SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116
109 | P a g e
THE THREE DIMENSION-BASED PHYSICAL
ACCESS CONTROL DETECTION SYSTEM,
THE NATURE, THE LOCATION, AND THE TIME
Dr. M. Amer shedid1, Ass. Prof. Magdy E. Elhennawy2
1
The Future Higher Institute for Specialized Technological Studies
Computer Science Dept., Future Academy,
2
High Institute of Computers and Information Technology,
Computer Dept., El-Shorouk Academy,
Family Card Project Consultant, Cairo, Egypt,
1
mo_amer2002@yahoo.com, 2
mhennawy@ad.gov.eg
Abstract:- In fact, the application of physical security as to
pass or prohibit pass is satisfactory for a variety of applications,
but it is inappropriate for specific applications. The areas that
need to be surveyed without interaction of human is one example.
The fields and areas which are subjective to territory activities is
another example. In many places in the world, bombing can
explode buildings, lives, facilities, and so many others. In such
cases we need to manage the situation remotely. We need a
physical access control detection system that can survey the field
without human direct intervention. Such system can intervene
electronically to detect the parameters needed to decide the
appropriate actions.
In this paper, a new approach for providing the parameters
needed for decision maker, in such situations, is presented, it is
the three dimension-based physical access control detection
system, with the parameters; the nature, the location, and the
time. The approach depends on defining three parameters, which
are the nature of the passing object, the location of the object in
the protected area, and the time in which the object is placed in
that location. This approach depends basically on the sensor
network and immune system combined with a central system that
can receives a signal with such parameters to allow decision
maker enough information for decision making. The new
approach has been presented including the capabilities and
architecture.
I. INTRODUCTION
Physical security is concerned with the protection against
unauthorized physical access. It intended to deter, detect, and
monitor/record intruders and trigger appropriate incident
responses (e.g. by security guards and police).
Various methods, on the other hand, for physical access
control may be applied. Access control may include
mechanical access control systems, electronic access control
systems, or identification systems and access policies.
Intrusion detection and electronic surveillance may include
alarm systems and sensors, or video surveillance. One of the
basic methods is the physical access control gates. It is
designed in such a way that it has a sensor that senses the mal
materials during the object passing the gate.
One of the critical threats, today’s, is the accessing of a
prohibited area and leaves a mal object or mal material such as
ammunition or explosive material, as happened in the
terrorism situations executed by terrorisms.
One of the new approaches that can be appropriate for
achieving the physical access controls is the wireless sensor
network in which a set of sensors are distributed on a specific
area to form a network organized and cooperated together.
Such sensor network can be connected to a central station to
communicate and process received signals from such network
about any mal object accessing the specified area [1, 2].
Meanwhile, Artificial Immune Systems (AIS) are
adaptive systems inspired by theoretical immunology and
observed immune functions, principles and models, which are
applied to complex problem domains. Artificial Immune
Systems (AIS) emerged in the 1990s as a new branch in
Computational Intelligence (CI).A number of AIS models
exist, and they are used in pattern recognition, fault detection,
computer security, and a variety of other applications
researchers are exploring in the field of science and
engineering [3].
In this paper, the introduction is mentioned in section one,
this section. An overview about the physical access control
gates is presented in section two. In section three the current
state of the art of the physical security and access control
systems is presented in addition to sensor network and
immune system. In section four, the already existing system’s
drawback is stated. The approach of the three dimension-
based physical access control gate is presented in section five.
The results of case implementation are stated in section six.
The conclusions and future work is mentioned in section seven
and eight.
II. OVERVIEW
The term access control refers to the practice of restricting
entrance to a property, a building, or a room to authorized
persons. Physical access control can be achieved by a human
(a guard, bouncer, or receptionist), through mechanical means
such as locks and keys, or through technological means such
as access control systems like the mantrap. The structure of
the already existing access control gate allows, only, giving
one fact; it is to grant pass or prohibit pass. The employed
sensor designates the mal material, and signals the system
which decides to pas or not to pass.
Now, a variety of access control gate types are available
with the application of physical security. For an object passing
through the gate, it allows to pass or prohibit pass, which is,
for now, satisfactory for some of applications. Meanwhile, it is
inappropriate for specific applications such as territory
activities and the areas that need to surveyed without
interference of human. In many places in the world, bombing
can explode buildings, lives, facilities, and so many others. In
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116
110 | P a g e
such cases we need to manage the situation remotely. We
need a physical access control system that can survey the field
without human direct intervention. Such system can intervene
electronically to detect the parameters needed to decide the
appropriate actions. The proposed system presented in this
paper defines the parameters that are needed to the decision
maker to manage the above situation. It is by defining the
nature of the object passing the protected area, the location in
absolute coordinates, and the time of accessing that area.
III. CURRENT STATE OF THE ART
A. Physical Security
Physical security describes security measures that are
designed to deny unauthorized access to facilities, equipment
and resources, and to protect personnel and property from
damage or harm [4]. Physical security involves the use of
multiple layers of interdependent systems which include
CCTV surveillance, security guards, protective barriers, locks,
access control protocols, and many others. Physical security
systems for protected facilities are generally intended
to:[5,6.7] deter potential intruders; detect intrusions and
monitor/record intruders; and trigger appropriate incident
responses.
It is up to security designers, architects and analysts to
balance security controls against risks, taking into account the
costs of specifying, developing, testing, implementing, using,
managing, monitoring and maintaining the controls, along
with broader issues such as aesthetics, human rights, and
health and safety. Physical access security measures that are
appropriate for a high security prison or a military site may be
inappropriate in an office, a home or a vehicle, although the
principles are similar.
Design of physical security system depends on the needs,
nature and constituted elements of that system. Methods of
physical security can be classified into more than one method.
Deterrence methods may include physical barriers, natural
surveillance, and security lighting. The initial layer of security
for a campus, building, office, or other physical space uses
crime prevention through environmental design to deter
threats. Some of the most common examples are also the most
basic: warning signs or window stickers, fences, vehicle
barriers, vehicle height-restrictors, restricted access points,
security lighting and trenches [8, 9.10.11].
Intrusion detection and electronic surveillance may
include alarm systems and sensors, or video surveillance.
Alarm systems can be installed to alert security personnel
when unauthorized access is attempted. Alarm systems work
in tandem with physical barriers, mechanical systems, and
security guards, serving to trigger a response when these other
forms of security have been breached. They consist of sensors
including motion sensors, contact sensors, and glass break
detectors [12]. However, alarms are only useful if there is a
prompt response when they are triggered. Security personnel
are common element in most of such method. Access control
methods are used to monitor and control traffic through
specific access points and areas of the secure facility. This is
done using a variety of systems including CCTV surveillance,
identification cards, security guards, and
electronic/mechanical control systems such as locks, doors,
and gates.[13, 14, 15]
B. Survey to Access Control Systems Operational
Aspects
Several physical access control systems exist; examples
are control panel-based access control, physical access control
gates, and others. When a credential is presented to a reader,
the reader sends the credential’s information to a control
panel, a highly reliable processor. The control panel compares
the credential to an access control list, grants or denies the
presented request, and sends a transaction log to a database. If
there is a match between the credential and the access control
list, the control panel operates a relay that in turn unlocks the
door.
The electronic access control system grants access based
on the credential presented. When access is granted, the door
is unlocked for a predetermined time and the transaction is
recorded. When access is refused, the door remains locked and
the attempted access is recorded. The system will also monitor
the door and alarm if the door is forced open or held open too
long after being unlocked.
The above description illustrates a single factor
transaction. Credentials can be passed around, thus subverting
the access control list. To prevent this, two-factor
