User Privacy Protection via Windows Registry Hooking and Runtime Encryption DOI Creative Commons
Edward L. Amoruso, Richard Leinecker, Cliff C. Zou

et al.

Sensors, Journal Year: 2024, Volume and Issue: 24(16), P. 5106 - 5106

Published: Aug. 6, 2024

The Windows registry contains a plethora of information in hierarchical database. It includes system-wide settings, user preferences, installed programs, and recently accessed files maintains timestamps that can be used to construct detailed timeline activities. However, these data are unencrypted thus vulnerable exploitation by malicious actors who gain access this repository. To address security privacy concern, we propose novel approach efficiently encrypts decrypts sensitive real time. Our developed proof-of-concept program intercepts interactions between the registry's application programming interfaces (APIs) other applications using an advanced hooking technique. This enables proposed system transparent users without requiring any changes operating or software. also implements protection API (DPAPI) Microsoft securely manage each user's encryption key. Ultimately, our research provides enhanced framework for registry, effectively fortifying against threats while maintaining its accessibility legitimate applications.

Language: Английский

Resource Management and Secure Data Exchange for Mobile Sensors Using Ethereum Blockchain DOI Open Access
Burhan Ul Islam Khan, Khang Wen Goh, Abdul Raouf Khan

et al.

Symmetry, Journal Year: 2025, Volume and Issue: 17(1), P. 61 - 61

Published: Jan. 1, 2025

A typical Wireless Sensor Network (WSN) defines the usage of static sensors; however, growing focus on smart cities has led to a rise in adoption mobile sensors meet varied demands Internet Things (IoT) applications. This results significantly increasing dependencies towards secure storage and effective resource management. One way address this issue is harness immutability property Ethereum blockchain. However, existing challenges IoT communication using blockchain are noted eventually lead symmetry issues network dynamics Ethereum. The key related scalability, disparities, centralization risk, which offer sub-optimal opportunities for nodes gain benefits, influence, or participate processes network. Therefore, paper presents novel blockchain-based computation model optimizing utilization offering data exchange during active among sensors. An empirical method trust was carried out identify degree legitimacy sensor participation Finally, cost been presented estimation enhance users’ quality experience. With aid simulation study, benchmarked outcome study exhibited that proposed scheme achieved 40% reduced validation time, 28% latency, 23% improved throughput, 38% minimized overhead, 27% cost, processing contrast solutions reported literature. prominently exhibits fairer system.

Language: Английский

Citations

4

Dynamic smart contracts framework on Ethereum private blockchain for real estate management DOI Creative Commons

Huma Jamshed,

Urooj Waheed, Shahid Iqbal

et al.

The Journal of Engineering, Journal Year: 2025, Volume and Issue: 2025(1)

Published: Jan. 1, 2025

Abstract Blockchain technology enables the recording of information in an immutable manner, making it extremely difficult or nearly impossible to alter, hack, manipulate. Its adoption is expected enhance long‐term economic sustainability across various industries, including real estate. Traditional estate transactions typically involve third‐party intermediaries record and validate informal transactions. However, blockchain has potential revolutionize sector by transforming how properties are bought sold. Features such as efficiency, transparency, process automation through smart contracts, robust consensus mechanisms, enhanced security measures can reshape landscape increasing efficiency reducing costs. This paper explores challenges currently faced industry reviews literature on disruptive impact this sector. A conceptual framework for a private proposed based Ethereum platform, utilizing proof authority mechanism, specifically designed property The model integrates self‐sovereign identity secure decentralized management, incorporates digital wallets transaction leverages contracts automate processes. approach enhances transparency transactions, thereby fostering greater trust between users service provider.

Language: Английский

Citations

2

Conventional and artificial intelligence based maximum power point tracking techniques for efficient solar power generation DOI Creative Commons

Malhar Khan,

Muhammad Amir Raza, Muhammad Faheem

et al.

Engineering Reports, Journal Year: 2024, Volume and Issue: unknown

Published: July 15, 2024

Abstract The increasing global need for renewable energy sources, driven by environmental concerns and the limited availability of traditional energy, highlights significance solar energy. However, weather fluctuations challenge efficiency systems, making maximum power point tracking (MPPT) systems crucial optimal harvesting. This study compares ten MPPT approaches, including both conventional artificial intelligence (AI)‐based techniques. These controllers were designed implemented using MATLAB Simulink, their performance was evaluated under real conditions with fluctuating irradiance temperature. results demonstrate that techniques, such as incremental conductance (INC), Perturb Observe (P&O), Incremental Particle Swam Optimization (INC‐PSO), Fuzzy Logic Control (FLC‐PSO), (P&O‐PSO), achieved accuracies 94%, 97.6%, 98.9%, 98.7%, 99.3% respectively. In contrast, AI‐based intelligent Artificial Neural Network (ANN), Interference System (ANFIS), (FLC), (PSO), (ANN‐PSO), outperform achieving higher 97.8%, 99.9%, 99.2%, 99%, Compared to available research, which often reports lower our enhanced methods. provides a comprehensive comparative analysis, delivering critical analysis practical guidance engineers researchers in selecting most effective controller optimized specific conditions. By improving reliability research supports advancement sustainable solutions.

