This document discusses identifying fake business accounts on Instagram through sentiment analysis. It begins with an introduction on the growth of social media and online fraud. Then, it reviews literature on detecting fake profiles and accounts through machine learning techniques. Specifically, it proposes using a machine learning model to identify fake Instagram business accounts by analyzing user content and behavior characteristics. Sentiment analysis using lexicon-based approaches is discussed as an effective method for understanding perspectives on social media. The goal is to develop an effective strategy for detecting fake Instagram business accounts through sentiment analysis.
Writekraft Research and Publications LLP was initially formed, informally, in 2006 by a group of scholars to help fellow students. Gradually, with several dissertations, thesis and assignments receiving acclaim and a good grade, Writekraft was officially founded in 2011 Since its establishment, Writekraft Research & Publications LLP is Guiding and Mentoring PhD Scholars.
Our Mission:
To provide breakthrough research works to our clients through Perseverant efforts towards creativity and innovation”.
Vision:
Writekraft endeavours to be the leading global research and publications company that will fulfil all research needs of our clients. We will achieve this vision through:
Analyzing every customer's aims, objectives and purpose of research
Using advanced and latest tools and technique of research and analysis
Coordinating and including their own ideas and knowledge
Providing the desired inferences and results of the research
In the past decade, we have successfully assisted students from various universities in India and globally. We at Writekraft Research & Publications LLP head office in Kanpur, India are most trusted and professional Research, Writing, Guidance and Publication Service Provider for PhD. Our services meet all your PhD Admissions, Thesis Preparation and Research Paper Publication needs with highest regards for the quality you prefer.
Our Achievements:
NATIONAL AWARD FOR BEST RESEARCH PROJECT (By Hon. President APJ Abdul Kalam)
GOLD MEDAL FOR RESEARCH ON DISABILITY (By Disabled’s Club of India)
NOMINATED FOR BEST MSME AWARDS 2017
5 STAR RATING ON GOOGLE
We have PhD experts from reputed institutions/ organizations like Indian Institute of Technology (IIT), Indian Institute of Management (IIM) and many more apex education institutions in India. Our works are tailored and drafted as per your requirements and are totally unique.
From past years our core advisory members, research team assisted research scholars from various universities from all corners of world.
Subjects/Areas We Cover:
Management, Commerce, Finance, Marketing, Psychology, Education, Sociology, Mass communications, English Literature, English Language, Law, History, Computer Science & Engineering, Electronics & Communication Engineering, Mechanical Engineering, Civil Engineering, Electrical Engineering, Pharmacy & Healthcare.
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
This document discusses an automated model for detecting fake profiles and botnets in online social networks. It begins with background on the prevalence of fake accounts, which can compromise user privacy and security. Next, it reviews related work on using data hiding techniques like steganography and watermarking to embed information in profile pictures in order to identify suspicious accounts. The proposed model aims to automatically detect fake profiles and botnets to replace current manual methods that are costly and labor-intensive.
1) The document proposes an automated model to detect fake profiles and botnets on online social networks using steganography and watermarking techniques.
2) It describes embedding unique information like a user's email or username into profile pictures during upload using watermarking. This allows detecting stolen pictures used for fake profiles.
3) The model is extended to also search uploaded pictures against billions of online images to detect multiple uses of the same picture for different profiles, as watermarking alone may fail if the picture is edited. Detected users must then prove ownership rights to the picture.
This document discusses consumer privacy risks in the current online landscape from a behavioral perspective. It notes that more consumer data is available online than ever before due to companies' incentives to collect data and lower costs of doing so. However, consumers often do not think about privacy risks when sharing information or make inaccurate risk assessments due to cognitive biases. The document proposes behaviorally informed solutions to better protect consumers, including equipping consumers with privacy literacy, sensitizing them to risks, and using disclosure policies. It also suggests padding the environment by setting privacy-friendly defaults and including reminders or decision points about privacy. Overall, the document analyzes online privacy issues through a behavioral lens and puts forth solutions aimed at consumers and companies.
IRJET- Fake Profile Identification using Machine LearningIRJET Journal
This document proposes a framework for identifying fake profiles on social media sites using machine learning. It involves selecting profile attributes from a dataset, training a random forest classifier model on 80% of the labeled real and fake profiles, and testing it on the remaining 20%. The random forest classifier is able to accurately classify profiles as real or fake with an efficiency of 95% based on attributes like number of friends, followers, and status updates. This automatic fake profile detection method could help social media sites manage the large volume of profiles that can't be manually reviewed.
This document outlines the methodology for a research study on consumer attitudes towards digitalization in Uttar Pradesh, India. The study aims to identify the current state of digitalization in India and factors affecting its growth. It will analyze the impact of demographic (age, gender, income, occupation, qualification) and behavioral factors on consumer attitudes. The research hypotheses test relationships between age and purchasing frequency and between income and purchasing power. Primary and secondary data will be collected through questionnaires, interviews, and observation. Statistical tools will be used to analyze the data.
Writekraft Research and Publications LLP was initially formed, informally, in 2006 by a group of scholars to help fellow students. Gradually, with several dissertations, thesis and assignments receiving acclaim and a good grade, Writekraft was officially founded in 2011 Since its establishment, Writekraft Research & Publications LLP is Guiding and Mentoring PhD Scholars.
Our Mission:
To provide breakthrough research works to our clients through Perseverant efforts towards creativity and innovation”.
Vision:
Writekraft endeavours to be the leading global research and publications company that will fulfil all research needs of our clients. We will achieve this vision through:
Analyzing every customer's aims, objectives and purpose of research
Using advanced and latest tools and technique of research and analysis
Coordinating and including their own ideas and knowledge
Providing the desired inferences and results of the research
In the past decade, we have successfully assisted students from various universities in India and globally. We at Writekraft Research & Publications LLP head office in Kanpur, India are most trusted and professional Research, Writing, Guidance and Publication Service Provider for PhD. Our services meet all your PhD Admissions, Thesis Preparation and Research Paper Publication needs with highest regards for the quality you prefer.
Our Achievements:
NATIONAL AWARD FOR BEST RESEARCH PROJECT (By Hon. President APJ Abdul Kalam)
GOLD MEDAL FOR RESEARCH ON DISABILITY (By Disabled’s Club of India)
NOMINATED FOR BEST MSME AWARDS 2017
5 STAR RATING ON GOOGLE
We have PhD experts from reputed institutions/ organizations like Indian Institute of Technology (IIT), Indian Institute of Management (IIM) and many more apex education institutions in India. Our works are tailored and drafted as per your requirements and are totally unique.
From past years our core advisory members, research team assisted research scholars from various universities from all corners of world.
Subjects/Areas We Cover:
Management, Commerce, Finance, Marketing, Psychology, Education, Sociology, Mass communications, English Literature, English Language, Law, History, Computer Science & Engineering, Electronics & Communication Engineering, Mechanical Engineering, Civil Engineering, Electrical Engineering, Pharmacy & Healthcare.
Writekraft Research and Publications LLP was initially formed, informally, in 2006 by a group of scholars to help fellow students. Gradually, with several dissertations, thesis and assignments receiving acclaim and a good grade, Writekraft was officially founded in 2011 Since its establishment, Writekraft Research & Publications LLP is Guiding and Mentoring PhD Scholars.
Our Mission:
To provide breakthrough research works to our clients through Perseverant efforts towards creativity and innovation”.
Vision:
Writekraft endeavours to be the leading global research and publications company that will fulfil all research needs of our clients. We will achieve this vision through:
Analyzing every customer's aims, objectives and purpose of research
Using advanced and latest tools and technique of research and analysis
Coordinating and including their own ideas and knowledge
Providing the desired inferences and results of the research
In the past decade, we have successfully assisted students from various universities in India and globally. We at Writekraft Research & Publications LLP head office in Kanpur, India are most trusted and professional Research, Writing, Guidance and Publication Service Provider for PhD. Our services meet all your PhD Admissions, Thesis Preparation and Research Paper Publication needs with highest regards for the quality you prefer.
Our Achievements:
NATIONAL AWARD FOR BEST RESEARCH PROJECT (By Hon. President APJ Abdul Kalam)
GOLD MEDAL FOR RESEARCH ON DISABILITY (By Disabled’s Club of India)
NOMINATED FOR BEST MSME AWARDS 2017
5 STAR RATING ON GOOGLE
We have PhD experts from reputed institutions/ organizations like Indian Institute of Technology (IIT), Indian Institute of Management (IIM) and many more apex education institutions in India. Our works are tailored and drafted as per your requirements and are totally unique.
From past years our core advisory members, research team assisted research scholars from various universities from all corners of world.
Subjects/Areas We Cover:
Management, Commerce, Finance, Marketing, Psychology, Education, Sociology, Mass communications, English Literature, English Language, Law, History, Computer Science & Engineering, Electronics & Communication Engineering, Mechanical Engineering, Civil Engineering, Electrical Engineering, Pharmacy & Healthcare.
Writekraft Research and Publications LLP was initially formed, informally, in 2006 by a group of scholars to help fellow students. Gradually, with several dissertations, thesis and assignments receiving acclaim and a good grade, Writekraft was officially founded in 2011 Since its establishment, Writekraft Research & Publications LLP is Guiding and Mentoring PhD Scholars.
Our Mission:
To provide breakthrough research works to our clients through Perseverant efforts towards creativity and innovation”.
Vision:
Writekraft endeavours to be the leading global research and publications company that will fulfil all research needs of our clients. We will achieve this vision through:
Analyzing every customer's aims, objectives and purpose of research
Using advanced and latest tools and technique of research and analysis
Coordinating and including their own ideas and knowledge
Providing the desired inferences and results of the research
In the past decade, we have successfully assisted students from various universities in India and globally. We at Writekraft Research & Publications LLP head office in Kanpur, India are most trusted and professional Research, Writing, Guidance and Publication Service Provider for PhD. Our services meet all your PhD Admissions, Thesis Preparation and Research Paper Publication needs with highest regards for the quality you prefer.
Our Achievements:
NATIONAL AWARD FOR BEST RESEARCH PROJECT (By Hon. President APJ Abdul Kalam)
GOLD MEDAL FOR RESEARCH ON DISABILITY (By Disabled’s Club of India)
NOMINATED FOR BEST MSME AWARDS 2017
5 STAR RATING ON GOOGLE
We have PhD experts from reputed institutions/ organizations like Indian Institute of Technology (IIT), Indian Institute of Management (IIM) and many more apex education institutions in India. Our works are tailored and drafted as per your requirements and are totally unique.
From past years our core advisory members, research team assisted research scholars from various universities from all corners of world.
Subjects/Areas We Cover:
Management, Commerce, Finance, Marketing, Psychology, Education, Sociology, Mass communications, English Literature, English Language, Law, History, Computer Science & Engineering, Electronics & Communication Engineering, Mechanical Engineering, Civil Engineering, Electrical Engineering, Pharmacy & Healthcare.
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
This document discusses an automated model for detecting fake profiles and botnets in online social networks. It begins with background on the prevalence of fake accounts, which can compromise user privacy and security. Next, it reviews related work on using data hiding techniques like steganography and watermarking to embed information in profile pictures in order to identify suspicious accounts. The proposed model aims to automatically detect fake profiles and botnets to replace current manual methods that are costly and labor-intensive.
1) The document proposes an automated model to detect fake profiles and botnets on online social networks using steganography and watermarking techniques.
2) It describes embedding unique information like a user's email or username into profile pictures during upload using watermarking. This allows detecting stolen pictures used for fake profiles.
3) The model is extended to also search uploaded pictures against billions of online images to detect multiple uses of the same picture for different profiles, as watermarking alone may fail if the picture is edited. Detected users must then prove ownership rights to the picture.
This document discusses consumer privacy risks in the current online landscape from a behavioral perspective. It notes that more consumer data is available online than ever before due to companies' incentives to collect data and lower costs of doing so. However, consumers often do not think about privacy risks when sharing information or make inaccurate risk assessments due to cognitive biases. The document proposes behaviorally informed solutions to better protect consumers, including equipping consumers with privacy literacy, sensitizing them to risks, and using disclosure policies. It also suggests padding the environment by setting privacy-friendly defaults and including reminders or decision points about privacy. Overall, the document analyzes online privacy issues through a behavioral lens and puts forth solutions aimed at consumers and companies.
IRJET- Fake Profile Identification using Machine LearningIRJET Journal
This document proposes a framework for identifying fake profiles on social media sites using machine learning. It involves selecting profile attributes from a dataset, training a random forest classifier model on 80% of the labeled real and fake profiles, and testing it on the remaining 20%. The random forest classifier is able to accurately classify profiles as real or fake with an efficiency of 95% based on attributes like number of friends, followers, and status updates. This automatic fake profile detection method could help social media sites manage the large volume of profiles that can't be manually reviewed.
This document outlines the methodology for a research study on consumer attitudes towards digitalization in Uttar Pradesh, India. The study aims to identify the current state of digitalization in India and factors affecting its growth. It will analyze the impact of demographic (age, gender, income, occupation, qualification) and behavioral factors on consumer attitudes. The research hypotheses test relationships between age and purchasing frequency and between income and purchasing power. Primary and secondary data will be collected through questionnaires, interviews, and observation. Statistical tools will be used to analyze the data.
Writekraft Research and Publications LLP was initially formed, informally, in 2006 by a group of scholars to help fellow students. Gradually, with several dissertations, thesis and assignments receiving acclaim and a good grade, Writekraft was officially founded in 2011 Since its establishment, Writekraft Research & Publications LLP is Guiding and Mentoring PhD Scholars.
Our Mission:
To provide breakthrough research works to our clients through Perseverant efforts towards creativity and innovation”.
Vision:
Writekraft endeavours to be the leading global research and publications company that will fulfil all research needs of our clients. We will achieve this vision through:
Analyzing every customer's aims, objectives and purpose of research
Using advanced and latest tools and technique of research and analysis
Coordinating and including their own ideas and knowledge
Providing the desired inferences and results of the research
In the past decade, we have successfully assisted students from various universities in India and globally. We at Writekraft Research & Publications LLP head office in Kanpur, India are most trusted and professional Research, Writing, Guidance and Publication Service Provider for PhD. Our services meet all your PhD Admissions, Thesis Preparation and Research Paper Publication needs with highest regards for the quality you prefer.
Our Achievements:
NATIONAL AWARD FOR BEST RESEARCH PROJECT (By Hon. President APJ Abdul Kalam)
GOLD MEDAL FOR RESEARCH ON DISABILITY (By Disabled’s Club of India)
NOMINATED FOR BEST MSME AWARDS 2017
5 STAR RATING ON GOOGLE
We have PhD experts from reputed institutions/ organizations like Indian Institute of Technology (IIT), Indian Institute of Management (IIM) and many more apex education institutions in India. Our works are tailored and drafted as per your requirements and are totally unique.
From past years our core advisory members, research team assisted research scholars from various universities from all corners of world.
Subjects/Areas We Cover:
Management, Commerce, Finance, Marketing, Psychology, Education, Sociology, Mass communications, English Literature, English Language, Law, History, Computer Science & Engineering, Electronics & Communication Engineering, Mechanical Engineering, Civil Engineering, Electrical Engineering, Pharmacy & Healthcare.
Writekraft Research and Publications LLP was initially formed, informally, in 2006 by a group of scholars to help fellow students. Gradually, with several dissertations, thesis and assignments receiving acclaim and a good grade, Writekraft was officially founded in 2011 Since its establishment, Writekraft Research & Publications LLP is Guiding and Mentoring PhD Scholars.
Our Mission:
To provide breakthrough research works to our clients through Perseverant efforts towards creativity and innovation”.
Vision:
Writekraft endeavours to be the leading global research and publications company that will fulfil all research needs of our clients. We will achieve this vision through:
Analyzing every customer's aims, objectives and purpose of research
Using advanced and latest tools and technique of research and analysis
Coordinating and including their own ideas and knowledge
Providing the desired inferences and results of the research
In the past decade, we have successfully assisted students from various universities in India and globally. We at Writekraft Research & Publications LLP head office in Kanpur, India are most trusted and professional Research, Writing, Guidance and Publication Service Provider for PhD. Our services meet all your PhD Admissions, Thesis Preparation and Research Paper Publication needs with highest regards for the quality you prefer.
Our Achievements:
NATIONAL AWARD FOR BEST RESEARCH PROJECT (By Hon. President APJ Abdul Kalam)
GOLD MEDAL FOR RESEARCH ON DISABILITY (By Disabled’s Club of India)
NOMINATED FOR BEST MSME AWARDS 2017
5 STAR RATING ON GOOGLE
We have PhD experts from reputed institutions/ organizations like Indian Institute of Technology (IIT), Indian Institute of Management (IIM) and many more apex education institutions in India. Our works are tailored and drafted as per your requirements and are totally unique.
From past years our core advisory members, research team assisted research scholars from various universities from all corners of world.
Subjects/Areas We Cover:
Management, Commerce, Finance, Marketing, Psychology, Education, Sociology, Mass communications, English Literature, English Language, Law, History, Computer Science & Engineering, Electronics & Communication Engineering, Mechanical Engineering, Civil Engineering, Electrical Engineering, Pharmacy & Healthcare.
Writekraft Research and Publications LLP was initially formed, informally, in 2006 by a group of scholars to help fellow students. Gradually, with several dissertations, thesis and assignments receiving acclaim and a good grade, Writekraft was officially founded in 2011 Since its establishment, Writekraft Research & Publications LLP is Guiding and Mentoring PhD Scholars.
Our Mission:
To provide breakthrough research works to our clients through Perseverant efforts towards creativity and innovation”.
Vision:
Writekraft endeavours to be the leading global research and publications company that will fulfil all research needs of our clients. We will achieve this vision through:
Analyzing every customer's aims, objectives and purpose of research
Using advanced and latest tools and technique of research and analysis
Coordinating and including their own ideas and knowledge
Providing the desired inferences and results of the research
In the past decade, we have successfully assisted students from various universities in India and globally. We at Writekraft Research & Publications LLP head office in Kanpur, India are most trusted and professional Research, Writing, Guidance and Publication Service Provider for PhD. Our services meet all your PhD Admissions, Thesis Preparation and Research Paper Publication needs with highest regards for the quality you prefer.
Our Achievements:
NATIONAL AWARD FOR BEST RESEARCH PROJECT (By Hon. President APJ Abdul Kalam)
GOLD MEDAL FOR RESEARCH ON DISABILITY (By Disabled’s Club of India)
NOMINATED FOR BEST MSME AWARDS 2017
5 STAR RATING ON GOOGLE
We have PhD experts from reputed institutions/ organizations like Indian Institute of Technology (IIT), Indian Institute of Management (IIM) and many more apex education institutions in India. Our works are tailored and drafted as per your requirements and are totally unique.
From past years our core advisory members, research team assisted research scholars from various universities from all corners of world.
Subjects/Areas We Cover:
Management, Commerce, Finance, Marketing, Psychology, Education, Sociology, Mass communications, English Literature, English Language, Law, History, Computer Science & Engineering, Electronics & Communication Engineering, Mechanical Engineering, Civil Engineering, Electrical Engineering, Pharmacy & Healthcare.
Writekraft Research and Publications LLP was initially formed, informally, in 2006 by a group of scholars to help fellow students. Gradually, with several dissertations, thesis and assignments receiving acclaim and a good grade, Writekraft was officially founded in 2011 Since its establishment, Writekraft Research & Publications LLP is Guiding and Mentoring PhD Scholars.
Our Mission:
To provide breakthrough research works to our clients through Perseverant efforts towards creativity and innovation”.
Vision:
Writekraft endeavours to be the leading global research and publications company that will fulfil all research needs of our clients. We will achieve this vision through:
Analyzing every customer's aims, objectives and purpose of research
Using advanced and latest tools and technique of research and analysis
Coordinating and including their own ideas and knowledge
Providing the desired inferences and results of the research
In the past decade, we have successfully assisted students from various universities in India and globally. We at Writekraft Research & Publications LLP head office in Kanpur, India are most trusted and professional Research, Writing, Guidance and Publication Service Provider for PhD. Our services meet all your PhD Admissions, Thesis Preparation and Research Paper Publication needs with highest regards for the quality you prefer.
Our Achievements:
NATIONAL AWARD FOR BEST RESEARCH PROJECT (By Hon. President APJ Abdul Kalam)
GOLD MEDAL FOR RESEARCH ON DISABILITY (By Disabled’s Club of India)
NOMINATED FOR BEST MSME AWARDS 2017
5 STAR RATING ON GOOGLE
We have PhD experts from reputed institutions/ organizations like Indian Institute of Technology (IIT), Indian Institute of Management (IIM) and many more apex education institutions in India. Our works are tailored and drafted as per your requirements and are totally unique.
From past years our core advisory members, research team assisted research scholars from various universities from all corners of world.
Subjects/Areas We Cover:
Management, Commerce, Finance, Marketing, Psychology, Education, Sociology, Mass communications, English Literature, English Language, Law, History, Computer Science & Engineering, Electronics & Communication Engineering, Mechanical Engineering, Civil Engineering, Electrical Engineering, Pharmacy & Healthcare.
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...IRJET Journal
This document summarizes a study that used machine learning and Python to detect online transaction fraud. It describes how online transactions and fraud are increasing. The study used a real credit card dataset to train models like KNN, NB, and SVM to detect fraudulent transactions based on user behavior patterns and restrict fraudulent users after three failed attempts. The goal was to develop a system that can detect fraud in real-time and prevent losses for banks and credit card users.
ENMG 602 Homework Assignment 1 Problem 1 Observation.docxkhanpaulita
ENMG 602 Homework Assignment 1
Problem 1:
Observations of the demand for a spare part stocked at a parts supply depot during the
calendar year 2012 were
Month Demand Month Demand
January 95 July 234
February 62 August 284
March 135 September 221
April 211 October 281
May 199 November 192
June 276 December 302
a. Determine the one-step-ahead forecasts for the demand for January 2013 using 3-,
6-, and 12-month moving averages.
b. Using a four-month moving average, determine the one-step-ahead forecasts for
July through December 2012.
c. Compute MAD, MSE, MAPE for the forecasts obtained in b.
Problem 2:
Observed weekly sales of ball peen hammers at the town hardware store over a ten-week
period have been 13, 11, 26, 21, 32, 13, 21, 22, 30, and 26.
a. Suppose that five-week moving averages are used to forecast sales. Determine the
one-step-ahead forecasts for weeks 6 through 10.
b. Suppose that exponential smoothing is used with a smoothing constant of α =
0.15. Find the exponential smoothing forecasts for weeks 6 through 10 (start the
forecasting process from week 1).
c. Based on the MAD, which forecast method is better?
Problem 3:
The sales of a tablet computer in a popular electronic store during the calendar year 2012
were
Month Demand Month Demand
January 103 July 199
February 119 August 208
March 131 September 221
April 149 October 237
May 172 November 252
June 184 December 268
a. Using 3-month simple moving average and exponential smoothing (with α = 0.10
and 0.20), determine the one-step-ahead forecasts for July 2012 through January
2013.
ENMG 602 Homework Assignment 1
b. Using 3-month double moving average (using base level and trend), determine the
one-step-ahead forecasts for July 2012 through January 2013.
c. Compute MAD, MSE, and MAPE for the above forecasts.
d. Based on the MAPE, which forecast method is the best?
Problem 4:
Compile a list of major system life-cycle activities. For each activity on the list, try to
find the related supply chain activities. Present your finding in a table with the system
life-cycle stage in the first column, system life-cycle activities in the second column and
the related supply chain activities in the third column.
CYBER SECURITY IN E-BUSINESS
1
CYBER SECURITY IN E-BUSINESS
2
Cyber Security in E-Business
Abstract
Technological advancement has resulted in the significant simplicity of carrying out activities and processes in many areas. The business world has attained a significant benefit from this advancement. Through it, e-businesses have emerged, where individuals and organizations can electronically carry out business activities, thus without the need to be physically present at the point and time of transacting. According to Furnell (2004), e-business refers to a model of doing business or a segment of a larger model that allows commercial transactions to be undertaken througho.
Safety Mechanism of Cyber Crime in Indian Banking Systempaperpublications3
Abstract: Use of technology in financial services of course has given a tremendous impetus to their development however, due to heavy dependency on electronic and digital tools to carry out business and payment transactions, a serious threat has also been imposed to the safety and reliability of financial operations. This technology word changes the human life in every manner and every sector. Banking field is one of them. Banking in India originated in the last decades in 18th century. Since that time banking sector applying different ways to provide facilities and securities to a common man regarding to money. Security issues play extremely important role in the implementation of technologies specially in banking. The banking sector is at the core of who comes to cyber security becomes more important on that front. After the arrival of internet and world wibe web communicating banking sector is totally change specially in terms of security because now money is in your hand on a single click, Now users with different kinds of ways is the number of options to manage your money. In this paper an attempt to cyber security mechanism put forward an issues of Indians banks websites.
1. The document discusses the rise of e-banking and its effects on consumers. It provides a history of e-banking from its origins in the 1980s to the present day, noting important developments like increased internet usage in the 1990s and focus on security measures.
2. The authors propose conducting a survey of 20-40 year olds to assess the effects of e-banking on consumers. The proposed 10 question survey would examine topics like percentage of banking done online, usage of banking apps, and views on e-banking security, convenience and influence on spending.
3. The document suggests social media could be used to administer the survey cost-effectively and efficiently reach a wide audience
This document provides a review of e-commerce. It begins by defining e-commerce and discussing its key types. It then examines several factors facilitating e-commerce, including the internet, payment gateways, analytics, social media, autonomous vehicles, and 3D printing. The document discusses trends in India's growing e-commerce market and underlying factors in its success. Finally, it reviews several past studies examining topics like customer satisfaction, consistency, and technological considerations for online banking.
Evolution of Digital Marketing and its Impact on Privacyijtsrd
The document discusses the evolution of digital marketing and its impact on privacy. It describes how digital marketing began in the 1990s with early internet advertising and search engines. Social media, e-commerce, and streaming platforms later became important for digital marketing. Big data analytics and behavioral analytics then shaped digital marketing by helping companies target advertisements. The rise of smartphones further changed digital marketing by enabling more data collection. While digital marketing has advanced through these technologies, the extensive data collection has raised privacy concerns regarding how user information is used.
This document discusses fraud and risk in the context of big data. It begins by defining big data and providing examples of how large companies like Walmart and Facebook handle massive amounts of data daily. It then discusses different types of fraud that can occur, such as credit card fraud and fraud on social media. Finally, it discusses risk management and how credit and market risk analytics are used to analyze past data to predict future risks. In summary, the document outlines the opportunities and challenges of using big data for fraud detection and risk management.
Why is cyber security a disruption in the digital economyMark Albala
As we enter the digital economy, companies will quickly realize that the differentiator in the digital economy is information and information being a valuable resource is subject to theft, hacking, phishing and a host of other issues which compromise a company’s ability to participate in the digital economy. Cybersecurity misfires compromise the trust of buyers and partners necessary to participate in the digital economy. It is up to every company to ensure that the information shared with them is protected to the best of their ability and proactively notify persons and organizations who entrust their information necessary to transact business (any personal identity information including but not limited to addresses, credit card information, social security numbers, account information, credit information, medical records, etc.) with any potential compromises which can yield harm to them by that information either being used maliciously or shared with others.
The digital economy is different than other versions of commerce because in the digital economy, information is the lifeblood of digital commerce that passes through the hands of many platforms involved in a digital event. Each of these platforms are an opportunity to wreak havoc on your well-intended but incomplete intents to protect the information contained within the network you control. In the digital economy, it is not only the network you control, but the platforms that touch the personal data entrusted to you as a means of enabling digital commerce, and several techniques have begun to emerge to protect personal information contained within your information domain and the domain of platforms participating in digital commerce.
Because the life blood of the digital economy is information, information hacked in the digital economy is akin to shrinkage in the legacy economy. Both are means to directly attack your bottom line, whether it is redirecting customers elsewhere because they don’t trust your privacy program, ransomware which makes your site or one of your partner platform sites dangerous to use or some other reason which challenges your ability to participate in the digital economy. Shrinking the potential market share because of information safety and security challenges is a disruption, making cyber-security a disruptive activity, particularly if it is not dealt with swiftly.
If your cyber-security program is focused entirely on protecting the information housed in your four walls, you have exposed yourself to problems you will have difficulty in identifying both the source and the entry point of these issues.
FingerPay provides a secure mobile banking solution using biometrics for authentication. Their solution addresses security issues with traditional mobile banking by developing customized banking applications for each user that contain an encrypted biometric template. This prevents biometric data from being stored by banks and makes the applications more secure. They aim to eliminate fraud and build trust in mobile banking.
By 2020 more than 7 billion people will be communicating and performing transactions over the web on over 35 billion devices. So how can companies effectively create a digital identity that promises security, ease and comfort for its customers? This study, sponsored by Oracle, assesses the role identity plays in the digital economy. Visit hub: http://bit.ly/1LKqXfN
This document discusses the growing issue of cybercrime in Bangladesh, particularly among youth. As internet and technology usage increases, so do various forms of cybercrime like hacking, phishing, cyberbullying, and the spreading of misinformation. Many youth are victimized on social media and fall prey to financial crimes. While laws and enforcement agencies have been established to address cybercrime, challenges remain like a lack of skills and resources within law enforcement. The document calls for greater public awareness, strengthened laws and policies, and international cooperation to curb cybercrime and protect Bangladesh's digital progress and national security.
Introduction
Big Data may well be the Next Big Thing in the IT world.
Big data burst upon the scene in the first decade of the 21st century.
The first organizations to embrace it were online and startup firms. Firms like Google, eBay, LinkedIn, and Face book were built around big data from the beginning.
