In current era people are suffering from many problems including common and rare diseases. The common diseases like hypertension and diabetes can be curable and controllable using proper medical guidance and diet but ...
详细信息
In current era people are suffering from many problems including common and rare diseases. The common diseases like hypertension and diabetes can be curable and controllable using proper medical guidance and diet but there is some rare disease which people do not aware about. Some of the rare diseases are Wilson's disease, Hemochromatosis and Ricket's disease. The causes of these disease are food deficiency or excessive consumption of minerals. Proper Food intake must be necessary to control these rare diseases. Specific nutrition must be required to control these diseases. In this research paper we have proposed an application which can be used by thepatient suffering from these rare diseases. It is developed using Android Studio platform. In the application user can enter the rare disease type and based on selected type a user is guided forfood to be intake by them. User can get the information regarding the hospitals which provides treatments for these raredisease.
A diagnostic instrument called an electroencephalogram measures the electrical activity of the brain electroencephalogram (EEG). Electrical impulses allow neurons to communicate with one another in the brain. An EEG m...
A diagnostic instrument called an electroencephalogram measures the electrical activity of the brain electroencephalogram (EEG). Electrical impulses allow neurons to communicate with one another in the brain. An EEG may be helpful for determining whether or not this activity has any potential risks. EEG record and monitor brain wave activity. EEG is utilized in order to control a robotic arm. A direct brain-machine interface (BMI) system that offers the brain a new non-muscular conduit for communication and control. is one approach. The electroencephalogram is a vital component of biometric security systems EEG. In addition, this booklet contains concise information regarding biometric security systems. The primary objective of this work is to give a comprehensive overview of previous research on EEG-dependent emotion recognition. However, findings of the EEG study are skewed since the electrical impulses that were captured contained artifacts. Although numerous proposals have been proposed for how to dispose of artifacts, the issue has not yet been resolved.
Malfunctioning of the fuel control system in an aero gas turbine engine may cause the engine to operate beyond its intended temperature limits. This can cause damage to critical engine components like turbine blades. ...
Malfunctioning of the fuel control system in an aero gas turbine engine may cause the engine to operate beyond its intended temperature limits. This can cause damage to critical engine components like turbine blades. The engine control is executed by hydro-mechanical subsystems linked with sensors. Human intervention required for detection of variance in critical parameters like turbine gas temperature increases the control system complexity. In this paper we investigate the causes of in-service failure of turbine blades and temperature sensors in an aero-engine by adopting an interdisciplinary approach rooted in both systems thinking and control theory. We propose a novel methodology that combines the Functional Resonance Analysis Method (FRAM) from systems thinking with the Systems Theoretic Process Analysis (STPA) with Extended Second Order Cybernetics model from control theory. FRAM is used to analyze the fuel control system as a goal-seeking feedback-control balancing loop; and STPA is used to identify the potential causal factors and control flaws, including human factors, which could contribute to the exceeded turbine gas temperature. We further use Reflexive Analysis, a new systems thinking tool, to identify the prevalence of 'emergence' phenomenon that exacerbated the problem. The theoretical findings were validated using experimental data from test-bed runs on a fighter aircraft engine at maximum take-off thrust conditions with progressively failed temperature sensors. The newly developed models and techniques in this paper provide a novel approach towards comprehensive analysis of control systems that considers both technical and human factors, which has the potential to significantly improve system safety in a wide range of safety-critical socio-technical systems.
The Internet of Things (IoT) is a new standard that has transformed the traditional way of life into a high-tech lifestyle. Smart cities, smart homes, pollution control, energy saving, smart transportation, and smart ...
详细信息
The Internet of Things (IoT) is a new standard that has transformed the traditional way of life into a high-tech lifestyle. Smart cities, smart homes, pollution control, energy saving, smart transportation, and smart industries are such transformations due to IoT. The IoT system tries to associate with almost all devices at any place. A broad variety of industries is deploying IoT solutions to make the next level of visibility and improved efficiencies. Attackers are forever on the lookout for brand new ways to compromise systems and gain access to information stores and systems. Mostly, gadgets are inclined to vulnerable attacks because of the straightforward and open nature of their networks. This paper gives an overview of the ongoing status and worries of Internet of things (IoT) security and we have focused on mitigating the brute-force attack and performed real-time cases to secure the readings of the sensors stored. This research presents an outline of safety security challenges, proposed countermeasures, and the future bearings for getting the IoT.
As the demand for energy rises, photovoltaic (PV) system usage is increasing globally. Since PV systems are not linear, special methods are employed to generate the most amount of power. The energy generated by PV pan...
As the demand for energy rises, photovoltaic (PV) system usage is increasing globally. Since PV systems are not linear, special methods are employed to generate the most amount of power. The energy generated by PV panels when sunlight is directly absorbed is not constant because of fluctuations in solar intensity. Artificial intelligence (AI) is one of the most powerful tools to track points with the most power. For the solar panels to provide the most electricity feasible, maximum power point tracking (MPPT) is employed. We have compared the performances of MPPT approaches control systems made up of a PV solar system in this research in order to decrease the energy loss supplied by the PV module and to boost energy efficiency. The MPPT, which is based on the Perturb and Observe algorithm (P&O), Fuzzy Logic algorithm (FL), and NARMA-L2 controller algorithm, is used to create this control in the MATLAB/Simulink environment. To determine the most effective method., these three algorithms have been examined and their functional analysis performed.
