• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.03 seconds

Solar Inverter with Grid Power Generation

  • Suchitra Khoje;Govind Wanje;Ramesh Mali
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.162-165
    • /
    • 2023
  • Power can be generated from either renewable or non-renewable sources. Renewable sources are liked to maintain a strategic distance from contamination emanation and rely on upon fossil energizes which is decreasing day by day. The proposed sun powered vitality transformation unit comprises of a sun oriented exhibit, Bidirectional DC-DC converter, single stage inverter and AC. The inverter changes over DC control from the PV board into AC power and offered it to the heap which is associated with the lattice. The photovoltaic sun powered vitality (PV) is the most direct approach to change over sunlight based radiation into power and depends on the photovoltaic impact. The most extreme power point following of the PV yield for all daylight conditions is a key to keep the yield control per unit cost low for fruitful PV applications. Framework associated PV frameworks dependably have an association with people in general power matrix by means of an appropriate inverter in light of the fact that a PV module conveys just dc power. This project presents the new design, Development and Performance Analysis of a Grid Connected PV Inverter. Demonstrate that the proposed framework can lessen the Energy Consumption radically from the power board and give a solid support to the Grid.

The Impact of Using Some Participatory E-learning Strategies in Developing Skills of Designing and Producing Electronic Courses for A sample of Umm Al-Qura University Students and their Innovative Thinking

  • Emad Mohammed Samra
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.17-30
    • /
    • 2023
  • The current research aims to reveal the impact of using some participatory e-learning strategies (participatory product - classroom web simulation) in developing cognitive achievement, electronic course design skills, and - skills list - Torrance test of innovative thinking). The tools of innovative thinking among a sample of Information Science students. To achieve the objectives of current research, the researcher designed an educational website to train students to produce electronic courses via the web, according to the two participatory e-learning strategies. The researcher used a set of tools represented in (achievement test research and experimental treatment were applied to a sample of the Faculty of Computer students at Umm Al-Qura University. The results found that both participatory product strategy and web simulation have an imact on developing learning aspects discussed in the research. As for which of the two strategies had a greater impact than the other, it turned out that the web simulation strategy had a greater impact than the participatory product strategy in developing these aspects.

Acquisition, Processing and Image Generation System for Camera Data Onboard Spacecraft

  • C.V.R Subbaraya Sastry;G.S Narayan Rao;N Ramakrishna;V.K Hariharan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.94-100
    • /
    • 2023
  • The primary goal of any communication spacecraft is to provide communication in variety of frequency bands based on mission requirements within the Indian mainland. Some of the spacecrafts operating in S-band utilizes a 6m or larger aperture Unfurlable Antenna (UFA for S-band links and provides coverage through five or more S-band spot beams over Indian mainland area. The Unfurlable antenna is larger than the satellite and so the antenna is stowed during launch. Upon reaching the orbit, the antenna is deployed using motors. The deployment status of any deployment mechanism will be monitored and verified by the telemetered values of micro-switch position before the start of deployment, during the deployment and after the completion of the total mechanism. In addition to these micro switches, a camera onboard will be used for capturing still images during primary and secondary deployments of UFA. The proposed checkout system is realized for validating the performance of the onboard camera as part of Integrated Spacecraft Testing (IST) conducted during payload checkout operations. It is designed for acquiring the payload data of onboard camera in real-time, followed by archiving, processing and generation of images in near real-time. This paper presents the architecture, design and implementation features of the acquisition, processing and Image generation system for Camera onboard spacecraft. Subsequently this system can be deployed in missions wherever similar requirement is envisaged.

Channel Transfer Function estimation based on Delay and Doppler Profiler for 5G System Receiver targeting 500km/h linear motor car

  • Suguru Kuniyoshi;Shiho Oshiro;Gennan Hayashi;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.121-127
    • /
    • 2023
  • A 500 km/h linear motor high speed terrestrial transportation service is planned to launch 2027 in Japan. In order to support 5G service in the train, the Sub-carrier spacing frequency of 30 kHz is planned to be used instead of common 15 kHz sub-carrier spacing to mitigate Doppler effect in such high-speed transportation. In addition, to increase the cell size of 5G mobile system, plural Base Station antenna will transmit the identical Down Link (DL) signal to form the expanded cell size along the train rail. In this situation, forward and backward antenna signals will be Doppler shifted by reverse direction respectively and the receiver in the train might suffer to estimate accurate Channel Transfer Function (CTF) for its demodulation. In this paper, Delay and Doppler Profiler (DDP) based Channel Estimator is proposed and it is successfully implemented in signal processing simulation system. Then the simulated performances are compared with the conventional Time domain linear interpolated estimator. According to the simulation results, QPSK modulation can be used even under severe channel condition such as 500 km/h, 2 path reverse Doppler Shift condition, although QPSK modulation can be used less than 200 km/h with conventional Channel estimator.

A COMPARATIVE STUDY ON BLOCKCHAIN DATA MANAGEMENT SYSTEMS: BIGCHAINDB VS FALCONDB

  • Abrar Alotaibi;Sarah Alissa;Salahadin Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.128-134
    • /
    • 2023
  • The widespread usage of blockchain technology in cryptocurrencies has led to the adoption of the blockchain concept in data storage management systems for secure and effective data storage and management. Several innovative studies have proposed solutions that integrate blockchain with distributed databases. In this article, we review current blockchain databases, then focus on two well-known blockchain databases-BigchainDB and FalconDB-to illustrate their architecture and design aspects in more detail. BigchainDB is a distributed database that integrates blockchain properties to enhance immutability and decentralization as well as a high transaction rate, low latency, and accurate queries. Its architecture consists of three layers: the transaction layer, consensus layer, and data model layer. FalconDB, on the other hand, is a shared database that allows multiple clients to collaborate on the database securely and efficiently, even if they have limited resources. It has two layers: the authentication layer and the consensus layer, which are used with client requests and results. Finally, a comparison is made between the two blockchain databases, revealing that they share some characteristics such as immutability, low latency, permission, horizontal scalability, decentralization, and the same consensus protocol. However, they vary in terms of database type, concurrency mechanism, replication model, cost, and the usage of smart contracts.

