This document discusses lightweight cryptography algorithms for security in Internet of Things (IoT) devices. It provides an overview of IoT architecture and applications. It then discusses the need for lightweight cryptography due to constraints of IoT devices. Various lightweight cryptography algorithms are described, including symmetric key and asymmetric key algorithms. Challenges of lightweight cryptography are also outlined. Related work studying lightweight cryptography algorithms for IoT security is reviewed. The document analyzes and compares various lightweight cryptography algorithms suitable for securing resource-constrained IoT devices.
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
This document discusses security challenges with Internet of Things (IoT) devices and potential solutions. It first describes how the widespread use of IoT devices has introduced new security issues as hackers can easily access information without proper security measures. The document then reviews 10 different papers on techniques used to enhance security for IoT devices, including security models, access mechanisms, encryption, authentication, and more. It evaluates various technologies like RFID, sensors, artificial intelligence. Finally, the document concludes that providing a security-enabled model to secure end-to-end communication is the best short-term solution, while various approaches are needed to address different security issues in IoT.
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
The document proposes a crypto mechanism to securely store IoT data in the cloud. It discusses challenges with securing IoT data due to resource constraints of IoT devices and limitations of traditional encryption algorithms. The proposed model includes modules for authentication, data intake/encryption, management, and decryption. It establishes secure connections between IoT devices, cloud and users. Data from IoT devices is encrypted before storing in the cloud database. Encrypted data is decrypted and displayed to users after authentication. The model aims to securely store IoT data in the cloud while addressing issues like inference attacks and efficiently utilizing resources.
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
The document proposes a hybrid authentication technique using blockchain authentication and artificial intelligence for user and device authentication in an integrated Internet of Things (IoT) environment. It discusses challenges with IoT security and reviews existing literature on blockchain and AI approaches for IoT authentication. The proposed technique aims to create a decentralized authentication system using a blockchain to store authentication records that are then used to train a neural network model. This trained model can authenticate new users and devices in the IoT network. The document outlines the objectives, methodology, and potential benefits of the proposed hybrid authentication approach for improving IoT security.
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
The document discusses using deep learning and big data technologies to improve security for Internet of Things (IoT) devices and networks. Specifically, it proposes using deep learning models to analyze large amounts of data from IoT sensors to better detect and classify security threats. This can help identify attacks like botnets and distributed denial-of-service (DDoS) attacks. The document also outlines some common IoT security challenges and how approaches like Apache Hadoop, Spark, and Storm can process large volumes of IoT data to improve real-time monitoring and threat prevention.
Certified Internet of Things Specialist ( CIoTS ) GICTTraining
GICT Certified Internet of Things Specialist (CIoTS) course focuses on the core technologies behind Internet of Things (IoT).
Find Out More : https://globalicttraining.com
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET Journal
The document discusses authentication and context-aware access control in the Internet of Things (IoT). It first provides background on the need for improved security and privacy controls in IoT. It then reviews existing access control schemes for IoT and their shortcomings. The proposed model aims to address these shortcomings by designing a context-aware access control scheme for IoT networks. It covers access control policies that take into account the context and type of IoT nodes. The goal is to determine appropriate data transfer rates between nodes based on their context to restrict access to network resources for nodes that do not follow these policies.
A Review: The Internet of Things Using Fog ComputingIRJET Journal
Fog computing is a new computing paradigm that processes data and analytics at the edge of the network, rather than sending all data to a centralized cloud. This helps address issues with the cloud-based Internet of Things (IoT) model, such as high latency, bandwidth constraints, location awareness, and mobility. Fog computing brings computing resources closer to IoT devices and end users by using edge devices like routers, switches, and access points as "fog nodes" that can perform analytics and decision making. This allows time-sensitive IoT applications to function more efficiently. Fog computing also helps optimize resource usage by balancing processing between the edge and cloud.
