36 research outputs found

    Exploring Current Trends and Challenges in Cybersecurity: A Comprehensive Survey

    Get PDF
    Cyber security is the process of preventing unauthorized access, theft, damage, and interruption to computers, servers, networks, and data. It entails putting policies into place to guarantee the availability, confidentiality, and integrity of information and information systems. Cyber security seeks to protect against a variety of dangers, including as hacking, data breaches, malware infections, and other nefarious actions.  Cyber security has grown to be a major worry as a result of the quick development of digital technology and the growing interconnection of our contemporary society. In order to gain insight into the constantly changing world of digital threats and the countermeasures put in place to address them, this survey seeks to study current trends and issues in the area of cyber security. The study includes responses from end users, business executives, IT administrators, and experts across a wide variety of businesses and sectors. The survey gives insight on important problems such the sorts of cyber threats encountered, the efficacy of current security solutions, future technology influencing cyber security, and the human elements leading to vulnerabilities via a thorough analysis of the replies. The most important conclusions include an evaluation of the most common cyber dangers, such as malware, phishing scams, ransom ware, and data breaches, as well as an investigation of the methods and tools used to counter these threats. The survey explores the significance of staff education and awareness in bolstering cyber security defenses and pinpoints opportunities for development in this area. The survey also sheds insight on how cutting-edge technologies like cloud computing, artificial intelligence, and the Internet of Things (IoT) are affecting cyber security practices. It analyses the advantages and disadvantages of using these technologies while taking into account issues like data privacy, infrastructure security, and the need for specialized skills. The survey also looks at the compliance environment, assessing how industry norms and regulatory frameworks affect cyber security procedures. The survey studies the obstacles organizations encounter in attaining compliance and assesses the degree of knowledge and commitment to these requirements. The results of this cyber security survey help to better understand the current status of cyber security and provide organizations and individual’s useful information for creating effective policies to protect digital assets. This study seeks to promote a proactive approach to cyber security, allowing stakeholders to stay ahead of threats and build a safe digital environment by identifying relevant trends and concerns

    A Novel Hybrid Based Method in Covid 19 Health System for Data Extraction with Blockchain Technology

    Get PDF
    Millions of people have been afflicted by the COVID-19 epidemic, which has resulted in hundreds of thousands of fatalities throughout the world. Extracting correct data on patients and facilities with and without COVID-19 with high confidence for medical specialists or the government is extremely difficult. As a result, utilizing blockchain technology, a reliable data extraction methodology for the COVID-19 database is constructed. In this accurate data extraction model development and validation study in blockchain technology for COVID analysis, here a novel Hybrid Deep Belief Lionized Optimization (HDBLO) approach is proposed. The weights of the deep model are optimized by the fitness of lion optimization. The implementation of this work is executed using MATLAB software. The simulation outcomes shows the effective performance of proposed model in blockchain technology in COVID paradigm in terms of Mean Absolute Error (MAE), Root Mean Square Error (RMSE), accuracy, F-measure, Processing time, precision and error. Consequently, the proposed approach is compared with the conventional strategies for significant validation

    A Comprehensive Survey of Deep Learning: Advancements, Applications, and Challenges

    Get PDF
    Artificial intelligence's "deep learning" discipline has taken off, revolutionizing a variety of industries, from computer vision and natural language processing to healthcare and finance. Deep learning has shown extraordinary effectiveness in resolving complicated issues, and it has a wide range of potential applications, from autonomous vehicles to healthcare. The purpose of the survey to study deep learning's present condition, including recent advancements, difficulties, and constraints since the subject is currently fast growing. The basic ideas of deep learning, such as neural networks, activation functions, and optimization algorithms, are first introduced. We next explore numerous topologies, emphasizing their distinct properties and uses, including convolutional neural networks (CNNs), recurrent neural networks (RNNs), and generative adversarial networks (GANs). Further concepts, applications, and difficulties of deep learning are all covered in this survey paper's thorough review. This survey aid the academics, professionals, and individuals who want to learn more about deep learning and explore its applications to challenging situations in the real world

