State Machine Model

Read Complete Research Material

STATE MACHINE MODEL

State Machine Model



State Machine Model

Introduction

Forest fires can become very disastrous after 15-20 minutes of burning if the fuel and atmospheric conditions are right and therefore, it is necessary to detect forest fires as quick as possible. Most of the fire research in the past is limited to fire mapping of the burnt area but it is necessary to detect fires in real time so that the fires maybe tackled as soon as possible and prevent massive losses.

It is necessary to have fire alert systems. A number of techniques are being used for fire detection, like airborne fire detection where people observe large areas during the flight and a GPS for location information. Another method is the watch tower from where large areas can be viewed. However the most efficient, easy and cost effective way is possible with the help of remote sensing. There is a lot of research being conducted to get the most appropriate method for active fire detection and this research focuses on the brightness temperatures anomaly detection method. There is however no perfect algorithm and the problems of omissions and commissions still persist. Majority of the fire detection algorithms have been applied to polar-orbiting satellites and the GOES geostationary satellites. Fire detection with MSG SEVIRI is not yet popular.

Real-Time Design

Fire authorities no longer monitor fire alarms — private alarm monitoring service providers now operate in a competitive environment. In many instances, this change has also involved replacement of the existing hardware system link or AIU (alarm interface unit), with alarm signalling equipment (ASE). The relevant building surveyor (RBS) is responsible for issuing building permits for the conversion or disconnection of fire alarm systems. The RBS must also ensure that all compliance requirements are met.Our purpose in this section is to use our observations to develop an FSM characterization of the vulnerable operations. The goal of this FSM is to reason whether the implemented operation, or more precisely each elementary activity within the operation, satisfies the derived predicate. To this end, we take three steps: (1) we represent each elementary activity as a primitive FSM (pFSM) expressing a predicate for accepting an input object.

The BCA requires that alarm signalling equipment complies with AS 1670.1-2004 Fire detection, warning, control and intercom systems — System design, installation and commissioning — Fire. Clause 8.18 of that Standard refers to a number of other Australian Standards that the monitoring system must comply with. More detailed criteria for use in assessing system suitability are set out in Criteria for Fire Alarm Connections, available from the MFESB and the CFA. If the proposed new system does not comply with the BCA, then the RBS has discretion2 to allow partial compliance. Alternatively, an application may be made to the Building Appeals Board for a modification.

In order to show how a vulnerability can be analyzed using an FSM, consider the Sendmail Debugging Function Signed Integer Overflow Vulnerability (#3163). A signed integer overflow condition exists in writing the array tTvect[100] in ...
Related Ads