This document provides a survey of research on optimally placing virtual security network functions (VSNFs) in software-defined networking (SDN) and network function virtualization (NFV) ecosystems. It begins with background information on SDN, NFV, and the relationship between the two technologies. Common VSNFs like intrusion detection systems, firewalls, and malware scanners are described. The document then reviews and compares studies that have examined objectives for optimal VSNF placement like cost, delay, security requirements, and resource usage. It identifies open challenges in VSNF placement and provides suggestions for future research directions.
Efficient Provisioning of On-Demand Security Services using Chained Virtual S...IRJET Journal
This document presents a model called On-Demand Virtual Security Services (ODVSS) for efficiently provisioning virtualized security network functions (VSNFs) in an SDN/NFV environment. It formulates the VSNF placement problem as an integer linear program (ILP) that aims to minimize end-to-end latency while satisfying resource, routing, and security constraints. The ILP is used to determine the optimal locations for VSNFs and paths between them. As the problem is NP-hard, the document also proposes a heuristic algorithm based on branch-and-cut search to find near-optimal solutions. Simulation results show that ODVSS significantly reduces latency and resource usage compared to other VSNF
Software Defined Network Based Internet on thing Eco System for ShopfloorIRJET Journal
This document proposes a software defined network (SDN) based architecture for internet of things (IoT) devices on a manufacturing shop floor. It aims to achieve high availability, security, and real-time data transfer. The SDN architecture separates the control plane from the data plane, allowing for centralized, programmable network management. IoT sensors, actuators, and mobile devices are integrated with machines to collect and transmit production data. The proposed system uses SDN to securely connect IoT devices to cloud servers via an IoT controller, addressing challenges around IoT security, scalability, and data handling on the manufacturing network.
Software Defined Networking Architecture for Empowering Internet of Things & ...IRJET Journal
This document discusses software defined networking (SDN) and its potential to enhance security and empower the internet of things (IoT). It begins with an overview of SDN architecture and how it decouples the control plane from the data plane, allowing for centralized programmable control. This is seen as an improvement over traditional networking architectures which are not scalable and make configuration difficult. The document then reviews literature on using SDN to prevent attacks on IoT networks, provide visibility and control of traffic flows, and leverage SDN features to benefit security. In conclusion, SDN is presented as a promising approach for managing complex IoT environments and adapting dynamically to changing needs.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
This document analyzes the performance of wireless trusted software defined networks (SDNs) by considering metrics like energy consumption, throughput, end-to-end delay, and packet delivery ratio. It finds that SDNs perform better than conventional networks without SDN capabilities. It also compares the energy consumption of different SDN topology models. The key findings are that SDNs provide centralized control, programmability, and flexibility that improve performance compared to traditional networks. Additionally, different SDN topology models have varying levels of energy efficiency.
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
The document discusses using machine learning to strengthen 5G infrastructure security. It begins by introducing 5G and its role in enabling IoT technologies by providing faster data transmission and lower latency. However, it notes 5G also faces security challenges like resource management, bandwidth, and latency issues. It then proposes using machine learning algorithms like autoencoders and recurrent neural networks to detect anomalies, optimize resource allocation based on usage predictions, and prioritize traffic to critical applications. This would help secure 5G networks from threats while efficiently managing resources.
The document discusses implementing a hybrid SDN network at RAF Company by introducing SDN functionality into the wireless network segment. A Floodlight controller was installed on a virtual machine to optimize traffic forwarding and provide flexible allocation of wireless resources. Applications were developed to dynamically manage network security and control user throughput. The benefits of SDN for enterprises include network programmability, simplified management, reduced costs, and the ability to accelerate services to meet business needs.
An Analysis on Software Defined Wireless Network using Stride ModelIRJET Journal
This document analyzes the security of two software defined wireless network monitoring tools, sFlow and FlowVisor, using the STRIDE threat model. It finds that sFlow requires secure external deployment and storage of flow data to ensure security, while FlowVisor has built-in access control but isolated flows still require additional security. A comparison shows sFlow is open-source while FlowVisor provides network virtualization, and both could benefit from further vulnerability mitigation. The STRIDE analysis identifies threats including spoofing, tampering, denial of service, and privilege escalation that must be addressed for these tools to securely monitor software defined wireless networks.
