This document discusses biometric security methods for mobile devices. It begins with an introduction to biometrics and how biometric authentication works. Then it discusses some key biometric security methods used by Apple iPhone and Samsung Galaxy mobile phones, including Touch ID fingerprint scanning and iris scanning. It explains how Apple and Samsung use encrypted enclaves and digital identifiers to securely store biometric data on the devices without transmitting it to external servers. Overall the document examines how leading mobile manufacturers are advancing biometric security features to authenticate users and protect sensitive data on smartphones.
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
Advancements in technology have created the possibility of greater assurance of proper travel document ownership, but some concerns regarding security and effectiveness remain unaddressed. Electronic passports have known a wide and fast deployment all around the world since the International Civil
Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific
country and limit the use of counterfeit documents by more accurate identification of an individual. This paper analyses the face, fingerprint, palmprint and iris biometric e-passport design. This papers focus on privacy and personal security of bearers of e-passports, the actual security benefit countries obtained by
the introduction of e-passports using face, fingerprint, palmprint and iris recognition systems. Researcher analyzed its main cryptographic features; the face fingerprint, palmprint and iris biometrics currently used with e-passports and considered the surrounding procedures. Researcher focused on vulnerabilities since anyone willing to bypass the system would choose the same approach. On the contrary, solely relying on them may pose a risk that did not exist with previous passports and border controls. The paper also provides a security analysis of the e-passport using face fingerprint, palmprint and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.
This document summarizes biometrics for secure e-transactions using mobile phones. It proposes a multi-biometric model that integrates voice, fingerprint, and facial scanning embedded in a mobile phone to make e-transactions more secure. It discusses how each biometric like facial recognition, fingerprint scanning, and voice recognition works and their practical challenges. Integrating multiple biometrics improves security but also has issues like some populations like the elderly having unreadable biometrics.
Biometric System Penetration in Resource Constrained Mobile Deviceijbbjournal
This document discusses implementing biometric authentication on mobile devices as a more secure alternative to passwords and PINs. It summarizes that as mobile devices take on more functions, data security is increasingly important. Biometric authentication using characteristics like fingerprints, iris scans, or facial recognition could provide secure and convenient access to mobile devices and data. The document also outlines some of the challenges to implementing biometric security on resource-constrained mobile devices, such as limited battery life, processing power, and screen/keyboard size.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
This document provides an overview of biometric technology and its applications. It discusses how biometrics uses physiological or behavioral characteristics to automatically identify or verify individuals. Some key points:
- Biometrics can provide secure authentication by linking an event to a particular individual, as opposed to passwords or tokens which can be shared or stolen.
- Common biometric traits include fingerprints, iris scans, facial recognition, and voice recognition. Technologies are being integrated into devices like phones, laptops, and ATMs.
- Biometric systems have subsystems for data collection, transmission, signal processing, decision making, and data storage. Accuracy is measured by false acceptance and false rejection rates.
- While biometrics provides strong
(1) The document discusses the topic of the Internet of Things (IoT). It defines IoT and traces its history from 1997.
(2) Key enabling technologies for IoT are identified as RFID, sensors, smart technologies, and nanotechnologies. The state of IoT research and development is reviewed.
(3) Potential applications of IoT are explored in various scenarios including shopping, food/nutrition, healthcare, smart homes, and transportation.
(4) Challenges of IoT are discussed around standardization, innovation management, privacy, security and governance. Potential solutions focus on legislation, education, and self-regulation.
(5) The future impact and role of
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
The use of Eye Gaze Gesture Interaction Artificial Intelligence Techniques fo...EECJOURNAL
With an increasing number of computer devices around us, and the increasing time we spend for interacting with such devices, we are vehemently motivated in finding new interaction methods which ease the use of computers or increase interaction efficiency. Eye tracking seems to be a promising technology to achieve this goal. This paper researches interaction methods based on eye gaze tracking technology with emphasis in PIN entry. Personal identification numbers (PINs) are one of the most common ways of electronic authentication these days and they are used in a wide variety of applications. The PIN-entry user study used three different gaze-based techniques for PIN entry. The first and second method used gaze pointing to enter the PIN on a number pad displayed on the screen. The first method used a dwell time of 800 milliseconds and the second method used a button, which had to be pressed when looking at the correct number on the number pad display. The second method was introduced as hardware key or gaze key, but called look & shoot method in the context of the user study as this name is self-explaining and got high acceptance by the participants. The third method used gaze gestures to enter the digits. The use of gaze gestures protects accidental input of wrong digits.
