ABSTRACT: This article describes a contribution to improving the usual safety analysis methods used in the certification of railway transport systems. The methodology is based on the complementary and simultaneous use of knowledge acquisition and machine learning. To demonstrate the feasibility and soundness of the proposed approach to assist in the analysis and evaluation of railway safety, we have developed a software tool. This tool is composed of two main modules: A module for the classification and capitalization of historical accident scenarios and a module for evaluating the completeness and consistency of the new scenarios proposed by the manufacturer of the transport system. The first classification module is an inductive, incremental and interactive learning system. The second evaluation module, which is based on the use of a rule-learning system, aims to provide experts with suggestions of potential failures which have not been considered by the manufacturer and which are capable of jeopardizing the safety of a new rail transport system. In contrast to traditional failure Diagnosis Systems, the developed software tool can be seen as an aid which reveals potential risk during the design stage of rail system
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...IJERDJOURNAL
ABSTRACT: The purpose of the work described in this paper is to improve the assessment of the safety analyses for railway transport systems in France. The modes of reasoning which are used in the context of safety analysis and the very nature of knowledge about safety mean that a conventional computing solution is unsuitable and the utilization of artificial intelligence techniques would seem to be more appropriate. The approach which was adopted in order to design and implement an assistance tool for safety analysis involved the following two main activities: – Extracting, formalizing and storing hazardous situations to produce a library of standard cases which covers the entire problem. This process entailed the use of knowledge acquisition techniques; – Exploiting the stored historical knowledge in order to develop safety analysis know-how which can assist experts to judge the thoroughness of the manufacturer’s suggested safety analysis. This second activity involves the use of machine learning techniques in particular the use of Case-Based Reasoning. This paper presents a mock-up of a tool for storing and assessing Software Error Effect Analysis (SEEA) for the safety of automatic devices of terrestrial guided transport system. The purpose of our work is to exploit historical SEEA, which have already been carried out on approved safety-critical software, in order to assess SEEA of new software.
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET Journal
This document discusses cyber security for GPRS terminals used in fiscal devices like cash registers and printers that send financial data to tax authorities. It proposes using blockchain technology to encrypt the data transmitted from these devices via GPRS terminals to increase security. Currently, most fiscal devices transmit plaintext data without encryption via GPRS terminals. The document surveys previous generations of fiscal devices and their vulnerabilities. It suggests an improved design for new or existing fiscal devices that incorporates an internal device like GPRS to transmit encrypted data directly to tax authority servers without additional services. This would help address security issues with the current systems.
Human safety in the Middle East is a crucial aspect especially when working on critical mission systems. Any trivial error may result in inevitable dangerous causalities that lead to loss of innocent souls. The main objective of this paper is to introduce a complete study of a system that automates the currently adopted manual process of having dedicated men to control the barriers at the railway crossings when trains pass, the main objective is to reduce the possible human errors resulting from manual control. This study aims to provide a robust solution that adheres to a formal, systematic and new procedure to enhance the overall quality of requirements gathered for critical systems. In addition, it reflects how effective is the usage of goal oriented modelling in requirements elicitation stage for critical systems to define a clear scope and validate requirements against any missing, inconsistent or vague requirements at early stage.
IRJET-A Hybrid Intrusion Detection Technique based on IRF & AODE for KDD-CUP ...IRJET Journal
This document presents a hybrid intrusion detection technique based on Improved Random Forest (IRF) and Average One-Dependence Estimator (AODE) to address challenges with existing methods for the KDD Cup 99 dataset. The proposed hybrid intrusion detection system aims to improve accuracy, precision, recall and other performance metrics. It uses an ensemble of IRF with bagging and AODE classifiers along with a new sampling method. The performance of the proposed technique is evaluated and compared to existing random forest and SVM methods using metrics like accuracy, detection rate, and false alarm rate. Experimental results demonstrate the proposed hybrid method performs better than existing approaches.
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET Journal
This document discusses network security visualization and proposes a classification system for network security visualization systems. It begins by introducing the importance of visualizing network security data due to the large quantities of data produced. It then reviews existing network security visualization systems and outlines key aspects they monitor like host/server monitoring, port activity, and intrusion detection. The document proposes a taxonomy to classify network security visualization systems based on their data sources and techniques. It concludes by stating papers were selected for review based on their relevance to network security, novelty of techniques, and inclusion of evaluations.
Case-Based Reasoning for the Evaluation of Safety Critical Software. Applicat...IJERDJOURNAL
ABSTRACT: The purpose of the work described in this paper is to improve the assessment of the safety analyses for railway transport systems in France. The modes of reasoning which are used in the context of safety analysis and the very nature of knowledge about safety mean that a conventional computing solution is unsuitable and the utilization of artificial intelligence techniques would seem to be more appropriate. The approach which was adopted in order to design and implement an assistance tool for safety analysis involved the following two main activities: – Extracting, formalizing and storing hazardous situations to produce a library of standard cases which covers the entire problem. This process entailed the use of knowledge acquisition techniques; – Exploiting the stored historical knowledge in order to develop safety analysis know-how which can assist experts to judge the thoroughness of the manufacturer’s suggested safety analysis. This second activity involves the use of machine learning techniques in particular the use of Case-Based Reasoning. This paper presents a mock-up of a tool for storing and assessing Software Error Effect Analysis (SEEA) for the safety of automatic devices of terrestrial guided transport system. The purpose of our work is to exploit historical SEEA, which have already been carried out on approved safety-critical software, in order to assess SEEA of new software.
IRJET- A Survey for Block Chaining based Cyber Security System for Fiscal Dev...IRJET Journal
This document discusses cyber security for GPRS terminals used in fiscal devices like cash registers and printers that send financial data to tax authorities. It proposes using blockchain technology to encrypt the data transmitted from these devices via GPRS terminals to increase security. Currently, most fiscal devices transmit plaintext data without encryption via GPRS terminals. The document surveys previous generations of fiscal devices and their vulnerabilities. It suggests an improved design for new or existing fiscal devices that incorporates an internal device like GPRS to transmit encrypted data directly to tax authority servers without additional services. This would help address security issues with the current systems.
Human safety in the Middle East is a crucial aspect especially when working on critical mission systems. Any trivial error may result in inevitable dangerous causalities that lead to loss of innocent souls. The main objective of this paper is to introduce a complete study of a system that automates the currently adopted manual process of having dedicated men to control the barriers at the railway crossings when trains pass, the main objective is to reduce the possible human errors resulting from manual control. This study aims to provide a robust solution that adheres to a formal, systematic and new procedure to enhance the overall quality of requirements gathered for critical systems. In addition, it reflects how effective is the usage of goal oriented modelling in requirements elicitation stage for critical systems to define a clear scope and validate requirements against any missing, inconsistent or vague requirements at early stage.
IRJET-A Hybrid Intrusion Detection Technique based on IRF & AODE for KDD-CUP ...IRJET Journal
This document presents a hybrid intrusion detection technique based on Improved Random Forest (IRF) and Average One-Dependence Estimator (AODE) to address challenges with existing methods for the KDD Cup 99 dataset. The proposed hybrid intrusion detection system aims to improve accuracy, precision, recall and other performance metrics. It uses an ensemble of IRF with bagging and AODE classifiers along with a new sampling method. The performance of the proposed technique is evaluated and compared to existing random forest and SVM methods using metrics like accuracy, detection rate, and false alarm rate. Experimental results demonstrate the proposed hybrid method performs better than existing approaches.
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET Journal
This document discusses network security visualization and proposes a classification system for network security visualization systems. It begins by introducing the importance of visualizing network security data due to the large quantities of data produced. It then reviews existing network security visualization systems and outlines key aspects they monitor like host/server monitoring, port activity, and intrusion detection. The document proposes a taxonomy to classify network security visualization systems based on their data sources and techniques. It concludes by stating papers were selected for review based on their relevance to network security, novelty of techniques, and inclusion of evaluations.
Preliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysisIRJESJOURNAL
Abstract: The Preliminary hazard analysis (PHA) is used to essentially identify potential accidents related to the system and its interfaces to assess their probability of occurrence and the severity of the damage they may cause and finally propose solutions that will reduce, control or eliminate. Although essential in the process of analysis and safety evaluation of high-risk industrial system, the method PHA is very differently developed and remained unclear. This method is generally classified in theory by an inductive approach. However, in practice, a deductive approach is essentially used as the Fault tree analysis. To enhance the quality of the safety analysis in terms of completeness and consistency, we suggest a new hybrid method that combines these two modes of reasoning: induction and deduction. Indeed, the safety analysis of a complex system requires from experts in the field implementation of an iterative analysis process involving both inductive and deductive approaches. The ambition of this new method is to deconsolidate and renovate conventional approaches. In addition, this method is based on the use of a standardized vocabulary and a rigorous analytical approach likely to be accepted by all actors who participate in the development of safety documentation. Indeed, in accordance with national and European regulations and in particular the Railway Safety Directive, this paper proposes a generic approach for development assistance, assessment and prevention of risks which takes account of uses, theory and our experience in this domain.