Language: Английский

Citations

5

Charting the UK's path to net zero emissions by 2050: Challenges, strategies, and future directions DOI Creative Commons
Sulman Shahzad, Muhammad Faheem, Hafiz Abdul Muqeet

et al.

IET Smart Grid, Journal Year: 2024, Volume and Issue: unknown

Published: Aug. 8, 2024

Abstract The authors explore the various obstacles and possible approaches that UK may take to fulfil its goal of having net‐zero greenhouse gas emissions by 2050. paper thoroughly examines several aspects this project, such as modernisation infrastructure, energy transition, economic effects, research development, changes in behaviour, frameworks for policy regulation. With a 44% decrease from 1990 levels 2021, it showcases UK's noteworthy achievement lowering ambitious initiatives, £12 billion Ten Point Plan, accelerate development. difficulties switching reliance on fossil fuels renewable sources, their implications economy, necessity green technology innovation are all covered article. It also discusses behavioural sides shift, highlighting need change one's lifestyle engage public. To address these issues, importance international cooperation policymaking is emphasised. Insights into potential remedies provided article, which includes efficiency investments energy, assistance clean R&D, funding options, public awareness campaigns, cooperation, regulatory frameworks. Every one alternatives examined effects obstacles. article concludes reaching net zero complex but necessary objective calls concerted strategy strikes balance between social concerns environmental sustainability.

Language: Английский

Citations

5

Enhancing Smart Grid Security Using BLS Privacy Blockchain With Siamese Bi‐LSTM for Electricity Theft Detection DOI Open Access

G. Johncy,

R S Shaji,

T M Angelin Monisha Sharean

et al.

Transactions on Emerging Telecommunications Technologies, Journal Year: 2025, Volume and Issue: 36(1)

Published: Jan. 1, 2025

ABSTRACT Energy management inside a blockchain framework developed for smart grids is primarily concerned with improving intrusion detection to protect data privacy. The emphasis on real‐time of cyberattacks and preemptive forecasting possible risks, especially in the realm electricity theft within grid systems. Existing Electricity Theft Detection techniques have obstacles such as class imbalance, which leads poor generalization, increased complexity due large EC aspects, high false positive rate supervised models, resulting incorrect classification regular customers abnormal. To provide security grid, novel BLS Privacy Blockchain Siamese Bi‐LSTM proposed. Initially, privacy‐preserving Boneh‐Lynn‐Shacham technique built Short signature hash algorithms, mitigate misclassification rates positives attacks. Then, hybrid employs an algorithm based Bidirectional Long Short‐Term Memory semantically distinguish between harmful authentic behaviors, thereby quality predictive capabilities. Furthermore, Recurrent Neural Network‐Generative Adversarial Network presented detecting fraud, addresses issue imbalance. This uses both unsupervised loss functions produce synthetic samples that closely resemble actual incidents. From experiment, it showing proposed models perform accuracy low error rates. model from outcomes when compared other existing achieves accuracy, rate, recall, computation time.

Language: Английский

Citations

0

A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications DOI Creative Commons
Muhammad Aqeel, Arfan Jaffar,

Muhammad Faheem

et al.

Engineering Reports, Journal Year: 2025, Volume and Issue: 7(1)

Published: Jan. 1, 2025

ABSTRACT The rapid proliferation of Internet Things (IoT) devices has underscored the critical need to safeguard data they store and transmit. Among various types, digital images often carry highly sensitive information, making their protection against breaches essential. This study introduces a novel image encryption algorithm specifically designed bolster security in resource‐constrained IoT ecosystems. Leveraging randomness 5D multi‐wing hyperchaotic map, proposed method employs pairs non‐overlapping rectangles induce confusion by swapping pixels encompass. Repeated iterations this operation achieve significant effects, enhancing strength. To validate robustness algorithm, standard benchmark were utilized, rigorous metrics —including information entropy, correlation coefficient, histogram uniformity, resistance differential attacks —were analyzed. Results demonstrate that not only ensures strong unauthorized access but also maintains low computational complexity, it ideal for applications. research provides foundational step toward ensuring confidentiality integrity visual an increasingly interconnected world.

Language: Английский

Citations

0

Design of a Solar‐Wind Hybrid Renewable Energy System for Power Quality Enhancement: A Case Study of 2.5 MW Real Time Domestic Grid DOI Creative Commons

F. Max Savio,

S. Vinson Joshua,

K. Usha

et al.