Efficient Provisioning of On-Demand Security Services using Chained Virtual S...IRJET Journal
This document presents a model called On-Demand Virtual Security Services (ODVSS) for efficiently provisioning virtualized security network functions (VSNFs) in an SDN/NFV environment. It formulates the VSNF placement problem as an integer linear program (ILP) that aims to minimize end-to-end latency while satisfying resource, routing, and security constraints. The ILP is used to determine the optimal locations for VSNFs and paths between them. As the problem is NP-hard, the document also proposes a heuristic algorithm based on branch-and-cut search to find near-optimal solutions. Simulation results show that ODVSS significantly reduces latency and resource usage compared to other VSNF
Software Defined Network Based Internet on thing Eco System for ShopfloorIRJET Journal
This document proposes a software defined network (SDN) based architecture for internet of things (IoT) devices on a manufacturing shop floor. It aims to achieve high availability, security, and real-time data transfer. The SDN architecture separates the control plane from the data plane, allowing for centralized, programmable network management. IoT sensors, actuators, and mobile devices are integrated with machines to collect and transmit production data. The proposed system uses SDN to securely connect IoT devices to cloud servers via an IoT controller, addressing challenges around IoT security, scalability, and data handling on the manufacturing network.
Software Defined Networking Architecture for Empowering Internet of Things & ...IRJET Journal
This document discusses software defined networking (SDN) and its potential to enhance security and empower the internet of things (IoT). It begins with an overview of SDN architecture and how it decouples the control plane from the data plane, allowing for centralized programmable control. This is seen as an improvement over traditional networking architectures which are not scalable and make configuration difficult. The document then reviews literature on using SDN to prevent attacks on IoT networks, provide visibility and control of traffic flows, and leverage SDN features to benefit security. In conclusion, SDN is presented as a promising approach for managing complex IoT environments and adapting dynamically to changing needs.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
This document analyzes the performance of wireless trusted software defined networks (SDNs) by considering metrics like energy consumption, throughput, end-to-end delay, and packet delivery ratio. It finds that SDNs perform better than conventional networks without SDN capabilities. It also compares the energy consumption of different SDN topology models. The key findings are that SDNs provide centralized control, programmability, and flexibility that improve performance compared to traditional networks. Additionally, different SDN topology models have varying levels of energy efficiency.
SECURING AND STRENGTHENING 5G BASED INFRASTRUCTURE USING MLIRJET Journal
The document discusses using machine learning to strengthen 5G infrastructure security. It begins by introducing 5G and its role in enabling IoT technologies by providing faster data transmission and lower latency. However, it notes 5G also faces security challenges like resource management, bandwidth, and latency issues. It then proposes using machine learning algorithms like autoencoders and recurrent neural networks to detect anomalies, optimize resource allocation based on usage predictions, and prioritize traffic to critical applications. This would help secure 5G networks from threats while efficiently managing resources.
The document discusses implementing a hybrid SDN network at RAF Company by introducing SDN functionality into the wireless network segment. A Floodlight controller was installed on a virtual machine to optimize traffic forwarding and provide flexible allocation of wireless resources. Applications were developed to dynamically manage network security and control user throughput. The benefits of SDN for enterprises include network programmability, simplified management, reduced costs, and the ability to accelerate services to meet business needs.
An Analysis on Software Defined Wireless Network using Stride ModelIRJET Journal
This document analyzes the security of two software defined wireless network monitoring tools, sFlow and FlowVisor, using the STRIDE threat model. It finds that sFlow requires secure external deployment and storage of flow data to ensure security, while FlowVisor has built-in access control but isolated flows still require additional security. A comparison shows sFlow is open-source while FlowVisor provides network virtualization, and both could benefit from further vulnerability mitigation. The STRIDE analysis identifies threats including spoofing, tampering, denial of service, and privilege escalation that must be addressed for these tools to securely monitor software defined wireless networks.
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
This document discusses Zigbee for vehicular communication systems. It begins with an introduction to vehicular communication and the need to develop effective communication systems for intelligent transportation systems. It then discusses some key aspects of vehicular communication systems, including long vehicle lifespans, physical access by owners, and robustness requirements. The document also discusses the SeVeCom implementation of a baseline security architecture for vehicular communication systems, including modules for secure communication, privacy protection, and in-vehicle security. It describes how components are integrated with the communication stack through a hooking architecture and interfaces.