Approach towards qualification of TCP/IP network components of PFBR

  • Aditya Gour;Tom Mathews;R.P. Behera
    • Nuclear Engineering and Technology
    • /
    • v.54 no.11
    • /
    • pp.3975-3984
    • /
    • 2022
  • Distributed control system architecture is adopted for I&C systems of Prototype Fast Breeder Reactor, where the geographically distributed control systems are connected to centralized servers & display stations via switched Ethernet networks. TCP/IP communication plays a significant role in the successful operations of this architecture. The communication tasks at control nodes are taken care by TCP/IP offload modules; local area switched network is realized using layer-2/3 switches, which are finally connected to network interfaces of centralized servers & display stations. Safety, security, reliability, and fault tolerance of control systems used for safety-related applications of nuclear power plants is ensured by indigenous design and qualification as per guidelines laid down by regulatory authorities. In the case of commercially available components, appropriate suitability analysis is required for getting the operation clearances from regulatory authorities. This paper details the proposed approach for the suitability analysis of TCP/IP communication nodes, including control systems at the field, network switches, and servers/display stations. Development of test platform using commercially available tools and diagnostics software engineered for control nodes/display stations are described. Each TCP link behavior with impaired packets and multiple traffic loads is described, followed by benchmarking of the network switch's routing characteristics and security features.

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

  • Zhang, Lejun;Zou, Yanfei;Yousuf, Muhammad Hassam;Wang, Weizheng;Jin, Zilong;Su, Yansen;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1634-1652
    • /
    • 2022
  • Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.

Improving the Cyber Security over Banking Sector by Detecting the Malicious Attacks Using the Wrapper Stepwise Resnet Classifier

  • Damodharan Kuttiyappan;Rajasekar, V
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1657-1673
    • /
    • 2023
  • With the advancement of information technology, criminals employ multiple cyberspaces to promote cybercrime. To combat cybercrime and cyber dangers, banks and financial institutions use artificial intelligence (AI). AI technologies assist the banking sector to develop and grow in many ways. Transparency and explanation of AI's ability are required to preserve trust. Deep learning protects client behavior and interest data. Deep learning techniques may anticipate cyber-attack behavior, allowing for secure banking transactions. This proposed approach is based on a user-centric design that safeguards people's private data over banking. Here, initially, the attack data can be generated over banking transactions. Routing is done for the configuration of the nodes. Then, the obtained data can be preprocessed for removing the errors. Followed by hierarchical network feature extraction can be used to identify the abnormal features related to the attack. Finally, the user data can be protected and the malicious attack in the transmission route can be identified by using the Wrapper stepwise ResNet classifier. The proposed work outperforms other techniques in terms of attack detection and accuracy, and the findings are depicted in the graphical format by employing the Python tool.

Effects of breathing training on balance, lung function, and shooting scores in shooters (호흡 훈련이 사격선수의 균형, 폐기능, 사격점수에 미치는 영향)

  • Whan-Bog Bang;Young-Seok Lee;Yang-Jin Lee
    • Journal of Korean Physical Therapy Science
    • /
    • v.30 no.4
    • /
    • pp.54-62
    • /
    • 2023
  • Background: The purpose of this study was to investigate the effects of breathing training on the balance ability, lung capacity, and shooting score of shooting athletes. Design: Randomized controlled trial. Methods: Twenty shooters were randomly assigned to the experimental group and the control group. Both the experimental group and the control group performed trunk stabilization exercise, and the experimental group received breathing training during exercise. Balance ability, lung capacity, and shooting score were measured before and after the intervention. Results: There was a significant difference in the forced expiratory volume at one second(FEV1), forced vital capacity(FVC) before and after intervention in the experimental group. In the comparison between the two groups, there was a significant difference in FVC between the control group and the control experimental group. Conclusion: The application of breathing training was effective in improving the lung capacity of shooters.

Empirical Investigation of User Behavior for Financial Mydata: The Moderating Effects of Organizational Information Transparency and Data Security Policy (금융마이데이터 사용자 행동에 관한 실증 연구: 기관정보투명성, 데이터 보안정책의 조절효과)

  • Sohn, Chang Yong;Park, Hyun Sun;Kim, Sang Hyun
    • The Journal of Information Systems
    • /
    • v.32 no.3
    • /
    • pp.85-116
    • /
    • 2023
  • Purpose The importance of data as a key resource of the intelligence revolution is being highlighted, among all those phenomena MyData is attracting attention as a key concept by organizations and individuals that eventually leads the data economy. In this regard, this study was started to contribute to the successful settlement and continuous growth of the domestic MyData industry, which has just entered the system. Design/methodology/approach To develop and test all proposed casual relationships within the research model, we used the Value-Attitude-Behavior(VAB) model as a basic framework. A total of 385 copies were used for the final analysis, and for SPSS 25.0, MS-Excel 2016, and AMOS 24.0 to summarize respondent demographic characteristics, measurement model, and structural model. Findings Findings show that all proposed hypotheses were supported with the exception of the moderating effect of organizational information transparency between data controllability and perceived value, and between data controllability and attitude toward MyData service.