Engineering Reports, Journal Year: 2025, Volume and Issue: 7(1)

Published: Jan. 1, 2025

ABSTRACT The increasing global energy demand driven by climate change, technological advancements, and population growth necessitates the development of sustainable solutions. This research investigates design, modeling, simulation a 2.5 MW solar‐wind hybrid renewable system (SWH‐RES) optimized for domestic grid applications. A survey conducted across 450 households identified total 2.3 MW, with distinct day night usage profiles. In response, consisting 1.5 solar park 1 wind unit was designed to ensure continuous power supply. modeled simulated using MATLAB, its performance evaluated through detailed Total Harmonic Distortion (THD) analysis. addresses critical need high‐quality supply designing, simulating meet surveyed load, while also reducing THD acceptable levels improved quality stability. results demonstrated significant reduction in THD, voltage decreasing from 45.48% 26.20% current 8.32% 2.88% after implementing filtering components. These findings underscore effectiveness proposed SWH‐RES providing stable, addressing growing

Language: Английский

Citations

0

An Intelligent Frequency Control Scheme for Inverting Station in High Voltage Direct Current Transmission System DOI Creative Commons

Saleem Saleem,

Muhammad Amir Raza,

Syed Waqar Umer

et al.

Engineering Reports, Journal Year: 2025, Volume and Issue: 7(1)

Published: Jan. 1, 2025

ABSTRACT Power system stability is crucial for the reliable and efficient operation of electrical grids. One key factors affecting power frequency alternating current (AC) while connected with High Voltage Direct Current (HVDC) transmission system. Changes in load demand can lead to deviations, which have detrimental effects on performance Frequency should therefore be controlled within predefined limits order prevent unexpected disturbances that may cause problems loads or even entire fail. A broad simulation model HVDC developed using MATLAB software evaluate effectiveness proposed controllers such as Adaptive Neuro‐Fuzzy Inference System (ANFIS), Artificial Neural Network (ANN), optimization Proportional‐Integral‐Derivative (PID) controller Particle Swarm Optimization (PSO) based control strategy addressing instability problems. To assess how well ANFIS, ANN, PID‐PSO controls system, several situations were simulated, including changes operational circumstances. The result reveals ANN performs more accurate results than other and, displaying its capacity successfully reduce deviations maintained a 50 Hz. Adopted method suggested easy integration AC grid enhances quality stability.

Language: Английский

Citations

0

Exploring optimizer efficiency for facial expression recognition with convolutional neural networks DOI Creative Commons
Syed Hamid Hussain Madni,

Lokessh A L Pathmanatan,

Muhammad Faheem

et al.

The Journal of Engineering, Journal Year: 2025, Volume and Issue: 2025(1)

Published: Jan. 1, 2025

Abstract It's widely accepted that human expressions, considering for roughly sixty percent of all daily interactions, are among the most authentic forms communication. Numerous studies being conducted to explore importance facial expressions and development machine‐assisted recognition techniques. Significant progress is made in expression recognition, largely due rapid growth machine learning computer vision. A variety algorithmic approaches methods exist detecting recognizing features. This study investigates various optimization algorithms used with convolutional neural networks recognition. The primary focus on Adam, RMSProp, stochastic gradient descent AdaMax optimizers. comprehensive comparison made, examining key aspects each optimizer, including its advantages disadvantages. Furthermore, also incorporates findings from recent these optimizers applications, highlighting their performance terms training time precision. aim illuminate process selecting a suitable optimizer specific analysing trade‐offs between speed higher accuracy levels. Moreover, this provides deeper analysis role play learning‐based models. discussion technical challenges posed by future improvements achieving much more optimal results concludes study.

Language: Английский

Citations

0

Bioinspired Adaptive Resource Scheduling for QoS in Mobile Edge Deployments DOI Creative Commons
Gagandeep Kaur, Balraj Singh,

Muhammad Faheem

et al.

IET Communications, Journal Year: 2025, Volume and Issue: 19(1)

Published: Jan. 1, 2025

ABSTRACT As mobile edge computing (MEC) expands, efficient resource allocation and job scheduling become increasingly important. Existing techniques are frequently unable to offer acceptable quality of service (QoS), owing inflexible algorithms insufficient consideration complex task metrics. To overcome these constraints, this work proposes a novel adaptive vector autoregressive moving average with exogenous variables (VARMAx)‐based bioinspired model designed specifically for deployment. The proposed approach applies the resilient concepts flower pollination optimisation (FPO) map tasks virtual machines (VMs), technique that is sensitive wide variety such as makespan, deadline CPU needs. Simultaneously, VM characteristics million instructions per second (MIPS), amount cores, random access memory (RAM), availability bandwidth all taken into account, resulting in more nuanced process. Furthermore, VARMAx included pre‐emption, which assists recalibration future capabilities, hence improving overall efficiency, particularly real‐time deployments. suggested outperforms existing techniques. Our results show an 8.3% reduction 4.5% improvement hit ratio, 8.5% increase energy 10.4% throughput. huge improvements highlight model's adaptability efficacy, important advances field QoS‐aware MEC. This represents significant advancement effective scheduling, potential guide research development efforts

Language: Английский

Citations

0