authentication can be used. In a two factor transaction, the
presented credential and a second factor are needed for access
to be granted; another factor can be a PIN, a second credential,
operator intervention, or a biometric input.
A credential is a physical/tangible object, a piece of
knowledge, or a facet of a person's physical being, that enables
an individual access to a given physical facility or computer-
based information system. Typically, credentials can be
something a person knows (such as a number or PIN),
something they have (such as an access badge), something
they are (such as a biometric feature) or some combination of
these items. This is known as multi-factor authentication.
Biometric technologies, on the other hand, include fingerprint,
facial recognition, iris recognition, retinal scan, voice, and
hand geometry [16, 17].
C. Wireless Sensor Networks
A wireless sensor network (WSN) is a sophisticated
system that links the physical world with digital data
networks. Wireless sensor networking is an emerging
technology that has a wide range of potential applications
including environment monitoring, smart spaces, medical
systems and robotic exploration. Sensor network research is
primarily driven by military applications such as battle-field
surveillance and enemy tracking, where it provides the ability
for the detection and tracking of enemy soldiers and their
vehicles [18].
A wireless sensor network (WSN) generally consists of
a base station (or gateway) that can communicate with a
number of wireless sensors via a radio link. Data is collected
at the wireless sensor node, compressed, and transmitted to the
gateway directly or, if required, uses other wireless sensor
nodes to forward data to the gateway. The transmitted data is
then presented to the system by the gateway connection [18,
19].
A generic wireless sensor network is composed of a
large number of sensor nodes scattered in a terrain of interest,
called the sensor field. Each of them has the capability of
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116
111 | P a g e
periodically collecting data about an ambient condition and
sending data reports to a center node. Knowledge about what
kind of data is concerned by a center node and propagated by
that node periodically via query message. This means, each
sensor can be activated; it can transmit data to its neighbors
and can also communicate with the user through center node
[1, 2]. Figure 1 illustrates the wireless sensor network layout.
Sensor nodes that make up the sensor network are
randomly deployed in inaccessible terrains (such as near a
volcano) or disaster relief operations (such as floods and
fires), which means that sensor network protocols and
algorithms must possess self-organizing capabilities and
exhibit cooperative higher-level behavior [19, 20].
Figure 1: Sensor Nodes Scattered in the Sensor Field
D. Immune Systems
The immune system has guaranteed the health of the
human body. Through identifying self and no self-
mechanisms, the immune system can get rid of foreign matter
(antigens) to perform this basic defense [21, 22].
The biological immune system (BIS) is a subject of great
research interest because of its powerful information
processing capabilities; in particular, understanding the
distributed nature of its memory, self-tolerance and
decentralized control mechanisms from an informational
perspective, and building computational models believed to
better solve many science and engineering problems [3, 21].
The biological immune system possesses capabilities of
“intelligent” information processing that includes memory,
ability to learn, to recognize, and to make decisions on how to
treat any unknown state. The biological immune system is a
highly parallel, distributed, and adaptive system. It uses
learning, memory, and associative retrieval to solve
recognition and classification tasks. In particular, it learns to
recognize relevant patterns, remember patterns that have been
seen previously, and use combinatory to construct pattern
detectors efficiently. These remarkable information processing
abilities of the immune system provide important aspects in
the field of computation [21,22]. This emerging field is
sometimes referred to Artificial Immune System (AIS).
Although it is still relatively new, AIS, having a strong
relationship with other biology-inspired computing models,
and computational biology, is establishing its uniqueness and
effectiveness through the intensive efforts of researchers
around the world [3].
IV. CURRENT SYSTEM DRAWBACKS AND PROBLEM
DEFINITION
In existing physical access control gates, the only one
information provided is the grant, which allows the object to
grant entrance or deny entrance. It is important to identify,
besides, the location, the nature of the passing object that
prohibit passing that object, and the time of passing that object
the prohibited area. The passing object may be a person, a
black box filled with some sort of materials, or other object
with any specific characteristics. Sometimes the investigator
or inspector needs more information to allow doing his job.
One situation that needs such additional information is
the protection of the electricity towers distributed on desert
places, in which employing guards is difficult, and
surveillance cameras may cost much. In such situation we
need to provide a vision for such space. If some mal material,
that can make harm, exists in some location we need to define
its nature and position. The above additional facts will help
avoid any terrorism operations.
Accordingly, given an area A, with a boundary B, it is
required to define the following:
- The time, T, in which the mal material, or an object
with a mal material has pass through the boundary B.
- The nature of that mal material to detect if it is
dangerous, to identify its bad effect.
- The location, L, for that object in the specified area,
A, defined in x, y coordinates such that L(x, y) ϵ A
and L(x, y) not exceeding B.
It is considered that area A covers the area needed to protect
the facility, equipment, or any resource inside that area.
V. THE THREE DIMENSION-BASED PHYSICAL
ACCESS CONTROL GATE SYSTEM: THE
PROPOSED SOLUTION
On the situation which needs the protection of the
electricity towers, distributed on desert areas, a set of sensors
will be distributed over such area connected together. When
an object passes such area, sensors detect the nature of the
material of such object. A match to the detected material with
the list of materials will allow designating such material
nature, and location will be detected. In this way appropriate
action can be taken by security responsible.
Same idea can be applied for a variety of similar
situations, which will be very helpful to apply the stated
approach to secure it.
The structure of the proposed access control gate system
allows, granting pass or prohibiting pass. The sensor feels the
existence of a mal material in a location somewhere on the
specified area, referred to, in our research as the location.
Such mal material is referred to, in our research as nature. The
time of passing through the field is the third factor in our
solution, referred to as time. It is important and critical since it
can help in analysis of the situation. It will be much helpful if
the guard knows the three facts; the Location, nature, and the
time. This might simplify the process of investigating the
passing object. This paper introduces the new idea for building
the access control system that provides the three facts, which
save investigation time, investigation effort, and finally
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116
112 | P a g e
issuing appropriate and speedy decision. This, all, will be done
without any human intervention.
So, already existing physical access control is a matter of
whom, where, and when. Meaning, current access control
system determines who is allowed to enter or exit, where they
are allowed to exit or enter, and when they are allowed to
enter or exit. However, today with the introduction of the
electronic access means is a matter of location, nature, and
time, as previously stated.
A. The Capabilities
The proposed solution allows the detection of the nature
of the mal material by distinguishing between several
available mal materials. The solution can distinguish between
several mal materials by learning the sensor the various types
of such materials and its characteristics. A list of such
materials, together with its characteristics is prepared in a
database, referred to as “mal material” database. A match is
done between the detected characteristics sensed during object
passing and the list in the database. Accordingly, a decision is
issued whether grant entrance or prohibit entrance. An alarm
can be sent to the central system or base station, with other
data, for appropriate decision. The success of such solution
depends mainly on the degree of learning of the sensor with
the material characteristics, and the precision of such
characteristics. Examples of such sensors are Resistance
Temperature, Metal detection, and Motion detection Sensors.
Figure 2 depicts this part of the proposed solution.
Figure 2: Detection of the Nature of the Mal Material
On the other hand, the proposed solution allows the location
of the mal material to be defined by means of a sensor
network that will scan the entered mal material object and
detect its location. This can be achieved as follows:
- Each sensor distributed on the field has its
identification code, defined location as x, y
coordinates, and working status (working, or out of
service).
- For the working ones, when one or more sensors
senses the material object entered on the field, a
message with two parameters is sent to the
concentrator. The message three parameters are: the
location, the nature of the material, and the time.
- The concentrator sends the central system a signal
with the messages received from the all sensor
network, including the three factors, the location, the
nature, and the time.
- The individual sensors send the location of the object
relative to their position in the field; this can lead to
define the absolute location of the object in the field.
- The central system process the data received, if the
nature is mal material, an alarm is sent for
appropriate actions and then makes the needed
analysis using the time and location.
Figure 3 depicts how the sensor network detect the location,
nature, and the time and send them tom the concentrator and
how the concentrator sends what he receives from various
concentrators to the central system to allow precise decision
making.
Figure 3: Location, Nature, Time Detection
B. The Architecture
First of all, the area that needs to be protected in the field
is defined, in our solution; it is area A with a boundary B. The
sensors, then, are distributed in that area forming a wireless
sensor network. Each sensor is defined to the concentrator by
its code. The location of each sensor in A is detected by each
one. A mapping has been defined between the individual
sensor and actual field coordinates.
When an object passes the boundary B, nearest sensors to
that object sense such object. Each of these sensors will detect
the nature of the object; define the time of detecting the object
which touches the boundary, B, and relative location to them.
Each of these sensors will send a signal to the related
concentrator with the object nature, location relative to that
sensor, and the time of detection. Such sensors will continue
sending such signal as much as the object is moving with a
predefined rate in a second. That rate can be defined by the
system operator according to degree of criticality of the
protected facility. The array of signals received to the central
system will be registered continually. Each current signal
received will be compared to the previous signal, if changed
the new signal will be the current signal. If they are equal, this
means that the object has been stopped moving and the system
can calculate the absolute location from the relative locations
of that object to the sensors sending such signals.
The pseudo code of the proposed algorithm is as follows:
Define:
A ……….…The area is to be protected.
B ……..…. The boundary of the area is to be protected.
Lrelative ….… The location of the object related to each sensor.
Labsolute …… The absolute location of the object to the area A.
Scurrent (L, N, T) ….. The signal currently received
Sprevious (L, N, T) …. The signal previously received.
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116
113 | P a g e
Input: Array of n-element Scurrent(L, N, T);
Comment: each element consists of 3 sub elements.
while (Scurrent ≠ Sprevious)
continue receiving signals
endwhile
Calculate Absolute location
Detect last time received
Send Scurrent(L, N, T);
exit
End
C. Designating The Object Location
The wireless sensor network is distributed over the
Prohibited area A. Each sensor represents a node in this
network. Each node has a specific code and the domain of
each node covers a circle with a radius equal to the distance
between each two sensors, as shown in the below figure.
Figure 4 shows the arrangement of the wireless sensor
network and the domain of each subarea.
Figure 4: the Domain of Individual Sub-Areas
For the wireless sensor network covering area A, given n
nodes, Ni, i ≤ n, creating m sub-areas, Aj, j ≤ m, then:
Some sensors will sense the object passing in the prohibited
area. This means that Nk , k ≤ n nodes will send a signal to the
base station with the distance of that object to this node. The
node with minimum of these distances is the node in which the
object locates. Accordingly the system can designate the
location of the passing object. Figure 5 depicts an example of
how to define the location of the passing object.
Figure 5: An example of How to Define the Location of the
Passing Object.
VI. EXPERIMENTATION RESULTS
A. Experimental Configuration
As our proposed system target the application layer,
there is no need for us to use a sophisticated simulation such
as NS3, Cooja,.... etc. we just built our simulation using visual
studio development framework (VB.Net2013) to justify that
the proposed algorithm of 'Algorithm name' is sufficient using
different test cases.
our simulator has a friendly GUI "graphical user
interface" as shown in Figure 6 that provides the full control
of proposed system parameters such as (area, sensor range,
scan period, object location, object nature). Also it provides
both graphically and tabular output.
Figure 6: Graphical User Interface
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116
114 | P a g e
We can use the real time graphical representation to monitor
the moving object through the network, all received signals in
the control center and the absolute status of the object
(location, detection time, nature, moving status).
To simulate any of the test cases, first we need to configure
our network structure using parameters of covered area (width
and high), sensor range and the scan period. Then we need to
configure the nature of the object material.
B. Obtained Results
We will apply four different test cases to ensure that the
proposed algorithm is efficient. The first, second and third test
case describes the behavior of a moving object passes the
boundary and stop in area that's covered by the radiation of
one, two four sensors respectively as shown in Figures 7, 8, 9,
and 10. And the last test case describes the behavior of a
moving object passes the boundary and moves around
different areas covered by different numbers of sensors as
shown in Figure 7.
Figure 7: Test case 1 graphical and tabular output
Figure 8: Test case 2 graphical and tabular output
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116
115 | P a g e
Figure 9: Test case 3 graphical and tabular output
Figure 10: Test case 4 graphical and tabular output
VII. THE CONCLUSIONS
In fact, the application of physical security as to pass or
prohibit pass is inappropriate for specific applications. The
fields and areas which are subjective to territory activities is a
base example. In many places in the world, bombing can
explode buildings, lives, facilities, and so many others. In such
cases we need to manage the situation remotely. The paper
showed that a physical access control detection system can
survey the field without human direct intervention. Such
system can intervene electronically to detect the parameters
needed to decide the appropriate actions.
The new approach for providing the parameters needed
for decision maker, in such situations, is presented, in this
paper, it is the three dimension-based physical access control
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116
116 | P a g e
detection system, with the parameters; the nature, the location,
and the time. This approach depends basically on the sensor
network and immune system combined with a central system
that can receives a signal with such parameters to allow
decision maker enough information for decision making.
REFERENCES
[1] Carlos. De morais, and Dharma. Prakash, "Ad Hoc & Sensor
Networks Theory and Applications", World Scientific
Publishing Co. Ptc. Ltd, 2006.
[2] K. Sohraby, D. Minoli, and T. Znati, "Wireless Sensor
Networks Technology, Protocols, and Applications", Fourth
Edition, John Wiley& Sons. Inc, 2007.
[3] Dipankar Dasgupta , "Advances in Artificial Immune
Systems",IEEE Computational Intelligence Magazine, PP 40-
49 Novembre 2006.
[4] "Chapter 1: Physical Security Challenges". Field Manual 3-
19.30: Physical Security. Headquarters, United States
Department of Army. 2001.
[5] Garcia, Mary Lynn (2007). Design and Evaluation of
Physical Protection Systems. Butterworth-Heinemann. pp. 1–
11. ISBN 9780080554280.
[6] "Chapter 2: The Systems Approach". Field Manual 3-19.30:
Physical Security. Headquarters, United States Department of
Army. 2001.
[7] Anderson, Ross (2001). Security Engineering. Wiley. ISBN
978-0-471-38922-4.
[8] For a detailed discussion on natural surveillance and CPTED,
see Fennelly, Lawrence J. (2012). Effective Physical
Security. Butterworth-Heinemann. pp. 4–6. ISBN
9780124158924.
[9] Task Committee; Structural Engineering Institute (1999).
Structural Design for Physical Security. ASCE. ISBN 978-0-
7844-0457-7.
[10] Baker, Paul R. (2012). "Security Construction Projects". In
Baker, Paul R. & Benny, Daniel J. The Complete Guide to
Physical Security. CRC Press. ISBN 9781420099638.
[11] "Chapter 4: Protective Barriers". Field Manual 3-19.30:
Physical Security. Headquarters, United States Department of
Army. 2001.
[12] "Chapter 6: Electronic Security Systems". Field Manual 3-
19.30: Physical Security. Headquarters, United States
Department of Army. 2001.
[13] Tyska, Louis A. & Fennelly, Lawrence J. (2000). Physical
Security: 150 Things You Should Know. Butterworth-
Heinemann. p. 3. ISBN 9780750672559.
[14] "Chapter 7: Access Control". Field Manual 3-19.30: Physical
Security. Headquarters, United States Department of Army.
2001.
[15] Pearson, Robert (2011). "Chapter 1: Electronic Access
Control". Electronic Security Systems: A Manager's Guide to
Evaluating and Selecting System Solutions. Butterworth-
Heinemann. ISBN 9780080494708.
[16] Federal Financial Institutions Examination Council (2008).
"Authentication in an Internet Banking Environment".
[17] biometric access control technology overview
[18] K. Sohraby, D. Minoli, and T. Znati, "Wireless Sensor
Networks Technology, Protocols, and Applications", Fourth
Edition, John Wiley& Sons. Inc, 2007.
[19] M. Kuorilehto, M. Kohvakka, J. Suhonen, P. Hamalainen, M.
Hannik¨ainen, and Timo D. Hamalainen,"Ultra-Low Energy
Wireless Sensor Networks in Practice Theory", Realization
and Deployment,John Wiley & Sons, Inc., Publication, 2007.
[20] J. S.Wilson, "Sensor Technology Handbook", Elsevier Inc.
2005.
[21] Anil Somayaji, Steven Hofmeyr, & Stephanie Forrest ,
"Principles of a Computer Immune System", New Security
Paradigms Workshop Langdale, Cumbria UK, 1997
[22] Leandro Nunes de Castro, Fernando J. Von Zuben "The
Clonal Selection Algorithm with Engineering Applications"
Workshop Proceedings of GECCO’00, pp. 36-37, Workshop
on Artificial Immune Systems and Their Applications, Las
Vegas, USA, July 2000.

More Related Content

What's hot

Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controlsFITSFSd
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemIOSR Journals
 
A comparative analysis of current intrusion detection technologies
A comparative analysis of current intrusion detection technologiesA comparative analysis of current intrusion detection technologies
A comparative analysis of current intrusion detection technologiesJOHN ELEKWA
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1nicfs
 
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGESEMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGESIJNSA Journal
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security PoliciesMark John Lado, MIT
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsIDES Editor
 
In Quest of Benchmarking Security Risks to Cyber-Physical Systems
In Quest of Benchmarking Security Risks to Cyber-Physical SystemsIn Quest of Benchmarking Security Risks to Cyber-Physical Systems
In Quest of Benchmarking Security Risks to Cyber-Physical SystemsDETER-Project
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatnooralmousa
 
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS IJNSA Journal
 
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...IJNSA Journal
 

What's hot (20)

46 102-112
46 102-11246 102-112
46 102-112
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controls
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
 
A comparative analysis of current intrusion detection technologies
A comparative analysis of current intrusion detection technologiesA comparative analysis of current intrusion detection technologies
A comparative analysis of current intrusion detection technologies
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
 
Kb2417221726
Kb2417221726Kb2417221726
Kb2417221726
 
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGESEMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
EMERGENCY RESPONSE COMMUNICATIONS AND ASSOCIATED SECURITY CHALLENGES
 
The need for security
The need for securityThe need for security
The need for security
 
Bp24447451
Bp24447451Bp24447451
Bp24447451
 
Ijetr042329
Ijetr042329Ijetr042329
Ijetr042329
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security Policies
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer Systems
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
In Quest of Benchmarking Security Risks to Cyber-Physical Systems
In Quest of Benchmarking Security Risks to Cyber-Physical SystemsIn Quest of Benchmarking Security Risks to Cyber-Physical Systems
In Quest of Benchmarking Security Risks to Cyber-Physical Systems
 
Ahmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threatAhmed Al Barrak - Staff information security practices - a latent threat
Ahmed Al Barrak - Staff information security practices - a latent threat
 
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
DEFENSE MECHANISMS FOR COMPUTER-BASED INFORMATION SYSTEMS
 
Security audit
Security auditSecurity audit
Security audit
 
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
 

Viewers also liked

Viewers also liked (20)

PREVALENCE EVALUATION OF DIABETIC RETINOPATHY
PREVALENCE EVALUATION OF DIABETIC RETINOPATHYPREVALENCE EVALUATION OF DIABETIC RETINOPATHY
PREVALENCE EVALUATION OF DIABETIC RETINOPATHY
 
SCANNING ELECTRON MICROSCOPE OF DISINFECTANTS EXPOSED PSEUDOMONAS AERUGINOSA ...
SCANNING ELECTRON MICROSCOPE OF DISINFECTANTS EXPOSED PSEUDOMONAS AERUGINOSA ...SCANNING ELECTRON MICROSCOPE OF DISINFECTANTS EXPOSED PSEUDOMONAS AERUGINOSA ...
SCANNING ELECTRON MICROSCOPE OF DISINFECTANTS EXPOSED PSEUDOMONAS AERUGINOSA ...
 
OXIDATIVE STRESS AND NITRIC OXIDE: A SIGNIFICANT MARKER IN CORONARY ARTERY DI...
OXIDATIVE STRESS AND NITRIC OXIDE: A SIGNIFICANT MARKER IN CORONARY ARTERY DI...OXIDATIVE STRESS AND NITRIC OXIDE: A SIGNIFICANT MARKER IN CORONARY ARTERY DI...
OXIDATIVE STRESS AND NITRIC OXIDE: A SIGNIFICANT MARKER IN CORONARY ARTERY DI...
 
INVESTIGATION OF THE EFFECT OF CURRENT ON TENSILE STRENGTH AND NUGGET DIAMETE...
INVESTIGATION OF THE EFFECT OF CURRENT ON TENSILE STRENGTH AND NUGGET DIAMETE...INVESTIGATION OF THE EFFECT OF CURRENT ON TENSILE STRENGTH AND NUGGET DIAMETE...
INVESTIGATION OF THE EFFECT OF CURRENT ON TENSILE STRENGTH AND NUGGET DIAMETE...
 
IDENTIFICATIONS OF ELECTRICAL AND ELECTRONIC EQUIPMENT POLYMER WASTE TYPES US...
IDENTIFICATIONS OF ELECTRICAL AND ELECTRONIC EQUIPMENT POLYMER WASTE TYPES US...IDENTIFICATIONS OF ELECTRICAL AND ELECTRONIC EQUIPMENT POLYMER WASTE TYPES US...
IDENTIFICATIONS OF ELECTRICAL AND ELECTRONIC EQUIPMENT POLYMER WASTE TYPES US...
 
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
PHYSICO-CHEMICAL AND BACTERIOLOGICAL ASSESSMENT OF RIVER MUDZIRA WATER IN MUB...
 
MAPPING REMOTE PLANTS THROUGH REMOTE SENSING TECHNOLOGY AND GIS
MAPPING REMOTE PLANTS THROUGH REMOTE SENSING TECHNOLOGY AND GISMAPPING REMOTE PLANTS THROUGH REMOTE SENSING TECHNOLOGY AND GIS
MAPPING REMOTE PLANTS THROUGH REMOTE SENSING TECHNOLOGY AND GIS
 
FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONOR’S SUPPORT. THE CASE OF ...
FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONOR’S SUPPORT. THE CASE OF ...FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONOR’S SUPPORT. THE CASE OF ...
FACTORS AFFECTING PROJECT SUSTAINABILITY BEYOND DONOR’S SUPPORT. THE CASE OF ...
 
IMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACH
IMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACHIMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACH
IMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACH
 
THE FUNDAMENTAL ANALYSIS-THE BEST WAY TO EVALUATE EQUITY SHARES
THE FUNDAMENTAL ANALYSIS-THE BEST WAY TO EVALUATE EQUITY SHARESTHE FUNDAMENTAL ANALYSIS-THE BEST WAY TO EVALUATE EQUITY SHARES
THE FUNDAMENTAL ANALYSIS-THE BEST WAY TO EVALUATE EQUITY SHARES
 
INVESTIGATION OF STRESSES IN CANTILEVER BEAM BY FEM AND ITS EXPERIMENTAL VERI...
INVESTIGATION OF STRESSES IN CANTILEVER BEAM BY FEM AND ITS EXPERIMENTAL VERI...INVESTIGATION OF STRESSES IN CANTILEVER BEAM BY FEM AND ITS EXPERIMENTAL VERI...
INVESTIGATION OF STRESSES IN CANTILEVER BEAM BY FEM AND ITS EXPERIMENTAL VERI...
 
PERFORMANCE EVALUATION OF DIFFERENT CLASSIFIER ON BREAST CANCER
PERFORMANCE EVALUATION OF DIFFERENT CLASSIFIER ON BREAST CANCERPERFORMANCE EVALUATION OF DIFFERENT CLASSIFIER ON BREAST CANCER
PERFORMANCE EVALUATION OF DIFFERENT CLASSIFIER ON BREAST CANCER
 
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
 
ERROR ESTIMATION IN DEVELOPING GIS MAPS USING DIFFERENT INPUT METHODS OF LAND...
ERROR ESTIMATION IN DEVELOPING GIS MAPS USING DIFFERENT INPUT METHODS OF LAND...ERROR ESTIMATION IN DEVELOPING GIS MAPS USING DIFFERENT INPUT METHODS OF LAND...
ERROR ESTIMATION IN DEVELOPING GIS MAPS USING DIFFERENT INPUT METHODS OF LAND...
 
UNDERSTANDING ENTREPRENEURSHIP: IMPACT OF OVERCONFIDENCE ON ENTREPRENEURSHIP
UNDERSTANDING ENTREPRENEURSHIP: IMPACT OF OVERCONFIDENCE ON ENTREPRENEURSHIPUNDERSTANDING ENTREPRENEURSHIP: IMPACT OF OVERCONFIDENCE ON ENTREPRENEURSHIP
UNDERSTANDING ENTREPRENEURSHIP: IMPACT OF OVERCONFIDENCE ON ENTREPRENEURSHIP
 
Ijtra150317
Ijtra150317Ijtra150317
Ijtra150317
 
STATIC AND MODAL ANALYSIS OF LEAF SPRING USING FEA
STATIC AND MODAL ANALYSIS OF LEAF SPRING USING FEASTATIC AND MODAL ANALYSIS OF LEAF SPRING USING FEA
STATIC AND MODAL ANALYSIS OF LEAF SPRING USING FEA
 
EFFECT OF DIFFERENT CONCENTRATIONS OF AUXINS AND COMBINATION WITH KINETIN ON ...
EFFECT OF DIFFERENT CONCENTRATIONS OF AUXINS AND COMBINATION WITH KINETIN ON ...EFFECT OF DIFFERENT CONCENTRATIONS OF AUXINS AND COMBINATION WITH KINETIN ON ...
EFFECT OF DIFFERENT CONCENTRATIONS OF AUXINS AND COMBINATION WITH KINETIN ON ...
 
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
 
130509
130509130509
130509
 

Similar to THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATURE, THE LOCATION, AND THE TIME

An introduction to intrusion detection systems
An introduction to intrusion detection systemsAn introduction to intrusion detection systems
An introduction to intrusion detection systemsUltraUploader
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docxMVNVKUMAR
 
Decision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control SystemsDecision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control SystemsSahithiKotha2
 
Image Processing Based Detecting and Tracking for Security System
Image Processing Based Detecting and Tracking for Security SystemImage Processing Based Detecting and Tracking for Security System
Image Processing Based Detecting and Tracking for Security SystemCSCJournals
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docxmoggdede
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanAngie Willis
 
Monitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System ControlMonitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System ControlMarc-Andre Heroux
 
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )ijistjournal
 
Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...TELKOMNIKA JOURNAL
 
Privacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial SystemPrivacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial Systemiosrjce
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdffeelinggift
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionchristophefeltus
 
Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection Systemtheijes
 
4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdfarvindarora20042013
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system96452128
 
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...IJNSA Journal
 

Similar to THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATURE, THE LOCATION, AND THE TIME (20)

An introduction to intrusion detection systems
An introduction to intrusion detection systemsAn introduction to intrusion detection systems
An introduction to intrusion detection systems
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
 
Decision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control SystemsDecision-Making Support in Biometric-Based Physical Access Control Systems
Decision-Making Support in Biometric-Based Physical Access Control Systems
 
Image Processing Based Detecting and Tracking for Security System
Image Processing Based Detecting and Tracking for Security SystemImage Processing Based Detecting and Tracking for Security System
Image Processing Based Detecting and Tracking for Security System
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
 
Monitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System ControlMonitoring your organization against threats - Critical System Control
Monitoring your organization against threats - Critical System Control
 
Chapter008
Chapter008Chapter008
Chapter008
 
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
SOCIO-TECHNICAL COLLABORATIVE SECURITY SUPPORT SYSTEM(STCS3 )
 
Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...Vulnerabilities detection using attack recognition technique in multi-factor ...
Vulnerabilities detection using attack recognition technique in multi-factor ...
 
Privacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial SystemPrivacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial System
 
F017223742
F017223742F017223742
F017223742
 
Physical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdfPhysical security is a fundamental component of any secure infrastru.pdf
Physical security is a fundamental component of any secure infrastru.pdf
 
N018138696
N018138696N018138696
N018138696
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Multi agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reactionMulti agents based architecture for is security incident reaction
Multi agents based architecture for is security incident reaction
 
Implementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection SystemImplementing a Robust Network-Based Intrusion Detection System
Implementing a Robust Network-Based Intrusion Detection System
 
4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf4. Define communication security, information security, network secu.pdf
4. Define communication security, information security, network secu.pdf
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system
 
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
TAXONOMY BASED INTRUSION ATTACKS AND DETECTION MANAGEMENT SCHEME IN PEER-TOPE...
 