“CLASCA”: Learning System for Classification and Capitalization of Accident S...IJERA Editor
In the process of analysis and assessment of the safety of a rail transportation system, one of the difficulties is to
ensure the completeness of the accident scenarios taken into account by all the actors involved in the
development of the system. The present work is to formalize, classify and archive the historical scenarios
experienced on transportation systems in French already certified and/or approved such that the VAL,
MAGGALY, TVM 430 of the TGV Nord. The goal is to develop a database of historical scenarios from the
know-how of the manufacturers, masters of book and experts and researchers from the French Institute
IFSTTAR to help examine the completeness of safety analyzes. The development and the operation of this basis
of scenarios have need resort to the techniques of knowledge acquisition and automatic learning. The application
of methods for the acquisition of knowledge has resulted essentially on the constitution of a database of
historical knowledge which comprises 70 scenarios relative to the risk of "collision". The exploitation by
machine learning of this basis of scenarios in order to extract the relevant knowledge in a purpose explanatory or
made decision-making the object from the system "CLASCA" presented in this paper.
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Editor IJCATR
With the increasing use of computers in business information security has also become a key issue in organizations. Risk assessment in organizations is vital in order to identify threats and take appropriate measures. There are various risk assessment methodologies exist which organizations use for risk assessment depending the type and need of organizations. In this research OCTAVE methodology has been used following a comparative study of various methodologies due to its flexibility and simplicity. The methodology was implemented in a financial institution and results of its efficacy have been discussed.
US AI Safety Institute and Trustworthy AI Details.Bob Marcus
This is a discussion of the possible role of the US AI Safety Institute in regulating Generative AI. It includes External Red Team Testing and an Incident Tracking Database.
WR Based Opinion Mining on Traffic Sentiment Analysis on Social MediaIRJET Journal
This document presents a study on rule-based traffic sentiment analysis (TSA) using social media data. The study aims to develop a system to automatically retrieve tweets related to traffic and extract safety topics and sentiment polarity using unsupervised sentiment analysis. The system architecture crawls web data, performs preprocessing, extracts subjects/objects, extracts sentiment properties, and classifies sentiment. The goal is to help reduce traffic injuries and identify risk regions in real-time by monitoring public sentiment on social media. The study argues that while sentiment analysis research exists, more work is needed on transportation-related sentiment to improve transportation efficiency and safety.
The document discusses the Federal Aviation Administration's use of human factors analysis in air traffic management systems. It addresses how human factors research focuses on human performance, safety analysis, and system optimization. The FAA integrates human factors throughout the system development life cycle from research and requirements definition to post-implementation monitoring to improve safety and performance. Challenges include fully integrating human factors programs, but the FAA addresses this through standards, education, and communication across lines of business.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Role of AI Safety Institutes in Trustworthy AI.pdfBob Marcus
Describes possible role of AI Safety Institutes collaborating to enable trustworthy AI. The key areas are External Red Team Testing and Incident Tracking Databases
Mapping Security Information and Event Management (SIEM) Rules to Tactics and...AntonioProcentese1
This thesis project maps a subset of rules from a corporate SIEM system to tactics and techniques in the MITRE ATT&CK framework. This process identifies the tactics and techniques associated with each rule to provide more context to security incidents. The project also develops a query for the Splunk SIEM to evaluate the coverage of rules against techniques in the framework. Understanding coverage is important for improving detection capabilities and identifying security gaps. The mapping and query help analysts better understand alerts and enhance the SIEM's detection abilities in line with the MITRE ATT&CK framework.
future internetArticleERMOCTAVE A Risk Management Fra.docxgilbertkpeters11344
This document introduces a new risk management framework called ERMOCTAVE for assessing risks associated with adopting cloud computing. ERMOCTAVE combines two existing risk management methods - Enterprise Risk Management (ERM) and Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE). It structures the processes of OCTAVE into three phases and maps the components of ERM to each phase to provide a more comprehensive approach. The document then describes ERMOCTAVE in detail and provides a case study example of how it can be applied by a company migrating parts of its system to Microsoft Azure cloud.
future internetArticleERMOCTAVE A Risk Management FraDustiBuckner14
future internet
Article
ERMOCTAVE: A Risk Management Framework for IT
Systems Which Adopt Cloud Computing
Masky Mackita 1, Soo-Young Shin 2 and Tae-Young Choe 3,*
1 ING Bank, B-1040 Brussels, Belgium; [email protected]
2 Department of IT Convergence Engineering, Kumoh National Institute of Technology, Gumi 39177, Korea;
[email protected]
3 Department of Computer Engineering, Kumoh National Institute of Technology, Gumi 39177, Korea
* Correspondence: [email protected]; Tel.: +82-54-478-7526
Received: 22 June 2019; Accepted: 3 September 2019; Published: 10 September 2019
����������
�������
Abstract: Many companies are adapting cloud computing technology because moving to the cloud
has an array of benefits. During decision-making, having processed for adopting cloud computing,
the importance of risk management is progressively recognized. However, traditional risk management
methods cannot be applied directly to cloud computing when data are transmitted and processed by
external providers. When they are directly applied, risk management processes can fail by ignoring
the distributed nature of cloud computing and leaving numerous risks unidentified. In order to fix
this backdrop, this paper introduces a new risk management method, Enterprise Risk Management
for Operationally Critical Threat, Asset, and Vulnerability Evaluation (ERMOCTAVE), which combines
Enterprise Risk Management and Operationally Critical Threat, Asset, and Vulnerability Evaluation for
mitigating risks that can arise with cloud computing. ERMOCTAVE is composed of two risk management
methods by combining each component with another processes for comprehensive perception of risks.
In order to explain ERMOCTAVE in detail, a case study scenario is presented where an Internet seller
migrates some modules to Microsoft Azure cloud. The functionality comparison with ENISA and
Microsoft cloud risk assessment shows that ERMOCTAVE has additional features, such as key objectives
and strategies, critical assets, and risk measurement criteria.
Keywords: risk management; ERM; OCTAVE; cloud computing; Microsoft Azure
1. Introduction
Cloud computing is a technology that uses virtualized resources to deliver IT services through the
Internet. It can also be defined as a model that allows network access to a pool of computing resources
such as servers, applications, storage, and services, which can be quickly offered by service providers [1].
One of properties of the cloud is its distributed nature [2]. Data in the cloud environments had become
gradually distributed, moving from a centralized model to a distributed model. That distributed nature
causes cloud computing actors to face problems like loss of data control, difficulties to demonstrate
compliance, and additional legal risks as data migration from one legal jurisdiction to another. An example
is Salesforce.com, which suffered a huge outage, locking more than 900,000 subscribers out of important
resources needed for business trans ...
Future internet articleermoctave a risk management fraarnit1
This document introduces a new risk management framework called ERMOCTAVE for assessing risks associated with adopting cloud computing. ERMOCTAVE combines two existing risk management methods - Enterprise Risk Management (ERM) and Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) - to provide a more comprehensive approach. The framework distributes ERM components across the three phases of the OCTAVE method. A case study is presented to demonstrate how ERMOCTAVE can be applied to assess risks when migrating systems to the Microsoft Azure cloud.
This document discusses 6 different thesis abstracts on topics related to IT security:
1) The design and implementation of an environment to support security assessment method development. This includes a database solution to assist developers.
2) A risk analysis of an RFID system used for logistics that identifies vehicles. The analysis examines the RFID communication and database transmission security and risks.
3) Key topics for a database security course, including technologies, access control, vulnerabilities, privacy, and secure database models.
4) A case-based reasoning approach to understand constraints in information models written in EXPRESS, representing constraints at a higher level of abstraction.
5) The benefits of a consolidated network security solution over point
1. The document discusses knowledge management in mature industries where accidents still occur due to existing knowledge being ignored, forgotten, or misapplied, rather than a lack of knowledge.
2. It proposes using near-miss events to "wake up" dormant knowledge by walking through a company's internal safety management system or browsing external regulatory documents and technical literature.
3. Specifically, it presents software called NOCE that links near-misses to a company's digital safety documents and equipment models to surface relevant sleeping knowledge, and an ontology for tagging and searching unstructured external safety information sources.
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
This document discusses information security audits and their key features. It describes the different types of security audits and phases of an information security audit. It outlines the audit process, including defining the security perimeter, describing system components, determining threats, and using appropriate tools. It also discusses auditor roles and skills, as well as elements that characterize a good security audit like clearly defined objectives and an experienced independent audit team.
Application of Q methodology in critical success factors of information secur...stuimrozsm
This document outlines a study that uses Q-methodology to identify perspectives on critical success factors for information security risk management. The study collected Q-sort data from 50 participants across 18 organizations. Factor analysis identified 3 distinct perspectives on critical factors. The first focused on continuity, compliance, and survival. The second emphasized business requirements and cooperation. The third prioritized involvement of technical experts and business owners. Senior management support was seen as most critical, while pre-selecting a risk assessment method was seen as least critical.
This document discusses using dynamic adaptive systems in safety-critical domains. It begins by introducing safety-critical cyber-physical systems and how dynamic adaptivity could provide benefits like increased fault tolerance and deployability. However, adaptivity also introduces challenges for testing and certification. The document then discusses using the Architecture Analysis and Design Language (AADL) to model and analyze dynamic adaptive safety-critical systems. It considers issues like what constitutes sufficient pre-deployment testing of such systems and how failures from untested configurations can be mitigated. Overall, the document explores how to incorporate safety-critical concerns into the design of dynamic adaptive systems.
1) The document discusses a proposed Vulnerability Management System (VMS) to identify and manage software vulnerabilities.
2) It provides an overview of vulnerability management and discusses related work that has been done in vulnerability databases and tracking systems.
