliable knowledge map about accident dynamics, showed that a relevant part of occurrences fall in the "hardly predictable hazards" category, which cannot be warded off by programmatic safety measures. Hence, more effort turned out to be needed in order to manage those hardly predictable hazardous scenarios. Consequently, further developments of this research project will focus on a real time monitoring system for the identification of unpredictable hazardous events in construction.展开更多
The paper takes Web service composition document as the research object, through the analysis of the documents, the port and address on the Web server, to create a Web intrusion detection model. The core of the model ...The paper takes Web service composition document as the research object, through the analysis of the documents, the port and address on the Web server, to create a Web intrusion detection model. The core of the model will monitor the Web server host resources, and finally discusses in detail the design and implementation of resource monitoring system. Intrusion detection model proposed can effectively regulate the behavior of users in this paper, allowing users follow a pre-standard service to call service providers, largely to protect the security of Web services.展开更多
Complex terrain and working equipment in coal mine underground need a way to ensure coal mine safety. In this paper, the way to monitor the real-time status of underground equipment was put forward, and it was proved ...Complex terrain and working equipment in coal mine underground need a way to ensure coal mine safety. In this paper, the way to monitor the real-time status of underground equipment was put forward, and it was proved to be effective as commanding and dispatching system. Monitoring system for underground equipment based on panoramic images was effectively combined with real-time sensor data and static panoramic images of underground surrounding, which not only realizes real-time status monitoring for underground equipment, but also gets a direct scene for underground surrounding. B/S mode was applied in the monitoring system and this is convenient for users to monitor the equipment. Meantime, it can reduce the waste of the data resource.展开更多
Security access control systems and automatic video surveillance systems are becoming increasingly important recently,and detecting human faces is one of the indispensable processes.In this paper,an approach is presen...Security access control systems and automatic video surveillance systems are becoming increasingly important recently,and detecting human faces is one of the indispensable processes.In this paper,an approach is presented to detect faces in video surveillance.Firstly,both the skin-color and motion components are applied to extract skin-like regions.The skin-color segmentation algorithm is based on the BPNN (back-error-propagation neural network) and the motion component is obtained with frame difference algorithm.Secondly,the image is clustered into separated face candidates by using the region growing technique.Finally,the face candidates are further verified by the rule-based algorithm.Experiment results demonstrate that both the accuracy and processing speed are very promising and the approach can be applied for the practical use.展开更多
The fiber Bragg grating (FBG) strain sensor is used in the oil and gas derricks for the health monitoring. The system consisted of the FBG strain sensors, optical interrogator and monitoring software. 64 sensors wer...The fiber Bragg grating (FBG) strain sensor is used in the oil and gas derricks for the health monitoring. The system consisted of the FBG strain sensors, optical interrogator and monitoring software. 64 sensors were installed on a derrick for loading and unloading tests. The results showed that the monitoring system had the advantages of the high accuracy, good repeatability, large capacity and real-time monitoring ability.展开更多
文摘Security monitoring system of coal mines is indispensable to ensure the safe and efficient production of colliery. Due to the special and narrow underground field of the coal mine, the electromagnetic interference can cause a series of misstatements and false positives on the monitoring system, which will severely hamper the safe production of coal industry. In this paper, first, the frequency characteristics of the interference source on the power line are extracted when equipment runs normally. Then the finite difference time domain method is introduced to analyze the effects of the electromagnetic interference parameters on the security monitoring signal line. And the interference voltage of the two terminal sides on the single line is taken as evaluating indexes. Finally, the electromagnetic interference parameters are optimized by orthogonal experimental design based on the MATLAB simulation on the normal operation of equipment.
文摘The current mine safety monitoring system used can only get the air volume change of roadway placed air velocity transducers, as this change is caused by this roadway, or for other roadway, and fault source has one point or more, which be- longs to the problem of fault source diagnosis for ventilation system. Ventilation system fault can be attributed to the variation of air resistance of branch in the entire network. If the changes of air resistance for each branch in ventilation system are ana- lyzed, then it is impossible to place air velocity transducers in every branch. Therefore, the problem of the minimum quantities and location for placing air velocity transducers should be mainly studied. The relationship of air resistance and air volume variation of matrix method has been proposed, which can reflect the variation relationship between the air volume of the branch and air resistance of the relevant branches. Fault roadway range library of ventilation network built to determine fault roadway range will cause air velocity to exceed the limit. Minimum and full coverage of distribution method has been proposed, and the concept of branch coverage degree and impact roadway range library has also been brought forword to get the macro-distribution of air velocity transducers.
