7 research outputs found

    Practical application of IOT and its implications on the existing software

    Get PDF
    The data management from end-to-end level is done by cloud-assisted IOT for its users and they keep a goal in increasing their number of users with the course of time. From saving the infiltration of data from both internal and external threats to the system, IOT is the best-proposed method used for securing the database. Connecting objects/individuals with the Internet via safe interaction is the main objective of IOT. It can assemble all the hardware devices that are designed to store data for an individual or an organization. The associated applications and the way in which it can be deployed in the present organization in order to optimize the current working system. This paper focuses on providing an overall systematic secured data sharing portal that is devoid of threats from internal as well as external entities. By using CIBPRE data encryption a major security reform is introduced by IOT in storing and sharing of data on a regular basis

    Database techniques for resilient network monitoring and inspection

    Get PDF
    Network connection logs have long been recognized as integral to proper network security, maintenance, and performance management. This paper provides a development of distributed systems and write optimized databases: However, even a somewhat sizable network will generate large amounts of logs at very high rates. This paper explains why many storage methods are insufficient for providing real-time analysis on sizable datasets and examines database techniques attempt to address this challenge. We argue that sufficient methods include distributing storage, computation, and write optimized datastructures (WOD). Diventi, a project developed by Sandia National Laboratories, is here used to evaluate the potential of WODs to manage large datasets of network connection logs. It can ingest billions of connection logs at rates over 100,000 events per second while allowing most queries to complete in under one second. Storage and computation distribution are then evaluated using Elastic-search, an open-source distributed search and analytics engine. Then, to provide an example application of these databases, we develop a simple analytic which collects statistical information and classifies IP addresses based upon behavior. Finally, we examine the results of running the proposed analytic in real-time upon broconn (now Zeek) flow data collected by Diventi at IEEE/ACM Supercomputing 2019

    Clustering algorithms subjected to K-mean and gaussian mixture model on multidimensional data set

    Get PDF
    This paper explored the method of clustering. Two main categories of algorithms will be used, namely k-means and Gaussian Mixture Model clustering. We will look at algorithms within thesis categories and what types of problems they solve, as well as what methods could be used to determine the number of clusters. Finally, we will test the algorithms out using sparse multidimensional data acquired from the usage of a video games sales all around the world, we categories the sales in three main standards of high sales, medium sales and low sales, showing that a simple implementation can achieve nontrivial results. The result will be presented in the form of an evaluation of there is potential for online clustering of video games sales. We will also discuss some task specific improvements and which approach is most suitable

    A Novel Routing Protocol-Based Data Transmission to Enhance the Quality of Service for Internet of Medical Things Using 5G

    No full text
    When it comes to improving people's health, various forms of smart city applications are put to use in the area of smart healthcare. Health care providers are increasingly using the internet of medical things (IoMT) as an environment of linked healthcare systems, computational capabilities, and health monitors to improve the quality of service (QoS). Smart healthcare devices transmit data to IoMT and it requires an efficient solution. IoMT's and 5G networks' importance necessitates the development and testing of a novel multi-hop reinforced clustering-based routing protocol (MRCRP) to improve health data transmission's QoS. Cluster head selection is carried out using an energy-efficient approach to enhance resource usage. Min-max normalization is used to transform original data into meaningful data for more analysis. Using principal component analysis (PCA), relevant features can be extracted. The proposed routing technique is then employed to effectively transmit the data. The suggested approach's performance measures, such as delay, throughput, energy consumption, and packet drop ratio are studied, as is a comparative analysis with standard routing protocols.

    Reliable Fuzzy-Based Multi-Path Routing Protocol Based on Whale Optimization Algorithm to Improve QOS in 5G Networks for IOMT Applications

    No full text
    The Internet of Medical Things (IoMT) faces stiff competition from the 5th Generation (5G) communication standard, which includes attributes like short and long transmission ranges, Device to Device (D2D) connectivity, low latency, and high node density. To function in the linked ecosystem, IoMT based on 5G is anticipated to have a diversity of energy and mobility. It is currently difficult to create an IoMT routing system based on 5G that maximizes energy efficiency, lowers transmission latency, and increases network lifespan. The "Quality of Services (QoS)" in 5G-based IoMT is improved by the Reliable Fuzzy-based Multi-path routing system shown in this study. The Whale Optimization Algorithm (WOA) enhances the routing protocol performance. The residual energy-based Cluster Head (CH) selection strategy rotates the CH location among nodes with greater energy levels than the others. The method chooses the following set of CHs for the network that is suitable for IoMT applications by considering initial energy, residual energy, and an ideal value of CHs. According to the simulation results, our suggested routing technique enhances QoS in comparison to current approaches

    Intrusion Detection in Wireless Body Area Network using Attentive with Graphical Bidirectional Long-Short Term Memory

    No full text
    Recently developed low-power networked systems, wireless communications, and wireless sensors have all contributed to the rise of Wireless Sensor Networks (WSNs) as a potentially useful tool in the medical field. Securing Wireless Body Area Networks (WBANs) is essential for their widespread use in healthcare environments because the data they send frequently includes private and confidential patient health information. The study's goal is to create a system for detecting intrusions in WBAN. To best identify attacks in such systems, we present a novel “Attention-based Bi-directional Long Short-Term Memory with Graph Construction” (ABL-GC) here. The suggested approach ensures that the intrusion detection system uses only the features essential to detect a given attack, reducing the processing complexity

    Proposed a New Framework Scheme for the PATH LOSS in Wireless Body Area Network

    No full text
    Recent technical developments in wi-fi networking, microelectronic integration and programming, sensors, and the Internet have enabled us to create and enforce a range of new Framework Scheme to fulfill the necessities of healthcare-related Wireless Body Area Network (WBAN). WBAN sensors continually screen and measure patients' indispensable signs and symptoms and tell them to scientific monitoring for diagnosis. WBAN has a range of applications, the most necessary of which is to help sufferers in final alive. The quality instance is the coronary heart implant sensor, which video display units the coronary heart sign and in this case transmits a sign continuously. This eliminates the want sufferers to go to the medical doctor as frequently. Instead, sufferers can take a seat at domestic and acquire an analysis and prescription for the disease. Today, a sizable effort is being made to increase low-power sensors and gadgets for utility in WBAN. We endorse a New Framework Scheme in this paper that addresses the route loss trouble in WBAN and discusses its penalties in depth. We apply the new Framework Scheme on three case scenarios that help us to get parameter that get it by measure vital information about the human body. On-body and intra-body conversation simulations have been conducted. On-Body conversation findings point out that the route loss between transmitter and receiver rises with growing distance and frequency
    corecore