scispace - formally typeset
Search or ask a question

Showing papers on "Guard (information security) published in 2018"


Journal ArticleDOI
01 Nov 2018
TL;DR: It is found that micro-entrepreneurs in Detroit are often pushed into entrepreneurship in response to unexpected life disruptions, barriers to employment, and desire to benefit the community.
Abstract: Entrepreneurship has long been used to create self-employment opportunities to guard against career uncertainty. Yet, little is known about how social technologies impact the day-to-day work of entrepreneurs in resource-constrained contexts. We performed a qualitative study involving interviews with 26 micro-entrepreneurs in Detroit and observations of entrepreneurship events. We found that micro-entrepreneurs in Detroit are often pushed into entrepreneurship in response to unexpected life disruptions, barriers to employment, and desire to benefit the community. Their resource-constrained contexts shape how they use social technologies, such as sharing economy tools and social media groups, particularly with respect to privacy, safety, and professional agency. We expand the discussion in CSCW around what it means to be an entrepreneur and provide implications for how social technologies can be designed to better meet the employment needs of people in resource-constrained communities.

33 citations


Journal ArticleDOI
TL;DR: In this paper, the secrecy performance of a wireless network (primary network) overlaid with an ambient RF energy harvesting Internet of Things (IoT) network (secondary network) is studied.
Abstract: This paper studies the secrecy performance of a wireless network (primary network) overlaid with an ambient RF energy harvesting Internet of Things (IoT) network (secondary network). The nodes in the secondary network are assumed to be solely powered by ambient RF energy harvested from the transmissions of the primary network. We assume that the secondary nodes can eavesdrop on the primary transmissions due to which the primary network uses secrecy guard zones . The primary transmitter goes silent if any secondary receiver is detected within its guard zone. Using tools from stochastic geometry, we derive the probability of successful connection of the primary network as well as the probability of secure communication. Two conditions must be jointly satisfied in order to ensure successful connection: 1) the signal-to-interference-plus-noise ratio (SINR) at the primary receiver is above a predefined threshold, and 2) the primary transmitter is not silent. In order to ensure secure communication, the SINR value at each of the secondary nodes should be less than a predefined threshold. Clearly, when more secondary nodes are deployed, more primary transmitters will remain silent for a given guard zone radius, which will in turn impact the amount of energy harvested by the secondary network. Our results concretely show the existence of an optimal deployment density for the secondary network that maximizes the density of nodes that are able to harvest sufficient amount of energy. Furthermore, we show the dependence of this optimal deployment density on the guard zone radius of the primary network. In addition, we show that the optimal guard zone radius selected by the primary network is a function of the deployment density of the secondary network. This interesting coupling between the performance of the two networks is studied using tools from game theory. We propose an algorithm that can assist the two networks to converge to Nash equilibrium. The convergence of this algorithm is verified using simulations. Overall, this paper is one of the few concrete works that symbiotically merge tools from stochastic geometry and game theory.

24 citations


Proceedings ArticleDOI
01 Jan 2018
TL;DR: A significant design vulnerability in Windows CFG is shown and a specific attack to exploit it is proposed: the Back to The Epilogue (BATE) attack, which shows that with BATE an attacker can completely evade from CFG and transfer control to any location, thus obtaining arbitrary code execution.
Abstract: Attackers use memory corruption vulnerabilities to compromise systems by hijacking control flow towards attacker-controlled code. Over time, researchers proposed several countermeasures, such as Address Space Layout Randomization, Write XOR Execute and Control Flow Integrity (CFI). CFI is one of the most promising solutions, enforcing control flow to adhere to statically determined valid execution paths. To trade with the execution and storage overhead, practical CFI implementations enforce coarser version of CFI. One of the most widely deployed implementations of CFI is the one proposed by Microsoft, named Control Flow Guard (CFG). CFG is currently in place on all Windows operating systems, from Windows 8.1 to the most recent update of Windows 10 (at the time of writing), accounting for more than 500 million machines. In this paper, we show a significant design vulnerability in Windows CFG and propose a specific attack to exploit it: the Back to The Epilogue (BATE) attack. We show that with BATE an attacker can completely evade from CFG and transfer control to any location, thus obtaining arbitrary code execution. BATE leverages the tradeoff of CFG between precision, performance, and backwards compatibility; in particular, the latter one motivates 16-byte address granularity in some circumstances. This vulnerability, inherent to the CFG design, allows us to call portions of code (gadgets) that should not be allowed, and that we can chain together to escape CFG. These gadgets are very common: we ran a thorough evaluation of Windows system libraries, and found many high value targets – exploitable gadgets in code loaded by almost all the applications on 32-bit systems and by web browsers on 64-bit. We also demonstrate the real-world feasibility of our attack by using it to build a remote code execution exploit against the Microsoft Edge web browser running on 64-bit Windows 10. Finally, we discuss possible countermeasures to BATE.