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
Advancements in technology have created the possibility of greater assurance of proper travel document ownership, but some concerns regarding security and effectiveness remain unaddressed. Electronic passports have known a wide and fast deployment all around the world since the International Civil
Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific
country and limit the use of counterfeit documents by more accurate identification of an individual. This paper analyses the face, fingerprint, palmprint and iris biometric e-passport design. This papers focus on privacy and personal security of bearers of e-passports, the actual security benefit countries obtained by
the introduction of e-passports using face, fingerprint, palmprint and iris recognition systems. Researcher analyzed its main cryptographic features; the face fingerprint, palmprint and iris biometrics currently used with e-passports and considered the surrounding procedures. Researcher focused on vulnerabilities since anyone willing to bypass the system would choose the same approach. On the contrary, solely relying on them may pose a risk that did not exist with previous passports and border controls. The paper also provides a security analysis of the e-passport using face fingerprint, palmprint and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.
This document summarizes biometrics for secure e-transactions using mobile phones. It proposes a multi-biometric model that integrates voice, fingerprint, and facial scanning embedded in a mobile phone to make e-transactions more secure. It discusses how each biometric like facial recognition, fingerprint scanning, and voice recognition works and their practical challenges. Integrating multiple biometrics improves security but also has issues like some populations like the elderly having unreadable biometrics.
Biometric System Penetration in Resource Constrained Mobile Deviceijbbjournal
This document discusses implementing biometric authentication on mobile devices as a more secure alternative to passwords and PINs. It summarizes that as mobile devices take on more functions, data security is increasingly important. Biometric authentication using characteristics like fingerprints, iris scans, or facial recognition could provide secure and convenient access to mobile devices and data. The document also outlines some of the challenges to implementing biometric security on resource-constrained mobile devices, such as limited battery life, processing power, and screen/keyboard size.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
This document provides an overview of biometric technology and its applications. It discusses how biometrics uses physiological or behavioral characteristics to automatically identify or verify individuals. Some key points:
- Biometrics can provide secure authentication by linking an event to a particular individual, as opposed to passwords or tokens which can be shared or stolen.
- Common biometric traits include fingerprints, iris scans, facial recognition, and voice recognition. Technologies are being integrated into devices like phones, laptops, and ATMs.
- Biometric systems have subsystems for data collection, transmission, signal processing, decision making, and data storage. Accuracy is measured by false acceptance and false rejection rates.
- While biometrics provides strong
(1) The document discusses the topic of the Internet of Things (IoT). It defines IoT and traces its history from 1997.
(2) Key enabling technologies for IoT are identified as RFID, sensors, smart technologies, and nanotechnologies. The state of IoT research and development is reviewed.
(3) Potential applications of IoT are explored in various scenarios including shopping, food/nutrition, healthcare, smart homes, and transportation.
(4) Challenges of IoT are discussed around standardization, innovation management, privacy, security and governance. Potential solutions focus on legislation, education, and self-regulation.
(5) The future impact and role of
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
The use of Eye Gaze Gesture Interaction Artificial Intelligence Techniques fo...EECJOURNAL
With an increasing number of computer devices around us, and the increasing time we spend for interacting with such devices, we are vehemently motivated in finding new interaction methods which ease the use of computers or increase interaction efficiency. Eye tracking seems to be a promising technology to achieve this goal. This paper researches interaction methods based on eye gaze tracking technology with emphasis in PIN entry. Personal identification numbers (PINs) are one of the most common ways of electronic authentication these days and they are used in a wide variety of applications. The PIN-entry user study used three different gaze-based techniques for PIN entry. The first and second method used gaze pointing to enter the PIN on a number pad displayed on the screen. The first method used a dwell time of 800 milliseconds and the second method used a button, which had to be pressed when looking at the correct number on the number pad display. The second method was introduced as hardware key or gaze key, but called look & shoot method in the context of the user study as this name is self-explaining and got high acceptance by the participants. The third method used gaze gestures to enter the digits. The use of gaze gestures protects accidental input of wrong digits.
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The SkinFoCAS Initiative
The document discusses the history and controversies surrounding human microchip implants. It describes some early commercial uses of implants for access control by employees, including cases in Spain and the US. However, implants are controversial as they present privacy and control issues if mandated, as well as technical risks. The document outlines both benefits claimed by proponents and concerns raised by critics regarding emerging implant technologies.