3) The proposed VMS would use morphological inspection and static analysis to assess vulnerabilities, store information in a database, and rank vulnerabilities based on severity. It would consist of a vulnerability scanner, process control platform, and data storage.
Modeling And Simulation Swash Plate Pump Response Characteristics in Load Sen...IJMERJOURNAL
ABSTRACT: Fluid Power is widely employed in applications required high loads such as tractors, cranes, and airplanes. In load sensing hydraulic systems, loads are controlled by adjusting a pump-valve arrangement. In this paper, the swash plate pump hydraulic characteristics will be determined, the pump and its fluid gains will be derived to obtain the pump overall transfer function. Firstly, the swash plate pump mechanism is analyzed and its dynamic model is constructed; the pump pressure and flow rate are plotted and the possible improvement is introduced. The load sensing unit parameters such as orifice width, orifice area, maximum passage area, and piston area at X and Y will be examined to identify their influence on the pump characteristics; and the optimum parameters will be introduced. All results are developed and simulated numerically.
Generation of Electricity Through A Non-Municipal Solid Waste Heat From An In...IJMERJOURNAL
ABSTRACT: Energy production, waste disposal, and pollution minimization are key problems that must be addressed for sustainable cities of the environment. Waste management has become a major concern worldwide, and incineration is now being used increasingly to treat waste that cannot be recycled economically. The total heat content of non- municipal waste varies from countries to countries. The tonnage of generation in Nigeria is expected to soar over the next few years and the exploitation of this renewable energy locked up in urban solid municipal waste into grid energy can be taken advantage off.The heat generated from this incinerated plant can be used to generate electricity which will reduce overdependence on fossil fuel and the use of generator which in turn reduces pollution disposal of this waste is incinerated plant for the production of electricity. Hence, this paper intends to review the nonmunicipal waste potential in Nigeria, evaluate its environment and economic cost, and energy content of municipal solid waste deposits in Nigeria.
More Related Content
Similar to A hybrid reasoning system for the prevention of rail accidents
Preliminary Hazard Analysis (PHA): New hybrid approach to railway risk analysisIRJESJOURNAL
Abstract: The Preliminary hazard analysis (PHA) is used to essentially identify potential accidents related to the system and its interfaces to assess their probability of occurrence and the severity of the damage they may cause and finally propose solutions that will reduce, control or eliminate. Although essential in the process of analysis and safety evaluation of high-risk industrial system, the method PHA is very differently developed and remained unclear. This method is generally classified in theory by an inductive approach. However, in practice, a deductive approach is essentially used as the Fault tree analysis. To enhance the quality of the safety analysis in terms of completeness and consistency, we suggest a new hybrid method that combines these two modes of reasoning: induction and deduction. Indeed, the safety analysis of a complex system requires from experts in the field implementation of an iterative analysis process involving both inductive and deductive approaches. The ambition of this new method is to deconsolidate and renovate conventional approaches. In addition, this method is based on the use of a standardized vocabulary and a rigorous analytical approach likely to be accepted by all actors who participate in the development of safety documentation. Indeed, in accordance with national and European regulations and in particular the Railway Safety Directive, this paper proposes a generic approach for development assistance, assessment and prevention of risks which takes account of uses, theory and our experience in this domain.
“CLASCA”: Learning System for Classification and Capitalization of Accident S...IJERA Editor
In the process of analysis and assessment of the safety of a rail transportation system, one of the difficulties is to
ensure the completeness of the accident scenarios taken into account by all the actors involved in the
development of the system. The present work is to formalize, classify and archive the historical scenarios
experienced on transportation systems in French already certified and/or approved such that the VAL,
MAGGALY, TVM 430 of the TGV Nord. The goal is to develop a database of historical scenarios from the
know-how of the manufacturers, masters of book and experts and researchers from the French Institute
IFSTTAR to help examine the completeness of safety analyzes. The development and the operation of this basis
of scenarios have need resort to the techniques of knowledge acquisition and automatic learning. The application
of methods for the acquisition of knowledge has resulted essentially on the constitution of a database of
historical knowledge which comprises 70 scenarios relative to the risk of "collision". The exploitation by
machine learning of this basis of scenarios in order to extract the relevant knowledge in a purpose explanatory or
made decision-making the object from the system "CLASCA" presented in this paper.
Efficacy of OCTAVE Risk Assessment Methodology in Information Systems Organiz...Editor IJCATR
With the increasing use of computers in business information security has also become a key issue in organizations. Risk assessment in organizations is vital in order to identify threats and take appropriate measures. There are various risk assessment methodologies exist which organizations use for risk assessment depending the type and need of organizations. In this research OCTAVE methodology has been used following a comparative study of various methodologies due to its flexibility and simplicity. The methodology was implemented in a financial institution and results of its efficacy have been discussed.
US AI Safety Institute and Trustworthy AI Details.Bob Marcus
This is a discussion of the possible role of the US AI Safety Institute in regulating Generative AI. It includes External Red Team Testing and an Incident Tracking Database.
WR Based Opinion Mining on Traffic Sentiment Analysis on Social MediaIRJET Journal
This document presents a study on rule-based traffic sentiment analysis (TSA) using social media data. The study aims to develop a system to automatically retrieve tweets related to traffic and extract safety topics and sentiment polarity using unsupervised sentiment analysis. The system architecture crawls web data, performs preprocessing, extracts subjects/objects, extracts sentiment properties, and classifies sentiment. The goal is to help reduce traffic injuries and identify risk regions in real-time by monitoring public sentiment on social media. The study argues that while sentiment analysis research exists, more work is needed on transportation-related sentiment to improve transportation efficiency and safety.
The document discusses the Federal Aviation Administration's use of human factors analysis in air traffic management systems. It addresses how human factors research focuses on human performance, safety analysis, and system optimization. The FAA integrates human factors throughout the system development life cycle from research and requirements definition to post-implementation monitoring to improve safety and performance. Challenges include fully integrating human factors programs, but the FAA addresses this through standards, education, and communication across lines of business.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Role of AI Safety Institutes in Trustworthy AI.pdfBob Marcus
Describes possible role of AI Safety Institutes collaborating to enable trustworthy AI. The key areas are External Red Team Testing and Incident Tracking Databases
Mapping Security Information and Event Management (SIEM) Rules to Tactics and...AntonioProcentese1
This thesis project maps a subset of rules from a corporate SIEM system to tactics and techniques in the MITRE ATT&CK framework. This process identifies the tactics and techniques associated with each rule to provide more context to security incidents. The project also develops a query for the Splunk SIEM to evaluate the coverage of rules against techniques in the framework. Understanding coverage is important for improving detection capabilities and identifying security gaps. The mapping and query help analysts better understand alerts and enhance the SIEM's detection abilities in line with the MITRE ATT&CK framework.
future internetArticleERMOCTAVE A Risk Management Fra.docxgilbertkpeters11344
This document introduces a new risk management framework called ERMOCTAVE for assessing risks associated with adopting cloud computing. ERMOCTAVE combines two existing risk management methods - Enterprise Risk Management (ERM) and Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE). It structures the processes of OCTAVE into three phases and maps the components of ERM to each phase to provide a more comprehensive approach. The document then describes ERMOCTAVE in detail and provides a case study example of how it can be applied by a company migrating parts of its system to Microsoft Azure cloud.
future internetArticleERMOCTAVE A Risk Management FraDustiBuckner14
future internet
Article
ERMOCTAVE: A Risk Management Framework for IT
Systems Which Adopt Cloud Computing
Masky Mackita 1, Soo-Young Shin 2 and Tae-Young Choe 3,*
1 ING Bank, B-1040 Brussels, Belgium; [email protected]
2 Department of IT Convergence Engineering, Kumoh National Institute of Technology, Gumi 39177, Korea;
[email protected]
3 Department of Computer Engineering, Kumoh National Institute of Technology, Gumi 39177, Korea
* Correspondence: [email protected]; Tel.: +82-54-478-7526
Received: 22 June 2019; Accepted: 3 September 2019; Published: 10 September 2019
����������
�������
Abstract: Many companies are adapting cloud computing technology because moving to the cloud
has an array of benefits. During decision-making, having processed for adopting cloud computing,
the importance of risk management is progressively recognized. However, traditional risk management
methods cannot be applied directly to cloud computing when data are transmitted and processed by
external providers. When they are directly applied, risk management processes can fail by ignoring
the distributed nature of cloud computing and leaving numerous risks unidentified. In order to fix
this backdrop, this paper introduces a new risk management method, Enterprise Risk Management
for Operationally Critical Threat, Asset, and Vulnerability Evaluation (ERMOCTAVE), which combines
Enterprise Risk Management and Operationally Critical Threat, Asset, and Vulnerability Evaluation for
mitigating risks that can arise with cloud computing. ERMOCTAVE is composed of two risk management
methods by combining each component with another processes for comprehensive perception of risks.
In order to explain ERMOCTAVE in detail, a case study scenario is presented where an Internet seller
migrates some modules to Microsoft Azure cloud. The functionality comparison with ENISA and
Microsoft cloud risk assessment shows that ERMOCTAVE has additional features, such as key objectives
and strategies, critical assets, and risk measurement criteria.
Keywords: risk management; ERM; OCTAVE; cloud computing; Microsoft Azure
1. Introduction
Cloud computing is a technology that uses virtualized resources to deliver IT services through the
Internet. It can also be defined as a model that allows network access to a pool of computing resources
such as servers, applications, storage, and services, which can be quickly offered by service providers [1].