More from International Journal of Technical Research & Application

More from International Journal of Technical Research & Application (20)

STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEWSTUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
 
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
 
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
 
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONSSTUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
 
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
 
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTERPOD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
 
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGADIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
 
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
 
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIRAN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
 
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESSLI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
 
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
 
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEWSCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTYEFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
 
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
 
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
 
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
 
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASHA STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
 
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
 
PERFORMANCE ANALYSIS OF MICROSTRIP PATCH ANTENNA USING COAXIAL PROBE FEED TEC...
PERFORMANCE ANALYSIS OF MICROSTRIP PATCH ANTENNA USING COAXIAL PROBE FEED TEC...PERFORMANCE ANALYSIS OF MICROSTRIP PATCH ANTENNA USING COAXIAL PROBE FEED TEC...
PERFORMANCE ANALYSIS OF MICROSTRIP PATCH ANTENNA USING COAXIAL PROBE FEED TEC...
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATURE, THE LOCATION, AND THE TIME

  • 1. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116 109 | P a g e THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATURE, THE LOCATION, AND THE TIME Dr. M. Amer shedid1, Ass. Prof. Magdy E. Elhennawy2 1 The Future Higher Institute for Specialized Technological Studies Computer Science Dept., Future Academy, 2 High Institute of Computers and Information Technology, Computer Dept., El-Shorouk Academy, Family Card Project Consultant, Cairo, Egypt, 1 mo_amer2002@yahoo.com, 2 mhennawy@ad.gov.eg Abstract:- In fact, the application of physical security as to pass or prohibit pass is satisfactory for a variety of applications, but it is inappropriate for specific applications. The areas that need to be surveyed without interaction of human is one example. The fields and areas which are subjective to territory activities is another example. In many places in the world, bombing can explode buildings, lives, facilities, and so many others. In such cases we need to manage the situation remotely. We need a physical access control detection system that can survey the field without human direct intervention. Such system can intervene electronically to detect the parameters needed to decide the appropriate actions. In this paper, a new approach for providing the parameters needed for decision maker, in such situations, is presented, it is the three dimension-based physical access control detection system, with the parameters; the nature, the location, and the time. The approach depends on defining three parameters, which are the nature of the passing object, the location of the object in the protected area, and the time in which the object is placed in that location. This approach depends basically on the sensor network and immune system combined with a central system that can receives a signal with such parameters to allow decision maker enough information for decision making. The new approach has been presented including the capabilities and architecture. I. INTRODUCTION Physical security is concerned with the protection against unauthorized physical access. It intended to deter, detect, and monitor/record intruders and trigger appropriate incident responses (e.g. by security guards and police). Various methods, on the other hand, for physical access control may be applied. Access control may include mechanical access control systems, electronic access control systems, or identification systems and access policies. Intrusion detection and electronic surveillance may include alarm systems and sensors, or video surveillance. One of the basic methods is the physical access control gates. It is designed in such a way that it has a sensor that senses the mal materials during the object passing the gate. One of the critical threats, today’s, is the accessing of a prohibited area and leaves a mal object or mal material such as ammunition or explosive material, as happened in the terrorism situations executed by terrorisms. One of the new approaches that can be appropriate for achieving the physical access controls is the wireless sensor network in which a set of sensors are distributed on a specific area to form a network organized and cooperated together. Such sensor network can be connected to a central station to communicate and process received signals from such network about any mal object accessing the specified area [1, 2]. Meanwhile, Artificial Immune Systems (AIS) are adaptive systems inspired by theoretical immunology and observed immune functions, principles and models, which are applied to complex problem domains. Artificial Immune Systems (AIS) emerged in the 1990s as a new branch in Computational Intelligence (CI).A number of AIS models exist, and they are used in pattern recognition, fault detection, computer security, and a variety of other applications researchers are exploring in the field of science and engineering [3]. In this paper, the introduction is mentioned in section one, this section. An overview about the physical access control gates is presented in section two. In section three the current state of the art of the physical security and access control systems is presented in addition to sensor network and immune system. In section four, the already existing system’s drawback is stated. The approach of the three dimension- based physical access control gate is presented in section five. The results of case implementation are stated in section six. The conclusions and future work is mentioned in section seven and eight. II. OVERVIEW The term access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons. Physical access control can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap. The structure of the already existing access control gate allows, only, giving one fact; it is to grant pass or prohibit pass. The employed sensor designates the mal material, and signals the system which decides to pas or not to pass. Now, a variety of access control gate types are available with the application of physical security. For an object passing through the gate, it allows to pass or prohibit pass, which is, for now, satisfactory for some of applications. Meanwhile, it is inappropriate for specific applications such as territory activities and the areas that need to surveyed without interference of human. In many places in the world, bombing can explode buildings, lives, facilities, and so many others. In
  • 2. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116 110 | P a g e such cases we need to manage the situation remotely. We need a physical access control system that can survey the field without human direct intervention. Such system can intervene electronically to detect the parameters needed to decide the appropriate actions. The proposed system presented in this paper defines the parameters that are needed to the decision maker to manage the above situation. It is by defining the nature of the object passing the protected area, the location in absolute coordinates, and the time of accessing that area. III. CURRENT STATE OF THE ART A. Physical Security Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources, and to protect personnel and property from damage or harm [4]. Physical security involves the use of multiple layers of interdependent systems which include CCTV surveillance, security guards, protective barriers, locks, access control protocols, and many others. Physical security systems for protected facilities are generally intended to:[5,6.7] deter potential intruders; detect intrusions and monitor/record intruders; and trigger appropriate incident responses. It is up to security designers, architects and analysts to balance security controls against risks, taking into account the costs of specifying, developing, testing, implementing, using, managing, monitoring and maintaining the controls, along with broader issues such as aesthetics, human rights, and health and safety. Physical access security measures that are appropriate for a high security prison or a military site may be inappropriate in an office, a home or a vehicle, although the principles are similar. Design of physical security system depends on the needs, nature and constituted elements of that system. Methods of physical security can be classified into more than one method. Deterrence methods may include physical barriers, natural surveillance, and security lighting. The initial layer of security for a campus, building, office, or other physical space uses crime prevention through environmental design to deter threats. Some of the most common examples are also the most basic: warning signs or window stickers, fences, vehicle barriers, vehicle height-restrictors, restricted access points, security lighting and trenches [8, 9.10.11]. Intrusion detection and electronic surveillance may include alarm systems and sensors, or video surveillance. Alarm systems can be installed to alert security personnel when unauthorized access is attempted. Alarm systems work in tandem with physical barriers, mechanical systems, and security guards, serving to trigger a response when these other forms of security have been breached. They consist of sensors including motion sensors, contact sensors, and glass break detectors [12]. However, alarms are only useful if there is a prompt response when they are triggered. Security personnel are common element in most of such method. Access control methods are used to monitor and control traffic through specific access points and areas of the secure facility. This is done using a variety of systems including CCTV surveillance, identification cards, security guards, and electronic/mechanical control systems such as locks, doors, and gates.