Smart grid (SG) introduced proven power system, based on modernized power delivery system with introduction of advanced data-information and communication technologies (ICT). SGs include improved quality of power transmission/distribution from power generation to end-users with optimized power flow and efficiency. In addition to above modern automation, two-way communications, advanced monitoring, and control to optimize power quality issues are the classic features of SGs. This ensures the efficiency and reliability of all its interconnected power system elements against potential threats and life time cycle. By integrating ICT into the power system SGs improved the working capabilities of the utility companies. Resultant of ICT with SG leads to better management of assets and ensure energy management for end users. This review article presents the different areas of communication and information technology areas involved in SG automation.
User data protection is a major problem in the technical world. To get critical data from people such as bank account, credit card details and passwords, fraudulent people use different techniques for their advantages. Misuse of user credentials affects many industry sectors day by day. The fraudulent practice where more people connected to a network revealing sensitive data of individual, group or a company of legitimate sources called phishing. The aids for the hackers are forged websites and emails which look similar as original. There are different anti-phishing methods are proposed which follows various methods, to protect users against phishing. Proposed technique has detection of phishing at various stages. It contains incoming mail analysis for its feature as well as source. If mail has link to webpage, that cautious webpage is checked for its legitimateness. It is examined by using two methods. For popular sites, webpage content is compared with content of known legitimate site. The second step is to find whether any cautious site is increasingly dependable on any related pages to calculate relationship strength indirectly or directly associated pages. To protect from phishing attacks, these techniques uses virtual passwords for logging into sites.
In this proposed embedded car security system, FDS(Face Detection System) is used to detect the face of the driver and compare it with the predefined face. For example, in the night when the car’s owner is sleeping and someone theft the car then FDS obtains images by one tiny web camera which can be hidden easily in somewhere in the car. FDS compares the obtained image with the predefined images if the image doesn’t match, then the information is sent to the owner through MMS. So now owner can obtain the image of the thief in his mobile as well as he can trace the location through GPS. The location of the car as well as its speed can be displayed to the owner through SMS. So by using this system, owner can identify the thief image as well as the location of the car This system prototype is built on the base of one embedded platform in which one SoC named “SEP4020”(works at 100MHz) controls all the processes .Experimental results illuminate the validity of this car security system.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.