This document discusses a machine learning approach for detecting cyberbullying in various forms of digital content, including text, images, and PDF documents. It proposes using techniques like SVM, k-nearest neighbors, decision trees, and random forests trained on labeled datasets. For text, it would use natural language processing to analyze emotional content and harmful language. Images would be analyzed with deep learning to identify visual cues of cyberbullying. PDFs would use OCR to extract text for analysis. The goal is to automatically flag instances of cyberbullying to help reduce its prevalence online and make spaces safer. It concludes some algorithms like decision trees had the best accuracy and that continued innovation could enhance cyberbullying detection.
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
1) The document presents a machine learning approach to detect phishing URLs using logistic regression. It trains a logistic regression model on a dataset of 420,467 URLs that have been classified as either phishing or legitimate.
2) It preprocesses the URLs using tokenization before training the logistic regression model. The trained model is able to classify new URLs with 96% accuracy as either phishing or legitimate based on the URL features.
3) The proposed approach provides an automated way to detect phishing URLs in real-time and help prevent phishing attacks. Future work could involve developing a browser extension using this approach and increasing the dataset size for higher accuracy.
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
1) The document presents a machine learning approach to detect phishing URLs using logistic regression. It trains a logistic regression model on a dataset of 420,467 URLs that have been classified as either phishing or legitimate.
2) It preprocesses the URLs using tokenization before training the logistic regression model. The trained model is able to classify new URLs with 96% accuracy as either phishing or legitimate based on the URL features.
3) The proposed approach provides an automated way to detect phishing URLs in real-time and help prevent phishing attacks. Future work could involve developing a browser extension using this approach and increasing the dataset size for higher accuracy.
Utilization of Machine Learning in Computer VisionIRJET Journal
The document discusses the utilization of machine learning in computer vision. It begins by defining machine learning and computer vision, noting they aim to bring human data sensing and understanding capabilities to computers. It then discusses several applications of machine learning in computer vision, such as object detection in images using algorithms like convolutional neural networks. Finally, it concludes that machine learning and computer vision have reduced costs and improved technologies in many fields like healthcare, transportation and more, with emerging areas including life sciences and human activity analysis.
Utilization of Machine Learning in Computer VisionIRJET Journal
The document discusses the utilization of machine learning in computer vision. It begins by defining machine learning and computer vision, noting they aim to bring human data sensing and understanding capabilities to computers. It then discusses several applications of machine learning in computer vision, such as object detection in images using algorithms like convolutional neural networks. Finally, it concludes that machine learning and computer vision have reduced costs and improved technologies in many fields like healthcare, transportation and more, with emerging areas including life sciences and human activity analysis.
Intrusion Detection System Using Face RecognitionIRJET Journal
This document describes an intrusion detection system that uses facial recognition technology. The system works by capturing images of individuals attempting to access a secure area and comparing the images to a database of authorized individuals. If an unauthorized match is found, security personnel are alerted. The system uses a Raspberry Pi, camera, motion sensor, and Python scripts for facial detection and recognition. It analyzes machine learning algorithms like CNNs, SVMs, and FisherFaces for the recognition process. The proposed system is designed to provide reliable detection of unauthorized access and has applications in places like airports, banks and government institutions to enhance security. A literature review discusses similar security systems using technologies like motion detection and analyzes research on improving intrusion detection using machine
Intrusion Detection System Using Face RecognitionIRJET Journal
This document describes an intrusion detection system that uses facial recognition technology. The system works by capturing images of individuals attempting to access a secure area and comparing the images to a database of authorized individuals. If an unauthorized match is found, security personnel are alerted. The system uses a Raspberry Pi, camera, motion sensor, and Python scripts for facial detection and recognition. It analyzes machine learning algorithms like CNNs, SVMs, and FisherFaces for the recognition process. The proposed system is designed to provide reliable detection of unauthorized access and has applications in places like airports, banks and government institutions to enhance security. A literature review discusses similar security systems using technologies like motion detection and analyzes research on improving intrusion detection using machine
Intrusion Detection System Using Machine Learning: An OverviewIRJET Journal
This document provides an overview of machine learning approaches for intrusion detection systems (IDS). It discusses how IDS use data mining techniques like classification, clustering, and association rule mining to detect network intrusions based on patterns in data. The document reviews several papers applying methods like ant colony optimization, support vector machines, genetic algorithms, and convolutional neural networks to classify network activities as normal or intrusive. It compares the strengths and limitations of different machine learning algorithms for IDS and identifies areas for potential improvement in future research.
Intrusion Detection System Using Machine Learning: An OverviewIRJET Journal
This document provides an overview of machine learning approaches for intrusion detection systems (IDS). It discusses how IDS use data mining techniques like classification, clustering, and association rule mining to detect network intrusions based on patterns in data. The document reviews several papers applying methods like ant colony optimization, support vector machines, genetic algorithms, and convolutional neural networks to classify network activities as normal or intrusive. It compares the strengths and limitations of different machine learning algorithms for IDS and identifies areas for potential improvement in future research.
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
1) The document presents a machine learning approach to detect phishing URLs using logistic regression. It trains a logistic regression model on a dataset of 420,467 URLs that have been classified as either phishing or legitimate.
2) It preprocesses the URLs using tokenization before training the logistic regression model. The trained model is able to classify new URLs with 96% accuracy as either phishing or legitimate based on the URL features.
3) The proposed approach provides an automated way to detect phishing URLs in real-time and help prevent phishing attacks. Future work could involve developing a browser extension using this approach and increasing the dataset size for higher accuracy.
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET Journal
1) The document presents a machine learning approach to detect phishing URLs using logistic regression. It trains a logistic regression model on a dataset of 420,467 URLs that have been classified as either phishing or legitimate.
2) It preprocesses the URLs using tokenization before training the logistic regression model. The trained model is able to classify new URLs with 96% accuracy as either phishing or legitimate based on the URL features.
3) The proposed approach provides an automated way to detect phishing URLs in real-time and help prevent phishing attacks. Future work could involve developing a browser extension using this approach and increasing the dataset size for higher accuracy.
Utilization of Machine Learning in Computer VisionIRJET Journal
The document discusses the utilization of machine learning in computer vision. It begins by defining machine learning and computer vision, noting they aim to bring human data sensing and understanding capabilities to computers. It then discusses several applications of machine learning in computer vision, such as object detection in images using algorithms like convolutional neural networks. Finally, it concludes that machine learning and computer vision have reduced costs and improved technologies in many fields like healthcare, transportation and more, with emerging areas including life sciences and human activity analysis.
Utilization of Machine Learning in Computer VisionIRJET Journal
The document discusses the utilization of machine learning in computer vision. It begins by defining machine learning and computer vision, noting they aim to bring human data sensing and understanding capabilities to computers. It then discusses several applications of machine learning in computer vision, such as object detection in images using algorithms like convolutional neural networks. Finally, it concludes that machine learning and computer vision have reduced costs and improved technologies in many fields like healthcare, transportation and more, with emerging areas including life sciences and human activity analysis.
Intrusion Detection System Using Face RecognitionIRJET Journal
This document describes an intrusion detection system that uses facial recognition technology. The system works by capturing images of individuals attempting to access a secure area and comparing the images to a database of authorized individuals. If an unauthorized match is found, security personnel are alerted. The system uses a Raspberry Pi, camera, motion sensor, and Python scripts for facial detection and recognition. It analyzes machine learning algorithms like CNNs, SVMs, and FisherFaces for the recognition process. The proposed system is designed to provide reliable detection of unauthorized access and has applications in places like airports, banks and government institutions to enhance security. A literature review discusses similar security systems using technologies like motion detection and analyzes research on improving intrusion detection using machine
Intrusion Detection System Using Face RecognitionIRJET Journal
This document describes an intrusion detection system that uses facial recognition technology. The system works by capturing images of individuals attempting to access a secure area and comparing the images to a database of authorized individuals. If an unauthorized match is found, security personnel are alerted. The system uses a Raspberry Pi, camera, motion sensor, and Python scripts for facial detection and recognition. It analyzes machine learning algorithms like CNNs, SVMs, and FisherFaces for the recognition process. The proposed system is designed to provide reliable detection of unauthorized access and has applications in places like airports, banks and government institutions to enhance security. A literature review discusses similar security systems using technologies like motion detection and analyzes research on improving intrusion detection using machine
Intrusion Detection System Using Machine Learning: An OverviewIRJET Journal
This document provides an overview of machine learning approaches for intrusion detection systems (IDS). It discusses how IDS use data mining techniques like classification, clustering, and association rule mining to detect network intrusions based on patterns in data. The document reviews several papers applying methods like ant colony optimization, support vector machines, genetic algorithms, and convolutional neural networks to classify network activities as normal or intrusive. It compares the strengths and limitations of different machine learning algorithms for IDS and identifies areas for potential improvement in future research.
Intrusion Detection System Using Machine Learning: An OverviewIRJET Journal
This document provides an overview of machine learning approaches for intrusion detection systems (IDS). It discusses how IDS use data mining techniques like classification, clustering, and association rule mining to detect network intrusions based on patterns in data. The document reviews several papers applying methods like ant colony optimization, support vector machines, genetic algorithms, and convolutional neural networks to classify network activities as normal or intrusive. It compares the strengths and limitations of different machine learning algorithms for IDS and identifies areas for potential improvement in future research.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.vivatechijri
In this technical age there are many ways where an attacker can get access to people’s sensitive information illegitimately. One of the ways is Phishing, Phishing is an activity of misleading people into giving their sensitive information on fraud websites that lookalike to the real website. The phishers aim is to steal personal information, bank details etc. Day by day it’s getting more and more risky to enter your personal information on websites fearing that it might be a phishing attack and can steal your sensitive information. That’s why phishing website detection is necessary to alert the user and block the website. An automated detection of phishing attack is necessary one of which is machine learning. Machine Learning is one of the efficient techniques to detect phishing attack as it removes drawback of existing approaches. Efficient machine learning model with content based approach proves very effective to detect phishing websites.
Our proposed system uses Hybrid approach which combines machine learning based method and content based method. The URL based features will be extracted and passed to machine learning model and in content based approach, TF-IDF algorithm will detect a phishing website by using the top keywords of a web page. This hybrid approach is used to achieve highly efficient result. Finally, our system will notify and alert user if the website is Phishing or Legitimate.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.vivatechijri
In this technical age there are many ways where an attacker can get access to people’s sensitive information illegitimately. One of the ways is Phishing, Phishing is an activity of misleading people into giving their sensitive information on fraud websites that lookalike to the real website. The phishers aim is to steal personal information, bank details etc. Day by day it’s getting more and more risky to enter your personal information on websites fearing that it might be a phishing attack and can steal your sensitive information. That’s why phishing website detection is necessary to alert the user and block the website. An automated detection of phishing attack is necessary one of which is machine learning. Machine Learning is one of the efficient techniques to detect phishing attack as it removes drawback of existing approaches. Efficient machine learning model with content based approach proves very effective to detect phishing websites.
Our proposed system uses Hybrid approach which combines machine learning based method and content based method. The URL based features will be extracted and passed to machine learning model and in content based approach, TF-IDF algorithm will detect a phishing website by using the top keywords of a web page. This hybrid approach is used to achieve highly efficient result. Finally, our system will notify and alert user if the website is Phishing or Legitimate.
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...IRJET Journal
This document discusses machine learning and deep learning techniques for detecting abusive content on Twitter. It presents an overview of cyber abuse and sentiment analysis. A literature review covers past research on cyberbullying detection. The methodology uses a dataset of over 32k tweets, which are preprocessed and analyzed using machine learning algorithms and an LSTM deep learning model. Results show that the LSTM model achieves 99.5% accuracy and 74.8% F1 score, outperforming machine learning models for detecting abusive tweets. The conclusion is that deep learning more effectively identifies abuse but continued experimentation is needed to address this important social media problem.