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
This document discusses security challenges with Internet of Things (IoT) devices and potential solutions. It first describes how the widespread use of IoT devices has introduced new security issues as hackers can easily access information without proper security measures. The document then reviews 10 different papers on techniques used to enhance security for IoT devices, including security models, access mechanisms, encryption, authentication, and more. It evaluates various technologies like RFID, sensors, artificial intelligence. Finally, the document concludes that providing a security-enabled model to secure end-to-end communication is the best short-term solution, while various approaches are needed to address different security issues in IoT.
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
The document proposes a crypto mechanism to securely store IoT data in the cloud. It discusses challenges with securing IoT data due to resource constraints of IoT devices and limitations of traditional encryption algorithms. The proposed model includes modules for authentication, data intake/encryption, management, and decryption. It establishes secure connections between IoT devices, cloud and users. Data from IoT devices is encrypted before storing in the cloud database. Encrypted data is decrypted and displayed to users after authentication. The model aims to securely store IoT data in the cloud while addressing issues like inference attacks and efficiently utilizing resources.
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
The document proposes a hybrid authentication technique using blockchain authentication and artificial intelligence for user and device authentication in an integrated Internet of Things (IoT) environment. It discusses challenges with IoT security and reviews existing literature on blockchain and AI approaches for IoT authentication. The proposed technique aims to create a decentralized authentication system using a blockchain to store authentication records that are then used to train a neural network model. This trained model can authenticate new users and devices in the IoT network. The document outlines the objectives, methodology, and potential benefits of the proposed hybrid authentication approach for improving IoT security.
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
The document discusses using deep learning and big data technologies to improve security for Internet of Things (IoT) devices and networks. Specifically, it proposes using deep learning models to analyze large amounts of data from IoT sensors to better detect and classify security threats. This can help identify attacks like botnets and distributed denial-of-service (DDoS) attacks. The document also outlines some common IoT security challenges and how approaches like Apache Hadoop, Spark, and Storm can process large volumes of IoT data to improve real-time monitoring and threat prevention.
Certified Internet of Things Specialist ( CIoTS ) GICTTraining
GICT Certified Internet of Things Specialist (CIoTS) course focuses on the core technologies behind Internet of Things (IoT).
Find Out More : https://globalicttraining.com
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET Journal
The document discusses authentication and context-aware access control in the Internet of Things (IoT). It first provides background on the need for improved security and privacy controls in IoT. It then reviews existing access control schemes for IoT and their shortcomings. The proposed model aims to address these shortcomings by designing a context-aware access control scheme for IoT networks. It covers access control policies that take into account the context and type of IoT nodes. The goal is to determine appropriate data transfer rates between nodes based on their context to restrict access to network resources for nodes that do not follow these policies.
A Review: The Internet of Things Using Fog ComputingIRJET Journal
Fog computing is a new computing paradigm that processes data and analytics at the edge of the network, rather than sending all data to a centralized cloud. This helps address issues with the cloud-based Internet of Things (IoT) model, such as high latency, bandwidth constraints, location awareness, and mobility. Fog computing brings computing resources closer to IoT devices and end users by using edge devices like routers, switches, and access points as "fog nodes" that can perform analytics and decision making. This allows time-sensitive IoT applications to function more efficiently. Fog computing also helps optimize resource usage by balancing processing between the edge and cloud.
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
This document proposes using multifactor authentication and encryption to improve security for IoT devices and cloud storage in smart banking. It discusses challenges with IoT and cloud security and proposes a solution that uses multifactor authentication through a mobile app to access IoT devices and encrypted cloud storage. The multifactor authentication would include passwords, one-time passwords by SMS, and fingerprint biometrics. Data transmitted from IoT devices to the cloud would be encrypted using AES encryption. This approach aims to securely authenticate users and protect sensitive banking and transaction data.
