This document proposes a password protection scheme called Encrypted Negative Password (ENP) that uses multiple layers of encryption to securely store passwords. It involves hashing passwords, converting them to negative passwords using a negative database, encrypting the negative passwords with a symmetric encryption algorithm, and finally encrypting the results again with an asymmetric (RSA) algorithm. The goal is to make passwords more secure against cracking by protecting the hashes and making lookups and rainbow table attacks infeasible. The scheme aims to provide stronger protection than existing approaches like hashed, salted, or stretched passwords while avoiding their disadvantages.
Encrypted Negative Password using for Authenticationijtsrd
This document proposes a new password authentication system that uses encrypted negative passwords (ENPs) for secure password storage and authentication. It involves hashing the password, converting it to a negative value, and encrypting it using strong algorithms like PBKDF2 and Blowfish. This makes the passwords more secure against attacks like dictionary attacks and lookup table attacks compared to existing systems. The proposed system includes a registration phase where the password is processed to generate the ENP, and an authentication phase where the ENP is validated upon login. Advantages of the system include stronger security, resistance to various attacks, and easy integration with existing authentication systems.
The document is a seminar report that discusses approaches for generating fake passwords or "honeywords" to detect when a password database has been breached. It summarizes four existing honeyword generation methods: chaffing-by-tweaking, chaffing-with-a-password-model, chaffing with "tough nuts", and a hybrid method. It then proposes a new approach that selects honeywords from existing user passwords in the system in order to reduce storage costs and improve the realism of the honeywords.
A Survey of Password Attacks and Safe Hashing AlgorithmsIRJET Journal
This document discusses password hashing and safe hashing algorithms. It begins with an introduction to password hashing and why it is important to store hashed passwords rather than plaintext passwords. It then discusses various hashing algorithms such as MD5, SHA-1, SHA-2, and SHA-3. The document also covers different types of password attacks like dictionary attacks, brute force attacks, and rainbow tables. Finally, it discusses the properties that make for a secure hashing algorithm, including using unique salts per password and algorithms being fast on software but slow on hardware.
This document provides instructions on how to hack passwords and create an FTP server on a PC. It discusses techniques like hashing, guessing, using default passwords, brute force attacks, and phishing to hack passwords. It also describes how to crack Windows passwords using tools like Cain and Abel. Additionally, it outlines the steps to obtain a static IP address, install and configure an FTP server software, and set up user accounts on the server.
This tool analyzes the secrecy and performance of symmetric key algorithms. It calculates secrecy based on Shannon's theories of cipher secrecy, giving a numerical value to represent secrecy level, with higher values indicating higher secrecy. It also calculates encryption time to evaluate performance. The tool was tested on common algorithms like AES, 3DES, DES, RC4, RC2. It reliably sorted the algorithms by secrecy and performance, consistent with established understandings. The tool is intended for researchers and engineers to evaluate new symmetric key algorithms by extending the code.
Security in Manets using Cryptography AlgorithmsIRJET Journal
This document discusses security in mobile ad hoc networks (MANETs) using cryptography algorithms. It proposes a novel approach for effective key management and prevention of malicious nodes in MANETs. The approach incorporates security to the routing protocol using traditional SHA algorithm along with symmetric (AES) and asymmetric (RSA) key encryption methods. It analyzes the performance of the proposed algorithms by comparing the time taken to transfer data, communication overheads, and battery consumption. The results show that using AES with SHA provides better performance than using RSA with SHA, as RSA consumption more time and battery due to its large prime number calculations and operations.