21 citations


Proceedings ArticleDOI
30 Sep 2018
TL;DR: Hardware security architectures and primitives are becoming increasingly important in practice providing trust anchors and trusted execution environment to protect modern software systems but these advancements are rarely deployed in practice.
Abstract: Hardware security architectures and primitives are becoming increasingly important in practice providing trust anchors and trusted execution environment to protect modern software systems. Over the past two decades we have witnessed various hardware security solutions and trends from Trusted Platform Modules (TPM), performance counters for security, ARM's TrustZone, and Physically Unclonable Functions (PUFs), to very recent advances such as Intel's Software Guard Extension (SGX). Unfortunately, these solutions are rarely used by third party developers, make strong trust assumptions (including in manufacturers), are too expensive for small constrained devices, do not easily scale, or suffer from information leakage. Academic research has proposed a variety of solutions, in hardware security architectures, these advancements are rarely deployed in practice.

19 citations


Journal ArticleDOI
TL;DR: For example, the authors found that media coverage of political campaigns has been shaped by working routines that constitute a set of "rules" journalists follow, and how these rules fare in the U.S. 2016 election.
Abstract: Traditionally, media coverage of political campaigns has been shaped by working routines that constitute a set of “rules” journalists follow. How did these rules fare in the U.S. 2016 election? We ...

18 citations


Proceedings ArticleDOI
01 Sep 2018
TL;DR: Hardware security architectures and primitives are becoming increasingly important in practice providing trust anchors and trusted execution environment to protect modern software systems, but advancements are rarely deployed in practice.
Abstract: Hardware security architectures and primitives are becoming increasingly important in practice providing trust anchors and trusted execution environment to protect modern software systems. Over the past two decades we have witnessed various hardware security solutions and trends from Trusted Platform Modules (TPM), performance counters for security, ARM’s TrustZone, and Physically Unclonable Functions (PUFs), to very recent advances such as Intel’s Software Guard Extension (SGX). Unfortunately, these solutions are rarely used by third party developers, make strong trust assumptions (including in manufacturers), are too expensive for small constrained devices, do not easily scale, or suffer from information leakage. Academic research has proposed a variety of solutions, in hardware security architectures, these advancements are rarely deployed in practice.

17 citations


Journal ArticleDOI
TL;DR: Data from the first 200 patients treated by CGuard stent implantation underline the feasibility and safety of the CGuardTM stent in preventing off-table events in the so-called plaque healing period, that is to say after the intraoperative embolism risk has been overcome.
Abstract: Introduction Data on perioperative outcomes of new mesh-covered carotid stents have been presented, showing encouraging results1,2. Major complication rates in CGuard carotid artery stenting (CAS) procedures range from 0 to 2.5% at 30 days1,2. These data underline the feasibility and safety of the CGuardTM stent (InspireMD, Tel Aviv, Israel) in preventing off-table events in the so-called plaque healing period, that is to say after the intraoperative embolism risk has been overcome. The IRON-Guard registry2 has continued to collect data from the first 200 patients treated by CGuard stent implantation. The present paper reports the one-year follow-up data completed by all patients.