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
Cloud computing has emerged as the actual trend in business information technology service models, since it provides processing that is both costeffective and scalable. Enterprise networks are adopting software-defined networking (SDN) for network management flexibility and lower operating costs. Information technology (IT) services for enterprises tend to use both technologies. Yet, the effects of cloud computing and software defined networking on business network security are unclear. This study addresses this crucial issue. In a business network that uses both technologies, we start by looking at security, namely distributed denial-of-service (DDoS) attack defensive methods. SDN technology may help organizations protect against DDoS assaults provided the defensive architecture is structured appropriately. To mitigate DDoS attacks, we offer a highly configurable network monitoring and flexible control framework. We present a dataset shift-resistant graphic model-based attack detection system for the new architecture. The simulation findings demonstrate that our architecture can efficiently meet the security concerns of the new network paradigm and that our attack detection system can report numerous threats using real-world network data.
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...IRJET Journal
This document summarizes a survey on using machine learning techniques in an SDN-based network intrusion detection system. It discusses how SDN allows centralized control and monitoring of network traffic. Machine learning and deep learning can be applied to the monitored traffic to detect anomalies and threats. Specifically, the document examines using long short-term memory neural networks and artificial neural networks to classify traffic and improve detection accuracy in the SDN environment. The goal is to increase the effectiveness of the network intrusion detection system at identifying security issues.
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET Journal
This document reviews cluster-based routing protocols for wireless sensor networks. It discusses the challenges facing routing in WSNs such as limited energy, hardware constraints, and dynamic network topologies. It then categorizes cluster-based routing protocols into chain-based, tree-based, grid-based, and block-based approaches. A popular chain-based protocol called PEGASIS is described which forms sensor nodes into a chain to reduce data transmissions to the base station. The document aims to compare different cluster-based routing protocols to improve energy efficiency, network lifetime, and quality of service in WSNs.
Network Security Roadmap have some perception of provided securityslametarrokhim1
The document discusses security considerations for 5G networks. It notes that 5G networks integrate new technologies like SDN, virtualization and service-based architecture that introduce new threat models beyond those of previous generations. Effective 5G security will require measures across multiple layers, including mutual authentication, cloud-based threat analysis, quarantining infected devices, and multi-layered encryption of SDN data planes. The document also proposes studying vulnerabilities emerging from the integration of 5G components and systems, as well as formulating new stream ciphers, security protocols, and analyzing security challenges across application, edge and cloud layers.
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
This document discusses privacy and security concerns regarding database management and data storage in cloud servers. It proposes a solution using cryptosom generation to securely communicate with multiple cloud servers. The key points are:
1) Privacy and security are major concerns for organizations storing data in the cloud as data is no longer under their direct control.
2) The proposed method uses cryptosom generation and identity-based encryption to hide a user's identity and assign encryption keys, improving security of communications with cloud servers.
3) A proxy re-encryption scheme is also described that allows third parties to modify an encrypted ciphertext for one user so that it can be decrypted by another user, without revealing the secret value.
IRJET- Software Defined Network: DDOS Attack DetectionIRJET Journal
This document discusses software defined networks (SDNs) and detecting distributed denial-of-service (DDoS) attacks in SDNs. It provides background on SDN architecture and how DDoS attacks work. The paper aims to address risks of DDoS attacks in SDNs and focuses on detection. It describes existing DDoS attack techniques and solutions. The document proposes using algorithms like TCM-KNN and DPTCM-KNN for detection of attacks in network traffic flows, and compares the two algorithms using parameters like packet length and response time.
IRJET- Build SDN with Openflow ControllerIRJET Journal
This document summarizes a research paper on building an SDN network using an OpenFlow controller. It discusses how SDN addresses limitations in traditional network technologies by introducing programmability through the OpenFlow protocol. It proposes a firewall system for SDN networks to identify attacks and report intrusion events. The paper also implements a load balancing rule based on SDN specifications using Dijkstra's algorithm to find multiple equal cost paths, helping to scale the network. It describes how SDN can improve common network management tasks through paradigm deployments in the field.