Unlimited Length Random Passwords for Exponentially Increased SecurityIJCSEA Journal
This document proposes a new method to exponentially strengthen passwords against cracking by injecting random strings of random length at random positions within the password before encrypting it. The random strings are separated from the original password by delimiter strings chosen by the user. When decrypted, the random strings can be identified and removed using the delimiter strings to extract the original password. This method makes password cracking much more difficult by scattering the original password characters and increasing the search space for attackers. Security factors are calculated showing passwords encrypted with this method would take exponentially longer times, such as trillions of years, to crack using brute force attacks compared to traditionally padded passwords. The method can also be applied to encrypt other sensitive data like credit card numbers or cryptocurrency information
Encrypted Negative Password using for Authenticationijtsrd
This document proposes a new password authentication system that uses encrypted negative passwords (ENPs) for secure password storage and authentication. It involves hashing the password, converting it to a negative value, and encrypting it using strong algorithms like PBKDF2 and Blowfish. This makes the passwords more secure against attacks like dictionary attacks and lookup table attacks compared to existing systems. The proposed system includes a registration phase where the password is processed to generate the ENP, and an authentication phase where the ENP is validated upon login. Advantages of the system include stronger security, resistance to various attacks, and easy integration with existing authentication systems.
The document is a seminar report that discusses approaches for generating fake passwords or "honeywords" to detect when a password database has been breached. It summarizes four existing honeyword generation methods: chaffing-by-tweaking, chaffing-with-a-password-model, chaffing with "tough nuts", and a hybrid method. It then proposes a new approach that selects honeywords from existing user passwords in the system in order to reduce storage costs and improve the realism of the honeywords.
A Survey of Password Attacks and Safe Hashing AlgorithmsIRJET Journal
This document discusses password hashing and safe hashing algorithms. It begins with an introduction to password hashing and why it is important to store hashed passwords rather than plaintext passwords. It then discusses various hashing algorithms such as MD5, SHA-1, SHA-2, and SHA-3. The document also covers different types of password attacks like dictionary attacks, brute force attacks, and rainbow tables. Finally, it discusses the properties that make for a secure hashing algorithm, including using unique salts per password and algorithms being fast on software but slow on hardware.
This document provides instructions on how to hack passwords and create an FTP server on a PC. It discusses techniques like hashing, guessing, using default passwords, brute force attacks, and phishing to hack passwords. It also describes how to crack Windows passwords using tools like Cain and Abel. Additionally, it outlines the steps to obtain a static IP address, install and configure an FTP server software, and set up user accounts on the server.
This tool analyzes the secrecy and performance of symmetric key algorithms. It calculates secrecy based on Shannon's theories of cipher secrecy, giving a numerical value to represent secrecy level, with higher values indicating higher secrecy. It also calculates encryption time to evaluate performance. The tool was tested on common algorithms like AES, 3DES, DES, RC4, RC2. It reliably sorted the algorithms by secrecy and performance, consistent with established understandings. The tool is intended for researchers and engineers to evaluate new symmetric key algorithms by extending the code.
Security in Manets using Cryptography AlgorithmsIRJET Journal
This document discusses security in mobile ad hoc networks (MANETs) using cryptography algorithms. It proposes a novel approach for effective key management and prevention of malicious nodes in MANETs. The approach incorporates security to the routing protocol using traditional SHA algorithm along with symmetric (AES) and asymmetric (RSA) key encryption methods. It analyzes the performance of the proposed algorithms by comparing the time taken to transfer data, communication overheads, and battery consumption. The results show that using AES with SHA provides better performance than using RSA with SHA, as RSA consumption more time and battery due to its large prime number calculations and operations.
Unlimited Length Random Passwords for Exponentially Increased SecurityIJCSEA Journal
This document proposes a new method to exponentially strengthen passwords against cracking by injecting random strings of random length at random positions within the password before encrypting it. The random strings are separated from the original password by delimiter strings chosen by the user. When decrypted, the random strings can be identified and removed using the delimiter strings to extract the original password. This method makes password cracking much more difficult by scattering the original password characters and increasing the search space for attackers. Security factors are calculated showing passwords encrypted with this method would take exponentially longer times, such as trillions of years, to crack using brute force attacks compared to traditionally padded passwords. The method can also be applied to encrypt other sensitive data like credit card numbers or cryptocurrency information
The document discusses security requirements for a mobile email client. It identifies potential use cases and abuse cases. It then analyzes assets, threats, and security requirements. It reviews code fragments and suggests secure coding practices to address vulnerabilities. Finally, it proposes four secure design patterns to enhance security: 1) thin client pattern to process data centrally and present locally, 2) thin device pattern to limit data on devices and replicate to data centers, 3) access control pattern to restrict functionality, and 4) fail-safe defaults pattern to avoid security misconfigurations.