16 citations


Journal ArticleDOI
TL;DR: In this paper, the authors present an overview of social network design, various issues and emerging trends that are evolved simultaneously with modern age, and also exhibit an exhaustive review of various security and protection issues in social networks that direct or indirectly affect the individual member of the network.
Abstract: A social network is a description of the social structure between actors, mostly individuals or organizations. It indicates the ways in which they are connected through various social familiarities ranging from casual acquaintance to close familiar bonds. With rapid increase of internet users, more people have access to global information and communication technology, as a result of which the issues of using internet as a global platform and enabling the smart objects and machines to co-ordinate, communicate, compute and calculate gradually emerges. This paper presents an overview of social network design, various issues and emerging trends that are evolved simultaneously with modern age. This paper also exhibits an exhaustive review of various security and protection issues in social networks that direct or indirectly affect the individual member of the network. Furthermore, different threats in social networks have been focused that appear because of the sharing of interactive media content inside a social networking site. Additionally the paper also reports current cutting edge guard arrangements that can shield social network clients from these dangers.

15 citations


Journal ArticleDOI
TL;DR: To investigate the evacuation behaviors of pedestrians considering action of the guard and develop an effective evacuation strategy in the artificial attack, an extended floor field model was proposed and effects of several key parameters such as the deterrence radius and capture distance on evacuation dynamics were studied.
Abstract: To investigate the evacuation behaviors of pedestrians considering action of the guard and develop an effective evacuation strategy in the artificial attack, an extended floor field model was proposed. In this model, the assault on pedestrians, the death of pedestrians and the capture of the guard were involved simultaneously. An alternative evacuation strategy which can largely reduce the number of death was developed and effects of several key parameters such as the deterrence radius and capture distance on evacuation dynamics were studied. Results show that congestion near the exit has dual effects. More specially, the guard could catch all attackers in a short time because the attackers would have more concentrated distribution, but more casualties would happen because pedestrians are hard to escape the attack due to congestion. In contrast, when pedestrians have more preference of approaching the guard, although the guard would take more time to capture the attackers result from the dispersion of attackers, the death toll would decrease. One of the reason is the dispersal of the crowd and the decrease in congestion would be beneficial for escape. Another is the attackers would be killed before launching the attack to the people those are around the guard, in other words, the guard would protect a large number of pedestrians from being killed. Moreover, increasing capture distance of the guard can effectively reduce the casualties and the catch time. As the deterrence radius reflecting the tendency of escaping from the guard for attackers rises, it would become more difficult for the guard to catch the attackers and more casualties are caused. However, when the deterrence radius reaches a certain level, the number of deaths would be reduced because the attackers would prefer to stay as far away as possible from instead of the position where they could attack more people.

13 citations


Patent
08 Jun 2018
TL;DR: In this article, an intelligent park entrance guard system consisting of an inductive card, an entrance guard control mainframe, door group equipment, a card issuing device and a management center is described.
Abstract: The invention discloses an intelligent park entrance guard system. The system comprises an inductive card, an entrance guard control mainframe, door group equipment, a card issuing device and a management center, wherein the door group equipment comprises an electronic lock, a door opening button, an emergent pressing button as well as a card reader or a biological recognition instrument for recognition, the entrance guard system is used for recognition through the card reader or the biological recognition instrument, so that only an authorized person can enter a controlled area door group, the card reader is used for reading data in the card to transmit the data to the entrance guard control mainframe or the biological recognition instrument to read and transmit information to the entrance guard control mainframe, and if the person is allowed to come in and go out, a relay in the entrance guard control mainframe can be used for operating the electronic lock to open a door; a non-contact type card reading mode is adopted by the card reader in the entrance guard system, and multiple entrance guard management control modes are adopted simultaneously. A premise distribution system (PDS) and a computer network system are uniformly used for arranging a control private network for the entrance guard system to realize systemic network access and systemic data interaction, and a modular and open structure is adopted by the software and hardware of the system in configuration, so that the system is convenient to expand.

12 citations


Journal ArticleDOI
TL;DR: This research designs a system of real-time mobile services and the related security requirements in this paper, and applies a novel and interesting Identity-Based Key Encapsulation Mechanism (IBKEM) to instantiate the system and achieve anonymous key distribution with only one-pass communication for mobile clients in batch.
Abstract: Establishing promising and efficient key distribution is the cornerstone of security when applying cryptographic methods to guard the privacy of smart devices in the Internet of Things (IoT). However, when using conventional key distribution methods in real-time mobile services, it is usually deficient to build multiple channels with strong security simultaneously on a single data server. Therefore, we focus our research on collecting or monitoring real-time and remote data, which is commonly observed in the health care field of the IoT. In this research, there are difficulties to apply the conventional key distribution approaches during interactions when considering both security and efficiency. Moreover, when preserving personal privacy, anonymity is also important in key distribution processes. We design a system of real-time mobile services and the related security requirements in this paper, and apply a novel and interesting Identity-Based Key Encapsulation Mechanism (IBKEM) to instantiate our system and achieve anonymous key distribution with only one-pass communication for mobile clients in batch. Our instantiated system demonstrates both strong security and practice.