IRJET- Enhanced SIT Algorithm for Embedded SystemsIRJET Journal
This document summarizes a research paper that proposes an enhanced encryption algorithm called Enhanced SIT for securing data in embedded systems and IoT devices. The algorithm is designed to be lightweight and suitable for resource-constrained devices. It operates on 64-bit blocks using a 128-bit key and incorporates a Feistel network structure. Simulation results showed the algorithm provided security within 10 encryption rounds. When implemented on a microcontroller, it had low code size and memory usage. The paper compares the performance of the proposed algorithm to other common algorithms like AES. In conclusion, Enhanced SIT is presented as an efficient and secure encryption method suitable for embedded applications and IoT security.
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET Journal
This document presents a research paper that proposes an inference model for environment detection using IoT and support vector machines (SVM). The model is intended to reduce the large amount of data generated by IoT devices and sent to the cloud. It does this by using SVM machine learning to analyze sensor data from IoT devices and only send data categorized as "harmful" to the cloud. The harmful data can then be viewed on a smartphone by the relevant authorities, allowing them to take steps to improve environmental conditions. The document reviews related literature on IoT and discusses the proposed system architecture, SVM algorithm, and results analyzing sensor data on a desktop. It is concluded that the model develops a unique approach combining IoT, machine learning, cloud
Office Automation & Attendance System using IoTIRJET Journal
This document describes an office automation and attendance system using Internet of Things (IoT) technology. The system allows users to remotely control and monitor office appliances like lights and fans using a mobile app. It also implements an RFID-based employee attendance tracking system where employees scan RFID cards to record entry and exit times. The data is sent to a cloud database using an ESP8266 WiFi module. The system aims to automate office tasks and provide remote monitoring capabilities using low-cost IoT components like NodeMCU microcontrollers.
Office Automation & Attendance System using IoTIRJET Journal
This document describes an office automation and attendance tracking system using Internet of Things (IoT) technology. The system allows remote control of office appliances like lights and fans using a mobile app. It also uses RFID cards and readers to track employee attendance by time of entry and exit. The RFID data is sent to a cloud database using an ESP8266 WiFi module. This provides a contactless, secure way to track attendance. The system aims to automate office tasks and make appliance control and attendance tracking more efficient using IoT connectivity.
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
This document summarizes a research paper on privacy-preserving techniques for IoT data in cloud environments. It introduces two differential privacy algorithms: 1) Generic differential privacy (GenDP) which provides generalized privacy protection for homogeneous and heterogeneous IoT metadata through data portioning. 2) Cluster-based differential privacy which groups similar data into clusters before defining classifiers to validate privacy. The paper evaluates these techniques and finds the cluster-based approach offers better security than customized interactive algorithms while maintaining data utility. Overall, the study presents new differential privacy methods for anonymizing IoT metadata stored in the cloud.
IRJET- Home Automation using IoT: ReviewIRJET Journal
This document summarizes research on using Internet of Things (IoT) technology for home automation and security. It discusses how IoT allows devices in the home to be controlled remotely through a smartphone app and can automate tasks. The document also reviews different approaches others have taken to implement smart home security systems using sensors and microcontrollers connected to the Internet. It describes the typical architecture of an IoT system including sensor, network, and application layers. Finally, it summarizes several research papers on developing smart home and kitchen monitoring systems using technologies like Arduino, Raspberry Pi, and sensors for functions like detecting fires, gas leaks, and intruders.
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IRJET Journal
This system aims to prevent theft by using an IoT-based anti-theft detection and alarm system. The system uses a NodeMCU microcontroller connected to various sensors like a PIR sensor to detect motion and an ultrasonic sensor to detect distance. When motion is detected, it sends a message to a mobile phone via a Blynk application, lights up a bulb for illumination, and sounds an alarm using a buzzer. The system is designed to be inexpensive while providing effective theft detection and prevention for homes and buildings.