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...ijcsit
This document summarizes a research study that investigated the security vulnerabilities of white-label cloud-based IoT cameras. The study involved penetration testing of a Chinese-made IoT camera to identify vulnerabilities. The testing revealed that the camera's video stream could be hacked without the user's knowledge, compromising personal privacy. To address this, the study proposed methods for hardening the camera's security and educating users on protecting themselves from such attacks.
Internet of Things, the Next Internet RevolutionBob Hardian
The document discusses the Internet of Things (IoT). It provides definitions of IoT as connecting billions of smart devices and sensors into a digital network. Key points include:
- IoT is the next revolution beyond the Internet of people and will integrate physical objects, devices, vehicles into the Internet through sensors and software.
- IoT connects both the physical world of "atoms" like devices and things with the digital world of "bits" like information and data.
- Enabling technologies include RFID, wireless sensor networks, addressing schemes, and data/visualization technologies.
- Example applications are in personal, home, enterprise, utilities and mobile domains.
Inria - Cybersecurity: current challenges and Inria’s research directionsInria
Inria white books look at major current challenges in informatics and mathematics and show actions conducted by our project-teams to these challenges. Their goal is to describe the state-of-the-art of a given topic, showing its complexity, and to present existing, as well as emerging, research directions and their expected societal impact. This white book has been edited by Steve Kremer, Ludovic Mé, Didier Rémy and Vincent Roca. They coordinated the contributions from researchers of Inria teams (the complete list of contributors is given at the end of the book). Many thanks to Janet Bertot for proof-reading this document, as well as to François Pottier, Gabriel Scherrer, and Benjamin Smith who read parts of it.
Publication date: January 2019
The document presents questions about various topics including education, banking, industry, sport, computer ethics, intellectual property, hacking, communication, and the definition of intellectual property. Answer choices are provided for multiple choice questions on these topics. The questions assess knowledge on how different fields have been impacted by and rely on computerization.
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @DesDesiree Miloshevic
1) The document discusses a webinar on the Internet of Things (IoT) which refers to network connectivity between physical objects and their virtual representations.
2) IoT is generating hype but has not seen widespread commercial adoption yet. It will result in massive amounts of data being generated and uploaded to the cloud.
3) Issues discussed include privacy, security, data ownership, and the need for new regulation as IoT integration increases and more everyday objects become connected to the internet and each other.
Internet of things iot based real time gas leakage monitoring and controllingIAEME Publication
As the majority of the people in India uses Liquefied Petroleum Gas (LPG) as a fuel for
cooking, but in India the technology applied in this field (security) is very less. Liquefied petroleum
gas is a flammable gas, which has the potential to create a hazard. Therefore it is important that the
properties and safe handling of LPG are understood and applied in the domestic and
commercial/industrial situations.
The proposed paper is aimed at developing a prototype that constantly monitors the gas leak
with the help of the electronic sensors. This data is made available real time through real time feeds
over the internet. We intend to use Xively (new platform) to feed real time sensor data over the
internet. The sensor monitors, detects and raises an alarm whenever a gas leak or fire broke out
condition is detected. Then it raised an emergency alarm. The emergency alarm condition can be
handled through proper arrangement and alert message to rescue team, which could be an in house
rescue team. Based on the real time data feed connected to Xively, user can easily look at the history
of data and accurately determine the time and date at which emergency condition occurred. This data
helps in easily locating the root cause of the emergency condition occurred. This data helps in easily
locating the root cause of the emergency condition. So that one can know the complete detail of the
hazard.
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...IAEME Publication
In recent times and as far as technological advancement goes, the Internet of
Things is the trending topic in the world. Internet of Things popularly called IoT is the
internetworking of interconnected devices over the internet to enable interaction
between those devices without any human interference. Cisco predicts at least 50
billion of such devices to be available by the year 2020. This leaves a huge gap as to
the appropriate awareness and literacy of the world as a collective to be receptive of
the massive IoT technology overhaul coming in the nearest future. This paper gives a
little insight into the basics of IoT, its core fundamentals, its architecture and
furthermore contributes to knowledge the application of IoT to the education sector.
Considering the number of connected devices expected to be produced, it is expected
also that sufficient amount of personnel are trained in IoT systems adequately to meet
with the rising demand
Wearing safe: Physical and informational security in the age of the wearable ...Simon Fraser University
Wearable computing devices promise to deliver countless benefits to users. Moreover, they are among the most personal and unique computing devices of all, more so than laptops and tablets and even more so than smartphones. However, this uniqueness also brings with it a risk of security issues not encountered previously in information systems: the potential to not only compromise data, but also to physically harm the wearer. This article considers wearable device security from three perspectives: whether the threat is to the device and/or the individual, the role that the wearable device plays, and how holistic wearable device security strategies can be developed and monitored.