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...IRJET Journal
This document discusses machine learning and deep learning techniques for detecting abusive content on Twitter. It presents an overview of cyber abuse and sentiment analysis. A literature review covers past research on cyberbullying detection. The methodology uses a dataset of over 32k tweets, which are preprocessed and analyzed using machine learning algorithms and an LSTM deep learning model. Results show that the LSTM model achieves 99.5% accuracy and 74.8% F1 score, outperforming machine learning models for detecting abusive tweets. The conclusion is that deep learning more effectively identifies abuse but continued experimentation is needed to address this important social media problem.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.IRJET Journal
This document discusses machine learning and deep learning models for detecting IoT botnet attacks. It begins with an abstract that outlines the challenges of securing the growing number of IoT devices and describes how machine learning and deep learning techniques like LSTM RNN can be used to develop effective detection systems. The introduction provides background on botnets, distributed denial of service attacks, and the need for detection systems. The literature review then summarizes several previous works that used techniques such as Bayesian classifiers, random neural networks, decision trees, and other machine learning algorithms for attack detection. The methodology section outlines the general approach of anomaly-based intrusion detection systems and different learning methods. The experimental setup describes collecting and preprocessing data, feature extraction, model training and evaluation
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.IRJET Journal
This document discusses machine learning and deep learning models for detecting IoT botnet attacks. It begins with an abstract that outlines the challenges of securing the growing number of IoT devices and describes how machine learning and deep learning techniques like LSTM RNN can be used to develop effective detection systems. The introduction provides background on botnets, distributed denial of service attacks, and the need for detection systems. The literature review then summarizes several previous works that used techniques such as Bayesian classifiers, random neural networks, decision trees, and other machine learning algorithms for attack detection. The methodology section outlines the general approach of anomaly-based intrusion detection systems and different learning methods. The experimental setup describes collecting and preprocessing data, feature extraction, model training and evaluation
Machine learning are used for numerous functions like image processing, data mining, prediction analysis, online shopping, cybersecurity, digital forensics, network security etc. the aim of this research work is to explore on the research work that implement security system or provide a framework for system security using machine learning algorithms. Furthermore to explore other fields that applied machine learning algorithms to solve their problems. Stipulate the essential use of the technique, once an algorithm was trained on how to manipulate the provided data, the process of implementation remain automatic.
Machine learning are used for numerous functions like image processing, data mining, prediction analysis, online shopping, cybersecurity, digital forensics, network security etc. the aim of this research work is to explore on the research work that implement security system or provide a framework for system security using machine learning algorithms. Furthermore to explore other fields that applied machine learning algorithms to solve their problems. Stipulate the essential use of the technique, once an algorithm was trained on how to manipulate the provided data, the process of implementation remain automatic.
Women's Maltreatment Redressal System based on Machine Learning TechniquesIRJET Journal
This document discusses the development of a machine learning-based women's complaint registration system. The system aims to address issues like lack of connection between cases in different regions. It utilizes a deep feedforward neural network for accurate classification of complaints. The system portal allows victims to register complaints, access resources, and communicate in real-time with officials. It also allows officials to view case details and history. The system is intended to improve the efficiency of the complaint process through centralized information and ML-based case classification.
Women's Maltreatment Redressal System based on Machine Learning TechniquesIRJET Journal
This document discusses the development of a machine learning-based women's complaint registration system. The system aims to address issues like lack of connection between cases in different regions. It utilizes a deep feedforward neural network for accurate classification of complaints. The system portal allows victims to register complaints, access resources, and communicate in real-time with officials. It also allows officials to view case details and history. The system is intended to improve the efficiency of the complaint process through centralized information and ML-based case classification.
Terrorism Analysis through Social Media using Data MiningIRJET Journal
This document presents a study that uses deep learning models like Deep Neural Networks (DNN) and Convolutional Neural Networks (CNN) to analyze terrorism through detecting toxicity in social media text data. The study aims to classify text data into categories like toxicity, severe toxicity, obscenity, threat, insult or identity hate. It provides an overview of DNN and CNN models for text classification and compares their methodology, architecture and performance. The models are trained on preprocessed social media data related to terrorist activities and aim to accurately predict the toxicity level and classify tweets for concerned authorities to make informed decisions.
Terrorism Analysis through Social Media using Data MiningIRJET Journal
This document presents a study that uses deep learning models like Deep Neural Networks (DNN) and Convolutional Neural Networks (CNN) to analyze terrorism through detecting toxicity in social media text data. The study aims to classify text data into categories like toxicity, severe toxicity, obscenity, threat, insult or identity hate. It provides an overview of DNN and CNN models for text classification and compares their methodology, architecture and performance. The models are trained on preprocessed social media data related to terrorist activities and aim to accurately predict the toxicity level and classify tweets for concerned authorities to make informed decisions.