Prevention of SQL Injection Attack in Web Application with Host LanguageIRJET Journal
This document discusses SQL injection attacks and methods to prevent them when building web applications. It begins by defining SQL injection attacks and describing common types like tautology, union queries, and blind injection. It then presents approaches to prevent SQL injection using host languages like PHP and Java. These include prepared statements, escaping strings, and stripping tags when handling user inputs in PHP. For Java, it recommends prepared statements to protect against attackers modifying queries. The key message is that input validation and using features like prepared statements in PHP and Java can help secure databases and prevent unauthorized access during SQL queries.
This document discusses various hacking techniques, including hacking Airtel mobile internet using a proxy server, cracking passwords using tools like Cain & Abel and John the Ripper, installing keylogger software to steal Facebook login credentials, and creating a fake Facebook login page using the Backtrack 5 operating system to phish user passwords. The author argues that the Backtrack method is most effective as it allows anonymous hacking without installing anything on the victim's computer. The document concludes by warning readers not to attempt hacking and only discusses these techniques for educational purposes.
Andrey Kutuzov and Elizaveta Kuzmenko - WebVectors: Toolkit for Building Web...AIST
WebVectors is an open-source toolkit that allows users to deploy web services for vector semantic models like word2vec. It provides functions like finding semantic associates of words, calculating semantic similarity between words, and visualizing word vectors. The goal is to make these models more accessible to digital humanities and linguistics communities without requiring programming skills. The toolkit runs models efficiently using Python, Flask and Gensim, and models can be loaded and queried via a web interface. Live demos are available for Russian and other languages.
Footprinting is the process of gathering public information about a computer system and its owning organization in order to learn as much as possible without accessing the system directly. The document provides an overview of open source footprinting techniques like whois lookups and examining a website's HTML, as well as port scanning and DNS interrogation. As an example, the author footprints the website 2600slc.org, discovering its IP address, admin contact details from the whois record, and open ports including FTP, SSH, SMTP, and HTTP. The information gathered through footprinting can be used to better attack or protect a system.
The document discusses Jugaad, a proof-of-concept toolkit that demonstrates code injection on Linux systems similar to CreateRemoteThread on Windows. It does this using the ptrace system call to attach to a process, read/write its memory, and inject shellcode that allocates memory and creates a thread to execute arbitrary code within the target process context. First, it explains how ptrace can be used to manipulate another process. Then it describes how Jugaad uses these ptrace capabilities to meet the requirements of allocating memory, creating a thread, and executing payload code inside the target process.
The document provides guidelines for creating strong passwords to protect networks and data. It recommends passwords be at least 8 characters long, using a mix of uppercase and lowercase letters, numbers, and punctuation. Passwords should not use personal information, common words, or be written down where others can see. The guidelines emphasize changing passwords regularly to reduce the risk of hacking.
This presentation introduces a cryptographic scheme which enables searching on encrypted data without revealing to the server. The proposed scheme allows for a encrypted storage such as a secure cloud storage to be searchable in such a way that the service provider is unable to compromise the security of the system.
This document provides an overview of analyzing social media data from Twitter using R. It discusses the following:
- Introduction to the Twitter APIs, including the Stream and REST APIs and how they are used to capture live and archived Twitter data.
- The process for authenticating with the Twitter APIs using authentication keys and accessing Twitter data through API calls in R.
- Examples of capturing Twitter user data through API calls, including timelines, followers, locations.
- Integrating other APIs like Google Maps to visualize Twitter data on maps.
- Performing analysis on Twitter data like sentiment analysis using word clouds and visualizing trends over time through diagrams.