The document discusses the Internet of Things (IoT) and how it will be the next revolution after the Internet of People. It describes how IoT will connect billions of smart devices and sensors to form a digital nervous system that interacts seamlessly with people. It provides examples of current smart devices and applications in areas like health, home, city, and business. It also discusses some of the technologies and challenges in developing the IoT, such as handling the massive amount of data generated.
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Artificial intelligence in cyber defenseDinesh More
This document discusses the use of artificial intelligence in cyber defense. It argues that AI is needed to rapidly analyze large amounts of data and react to the evolving threats in cyberspace, which humans cannot do alone without considerable automation. The document provides an overview of artificial intelligence as a field, and surveys existing AI applications in cyber defense that use techniques like artificial neural networks, expert systems, intelligent agents, search algorithms, machine learning, and data mining. It concludes that while useful AI applications already exist, many cyber defense problems could be better solved by incorporating more intelligent methods.
This document discusses designing for the Internet of Things (IoT). It begins by defining the IoT as networks of physical objects with embedded sensors and actuators that communicate with other objects, databases, and people. It then discusses some challenges in designing for the IoT, including creating new interaction paradigms that leverage sensing capabilities while accommodating human behaviors. The document outlines characteristics of natural user interfaces for the IoT, such as considering context, cognitive load, social aspects, and movement. It provides examples of techniques for designing IoT interfaces, like bodystorming, gestural studies, prototyping, and usability testing.
SIEM-based detection and mitigation of IoT-botnet DDoS attacksIJECEIAES
The Internet of Things (IoT) is becoming an integral part of our daily life includ- ing health, environment, homes, military, etc. The enormous growth of IoT in recent years has attracted hackers to take advantage of their computation and communication capabilities to perform different types of attacks. The major concern is that IoT devices have several vulnerabilities that can be easily exploited to form IoT botnets consisting of millions of IoT devices and posing significant threats to Internet security. In this context, DDoS attacks originating from IoT botnets is a major problem in today’s Internet that requires immediate attention. In this paper, we propose Security Information and Event Management-based IoT botnet DDoS attack detection and mitigation system. This system detects and blocks DDoS attack traffic from compromised IoT devices by monitoring specific packet types including TCP SYN, ICMP and DNS packets originating from these devices. We discuss a prototype implementation of the proposed system and we demonstrate that SIEM based solutions can be configured to accurately identify and block malicious traffic originating from compromised IoT devices.
The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a hacker, hacks into the Cloud-based IoT Camera sees everything we do, without us knowing about it. Invading our personal digital privacy. This study focuses on the vulnerabilities found on White-label Cloud-based IoT Camera on the market specifically on a Chinese brand sold by Shenzhen Gwelltimes Technology. How this IoT device can be compromised and how to protect our selves from such cyber-attacks.
Secure Authentication System Using Video SurveillanceIOSR Journals
The document proposes a secure authentication system using video surveillance that extracts key features from video to identify and authenticate users. It begins with an introduction to existing biometric authentication methods and their limitations. It then describes the proposed video surveillance system which involves extracting foreground objects from video using background subtraction and shadow detection algorithms. Key features like skeleton and centroid features are extracted from the foreground objects using triangulation and depth first search. These features are stored in a database and used to identify and authenticate users by comparing with live video feed features. The system aims to provide secure authentication using video's ability to characterize biometrics based on dynamics like gait, while overcoming limitations of existing methods.
This document contains an annotated bibliography on trends in information security with summaries of 6 sources. The sources discuss topics including biometric authentication alternatives, network integration design, and green computing in the cloud. Each annotation provides a brief summary of the source content and strengths/weaknesses.
The document discusses biometrics and provides context on its history and uses. Biometrics is defined as using human physical characteristics to verify identity, and has been used since ancient times, though recent technological advances have enabled more sophisticated biometric identification systems. The document explores the evolution of biometrics technology over time, from early uses of fingerprints to modern applications like iris scans and DNA analysis. It also examines the advantages and limitations of different biometric methods.
This document discusses research progress in mobile fingerprint template protection. It covers three main schemes: biometric key generation, fuzzy schemes, and non-invertible transforms. Biometric key generation aims to directly derive cryptographic keys from fingerprints to avoid storing biometric features or secret keys. Fuzzy schemes hide secrets within public information so keys can be retrieved through biometric matching. Non-invertible transforms store transformed biometric features instead of the original template. The document analyzes the advantages and limitations of different schemes and points out open issues for future research in mobile fingerprint template protection.
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Implementing ‘Namebers’ Using Microchip Implants: The Black Box Beneath The SkinFoCAS Initiative
The document discusses the history and controversies surrounding human microchip implants. It describes some early commercial uses of implants for access control by employees, including cases in Spain and the US. However, implants are controversial as they present privacy and control issues if mandated, as well as technical risks. The document outlines both benefits claimed by proponents and concerns raised by critics regarding emerging implant technologies.
IOT SECURITY: PENETRATION TESTING OF WHITE-LABEL CLOUD-BASED IOT CAMERA COMPR...ijcsit
This document summarizes a research study that investigated the security vulnerabilities of white-label cloud-based IoT cameras. The study involved penetration testing of a Chinese-made IoT camera to identify vulnerabilities. The testing revealed that the camera's video stream could be hacked without the user's knowledge, compromising personal privacy. To address this, the study proposed methods for hardening the camera's security and educating users on protecting themselves from such attacks.
Internet of Things, the Next Internet RevolutionBob Hardian
The document discusses the Internet of Things (IoT). It provides definitions of IoT as connecting billions of smart devices and sensors into a digital network. Key points include:
- IoT is the next revolution beyond the Internet of people and will integrate physical objects, devices, vehicles into the Internet through sensors and software.
- IoT connects both the physical world of "atoms" like devices and things with the digital world of "bits" like information and data.
- Enabling technologies include RFID, wireless sensor networks, addressing schemes, and data/visualization technologies.
- Example applications are in personal, home, enterprise, utilities and mobile domains.
Inria - Cybersecurity: current challenges and Inria’s research directionsInria
Inria white books look at major current challenges in informatics and mathematics and show actions conducted by our project-teams to these challenges. Their goal is to describe the state-of-the-art of a given topic, showing its complexity, and to present existing, as well as emerging, research directions and their expected societal impact. This white book has been edited by Steve Kremer, Ludovic Mé, Didier Rémy and Vincent Roca. They coordinated the contributions from researchers of Inria teams (the complete list of contributors is given at the end of the book). Many thanks to Janet Bertot for proof-reading this document, as well as to François Pottier, Gabriel Scherrer, and Benjamin Smith who read parts of it.
Publication date: January 2019
The document presents questions about various topics including education, banking, industry, sport, computer ethics, intellectual property, hacking, communication, and the definition of intellectual property. Answer choices are provided for multiple choice questions on these topics. The questions assess knowledge on how different fields have been impacted by and rely on computerization.
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Io t malta_2013 Internet of Things IoT Webinar Dec 2013 #iot @DesDesiree Miloshevic
1) The document discusses a webinar on the Internet of Things (IoT) which refers to network connectivity between physical objects and their virtual representations.
2) IoT is generating hype but has not seen widespread commercial adoption yet. It will result in massive amounts of data being generated and uploaded to the cloud.
3) Issues discussed include privacy, security, data ownership, and the need for new regulation as IoT integration increases and more everyday objects become connected to the internet and each other.
Internet of things iot based real time gas leakage monitoring and controllingIAEME Publication
As the majority of the people in India uses Liquefied Petroleum Gas (LPG) as a fuel for
cooking, but in India the technology applied in this field (security) is very less. Liquefied petroleum
gas is a flammable gas, which has the potential to create a hazard. Therefore it is important that the
properties and safe handling of LPG are understood and applied in the domestic and
commercial/industrial situations.
The proposed paper is aimed at developing a prototype that constantly monitors the gas leak
with the help of the electronic sensors. This data is made available real time through real time feeds
over the internet. We intend to use Xively (new platform) to feed real time sensor data over the
internet. The sensor monitors, detects and raises an alarm whenever a gas leak or fire broke out
condition is detected. Then it raised an emergency alarm. The emergency alarm condition can be
handled through proper arrangement and alert message to rescue team, which could be an in house
rescue team. Based on the real time data feed connected to Xively, user can easily look at the history
of data and accurately determine the time and date at which emergency condition occurred. This data
helps in easily locating the root cause of the emergency condition occurred. This data helps in easily
locating the root cause of the emergency condition. So that one can know the complete detail of the
hazard.
