Since the introduction of computer networks and Internet technology, the issue of security in computer network and the Internet has been a major challenge. © 2018, World Academy of Research in Science and Engineering. The main advantage of IOT based IWSN is data transmission without collision, safety and secured. If temperature and humidity sensors values are exceeds then buzzer will horns. Some of works in industry should follow the temperature and humidity values are in certain range for reliable output. System user frequently notified with sensors data and if any high temperature/humidity values arise, an alarm or buzzer will indicate or caution the workers to be more alert in the work area. This project solves the situation by providing an alarm/Buzzer indication whenever temperature or humidity increases in the work area. This sometimes results in damage of machineries too. For example, an alarm indicating the emergency of high temperatures and high humidity in work area. In industries, most of the workers will lose their lives because of not having any safety cautions or alarm indications. The Internet of Things is the software, things embedded with electronics, sensors and network connectivity. In this project, the sensor related information will be transmitted to the user by avoiding collision of IoT. Finally, we compared the above airline companies with the proposed model generated results and it was observed that the proposed model is giving a feasible solution to Vistara airlines by adding trips in incremental order. So that Vistara can increase the business by adding trips in an incremental order from one trip to 15 trips. An incremental model was proposed to increase the connectivity of Vistara so that the performance will be increased. Graph analytics were applied to the above graphs and found that one i.e., Vistara is weakly connected over spice Jet. In the initial process, spice Jet and Vistara datasets are converted into graphs Spice Jet and Vistara. Two different airline systems are selected and applied Graph analytics. The powerful and simple Graph theory based analytic models was used in this paper. Some of them are descriptive analytics, predictive analytics, prescriptive analytics, big data analytics, and mathematical analyticsetc. Now a day’s different analytic models available in the market. In the recent era, analytics plays a vital role in understanding and improving profits of many businesses. Nmap was used for information gathering of network and Nexpose was used for scanning the network for vulnerability detection. The scanning tools used for the current work were Nmap and Nexpose. An effective VM framework is important and inevitable to prevent cyber security breaches in a UCN as it regularly checks for new vulnerabilities on and also provide solutions to remediate or resolve the vulnerabilities. Vulnerability Management in a UCN is a stepwise procedure that needs to be implemented to keep the network secure. Based on the scan results obtained after scanning the network using scanning tools, the decision can be taken to mitigate the vulnerabilities on priority basis. Assessment of scan results is done to identify vulnerabilities in the network that need to be resolved on priority basis. This paper also focuses on the implementation of vulnerability scanning tools on UCN. A plethora of tools are used for vulnerability scanning and assessment. The focus of current work is on the importance of vulnerability management in a UCN. To ensure robustness and hardness of UCN, an efficient Vulnerability Management System is required. Over the past few years, the advancement of technology in universities have led to rise in the number of vulnerabilities in University computer Network (UCN).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |