This document summarizes a research paper that proposes implementing and analyzing cryptography techniques for 5G applications using Xilinx. It discusses how lightweight cryptography plays an important role in securing data for devices with limited resources in IoT and 5G networks. The research aims to develop an efficient VLSI architecture for a lightweight encryption algorithm and compare its performance to existing algorithms. It will simulate the design using Verilog code in Xilinx and evaluate performance metrics like latency, area, power consumption and throughput.
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
This document discusses security aspects of internet of things (IoT) devices and proposes solutions. It summarizes 3 existing approaches:
1) An IoT reference model that includes authorization, encryption, and authentication mechanisms at each layer independently.
2) A protocol for IoT security using elliptic curve cryptography to allow encryption and decryption of messages between devices and gateways.
3) A mechanism using elliptic curve cryptography to provide security for communication between IPv4 and IPv6 networks, translating addresses and incorporating encryption.
The document also motivates the need for lightweight cryptographic algorithms for resource-constrained IoT devices and surveys existing schemes to provide confidentiality, integrity, and availability while addressing vulnerabilities.
Application Layer Security for IoT: The Case Study of a Smart HomeIRJET Journal
This document summarizes a research paper that applied application layer security protocols to a simulated smart home system using the Contiki-NG operating system. The researchers first designed a smart home network in Cooja simulator with various sensor nodes communicating with a border router and cloud. They then added the OSCORE and EDHOC security protocols to encrypt communication between the nodes. Finally, they evaluated the impact of applying these protocols on memory footprint and energy consumption compared to an unsecured implementation. The results showed that the current implementation introduced a small overhead compared to other security solutions.
A novel architecture for lightweight block cipher, piccoloeSAT Journals
This document summarizes a novel architecture for the Piccolo lightweight block cipher that is optimized for constrained devices like RFID tags and wireless sensors. Piccolo has a 64-bit block size and supports 80-bit or 128-bit keys. The proposed architecture shares the key scheduling block for two plaintext blocks concurrently to improve throughput and speed compared to the conventional Piccolo architecture. The new architecture is implemented using Matlab simulation software.
Lightweight ANU-II block cipher on field programmable gate arrayIJECEIAES
Nowadays the number of embedded devices communicating over a network is increasing. Thus, the need for security appeared. Considering various constraints for the limited resources devices is very important. These constraints include power, memory, area and latency. A perfect environment for satisfying requirements of security in limited resources devices is lightweight cryptography. A recent lightweight algorithm that has a low area and high throughput which is the ANU-II block cipher. Many technologies like the internet of things (IoT) needed lightweight hardware architectures to provide security for it. In IoT issues like the size of memory, power consumption and smaller gate counts need to take care of by using lightweight cryptography. This paper presents hardware lightweight data path implementation for the ANU-II algorithm using field programmable gate array (FPGA). This paper presents a hardware implementation of a 64-bit ANU-II block cipher. Also, this research presents comparisons based on various design metrics among our data path for the ANU-II cipher and other existing data path designs. The result of the proposed design shows a high throughput of 1502.31, 1951.86, and 2696.47 Mbps. Also, it shows the high efficiency of 7.0201, 31.9977, and 10.6579 Mbps/slice as compared to other ciphers in this paper.
4.report (cryptography & computer network)JIEMS Akkalkuwa
This document discusses network security and cryptography. It begins by defining network security and explaining the key areas of secrecy, authentication, non-repudiation, and integrity control. It then discusses what cryptography is, explaining that it uses mathematics to encrypt and decrypt data to provide security. The document provides an overview of symmetric and asymmetric key encryption techniques as well as hash functions. It also discusses some existing network security systems and their use of symmetric encryption with periodic key distribution and refresh.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
IRJET - A Review on Crypto-Algorithm using Different HardwareIRJET Journal
This document reviews different cryptography algorithms that have been implemented using hardware. It discusses algorithms like AES, DES, RSA, ECC, SHA-1, and RC6 that have been used to encrypt and decrypt data. The review focuses on research that has implemented these algorithms on hardware, including FPGAs, to evaluate aspects like security, speed, power consumption, and throughput. It summarizes 13 research papers that have studied implementing cryptography algorithms like AES, DES, RSA, ECC, and SHA-1 on different hardware, finding that algorithms like AES, ECC, and SHA-1 have advantages for security, speed and low power consumption.