Patent
Sami-Jukka Hakola1, Esa Tiirola1, Jorma Kaikkonen1, Kari Pajukoski1, Karri Ranta-Aho1 
15 Feb 2018
TL;DR: In this article, a system, methods, apparatuses, and computer program products for use of guard bands supporting mixed numerology use in new radio (NR) are provided.
Abstract: Systems, methods, apparatuses, and computer program products for use of guard bands supporting mixed numerology use in new radio (NR) are provided.


Journal ArticleDOI
01 Mar 2018-Sensors
TL;DR: In a novel way, a generic software architecture based on design patterns that can be adapted to any hardware in a simple way is designed to communicate, in real time, the video to the guards who can be moving towards the smart home.
Abstract: Low-cost video surveillance systems are attractive for Smart Home applications (especially in emerging economies). Those systems use the flexibility of the Internet of Things to operate the video camera only when an intrusion is detected. We are the only ones that focus on the design of protocols based on intelligent agents to communicate the video of an intrusion in real time to the guards by wireless or mobile networks. The goal is to communicate, in real time, the video to the guards who can be moving towards the smart home. However, this communication suffers from sporadic disruptions that difficults the control and drastically reduces user satisfaction and operativity of the system. In a novel way, we have designed a generic software architecture based on design patterns that can be adapted to any hardware in a simple way. The implanted hardware is of very low economic cost; the software frameworks are free. In the experimental tests we have shown that it is possible to communicate to the moving guard, intrusion notifications (by e-mail and by instant messaging), and the first video frames in less than 20 s. In addition, we automatically recovered the frames of video lost in the disruptions in a transparent way to the user, we supported vertical handover processes and we could save energy of the smartphone's battery. However, the most important thing was that the high satisfaction of the people who have used the system.

Patent
14 Aug 2018
TL;DR: In this article, an Internet of things palmar vein video entrance guard integrated system, which comprises a cloud server, entrance guard controllers, and proxy servers in each cell, was presented.
Abstract: The invention discloses an Internet of things palmar vein video entrance guard integrated system, which comprises a cloud server, entrance guard controllers in each cell gate in each cell, and proxy servers in each cell, wherein the cloud server and the proxy servers in each cell are mutually connected; the proxy servers regularly synchronizes the door opening right information of the cloud server; the input ends of the entrance guard controllers are electrically connected with the output end of the proxy servers; the entrance guard controllers control the opening or the closing of the cells;the entrance guard integration system also comprises a palmar vein entrance guard system, an IC entrance guard system, a visual telephone entrance guard system, a mobile phone MAC address entrance guard system and a human face recognition entrance guard system. The entrance guard integrated system integrates various entrance guard systems; great convenience is provided for the access of residents;meanwhile, the safety performance is improved; the residents in the cells can be conveniently and intelligently managed.

Journal ArticleDOI
15 Oct 2018
Abstract: The article reveals characteristics, the process of development and advantages of using of a Common Core Curriculum for the basic training of border guards (CCC) of the European Union countries. The Ukrainian Border Guard Service is also actively implementing this training program in its departmental educational and training institutions. The CCC consists of the General Chapter and modules «Air Border», «Land Border» and «Sea Border». The updated version of the 2018 CCC is aligned with the 4th and 5th levels of the Sectoral Qualifications Framework for border guarding and corresponds with the principles of the 4th and 5th levels European Qualifications Framework for Lifelong Learning. This training program facilitates interaction between the staff of the border services of the EU countries, offering a unified standard for basic training. This should help border guards perform their functions on a high professional level with respect for human dignity. The author analyzed the possibility of using this experience in order to implement it in the system of professional training of the personnel of the border guard agency of Ukraine. This should facilitate mobility and development of exchange programmes for the officers of border guard organizations, with the goal of providing common EU approaches to the organization of border security and introduction of common border guard standards across the EU. The CCC for border guards has also been considered regarding the possibility to utilize the experience of the leading EU border guard organisations in order to introduce it into the training system of the State Border Guard Service of Ukraine. The author indicates that the system of training of the personnel of the State Border Guard Service of Ukraine requires such an instrument for development of national border guard curricular for both educational and training purposes, and that presupposes further study of the border guard’s training system of the EU countries.