This document discusses site-to-site VPNs which establish secure connections between two VPN gateways located in different networks over the internet. Site-to-site VPNs encrypt communication data between the VPN gateways to ensure security and integrity without requiring VPN clients on user computers. They can be supported by protocols like IPsec in tunnel mode or PPTP/L2TP over IPSec. The document outlines motivations for site-to-site VPNs like ubiquitous coverage across the internet, scalability without requiring new leased lines as networks grow, and cost reduction compared to separate private networks.
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSijcsit
Nowadays, Fog architecture or Edge architecture is becoming a popular research trend to distribute a
substantial amount of computing resources, data processing and resource management at the extreme edge
of the wireless sensor networks (WSNs). Industrial communication is a research track in next generation
wireless sensor networks for the fourth revolution in the industrial process. Adopting fog architecture into
Industrial communication systems is a promising technology within sensor networks architecture. With
Software Defined Network (SDN) architecture, in this paper, we address edge controller placement as an
optimization problem with the objective of more robustness while minimizing the delay of network
management and the associated synchronization overhead. The optimization problem is provided and
modelled as submodular function. Two algorithms are provided to find the optimal solution using a real
wireless network to get more realistic results. Greedy Algorithm and Connectivity Ranking Algorithm are
provided. Greedy algorithm outperforms connectivity ranking algorithm to find the optimum balance
between the different metrics. Also, based on the network operator preference, the number of edge
controllers to be placed will be provided. This research paper plays a great role in standardization of
softwarization into Industrial communication systems for next generation wireless sensor networks.
Nowadays, Fog architecture or Edge architecture is becoming a popular research trend to distribute a
substantial amount of computing resources, data processing and resource management at the extreme edge
of the wireless sensor networks (WSNs). Industrial communication is a research track in next generation
wireless sensor networks for the fourth revolution in the industrial process. Adopting fog architecture into
Industrial communication systems is a promising technology within sensor networks architecture. With
Software Defined Network (SDN) architecture, in this paper, we address edge controller placement as an
optimization problem with the objective of more robustness while minimizing the delay of network
management and the associated synchronization overhead. The optimization problem is provided and
modelled as submodular function. Two algorithms are provided to find the optimal solution using a real
wireless network to get more realistic results. Greedy Algorithm and Connectivity Ranking Algorithm are
provided. Greedy algorithm outperforms connectivity ranking algorithm to find the optimum balance
between the different metrics. Also, based on the network operator preference, the number of edge
controllers to be placed will be provided. This research paper plays a great role in standardization of
softwarization into Industrial communication systems for next generation wireless sensor networks.
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
This document discusses security and privacy issues related to cloud computing. It begins by providing background on cloud computing architectures and infrastructures. It then reviews existing literature on common security issues in cloud computing like confidentiality, authentication, access control, and privacy. It also discusses potential solutions that have been proposed, such as virtualization, encryption, access control frameworks, and risk-adaptable access control models. Finally, it proposes a two-tier authentication scheme within a risk-adaptable access control framework to help address security and privacy challenges in cloud computing.
The document discusses how future networking is being impacted by cloud/hybrid IT, software-defined networking, and network functions virtualization. Specifically:
1) The emergence of public cloud and hybrid IT models is driving more traffic to data centers and changing expectations around network flexibility and costs.
2) Software-defined WAN (SD-WAN) solutions allow businesses more control over their networks by using overlays to connect sites over multiple networks like broadband internet and MPLS.
3) Network functions virtualization (NFV) enables network functions to be deployed as software, increasing flexibility and reducing costs compared to hardware appliances.
Blockchain Technology using System Requirement Specification and IoT DevicesIRJET Journal
1) The document discusses using blockchain technology with IoT devices to improve security, transparency, and tracking of sensor data and device activities.
2) It proposes that all IoT devices first register on the blockchain network before providing or accessing services. This allows all device data and configurations to be securely stored and immutable on the blockchain.
3) By integrating IoT devices and sensors onto the blockchain, their data collection, product documentation and manufacturing can be easily and securely tracked. This helps resolve security and privacy issues with centralized IoT systems.