文摘The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which protected data and facilities from being attacked by outside users by means of firewall, security monitor and control system. Firewall was basically the first line of defense for the intranet; the security monitoring system was a kind of IDS (Intrusion Detection System), while security control system provided authentication, authorization,data-encrypted transmission and security management. This architecture provides various security services, such as identification, authentication, authorization, data integrity and confidentiality.
基金The authors would like to thank the reviewers for their detailed reviews and constructive comments. We are also grateful for Sophie Song's help on the improving English. This work was supported in part by the ‘Fivetwelfh' National Science and Technology Support Program of the Ministry of Science and Technology of China (No. 2012BAH35B02), the National Natural Science Foundation of China (NSFC) (No. 41401107, No. 41201402, and No. 41201417).
文摘Crowd density is an important factor of crowd stability.Previous crowd density estimation methods are highly dependent on the specific video scene.This paper presented a video scene invariant crowd density estimation method using Geographic Information Systems(GIS) to monitor crowd size for large areas.The proposed method mapped crowd images to GIS.Then we can estimate crowd density for each camera in GIS using an estimation model obtained by one camera.Test results show that one model obtained by one camera in GIS can be adaptively applied to other cameras in outdoor video scenes.A real-time monitoring system for crowd size in large areas based on scene invariant model has been successfully used in 'Jiangsu Qinhuai Lantern Festival,2012'.It can provide early warning information and scientific basis for safety and security decision making.
文摘This paper reports on the current state of an ongoing research project which is aimed at implementing intelligent models for hardly predictable hazard scenarios identification in construction sites. As any programmatic actions cannot deal with the unpredictable nature of many risk dynamics, an attempt to improve the current approach for safety management in the construction industry will be presented in this paper. To this aim, the features offered by Bayesian networks have been exploited. The present research has led to the definition of a probabilistic model using elicitation techniques from subjective knowledge. This model, which might be meant as a reliable knowledge map about accident dynamics, showed that a relevant part of occurrences fall in the "hardly predictable hazards" category, which cannot be warded off by programmatic safety measures. Hence, more effort turned out to be needed in order to manage those hardly predictable hazardous scenarios. Consequently, further developments of this research project will focus on a real time monitoring system for the identification of unpredictable hazardous events in construction.
文摘The paper takes Web service composition document as the research object, through the analysis of the documents, the port and address on the Web server, to create a Web intrusion detection model. The core of the model will monitor the Web server host resources, and finally discusses in detail the design and implementation of resource monitoring system. Intrusion detection model proposed can effectively regulate the behavior of users in this paper, allowing users follow a pre-standard service to call service providers, largely to protect the security of Web services.
基金Supported by the National Natural Science Foundation of China (51075029)
文摘Complex terrain and working equipment in coal mine underground need a way to ensure coal mine safety. In this paper, the way to monitor the real-time status of underground equipment was put forward, and it was proved to be effective as commanding and dispatching system. Monitoring system for underground equipment based on panoramic images was effectively combined with real-time sensor data and static panoramic images of underground surrounding, which not only realizes real-time status monitoring for underground equipment, but also gets a direct scene for underground surrounding. B/S mode was applied in the monitoring system and this is convenient for users to monitor the equipment. Meantime, it can reduce the waste of the data resource.
基金This work is supported by the National Natural Science
文摘Security access control systems and automatic video surveillance systems are becoming increasingly important recently,and detecting human faces is one of the indispensable processes.In this paper,an approach is presented to detect faces in video surveillance.Firstly,both the skin-color and motion components are applied to extract skin-like regions.The skin-color segmentation algorithm is based on the BPNN (back-error-propagation neural network) and the motion component is obtained with frame difference algorithm.Secondly,the image is clustered into separated face candidates by using the region growing technique.Finally,the face candidates are further verified by the rule-based algorithm.Experiment results demonstrate that both the accuracy and processing speed are very promising and the approach can be applied for the practical use.
文摘The fiber Bragg grating (FBG) strain sensor is used in the oil and gas derricks for the health monitoring. The system consisted of the FBG strain sensors, optical interrogator and monitoring software. 64 sensors were installed on a derrick for loading and unloading tests. The results showed that the monitoring system had the advantages of the high accuracy, good repeatability, large capacity and real-time monitoring ability.