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...IAEME Publication
In recent times and as far as technological advancement goes, the Internet of
Things is the trending topic in the world. Internet of Things popularly called IoT is the
internetworking of interconnected devices over the internet to enable interaction
between those devices without any human interference. Cisco predicts at least 50
billion of such devices to be available by the year 2020. This leaves a huge gap as to
the appropriate awareness and literacy of the world as a collective to be receptive of
the massive IoT technology overhaul coming in the nearest future. This paper gives a
little insight into the basics of IoT, its core fundamentals, its architecture and
furthermore contributes to knowledge the application of IoT to the education sector.
Considering the number of connected devices expected to be produced, it is expected
also that sufficient amount of personnel are trained in IoT systems adequately to meet
with the rising demand
Wearing safe: Physical and informational security in the age of the wearable ...Simon Fraser University
Wearable computing devices promise to deliver countless benefits to users. Moreover, they are among the most personal and unique computing devices of all, more so than laptops and tablets and even more so than smartphones. However, this uniqueness also brings with it a risk of security issues not encountered previously in information systems: the potential to not only compromise data, but also to physically harm the wearer. This article considers wearable device security from three perspectives: whether the threat is to the device and/or the individual, the role that the wearable device plays, and how holistic wearable device security strategies can be developed and monitored.
The document discusses the Internet of Things (IoT) and how it will be the next revolution after the Internet of People. It describes how IoT will connect billions of smart devices and sensors to form a digital nervous system that interacts seamlessly with people. It provides examples of current smart devices and applications in areas like health, home, city, and business. It also discusses some of the technologies and challenges in developing the IoT, such as handling the massive amount of data generated.
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Artificial intelligence in cyber defenseDinesh More
This document discusses the use of artificial intelligence in cyber defense. It argues that AI is needed to rapidly analyze large amounts of data and react to the evolving threats in cyberspace, which humans cannot do alone without considerable automation. The document provides an overview of artificial intelligence as a field, and surveys existing AI applications in cyber defense that use techniques like artificial neural networks, expert systems, intelligent agents, search algorithms, machine learning, and data mining. It concludes that while useful AI applications already exist, many cyber defense problems could be better solved by incorporating more intelligent methods.
This document discusses designing for the Internet of Things (IoT). It begins by defining the IoT as networks of physical objects with embedded sensors and actuators that communicate with other objects, databases, and people. It then discusses some challenges in designing for the IoT, including creating new interaction paradigms that leverage sensing capabilities while accommodating human behaviors. The document outlines characteristics of natural user interfaces for the IoT, such as considering context, cognitive load, social aspects, and movement. It provides examples of techniques for designing IoT interfaces, like bodystorming, gestural studies, prototyping, and usability testing.
SIEM-based detection and mitigation of IoT-botnet DDoS attacksIJECEIAES
The Internet of Things (IoT) is becoming an integral part of our daily life includ- ing health, environment, homes, military, etc. The enormous growth of IoT in recent years has attracted hackers to take advantage of their computation and communication capabilities to perform different types of attacks. The major concern is that IoT devices have several vulnerabilities that can be easily exploited to form IoT botnets consisting of millions of IoT devices and posing significant threats to Internet security. In this context, DDoS attacks originating from IoT botnets is a major problem in today’s Internet that requires immediate attention. In this paper, we propose Security Information and Event Management-based IoT botnet DDoS attack detection and mitigation system. This system detects and blocks DDoS attack traffic from compromised IoT devices by monitoring specific packet types including TCP SYN, ICMP and DNS packets originating from these devices. We discuss a prototype implementation of the proposed system and we demonstrate that SIEM based solutions can be configured to accurately identify and block malicious traffic originating from compromised IoT devices.
The Internet is driving force on how we communicate with one another, from posting messages and images to Facebook or “tweeting” your activities from your vacation. Today it is being used everywhere, now imagine a device that connects to the internet sends out data based on its sensors, this is the Internet-ofThings, a connection of objects with a plethora of sensors. Smart devices as they are commonly called, are invading our homes. With the proliferation of cheap Cloud-based IoT Camera use as a surveillance system to monitor our homes and loved ones right from the palm of our hand using our smartphones. These cameras are mostly white-label product, a process in which the product comes from a single manufacturer and bought by a different company where they are re-branded and sold with their own product name, a method commonly practice in the retail and manufacturing industry. Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a hacker, hacks into the Cloud-based IoT Camera sees everything we do, without us knowing about it. Invading our personal digital privacy. This study focuses on the vulnerabilities found on White-label Cloud-based IoT Camera on the market specifically on a Chinese brand sold by Shenzhen Gwelltimes Technology. How this IoT device can be compromised and how to protect our selves from such cyber-attacks.