IRJET- Analysis of 5G Mobile Technologies and DDOS DefenseIRJET Journal
This document summarizes research on 5G mobile technologies and defenses against distributed denial-of-service (DDoS) attacks. It discusses two key 5G technologies: photonic technologies for 5G transport and data centers, which use fiber optics to transmit large amounts of data, and non-orthogonal multiple access (NOMA), which allows more users to be served simultaneously. It also discusses challenges of 5G such as interference and proposes software-defined networking and network function virtualization approaches to detect and mitigate DDoS attacks.
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyIRJET Journal
This document discusses lightweight cryptography algorithms for security in Internet of Things (IoT) devices. It provides an overview of IoT architecture and applications. It then discusses the need for lightweight cryptography due to constraints of IoT devices. Various lightweight cryptography algorithms are described, including symmetric key and asymmetric key algorithms. Challenges of lightweight cryptography are also outlined. Related work studying lightweight cryptography algorithms for IoT security is reviewed. The document analyzes and compares various lightweight cryptography algorithms suitable for securing resource-constrained IoT devices.
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...IRJET Journal
This document provides an overview of the evolution of 5G networks and technologies, security schemes, and multiple access schemes used in mobile communications. It discusses the challenges faced by existing 4G networks in handling increased data usage and more devices. 5G is presented as the next generation technology aimed to support data rates up to 10Gbps, latency of 1ms, widespread coverage and availability, and reduced energy consumption. The document reviews key 5G concepts and radio network evolution. It also summarizes two security protocols - EPS-AKA and J-PAKE - and compares multiple access schemes such as OFDMA and SC-FDMA used for uplink transmission. In concluding, the document states that 5G will revolutionize mobile communication
This document discusses using software defined networks (SDN) for smart grid communication. It begins with an introduction to SDNs and smart grids. It then describes the different communication networks that make up a smart grid: home area networks (HAN), neighborhood area networks (NAN), and wide area networks (WAN). SDNs are presented as a promising solution for managing the large number of devices in smart grids by providing a global view of the network and using open standards to configure elements. Adopting SDNs could reduce management costs for utilities and provide superior network control and bandwidth-on-demand capabilities for smart grids.
A conceptual architecture for integrating software defined network and netwo...IJECEIAES
Software defined network (SDN) and network function virtualization (NFV) are new paradigms and technologies of the network which support the best experience of providing functions and services, managing network traffic, and a new way of control. They support virtualization and separating data from control in network devices, as well as provide services in a softwarebased environment. Internet of things (IoT) is a heterogeneous network with a massive number of connected devices and objects. IoT should be integrated with such technologies for the purpose of providing the capabilities of dynamic reconfiguration with a high level of integration. This paper proposes a conceptual architecture for integrating SDN and NFV with IoT. The proposed work combines the three technologies together in one architecture. It also presents the previous works in this area and takes a look at the theoretical background of those technologies in order to give a complete view of proposed work.
Flexible handover solution for vehicular ad-hoc networks based on software de...IJECEIAES
Vehicular ad-hoc networks (VANET) suffer from dynamic network environment and topological instability that caused by high mobility feature and varying vehicles density. Emerging 5G mobile technologies offer new opportunities to design improved VANET architecture for future intelligent transportation system. However, current software defined networking (SDN) based handover schemes face poor handover performance in VANET environment with notable issues in connection establishment and ongoing communication sessions. These poor connectivity and inflexibility challenges appear at high vehicles speed and high data rate services. Therefore, this paper proposes a flexible handover solution for VANET networks by integrating SDN and fog computing (FC) technologies. The SDN provides global knowledge, programmability and intelligence functions for simplified and efficient network operation and management. FC, on the other hand, alleviates the core network pressure by providing real time computation and transmission functionalities at edge network to maintain the demands of delay sensitive applications. The proposed solution overcomes frequent handover challenges and reduces the processing overhead at core network. Moreover, the simulation evaluation shows significant handover performance improvement of the proposed solution compared to current SDN based schemes, especially in terms of handover latency and packet loss ratio under various simulation environments.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to A Survey on the Placement of Virtual Security Network Functions in Softwarised Networks
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
This document discusses Zigbee for vehicular communication systems. It begins with an introduction to vehicular communication and the need to develop effective communication systems for intelligent transportation systems. It then discusses some key aspects of vehicular communication systems, including long vehicle lifespans, physical access by owners, and robustness requirements. The document also discusses the SeVeCom implementation of a baseline security architecture for vehicular communication systems, including modules for secure communication, privacy protection, and in-vehicle security. It describes how components are integrated with the communication stack through a hooking architecture and interfaces.