One of properties of the cloud is its distributed nature [2]. Data in the cloud environments had become
gradually distributed, moving from a centralized model to a distributed model. That distributed nature
causes cloud computing actors to face problems like loss of data control, difficulties to demonstrate
compliance, and additional legal risks as data migration from one legal jurisdiction to another. An example
is Salesforce.com, which suffered a huge outage, locking more than 900,000 subscribers out of important
resources needed for business trans ...
Future internet articleermoctave a risk management fraarnit1
This document introduces a new risk management framework called ERMOCTAVE for assessing risks associated with adopting cloud computing. ERMOCTAVE combines two existing risk management methods - Enterprise Risk Management (ERM) and Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) - to provide a more comprehensive approach. The framework distributes ERM components across the three phases of the OCTAVE method. A case study is presented to demonstrate how ERMOCTAVE can be applied to assess risks when migrating systems to the Microsoft Azure cloud.
This document discusses 6 different thesis abstracts on topics related to IT security:
1) The design and implementation of an environment to support security assessment method development. This includes a database solution to assist developers.
2) A risk analysis of an RFID system used for logistics that identifies vehicles. The analysis examines the RFID communication and database transmission security and risks.
3) Key topics for a database security course, including technologies, access control, vulnerabilities, privacy, and secure database models.
4) A case-based reasoning approach to understand constraints in information models written in EXPRESS, representing constraints at a higher level of abstraction.
5) The benefits of a consolidated network security solution over point
1. The document discusses knowledge management in mature industries where accidents still occur due to existing knowledge being ignored, forgotten, or misapplied, rather than a lack of knowledge.
2. It proposes using near-miss events to "wake up" dormant knowledge by walking through a company's internal safety management system or browsing external regulatory documents and technical literature.
3. Specifically, it presents software called NOCE that links near-misses to a company's digital safety documents and equipment models to surface relevant sleeping knowledge, and an ontology for tagging and searching unstructured external safety information sources.
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
This document discusses information security audits and their key features. It describes the different types of security audits and phases of an information security audit. It outlines the audit process, including defining the security perimeter, describing system components, determining threats, and using appropriate tools. It also discusses auditor roles and skills, as well as elements that characterize a good security audit like clearly defined objectives and an experienced independent audit team.
Application of Q methodology in critical success factors of information secur...stuimrozsm
This document outlines a study that uses Q-methodology to identify perspectives on critical success factors for information security risk management. The study collected Q-sort data from 50 participants across 18 organizations. Factor analysis identified 3 distinct perspectives on critical factors. The first focused on continuity, compliance, and survival. The second emphasized business requirements and cooperation. The third prioritized involvement of technical experts and business owners. Senior management support was seen as most critical, while pre-selecting a risk assessment method was seen as least critical.
This document discusses using dynamic adaptive systems in safety-critical domains. It begins by introducing safety-critical cyber-physical systems and how dynamic adaptivity could provide benefits like increased fault tolerance and deployability. However, adaptivity also introduces challenges for testing and certification. The document then discusses using the Architecture Analysis and Design Language (AADL) to model and analyze dynamic adaptive safety-critical systems. It considers issues like what constitutes sufficient pre-deployment testing of such systems and how failures from untested configurations can be mitigated. Overall, the document explores how to incorporate safety-critical concerns into the design of dynamic adaptive systems.
1) The document discusses a proposed Vulnerability Management System (VMS) to identify and manage software vulnerabilities.
2) It provides an overview of vulnerability management and discusses related work that has been done in vulnerability databases and tracking systems.
3) The proposed VMS would use morphological inspection and static analysis to assess vulnerabilities, store information in a database, and rank vulnerabilities based on severity. It would consist of a vulnerability scanner, process control platform, and data storage.
Similar to A hybrid reasoning system for the prevention of rail accidents (20)
Modeling And Simulation Swash Plate Pump Response Characteristics in Load Sen...IJMERJOURNAL
ABSTRACT: Fluid Power is widely employed in applications required high loads such as tractors, cranes, and airplanes. In load sensing hydraulic systems, loads are controlled by adjusting a pump-valve arrangement. In this paper, the swash plate pump hydraulic characteristics will be determined, the pump and its fluid gains will be derived to obtain the pump overall transfer function. Firstly, the swash plate pump mechanism is analyzed and its dynamic model is constructed; the pump pressure and flow rate are plotted and the possible improvement is introduced. The load sensing unit parameters such as orifice width, orifice area, maximum passage area, and piston area at X and Y will be examined to identify their influence on the pump characteristics; and the optimum parameters will be introduced. All results are developed and simulated numerically.
Generation of Electricity Through A Non-Municipal Solid Waste Heat From An In...IJMERJOURNAL
ABSTRACT: Energy production, waste disposal, and pollution minimization are key problems that must be addressed for sustainable cities of the environment. Waste management has become a major concern worldwide, and incineration is now being used increasingly to treat waste that cannot be recycled economically. The total heat content of non- municipal waste varies from countries to countries. The tonnage of generation in Nigeria is expected to soar over the next few years and the exploitation of this renewable energy locked up in urban solid municipal waste into grid energy can be taken advantage off.The heat generated from this incinerated plant can be used to generate electricity which will reduce overdependence on fossil fuel and the use of generator which in turn reduces pollution disposal of this waste is incinerated plant for the production of electricity. Hence, this paper intends to review the nonmunicipal waste potential in Nigeria, evaluate its environment and economic cost, and energy content of municipal solid waste deposits in Nigeria.
A New Two-Dimensional Analytical Model of Small Geometry GaAs MESFETIJMERJOURNAL
ABSTRACT : In this paper, a simple and exact analytical model for Small Geometry GaAs MESFET is developed to determine the potential distribution along the channel of the device. The model is based on the exact solution of two-dimensional Poisson’s equation in the depletion region under the gate. Then the obtained model is used to study the channel potential and threshold voltage of the device. Using the analytical model, the effect of the device parameter and bias conditions on performance of the device is investigated. The obtained results are graphically exhibited and discussed. In order to verification of the analytical results, TCAD device simulator is used and good accordance is observed.
Design a WSN Control System for Filter Backwashing ProcessIJMERJOURNAL
ABSTRACT: Day by day, there is a higher rate of need for accurate automation system to be used in industries and environment monitoring and control. In water treatment plants during the filtration phase, there is a process called backwashing, which particles suspended in the filter basin are removed. in this process the water are forcedly pumped through the filter in upward direction at enough speed to expand the filter media. Therefore, various types of valves used, which are opened and closed in a time sequencing manner. The paper proposed an automation control system for the backwashing process to be initiated and completed automatically using PLC, level sensors and valves installed inside the filter basin. Practically, a control system has been applied which all valves are opened and closed according to wireless signals coming from PLCs on its suitable time. In summary, the control in the process demonstrated that the proposed system is efficient, effective, and able to be reliable. Besides, the results increase the productivity at a low-cost mode.
Application of Customer Relationship Management (Crm) Dimensions: A Critical ...IJMERJOURNAL
ABSTRACT”: Customer relationship management is crucial due to the competitive environment. For this reason, it has become a widely implemented strategy across the hotel industry in retaining customers and maintaining good relationships with them. It also promotes customer satisfaction and loyalty which lead to the achievement of competitive business performance. However, due to the ever-increasing competition and the continuous changing customers’ needs in the hotel industry, the ability to achieve customer satisfaction is becoming a major challenge. Using 40 respondents from 20 hotels, this paper, therefore, explores the managers’ perspective into how the application of CRM dimensions impact on the performance of hotels and also examines the relationships between them since studies evaluating their relationships are limited. It studies CRM from the hotels’ perceptive as Guest Services Managers and Marketing Managers were the respondents. This study employed an exploratory research design and quantitative technique. The survey was conducted in New Delhi and simple random sampling was the sampling technique used to select respondents. With the study’s objectives in mind, the developed research hypotheses constructed were tested using multiple regression analysis as the statistical tool. Through the results, it has been revealed that CRM dimensions are positively related to the performance of hotels. Finally, CRM dimensions are highly recommended as a competitive strategic tool to enhance competitiveness.
Comparisons of Shallow Foundations in Different Soil ConditionIJMERJOURNAL
ABSTRACT: Soil is considered by the engineer as a complex material produced by weathering of the solid rock. Footings are structural elements that transmit column or wall loads to the underlying soil below the structure. Footings are designed to transmit these loads to the soil without exceeding its safe bearing capacity. Each building demands the need to solve a problem of foundation on different types of soil. The main aim of this project is to design the appropriate foundation as per size and shape on cohesive, non-cohesive and rocky soil. In this paper different foundation are studied for a middle side and corner column of a building with different bearing capacities. Based on the study and judicial judgment the type of foundation is decided as per depth, quantity of steel and quantity of concrete and try to find which shape of the foundation is more stable, economical and ways to reduce the ease of construction of the building
Place of Power Sector in Public-Private Partnership: A Veritable Tool to Prom...IJMERJOURNAL
ABSTRACT: Public Private Partnership involves private sector engagement in infrastructural development. Though in the past, the country infrastructure had been experiencing a decline in the system, this is because, government had been the sole contributor to infrastructural finance and had often taken responsibility for implementation, operations and maintenance as well. This decline in the system is caused by escalating population growth depending on available infrastructure, decaying of existing power infrastructure, political instability and corruption in the system. The ongoing reform is about bringing the system to a lime light. Hence, Public Private Partnership participation in the infrastructural development in Nigeria, will create favorable environment for an investors, provide job opportunities, long time policy, decision making and efficient use of the available resources. This paper therefore dwells on overview of the public private partnership with regards to energy and other infrastructural development of Nigeria. Challenges of the partnership and possible solutions towards subduing the problems are proffered.