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
This document discusses security aspects of internet of things (IoT) devices and proposes solutions. It summarizes 3 existing approaches:
1) An IoT reference model that includes authorization, encryption, and authentication mechanisms at each layer independently.
2) A protocol for IoT security using elliptic curve cryptography to allow encryption and decryption of messages between devices and gateways.
3) A mechanism using elliptic curve cryptography to provide security for communication between IPv4 and IPv6 networks, translating addresses and incorporating encryption.
The document also motivates the need for lightweight cryptographic algorithms for resource-constrained IoT devices and surveys existing schemes to provide confidentiality, integrity, and availability while addressing vulnerabilities.
Application Layer Security for IoT: The Case Study of a Smart HomeIRJET Journal
This document summarizes a research paper that applied application layer security protocols to a simulated smart home system using the Contiki-NG operating system. The researchers first designed a smart home network in Cooja simulator with various sensor nodes communicating with a border router and cloud. They then added the OSCORE and EDHOC security protocols to encrypt communication between the nodes. Finally, they evaluated the impact of applying these protocols on memory footprint and energy consumption compared to an unsecured implementation. The results showed that the current implementation introduced a small overhead compared to other security solutions.
A novel architecture for lightweight block cipher, piccoloeSAT Journals
This document summarizes a novel architecture for the Piccolo lightweight block cipher that is optimized for constrained devices like RFID tags and wireless sensors. Piccolo has a 64-bit block size and supports 80-bit or 128-bit keys. The proposed architecture shares the key scheduling block for two plaintext blocks concurrently to improve throughput and speed compared to the conventional Piccolo architecture. The new architecture is implemented using Matlab simulation software.
Lightweight ANU-II block cipher on field programmable gate arrayIJECEIAES
Nowadays the number of embedded devices communicating over a network is increasing. Thus, the need for security appeared. Considering various constraints for the limited resources devices is very important. These constraints include power, memory, area and latency. A perfect environment for satisfying requirements of security in limited resources devices is lightweight cryptography. A recent lightweight algorithm that has a low area and high throughput which is the ANU-II block cipher. Many technologies like the internet of things (IoT) needed lightweight hardware architectures to provide security for it. In IoT issues like the size of memory, power consumption and smaller gate counts need to take care of by using lightweight cryptography. This paper presents hardware lightweight data path implementation for the ANU-II algorithm using field programmable gate array (FPGA). This paper presents a hardware implementation of a 64-bit ANU-II block cipher. Also, this research presents comparisons based on various design metrics among our data path for the ANU-II cipher and other existing data path designs. The result of the proposed design shows a high throughput of 1502.31, 1951.86, and 2696.47 Mbps. Also, it shows the high efficiency of 7.0201, 31.9977, and 10.6579 Mbps/slice as compared to other ciphers in this paper.
4.report (cryptography & computer network)JIEMS Akkalkuwa
This document discusses network security and cryptography. It begins by defining network security and explaining the key areas of secrecy, authentication, non-repudiation, and integrity control. It then discusses what cryptography is, explaining that it uses mathematics to encrypt and decrypt data to provide security. The document provides an overview of symmetric and asymmetric key encryption techniques as well as hash functions. It also discusses some existing network security systems and their use of symmetric encryption with periodic key distribution and refresh.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
IRJET - A Review on Crypto-Algorithm using Different HardwareIRJET Journal
This document reviews different cryptography algorithms that have been implemented using hardware. It discusses algorithms like AES, DES, RSA, ECC, SHA-1, and RC6 that have been used to encrypt and decrypt data. The review focuses on research that has implemented these algorithms on hardware, including FPGAs, to evaluate aspects like security, speed, power consumption, and throughput. It summarizes 13 research papers that have studied implementing cryptography algorithms like AES, DES, RSA, ECC, and SHA-1 on different hardware, finding that algorithms like AES, ECC, and SHA-1 have advantages for security, speed and low power consumption.
Accessory authentication on NFC enabled product using three pass AES algorithmIRJET Journal
This document proposes a model for authenticating accessories for NFC-enabled products using AES encryption. It involves the following:
1. Establishing communication between an NFC reader in the product and an NFC tag in the accessory.
2. Performing mutual authentication between the reader and tag through a three-pass AES encryption algorithm (AES-128) run in either AES-ECB or AES-CBC mode.
3. Authenticating that the reader and tag are paired counterparts from the same company, ensuring the accessory is genuine and high quality. This protects brands from counterfeits.
Examples given include authenticating toothbrush heads and blender jars that contain NFC tags paired with the NFC
Advancements in Network Infrastructure: Replication, Expansion, and Security ...IRJET Journal
This document describes research that replicates and expands on a previous paper about implementing a cloud-based middlebox solution to manage network infrastructure. The researchers established a client-server model redirecting traffic through a locally hosted middlebox to an AWS server. They validated that this replication achieved similar results to the original in terms of latency and bandwidth. Additionally, the researchers enhanced security by implementing multiple tunneling protocols, firewall configurations, and load balancing to provide improved performance and network security beyond the original paper's scope.
Design and Performance Analysis of 8 x 8 Network on Chip RouterIRJET Journal
This document describes a study that designed and analyzed the performance of an 8x8 network-on-chip router. The researchers implemented a 2D mesh network-on-chip router with four ports connected in each of the four directions (north, south, east, west) and a fifth port connected to a local processing element. The goal was to improve quality-of-service by employing algorithms like wormhole routing, arbitration, and crossbar switching. The router architecture and modules were designed and synthesized using Xilinx ISE to optimize for lower power consumption while maintaining high throughput and quality-of-service.
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
1) The document proposes a technique to detect and prevent rogue relay node attacks in 4G multihop wireless networks using a QoS-aware distributed security architecture based on Elliptic Curve Diffie-Hellman (ECDH) algorithm.
2) It generates a 4G multihop WiMAX network and implements ECDH for secure initial connection setup and authentication. It then generates a rogue node attack and uses ECDH's hop-by-hop authentication to detect the rogue node.
3) The architecture prevents the detected rogue node and forwards messages securely to the destination node. It evaluates the scheme's performance on QoS metrics like latency, jitter and packet loss rate.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their
implementation has posed several challenges insofar that they generate and process vast amounts of
security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and
constrained devices communicating with each other and being accessed ubiquitously through lossy
networks. In this scenario, the routing of data is a specific area of concern especially with the inherent
constraints and limiting properties of such devices like processing resources, memory capacity and battery
life. To suit these constraints and to provide the required connectivity, the IETF has developed several
standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be
compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing
Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management
mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In
addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared
with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be
better
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
The article proposes two different designs for the new block cipher algorithm of 128-bit block size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a parallel model to help improve the encryption/decryption speed. The differences of this design compared to the previous one
developed on Switchable Data Dependent Operations (SDDOs) lies in the hybrid of the controlled elements (CEs) in the structure. Each design has a specific strength that makes the selection more compatible with the objectives of each particular application. The designs all meet the high security standards and possess the ability to fight off the attacks currently known. The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for high effective integration.