The document provides guidance on penetration testing biometric fingerprint authentication systems. It outlines various potential attack vectors, including local attacks on the fingerprint sensor and USB data manager, as well as remote attacks on the remote IP management, backend database, and fingerprint manager admin interface. The document then details methods for conducting local attacks, such as using a fingerprint logger to steal a print and reproducing fake fingerprints to trick the sensor. It also discusses vulnerabilities in biometric device network protocols and remote administration capabilities. The goal is to evaluate security and identify ways to bypass authentication or steal sensitive user data from biometric systems.
Comparative analysis of efficiency of fibonacci random number generator algor...Alexander Decker
This document compares the efficiency of the Fibonacci random number generator and Gaussian random number generator algorithms in cryptographic systems. It discusses how random numbers are important for cryptography and describes statistical tests used to analyze the randomness of numbers generated by each algorithm. The research concluded that the Fibonacci random number generator passed the chi-square and Kolmogorov-Smirnov tests better than the Gaussian generator, making it more efficient for use in cryptographic systems.
Hackers use various techniques to gain unauthorized access to computer systems and networks. Untargeted hackers perform reconnaissance like ping sweeps and stealth scans to find vulnerable systems. Targeted hackers research their target through activities like address and phone number reconnaissance, vulnerability scanning, and social engineering. Both use compromised systems and rootkits to maintain backdoor access. Common attack methods include exploiting vulnerabilities, buffer overflows, and social engineering tricks.
Network security interview questions & answersSimpliv LLC
This document provides 150+ interview questions and answers related to network security. It begins by stating that the document will help with network security job interviews by providing sample questions and answers. It then lists several questions and short answers related to topics like firewall configuration, protocols, attacks, and security best practices. The questions cover a wide range of network security topics and the answers provide concise responses to each question.
IRJET- Estimating Various DHT ProtocolsIRJET Journal
This document compares three distributed hash table (DHT) protocols: Tapestry, Chord, and Kademlia. It analyzes their performance using a simulator under varying parameters like stabilization interval, number of backup nodes, number of successors, and number of parallel lookups. The analysis seeks to determine the optimal cost-performance tradeoff for each protocol based on metrics like lookup latency and number of messages sent. Key differences between the protocols are described, such as Tapestry using a 160-bit identifier space, Chord arranging nodes in a circular identifier space and using a finger table for routing, and Kademlia storing contacts in buckets and finding closer nodes through iterative lookups. Simulation results are used to compare the protocols
This document proposes a variation of the StriFA pattern matching technique for intrusion detection. StriFA converts input streams into shorter integer streams to accelerate matching. The variation layers StriFA in a four-step process. First, a dataset is preprocessed by mapping symbolic attributes to integers. Then it is split into four subsets, each containing normal and attack records. Feature values are extracted and stored as integer strings. These strings are used to train a layered StriFA architecture to detect 22 attack types mixed with normal data. Performance is evaluated against other algorithms, finding this variation achieves the highest accuracy with the lowest error rate.
Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization ...Eswar Publications
This document discusses outlier detection in network traffic data collected from a Secure Shell (SSH) honeypot. It implements the SSH honeypot to collect inbound and outbound network traffic data. A subset of this data is clustered using Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Differential Evolution (DE) algorithms to detect outliers. The performance of these three clustering-based outlier detection methods are then compared based on metrics like cost function and number of iterations/clusters. PSO showed the best results in detecting outliers with the lowest cost function.
This document discusses cracking linguistically correct passphrases using Markov chains and n-grams. It describes implementing a passphrase cracking tool that generates passphrases based on n-gram statistics extracted from source texts. Testing was done on hashed passwords of different lengths, comparing the generated passphrases to the target entropy of English. Results showed some lists cracked a small number of hashes while others fell short of the target entropy. Overall this demonstrated an approach for modeling language to crack passphrases, but also limitations in the current implementation.
The document discusses techniques for network enumeration. It begins by defining enumeration as the process of extracting usernames, machine names, shares, and services from a system. It then outlines various techniques attackers use for enumeration, including using default passwords, email addresses to find usernames, SNMP, and DNS zone transfers. The document provides examples of information commonly enumerated like network resources, users and groups, routing tables, and service settings.