Privacy-aware secured discrete framework in wireless sensor networkIJECEIAES
Rapid expansion of wireless sensor network-internet of things (WSN-IoT) in terms of application and technologies has led to wide research considering efficiency and security aspects. Considering the efficiency approach such as data aggregation along with consensus mechanism has been one of the efficient and secure approaches, however, privacy has been one of major concern and it remains an open issue due to low classification and high misclassification rate. This research work presents the privacy and reliable aware discrete (PRD-aggregation) framework to protect and secure the privacy of the node. It works by initializing the particular variable for each node and defining the threshold; further nodes update their state through the functions, and later consensus is developed among the sensor nodes, which further updates. The novelty of PRD is discretized transmission for efficiency and security. PRD-aggregation offers reliability through efficient termination criteria and avoidance of transmission failure. PRD-aggregation framework is evaluated considering the number of deceptive nodes for securing the node in the network. Furthermore, comparative analysis proves the marginal improvisation in terms of discussed parameter against the existing protocol.
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET Journal
This document provides an overview of the Internet of Things (IoT) including its definition, architecture, applications, and advantages/disadvantages. The key points are:
1. IoT allows both things and people to be connected anytime, anywhere through any network or service. It enables communication between machines (M2M).
2. The IoT architecture has two main components - the edge (sensors, devices, gateways) and cloud. Field protocols like Bluetooth, Zigbee, and WiFi enable communication at the edge, while cloud protocols like MQTT, CoAP, and HTTP connect to cloud services.
3. Important applications of IoT discussed are smart homes, farming, healthcare, cities
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
This document discusses security and privacy challenges with Internet of Things (IoT) systems. It notes that IoT provides broad functionality but also raises important challenges regarding privacy and security. Some key issues discussed include insufficient authentication, lack of transport encryption, insecure interfaces, default credentials, lack of secure coding practices, and privacy concerns regarding personal data collection. The document recommends approaches to address these challenges, such as base device analysis, network traffic verification, secure code reviews, and end-to-end penetration testing.
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...ijcsit
IoT applications usually rely on cloud computing services to perform data analysis such as filtering, aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT needs to deal with unique constraints. Besides the hostile environment such as vibration and electricmagnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions. In this context, we present STEAM++, a lightweight and extensible framework for real-time data stream processing and decision-making in the network edge, targeting hardware-limited devices, besides proposing a micro-benchmark methodology for assessing embedded IoT applications. In real-case experiments in a semiconductor industry, we processed an entire data flow, from values sensing, processing and analysing data, detecting relevant events, and finally, publishing results to a dashboard. On average, the application consumed less than 500kb RAM and 1.0% of CPU usage, processing up to 239 data packets per second and reducing the output data size to 14% of the input raw data size when notifying events.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
1. The document describes a proposed object detection bot that uses a Raspberry Pi, camera modules, and cloud services from AWS to accurately detect objects like plastic bottles, metal cans, and abandoned baggage.
2. The system uses a hybrid approach with both edge computing on the Raspberry Pi using SSD object detection models, as well as AWS cloud services for storage, analytics, and notifications. Video feeds are ingested into AWS Kinesis and objects detected on the edge are sent to AWS SNS for notifications.
3. An evaluation showed the system could reliably detect objects and send notifications within seconds, demonstrating the feasibility of combining local edge computing and cloud services for object detection on resource-constrained devices.
IRJET- Smart Home Application using Internet of ThingsIRJET Journal
This document summarizes a research paper on using Internet of Things (IoT) technology to create a smart home application. It discusses how an Arduino board, Bluetooth module, sensors, relays and other components were used to remotely control lights, HVAC, a doorbell, water pump and more via a smartphone app from up to 10 meters away. It also explores how the operating range could be increased using technologies like Zigbee, Wi-Fi or IP-based networks. In conclusion, the paper demonstrates how IoT can enhance home security, convenience and comfort by enabling remote control of various smart home appliances and systems.
This document provides an overview of edge computing. It discusses how edge computing processes data closer to where it is generated in order to reduce latency issues associated with cloud computing. Edge computing places small local servers near data sources like IoT devices. This allows for real-time processing of data and faster response times compared to sending all data to distant cloud servers. The document outlines several applications of edge computing in industries like transportation, healthcare, manufacturing and more where low latency is important.
