8 research outputs found

    An Efficient Multifeature Model for Improving the Performance of Critical Energy Infrastructure

    Get PDF
    Energy infrastructure is well thought-out to be one of the complex infrastructures due to its convoluted configuration and automatic control among all of the systems. With such systems, various connections are made for the purpose of configurations. The energy system infrastructure aims to analytically evaluate each element of the system based on fundamental energy branches according to the customer demand. Developing a novel critical evaluation approach for complex energy infrastructure is pertinent to the evaluation of mixed energy system infrastructure. Considering the functional relationships between elements and their infrastructures, a system is needed to overcome the limitations of the current systems. By doing the efficient modeling of enhancing the performance infrastructure of critical energy infrastructure enable better quantitative evaluation of system. The purpose of the proposed study is to develop an evaluation approach for enhancing the performance of critical energy infrastructure. With the help of the proposed approach, efficient multifeature model for enhancing the performance of critical energy infrastructure was experimentally calculated. The experimental setup of the proposed study was done in the Super Decision tool for an efficient multifeature model for enhancing the performance. Results of the experiments reveal the effectiveness of the proposed research.National Natural Science Foundation of Shanxi Province (201801D121147)

    Birthmark based identification of software piracy using Haar wavelet

    Get PDF
    Piracy of software is an increasing problem of modern day software industry. Piracy of software is the unlawful use of software or part of it without proper permission as described in license agreement. Software piracy is a serious crime but not taken seriously by most people. Preventing software piracy is very important for the growing software industry. Efforts are being made to prevent and detect software piracy. Several techniques have been developed most important of which is software birthmark. The birthmark of a software is the intrinsic properties of software. A recent research shows that a features based software birthmark can be used as a strong mechanism to detect piracy of a software and how much piracy performed has been performed on it. An objective measure is needed to overcome this problem and to compare features based birthmark of a software which efficiently and precisely detect piracy in reproduction of software. The proposed study presents Haar wavelet collocation method for software features (birthmark) to detect piracy. The proposed method gives an exclusive solution for the features based birthmark of software and is then further used for comparisons of birthmark. The results of the proposed study show the effectiveness in terms of accuracy and efficiency to compare the features based software

    Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication

    No full text
    Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, if an intrusion or eavesdropping occurs, it will lead to a severe disfigurement of the whole communication network, and the data will be controlled by wrong malicious users. Identification of attack is a way to identify the security violations and analyze the measures in a computer network. An identification system, which is effective and accurate, can add security to the existing system for secure and smooth communication among end to end nodes and can work efficiently in the identification of attack on data packets. The role of information security is to design and protect the entire data of networks and maintain its confidentiality, integrity, and availability for their right users. Therefore, there is a need for end to end security management, which will ensure the security and privacy of the network and will save the data inside networks from malicious users. As the network devices are growing, so the level of threats is also increasing for these devices. The proposed research is an endeavor toward the detection of data packets attack by using the rough set theory for a secure end to end communication. The experimental work was performed by the RSES tool. The accuracy of the K-NN was 88% for the total objects of 8459. For cross validation purposes, the decision rules and decomposition tree algorithms were used. The DR algorithm showed accuracy of 59.1%, while the DT showed accuracy of 61.5%. The experimental results of the proposed study show that the research is capable of detecting data packets attack

    Parallel Computing for Efficient and Intelligent Industrial Internet of Health Things: An Overview

    Get PDF
    Internet of Things (IoT) is expanding and evolves into all aspects of the society. Research and developments in the field of IoT have shown the possibility of producing huge volume of data and computation among different devices of the IoT. The data collected from IoT devices are transferred to a central server which can further be retrieved and accessed by the service providers for analyzing, processing, and using. Industrial Internet of Health Things (IIoHT) is the expansion of the Internet of Health Things (IoHT) which plays an important role in observing, consulting, monitoring, and treatment process of remote exchange data processes. The linkage of computation and interoperability are supported through various intelligent sensors, controllers, and actuators. The role of parallel computing for efficient and Intelligent Industrial Internet of Health Things is obvious to analyze and process different healthcare situations. A detailed overview of this existing literature is needed through which the research community will provide new solutions for efficient healthcare with the help of IoT based on parallel computing. Therefore, the current study presents a detailed overview of the existing literature for facilitating IIoHT

    Erratum to: Guidelines for the use and interpretation of assays for monitoring autophagy (3rd edition) (Autophagy, 12, 1, 1-222, 10.1080/15548627.2015.1100356

    No full text
    non present

    Guidelines for the use and interpretation of assays for monitoring autophagy (3rd edition)

    No full text
    corecore