This document discusses error detection in big data on the cloud. It proposes a method to detect files with errors or tampering in data stored on the cloud. If errors are found, the method aims to repair the file to its original state and restore it. The method uses CRC algorithms, Hamming codes, and secure hash algorithms like SHA-1 to detect errors and ensure data integrity when transmitting files to cloud storage. It implements the approach on Hadoop using MapReduce to improve scalability for large datasets. The goal is to detect errors efficiently and allow error-free transmission of data on the cloud.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
The document discusses security requirements for a mobile email client. It identifies potential use cases and abuse cases. It then analyzes assets, threats, and security requirements. It reviews code fragments and suggests secure coding practices to address vulnerabilities. Finally, it proposes four secure design patterns to enhance security: 1) thin client pattern to process data centrally and present locally, 2) thin device pattern to limit data on devices and replicate to data centers, 3) access control pattern to restrict functionality, and 4) fail-safe defaults pattern to avoid security misconfigurations.
Prevention of SQL Injection Attack in Web Application with Host LanguageIRJET Journal
This document discusses SQL injection attacks and methods to prevent them when building web applications. It begins by defining SQL injection attacks and describing common types like tautology, union queries, and blind injection. It then presents approaches to prevent SQL injection using host languages like PHP and Java. These include prepared statements, escaping strings, and stripping tags when handling user inputs in PHP. For Java, it recommends prepared statements to protect against attackers modifying queries. The key message is that input validation and using features like prepared statements in PHP and Java can help secure databases and prevent unauthorized access during SQL queries.
This document discusses various hacking techniques, including hacking Airtel mobile internet using a proxy server, cracking passwords using tools like Cain & Abel and John the Ripper, installing keylogger software to steal Facebook login credentials, and creating a fake Facebook login page using the Backtrack 5 operating system to phish user passwords. The author argues that the Backtrack method is most effective as it allows anonymous hacking without installing anything on the victim's computer. The document concludes by warning readers not to attempt hacking and only discusses these techniques for educational purposes.
Andrey Kutuzov and Elizaveta Kuzmenko - WebVectors: Toolkit for Building Web...AIST
WebVectors is an open-source toolkit that allows users to deploy web services for vector semantic models like word2vec. It provides functions like finding semantic associates of words, calculating semantic similarity between words, and visualizing word vectors. The goal is to make these models more accessible to digital humanities and linguistics communities without requiring programming skills. The toolkit runs models efficiently using Python, Flask and Gensim, and models can be loaded and queried via a web interface. Live demos are available for Russian and other languages.
Footprinting is the process of gathering public information about a computer system and its owning organization in order to learn as much as possible without accessing the system directly. The document provides an overview of open source footprinting techniques like whois lookups and examining a website's HTML, as well as port scanning and DNS interrogation. As an example, the author footprints the website 2600slc.org, discovering its IP address, admin contact details from the whois record, and open ports including FTP, SSH, SMTP, and HTTP. The information gathered through footprinting can be used to better attack or protect a system.
The document discusses Jugaad, a proof-of-concept toolkit that demonstrates code injection on Linux systems similar to CreateRemoteThread on Windows. It does this using the ptrace system call to attach to a process, read/write its memory, and inject shellcode that allocates memory and creates a thread to execute arbitrary code within the target process context. First, it explains how ptrace can be used to manipulate another process. Then it describes how Jugaad uses these ptrace capabilities to meet the requirements of allocating memory, creating a thread, and executing payload code inside the target process.
The document provides guidelines for creating strong passwords to protect networks and data. It recommends passwords be at least 8 characters long, using a mix of uppercase and lowercase letters, numbers, and punctuation. Passwords should not use personal information, common words, or be written down where others can see. The guidelines emphasize changing passwords regularly to reduce the risk of hacking.
This presentation introduces a cryptographic scheme which enables searching on encrypted data without revealing to the server. The proposed scheme allows for a encrypted storage such as a secure cloud storage to be searchable in such a way that the service provider is unable to compromise the security of the system.