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
The document discusses using machine learning to strengthen 5G infrastructure security. It begins by introducing 5G and its role in enabling IoT technologies by providing faster data transmission and lower latency. However, it notes 5G also faces security challenges like resource management, bandwidth, and latency issues. It then proposes using machine learning algorithms like autoencoders and recurrent neural networks to detect anomalies, optimize resource allocation based on usage predictions, and prioritize traffic to critical applications. This would help secure 5G networks from threats while efficiently managing resources.
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
This document summarizes cyber security threats and vulnerabilities in the Internet of Things (IoT). It discusses how the growth of interconnected devices in IoT introduces new cyber security risks. Various types of attacks that threaten IoT systems are described, such as device attacks, network attacks, and denial of service attacks. The document also examines specific vulnerabilities in IoT protocols, firmware, and applications that can enable these attacks. Finally, some potential countermeasures for improving IoT security are mentioned, like implementing secure boot processes, mutual authentication between devices, and end-to-end encryption of communications.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
This document proposes using multifactor authentication and encryption to improve security for IoT devices and cloud storage in smart banking. It discusses challenges with IoT and cloud security and proposes a solution that uses multifactor authentication through a mobile app to access IoT devices and encrypted cloud storage. The multifactor authentication would include passwords, one-time passwords by SMS, and fingerprint biometrics. Data transmitted from IoT devices to the cloud would be encrypted using AES encryption. This approach aims to securely authenticate users and protect sensitive banking and transaction data.
IRJET- Enhanced SIT Algorithm for Embedded SystemsIRJET Journal
This document summarizes a research paper that proposes an enhanced encryption algorithm called Enhanced SIT for securing data in embedded systems and IoT devices. The algorithm is designed to be lightweight and suitable for resource-constrained devices. It operates on 64-bit blocks using a 128-bit key and incorporates a Feistel network structure. Simulation results showed the algorithm provided security within 10 encryption rounds. When implemented on a microcontroller, it had low code size and memory usage. The paper compares the performance of the proposed algorithm to other common algorithms like AES. In conclusion, Enhanced SIT is presented as an efficient and secure encryption method suitable for embedded applications and IoT security.
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET Journal
This document presents a research paper that proposes an inference model for environment detection using IoT and support vector machines (SVM). The model is intended to reduce the large amount of data generated by IoT devices and sent to the cloud. It does this by using SVM machine learning to analyze sensor data from IoT devices and only send data categorized as "harmful" to the cloud. The harmful data can then be viewed on a smartphone by the relevant authorities, allowing them to take steps to improve environmental conditions. The document reviews related literature on IoT and discusses the proposed system architecture, SVM algorithm, and results analyzing sensor data on a desktop. It is concluded that the model develops a unique approach combining IoT, machine learning, cloud
Office Automation & Attendance System using IoTIRJET Journal
This document describes an office automation and attendance system using Internet of Things (IoT) technology. The system allows users to remotely control and monitor office appliances like lights and fans using a mobile app. It also implements an RFID-based employee attendance tracking system where employees scan RFID cards to record entry and exit times. The data is sent to a cloud database using an ESP8266 WiFi module. The system aims to automate office tasks and provide remote monitoring capabilities using low-cost IoT components like NodeMCU microcontrollers.
Office Automation & Attendance System using IoTIRJET Journal
This document describes an office automation and attendance tracking system using Internet of Things (IoT) technology. The system allows remote control of office appliances like lights and fans using a mobile app. It also uses RFID cards and readers to track employee attendance by time of entry and exit. The RFID data is sent to a cloud database using an ESP8266 WiFi module. This provides a contactless, secure way to track attendance. The system aims to automate office tasks and make appliance control and attendance tracking more efficient using IoT connectivity.