Patent
06 Apr 2018
TL;DR: In this paper, the authors proposed a coastline monitoring and guardless cloud system and a usage method thereof, which consists of a guard station side and a cloud control side, the guard stations monitor the coastline in real time and acquire guard data, and the cloud controller side comprises a data center subsystem and a terminal user subsystem.
Abstract: The invention proposes a coastline monitoring and guardless cloud system and a usage method thereof. The system comprises a guard station side and a cloud control side; the guard station side comprises a plurality of guard stations; the guard stations monitor the coastline in real time and acquire guard data; the cloud control side comprises a data center subsystem and a terminal user subsystem; the data center subsystem comprises a transmission and processing subsystem and a cloud storage server; the plurality of guard stations are connected with the data center subsystem through an Ethernetring network; the guard data acquired by the plurality of guard stations are uploaded and summarized to the transmission and processing subsystem; central guard data obtained after being processed bythe transmission and processing subsystem are stored and operated and managed by the cloud storage server; and the terminal user subsystem is connected with the data center subsystem through the localarea network or the Internet. The coastline monitoring and guardless cloud system provided by the invention realizes the automatic guard and remote monitoring and operation of the coast, and is ableto work all day and all weather.

Patent
20 Apr 2018
TL;DR: In this paper, the authors proposed an entrance guard control method, which comprises that a first server receives the uploading information of a first terminal, wherein the upload information comprises two-dimensional code information, and the two dimensional code information is obtained by scanning two dimensional codes with the first terminal.
Abstract: The invention relates to an entrance guard control method, which comprises that a first server receives the uploading information of a first terminal, wherein the uploading information comprises two-dimensional code information, and the two-dimensional code information is obtained by scanning two-dimensional codes with the first terminal; the first server returns a resident calling selection pageto the first terminal according to the uploading information; the first server receives the resident calling request selected by the first terminal according to the resident calling selection page, and transmits a resident calling request command to a second server; the second server searches the corresponding resident identity information matched with the resident calling request command according to the resident calling request command, and transmits an assess authorization request to a second terminal corresponding to the resident identity information; and the second server receives the assess authorization request result returned by the second terminal, and transmits a control command to a unlocking command controller according to the assess authorization request result so as to control the entrance guard system. With the entrance guard control method of the present invention, the reliability and the convenience of the entrance guard system are improved. The present invention further provides an entrance guard control system.

02 Jun 2018
TL;DR: The medical guard constitutes a fundamental link in medical assistance services through capable health professionals through capable professionals of primary level of attention.
Abstract: Background: medical guard constitutes a formative scenario where professionals are in contact with patients and illnesses. Objective: to characterize the medical guard in professionals of primary level of attention. Methods: a descriptive and transversal study was carried out in the guard service belonging Pedro Borras Astorga polyclinic in Pinar del Rio, from January to June 2017. The universe of study was composed by 290 professionals attending to institutional medical guard's activities in the signal period. Bioethics aspects and the informed consent were respected. Results: patients assisted by the medical guard were mainly females between 60 and more years of age. The characteristics of guard's team were distinguished for: professionals of Medicine, belonging to feminine sex, Assistant category, Master scientific category and the time of tutorship ≥5 years. Respiratory infections were grouped related to diagnosis made in the medical guard and within the indicators linked with this service the study of clinical laboratory was superior. Conclusions: the medical guard constitutes a fundamental link in medical assistance services through capable health professionals. DeCS: SENTINEL SURVEILLANCE; PRIMARY HEALTH CARE; QUALITY OF HEALTH CARE; COMMUNITY HEALTH SERVICES; EPIDEMIOLOGY, DESCRIPTIVE.