Study of Part Feeding System for Optimization in Fms & Force Analysis Using M...IJMERJOURNAL
ABSTRACT: This paper describes the development of a flexible and vibratory bowl feeding system which is suitable for use in a flexible manufacturing system. The vibratory bowl feeder for automatic assembly, presents a geometric model of the feeder, and develops force analysis, leading to dynamical modeling of the vibratory feeder. Based on the leaf-spring modeling of the three legs of the symmetrically arranged bowl of the feeder, and equating the vibratory feeder to a three-legged parallel mechanism, the paper reveals the geometric property of the feeder. The effects of the leaf-spring legs are transformed to forces and moments acting on the base and bowl of the feeder. Resultant forces are obtained based upon the coordinate transformation, and the moment analysis is produced based upon the orthogonality of the orientation matrix. This reveals the characteristics of the feeder, that the resultant force is along the z-axis and the resultant moment is about the z direction and further generates the closed-form motion equation.
Investigating The Performance of A Steam Power PlantIJMERJOURNAL
ABSTRACT: The performance analysis of Shobra El-Khima power plant in Cairo, Egypt is presented based on energy and exergy analysis to determine the causes , the sites with high exergy destruction , losses and the possibilities of improving the plant performance. The performance of the plant was evaluated at different loads (Full, 75% and, 50 %). The calculated thermal efficiency based on the heat added to the steam was found to be 41.9 %, 41.7 %, 43.9% , while the exergetic efficiency of the power cycle was found to be 44.8%, 45.5% and 48.8% at max, 75% and, 50 % load respectively. The condenser was found to have the largest energy losses where (54.3%, 55.1% and 56.3% at max, 75% and, 50 % load respectively) of the added energy to the steam is lost to the environment. The maximum exergy destruction was found to be in the turbine where the percentage of the exergy destruction was found to be (42%, 59% and 46.1% at max, 75% and, 50 % load respectively). The pump was found to have the minimum exergy destruction. It was also found that the exergy destruction in feed water heaters and in the condenser together represents the maximum exergy destruction in the plant (about 52%). This means that the irreversibilities in the heat transfer devices in the plant have a significant role on the exergy destruction. So, it is thought that the improvement in the power plant will be limited due to the heat transfer devices.
Study of Time Reduction in Manufacturing of Screws Used in Twin Screw PumpIJMERJOURNAL
ABSTRACT: This paper gives the characteristics of Time reduction in manufacturing of screws for Twin screw pumps. Screws are playing a vital role in the performance of pumps, because pumps give the fluids transfer rate with the help of screws. There is a gap in screws which shows its positiveness. This indicates that we are studying about positive displacements pumps. Positive displacements pumps having no point of contact between screws, because of that there will be no any friction formation. Automation is best for development of product to reduce time in manufacturing of any product. In this paper we also tried to explain this feature of Automation to help reduction of time to manufacture of product to increase productivity.
Mitigation of Voltage Imbalance in A Two Feeder Distribution System Using IupqcIJMERJOURNAL
ABSTRACT: Proliferation of electronic equipment in commercial and industrial processes has resulted in increasingly sensitive electrical loads to be fed from power distribution system which introduce contamination to voltage and current waveforms at the point of common coupling of industrial loads. The unified power quality conditioner (UPQC) is connected between two different feeders (lines), hence this method of connection of the UPQC is called as Interline UPQC (IUPQC).This paper proposes a new connection for a UPQC to improve the power quality of two feeders in a distribution system. Interline Unified Power Quality Conditioner (IUPQC), specifically aims at the integration of series VSC and Shunt VSC to provide high quality power supply by means of voltage sag/swell compensation, harmonic elimination in a power distribution network, so that improved power quality can be made available at the point of common coupling. The structure, control and capability of the IUPQC are discussed in this paper. The efficiency of the proposed configuration has been verified through simulation using MATLAB/ SIMULINK.
Adsorption of Methylene Blue From Aqueous Solution with Vermicompost Produced...IJMERJOURNAL
ABSTRACT: The removal of Methylene blue as a synthetic dye from aquatic system was investigated by using vermicompost. The dye concentration, contact time and pH of the solution carried out in the adsorption studies. Batch adsorption experimental data were suitable for the Langmuir isotherm and a very good fit to the second order kinetic model (pH=10). The maximum adsorption capacity calculated 256.66 mg g-1 . Vermicompost and the dye loaded vermicompost were characterized by SEM and FTIR. It was found that the vermicompost is stable without losing their activity.
Analytical Solutions of simultaneous Linear Differential Equations in Chemica...IJMERJOURNAL
ABSTRACT: Analytical method for solving homogeneous linear differential equations in chemical kinetics and pharmacokinetics using homotopy perturbation method has been proposed. The mathematical model that depicts the pharmacokinetics is solved. Herein, we report the closed form of an analytical expression for concentrations species for all values of kinetic parameters. These results are compared with numerical results and are found to be in satisfactory agreement. The obtained results are valid for the whole solution domain.
Experimental Investigation of the Effect of Injection of OxyHydrogen Gas on t...IJMERJOURNAL
ABSTRAC: Oxy-Hydrogen gas, H2O2, is a mixture of hydrogen and oxygen produced by water electrolysis. In this work, an experimental exploration was carried out in order to study the effect of the addition of oxy-hydrogen gas into inlet air manifold on speed performance characteristics of a diesel engine at different operating conditions. The experimental work was performed on a test rig comprising a four stroke 5.67 liters water-cooled diesel engine and a Heenan hydraulic dynamometer. Instrumentation included devices for measuring engine speed, load, fuel consumption and inlet air flow rate. The measurements were conducted at 1000, 1500, 2000 and 2500 rpm. At each speed, the engine load was adjusted to 20%, 40% and 80% from the engine full load which corresponds to engine brake mean effective pressures of 1.55, 3.11, and 6.22 bar, respectively, for Oxy-hydrogen generator supplied Currents of 26A and electrolyte concentration of 25 %. The fuel saving percentage and so the brake thermal efficiency for the H2O2 enriched CI engine is more evidently seen at low loads and high-speed conditions. the volumetric efficiency drop was about 5 % at small speeds and reaches to about 2% at higher engine speed.
Hybrid Methods of Some Evolutionary Computations AndKalman Filter on Option P...IJMERJOURNAL
ABSTRACT: The search for a better option price continues within the financial institution. In pricing a put option, holders of the underlying stock always want to make the best decision by maximizing profit. We present an optimal hybrid model among the following combinations: Kalman Filter-Genetic Programming(KF-GP), Kalman Filter-Evolutionary Strategy(KF-ES) and Evolutionary Strategy -Genetic Programming(ES- GP). Our results indicate that the hybrid method involving Kalman Filter-Evolutionary Strategy(KF-ES) is the best model for any investor. Sensitivity analysis was conducted on the model parameters to ascertain the rigidity of the model.
An Efficient Methodology To Develop A Secured E-Learning System Using Cloud C...IJMERJOURNAL
ABSTRACT: Now-a-days, each and every action involved in our life becomes computerized in order to reduce the time, complexity and manual power. The education systems are also being computerized, to train the students in a much efficient way. This system is termed as E-Learning. E-Learning is an Internet-based learning process, in which the Internet technology is used to design, implement, manage and extend learning, which will improve the efficiency of learning. Learning, Teaching and Training are intensely connected components, which are all included in the development of E-Learning system. Cloud Computing provides an efficient platform to support the E-Learning systems, as it can be dramatically changes over time .In this paper, an overview on the new emerging E-Learning system , utilization of the SAAS (Software as a Service) and the methodology to test the efficiency of the person in a secured way are described.
Nigerian Economy and the Impact of Alternative Energy.IJMERJOURNAL
ABSTRACT: Nigeria is endowed with natural resources which are aim at developing the country.The need for alternative energy resources to drive the nation economy cannot be over-emphasized. The incessant power failure has grossly affected the economy, seriously slowing down development in rural and sub-rural settlement. A robust solution must be found to end the crises. Alternative energy source has the potential of solving power problem in Nigeria as well as providing safer and cleaner environment than the fossil fuel. This paper also examines the socio–economic benefits of the alternative energy (solar, wind, biomass, hydro and geothermal) to the nation economy and the utilization of the resources to meet human needs and the generation yet unborn and to provide sustainable development, thereby improve the standard of living and mitigating climate change.
ABSTRACT: Many writers describe empowerment as a process as opposed to a condition or state of being which is being a key feature of empowerment emphasized by many researchers. As a process empowerment becomes difficult to be measured by standard tools available to social scientists. As case study helps in bringing us to understand a complex issue or object and can extend experience or add strength to what is already known through previous research. Case studies also emphasized on detailed contextual analysis of a limited number of events or conditions and their relationships. Researcher had made use of this qualitative research method to examine contemporary real-life situations.