This document provides an overview of analyzing social media data from Twitter using R. It discusses the following:
- Introduction to the Twitter APIs, including the Stream and REST APIs and how they are used to capture live and archived Twitter data.
- The process for authenticating with the Twitter APIs using authentication keys and accessing Twitter data through API calls in R.
- Examples of capturing Twitter user data through API calls, including timelines, followers, locations.
- Integrating other APIs like Google Maps to visualize Twitter data on maps.
- Performing analysis on Twitter data like sentiment analysis using word clouds and visualizing trends over time through diagrams.
The document provides guidance on penetration testing biometric fingerprint authentication systems. It outlines various potential attack vectors, including local attacks on the fingerprint sensor and USB data manager, as well as remote attacks on the remote IP management, backend database, and fingerprint manager admin interface. The document then details methods for conducting local attacks, such as using a fingerprint logger to steal a print and reproducing fake fingerprints to trick the sensor. It also discusses vulnerabilities in biometric device network protocols and remote administration capabilities. The goal is to evaluate security and identify ways to bypass authentication or steal sensitive user data from biometric systems.
Comparative analysis of efficiency of fibonacci random number generator algor...Alexander Decker
This document compares the efficiency of the Fibonacci random number generator and Gaussian random number generator algorithms in cryptographic systems. It discusses how random numbers are important for cryptography and describes statistical tests used to analyze the randomness of numbers generated by each algorithm. The research concluded that the Fibonacci random number generator passed the chi-square and Kolmogorov-Smirnov tests better than the Gaussian generator, making it more efficient for use in cryptographic systems.
Hackers use various techniques to gain unauthorized access to computer systems and networks. Untargeted hackers perform reconnaissance like ping sweeps and stealth scans to find vulnerable systems. Targeted hackers research their target through activities like address and phone number reconnaissance, vulnerability scanning, and social engineering. Both use compromised systems and rootkits to maintain backdoor access. Common attack methods include exploiting vulnerabilities, buffer overflows, and social engineering tricks.
Network security interview questions & answersSimpliv LLC
This document provides 150+ interview questions and answers related to network security. It begins by stating that the document will help with network security job interviews by providing sample questions and answers. It then lists several questions and short answers related to topics like firewall configuration, protocols, attacks, and security best practices. The questions cover a wide range of network security topics and the answers provide concise responses to each question.
IRJET- Estimating Various DHT ProtocolsIRJET Journal
This document compares three distributed hash table (DHT) protocols: Tapestry, Chord, and Kademlia. It analyzes their performance using a simulator under varying parameters like stabilization interval, number of backup nodes, number of successors, and number of parallel lookups. The analysis seeks to determine the optimal cost-performance tradeoff for each protocol based on metrics like lookup latency and number of messages sent. Key differences between the protocols are described, such as Tapestry using a 160-bit identifier space, Chord arranging nodes in a circular identifier space and using a finger table for routing, and Kademlia storing contacts in buckets and finding closer nodes through iterative lookups. Simulation results are used to compare the protocols
This document proposes a variation of the StriFA pattern matching technique for intrusion detection. StriFA converts input streams into shorter integer streams to accelerate matching. The variation layers StriFA in a four-step process. First, a dataset is preprocessed by mapping symbolic attributes to integers. Then it is split into four subsets, each containing normal and attack records. Feature values are extracted and stored as integer strings. These strings are used to train a layered StriFA architecture to detect 22 attack types mixed with normal data. Performance is evaluated against other algorithms, finding this variation achieves the highest accuracy with the lowest error rate.
Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization ...Eswar Publications
This document discusses outlier detection in network traffic data collected from a Secure Shell (SSH) honeypot. It implements the SSH honeypot to collect inbound and outbound network traffic data. A subset of this data is clustered using Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Differential Evolution (DE) algorithms to detect outliers. The performance of these three clustering-based outlier detection methods are then compared based on metrics like cost function and number of iterations/clusters. PSO showed the best results in detecting outliers with the lowest cost function.