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
The article proposes two different designs for the new block cipher algorithm of 128-bit block size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a parallel model to help improve the encryption/decryption speed. The differences of this design compared to the previous one developed on Switchable Data Dependent Operations (SDDOs) lies in the hybrid of the controlled elements (CEs) in the structure. Each design has a specific strength that makes the selection more compatible with
the objectives of each particular application. The designs all meet the high security standards and possess the ability to fight off the attacks currently known. The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for high effective integration.
IRJET- E-Commerce Website using Skyline QueriesIRJET Journal
This document discusses an e-commerce website that uses skyline queries to efficiently display prioritized product options to users. The proposed system allows for some negotiation of product prices between the user and data owner. Skyline queries are run on preprocessed and categorized big data to broadcast the best product matches. The system ensures security by running the skyline queries on encrypted user data stored in the cloud, so the cloud server has no visibility into the actual data, queries, or results. A secure skyline protocol is proposed to allow these queries to be run on encrypted data while maintaining privacy and semantic security.
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
The document discusses using machine learning to strengthen 5G infrastructure security. It begins by introducing 5G and its role in enabling IoT technologies by providing faster data transmission and lower latency. However, it notes 5G also faces security challenges like resource management, bandwidth, and latency issues. It then proposes using machine learning algorithms like autoencoders and recurrent neural networks to detect anomalies, optimize resource allocation based on usage predictions, and prioritize traffic to critical applications. This would help secure 5G networks from threats while efficiently managing resources.
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET Journal
This document proposes an energy efficient technique (ETREC) to reduce energy consumption in Internet of Things (IoT) networks based on packet size. It summarizes existing energy efficient routing protocols for IoT and identifies energy consumption as a key issue. The proposed ETREC technique selects the path with the minimum packet size from among available paths between a source and destination. It classifies paths as low, medium or maximum based on packet size and prioritizes forwarding along low packet size paths to minimize energy consumption. Simulation results using the Network Simulator 2 tool demonstrate that ETREC reduces energy consumption compared to existing techniques.
A LIGHT WEIGHT VLSI FRAME WORK FOR HIGHT CIPHER ON FPGAIRJET Journal
This document discusses the implementation of a lightweight VLSI design for the HIGHT cipher on an FPGA. It begins with an introduction to lightweight VLSI architecture and its applications in low-resource devices. It then provides background on the HIGHT cipher and discusses prior work implementing cryptographic algorithms on FPGAs. The document goes on to describe the proposed VLSI design for the HIGHT cipher, which is optimized for size, power, and speed. It achieves a throughput of 25 Mbps with an encryption/decryption delay of 0.64 ms. Evaluation results demonstrate the effectiveness and suitability of the design for low-power applications.
IRJET- Build SDN with Openflow ControllerIRJET Journal
This document summarizes a research paper on building an SDN network using an OpenFlow controller. It discusses how SDN addresses limitations in traditional network technologies by introducing programmability through the OpenFlow protocol. It proposes a firewall system for SDN networks to identify attacks and report intrusion events. The paper also implements a load balancing rule based on SDN specifications using Dijkstra's algorithm to find multiple equal cost paths, helping to scale the network. It describes how SDN can improve common network management tasks through paradigm deployments in the field.
Review on security techniques for field programmable gate arrayIAEME Publication
This document summarizes previous work on using ring oscillators for FPGA security. Ring oscillators exploit manufacturing process variations between chips to generate unique identifiers. Several papers are discussed that proposed using ring oscillators and other PUFs to authenticate FPGAs and protect against hardware attacks. The document also provides an overview of FPGA manufacturing processes and applications of ring oscillators for FPGA security including generating secret keys and device authentication.
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET Journal
This document proposes a secure data access control scheme for fog computing that uses attribute-based encryption (ABE) and attribute-based signatures (ABS). It aims to address the high computational costs of ABE and ABS encryption, decryption, and signing by outsourcing those operations to fog nodes. The scheme has five phases: system setup by an attribute authority, key generation, data encryption by the data owner and fog nodes, data decryption by fog nodes and users, and cipher text updating with signatures verified by the cloud service provider. It aims to provide secure access control and authentication for sensitive user data stored in the cloud while reducing the computational burden on resource-constrained IoT devices through outsourcing to fog nodes.