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
Cloud computing has emerged as the actual trend in business information technology service models, since it provides processing that is both costeffective and scalable. Enterprise networks are adopting software-defined networking (SDN) for network management flexibility and lower operating costs. Information technology (IT) services for enterprises tend to use both technologies. Yet, the effects of cloud computing and software defined networking on business network security are unclear. This study addresses this crucial issue. In a business network that uses both technologies, we start by looking at security, namely distributed denial-of-service (DDoS) attack defensive methods. SDN technology may help organizations protect against DDoS assaults provided the defensive architecture is structured appropriately. To mitigate DDoS attacks, we offer a highly configurable network monitoring and flexible control framework. We present a dataset shift-resistant graphic model-based attack detection system for the new architecture. The simulation findings demonstrate that our architecture can efficiently meet the security concerns of the new network paradigm and that our attack detection system can report numerous threats using real-world network data.
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...IRJET Journal
This document summarizes a survey on using machine learning techniques in an SDN-based network intrusion detection system. It discusses how SDN allows centralized control and monitoring of network traffic. Machine learning and deep learning can be applied to the monitored traffic to detect anomalies and threats. Specifically, the document examines using long short-term memory neural networks and artificial neural networks to classify traffic and improve detection accuracy in the SDN environment. The goal is to increase the effectiveness of the network intrusion detection system at identifying security issues.
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET Journal
This document reviews cluster-based routing protocols for wireless sensor networks. It discusses the challenges facing routing in WSNs such as limited energy, hardware constraints, and dynamic network topologies. It then categorizes cluster-based routing protocols into chain-based, tree-based, grid-based, and block-based approaches. A popular chain-based protocol called PEGASIS is described which forms sensor nodes into a chain to reduce data transmissions to the base station. The document aims to compare different cluster-based routing protocols to improve energy efficiency, network lifetime, and quality of service in WSNs.
Network Security Roadmap have some perception of provided securityslametarrokhim1
The document discusses security considerations for 5G networks. It notes that 5G networks integrate new technologies like SDN, virtualization and service-based architecture that introduce new threat models beyond those of previous generations. Effective 5G security will require measures across multiple layers, including mutual authentication, cloud-based threat analysis, quarantining infected devices, and multi-layered encryption of SDN data planes. The document also proposes studying vulnerabilities emerging from the integration of 5G components and systems, as well as formulating new stream ciphers, security protocols, and analyzing security challenges across application, edge and cloud layers.
IRJET- Secure Database Management and Privacy Preserving in Cloud ServerIRJET Journal
This document discusses privacy and security concerns regarding database management and data storage in cloud servers. It proposes a solution using cryptosom generation to securely communicate with multiple cloud servers. The key points are:
1) Privacy and security are major concerns for organizations storing data in the cloud as data is no longer under their direct control.
2) The proposed method uses cryptosom generation and identity-based encryption to hide a user's identity and assign encryption keys, improving security of communications with cloud servers.
3) A proxy re-encryption scheme is also described that allows third parties to modify an encrypted ciphertext for one user so that it can be decrypted by another user, without revealing the secret value.
IRJET- Software Defined Network: DDOS Attack DetectionIRJET Journal
This document discusses software defined networks (SDNs) and detecting distributed denial-of-service (DDoS) attacks in SDNs. It provides background on SDN architecture and how DDoS attacks work. The paper aims to address risks of DDoS attacks in SDNs and focuses on detection. It describes existing DDoS attack techniques and solutions. The document proposes using algorithms like TCM-KNN and DPTCM-KNN for detection of attacks in network traffic flows, and compares the two algorithms using parameters like packet length and response time.
IRJET- Build SDN with Openflow ControllerIRJET Journal
This document summarizes a research paper on building an SDN network using an OpenFlow controller. It discusses how SDN addresses limitations in traditional network technologies by introducing programmability through the OpenFlow protocol. It proposes a firewall system for SDN networks to identify attacks and report intrusion events. The paper also implements a load balancing rule based on SDN specifications using Dijkstra's algorithm to find multiple equal cost paths, helping to scale the network. It describes how SDN can improve common network management tasks through paradigm deployments in the field.