IRJET- Detecting Phishing Websites using Machine LearningIRJET Journal
This document describes a research project that aims to implement machine learning techniques to detect phishing websites. The researchers plan to test algorithms like logistic regression, SVM, decision trees and neural networks on a dataset of phishing links. They will evaluate the performance of these algorithms and develop a browser plugin using the best model. This plugin will detect malicious URLs and protect users from phishing attacks. The document provides background on phishing and outlines the proposed approach, dataset, algorithms to be tested, planned Chrome extension implementation, and expected results sections of the project.
IRJET- Detecting Phishing Websites using Machine LearningIRJET Journal
This document describes a research project that aims to implement machine learning techniques to detect phishing websites. The researchers plan to test algorithms like logistic regression, SVM, decision trees and neural networks on a dataset of phishing links. They will evaluate the performance of these algorithms and develop a browser plugin using the best model. This plugin will detect malicious URLs and protect users from phishing attacks. The document provides background on phishing and outlines the proposed approach, dataset, algorithms to be tested, planned Chrome extension implementation, and expected results sections of the project.
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AIIRJET Journal
This document describes a proposed system for criminal recognition using image recognition and AI. The system would use a database of criminal faces stored during the training process. Live camera feeds, such as at an airport, would be used as inputs. Facial recognition algorithms like Dlib68 would detect faces in the feed and compare them to the stored criminal database. If a match was found, authorities would be alerted via email with the captured photo and details. The goal is to help law enforcement quickly identify potential criminals in public spaces using automated image analysis techniques.
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AIIRJET Journal
This document describes a proposed system for criminal recognition using image recognition and AI. The system would use a database of criminal faces stored during the training process. Live camera feeds, such as at an airport, would be used as inputs. Facial recognition algorithms like Dlib68 would detect faces in the feed and compare them to the stored criminal database. If a match was found, authorities would be alerted via email with the captured photo and details. The goal is to help law enforcement quickly identify potential criminals in public spaces using automated image analysis techniques.
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCEIRJET Journal
This document discusses using machine learning techniques to predict ransomware attacks. It begins by providing background on ransomware, data science, and machine learning. It then describes building a model using various machine learning algorithms like logistic regression, random forest, H-LICKS, and voting classifier on preprocessed ransomware data. The random forest algorithm achieved the highest accuracy of 90.5%. The model can classify six types of ransomware attacks with 97% accuracy, which is 3x faster than other models. This accurate and fast ransomware prediction model could help organizations detect and prevent attacks. Overall, applying advanced machine learning represents progress in combating the growing threat of ransomware.
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCEIRJET Journal
This document discusses using machine learning techniques to predict ransomware attacks. It begins by providing background on ransomware, data science, and machine learning. It then describes building a model using various machine learning algorithms like logistic regression, random forest, H-LICKS, and voting classifier on preprocessed ransomware data. The random forest algorithm achieved the highest accuracy of 90.5%. The model can classify six types of ransomware attacks with 97% accuracy, which is 3x faster than other models. This accurate and fast ransomware prediction model could help organizations detect and prevent attacks. Overall, applying advanced machine learning represents progress in combating the growing threat of ransomware.
Comparative Study of Enchancement of Automated Student Attendance System Usin...IRJET Journal
This document discusses developing an automated student attendance system using facial recognition and deep learning algorithms. It begins with an overview of how facial recognition can be used to take attendance accurately and efficiently. It then describes the methodology, which involves using a convolutional neural network (CNN) to detect and recognize faces. Dimensionality reduction techniques like principal component analysis (PCA) and linear discriminant analysis (LDA) are also used to improve recognition accuracy. The goal is to build a system that can identify students in real-time with a high degree of accuracy, even in varying lighting conditions. It aims to automate the entire attendance tracking process for both students and teachers.