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
This document discusses privacy and security concerns regarding database management and data storage in cloud servers. It proposes a solution using cryptosom generation to securely communicate with multiple cloud servers. The key points are:
1) Privacy and security are major concerns for organizations storing data in the cloud as data is no longer under their direct control.
2) The proposed method uses cryptosom generation and identity-based encryption to hide a user's identity and assign encryption keys, improving security of communications with cloud servers.
3) A proxy re-encryption scheme is also described that allows third parties to modify an encrypted ciphertext for one user so that it can be decrypted by another user, without revealing the secret value.
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...IRJET Journal
This document summarizes a research paper that proposes a new technique for securing documents stored in the cloud using blockchain assisted public key encryption. The technique involves storing encrypted documents on a cloud server, while storing the encryption keys and keywords on separate secure key servers. Blockchain technology is used to distribute and track the keys. When a user wants to search for documents, the keywords are encrypted with Caesar cipher and stored on the separate key servers. This provides improved security over traditional methods that store all data and keys on the same cloud server. The researchers believe this distributed storage approach using blockchain for key management addresses security issues like document leakage that can occur when relying solely on a single cloud storage provider.
The document discusses wireless body area networks and wireless sensor networks. It describes the goals of the project which are to implement the Tate pairing and Weil pairing protocols, analyze their performance with respect to time and memory consumption, and implement the better performing one for security purposes. The document provides background on sensor network technology, including how sensors have evolved from large specialized systems to smaller low-power devices. It outlines some of the applications of wireless sensor networks.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
Accessory authentication on NFC enabled product using three pass AES algorithmIRJET Journal
This document proposes a model for authenticating accessories for NFC-enabled products using AES encryption. It involves the following:
1. Establishing communication between an NFC reader in the product and an NFC tag in the accessory.
2. Performing mutual authentication between the reader and tag through a three-pass AES encryption algorithm (AES-128) run in either AES-ECB or AES-CBC mode.
3. Authenticating that the reader and tag are paired counterparts from the same company, ensuring the accessory is genuine and high quality. This protects brands from counterfeits.
Examples given include authenticating toothbrush heads and blender jars that contain NFC tags paired with the NFC
Advancements in Network Infrastructure: Replication, Expansion, and Security ...IRJET Journal
This document describes research that replicates and expands on a previous paper about implementing a cloud-based middlebox solution to manage network infrastructure. The researchers established a client-server model redirecting traffic through a locally hosted middlebox to an AWS server. They validated that this replication achieved similar results to the original in terms of latency and bandwidth. Additionally, the researchers enhanced security by implementing multiple tunneling protocols, firewall configurations, and load balancing to provide improved performance and network security beyond the original paper's scope.
Design and Performance Analysis of 8 x 8 Network on Chip RouterIRJET Journal
This document describes a study that designed and analyzed the performance of an 8x8 network-on-chip router. The researchers implemented a 2D mesh network-on-chip router with four ports connected in each of the four directions (north, south, east, west) and a fifth port connected to a local processing element. The goal was to improve quality-of-service by employing algorithms like wormhole routing, arbitration, and crossbar switching. The router architecture and modules were designed and synthesized using Xilinx ISE to optimize for lower power consumption while maintaining high throughput and quality-of-service.
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
1) The document proposes a technique to detect and prevent rogue relay node attacks in 4G multihop wireless networks using a QoS-aware distributed security architecture based on Elliptic Curve Diffie-Hellman (ECDH) algorithm.
2) It generates a 4G multihop WiMAX network and implements ECDH for secure initial connection setup and authentication. It then generates a rogue node attack and uses ECDH's hop-by-hop authentication to detect the rogue node.