Patent
22 May 2018
TL;DR: In this article, a dwelling house entrance guard system for acquisition and analysis of big personnel data is presented, which consists of an entrance guard apparatus, a video monitoring apparatus, an internet of things instrument interface apparatus, and a data concentration apparatus.
Abstract: The invention provides a dwelling house entrance guard system for acquisition and analysis of big personnel data. The system comprises an entrance guard apparatus, a video monitoring apparatus, an internet of things instrument interface apparatus, a data concentration apparatus and a big data aggregation and analysis platform. The system takes personnel who come in and out from units of a dwellinghouse district as objects, and extracts and recognizes faces, dressing and body features of personnel to obtain the feature information, associated information and behavior pattern information of personnel; and the information above is aggregated on the platform, so that big data of personnel information is analyzed, behavior portraits of personnel are established, and features of dwelling roomscan be recognized. The system provides social integrated management and public service support for companies such as government agency and community estate.

01 Jan 2018
TL;DR: In this article, the authors present a review of the literature on music education in the context of the Winter Guard International Overview and its role in music education reform, focusing on the following:
Abstract: ...................................................................................................................... iii ACKNOWLEDGMENTS ................................................................................................. iv DEDICATION ................................................................................................................... vi LIST OF TABLES ............................................................................................................. xi CHAPTER I INTRODUCTION ...................................................................................... 1 Background ..................................................................................................................... 2 Winter Guard International Overview ........................................................................ 2 Music Education Reform ............................................................................................ 5 Philosophical Positions ............................................................................................... 6 Current Band Curricula ............................................................................................... 9 Band Program Performance Venues Today .............................................................. 11 Meeting the Musical Needs of Students ................................................................... 12 Generation Z ............................................................................................................. 13 Research Problem Statement ........................................................................................ 14 Purpose Statement ......................................................................................................... 15 Research Questions ....................................................................................................... 16 Definitions..................................................................................................................... 16 Overview of Research Design ...................................................................................... 18 Theoretical Framework ................................................................................................. 18 viii CHAPTER II – REVIEW OF LITERATURE ................................................................. 19 Philosophy of Music Education ................................................................................ 19 The Traditional Large Ensemble .............................................................................. 24 Non-Musical Outcomes of Music Education ............................................................ 26 Competition............................................................................................................... 28 Reliability of Adjudication ....................................................................................... 33 Music Education Reform .......................................................................................... 35 Summary ................................................................................................................... 45 CHAPTER III METHODOLOGY ................................................................................. 48 Phenomenological Inquiry ............................................................................................ 48 Identification of the Study Topic .................................................................................. 50 Selection of Participants ............................................................................................... 5

Patent
06 Apr 2018
TL;DR: In this paper, an unlicensed vehicle management device for unattended cloud parking and a control method is presented, which includes a cloud parking platform, a management control machine, a first license plate recognition vehicle entry and exit control machine and a second license plate registration vehicle.
Abstract: The invention discloses an unlicensed vehicle management device for unattended cloud parking and a control method The device includes a cloud parking platform, a management control machine, a first license plate recognition vehicle entry and exit control machine, a second license plate recognition vehicle entry and exit control machine, a first guard robot and a second guard robot With the device of the invention, the drivers of unlicensed vehicles can easily complete parking access, payment and other operations in a self-help manner, the problem on access and charge management of unlicensedvehicles is solved completely, and there is no need to add manual intervention equipment at the entrance and exit The device has strong adaptability and practicability

Journal Article
TL;DR: In this article, Kуslenko Dmytro, Yukhno Yurii, Zhukevych Iryna, Bondarenko Valentin, Radzievskii Rostislav, and Radzivskii Radislav improved the physical qualities of students in higher educational establishments of Ukraine on guard activity via circular training.
Abstract: Improving the physical qualities of students in higher educational establishments of Ukraine on guard activity via circular training / Kуslenko Dmytro, Yukhno Yurii, Zhukevych Iryna, Bondarenko Valentin, Radzievskii Rostislav // Journal of Physical Education and Sport (JPES). - 2018. - Р. 1065-1071.

Patent
07 Dec 2018
TL;DR: In this paper, a face identification system is arranged beside the residential area entrance guard and users in a residential area use user terminals to receive/send information through a cloud platform, which is remotely constructed.
Abstract: The invention provides a face identification entrance guard security and protection system for a residential area and a method thereof. The system comprises a residential area entrance guard and users, namely persons will enter or leave a residential area. A face identification system is arranged beside the residential area entrance guard. Users in the residential area use user terminals to receive/send information, and the face identification system and user terminals carry out information interaction through a cloud platform, which is remotely constructed. Through the face identification system, two identification methods are adopted to identify residents of the residential area, property administrators and visitors, different persons are identified by different identification methods, the efficiency of entering the residential area is improved, and the access control management becomes more intelligent and safer.

