fire safety
Recently Published Documents


TOTAL DOCUMENTS

3069
(FIVE YEARS 998)

H-INDEX

39
(FIVE YEARS 13)

2022 ◽  
Vol 1 (15) ◽  
pp. 196-201
Author(s):  
Aleksandra Prusakova ◽  
Juliya Nedorybkova

The article is devoted to the consideration of one of the modern technologies for the construction of buildings and structures using SIP panels. The features of fire safety of buildings erected using SIP panels are analyzed. The result of the study is the assumption of the possibility of using structures made of SIP panels for the construction of social infrastructure facilities, especially in conditions of limited availability, the fire hazard of the buildings being erected compared to other traditional materials is estimated


2022 ◽  
Vol 10 (4) ◽  
pp. 192-205
Author(s):  
Reben Mohammed Saleem Kurda ◽  
Umran Abdullah Haje ◽  
Muhamad Hussein Abdulla ◽  
Zhwan Mohammed Khalid

In our everyday lives, the IoT is everywhere. They are used for the monitoring and documentation of environmental improvements, fire safety and even other useful roles in our homes, hospitals and the outdoors. IoT-enabled devices that are linked to the internet transmit and receive a large amount of essential data over the network. This provides an opportunity for attackers to infiltrate IoT networks and obtain sensitive data. However, the risk of a loss of privacy and security could outweigh any of these benefits. Many tests have been carried out in order to solve these concerns and find a safer way to minimize or remove the effect of IoT technologies on privacy and security practices in order to protect them. The issue with IoT devices is that they have small output modules, making it impossible to adapt current protection methods to them. This constraint necessitates the presentation of lightweight algorithms that enable IoT devices. In this article, investigated the context and identify different safety, protection, and approaches for securing components of IoT-based ecosystems and systems, as well as evolving security solutions. In addition, several proposed algorithms and authentication methods in IoT were discussed in order to avoid various types of attacks while keeping the limitations of the IoT framework in mind. Also discuss some hardware security in IoT devices.


Author(s):  
Shibani ◽  
Julian Rajkumar ◽  
Vahid Aryai ◽  
Fatemeh Salehi ◽  
Rouzbeh Abbassi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document