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
This document summarizes a research paper on privacy-preserving techniques for IoT data in cloud environments. It introduces two differential privacy algorithms: 1) Generic differential privacy (GenDP) which provides generalized privacy protection for homogeneous and heterogeneous IoT metadata through data portioning. 2) Cluster-based differential privacy which groups similar data into clusters before defining classifiers to validate privacy. The paper evaluates these techniques and finds the cluster-based approach offers better security than customized interactive algorithms while maintaining data utility. Overall, the study presents new differential privacy methods for anonymizing IoT metadata stored in the cloud.
IRJET- Home Automation using IoT: ReviewIRJET Journal
This document summarizes research on using Internet of Things (IoT) technology for home automation and security. It discusses how IoT allows devices in the home to be controlled remotely through a smartphone app and can automate tasks. The document also reviews different approaches others have taken to implement smart home security systems using sensors and microcontrollers connected to the Internet. It describes the typical architecture of an IoT system including sensor, network, and application layers. Finally, it summarizes several research papers on developing smart home and kitchen monitoring systems using technologies like Arduino, Raspberry Pi, and sensors for functions like detecting fires, gas leaks, and intruders.
IoT Based Anti-Theft Detection and Alarm System Using NodeMCU and Blynk Appli...IRJET Journal
This system aims to prevent theft by using an IoT-based anti-theft detection and alarm system. The system uses a NodeMCU microcontroller connected to various sensors like a PIR sensor to detect motion and an ultrasonic sensor to detect distance. When motion is detected, it sends a message to a mobile phone via a Blynk application, lights up a bulb for illumination, and sounds an alarm using a buzzer. The system is designed to be inexpensive while providing effective theft detection and prevention for homes and buildings.
Privacy-aware secured discrete framework in wireless sensor networkIJECEIAES
Rapid expansion of wireless sensor network-internet of things (WSN-IoT) in terms of application and technologies has led to wide research considering efficiency and security aspects. Considering the efficiency approach such as data aggregation along with consensus mechanism has been one of the efficient and secure approaches, however, privacy has been one of major concern and it remains an open issue due to low classification and high misclassification rate. This research work presents the privacy and reliable aware discrete (PRD-aggregation) framework to protect and secure the privacy of the node. It works by initializing the particular variable for each node and defining the threshold; further nodes update their state through the functions, and later consensus is developed among the sensor nodes, which further updates. The novelty of PRD is discretized transmission for efficiency and security. PRD-aggregation offers reliability through efficient termination criteria and avoidance of transmission failure. PRD-aggregation framework is evaluated considering the number of deceptive nodes for securing the node in the network. Furthermore, comparative analysis proves the marginal improvisation in terms of discussed parameter against the existing protocol.
IRJET- A Review Paper on Internet of Things(IoT) and its ApplicationsIRJET Journal
This document provides an overview of the Internet of Things (IoT) including its definition, architecture, applications, and advantages/disadvantages. The key points are:
1. IoT allows both things and people to be connected anytime, anywhere through any network or service. It enables communication between machines (M2M).
2. The IoT architecture has two main components - the edge (sensors, devices, gateways) and cloud. Field protocols like Bluetooth, Zigbee, and WiFi enable communication at the edge, while cloud protocols like MQTT, CoAP, and HTTP connect to cloud services.
3. Important applications of IoT discussed are smart homes, farming, healthcare, cities
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
This document discusses security and privacy challenges with Internet of Things (IoT) systems. It notes that IoT provides broad functionality but also raises important challenges regarding privacy and security. Some key issues discussed include insufficient authentication, lack of transport encryption, insecure interfaces, default credentials, lack of secure coding practices, and privacy concerns regarding personal data collection. The document recommends approaches to address these challenges, such as base device analysis, network traffic verification, secure code reviews, and end-to-end penetration testing.
