Application Layer - Generator Sets and Industrial

2021 ◽  
Author(s):  
2018 ◽  
Vol 1 (1) ◽  
pp. 46-51 ◽  
Author(s):  
A. V. Shelgunov

Subject: the subject of the study are low-power generator sets with a power of up to 30 kW.Materials and methods: in this paper, the main domestic legislative documents regulating the requirements for products. An assessment is made of the current state of Russian engine building.Results: the detailed analysis of the modern domestic market of power generating units with a capacity of up to 30 kW is made, the main problems in the field of domestic production of  electric power generators in the range up to 30 kW are revealed, and the prospects for import substitution of gasoline and diesel engines are noted.Conclusions: almost complete absence of the market of domestic low-power generating sets is established, insufficient measures taken to support domestic producers are noted, measures are  proposed for the development of domestic production of power units in the range of up to 30 kW.


Author(s):  
Regina Lamedica ◽  
Fabio Massimo Gatta ◽  
Alessandro Ruvio ◽  
Francesco Olevano ◽  
Guido Guidi Buffarini ◽  
...  

Author(s):  
Amit Sharma

Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.


Sign in / Sign up

Export Citation Format

Share Document