23,258 Hits in 4.2 sec

Toward Sound-Assisted Intrusion Detection Systems [chapter]

Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark Green, Miguel García-Ruiz
On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS  
In this paper, we present a simplified sound-assisted attack mitigation system enhanced with auditory channels.  ...  Results indicate that the resulting intrusion detection system effectively generates distinctive sounds upon a series of simple attack scenarios consisting of denial-of-service and port scanning.  ...  Our work represents an ongoing effort toward the design of alternative interfaces for complex intrusion detection systems such as Snort.  ... 
doi:10.1007/978-3-540-76843-2_36 dblp:conf/otm/QiMKGG07 fatcat:blg7z5hbazaclczi7oii5viedy

A multi-modal perception based architecture for a non-intrusive domestic assistant robot

Christophe Mollaret, Alhayat Ali Mekonnen, Julien Pinquier, Frederic Lerasle, Isabelle Ferrane
2016 2016 11th ACM/IEEE International Conference on Human-Robot Interaction (HRI)  
We present a multi-modal perception based architecture to realize a non-intrusive domestic assistant robot.  ...  The realized robot is non-intrusive in that it only starts interaction with a user when it detects the user's intention to do so automatically.  ...  At this stage, the evaluations are targeted towards assessing system soundness with one run per user.  ... 
doi:10.1109/hri.2016.7451816 dblp:conf/hri/MollaretMPLF16 fatcat:bubeo7cd2bfwrdk75mowxwguym

Assisting the visually impaired using depth inference on mobile devices via stereo matching

Benjamin Chidester, Minh Do
2013 2013 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)  
impaired • Benefits of system: -Convenient, non-intrusive, no additional hardware -Could be easily deployed in the near future for widespread use as an app -A variety of depth-to-sound (or potentially  ...  Conclusion • Reliable depth inference in real-time (~5 fps and greater) is achievable with stereo matching • System demonstrates the viability of depth inference on mobile devices to assist the visually  ... 
doi:10.1109/icmew.2013.6618381 dblp:conf/icmcs/ChidesterD13 fatcat:fdegwo7ojzddrpx47y73oi4q6q

NSense: A People-centric, non-intrusive Opportunistic Sensing Tool for Contextualizing Nearness

Rute C. Sofia, Saeik Firdose, Luis A. Lopes, Waldir Moreira, Paulo Mendes
2019 arXiv   pre-print
This paper addresses NSense, a tool that has been developed to capture and to infer social interaction patterns aiming to assist in the promotion of social well-being.  ...  as in assisting to detect abnormal patterns of behavior (e.g. isolation).  ...  The sound activity detection pipeline captures the level of environmental sound derived from the sound amplitude, to classify in a deterministic way the environmental sound level. V.  ... 
arXiv:1906.08029v1 fatcat:zfw6whvyvngc5iimry42sfl2ge


Thiri Naing, Kyi Kyi Khaing, Tin Tin Nwet
2019 Zenodo  
Perimeter Intrusion Detection System (PID) focusing on the fence intrusions.  ...  Perimeter intrusion detection systems are an integral part of most physical security systems.  ...  HARDWARE IMPLEMENTATION PROCESS The Security System has a set of (PID) Perimeter Intrusion Detection System.  ... 
doi:10.5281/zenodo.3352783 fatcat:7iikws2tknbl7dorhcdcnzba6m

Multi-modal Person Localization And Emergency Detection Using The Kinect

Georgios, Shahina Ferdous, Fillia Makedon
2013 International Journal of Advanced Research in Artificial Intelligence (IJARAI)  
In this work, we present the development of a novel system for multi-modal person localization and emergency detection in an assistive ambient intelligence environment for the elderly.  ...  Person localization is of paramount importance in an ambient intelligence environment since it is the first step towards context-awareness.  ...  Assuming there is a sound source S detected by the two devices, let the corresponding detected angles be ) 50 , 50 ( ,       .  ... 
doi:10.14569/ijarai.2013.020106 fatcat:xaaj7vwc3reclbjibdgt2mjrua

Elephant Intrusion Detection and Repulsion System using Matlab

2020 International Journal of Engineering and Advanced Technology  
So, we develop a system to detect the elephant intrusion at a certain distance by using sensors and image processing using MATLAB, creates an alert to engine driver and forest officer of the region and  ...  Hence we are creating a prototype model for real time interaction of elephant intrusion across railway tracks  ...  Elephant Intrusion Detection and Repulsion System using Matlab Alarm Buzzer is a small yet efficient component to add sound features to our system.  ... 
doi:10.35940/ijeat.e9208.069520 fatcat:dencvgb7c5haxc34uvmlnywhp4

An Intrusion Detection Framework for Non-expert Users (S)

Bernardo Breve, Stefano Cirillo, Vincenzo Deufemia
2020 Proceedings of the 26th International Conference on Distributed Multimedia Systems  
Moreover, it will include several visual interfaces aiming to simplify the user interaction with the framework, allowing him/her to properly configure and run an Intrusion Detection System (IDS).  ...  This paper presents a framework for intrusion detection specifically designed to be configurable and usable by every category of users.  ...  In [28] , authors have defined a simplified sound-assistant that mitigates the sound in order to uniquely notify network attacks.  ... 
doi:10.18293/dmsviva20-014 dblp:conf/dms/CirilloDB20 fatcat:h5ctoaeymnd7hnsgbgwpfpjo7u