3) The architecture prevents the detected rogue node and forwards messages securely to the destination node. It evaluates the scheme's performance on QoS metrics like latency, jitter and packet loss rate.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their
implementation has posed several challenges insofar that they generate and process vast amounts of
security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and
constrained devices communicating with each other and being accessed ubiquitously through lossy
networks. In this scenario, the routing of data is a specific area of concern especially with the inherent
constraints and limiting properties of such devices like processing resources, memory capacity and battery
life. To suit these constraints and to provide the required connectivity, the IETF has developed several
standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be
compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing
Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management
mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In
addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared
with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be
better
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
The article proposes two different designs for the new block cipher algorithm of 128-bit block size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a parallel model to help improve the encryption/decryption speed. The differences of this design compared to the previous one
developed on Switchable Data Dependent Operations (SDDOs) lies in the hybrid of the controlled elements (CEs) in the structure. Each design has a specific strength that makes the selection more compatible with the objectives of each particular application. The designs all meet the high security standards and possess the ability to fight off the attacks currently known. The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for high effective integration.
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
The article proposes two different designs for the new block cipher algorithm of 128-bit block size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a parallel model to help improve the encryption/decryption speed. The differences of this design compared to the previous one developed on Switchable Data Dependent Operations (SDDOs) lies in the hybrid of the controlled elements (CEs) in the structure. Each design has a specific strength that makes the selection more compatible with
the objectives of each particular application. The designs all meet the high security standards and possess the ability to fight off the attacks currently known. The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for high effective integration.
IRJET- E-Commerce Website using Skyline QueriesIRJET Journal
This document discusses an e-commerce website that uses skyline queries to efficiently display prioritized product options to users. The proposed system allows for some negotiation of product prices between the user and data owner. Skyline queries are run on preprocessed and categorized big data to broadcast the best product matches. The system ensures security by running the skyline queries on encrypted user data stored in the cloud, so the cloud server has no visibility into the actual data, queries, or results. A secure skyline protocol is proposed to allow these queries to be run on encrypted data while maintaining privacy and semantic security.
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
The document discusses using machine learning to strengthen 5G infrastructure security. It begins by introducing 5G and its role in enabling IoT technologies by providing faster data transmission and lower latency. However, it notes 5G also faces security challenges like resource management, bandwidth, and latency issues. It then proposes using machine learning algorithms like autoencoders and recurrent neural networks to detect anomalies, optimize resource allocation based on usage predictions, and prioritize traffic to critical applications. This would help secure 5G networks from threats while efficiently managing resources.
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET Journal
This document proposes an energy efficient technique (ETREC) to reduce energy consumption in Internet of Things (IoT) networks based on packet size. It summarizes existing energy efficient routing protocols for IoT and identifies energy consumption as a key issue. The proposed ETREC technique selects the path with the minimum packet size from among available paths between a source and destination. It classifies paths as low, medium or maximum based on packet size and prioritizes forwarding along low packet size paths to minimize energy consumption. Simulation results using the Network Simulator 2 tool demonstrate that ETREC reduces energy consumption compared to existing techniques.
A LIGHT WEIGHT VLSI FRAME WORK FOR HIGHT CIPHER ON FPGAIRJET Journal
This document discusses the implementation of a lightweight VLSI design for the HIGHT cipher on an FPGA. It begins with an introduction to lightweight VLSI architecture and its applications in low-resource devices. It then provides background on the HIGHT cipher and discusses prior work implementing cryptographic algorithms on FPGAs. The document goes on to describe the proposed VLSI design for the HIGHT cipher, which is optimized for size, power, and speed. It achieves a throughput of 25 Mbps with an encryption/decryption delay of 0.64 ms. Evaluation results demonstrate the effectiveness and suitability of the design for low-power applications.