STEAM++ AN EXTENSIBLE END-TO-END FRAMEWORK FOR DEVELOPING IOT DATA PROCESSING...ijcsit
IoT applications usually rely on cloud computing services to perform data analysis such as filtering, aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT needs to deal with unique constraints. Besides the hostile environment such as vibration and electricmagnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions. In this context, we present STEAM++, a lightweight and extensible framework for real-time data stream processing and decision-making in the network edge, targeting hardware-limited devices, besides proposing a micro-benchmark methodology for assessing embedded IoT applications. In real-case experiments in a semiconductor industry, we processed an entire data flow, from values sensing, processing and analysing data, detecting relevant events, and finally, publishing results to a dashboard. On average, the application consumed less than 500kb RAM and 1.0% of CPU usage, processing up to 239 data packets per second and reducing the output data size to 14% of the input raw data size when notifying events.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
1. The document describes a proposed object detection bot that uses a Raspberry Pi, camera modules, and cloud services from AWS to accurately detect objects like plastic bottles, metal cans, and abandoned baggage.
2. The system uses a hybrid approach with both edge computing on the Raspberry Pi using SSD object detection models, as well as AWS cloud services for storage, analytics, and notifications. Video feeds are ingested into AWS Kinesis and objects detected on the edge are sent to AWS SNS for notifications.
3. An evaluation showed the system could reliably detect objects and send notifications within seconds, demonstrating the feasibility of combining local edge computing and cloud services for object detection on resource-constrained devices.
IRJET- Smart Home Application using Internet of ThingsIRJET Journal
This document summarizes a research paper on using Internet of Things (IoT) technology to create a smart home application. It discusses how an Arduino board, Bluetooth module, sensors, relays and other components were used to remotely control lights, HVAC, a doorbell, water pump and more via a smartphone app from up to 10 meters away. It also explores how the operating range could be increased using technologies like Zigbee, Wi-Fi or IP-based networks. In conclusion, the paper demonstrates how IoT can enhance home security, convenience and comfort by enabling remote control of various smart home appliances and systems.
This document provides an overview of edge computing. It discusses how edge computing processes data closer to where it is generated in order to reduce latency issues associated with cloud computing. Edge computing places small local servers near data sources like IoT devices. This allows for real-time processing of data and faster response times compared to sending all data to distant cloud servers. The document outlines several applications of edge computing in industries like transportation, healthcare, manufacturing and more where low latency is important.
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
The document discusses using machine learning to strengthen 5G infrastructure security. It begins by introducing 5G and its role in enabling IoT technologies by providing faster data transmission and lower latency. However, it notes 5G also faces security challenges like resource management, bandwidth, and latency issues. It then proposes using machine learning algorithms like autoencoders and recurrent neural networks to detect anomalies, optimize resource allocation based on usage predictions, and prioritize traffic to critical applications. This would help secure 5G networks from threats while efficiently managing resources.
IRJET - Cyber Security Threats and Vulnerabilities in IoTIRJET Journal
This document summarizes cyber security threats and vulnerabilities in the Internet of Things (IoT). It discusses how the growth of interconnected devices in IoT introduces new cyber security risks. Various types of attacks that threaten IoT systems are described, such as device attacks, network attacks, and denial of service attacks. The document also examines specific vulnerabilities in IoT protocols, firmware, and applications that can enable these attacks. Finally, some potential countermeasures for improving IoT security are mentioned, like implementing secure boot processes, mutual authentication between devices, and end-to-end encryption of communications.
Similar to Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
AI for Legal Research with applications, toolsmahaffeycheryld
AI applications in legal research include rapid document analysis, case law review, and statute interpretation. AI-powered tools can sift through vast legal databases to find relevant precedents and citations, enhancing research accuracy and speed. They assist in legal writing by drafting and proofreading documents. Predictive analytics help foresee case outcomes based on historical data, aiding in strategic decision-making. AI also automates routine tasks like contract review and due diligence, freeing up lawyers to focus on complex legal issues. These applications make legal research more efficient, cost-effective, and accessible.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.