Comparative Study of Enchancement of Automated Student Attendance System Usin...IRJET Journal
This document discusses developing an automated student attendance system using facial recognition and deep learning algorithms. It begins with an overview of how facial recognition can be used to take attendance accurately and efficiently. It then describes the methodology, which involves using a convolutional neural network (CNN) to detect and recognize faces. Dimensionality reduction techniques like principal component analysis (PCA) and linear discriminant analysis (LDA) are also used to improve recognition accuracy. The goal is to build a system that can identify students in real-time with a high degree of accuracy, even in varying lighting conditions. It aims to automate the entire attendance tracking process for both students and teachers.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to Cyberbullying Detection Using Machine Learning
A Hybrid Approach For Phishing Website Detection Using Machine Learning.vivatechijri
In this technical age there are many ways where an attacker can get access to people’s sensitive information illegitimately. One of the ways is Phishing, Phishing is an activity of misleading people into giving their sensitive information on fraud websites that lookalike to the real website. The phishers aim is to steal personal information, bank details etc. Day by day it’s getting more and more risky to enter your personal information on websites fearing that it might be a phishing attack and can steal your sensitive information. That’s why phishing website detection is necessary to alert the user and block the website. An automated detection of phishing attack is necessary one of which is machine learning. Machine Learning is one of the efficient techniques to detect phishing attack as it removes drawback of existing approaches. Efficient machine learning model with content based approach proves very effective to detect phishing websites.
Our proposed system uses Hybrid approach which combines machine learning based method and content based method. The URL based features will be extracted and passed to machine learning model and in content based approach, TF-IDF algorithm will detect a phishing website by using the top keywords of a web page. This hybrid approach is used to achieve highly efficient result. Finally, our system will notify and alert user if the website is Phishing or Legitimate.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.vivatechijri
In this technical age there are many ways where an attacker can get access to people’s sensitive information illegitimately. One of the ways is Phishing, Phishing is an activity of misleading people into giving their sensitive information on fraud websites that lookalike to the real website. The phishers aim is to steal personal information, bank details etc. Day by day it’s getting more and more risky to enter your personal information on websites fearing that it might be a phishing attack and can steal your sensitive information. That’s why phishing website detection is necessary to alert the user and block the website. An automated detection of phishing attack is necessary one of which is machine learning. Machine Learning is one of the efficient techniques to detect phishing attack as it removes drawback of existing approaches. Efficient machine learning model with content based approach proves very effective to detect phishing websites.
Our proposed system uses Hybrid approach which combines machine learning based method and content based method. The URL based features will be extracted and passed to machine learning model and in content based approach, TF-IDF algorithm will detect a phishing website by using the top keywords of a web page. This hybrid approach is used to achieve highly efficient result. Finally, our system will notify and alert user if the website is Phishing or Legitimate.
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...IRJET Journal
This document discusses machine learning and deep learning techniques for detecting abusive content on Twitter. It presents an overview of cyber abuse and sentiment analysis. A literature review covers past research on cyberbullying detection. The methodology uses a dataset of over 32k tweets, which are preprocessed and analyzed using machine learning algorithms and an LSTM deep learning model. Results show that the LSTM model achieves 99.5% accuracy and 74.8% F1 score, outperforming machine learning models for detecting abusive tweets. The conclusion is that deep learning more effectively identifies abuse but continued experimentation is needed to address this important social media problem.