Secure Authentication System Using Video SurveillanceIOSR Journals
The document proposes a secure authentication system using video surveillance that extracts key features from video to identify and authenticate users. It begins with an introduction to existing biometric authentication methods and their limitations. It then describes the proposed video surveillance system which involves extracting foreground objects from video using background subtraction and shadow detection algorithms. Key features like skeleton and centroid features are extracted from the foreground objects using triangulation and depth first search. These features are stored in a database and used to identify and authenticate users by comparing with live video feed features. The system aims to provide secure authentication using video's ability to characterize biometrics based on dynamics like gait, while overcoming limitations of existing methods.
This document contains an annotated bibliography on trends in information security with summaries of 6 sources. The sources discuss topics including biometric authentication alternatives, network integration design, and green computing in the cloud. Each annotation provides a brief summary of the source content and strengths/weaknesses.
The document discusses biometrics and provides context on its history and uses. Biometrics is defined as using human physical characteristics to verify identity, and has been used since ancient times, though recent technological advances have enabled more sophisticated biometric identification systems. The document explores the evolution of biometrics technology over time, from early uses of fingerprints to modern applications like iris scans and DNA analysis. It also examines the advantages and limitations of different biometric methods.
This document discusses research progress in mobile fingerprint template protection. It covers three main schemes: biometric key generation, fuzzy schemes, and non-invertible transforms. Biometric key generation aims to directly derive cryptographic keys from fingerprints to avoid storing biometric features or secret keys. Fuzzy schemes hide secrets within public information so keys can be retrieved through biometric matching. Non-invertible transforms store transformed biometric features instead of the original template. The document analyzes the advantages and limitations of different schemes and points out open issues for future research in mobile fingerprint template protection.
Biometric System and Recognition Authentication and Security Issuesijtsrd
This document summarizes a research paper on biometric systems for authentication and security issues. The paper provides an overview of biometric systems and how they are used for authentication. It discusses some of the main types of biometrics like fingerprints, facial recognition, voice recognition, and others. It also covers authentication processes, including enrollment and verification. The paper analyzes security issues like spoofing attacks and discusses liveness detection techniques to help prevent spoofing. It evaluates biometric systems based on authentication accuracy and security. In conclusion, the paper argues that biometrics can provide secure authentication but that future research should focus on improving accuracy under non-ideal conditions and enhancing security against spoofing attacks.
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
This document proposes an Internet of Things (IoT)-based system for healthcare and an authentication scheme to secure it. It first reviews existing literature on IoT and healthcare systems. It then presents the architecture of the proposed system, which has perception, network and application layers. Devices in the perception layer would collect health data from patients. The network layer would communicate this data to cloud servers via gateways. The application layer would manage devices, analyze data and share it with applications. The document proposes authenticating healthcare devices during access of patient data. It aims to enhance security in IoT-based healthcare through device authentication.
Trusting Smart Speakers: Understanding the Different Levels of Trust between ...CSCJournals
The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analyzed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.
Biometrics can be used to improve cybersecurity by integrating biometric authentication into daily operations. Biometrics uses unique physical traits like fingerprints, facial recognition, or iris scans to verify a user's identity. While biometrics provides convenient authentication as physical traits are difficult to steal or forget, there are also privacy concerns over collection and potential misuse of biometric data without user consent. The document discusses various biometric technologies, their applications, benefits for cybersecurity, and challenges regarding privacy and potential workarounds to strengthen biometric data protection.
The presentation is about research on wearable devices for elderly people in Canada. It includes:
1) An introduction that provides background on wearable IoT devices and their benefits.
2) A classification of wearable IoT applications into health, activity recognition, tracking, and safety.
3) Discussion of the challenges and future possibilities of wearable IoT, including data resolution, power consumption, wearability, safety, and security.
The health club industry is being transformed through the adoption of new technologies and the overall trends of wellness and networked health and fitness.
