Nowadays, data transfer has been vast online and on social media. Hence data security in the various cloud environments has been enabled to send and receive data. While transferring the data, some issues in the cloud ...
详细信息
ISBN:
(纸本)9798350391558;9798350379990
Nowadays, data transfer has been vast online and on social media. Hence data security in the various cloud environments has been enabled to send and receive data. While transferring the data, some issues in the cloud environment are the lack of connectivity, control, and the insecurity of the password and the data. To handle this problem, data security and the internet connection have to be enabled for the cloud environments. The method of homomorphic encryption and the transport layer security protocol have been enabled for the analysis. The homomorphic encryption method converts the data to the ciphertext for making the text in the original format. Then the transport layer security protocol is used to authenticate the data, and the data integrity of the communication can be executed. The proposed system performs better than current protocols like Dynamic Level Based Integrity Checking Protocol, TLS protocol, and Lightweight Cryptosystem, making it a potential option for jobs involving safe and effective cloud information processing. Overall, the proposed Two-tier Homomorphic Encryption system exhibits improved execution time, security strength, resource utilization, communication overhead, and user satisfaction. It addresses issues such as connectivity gaps, control deficiencies, and password and data insecurity, making it an effective method for boosting cloud security in quantum cloud computing environments.
EtherCAT is widely used in servo motor drive control system because of its excellent performance. In order to achieve the best performance of servo motor drive control system, the software architecture is analyzed and...
详细信息
Chord progressions influence the emotional response a song evokes, suggesting altering a song's chords can help a system control the emotions that a user experiences when listening to sonified data. In this paper,...
详细信息
ISBN:
(纸本)9798400710582
Chord progressions influence the emotional response a song evokes, suggesting altering a song's chords can help a system control the emotions that a user experiences when listening to sonified data. In this paper, we explore how chord progressions could be used to musically communicate wellness information that invokes specific emotions, and whether a person's musical background affects their perception of emotions in music. We conducted two studies where participants provided structured or open-ended perceptions of emotions in harmonies. Our findings suggest that the emotional impact of a chord progression can be changed by various factors, including the chord transitions, the type of chords, and the chord's mode. Additionally, we found that a person's musical background may influence nuances in their perception of emotions conveyed through chords. This implies that future systems may need to consider individual musical preferences to function effectively. These results will allow for more accurate and effective emotional sonification-based communication with the user.
The detection of fabric defects is a critical task in the textile industry, directly impacting quality control and production efficiency. Existing methods often struggle with high precision, especially when detecting ...
详细信息
In recent years, companies dedicated to the rental of industrial equipment have suffered problems, such as the excessive time it takes to search for rented equipment or the loss of these. This research aims to develop...
详细信息
Unmanned Aerial Vehicles (UAVs) have emerged as indispensable assets globally. The classical control mechanisms rely heavily on tactile inputs and semi-autonomous navigation. However, the advent of Industry 4.0 and th...
详细信息
ISBN:
(纸本)9798350387919;9798350387902
Unmanned Aerial Vehicles (UAVs) have emerged as indispensable assets globally. The classical control mechanisms rely heavily on tactile inputs and semi-autonomous navigation. However, the advent of Industry 4.0 and the impending Industry 5.0 has necessitated the growing demand for intuitive and effective control mechanisms to enable efficient operations and foster human-machine collaboration. This study is focused on the exposition of a novel approach to UAV control architecture by integrating a cloud-based speech recognition algorithm into UAV technology within the CoppeliaSim platform. The system demonstrates proficient English language comprehension, mapping spoken English commands to predefined sets of commands corresponding to specific UAV operations, and executing the corresponding operations seamlessly. This study underscores the potential of cloud-based speech recognition as an intuitive UAV control mechanism, paving the way for further research and development in this domain.
In today's digital age, vulnerabilities in digital platforms have become a major concern, as cyber-attacks can lead to significant financial losses and privacy breaches. Encryption and authentication algorithms, s...
详细信息
The rapid development of technology, particularly in the fields of medium-voltage drive applications, has led to the widespread and use of AC to DC multi-pulse (MPC) and DC to AC multilevel converters. In recent years...
详细信息
ISBN:
(纸本)9781665414739
The rapid development of technology, particularly in the fields of medium-voltage drive applications, has led to the widespread and use of AC to DC multi-pulse (MPC) and DC to AC multilevel converters. In recent years, multi-winding transformers (MWTs)-based MPC have received significant attention, owing to the growing need to utilize the energy as per power quality standards with high reliability in medium voltage drive systems. The main issues of MPC are the large complexity of winding connections, which directly degrades the reliability of the system and increases the requirement for conductor material. To address these issues of grid-end converters, this paper suggests a less complex structure of a MWT for a 36- pulse MPC, which demands the least conductor material for windings. Moreover, the reduction in the number of components of the MLI has a noticeable role in saving size, cost, and reliability improvement. To address these features in the drive system, a 5-level hybrid symmetric cascaded H-bridge multilevel inverter (HSCHB-MLI) is presented, which performs a high-quality power conversion at the motor terminals of the drive system. Hence, the main concerns of this drive system are the reduction in the component count, weight, and losses of the system with excellent harmonics performance. The operational aspects of the topology such as circuit structure, design, and IFOC, and modulation technique are elaborated in detail. A detailed comparative assessment is performed with other MWT and MLI structures to demonstrate the merits of the presented MWT and MLI structures, respectively. Finlay, through Simulink modeling and hardware testing setup, the viability of the proposed architecture is verified.
Interactions between people and automation depend heavily on human confidence in the latter. Lack of trust can cause people to not use automation, while too much trust can cause them to put their faith in a flawed aut...
详细信息
We present Federated Access control Support (FACTS) for flexible and energy efficient IoT edge deployments. FACTS is a hybrid approach to access control that couples capability support over MQTT with TLS based securit...
详细信息
ISBN:
(纸本)9798350366495;9798350366488
We present Federated Access control Support (FACTS) for flexible and energy efficient IoT edge deployments. FACTS is a hybrid approach to access control that couples capability support over MQTT with TLS based security to reduce the power consumption of IoT deployments. Capability systems are lightweight and enable fine-grained access control using cryptographically secure tokens. TLS provides number of security guarantees but is expensive in terms of both time and energy when employed by resource constrained devices at the edge. By combining the two, FACTS enables IoT deployment administrators to decide where and when to use encrypted communication for access control to achieve the best trade-off between data privacy, performance, and energy efficiency. We evaluate FACTS for different deployment scenarios and show that it improves both energy use and performance relative to existing approaches.
暂无评论