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...IRJET Journal
This document discusses machine learning and deep learning techniques for detecting abusive content on Twitter. It presents an overview of cyber abuse and sentiment analysis. A literature review covers past research on cyberbullying detection. The methodology uses a dataset of over 32k tweets, which are preprocessed and analyzed using machine learning algorithms and an LSTM deep learning model. Results show that the LSTM model achieves 99.5% accuracy and 74.8% F1 score, outperforming machine learning models for detecting abusive tweets. The conclusion is that deep learning more effectively identifies abuse but continued experimentation is needed to address this important social media problem.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.IRJET Journal
This document discusses machine learning and deep learning models for detecting IoT botnet attacks. It begins with an abstract that outlines the challenges of securing the growing number of IoT devices and describes how machine learning and deep learning techniques like LSTM RNN can be used to develop effective detection systems. The introduction provides background on botnets, distributed denial of service attacks, and the need for detection systems. The literature review then summarizes several previous works that used techniques such as Bayesian classifiers, random neural networks, decision trees, and other machine learning algorithms for attack detection. The methodology section outlines the general approach of anomaly-based intrusion detection systems and different learning methods. The experimental setup describes collecting and preprocessing data, feature extraction, model training and evaluation
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.IRJET Journal
This document discusses machine learning and deep learning models for detecting IoT botnet attacks. It begins with an abstract that outlines the challenges of securing the growing number of IoT devices and describes how machine learning and deep learning techniques like LSTM RNN can be used to develop effective detection systems. The introduction provides background on botnets, distributed denial of service attacks, and the need for detection systems. The literature review then summarizes several previous works that used techniques such as Bayesian classifiers, random neural networks, decision trees, and other machine learning algorithms for attack detection. The methodology section outlines the general approach of anomaly-based intrusion detection systems and different learning methods. The experimental setup describes collecting and preprocessing data, feature extraction, model training and evaluation
Machine learning are used for numerous functions like image processing, data mining, prediction analysis, online shopping, cybersecurity, digital forensics, network security etc. the aim of this research work is to explore on the research work that implement security system or provide a framework for system security using machine learning algorithms. Furthermore to explore other fields that applied machine learning algorithms to solve their problems. Stipulate the essential use of the technique, once an algorithm was trained on how to manipulate the provided data, the process of implementation remain automatic.
Machine learning are used for numerous functions like image processing, data mining, prediction analysis, online shopping, cybersecurity, digital forensics, network security etc. the aim of this research work is to explore on the research work that implement security system or provide a framework for system security using machine learning algorithms. Furthermore to explore other fields that applied machine learning algorithms to solve their problems. Stipulate the essential use of the technique, once an algorithm was trained on how to manipulate the provided data, the process of implementation remain automatic.
Women's Maltreatment Redressal System based on Machine Learning TechniquesIRJET Journal
This document discusses the development of a machine learning-based women's complaint registration system. The system aims to address issues like lack of connection between cases in different regions. It utilizes a deep feedforward neural network for accurate classification of complaints. The system portal allows victims to register complaints, access resources, and communicate in real-time with officials. It also allows officials to view case details and history. The system is intended to improve the efficiency of the complaint process through centralized information and ML-based case classification.
Women's Maltreatment Redressal System based on Machine Learning TechniquesIRJET Journal
This document discusses the development of a machine learning-based women's complaint registration system. The system aims to address issues like lack of connection between cases in different regions. It utilizes a deep feedforward neural network for accurate classification of complaints. The system portal allows victims to register complaints, access resources, and communicate in real-time with officials. It also allows officials to view case details and history. The system is intended to improve the efficiency of the complaint process through centralized information and ML-based case classification.
Terrorism Analysis through Social Media using Data MiningIRJET Journal
This document presents a study that uses deep learning models like Deep Neural Networks (DNN) and Convolutional Neural Networks (CNN) to analyze terrorism through detecting toxicity in social media text data. The study aims to classify text data into categories like toxicity, severe toxicity, obscenity, threat, insult or identity hate. It provides an overview of DNN and CNN models for text classification and compares their methodology, architecture and performance. The models are trained on preprocessed social media data related to terrorist activities and aim to accurately predict the toxicity level and classify tweets for concerned authorities to make informed decisions.
Terrorism Analysis through Social Media using Data MiningIRJET Journal
This document presents a study that uses deep learning models like Deep Neural Networks (DNN) and Convolutional Neural Networks (CNN) to analyze terrorism through detecting toxicity in social media text data. The study aims to classify text data into categories like toxicity, severe toxicity, obscenity, threat, insult or identity hate. It provides an overview of DNN and CNN models for text classification and compares their methodology, architecture and performance. The models are trained on preprocessed social media data related to terrorist activities and aim to accurately predict the toxicity level and classify tweets for concerned authorities to make informed decisions.
IRJET- Detecting Phishing Websites using Machine LearningIRJET Journal
This document describes a research project that aims to implement machine learning techniques to detect phishing websites. The researchers plan to test algorithms like logistic regression, SVM, decision trees and neural networks on a dataset of phishing links. They will evaluate the performance of these algorithms and develop a browser plugin using the best model. This plugin will detect malicious URLs and protect users from phishing attacks. The document provides background on phishing and outlines the proposed approach, dataset, algorithms to be tested, planned Chrome extension implementation, and expected results sections of the project.