This document discusses site-to-site VPNs which establish secure connections between two VPN gateways located in different networks over the internet. Site-to-site VPNs encrypt communication data between the VPN gateways to ensure security and integrity without requiring VPN clients on user computers. They can be supported by protocols like IPsec in tunnel mode or PPTP/L2TP over IPSec. The document outlines motivations for site-to-site VPNs like ubiquitous coverage across the internet, scalability without requiring new leased lines as networks grow, and cost reduction compared to separate private networks.
EDGE CONTROLLER PLACEMENT FOR NEXT GENERATION WIRELESS SENSOR NETWORKSijcsit
Nowadays, Fog architecture or Edge architecture is becoming a popular research trend to distribute a
substantial amount of computing resources, data processing and resource management at the extreme edge
of the wireless sensor networks (WSNs). Industrial communication is a research track in next generation
wireless sensor networks for the fourth revolution in the industrial process. Adopting fog architecture into
Industrial communication systems is a promising technology within sensor networks architecture. With
Software Defined Network (SDN) architecture, in this paper, we address edge controller placement as an
optimization problem with the objective of more robustness while minimizing the delay of network
management and the associated synchronization overhead. The optimization problem is provided and
modelled as submodular function. Two algorithms are provided to find the optimal solution using a real
wireless network to get more realistic results. Greedy Algorithm and Connectivity Ranking Algorithm are
provided. Greedy algorithm outperforms connectivity ranking algorithm to find the optimum balance
between the different metrics. Also, based on the network operator preference, the number of edge
controllers to be placed will be provided. This research paper plays a great role in standardization of
softwarization into Industrial communication systems for next generation wireless sensor networks.
Nowadays, Fog architecture or Edge architecture is becoming a popular research trend to distribute a
substantial amount of computing resources, data processing and resource management at the extreme edge
of the wireless sensor networks (WSNs). Industrial communication is a research track in next generation
wireless sensor networks for the fourth revolution in the industrial process. Adopting fog architecture into
Industrial communication systems is a promising technology within sensor networks architecture. With
Software Defined Network (SDN) architecture, in this paper, we address edge controller placement as an
optimization problem with the objective of more robustness while minimizing the delay of network
management and the associated synchronization overhead. The optimization problem is provided and
modelled as submodular function. Two algorithms are provided to find the optimal solution using a real
wireless network to get more realistic results. Greedy Algorithm and Connectivity Ranking Algorithm are
provided. Greedy algorithm outperforms connectivity ranking algorithm to find the optimum balance
between the different metrics. Also, based on the network operator preference, the number of edge
controllers to be placed will be provided. This research paper plays a great role in standardization of
softwarization into Industrial communication systems for next generation wireless sensor networks.
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
This document discusses security and privacy issues related to cloud computing. It begins by providing background on cloud computing architectures and infrastructures. It then reviews existing literature on common security issues in cloud computing like confidentiality, authentication, access control, and privacy. It also discusses potential solutions that have been proposed, such as virtualization, encryption, access control frameworks, and risk-adaptable access control models. Finally, it proposes a two-tier authentication scheme within a risk-adaptable access control framework to help address security and privacy challenges in cloud computing.
The document discusses how future networking is being impacted by cloud/hybrid IT, software-defined networking, and network functions virtualization. Specifically:
1) The emergence of public cloud and hybrid IT models is driving more traffic to data centers and changing expectations around network flexibility and costs.
2) Software-defined WAN (SD-WAN) solutions allow businesses more control over their networks by using overlays to connect sites over multiple networks like broadband internet and MPLS.
3) Network functions virtualization (NFV) enables network functions to be deployed as software, increasing flexibility and reducing costs compared to hardware appliances.
Blockchain Technology using System Requirement Specification and IoT DevicesIRJET Journal
1) The document discusses using blockchain technology with IoT devices to improve security, transparency, and tracking of sensor data and device activities.
2) It proposes that all IoT devices first register on the blockchain network before providing or accessing services. This allows all device data and configurations to be securely stored and immutable on the blockchain.
3) By integrating IoT devices and sensors onto the blockchain, their data collection, product documentation and manufacturing can be easily and securely tracked. This helps resolve security and privacy issues with centralized IoT systems.