IRJET- Build SDN with Openflow ControllerIRJET Journal
This document summarizes a research paper on building an SDN network using an OpenFlow controller. It discusses how SDN addresses limitations in traditional network technologies by introducing programmability through the OpenFlow protocol. It proposes a firewall system for SDN networks to identify attacks and report intrusion events. The paper also implements a load balancing rule based on SDN specifications using Dijkstra's algorithm to find multiple equal cost paths, helping to scale the network. It describes how SDN can improve common network management tasks through paradigm deployments in the field.
Review on security techniques for field programmable gate arrayIAEME Publication
This document summarizes previous work on using ring oscillators for FPGA security. Ring oscillators exploit manufacturing process variations between chips to generate unique identifiers. Several papers are discussed that proposed using ring oscillators and other PUFs to authenticate FPGAs and protect against hardware attacks. The document also provides an overview of FPGA manufacturing processes and applications of ring oscillators for FPGA security including generating secret keys and device authentication.
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...IRJET Journal
This document proposes a secure data access control scheme for fog computing that uses attribute-based encryption (ABE) and attribute-based signatures (ABS). It aims to address the high computational costs of ABE and ABS encryption, decryption, and signing by outsourcing those operations to fog nodes. The scheme has five phases: system setup by an attribute authority, key generation, data encryption by the data owner and fog nodes, data decryption by fog nodes and users, and cipher text updating with signatures verified by the cloud service provider. It aims to provide secure access control and authentication for sensitive user data stored in the cloud while reducing the computational burden on resource-constrained IoT devices through outsourcing to fog nodes.
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
This document discusses privacy and security concerns regarding database management and data storage in cloud servers. It proposes a solution using cryptosom generation to securely communicate with multiple cloud servers. The key points are:
1) Privacy and security are major concerns for organizations storing data in the cloud as data is no longer under their direct control.
2) The proposed method uses cryptosom generation and identity-based encryption to hide a user's identity and assign encryption keys, improving security of communications with cloud servers.
3) A proxy re-encryption scheme is also described that allows third parties to modify an encrypted ciphertext for one user so that it can be decrypted by another user, without revealing the secret value.
REVIEW ON IMPLEMENTING BLOCKCHAIN ASSISTED PUBLIC KEY ENCRYPTION TECHNIQUE IN...IRJET Journal
This document summarizes a research paper that proposes a new technique for securing documents stored in the cloud using blockchain assisted public key encryption. The technique involves storing encrypted documents on a cloud server, while storing the encryption keys and keywords on separate secure key servers. Blockchain technology is used to distribute and track the keys. When a user wants to search for documents, the keywords are encrypted with Caesar cipher and stored on the separate key servers. This provides improved security over traditional methods that store all data and keys on the same cloud server. The researchers believe this distributed storage approach using blockchain for key management addresses security issues like document leakage that can occur when relying solely on a single cloud storage provider.
The document discusses wireless body area networks and wireless sensor networks. It describes the goals of the project which are to implement the Tate pairing and Weil pairing protocols, analyze their performance with respect to time and memory consumption, and implement the better performing one for security purposes. The document provides background on sensor network technology, including how sensors have evolved from large specialized systems to smaller low-power devices. It outlines some of the applications of wireless sensor networks.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
AI for Legal Research with applications, toolsmahaffeycheryld
AI applications in legal research include rapid document analysis, case law review, and statute interpretation. AI-powered tools can sift through vast legal databases to find relevant precedents and citations, enhancing research accuracy and speed. They assist in legal writing by drafting and proofreading documents. Predictive analytics help foresee case outcomes based on historical data, aiding in strategic decision-making. AI also automates routine tasks like contract review and due diligence, freeing up lawyers to focus on complex legal issues. These applications make legal research more efficient, cost-effective, and accessible.
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...PIMR BHOPAL
Variable frequency drive .A Variable Frequency Drive (VFD) is an electronic device used to control the speed and torque of an electric motor by varying the frequency and voltage of its power supply. VFDs are widely used in industrial applications for motor control, providing significant energy savings and precise motor operation.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.