Due to its immutability, blockchain is a potential solution for the heterogeneous, non-secure IoT. Nevertheless, scalability, high throughput, consensus efficiency as well as decentralization and node capacity conside...
详细信息
ISBN:
(数字)9798350372977
ISBN:
(纸本)9798350372984
Due to its immutability, blockchain is a potential solution for the heterogeneous, non-secure IoT. Nevertheless, scalability, high throughput, consensus efficiency as well as decentralization and node capacity considerations represent challenges that need to be addressed in order to successfully implement blockchain technology in the IoT context. Our proposed multi-tiered Self-Scalable Dynamic architecture uses a positioning technique to efficiently locate nodes that participate in the consensus. The architecture's forest hierarchy shrinks and expands to maintain a balance between control decentralization and node management overhead. A colocality mechanism further improves consensus efficiency. Consensus time is considerably reduced as consensus is achieved by a small number of nodes, a number logarithmically bounded compared to the number of nodes at the levels beneath. Our model significantly outperforms flat and two-tiered models in simulations, providing a solid proof of concept.
This study investigates cryptojacking attacks on cloud infrastructure, focusing on hacker groups and their methods from 2017 to 2024. We analyze how attackers deploy mining software and malware in the cloud, leading t...
详细信息
ISBN:
(数字)9798350375190
ISBN:
(纸本)9798350375206
This study investigates cryptojacking attacks on cloud infrastructure, focusing on hacker groups and their methods from 2017 to 2024. We analyze how attackers deploy mining software and malware in the cloud, leading to performance degradation, resource consumption, and financial loss. Typically, these attacks target specific cloud resources like AWS EC2 or Lambda. Our novel approach involves using an EC2 instance as an internal command-and-control (C2) server to coordinate the provisioning of AWS ECS, Lightsail, and EKS services for mining purposes. System specifications are exfiltrated through DNS tunneling. We propose strategies and best practices for mitigating these attacks. Victims of these attacks often face significant costs, with each dollar gained by attackers resulting in nearly ${\$}$53 in electricity and compute bills.
With the development of the Internet of Things technology, the smart home industry is rapidly developing, and the collection and use of sensitive user data are also increasing. The issue of user privacy protection is ...
With the development of the Internet of Things technology, the smart home industry is rapidly developing, and the collection and use of sensitive user data are also increasing. The issue of user privacy protection is becoming increasingly prominent and has received widespread attention. However, related research is still in its infancy. Firstly, the technical architecture of the smart home system was introduced, and an in-depth analysis was conducted on the privacy issues and the reasons for their increasing severity in the system. Secondly, based on the degree of use of privacy data such as user personal information and behavior, existing smart home systems were classified. Once again, the research status of different technologies in smart home privacy protection, such as access control, policy control, data minimization, network traffic obfuscation, federated learning, homomorphic encryption, and zero knowledge proof, was summarized and organized, and a comparative analysis was conducted on various technologies. Finally, corresponding suggestions were proposed for privacy protection in smart home systems.
With massive alerts to investigate, cyber analysts often face with alert fatigue and may miss true attack events. As cyber-attacks are becoming increasingly targeted and sophisticated, many attack story reconstruction...
详细信息
With massive alerts to investigate, cyber analysts often face with alert fatigue and may miss true attack events. As cyber-attacks are becoming increasingly targeted and sophisticated, many attack story reconstruction techniques are proposed to trace back attack steps based on causal graphs and help cyber analysts understand how an attack unfolds. However, most existing techniques are heuristic or rule-based and require a great deal of effort to develop the rules or heuristics. This paper presents AttRSeq, a framework discovering similar attack steps across different APT instances and identifying nodes that contribute to an attack. Regarding attack entities in causal graphs, AttRSeq extracts a set of attack sequences recording critical steps of an APT attack. It then leverages an attention-based Bi-directional Long Short-Term Memory (Bi-LSTM) to learn key sequential patterns of attack and non-attack behaviors to detect ones that contribute to an attack. To verify the effectiveness of our proposed method, we conduct comparison experiments on a public dataset. The results show that our proposed model has a robust performance that exceeds the current state of the art.
Temperature increases are a common source of problems in transformers. Temperature increases as load current increases. There are two ways to monitor the rise in load current. Use a potential transformer and a tempera...
详细信息
Temperature increases are a common source of problems in transformers. Temperature increases as load current increases. There are two ways to monitor the rise in load current. Use a potential transformer and a temperature sensor, respectively. Voltage drops and winding temperature rises as load current increases. By measuring these two variables with a voltage sensor and a temperature sensor, the transformer problem can be resolved. The quantity detected by the sensor will be relayed over IoT to the control room in order to inform it of the transformer's state. It operates totally on autopilot. The Node MCU8266 board (which consist of microcontroller and built-in Wi-Fi board) included with the sensor will activate the circuit breaker to protect the transformer when the fault level is high.
暂无评论