Like many new information technologies, big data can bring about dramatic cost reductions, substantial improvements in the time required to perform a computing task, or new product and service offerings.
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
This document discusses privacy and security issues related to social media. It begins by introducing how social media has become integral to modern life but also presents privacy risks if users share personal information publicly. Some key privacy threats on social media mentioned include data breaches, passive attacks like unauthorized data collection, and active attacks trying to access other user accounts. The document then reviews literature around social media security and privacy concerns. It outlines common security risks like unmonitored accounts, human error, and vulnerabilities in third-party apps linked to social media profiles. Potential threats to social networks are categorized as data breaches, passive attacks, and active attacks. The document concludes that social networks pose significant security and privacy risks and all users should take steps to protect
This document is a project report on cybercrime in the banking sector submitted by Praveen Singh Pokharia to the University of Lucknow. It contains an introduction that defines cybercrime and notes that cybercrime in banking involves crimes like ATM fraud, money laundering, and credit card fraud. It also provides an index of topics to be covered in the report such as the reasons for cybercrime, cybercriminals, cybercrime in the banking sector, case studies, and recent cases. The report aims to analyze cybercrime affecting the banking sector in India.
The document discusses cybercrime in Pakistan. It notes that while cybercrime rates are not as high as other countries due to lower internet usage, cybercrime is increasing in Pakistan. Recent cyberattacks in Pakistan have compromised thousands of debit cards from various banks, with personal information being dumped and sold on the dark web. Social media sites are also discussed as being vulnerable to privacy threats and other cyber issues. While Pakistan is advancing with new technology, lack of awareness and proper legislation have contributed to increased cybercrime risks.
Top Trends from SXSW Interactive 2014. The Big Roundup.Ashika Chauhan
SXSW wasn’t just about one or two pieces of new tech, what it actually felt like was a glimpse into the not-so-distant future.
Trends you might of heard of like wearables, data and the internet of things are still around, but they’re beginning to grow-up and different industries are beginning to be disrupted as a result.
More than anything, the conference instilled a sense of responsibility in me. The decisions we make today, as people, as agencies and as brands will define the future we live in tomorrow.
The deck covers the most prominent trends from this year. I'd love to hear your thoughts, say hello @ashikachauhan.
Ashika Chauhan is Big’s Digital Experience Director and is passionate about creative innovation.
The document discusses security issues in e-commerce and evaluates current technologies enabling e-commerce security. It covers topics like privacy concerns of consumers, arguments for and against privacy, technological solutions like P3P and SSL, and opportunities for future research. The author recommends continued research on the subject and establishing new regulations to protect consumer privacy through collaboration between consumers, businesses and governments.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment Analysis
Writekraft Research and Publications LLP was initially formed, informally, in 2006 by a group of scholars to help fellow students. Gradually, with several dissertations, thesis and assignments receiving acclaim and a good grade, Writekraft was officially founded in 2011 Since its establishment, Writekraft Research & Publications LLP is Guiding and Mentoring PhD Scholars.
Our Mission:
To provide breakthrough research works to our clients through Perseverant efforts towards creativity and innovation”.
Vision:
Writekraft endeavours to be the leading global research and publications company that will fulfil all research needs of our clients. We will achieve this vision through:
Analyzing every customer's aims, objectives and purpose of research
Using advanced and latest tools and technique of research and analysis
Coordinating and including their own ideas and knowledge
Providing the desired inferences and results of the research
In the past decade, we have successfully assisted students from various universities in India and globally. We at Writekraft Research & Publications LLP head office in Kanpur, India are most trusted and professional Research, Writing, Guidance and Publication Service Provider for PhD. Our services meet all your PhD Admissions, Thesis Preparation and Research Paper Publication needs with highest regards for the quality you prefer.
Our Achievements:
NATIONAL AWARD FOR BEST RESEARCH PROJECT (By Hon. President APJ Abdul Kalam)
GOLD MEDAL FOR RESEARCH ON DISABILITY (By Disabled’s Club of India)
NOMINATED FOR BEST MSME AWARDS 2017
5 STAR RATING ON GOOGLE
We have PhD experts from reputed institutions/ organizations like Indian Institute of Technology (IIT), Indian Institute of Management (IIM) and many more apex education institutions in India. Our works are tailored and drafted as per your requirements and are totally unique.
From past years our core advisory members, research team assisted research scholars from various universities from all corners of world.
Subjects/Areas We Cover:
Management, Commerce, Finance, Marketing, Psychology, Education, Sociology, Mass communications, English Literature, English Language, Law, History, Computer Science & Engineering, Electronics & Communication Engineering, Mechanical Engineering, Civil Engineering, Electrical Engineering, Pharmacy & Healthcare.
Writekraft Research and Publications LLP was initially formed, informally, in 2006 by a group of scholars to help fellow students. Gradually, with several dissertations, thesis and assignments receiving acclaim and a good grade, Writekraft was officially founded in 2011 Since its establishment, Writekraft Research & Publications LLP is Guiding and Mentoring PhD Scholars.
Our Mission:
To provide breakthrough research works to our clients through Perseverant efforts towards creativity and innovation”.
Vision:
Writekraft endeavours to be the leading global research and publications company that will fulfil all research needs of our clients. We will achieve this vision through:
Analyzing every customer's aims, objectives and purpose of research
Using advanced and latest tools and technique of research and analysis
Coordinating and including their own ideas and knowledge
Providing the desired inferences and results of the research
In the past decade, we have successfully assisted students from various universities in India and globally. We at Writekraft Research & Publications LLP head office in Kanpur, India are most trusted and professional Research, Writing, Guidance and Publication Service Provider for PhD. Our services meet all your PhD Admissions, Thesis Preparation and Research Paper Publication needs with highest regards for the quality you prefer.
Our Achievements:
NATIONAL AWARD FOR BEST RESEARCH PROJECT (By Hon. President APJ Abdul Kalam)
GOLD MEDAL FOR RESEARCH ON DISABILITY (By Disabled’s Club of India)
NOMINATED FOR BEST MSME AWARDS 2017
5 STAR RATING ON GOOGLE
We have PhD experts from reputed institutions/ organizations like Indian Institute of Technology (IIT), Indian Institute of Management (IIM) and many more apex education institutions in India. Our works are tailored and drafted as per your requirements and are totally unique.