2020 International journal for research in engineering application & management  
It starts the appliance itself on detecting human motion and notifies the user about the same so in case if there is an intrusion the user will come to know about the same.  ...  Apart from this the system also helps in keeping a track on air quality, sound and light intensity, temperature and humidity of home.  ...  In, Intrusion detection system: During this paper, the passive infrared device (PIR) is employed to detect motion.  ... 
doi:10.35291/2454-9150.2020.0433 fatcat:nx63vhl7u5cunnabl64yreewai

Infrasound-Based Intrusion Detection with Game Theoretic Resource Optimization

Barry Webster, William Arrasmith, Lok Acharya
2014 International Journal of Modeling and Optimization  
This paper presents a concept for an intrusion detection system based on the use of infrasound, a technology well suited for this purpose due to its ability to distinguish between different types of sound  ...  Intrusion detection is a concern for any asset worth protecting.  ...  In this paper, we will introduce an intrusion detection system based on the use of infrasound. In this system, the intrusion detection itself is done automatically via passive infrasound receivers.  ... 
doi:10.7763/ijmo.2014.v4.370 fatcat:pllelkchcvbsdcl6njkmtt2bva

Signal Knowledge Graph [article]

Anj Simmons, Rajesh Vasa
2022 arXiv   pre-print
This paper presents an knowledge graph to assist in reasoning over signals for intelligence purposes.  ...  We highlight limitations of existing knowledge graphs and reasoning systems for this purpose, using inference of an attack using combined data from microphones, cameras and social media as an example.  ...  [12] present a system for detecting intrusions using a network of microphones (each in pairs to assist in determining the location of the sound source).  ... 
arXiv:2206.12111v1 fatcat:c7as5wdmwjajxppp5gtukckxzu

Intrusion and misuse detection in large-scale systems

R.F. Erbacher, K.L. Walker, D.A. Frincke
2002 IEEE Computer Graphics and Applications  
The capabilities of computer and network security aren't yet in place to let system administrators efficiently detect and counteract intrusions and misuses of the systems and networks under their control  ...  Clearly, even if we can make systems more secure, attacks and internal misuse of technologies will evolve, making some form of intrusion and misuse management a necessity for all systems.  ...  Intrusion detection systems Aside from our ongoing work in this area, 1 researchers have applied little prior activity to using visual analysis as an aid to intrusion detection.  ... 
doi:10.1109/38.974517 fatcat:jr2u6nzlc5afxivvunh2vme3ba

Detection and Warning System for Motorcycle Vehicular Collision Avoidance

M.A. Abdul Rashid, W.J. Yahya, A.M. Ithnin, H. Zamzuri, T.L. Ken, S. Ryunosuke, A. Dwijotomo, K.A. Abu Kassim, Y. Ahmad, M.H. Md Isa, Z. Mohd Jawi
2021 Journal of the Society of Automotive Engineers Malaysia  
It is expected that DEWAMCA can assist currently available Blind Spot Detection System (BSDS) to reduce accident involving motorcycles significantly.  ...  The system called Detection and Warning System for Motorcycle Vehicular Collision Avoidance (DEWAMCA).  ...  Stage C calculates the relative velocity of the detected approaching object towards the motorcycle.  ... 
doi:10.56381/jsaem.v3i1.103 fatcat:u5pattel2fghzbi22ym2d7g2fe

A System for Multimodal Context-Awareness

Georgios Galatas, Fillia Makedon
2013 International Journal of Advanced Computer Science and Applications  
Our system aims at achieving multi-modal context-awareness in an assistive, ambient intelligence environment.  ...  More specifically, we use skeletal tracking conducted on the depth images and sound source localization conducted on the audio signals captured by the Kinect sensors to accurately localize and track multiple  ...  Therefore, our main focus is to achieve the same goal of identifying and localizing multiple people in an assistive environment in a less intrusive manner. B.  ... 
doi:10.14569/ijacsa.2013.040921 fatcat:v7pcminxqbaqxft6jv7n7us5gq

Intelligent Image Capturing Alarm System Using Raspberry Pi

K.A. M. Annuar, N.A. Ab Hadi, S.K. Subramaniam, M. F. Mohd Ab Halim, M.B. N. Shah, A.F. Kadmin, M.S. Amri, A. Abdul Salam
2017 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
At the point when any conceivable intrusion is identified, a webcam installed to Raspberry Pi 2 will capture the picture of the intruder.  ...  In the meantime, the spotlight or light of the house which represented by an LED will be turned "ON" alongside an alarm sound from a buzzer which is fixed as an output.  ...  The total cycle meant here is the time taken for the system to detect a motion via PIR motion sensor, trigger an alarm via buzzer sound.  ... 
doi:10.12928/telkomnika.v15i4.6532 fatcat:htq3o4ljrfbzvilh4rt5jf3ymu
« Previous Showing results 1 — 15 out of 23,258 results