    Experimental Performance Analysis Of Free And Forced Fully Developed Air Flow Green House Solar Dryer Using Curry Leaves

    Get PDF
    The world is beginning to move away from its consumption of fossil fuels. Various technologies are being developed to make use of renewable energy sources such as wind, solar, and tidal, etc. Solar energy is the best choice among these sources because of it is readily available, abundant, and capable of producing both electric energy and space heating. Solar energy can be used directly or indirectly to dry agricultural and non-agricultural products to preserve them for long a period without formation of fungi. Drying of herbal leaves is an important process in Siddha and Ayurvedic industries to produce herbal medicines in power form. However, as herbal leaves are dried in the open sun, they are susceptible to environmental factors such as rain, insects, and livestock. These disadvantages of open-air drying shall be overwhelmed by greenhouse solar dryer. Greenhouse solar dryer with natural convection, forced convection with hot air supply are the existing methods, but when supplied with hot air, the rise in temperature leads to nutrient loss in herbal leaves. In order to avoid this loss in nutrients, the current work gives a solution that the temperature of forced convection greenhouse dryer can be reduced and controlled by supplying the ambient air at inlet flow in a fully developed air region, and this method can also leads to reduction in colour loss with possibly same or higher drying rate compare to natural convection greenhouse dryer

    Performance Comparison of Tray, Bed and Integrated Drying Chamber in Closed Loop Heat Pump Dryer for Bermuda Grass

    Get PDF
    Drying plays a crucial role in various industries such as food production, agriculture, Siddha, Ayurveda, and medical fields. To achieve controlled drying conditions, a heat pump dryer is considered an effective method, allowing for precise control of parameters like temperature, humidity, and air velocity. In this study, a heat pump dryer was designed and constructed to investigate the drying characteristics of Bermuda grass (Cynodon dactylon) at different velocities (1.5 m/s, 2.0 m/s, and 2.5 m/s) using three types of drying chambers: fluidized bed dryer, tray dryer, and combined dryer (a combination of bed and tray). The heat pump system utilized R134a as the refrigerant. The performance of the heat pump dryer in the three drying chambers was analyzed using Bermuda grass as the drying product. The Moisture Removal Rate (MRR) was calculated for various combinations of velocity and drying chamber, and it was observed that the combined dryer achieved a higher MRR at all three velocities compared to the tray and fluidized bed dryers

    Changes in debris-flow susceptibility after the Wenchuan earthquake revealed by meteorological and hydro-meteorological thresholds

    No full text
    After the 2008 Wenchuan earthquake (Mw 7.9), an increase in rainfall-induced debris flows was initially observed in the earthquake-hit region (Sichuan, China). In the following years, the frequency of debris flows gradually reduced, indicating a recovery of stability of debris deposits originated from the earthquake. To assess these dynamically changing conditions, empirical thresholds have been identified to predict post-seismic debris flow occurrences with two approaches: a meteorological approach based only on precipitation characteristics, and a hydrometeorological approach that also considers the hydrologic conditions before the onset of rainfall. Both used the available record of precipitations and debris flows that occurred in the years 2008–2015 in Wenchuan county. Hydrometeorological thresholds for debris flows have been identified at the catchment scale by assessing the water balance with a simplified lumped hydrological model, based on the Budyko framework, and using catchment water storage as a proxy of the moisture state of the slopes. The results indicate that both meteorological and hydrometeorological thresholds allow catching the progressive recovery of stability of the debris deposits. In particular, the assessment of water balance at the catchment scale highlights the role played by the hydrological processes affecting the slopes, leading to the definition of reliable and robust thresholds. The hydrometeorological approach is thus recommended to define thresholds for early warning of debris flows at the catchment scale
    corecore