Book ChapterDOI
01 Jan 2018
TL;DR: This chapter provides an overview of some of these concerns and tries to highlight in each surveyed IDS which metrics are used for performance evaluation, whether or not the solution is flexible, and which attacks the IDS is able to detect.
Abstract: Performance evaluation is an important aspect when designing a system. However, with intrusion detection systems (IDS), there are many other factors to consider. What are the metrics which are being used to compare the systems? Which attacks do particular approaches detect? Is the solution able to adapt and recognize new attacks, or is it limited to a set of attacks which were known at the time the system was designed? This chapter provides an overview of some of these concerns and tries to highlight in each surveyed IDS which metrics are used for performance evaluation, whether or not the solution is flexible, and which attacks the IDS is able to detect. This will provide the reader with a good basis for choosing the type of approach to use to guard against attacks, or as a basis to dig deeper into a particular aspect of intrusion detection.

Patent
09 Feb 2018
TL;DR: In this paper, the authors proposed a utility model for virtual reality display ware and virtual reality glasses that relates to mobile device technical field, which includes an organism and face guard, the display screen is connected to organism one end, and the organism other end is connected face guard.
Abstract: The utility model provides a virtual reality display ware and virtual reality glasses relates to mobile device technical field. The virtual reality display ware includes organism and face guard, the display screen is connected to organism one end, and the organism other end is connected face guard, face guard can be dismantled with the organism and be connected, and the face guard is used for thefacial contact with the user, be provided with the radiating part that dispels the facial heat that produces during with the face guard contact on the face guard. The problem of virtual reality display ware among the prior art when using, the user wears for a long time can perspire, leads to the face uncomfortable, the result of use is poor is solved. The utility model discloses the face guard canbe dismantled with the organism tail end and be connected, conveniently carries out the washing of face guard, and the lateral wall of face guard is provided with the radiating part that disperses the facial heat that produces during with the face guard contact, can ventilation when the user wears, and the result of use is better.


Journal ArticleDOI
TL;DR: The history and evolution of the New York City (NYC) window guard rule, which requires building owners to install window guards in apartments housing children aged ≤10 years, is described and how the rule was modified over time is shown.
Abstract: Background Preventing child falls from windows is easily accomplished by installing inexpensive window-limiting devices but window falls remain a common cause of child injuries. This article describes the history and evolution of the New York City (NYC) window guard rule,which requires building owners to install window guards in apartments housing children aged ≤10 years. The NYC window guard rule was the first directive of its kind in the USA when it was adopted in 1976, and it has led to a dramatic and long-lasting reduction in child window fall-related injuries and deaths. Methods Data about the history of the window guard rule were obtained by reviewing programmatic records, correspondence, legal decisions and the published literature. In addition, key informant interviews were conducted with programme staff. Results and Discussion This article describes each stage of policy development, starting with epidemiological studies defining the scope of the problem in the 1960s and pilot-testing of the window guard intervention. We describe the adoption, implementation and enforcement of the rule. In addition, we show how the rule was modified over time and document the rule’s impact on window fall incidence in NYC. We describe litigation that challenged the rule’s constitutionality and discuss the legal arguments used by opponents of the rule. Finally, we discuss criminal and tort liability as drivers of compliance and summarise lessons learnt.

Patent
22 Jan 2018
TL;DR: An unmanned aerial vehicle comprising a rotor having one or more propeller blades and a propeller guard surrounding the rotor is considered in this article, where the main guard is movable from a default position to an engaged position by temporarily deforming the movable guard.
Abstract: An unmanned aerial vehicle comprising a rotor having one or more propeller blades and a propeller guard surrounding the rotor. The propeller guard comprises a main guard surrounding the one or more propeller blades and a movable guard vertically displaced from the main guard. The movable guard is movable from a default position to an engaged position by temporarily deforming the movable guard such that the movable guard contacts and obstructs rotation of the one or more propeller blades.