From past years our core advisory members, research team assisted research scholars from various universities from all corners of world.
Subjects/Areas We Cover:
Management, Commerce, Finance, Marketing, Psychology, Education, Sociology, Mass communications, English Literature, English Language, Law, History, Computer Science & Engineering, Electronics & Communication Engineering, Mechanical Engineering, Civil Engineering, Electrical Engineering, Pharmacy & Healthcare.
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...IRJET Journal
This document summarizes a study that used machine learning and Python to detect online transaction fraud. It describes how online transactions and fraud are increasing. The study used a real credit card dataset to train models like KNN, NB, and SVM to detect fraudulent transactions based on user behavior patterns and restrict fraudulent users after three failed attempts. The goal was to develop a system that can detect fraud in real-time and prevent losses for banks and credit card users.
ENMG 602 Homework Assignment 1 Problem 1 Observation.docxkhanpaulita
ENMG 602 Homework Assignment 1
Problem 1:
Observations of the demand for a spare part stocked at a parts supply depot during the
calendar year 2012 were
Month Demand Month Demand
January 95 July 234
February 62 August 284
March 135 September 221
April 211 October 281
May 199 November 192
June 276 December 302
a. Determine the one-step-ahead forecasts for the demand for January 2013 using 3-,
6-, and 12-month moving averages.
b. Using a four-month moving average, determine the one-step-ahead forecasts for
July through December 2012.
c. Compute MAD, MSE, MAPE for the forecasts obtained in b.
Problem 2:
Observed weekly sales of ball peen hammers at the town hardware store over a ten-week
period have been 13, 11, 26, 21, 32, 13, 21, 22, 30, and 26.
a. Suppose that five-week moving averages are used to forecast sales. Determine the
one-step-ahead forecasts for weeks 6 through 10.
b. Suppose that exponential smoothing is used with a smoothing constant of α =
0.15. Find the exponential smoothing forecasts for weeks 6 through 10 (start the
forecasting process from week 1).
c. Based on the MAD, which forecast method is better?
Problem 3:
The sales of a tablet computer in a popular electronic store during the calendar year 2012
were
Month Demand Month Demand
January 103 July 199
February 119 August 208
March 131 September 221
April 149 October 237
May 172 November 252
June 184 December 268
a. Using 3-month simple moving average and exponential smoothing (with α = 0.10
and 0.20), determine the one-step-ahead forecasts for July 2012 through January
2013.
ENMG 602 Homework Assignment 1
b. Using 3-month double moving average (using base level and trend), determine the
one-step-ahead forecasts for July 2012 through January 2013.
c. Compute MAD, MSE, and MAPE for the above forecasts.
d. Based on the MAPE, which forecast method is the best?
Problem 4:
Compile a list of major system life-cycle activities. For each activity on the list, try to
find the related supply chain activities. Present your finding in a table with the system
life-cycle stage in the first column, system life-cycle activities in the second column and
the related supply chain activities in the third column.
CYBER SECURITY IN E-BUSINESS
1
CYBER SECURITY IN E-BUSINESS
2
Cyber Security in E-Business
Abstract
Technological advancement has resulted in the significant simplicity of carrying out activities and processes in many areas. The business world has attained a significant benefit from this advancement. Through it, e-businesses have emerged, where individuals and organizations can electronically carry out business activities, thus without the need to be physically present at the point and time of transacting. According to Furnell (2004), e-business refers to a model of doing business or a segment of a larger model that allows commercial transactions to be undertaken througho.
Safety Mechanism of Cyber Crime in Indian Banking Systempaperpublications3
Abstract: Use of technology in financial services of course has given a tremendous impetus to their development however, due to heavy dependency on electronic and digital tools to carry out business and payment transactions, a serious threat has also been imposed to the safety and reliability of financial operations. This technology word changes the human life in every manner and every sector. Banking field is one of them. Banking in India originated in the last decades in 18th century. Since that time banking sector applying different ways to provide facilities and securities to a common man regarding to money. Security issues play extremely important role in the implementation of technologies specially in banking. The banking sector is at the core of who comes to cyber security becomes more important on that front. After the arrival of internet and world wibe web communicating banking sector is totally change specially in terms of security because now money is in your hand on a single click, Now users with different kinds of ways is the number of options to manage your money. In this paper an attempt to cyber security mechanism put forward an issues of Indians banks websites.
1. The document discusses the rise of e-banking and its effects on consumers. It provides a history of e-banking from its origins in the 1980s to the present day, noting important developments like increased internet usage in the 1990s and focus on security measures.
2. The authors propose conducting a survey of 20-40 year olds to assess the effects of e-banking on consumers. The proposed 10 question survey would examine topics like percentage of banking done online, usage of banking apps, and views on e-banking security, convenience and influence on spending.
3. The document suggests social media could be used to administer the survey cost-effectively and efficiently reach a wide audience
This document provides a review of e-commerce. It begins by defining e-commerce and discussing its key types. It then examines several factors facilitating e-commerce, including the internet, payment gateways, analytics, social media, autonomous vehicles, and 3D printing. The document discusses trends in India's growing e-commerce market and underlying factors in its success. Finally, it reviews several past studies examining topics like customer satisfaction, consistency, and technological considerations for online banking.
Evolution of Digital Marketing and its Impact on Privacyijtsrd
The document discusses the evolution of digital marketing and its impact on privacy. It describes how digital marketing began in the 1990s with early internet advertising and search engines. Social media, e-commerce, and streaming platforms later became important for digital marketing. Big data analytics and behavioral analytics then shaped digital marketing by helping companies target advertisements. The rise of smartphones further changed digital marketing by enabling more data collection. While digital marketing has advanced through these technologies, the extensive data collection has raised privacy concerns regarding how user information is used.
