Design and Development of Patient Care Voice Actuated Bed in Hospital
A Low Profile Dual U Shaped Monopole Antenna for WLAN/WiMAX/C Band Applications
A Miniaturized Dual L Shaped with Truncated Ground Rectangular Monopole Antenna for 5G and Wireless Communications
A Centre C-Shaped Dual Band Rectangular Monopole Antenna for Wi-Fi and Wireless Communication
Impact of Subchannel Symbol Rates on WSS Filtering Penalty in Elastic Optical Networks: A Comparative Study
Cognitive Radio Simulator for Mobile Networks: Design and Implementation
Reduced End-To-End Delay for Manets using SHSP-EA3ACK Algorithm
Light Fidelity Design for Audio Transmission Using Light Dependent Resistor
Dynamic Digital Parking System
Performance Analysis of Multi User Transmit Antenna Selection Systems over TWDP Fading Channels
Comparison of Wavelet Transforms For Denoising And Analysis Of PCG Signal
Video Shot Boundary Detection – Comparison of Color Histogram and Gist Method
Curvelets with New Quantizer for Image Compression
Comparison of Hybrid Diversity Systems Over Rayleigh Fading Channel
Design of Close Loop Dual-Band BPF Using CascadedOpen Loop Triangular Ring Resonator Loaded With Open Stubs
This work will present one of the applications of infra-red technology for home automation. The objective of this paper is to control independent home electrical appliances through Infrared (IR) based remote control system. The controlling circuit is built around NodeMCU-ESP32, a compact relay module and an IR sensor. Any four General Purpose Input/Output (GPIO) pins are selected from the NodeMCU to control four specific applications such as room lighting, automated door locking system, running the water pump and fan. Women specially have a hectic and busy schedule for maintaining all the domestic household activities and they want almost all activities at the click of a button. If they could control those appliances with remote control button from a remote place, life would be at ease and simpler. With the above facts in mind, the present work is carried out to develop a device to simplify the operations of selected household activities to save time, energy and stress free life.
Pollution is increasing very effectively in the world. It must be reduced the present pollution levels by the deadline even though the long-term solution to the pollution problem is to identify and reduce pollution sources. The use of air purifiers is the most effective method of reducing pollution. Regular interior air purifiers, however, are little, low-power gadgets that lack the necessary filtering capacity for outdoor environments. Additionally, there is a problem with outdoor machines' power supplies. Therefore, it has created a solar outdoor air purifier that is energy independent and built for outside filtration. It is powered by solar panels. A powerful suction fan at the bottom of our solar air purifier draws air up through a layer of pre-filters, High-Efficiency Particulate Absorbing (HEPA) filters, carbon filters, and Ultraviolet (UV) lights to remove gases and (Particulate Matter) PM 10 and PM 2.5 pollutants. Prefilter, HEPA layer, Active Carbon Filter, and UV light make up the first of the purifier's four purification layers. The combination of these four filters results in the best filtration, sucking in a lot of air and clearing it of dust particles utilizing centrifugal air force.
In the test lab, the study includes the behavior of the network and many services and applications it supports; other aspects of the environment can also be modified in a controlled manner to evaluate how the network will perform under different circumstances. Network designers can test completely new network protocols or make changes to existing one using network simulators in a controlled and reproducible manner. This paper discussed the Dynamic Source Routing (DSR) reactive routing protocol, which was modeled using eight different types of network simulators and an active node count of 80 without any malicious nodes. Based on the analysis of the results of the simulators, Network Simulator 2 (NS2) demonstrated the highest packet delivery rate compared to other simulators.
In cryptography, data encryption turns ordinary information into an obfuscated code, and the information cannot be viewed without being decrypted. Thus, cryptography remains the main element of data protection. There are two kinds of cryptography, such as symmetric and asymmetric. There are many existing symmetric algorithms that are used to encrypt data, such as the Data Encryption Standard (DES), Triple Data Encryption Algorithm (TDEA), Enigmatic Diagonal Encryption Standard (EDES), Advanced Encryption Standard (AES), BLOWFISH, TWOFISH, Rivest Cipher 4 (RC4), Rivest Cipher 6 (RC6), which have been reviewed in this paper. It compares and tracks a summary of productive encryption calculations. The performance is compared with key size, space, time, security, and features of encryption methods.
Security plays an extremely important role for users in terms of digital India, the Internet, and the IoT era. Every user is now getting access to data and moving towards digitization in today's world. Due to the transfer of information everywhere in the organization due to processing vast amounts of knowledge, it faces numerous cyber-malware problems. Various sectors are adopting more technology to improve communications and infrastructure, and the cyber threat to these networks is growing in parallel. Cyber-malware and its class is ransomware. When it spreads, it locks the machine and encrypts it. Its impact performs various functions, such as confidential data theft, data misuse, and unauthorized access. The goal of this paper is to explore methods to counter ransomware attacks. This paper provides an understanding of cyber malware, why cyber malware is chosen as ransomware, and the attack process of cyber malware.