This document discusses cracking linguistically correct passphrases using Markov chains and n-grams. It describes implementing a passphrase cracking tool that generates passphrases based on n-gram statistics extracted from source texts. Testing was done on hashed passwords of different lengths, comparing the generated passphrases to the target entropy of English. Results showed some lists cracked a small number of hashes while others fell short of the target entropy. Overall this demonstrated an approach for modeling language to crack passphrases, but also limitations in the current implementation.
The document discusses techniques for network enumeration. It begins by defining enumeration as the process of extracting usernames, machine names, shares, and services from a system. It then outlines various techniques attackers use for enumeration, including using default passwords, email addresses to find usernames, SNMP, and DNS zone transfers. The document provides examples of information commonly enumerated like network resources, users and groups, routing tables, and service settings.
This document discusses error detection in big data on the cloud. It proposes a method to detect files with errors or tampering in data stored on the cloud. If errors are found, the method aims to repair the file to its original state and restore it. The method uses CRC algorithms, Hamming codes, and secure hash algorithms like SHA-1 to detect errors and ensure data integrity when transmitting files to cloud storage. It implements the approach on Hadoop using MapReduce to improve scalability for large datasets. The goal is to detect errors efficiently and allow error-free transmission of data on the cloud.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
The document compares and analyzes different encryption techniques. It summarizes the Data Encryption Standard (DES), Triple DES (3DES), and Advanced Encryption Standard (AES). DES uses a 56-bit key and 64-bit block size, while 3DES extends DES to 168 bits for improved security. AES was developed later to replace DES and uses 128, 192, or 256 bit keys and block sizes. The document concludes that AES is more secure than DES and 3DES based on its longer key lengths and that it is the symmetric encryption algorithm of choice for future applications.
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
This document proposes a system to detect password brute force attacks and securely store data in the cloud using AES encryption. The system would monitor network traffic to identify abnormal login attempts that may indicate a brute force attack in progress. Data uploaded to the cloud would be encrypted using AES before storage. This would protect the encrypted data even if hackers were able to access the cloud storage servers. The system aims to provide secure access control and storage of user data in the cloud.
Implementation of De-Duplication AlgorithmIRJET Journal
The document describes an implementation of a data de-duplication algorithm using convergent encryption. It discusses how data de-duplication works to reduce storage usage by identifying and removing duplicate copies of data. Convergent encryption is used, which generates the same encrypted form of a file from the original file's hash, allowing duplicate encrypted files to be de-duplicated while preserving privacy. The algorithm divides files into blocks, generates hashes for each block, and encrypts the file blocks using the hashes as keys. When a file is uploaded, its hash is checked against existing hashes to identify duplicates, with duplicates replaced by pointers to the stored copy. This allows efficient de-duplication while encrypting data for privacy and security when stored
IRJET- Message Encryption using Hybrid CryptographyIRJET Journal
This document proposes a hybrid cryptography approach for encrypting messages using AES and Triple DES encryption algorithms. The key is shared between users through a secure channel. The message is split into two halves, with each half encrypted using a different algorithm. This adds an additional layer of security compared to using a single algorithm. The encrypted halves are combined and transmitted as a single encrypted message. Evaluation shows this hybrid approach has a faster encryption time than AES alone, while providing stronger security than either algorithm individually. Future work could expand this to cloud-based applications.
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
The document summarizes a proposed system for multi-keyword search over encrypted data in cloud computing. It aims to retrieve the top k most relevant documents matching a user's query while preserving data privacy. The system uses Lucene indexing to build an index of keywords extracted from outsourced documents. When documents are added or removed, the index is updated. A top-k query technique ranks document relevance and returns the top matching results. Encryption is done using the Blowfish algorithm before documents are outsourced to the untrusted cloud server. This allows efficient search over the encrypted data based on keyword queries.