This document discusses key trends in wearable technology identified by PSFK Labs in partnership with iQ by Intel. It identifies three main themes - connected intimacy, tailored ecosystems, and co-evolved possibilities - that will shape the future form and function of wearables. Under these themes, 10 trends are summarized related to areas like long distance togetherness, data streamed care, emotional mirrors, synced lifestyles, organic computing, human enhancement, and health empowerment. The document provides examples and statistics for each trend and expert opinions on implications. It argues that advances in areas like chips, batteries, sensors and algorithms mean wearables will increasingly integrate with and enhance human abilities.
The Future of Wearable Tech report in collaboration with iQ by intel identifies 10 trends and three major themes that point to the evolving form and function of wearable devices and their influence on the way we live, work and socialize. In our Connected Intimacy theme, we explore how wearables are revolutionizing the way we communicate information about ourselves and maintain relationships over any distance. With the Tailored Ecosystem theme, we look at how these devices are personalizing the world around us and adapting to our ever-changing needs. While the Co-Evolved Possibilities theme considers the potential and promise of a closer union between humans and technology and its impacts on our natural abilities.
Within these themes, we take an in-depth look at each of the key trends, bringing them to life with best-in-class examples and connecting the dots with takeaways to help spark thinking and discussion. As you click through the following slides, we hope you find inspiration and innovation that you can leverage and share within your own organization.
For more information about the report visit:
http://www.psfk.com/publishing/future-of-wearable-tech
Want to Learn More About This Topic or Any Other?
Go to labs.psfk.com to learn more about accessing in-depth trend reports on industries, markets, and topics, database access, workshops, presentati
Biometric Security Poses Huge Privacy Risks in KenyaPauline Wamere
1. This paper investigates the personal and informational privacy concerns regarding biometric technology in Kenya. It examines legal reviews and identifies potential risks with biometric data storage and use.
2. Biometrics are increasingly used for authentication in Kenya without fully considering privacy risks. Key risks include spoofing biometric data, intercepting biometric data transmitted over networks, system errors from power outages, and residual biometric traces allowing unauthorized access.
3. The paper analyzes Kenya's legal framework for privacy and guidelines for implementing biometric systems. While biometric technology promises better security and convenience, its widespread use also risks privacy violations that must be mitigated through legal reforms and technical controls.
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
This document proposes a novel method for human identification using major and minor finger knuckle patterns. A team of researchers led by Dr. Raja developed a system that extracts features from finger knuckle print images using Radon transform. The knuckle print images are treated as texture images and the Radon transform computes line integrals along parallel paths to represent the texture information. The proposed method aims to provide contactless and unrestricted human identification using finger knuckle biometrics.
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
This document proposes a method for human identification using major and minor finger knuckle patterns. A team of researchers led by Dr. Raja developed a novel person identification system that extracts knuckle print features using Radon transform. The knuckle print image is treated as a texture image, and Radon transform computes line integrals along parallel paths in certain directions to represent the texture information in the image. The proposed method aims to provide contactless and unrestricted access control using finger knuckle biometrics, which are user-centric and have stable and unique features.
Wearables are small electronic devices, often comprising one or more sensors and having computational capability. Devices such as wrist watches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. The Nigerian state at this period is faced with a lot of kidnapping activities in schools, homes and abduction for the purpose of ransomed collection and other illegal activities necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria.
A Novel Security Approach for Communication using IOTIJEACS
The Internet of Things (IOT) is the arrangement of physical articles or "things" introduced with equipment, programming, sensors, and framework accessibility, which enables these things to accumulate and exchange data. Here outlining security convention for the Internet of Things, and execution of this relating security convention on the inserted gadgets. This convention will cover the honesty of messages and verification of every customer by giving a productive confirmation component. By this venture the protected correspondence is executed on implanted gadgets.
Wearable technologies are enabling new forms of connected intimacy over distance through haptic feedback systems. Devices like smart jackets, watches and bracelets allow distant loved ones to simulate physical touch and togetherness. These tools are building on technologies like low-power wireless connectivity, sensors and mobile computing to create tangible connections regardless of location. Experts forecast that as the necessary components advance, wearables will increasingly support long distance relationships through simulated experiences of comfort and togetherness.
This document is a seminar report on biometrics technology submitted by Pavan Kumar M.T. to fulfill requirements for a Bachelor of Engineering degree. The report provides an introduction to biometrics, which uses human physiological or behavioral characteristics to identify individuals. It discusses the history of biometrics and provides a block diagram of typical biometrics systems. It also classifies and describes various biometric techniques including fingerprints, face recognition, hand geometry, iris recognition, speaker recognition, signature recognition, and gesture recognition.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.