IRJET- Detecting Phishing Websites using Machine LearningIRJET Journal
This document describes a research project that aims to implement machine learning techniques to detect phishing websites. The researchers plan to test algorithms like logistic regression, SVM, decision trees and neural networks on a dataset of phishing links. They will evaluate the performance of these algorithms and develop a browser plugin using the best model. This plugin will detect malicious URLs and protect users from phishing attacks. The document provides background on phishing and outlines the proposed approach, dataset, algorithms to be tested, planned Chrome extension implementation, and expected results sections of the project.
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AIIRJET Journal
This document describes a proposed system for criminal recognition using image recognition and AI. The system would use a database of criminal faces stored during the training process. Live camera feeds, such as at an airport, would be used as inputs. Facial recognition algorithms like Dlib68 would detect faces in the feed and compare them to the stored criminal database. If a match was found, authorities would be alerted via email with the captured photo and details. The goal is to help law enforcement quickly identify potential criminals in public spaces using automated image analysis techniques.
CRIMINAL RECOGNITION USING IMAGE RECOGNITION AND AIIRJET Journal
This document describes a proposed system for criminal recognition using image recognition and AI. The system would use a database of criminal faces stored during the training process. Live camera feeds, such as at an airport, would be used as inputs. Facial recognition algorithms like Dlib68 would detect faces in the feed and compare them to the stored criminal database. If a match was found, authorities would be alerted via email with the captured photo and details. The goal is to help law enforcement quickly identify potential criminals in public spaces using automated image analysis techniques.
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCEIRJET Journal
This document discusses using machine learning techniques to predict ransomware attacks. It begins by providing background on ransomware, data science, and machine learning. It then describes building a model using various machine learning algorithms like logistic regression, random forest, H-LICKS, and voting classifier on preprocessed ransomware data. The random forest algorithm achieved the highest accuracy of 90.5%. The model can classify six types of ransomware attacks with 97% accuracy, which is 3x faster than other models. This accurate and fast ransomware prediction model could help organizations detect and prevent attacks. Overall, applying advanced machine learning represents progress in combating the growing threat of ransomware.
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCEIRJET Journal
This document discusses using machine learning techniques to predict ransomware attacks. It begins by providing background on ransomware, data science, and machine learning. It then describes building a model using various machine learning algorithms like logistic regression, random forest, H-LICKS, and voting classifier on preprocessed ransomware data. The random forest algorithm achieved the highest accuracy of 90.5%. The model can classify six types of ransomware attacks with 97% accuracy, which is 3x faster than other models. This accurate and fast ransomware prediction model could help organizations detect and prevent attacks. Overall, applying advanced machine learning represents progress in combating the growing threat of ransomware.
Comparative Study of Enchancement of Automated Student Attendance System Usin...IRJET Journal
This document discusses developing an automated student attendance system using facial recognition and deep learning algorithms. It begins with an overview of how facial recognition can be used to take attendance accurately and efficiently. It then describes the methodology, which involves using a convolutional neural network (CNN) to detect and recognize faces. Dimensionality reduction techniques like principal component analysis (PCA) and linear discriminant analysis (LDA) are also used to improve recognition accuracy. The goal is to build a system that can identify students in real-time with a high degree of accuracy, even in varying lighting conditions. It aims to automate the entire attendance tracking process for both students and teachers.
Comparative Study of Enchancement of Automated Student Attendance System Usin...IRJET Journal
This document discusses developing an automated student attendance system using facial recognition and deep learning algorithms. It begins with an overview of how facial recognition can be used to take attendance accurately and efficiently. It then describes the methodology, which involves using a convolutional neural network (CNN) to detect and recognize faces. Dimensionality reduction techniques like principal component analysis (PCA) and linear discriminant analysis (LDA) are also used to improve recognition accuracy. The goal is to build a system that can identify students in real-time with a high degree of accuracy, even in varying lighting conditions. It aims to automate the entire attendance tracking process for both students and teachers.
Similar to Cyberbullying Detection Using Machine Learning (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.