Validation of Maintenance Policy of Steel Plant Machine Shop By Analytic Hier...IJMERJOURNAL
ABSTRACT: In this paper the maintenance activities of the Machine shop of Steel plant have been considered. As maintenance is a routine activity to keep a machine at its normal operating condition so that it can deliver its expected performance without causing any loose of time on account of accidental damage or breakdown and maintenance is a recurring activity. So for reduction of maintenance cost and safety of the operator as well as the residents of nearby area it is better to decide which machines should go for which type of maintenance. For this decision AHP is used and the Expert choice software is used for that calculations and this paper is for the validation of results.
li-fi: the future of wireless communicationIJMERJOURNAL
ABSTRACT: Nowadays people and their electronic devices access wireless internet. But, clogged airwaves are going to make it increasingly difficult to latch onto a reliable signal. So, Radio waves are just one part of the spectrum that can carry our data. We can use “Data through Illumination”. In this process, the data is sent through an LED source that varies in intensity faster than the human eye could follow. The future can be envisioned where the data for laptops, smart phones and all other smart applications is transmitted through the light in our living room. And security would be a snap—if you can’t see the light, you can’t access the data.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
A hybrid reasoning system for the prevention of rail accidents
1. International
OPEN ACCESS Journal
Of Modern Engineering Research (IJMER)
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 7 | Iss. 1 | January 2017 | 14 |
A hybrid reasoning system for the prevention of rail accidents
Dr. Habib Hadj Mabrouk
French institute of science and technology for transport, development and networks, France
I. INTRODUCTION
One of the research activities which is currently in progress at the French institute lFSTTAR relates to
the certification of automated public transport systems and the safety of digital control systems. Our study took
place within this context and aimed to design and create a software tool to aid safety analysis for automated
people movers in order to appraise the suitability of proposed protection equipment. The purpose of this tool is
to evaluate the completeness and consistency of the accident scenarios which have been put forward by the
manufacturers and to play a role in generating new scenarios which could be of assistance to experts who have to
reach a conclusion regarding the safety a new rail transport system. Experts may find it very difficult to describe
in clear terms the stages of reasoning which they go through in order to make decisions. Such a description
requires experts to undertake a long process of thought which will enable them to explain the unconscious aspect
of their activities. The success of a knowledge based system (KBS) project depends on this difficult and
sometimes painful task. In view of the complexity of the knowledge of experts and the difficulty which they have
in explaining their mental processes there is a danger that the extracted knowledge will be either incorrect,
incomplete or even inconsistent. A variety of research in Artificial Intelligence (AI) in an attempt to understand
this problem of the transfer of expertise. Research is currently taking place in two major independent areas:
• Knowledge acquisition [1], which aims to define methods for achieving a better grasp of the transfer of
expertise. These methods chiefly involve software engineering and cognitive psychology;
• Machine learning [2], which involves the use of inductive, deductive, abductive or analogical techniques in
order to provide the KBS with learning capacities
In order to develop a KBS which aids in safety analysis we combined these two approaches and used them in a
complementary way [3].
II. ASSESSMENT OF RAILWAY TRANSPORT SAFETY
As part of its missions of expertise and technical assistance, IFSTTAR evaluates the files of safety of
guided transportation systems. These files include several hierarchical analysis of safety such as the preliminary
analysis of risks (PAR), the functional safety analysis (FSA), the analysis of failure modes, their effects and of
their criticality (AFMEC) or analysis of the impact of the software errors. These analyses are carried out by the
manufacturers. It is advisable to examine these analyses with the greatest care, so much the quality of those
conditions, in fine, the safety of the users of the transport systems. Independently of the manufacturer, the
experts of IFSTTAR carry out complementary analyses of safety. They are brought to imagine new scenarios of
potential accidents to perfect the exhaustiveness of the safety studies. In this process, one of the difficulties then
ABSTRACT: This article describes a contribution to improving the usual safety analysis methods used
in the certification of railway transport systems. The methodology is based on the complementary and
simultaneous use of knowledge acquisition and machine learning. To demonstrate the feasibility and
soundness of the proposed approach to assist in the analysis and evaluation of railway safety, we have
developed a software tool. This tool is composed of two main modules: A module for the classification
and capitalization of historical accident scenarios and a module for evaluating the completeness and
consistency of the new scenarios proposed by the manufacturer of the transport system. The first
classification module is an inductive, incremental and interactive learning system. The second
evaluation module, which is based on the use of a rule-learning system, aims to provide experts with
suggestions of potential failures which have not been considered by the manufacturer and which are
capable of jeopardizing the safety of a new rail transport system. In contrast to traditional failure
Diagnosis Systems, the developed software tool can be seen as an aid which reveals potential risk during
the design stage of rail system.
Keywords: Machine learning, knowledge acquisition, expert systems, railway safety, risk assessment
Keywords): About five key words in alphabetical order, separated by comma
2. A hybrid reasoning system for the prevention of rail accidents
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 7 | Iss. 1 | January 2017 | 15 |
consists in finding the abnormal scenarios being able to lead to a particular potential accident. It is the
fundamental point which justified this work.
The commissioning authorization for the transport system is granted by the relevant State departments
on the basis of the certification dossier. Certification is the official recognition that a function, a piece of
equipment or a system complies with a set of national or international regulations. State departments generally
make use of external audits or expert bodies such as IFSTTAR in order to draw up certification notices.
IFSTTAR has as its main objectives the examination and evaluation of the development, validation and approval
methods of the system. This process consists of devising new scenarios for potential accidents to ensure that
safety studies are exhaustive. One of the difficulties involved in this process is finding abnormal scenarios which
are capable of generating a specific hazard. This is the fundamental issue which inspired this study. There is a
hierarchy of several ranked safety processes which are accepted by INRETS and conducted by the manufacturer
in order to identify hazardous situations, potential accidents, hazardous units or equipment and the severity of
the consequences which would result. These processes are as follows [4]:
– Preliminary hazard analysis (PHA),
– Functional safety analysis (FSA),
– Hardware safety analysis (HSA)
– Software safety analysis (SSA)
Modes of reasoning used in security analysis (inductive, deductive, by analogy ...) and the nature of
security knowledge (incomplete, evolving, empirical, qualitative ...) confirm that a conventional computer
solution is inadequate and that the use of techniques of artificial intelligence (AI) seems most appropriate.
Indeed, despite the undeniable interest of the usual methods of analysis and safety assessment, completeness of
the analysis is essentially based on the expertise, intelligence and intuition of the human expert. A careful study
of the mechanisms of the expert reasoning, strategies and heuristic problem solving, shows that it mainly involve
symbolic data, scalable, qualitative and makes simultaneous use of inductive, deductive, by analogy type
inference ...
This is what led us to use Artificial Intelligence techniques for therefore enhance conventional methods
for safety analysis. For our work, we used mainly three aspects of the field of AI: knowledge acquisition (KA),
machine learning (ML) and knowledge based systems (KBS). The development of the knowledge base of a KBS
requires the use of techniques and methods of KA to collect organize and formalize knowledge. The KA did not,
efficiently extract some expert knowledge of security analysis by itself. Also, the combined use of KA and ML
showing up as a very promising solution. The approach used to develop all the tools to analyze security involves
two major activities:
• Retrieve, formalize and archive insecurities in order to build a library of test cases covering the whole
problem. This activity has required the use of knowledge acquisition,
• Exploit archived historical knowledge in order to identify expertise in security analysis may help experts judge
the completeness of the analysis of security given by the manufacturer. The approaches used to identify this
second activity are based on the use of machine learning methods.
Our approach is to operate by learning all the basics of historical knowledge on accident scenario in order to
produce knowledge that could help certification experts in their task of assessing the degree of safety of a new
transport system.
III. KNOWLEDGE ACQUISITION OF SAFETY
The Knowledge acquisition was recognized as a bottle neck from the first appearance of expert systems,
or more generally knowledge based systems. It is still considered to be a crucial task in their creation. Extraction
or elicitation refers to the collection of knowledge from experts in the field whereas the concepts of transfer or
transmission of expertise refer to the collection and subsequent formalization of the knowledge of a human
expert. The term knowledge acquisition refers to all the activities which are required in order to create the
knowledge base in an expert system. Knowledge acquisition (KA) is one of the central concerns of research into
KBSs and one of the keys not only to the successful development of a system of this type but also to its
integration and utilization within an operational environment. Two main participants are involved in KA: the
expert, who possesses know-how of a type which is difficult to express, and the cognitive scientist who has to
extract and formalize the knowledge which is related to this know-how, which as far as the expert is concerned is
usually implicit rather than explicit. This time-consuming and difficult process is nevertheless fundamental to the
creation of an effective knowledge base. Currently available KA techniques mainly originate in cognitive
psychology (human reasoning models, knowledge collection techniques), ergonomics (analysis of the activities
of experts and the future user), linguistics (to exploit documents more effectively or to guide the interpretation of
verbal data) and software engineering (description of the life cycle of a KBS). In summary, KA may be defined
3. A hybrid reasoning system for the prevention of rail accidents
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 7 | Iss. 1 | January 2017 | 16 |
as being those activities which are necessary in order to collect, structure and formalize knowledge in the context
of the design of a KBS. The work which has been conducted by Aussenac [1], Dieng [5] and Benkirane [6]
provide a fairly full description of variety of existing methods and tools. In our feasibility study of a KBS for aid
in safety analysis we adopted the conceptual approach suggested by Benkirane [6]. This is a particularly
complete and structured model in that it considers four dimensions: the phases of the development of the KBS,
the stages of knowledge extraction, the environment of the problem and human factors. By applying this model
to safety the domain of expertise was accurately defined and its fundamental concepts listed. From this also
emerged a generic model for representing accident scenarios. The scenarios which have been collected together
so far in the historical knowledge base relate to the collision problem and have been constructed on the basis of
the safety dossiers for the French rail systems: VAL, POMA 2000, MAGGALY and Northern TGV systems and
the know-how of experts IFSTTAR. However, in spite of the large number of knowledge extraction sessions
(approximately thirty) and the utilization of several knowledge collection techniques (interviews, questionnaires,
protocol analysis, conceptual classification, etc.) the knowledge acquisition model did not permit the detailed
identification of the mechanisms involved in the reasoning of experts, or the strategies and heuristic approach
which they use in problem solving. This difficulty is essentially due to the novelty and complexity of the field
and the intuitive, evolving and creative nature of the reasoning mode employed by experts. We shall present
below the results of knowledge acquisition as they relate to analyzing and characterizing an accident scenario
(figure 1).