IRJET- Analysis of 5G Mobile Technologies and DDOS DefenseIRJET Journal
This document summarizes research on 5G mobile technologies and defenses against distributed denial-of-service (DDoS) attacks. It discusses two key 5G technologies: photonic technologies for 5G transport and data centers, which use fiber optics to transmit large amounts of data, and non-orthogonal multiple access (NOMA), which allows more users to be served simultaneously. It also discusses challenges of 5G such as interference and proposes software-defined networking and network function virtualization approaches to detect and mitigate DDoS attacks.
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyIRJET Journal
This document discusses lightweight cryptography algorithms for security in Internet of Things (IoT) devices. It provides an overview of IoT architecture and applications. It then discusses the need for lightweight cryptography due to constraints of IoT devices. Various lightweight cryptography algorithms are described, including symmetric key and asymmetric key algorithms. Challenges of lightweight cryptography are also outlined. Related work studying lightweight cryptography algorithms for IoT security is reviewed. The document analyzes and compares various lightweight cryptography algorithms suitable for securing resource-constrained IoT devices.
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...IRJET Journal
This document provides an overview of the evolution of 5G networks and technologies, security schemes, and multiple access schemes used in mobile communications. It discusses the challenges faced by existing 4G networks in handling increased data usage and more devices. 5G is presented as the next generation technology aimed to support data rates up to 10Gbps, latency of 1ms, widespread coverage and availability, and reduced energy consumption. The document reviews key 5G concepts and radio network evolution. It also summarizes two security protocols - EPS-AKA and J-PAKE - and compares multiple access schemes such as OFDMA and SC-FDMA used for uplink transmission. In concluding, the document states that 5G will revolutionize mobile communication
This document discusses using software defined networks (SDN) for smart grid communication. It begins with an introduction to SDNs and smart grids. It then describes the different communication networks that make up a smart grid: home area networks (HAN), neighborhood area networks (NAN), and wide area networks (WAN). SDNs are presented as a promising solution for managing the large number of devices in smart grids by providing a global view of the network and using open standards to configure elements. Adopting SDNs could reduce management costs for utilities and provide superior network control and bandwidth-on-demand capabilities for smart grids.
A conceptual architecture for integrating software defined network and netwo...IJECEIAES
Software defined network (SDN) and network function virtualization (NFV) are new paradigms and technologies of the network which support the best experience of providing functions and services, managing network traffic, and a new way of control. They support virtualization and separating data from control in network devices, as well as provide services in a softwarebased environment. Internet of things (IoT) is a heterogeneous network with a massive number of connected devices and objects. IoT should be integrated with such technologies for the purpose of providing the capabilities of dynamic reconfiguration with a high level of integration. This paper proposes a conceptual architecture for integrating SDN and NFV with IoT. The proposed work combines the three technologies together in one architecture. It also presents the previous works in this area and takes a look at the theoretical background of those technologies in order to give a complete view of proposed work.
Flexible handover solution for vehicular ad-hoc networks based on software de...IJECEIAES
Vehicular ad-hoc networks (VANET) suffer from dynamic network environment and topological instability that caused by high mobility feature and varying vehicles density. Emerging 5G mobile technologies offer new opportunities to design improved VANET architecture for future intelligent transportation system. However, current software defined networking (SDN) based handover schemes face poor handover performance in VANET environment with notable issues in connection establishment and ongoing communication sessions. These poor connectivity and inflexibility challenges appear at high vehicles speed and high data rate services. Therefore, this paper proposes a flexible handover solution for VANET networks by integrating SDN and fog computing (FC) technologies. The SDN provides global knowledge, programmability and intelligence functions for simplified and efficient network operation and management. FC, on the other hand, alleviates the core network pressure by providing real time computation and transmission functionalities at edge network to maintain the demands of delay sensitive applications. The proposed solution overcomes frequent handover challenges and reduces the processing overhead at core network. Moreover, the simulation evaluation shows significant handover performance improvement of the proposed solution compared to current SDN based schemes, especially in terms of handover latency and packet loss ratio under various simulation environments.
Similar to A Survey on the Placement of Virtual Security Network Functions in Softwarised Networks (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.