[13, 14, 15] B. Survey to Access Control Systems Operational Aspects Several physical access control systems exist; examples are control panel-based access control, physical access control gates, and others. When a credential is presented to a reader, the reader sends the credential’s information to a control panel, a highly reliable processor. The control panel compares the credential to an access control list, grants or denies the presented request, and sends a transaction log to a database. If there is a match between the credential and the access control list, the control panel operates a relay that in turn unlocks the door. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked. The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input. A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer- based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. Biometric technologies, on the other hand, include fingerprint, facial recognition, iris recognition, retinal scan, voice, and hand geometry [16, 17]. C. Wireless Sensor Networks A wireless sensor network (WSN) is a sophisticated system that links the physical world with digital data networks. Wireless sensor networking is an emerging technology that has a wide range of potential applications including environment monitoring, smart spaces, medical systems and robotic exploration. Sensor network research is primarily driven by military applications such as battle-field surveillance and enemy tracking, where it provides the ability for the detection and tracking of enemy soldiers and their vehicles [18]. A wireless sensor network (WSN) generally consists of a base station (or gateway) that can communicate with a number of wireless sensors via a radio link. Data is collected at the wireless sensor node, compressed, and transmitted to the gateway directly or, if required, uses other wireless sensor nodes to forward data to the gateway. The transmitted data is then presented to the system by the gateway connection [18, 19]. A generic wireless sensor network is composed of a large number of sensor nodes scattered in a terrain of interest, called the sensor field. Each of them has the capability of
  • 3. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116 111 | P a g e periodically collecting data about an ambient condition and sending data reports to a center node. Knowledge about what kind of data is concerned by a center node and propagated by that node periodically via query message. This means, each sensor can be activated; it can transmit data to its neighbors and can also communicate with the user through center node [1, 2]. Figure 1 illustrates the wireless sensor network layout. Sensor nodes that make up the sensor network are randomly deployed in inaccessible terrains (such as near a volcano) or disaster relief operations (such as floods and fires), which means that sensor network protocols and algorithms must possess self-organizing capabilities and exhibit cooperative higher-level behavior [19, 20]. Figure 1: Sensor Nodes Scattered in the Sensor Field D. Immune Systems The immune system has guaranteed the health of the human body. Through identifying self and no self- mechanisms, the immune system can get rid of foreign matter (antigens) to perform this basic defense [21, 22]. The biological immune system (BIS) is a subject of great research interest because of its powerful information processing capabilities; in particular, understanding the distributed nature of its memory, self-tolerance and decentralized control mechanisms from an informational perspective, and building computational models believed to better solve many science and engineering problems [3, 21]. The biological immune system possesses capabilities of “intelligent” information processing that includes memory, ability to learn, to recognize, and to make decisions on how to treat any unknown state. The biological immune system is a highly parallel, distributed, and adaptive system. It uses learning, memory, and associative retrieval to solve recognition and classification tasks. In particular, it learns to recognize relevant patterns, remember patterns that have been seen previously, and use combinatory to construct pattern detectors efficiently. These remarkable information processing abilities of the immune system provide important aspects in the field of computation [21,22]. This emerging field is sometimes referred to Artificial Immune System (AIS). Although it is still relatively new, AIS, having a strong relationship with other biology-inspired computing models, and computational biology, is establishing its uniqueness and effectiveness through the intensive efforts of researchers around the world [3]. IV. CURRENT SYSTEM DRAWBACKS AND PROBLEM DEFINITION In existing physical access control gates, the only one information provided is the grant, which allows the object to grant entrance or deny entrance. It is important to identify, besides, the location, the nature of the passing object that prohibit passing that object, and the time of passing that object the prohibited area. The passing object may be a person, a black box filled with some sort of materials, or other object with any specific characteristics. Sometimes the investigator or inspector needs more information to allow doing his job. One situation that needs such additional information is the protection of the electricity towers distributed on desert places, in which employing guards is difficult, and surveillance cameras may cost much. In such situation we need to provide a vision for such space. If some mal material, that can make harm, exists in some location we need to define its nature and position. The above additional facts will help avoid any terrorism operations. Accordingly, given an area A, with a boundary B, it is required to define the following: - The time, T, in which the mal material, or an object with a mal material has pass through the boundary B. - The nature of that mal material to detect if it is dangerous, to identify its bad effect. - The location, L, for that object in the specified area, A, defined in x, y coordinates such that L(x, y) ϵ A and L(x, y) not exceeding B. It is considered that area A covers the area needed to protect the facility, equipment, or any resource inside that area. V. THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL GATE SYSTEM: THE PROPOSED SOLUTION On the situation which needs the protection of the electricity towers, distributed on desert areas, a set of sensors will be distributed over such area connected together. When an object passes such area, sensors detect the nature of the material of such object. A match to the detected material with the list of materials will allow designating such material nature, and location will be detected. In this way appropriate action can be taken by security responsible. Same idea can be applied for a variety of similar situations, which will be very helpful to apply the stated approach to secure it. The structure of the proposed access control gate system allows, granting pass or prohibiting pass. The sensor feels the existence of a mal material in a location somewhere on the specified area, referred to, in our research as the location. Such mal material is referred to, in our research as nature. The time of passing through the field is the third factor in our solution, referred to as time. It is important and critical since it can help in analysis of the situation. It will be much helpful if the guard knows the three facts; the Location, nature, and the time. This might simplify the process of investigating the passing object. This paper introduces the new idea for building the access control system that provides the three facts, which save investigation time, investigation effort, and finally
  • 4. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116 112 | P a g e issuing appropriate and speedy decision. This, all, will be done without any human intervention. So, already existing physical access control is a matter of whom, where, and when. Meaning, current access control system determines who is allowed to enter or exit, where they are allowed to exit or enter, and when they are allowed to enter or exit. However, today with the introduction of the electronic access means is a matter of location, nature, and time, as previously stated. A. The Capabilities The proposed solution allows the detection of the nature of the mal material by distinguishing between several available mal materials. The solution can distinguish between several mal materials by learning the sensor the various types of such materials and its characteristics. A list of such materials, together with its characteristics is prepared in a database, referred to as “mal material” database. A match is done between the detected characteristics sensed during object passing and the list in the database. Accordingly, a decision is issued whether grant entrance or prohibit entrance. An alarm can be sent to the central system or base station, with other data, for appropriate decision. The success of such solution depends mainly on the degree of learning of the sensor with the material characteristics, and the precision of such characteristics. Examples of such sensors are Resistance Temperature, Metal detection, and Motion detection Sensors. Figure 2 depicts this part of the proposed solution. Figure 2: Detection of the Nature of the Mal Material On the other hand, the proposed solution allows the location of the mal material to be defined by means of a sensor network that will scan the entered mal material object and detect its location. This can be achieved as follows: - Each sensor distributed on the field has its identification code, defined location as x, y coordinates, and working status (working, or out of service). - For the working ones, when one or more sensors senses the material object entered on the field, a message with two parameters is sent to the concentrator. The message three parameters are: the location, the nature of the material, and the time. - The concentrator sends