This document discusses fraud and risk in the context of big data. It begins by defining big data and providing examples of how large companies like Walmart and Facebook handle massive amounts of data daily. It then discusses different types of fraud that can occur, such as credit card fraud and fraud on social media. Finally, it discusses risk management and how credit and market risk analytics are used to analyze past data to predict future risks. In summary, the document outlines the opportunities and challenges of using big data for fraud detection and risk management.
Why is cyber security a disruption in the digital economyMark Albala
As we enter the digital economy, companies will quickly realize that the differentiator in the digital economy is information and information being a valuable resource is subject to theft, hacking, phishing and a host of other issues which compromise a company’s ability to participate in the digital economy. Cybersecurity misfires compromise the trust of buyers and partners necessary to participate in the digital economy. It is up to every company to ensure that the information shared with them is protected to the best of their ability and proactively notify persons and organizations who entrust their information necessary to transact business (any personal identity information including but not limited to addresses, credit card information, social security numbers, account information, credit information, medical records, etc.) with any potential compromises which can yield harm to them by that information either being used maliciously or shared with others.
The digital economy is different than other versions of commerce because in the digital economy, information is the lifeblood of digital commerce that passes through the hands of many platforms involved in a digital event. Each of these platforms are an opportunity to wreak havoc on your well-intended but incomplete intents to protect the information contained within the network you control. In the digital economy, it is not only the network you control, but the platforms that touch the personal data entrusted to you as a means of enabling digital commerce, and several techniques have begun to emerge to protect personal information contained within your information domain and the domain of platforms participating in digital commerce.
Because the life blood of the digital economy is information, information hacked in the digital economy is akin to shrinkage in the legacy economy. Both are means to directly attack your bottom line, whether it is redirecting customers elsewhere because they don’t trust your privacy program, ransomware which makes your site or one of your partner platform sites dangerous to use or some other reason which challenges your ability to participate in the digital economy. Shrinking the potential market share because of information safety and security challenges is a disruption, making cyber-security a disruptive activity, particularly if it is not dealt with swiftly.
If your cyber-security program is focused entirely on protecting the information housed in your four walls, you have exposed yourself to problems you will have difficulty in identifying both the source and the entry point of these issues.
FingerPay provides a secure mobile banking solution using biometrics for authentication. Their solution addresses security issues with traditional mobile banking by developing customized banking applications for each user that contain an encrypted biometric template. This prevents biometric data from being stored by banks and makes the applications more secure. They aim to eliminate fraud and build trust in mobile banking.
By 2020 more than 7 billion people will be communicating and performing transactions over the web on over 35 billion devices. So how can companies effectively create a digital identity that promises security, ease and comfort for its customers? This study, sponsored by Oracle, assesses the role identity plays in the digital economy. Visit hub: http://bit.ly/1LKqXfN
This document discusses the growing issue of cybercrime in Bangladesh, particularly among youth. As internet and technology usage increases, so do various forms of cybercrime like hacking, phishing, cyberbullying, and the spreading of misinformation. Many youth are victimized on social media and fall prey to financial crimes. While laws and enforcement agencies have been established to address cybercrime, challenges remain like a lack of skills and resources within law enforcement. The document calls for greater public awareness, strengthened laws and policies, and international cooperation to curb cybercrime and protect Bangladesh's digital progress and national security.
Introduction
Big Data may well be the Next Big Thing in the IT world.
Big data burst upon the scene in the first decade of the 21st century.
The first organizations to embrace it were online and startup firms. Firms like Google, eBay, LinkedIn, and Face book were built around big data from the beginning.
Like many new information technologies, big data can bring about dramatic cost reductions, substantial improvements in the time required to perform a computing task, or new product and service offerings.
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
This document discusses privacy and security issues related to social media. It begins by introducing how social media has become integral to modern life but also presents privacy risks if users share personal information publicly. Some key privacy threats on social media mentioned include data breaches, passive attacks like unauthorized data collection, and active attacks trying to access other user accounts. The document then reviews literature around social media security and privacy concerns. It outlines common security risks like unmonitored accounts, human error, and vulnerabilities in third-party apps linked to social media profiles. Potential threats to social networks are categorized as data breaches, passive attacks, and active attacks. The document concludes that social networks pose significant security and privacy risks and all users should take steps to protect
This document is a project report on cybercrime in the banking sector submitted by Praveen Singh Pokharia to the University of Lucknow. It contains an introduction that defines cybercrime and notes that cybercrime in banking involves crimes like ATM fraud, money laundering, and credit card fraud. It also provides an index of topics to be covered in the report such as the reasons for cybercrime, cybercriminals, cybercrime in the banking sector, case studies, and recent cases. The report aims to analyze cybercrime affecting the banking sector in India.
The document discusses cybercrime in Pakistan. It notes that while cybercrime rates are not as high as other countries due to lower internet usage, cybercrime is increasing in Pakistan. Recent cyberattacks in Pakistan have compromised thousands of debit cards from various banks, with personal information being dumped and sold on the dark web. Social media sites are also discussed as being vulnerable to privacy threats and other cyber issues. While Pakistan is advancing with new technology, lack of awareness and proper legislation have contributed to increased cybercrime risks.
Top Trends from SXSW Interactive 2014. The Big Roundup.Ashika Chauhan
SXSW wasn’t just about one or two pieces of new tech, what it actually felt like was a glimpse into the not-so-distant future.
Trends you might of heard of like wearables, data and the internet of things are still around, but they’re beginning to grow-up and different industries are beginning to be disrupted as a result.
More than anything, the conference instilled a sense of responsibility in me. The decisions we make today, as people, as agencies and as brands will define the future we live in tomorrow.
The deck covers the most prominent trends from this year. I'd love to hear your thoughts, say hello @ashikachauhan.
Ashika Chauhan is Big’s Digital Experience Director and is passionate about creative innovation.
The document discusses security issues in e-commerce and evaluates current technologies enabling e-commerce security. It covers topics like privacy concerns of consumers, arguments for and against privacy, technological solutions like P3P and SSL, and opportunities for future research. The author recommends continued research on the subject and establishing new regulations to protect consumer privacy through collaboration between consumers, businesses and governments.
Similar to Cyber Impact of Fake Instagram Business Account Identify Based on Sentiment Analysis (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.