An accident scenario describes a combination of circumstances which can lead to an undesirable,
perhaps even hazardous, situation. It is characterized by a context and a set of events and parameters.
Knowledge acquisition led to the development of a model which is essentially based on the identification of the
eight parameters which describe an accident scenario (figure 1). Examination of the concept of scenario revealed
two fundamental aspects. The first is static and characterizes the context. The second is dynamic and shows the
possibilities of change within this context, while stressing the process which leads to an unsafe situation. In the
case of dynamic description we have adopted the formalism of Petri Nets. The form adopted for the static
description is that of a list (figure 1) in which several essential descriptive parameters are described in
attribute/value terms. Very schematically, guideway transit systems are considered as being an assembly of basic
bricks and a new system possesses certain bricks which are shared by systems which are already known. In the
context of this study the basic bricks which have currently been identified have been grouped together in the
descriptive sheet, and the ACASYA tool finds and then exploits shared bricks in order to deduce the class to
which a new scenario belongs (module CLASCA) or evaluate its completeness (module EVALSCA).
A survey of state of the art research in the domain of knowledge acquisition made it possible to select a
method for developing a KBS for aid in the analysis of safety for automated terrestrial transport systems. This
method showed itself to be useful for extracting and formalizing historical safety analysis knowledge (essentially
accident scenarios) and revealed its limits in the context of the expert safety analysis, which is particularly based
on intuition and imagination. In general, current knowledge acquisition techniques have been designed for
clearly structured problems.
They do not tackle the specific problems associated with multiple areas of expertise and the coexistence
of several types of knowledge and it is not possible to introduce the subjective and intuitive knowledge which is
related to a rapidly evolving and unbounded field such as safety. Although cognitive psychology and software
engineering have produced knowledge acquisition methods and tools, their utilization is still very restricted in a
complex industrial context. In our opinion, machine learning can make a contribution by supplementing and
reinforcing conventional knowledge acquisition resources. The following section demonstrates the benefits of
machine learning in the development of a knowledge base.
4. A hybrid reasoning system for the prevention of rail accidents
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 7 | Iss. 1 | January 2017 | 17 |
Fig (1): List of the parameters which relate to an example of a accident scenario.
5. A hybrid reasoning system for the prevention of rail accidents
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 7 | Iss. 1 | January 2017 | 18 |
IV. MACHINE LEARNING FOR AID TO ACCIDENT RISK ASSESSMENT IN RAILWAYS
Learning is a very general term which describes the process by which human beings or machines
increase their knowledge. Learning therefore involves reasoning: discovering analogies and similarities,
generalizing or particularizing an experience, making use of previous failures and errors in subsequent
reasoning. The new knowledge is used to solve new problems, to carry out a new task or improve performance
of an existing task, to explain a situation or predict behavior. The design of knowledge acquisition aid tools
which include learning mechanisms is essential for the production and industrial development of KBSs. This
discipline is regarded as being a promising solution for knowledge acquisition aid and attempts to answer certain
questions: how can a mass of knowledge be expressed clearly, managed, added to and modified? In the view of
Ganascia [7] machine learning is defined by a dual objective: a scientific objective (understanding and
mechanically producing phenomena of temporal change and the adaptation of reasoning) and a practical
objective (the automatic acquisition of knowledge bases from examples). Learning may be defined as the
improvement of performance through experience.
Learning is intimately connected to generalization: learning consists of making the transition from a succession
of experienced situations to knowledge which can be re-utilized in similar situations. Three types of problems
are raised for each of the main learning techniques [2]. The first of these is grouping (which is termed
classification in data analysis): given a certain mass of knowledge, how is it possible to discover links between
the different items in order to group them into meaningful and simpler sub-groups? The second problem
(discrimination) is that of learning classification procedures: with a given set of examples of concepts, how is it
possible to find a method which provides effective recognition of each concept? The third problem is that of
generalization: how is it possible, on the basis of concrete examples of a situation, to find a formula which is
sufficiently general to describe the situation in question and how is it possible to explain the descriptive ability of
this formula?
After examining a variety of methods, techniques and systems for machine learning we decided to select the
CHARADE system [7] in order to produce failure recognition rules. It also led us to appreciate the need to
design a new system, known as CLASCA for classifying accident scenarios. This choice was based on the
identification of requirements, the characteristics of the acquired knowledge and on the specification of the
performance which was expected from the learning process. The CLASCA and CHARADE systems supplement
each other in order to develop the ACASYA safety analysis tool.
V. “ACASYA”: FUNCTIONAL SAFETY ANALYSIS AID SYSTEM
The ACASYA system [3] is based on the combined utilization of knowledge acquisition techniques and
machine learning. The tool has two main characteristics: it possesses the incremental aspect which is essential in
order to achieve a gradual improvement in the knowledge the system gathers and man/machine co-operation
which allows experts to correct and supplement the knowledge. Unlike the majority of decision making aid
systems which are intended for a non-expert user this tool is designed to co-operate with experts in order to
assist them in their decision making. The organization of ACASYA is such that it reproduces as mauch as
possible the strategy which is adopted by experts. Summarized briefly, safety analysis involves an initial
recognition phase during which the scenario in question is assimilated to a family of scenarios which is known to
the expert. This phase requires classes of scenarios to be defined. In a second phase the expert evaluates the
scenario in an attempt to evolve unsafe situations which have not been considered by the manufacturer. These
situations provide a stimulus to the expert in formulating new accident scenarios. As is shown in figure 2 this
organization consists of four main modules. The formalization module deals with the acquisition and
representation of a scenario and is part of the knowledge acquisition phase. The three other modules, CLASCA,
EVALSCA and GENESCA, in accordance with the general principle which has been laid down above, deal with
the problems associated scenario classification, evaluation and generation.
In more formal terms, the methodology of safety analysis aid is based on two models: a generic accident
scenario representation model, which is based on a static and a dynamic description of a scenario and a model of
the implicit reasoning of the expert which involves three major activities, namely the classification, evaluation
and generation of scenarios. The main purpose of the study is to combine these two models and make use of
learning techniques in order to make the expert model as explicit as possible so that the expert process can be
reproduced. The first level relates to finding the class to which a new scenario which has been suggested by the
manufacturer belongs. The purpose behind this is to provide the expert with historical scenarios which are
partially or completely similar to the new scenario.
This mode of reasoning is analogous to that which experts use when they attempt to find similarities
between the situations which have been described by the manufacturer's scenarios and certain experienced or
6. A hybrid reasoning system for the prevention of rail accidents
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 7 | Iss. 1 | January 2017 | 19 |
envisaged situations involving equipment which has already been certified and approved. Classification of a new
scenario involves the two following stages:
• A characterization (or generalization) stage for constructing a description for each class of scenarios. This
stage operates by detecting similarities within a set of historical scenarios in the HSKB which have been pre-
classified by the expert in the domain;
• A deduction (or classification) stage to find the class to which a new scenario belongs by evaluating a
similarity criterion. The descriptors of the new scenario (static description) are compared with the descriptions of
the classes which were generated previously.
This initial level of processing not only provides assistance to the expert by suggesting scenarios which are
similar to the scenario which is to be dealt with but also reduces the space required for evaluating and generating
new scenarios by focusing on a single class of scenarios Ck.
Fig (2): Functional organization of the ACASYA system.
“CLASCA”: The first level of processing considers the class which CLASCA has deduced that the scenario
belongs in order to evaluate the consistency of the manufacturer's scenario. The evaluation approach is centered
around the summarized failures (SFs) which are involved in the manufacturer's scenario. The evaluation of a
scenario of this type involves the two modules below:
• A mechanism for learning rules CHARADE [7] which makes it possible to deduce SF recognition functions
and thus generate a base of evaluation rules;
• An inference engine which exploits the above base of rules in order to deduce which SFs are to be considered
in the manufacturer's scenario.
CHARADE is a learning system whose purpose is to construct knowledge based systems on the basis of
examples. It makes it possible to generate a system of rules with specific properties. Rule generation within
CHARADE is based on looking for and discovering empirical regularities which are present in the entire
learning sample. Regularity is a correlation which is observed between descriptors in the base of learning
examples.
If all the examples in the learning base which possess the descriptor d1 also possess the descriptor d2 it can be
inferred that d1 d2 in the entire learning set. In order to illustrate this rule generation principle let us assume
that there is a learning set which consists of three examples E1, E2, and E3.
