safety protection
Recently Published Documents


TOTAL DOCUMENTS

251
(FIVE YEARS 95)

H-INDEX

10
(FIVE YEARS 3)

2022 ◽  
Vol 10 (4) ◽  
pp. 192-205
Author(s):  
Reben Mohammed Saleem Kurda ◽  
Umran Abdullah Haje ◽  
Muhamad Hussein Abdulla ◽  
Zhwan Mohammed Khalid

In our everyday lives, the IoT is everywhere. They are used for the monitoring and documentation of environmental improvements, fire safety and even other useful roles in our homes, hospitals and the outdoors. IoT-enabled devices that are linked to the internet transmit and receive a large amount of essential data over the network. This provides an opportunity for attackers to infiltrate IoT networks and obtain sensitive data. However, the risk of a loss of privacy and security could outweigh any of these benefits. Many tests have been carried out in order to solve these concerns and find a safer way to minimize or remove the effect of IoT technologies on privacy and security practices in order to protect them. The issue with IoT devices is that they have small output modules, making it impossible to adapt current protection methods to them. This constraint necessitates the presentation of lightweight algorithms that enable IoT devices. In this article, investigated the context and identify different safety, protection, and approaches for securing components of IoT-based ecosystems and systems, as well as evolving security solutions. In addition, several proposed algorithms and authentication methods in IoT were discussed in order to avoid various types of attacks while keeping the limitations of the IoT framework in mind. Also discuss some hardware security in IoT devices.


2022 ◽  
Vol 75 (2) ◽  
Author(s):  
Carlos Jordão de Assis Silva ◽  
Tarcísio Tércio das Neves Júnior ◽  
Eloisa Araújo de Carvalho ◽  
Valéria Gomes Fernandes da Silva ◽  
Sheyla Gomes Pereira de Almeida ◽  
...  

ABSTRACT Objective: to describe the profile of nursing diagnoses evidenced in indigenous elderly in the community. Methods: this is a cross-sectional study, carried out with 51 indigenous elderly people of Potiguara ethnicity, through a nursing consultation. The clinical data, obtained from the consultation, were analyzed following Risner’s diagnostic reasoning process and the NANDA-I Taxonomy (2018-2020). For greater accuracy, the diagnoses obtained underwent peer review by a specialist. Results: 37 diagnoses were identified, such as Impaired dentition (98.0%), Risk for impaired skin integrity (66.7%), Chronic pain (64.7%), Risk for deficient fluid volume (54.9%), Impaired swallowing (45.1%), Impaired walking (45.1%), Disturbed sleep pattern (43.1%), Stress urinary incontinence (41.2%), Risk for falls (35.3%), and Sexual dysfunction (33.3%). Conclusion: the diagnoses identified were predominantly from Safety/protection domain and result from factors that negatively influence indigenous elderly’s functional capacity.


Author(s):  
Hani. K. Al-Mohair ◽  
Hussien A. Alhadadd

Temperature is one of the most significant problems that computer users face, especially the users who deal with works that required high-performance processing such as gamers and designers. The traditional PC heat detection methods depend on the information of the CPU and the user should go through a long procedure to check the heat or by installing some third-party programs and in the end, he has to take the action manually. Although some researchers have been talked about the temperature controllers, no system used both software and hardware to control the PC temperature, also there is no consensus on the quick and efficient methods to protect the PC from the overheating problem. The proposed system improved the current solutions by providing better performance in terms of quick responses for safety protection. This paper proposes a novel system for controlling the PC's temperature to increase the safety of computer users.


2021 ◽  
Author(s):  
Yi Pu ◽  
naiting Gu ◽  
Xiao Li ◽  
Xin Li ◽  
WenLin Zhou ◽  
...  

2021 ◽  
Vol 2136 (1) ◽  
pp. 012013
Author(s):  
Xuesong Liu ◽  
Chengming Jin ◽  
Zhiyong Chen ◽  
Ge Song

Abstract In the continuous innovation and development of smart power grid in China, active distribution network as an important part, the corresponding information security protection work has received the attention of the whole society. On the basis of understanding the current operation of smart grid system, this paper analyzes and discusses the practical application cases by clarifying the safety protection and safe and credible protection schemes of active distribution network.


Sign in / Sign up

Export Citation Format

Share Document