the central system a signal with the messages received from the all sensor network, including the three factors, the location, the nature, and the time. - The individual sensors send the location of the object relative to their position in the field; this can lead to define the absolute location of the object in the field. - The central system process the data received, if the nature is mal material, an alarm is sent for appropriate actions and then makes the needed analysis using the time and location. Figure 3 depicts how the sensor network detect the location, nature, and the time and send them tom the concentrator and how the concentrator sends what he receives from various concentrators to the central system to allow precise decision making. Figure 3: Location, Nature, Time Detection B. The Architecture First of all, the area that needs to be protected in the field is defined, in our solution; it is area A with a boundary B. The sensors, then, are distributed in that area forming a wireless sensor network. Each sensor is defined to the concentrator by its code. The location of each sensor in A is detected by each one. A mapping has been defined between the individual sensor and actual field coordinates. When an object passes the boundary B, nearest sensors to that object sense such object. Each of these sensors will detect the nature of the object; define the time of detecting the object which touches the boundary, B, and relative location to them. Each of these sensors will send a signal to the related concentrator with the object nature, location relative to that sensor, and the time of detection. Such sensors will continue sending such signal as much as the object is moving with a predefined rate in a second. That rate can be defined by the system operator according to degree of criticality of the protected facility. The array of signals received to the central system will be registered continually. Each current signal received will be compared to the previous signal, if changed the new signal will be the current signal. If they are equal, this means that the object has been stopped moving and the system can calculate the absolute location from the relative locations of that object to the sensors sending such signals. The pseudo code of the proposed algorithm is as follows: Define: A ……….…The area is to be protected. B ……..…. The boundary of the area is to be protected. Lrelative ….… The location of the object related to each sensor. Labsolute …… The absolute location of the object to the area A. Scurrent (L, N, T) ….. The signal currently received Sprevious (L, N, T) …. The signal previously received.
  • 5. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116 113 | P a g e Input: Array of n-element Scurrent(L, N, T); Comment: each element consists of 3 sub elements. while (Scurrent ≠ Sprevious) continue receiving signals endwhile Calculate Absolute location Detect last time received Send Scurrent(L, N, T); exit End C. Designating The Object Location The wireless sensor network is distributed over the Prohibited area A. Each sensor represents a node in this network. Each node has a specific code and the domain of each node covers a circle with a radius equal to the distance between each two sensors, as shown in the below figure. Figure 4 shows the arrangement of the wireless sensor network and the domain of each subarea. Figure 4: the Domain of Individual Sub-Areas For the wireless sensor network covering area A, given n nodes, Ni, i ≤ n, creating m sub-areas, Aj, j ≤ m, then: Some sensors will sense the object passing in the prohibited area. This means that Nk , k ≤ n nodes will send a signal to the base station with the distance of that object to this node. The node with minimum of these distances is the node in which the object locates. Accordingly the system can designate the location of the passing object. Figure 5 depicts an example of how to define the location of the passing object. Figure 5: An example of How to Define the Location of the Passing Object. VI. EXPERIMENTATION RESULTS A. Experimental Configuration As our proposed system target the application layer, there is no need for us to use a sophisticated simulation such as NS3, Cooja,.... etc. we just built our simulation using visual studio development framework (VB.Net2013) to justify that the proposed algorithm of 'Algorithm name' is sufficient using different test cases. our simulator has a friendly GUI "graphical user interface" as shown in Figure 6 that provides the full control of proposed system parameters such as (area, sensor range, scan period, object location, object nature). Also it provides both graphically and tabular output. Figure 6: Graphical User Interface
  • 6. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116 114 | P a g e We can use the real time graphical representation to monitor the moving object through the network, all received signals in the control center and the absolute status of the object (location, detection time, nature, moving status). To simulate any of the test cases, first we need to configure our network structure using parameters of covered area (width and high), sensor range and the scan period. Then we need to configure the nature of the object material. B. Obtained Results We will apply four different test cases to ensure that the proposed algorithm is efficient. The first, second and third test case describes the behavior of a moving object passes the boundary and stop in area that's covered by the radiation of one, two four sensors respectively as shown in Figures 7, 8, 9, and 10. And the last test case describes the behavior of a moving object passes the boundary and moves around different areas covered by different numbers of sensors as shown in Figure 7. Figure 7: Test case 1 graphical and tabular output Figure 8: Test case 2 graphical and tabular output
  • 7. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116 115 | P a g e Figure 9: Test case 3 graphical and tabular output Figure 10: Test case 4 graphical and tabular output VII. THE CONCLUSIONS In fact, the application of physical security as to pass or prohibit pass is inappropriate for specific applications. The fields and areas which are subjective to territory activities is a base example. In many places in the world, bombing can explode buildings, lives, facilities, and so many others. In such cases we need to manage the situation remotely. The paper showed that a physical access control detection system can survey the field without human direct intervention. Such system can intervene electronically to detect the parameters needed to decide the appropriate actions. The new approach for providing the parameters needed for decision maker, in such situations, is presented, in this paper, it is the three dimension-based physical access control
  • 8. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 109-116 116 | P a g e detection system, with the parameters; the nature, the location, and the time. This approach depends basically on the sensor network and immune system combined with a central system that can receives a signal with such parameters to allow decision maker enough information for decision making. REFERENCES [1] Carlos. De morais, and Dharma. Prakash, "Ad Hoc & Sensor Networks Theory and Applications", World Scientific Publishing Co. Ptc. Ltd, 2006. [2] K. Sohraby, D. Minoli, and T. Znati, "Wireless Sensor Networks Technology, Protocols, and Applications", Fourth Edition, John Wiley& Sons. Inc, 2007. [3] Dipankar Dasgupta , "Advances in Artificial Immune Systems",IEEE Computational Intelligence Magazine, PP 40- 49 Novembre 2006. [4] "Chapter 1: Physical Security Challenges". Field Manual 3- 19.30: Physical Security. Headquarters, United States Department of Army. 2001. [5] Garcia, Mary Lynn (2007). Design and Evaluation of Physical Protection Systems. Butterworth-Heinemann. pp. 1– 11. ISBN 9780080554280. [6] "Chapter 2: The Systems Approach". Field Manual 3-19.30: Physical Security. Headquarters, United States Department of Army. 2001. [7] Anderson, Ross (2001). Security Engineering. Wiley. ISBN 978-0-471-38922-4. [8] For a detailed discussion on natural surveillance and CPTED, see Fennelly, Lawrence J. (2012). Effective Physical Security. Butterworth-Heinemann. pp. 4–6. ISBN 9780124158924. [9] Task Committee; Structural Engineering Institute (1999). Structural Design for Physical Security. ASCE. ISBN 978-0- 7844-0457-7. [10] Baker, Paul R. (2012). "Security Construction Projects". In Baker, Paul R. & Benny, Daniel J. The Complete Guide to Physical Security. CRC Press. ISBN 9781420099638. [11] "Chapter 4: Protective Barriers". Field Manual 3-19.30: Physical Security. Headquarters, United States Department of Army. 2001. [12] "Chapter 6: Electronic Security Systems". Field Manual 3- 19.30: Physical Security. Headquarters, United States Department of Army. 2001. [13] Tyska, Louis A. & Fennelly, Lawrence J. (2000). Physical Security: 150 Things You Should Know. Butterworth- Heinemann. p. 3. ISBN 9780750672559. [14] "Chapter 7: Access Control". Field Manual 3-19.30: Physical Security. Headquarters, United States Department of Army. 2001. [15] Pearson, Robert (2011). "Chapter 1: Electronic Access Control". Electronic Security Systems: A Manager's Guide to Evaluating and Selecting System Solutions. Butterworth- Heinemann. ISBN 9780080494708. [16] Federal Financial Institutions Examination Council (2008). "Authentication in an Internet Banking Environment". [17] biometric access control technology overview [18] K. Sohraby, D. Minoli, and T. Znati, "Wireless Sensor Networks Technology, Protocols, and Applications", Fourth Edition, John Wiley& Sons. Inc, 2007. [19] M. Kuorilehto, M. Kohvakka, J. Suhonen, P. Hamalainen, M. Hannik¨ainen, and Timo D. Hamalainen,"Ultra-Low Energy Wireless Sensor Networks in Practice Theory", Realization and Deployment,John Wiley & Sons, Inc., Publication, 2007. [20] J. S.Wilson, "Sensor Technology Handbook", Elsevier Inc. 2005. [21] Anil Somayaji, Steven Hofmeyr, & Stephanie Forrest , "Principles of a Computer Immune System", New Security Paradigms Workshop Langdale, Cumbria UK, 1997 [22] Leandro Nunes de Castro, Fernando J. Von Zuben "The Clonal Selection Algorithm with Engineering Applications" Workshop Proceedings of GECCO’00, pp. 36-37, Workshop on Artificial Immune Systems and Their Applications, Las Vegas, USA, July 2000.