E1 = d1 & d2 & d3 & d4
E2 = d1 & d2 & d4 & d5
E3 = d1 & d2 & d3 & d4 & d6
CHARADE can in this case detect an empirical regularity between the combination of descriptors (d1 & d2) and
the descriptor d4. All those examples which are described by d1 & d2 are also described by d4.
The rule d1 & d2 d4 is obtained.
“EVALSCA”: The purpose of the EVALSCA module is to compare the list of SFs which are
suggested in a manufacturer scenario to the list of stored historical SF in order to stimulate the formulation of
hazardous situations which have not been anticipated by the manufacturer. This evaluation task draws the
7. A hybrid reasoning system for the prevention of rail accidents
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 7 | Iss. 1 | January 2017 | 20 |
attention of the expert to any failures which have not been considered by the manufacturer and which might
jeopardize the safety of the transport system. It may thus promote the generation of new accident scenarios.
“GENESCA”: The two levels of processing which have been described above make use of the static
description of the scenario (descriptive parameters). They are supplemented by a third level which makes use of
the static description and the dynamic description of the scenario (the Petri model) and three reasoning
mechanisms, namely, induction, deduction and abduction. Generation of a new scenario is based on injecting an
SF which the previous level has defined as being plausible into a specific sequencing of the change in marking of
the Petri net.
In view of the scale of the problem the design and construction of the demonstration model of the ACASYA
system concentrated on the first two levels of processing (classification and evaluation of scenarios). The
feasibility study of the ACASYA system which is applied in the context of safety involved the construction of a
model. In order to evaluate this model we tested its performance on approximately sixty accident scenarios
relating to a collision hazard which have been collected so far. The utilization of ACASYA requires six stages to
be carried out,
the first four of which are performed by CLASCA and the last two by EVALSCA:
• Knowledge acquisition,
• Learning descriptions of scenario classes,
• Classification of a new scenario,
• Construction of the base of learning examples centered around the SFs which are involved in the description
of the class to which the new scenario belongs,
• Learning the SF recognition functions,
• Deduction of which SFs are to be considered in the scenario which is to be evaluated.
The first stage involves the collection of safety analysis knowledge with respect to transport systems. The HSKB
which consists at present of about sixty historical scenarios which relate to a collision hazard. These scenarios
have been formalized on the basis of a static description then placed in classes by the expert. The second
induction stage of descriptions of classes of scenarios. This stage involves generalizing the classes which have
been pre-defined by the experts in order to generate a comprehension description for each class which both
characterizes the division which has been conducted by the expert and makes it possible to identify to which
class the new example belongs. Each description which is learnt is characterized by a combination of three
elements: (<Attribute> <Value> <Frequency>). The frequency of appearance is computed for each descriptor
(attribute/value) in order to limit the loss of information. The description of a class is further enriched by taking
into account the associated summarized failures which are involved.
These SFs will subsequently be exploited in order to develop the base of learning examples. In this
stage a new example of a scenario is assigned to an existing class Ck. For this it is necessary to define a
classification criterion which measures the degree of resemblance between the new example and each of the pre-
existing classes. This similarity criterion is based on statistical calculations and takes account of the semantics of
the domain of application. The base of learning examples for a class is obtained by grouping together scenarios
from the HSKB whose description involves SFs from this class. This base is created from classification results
output by CLASCA and exploited by a rule learning system which constructs a knowledge base for evaluating
accident scenarios. The format of this base is compatible with that required by the CHARADE learning
mechanism. The base is refreshed each time the classes suggested by CLASCA are updated. This phase of
learning attempts, using the base of examples which was formed previously, to generate a system of rules. The
purpose of this stage is to generate a recognition function for each SF associated with a given class.
The SF recognition function is a production rule which establishes a link between a set of facts
(parameters which describe a scenario or descriptors) and the SF fact. What is involved here is logical
dependence, which can be expressed in the following form: A base of evaluation rules can be generated for each
class of scenarios. The conclusion of each rule which is generated should contain the SF descriptor or fact. It has
proved to be inevitable to use a learning method which allows production rules to be generated from a set of
historical examples (or scenarios). The specification of the properties required by the learning system and a
review of the literature have led us to choose the CHARADE mechanism. CHARADE's ability to generate
automatically a system of rules, rather than isolated rules, and its ability to produce rules in order to develop SF
recognition functions make it of undeniable interest.
During the previous stage the CHARADE module created a system of rules on the basis of the learning
examples. The SF deduction stage requires a preliminary phase during which the rules which have been
generated are transferred to an expert system in order to construct a scenario evaluation knowledge base. This
evaluation knowledge base contains the following:
8. A hybrid reasoning system for the prevention of rail accidents
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 7 | Iss. 1 | January 2017 | 21 |
– The base of rules, which is split into two parts: a current base of rules which contains the rules which
CHARADE has generated in relation to a class which CLASCA has suggested at the instant t and a store base of
rules, which consists of the list of historical bases of rules. Once a scenario has been evaluated, a current base of
rules becomes a store base of rules,
– The base of facts, which contains the parameters which describe the manufacturer's scenarios which
are to be evaluated.
The scenario evaluation knowledge base which has been described above (base of facts and base of
rules) is exploited by forward chaining by an inference engine and generates the summarized failures which must
enter into the description of the manufacturer's scenario which is to be evaluated. In the example we are
considering the expert system deduced the failure SF19 (figure 3).
The result of the deduction is given below. The plausible SFs which the expert system has deduced are
analyzed and compared to the SFs which have actually been considered by the manufacturer. One or more SFs
which jeopardize the safety of the transit system and which have not been considered by the manufacturer during
the design of protection equipment may emerge from this comparison. The above suggestion may assist in
generating unsafe situations which have not been foreseen by the manufacturer (figure 3).
Fig (3): Example deducting summarized faults (SFs) by the expert system
VI. CONCLUSION
Examination of the Rail Transportation Safety has shown that the process of transferring expert
knowledge to a machine is complex and rarely studied and that the bottle-neck in the development of knowledge
based systems (KBS) is not restricted solely to the extraction phase but also involves the characteristics and
formalization of knowledge and collaboration between experts and cognitive scientists. There is generally
speaking no scientific explanation which justifies this compiled expertise. The experts themselves are not always
conscious of this knowledge, which can be difficult to understand for someone who is new to the field or even
sometimes hard to express by means of language. Transcribing verbal (natural) language into a formal language
which can be interpreted by a machine often distorts the knowledge of the expert. These constraints act together
to limit progress in the area of knowledge acquisition. One possible way of reducing these constraints is
combined utilization of knowledge acquisition and machine learning techniques.
Experts generally consider that it is simpler to describe examples or experimental situations than it is
to explain decision making processes. Introducing machine learning systems which operate on the basis of
examples can generate new knowledge which can assist experts in solving a specific problem. Expertise in a
domain is not only possessed by experts but is also implicitly contained in a mass of historical data which it is
very difficult for the human mind to summarize. One of the objectives of machine learning is to extract relevant
knowledge from this mass of information for explanatory or decision making purposes. However, learning from
examples is insufficient as a means of acquiring the totality of expert knowledge and knowledge acquisition is
necessary in order to identify the problem which is to be solved and to extract and formalize the knowledge
which is accessible by customary means of acquisition. In this way each of the two approaches is able to make
up for the shortcomings of the other. In order to improve the process of expertise transfer, it is therefore
beneficial to combine both processes in an iterative knowledge acquisition process. Our approach has been to
exploit the historical scenario knowledge base by means of learning with a view to producing knowledge which
could provide assistance to experts in their task of evaluating the level of safety of a new system of transport [8].
9. A hybrid reasoning system for the prevention of rail accidents
| IJMER | ISSN: 2249–6645 | www.ijmer.com | Vol. 7 | Iss. 1 | January 2017 | 22 |
REFERENCES
[1]. N. Aussenac, Conception d'une méthodologie et d'un outil d'acquisition de connaissances expertes,
Thèse de doctorat, Université de Toulouse, France, octobre 1989.
[2]. Y. Kodratoff, Leçons d'apprentissage symbolique automatique, Cepadues éd., Toulouse, France, 1986.
[3]. H. Hadj Mabrouk and B. Harguem, Méthode originale d’Analyse Préliminaire des Risques, Ouvrage
collectif "Gestion des risques naturels, technologiques et sanitaires", Cépaduès Editions, Référence :
115902, I.S.B.N. : 9782364931596, 2014
[4]. H. Hadj Mabrouk and H. Mejri, ACASYA: a knowledge-based system for aid in the storage,
classification, assessment and generation of accident scenarios. Application to the safety of rail
transport systems, ACSIJ Advances in Computer Science: an International Journal, Vol. 4, Issue 4,
No.16 , July 2015 ISSN : 2322-5157
[5]. R. Dieng, Méthodes et outils d'acquisition des connaissances, ERGO IA90, Biarritz, France, 19 à 21
septembre 1990.
[6]. M. Benkirane, Contribution à la méthodologie d'extraction de connaissances dans le domaine du
diagnostic technique, Thèse de doctorat, Université de Valenciennes, France, mars 1991.
[7]. J-G. Ganascia, Agape et Charade : deux mécanismes d'apprentissage symbolique appliqués à la
construction de bases de connaissances, Thèse d'État, Université Paris-sud, France, mai 1987.
[8]. H. Hadj Mabrouk, H. Mejri, B. Harguem and S. Mrad, The integration of the human factors in the
sociotechnical systems. Application to the railway transportation systems. First International
Conference on Transportation and Logistics. Tunisia , 2015