Beyond the Perimeter discusses how security has evolved from a perimeter-based approach to one focused on the application layer. Traditional network and endpoint controls are less effective as the perimeter has changed and many attacks target applications directly. Over 90% of applications have critical bugs, and it takes an average of 138 days to fix an SQL injection vulnerability. The OWASP Top 10 highlights common web app vulnerabilities like SQL injection and cross-site scripting that account for the majority of attacks. New approaches like micro-segmentation, micro-virtualization, and runtime application self-protection are needed to assume compromise and protect applications directly. Language-theoretic security provides a way to formally model expected application inputs and behaviors to precisely detect attacks without false positives
1) The document proposes a more secure implementation of the AES encryption algorithm by making the S-box structure nonlinear and dynamic.
2) A biometrics scheme is combined with the AES encryption and decryption to improve authentication security. Fingerprints are used in both encryption and decryption processes.
3) The implementation generates a random virtual S-box for each input by XORing the default AES S-box with a derived S-box, making the S-box structure nonlinear and dynamic. This improves security against attacks on the AES algorithm.
1) The document discusses an enhancement to the AES encryption algorithm by adding an additional layer of security using the Caesar cipher encryption algorithm.
2) The enhancement aims to make the algorithm more secure by making the key variable for each letter encrypted using the Caesar cipher, removing vulnerabilities to common attacks.
3) The enhancement provides extra protection to the already secure AES algorithm and increases the security level, while being transparent to the user.
Beyond the Perimeter discusses how traditional security defenses like firewalls and endpoint protection have not scaled effectively as applications have evolved. 84% of attacks now target applications, yet 90% of apps have critical bugs and it takes an average of 138 days to fix an SQL injection vulnerability. New attacks are found frequently. Encoding untrusted input is complicated and does not provide visibility into attacks or support commercial applications. Regular expressions used in web application firewalls are difficult to maintain and prone to evasion. Language-theoretic security (LANGSEC) treats code and data as formal languages that can be parsed to accurately identify valid and malicious inputs at runtime without false positives or vulnerability to obfuscation. Prevoty provides content and database protection products
This document describes Tharindu Weerasinghe's MSc research project on developing a hybrid cipher by combining a block cipher and a stream cipher. It summarizes the background on block ciphers like DES and stream ciphers like RC4. It then describes the researcher's algorithm that first encrypts plaintext using 3DES (a block cipher) and then RC4 (a stream cipher), and decrypts in the reverse order. The document discusses the benefits of combining ciphers and addresses some vulnerabilities of using block and stream ciphers individually. It also mentions the researcher implemented the algorithm in Java and measured encryption/decryption times.
This document discusses weaknesses in the MD5 hashing algorithm for password encryption and proposes modifications to strengthen it. It begins by introducing MD5 and how it is commonly used to hash passwords for storage. However, MD5 is vulnerable to dictionary and rainbow table attacks. The document then suggests three modifications to MD5 to improve security: 1) Adding a salt value to each hashed password, 2) Iteratively hashing the password multiple times, and 3) Adding a random prefix or suffix to each hashed value before storage. These modifications aim to strengthen MD5 against cracking attempts.
This document describes the development of a chatbot using deep learning techniques. It discusses how Reddit comment data was preprocessed and used to train a sequence-to-sequence model based on Google's neural machine translation architecture. The trained model is then integrated into a web-based user interface to allow users to interact with the chatbot. The chatbot aims to understand user messages and provide natural language responses by learning from large amounts of conversational data.
Hybrid Encryption for Database SecurityIRJET Journal
1. The document discusses hybrid encryption technique for securing databases. Hybrid encryption uses both symmetric and asymmetric encryption.
2. At the sender site, the data is encrypted with a symmetric key (secret key) and then the secret key is encrypted with the receiver's public key using asymmetric encryption.
3. The encrypted data and encrypted secret key are sent to the receiver. The receiver decrypts the secret key with their private key and then decrypts the data with the secret key to access the original data. This provides two layers of security for the database.
This document proposes a key-aggregate encryption scheme called Input Cumulative Cryptosystem for secure and scalable data sharing in cloud computing. The scheme allows a data owner to generate a constant-size aggregate decryption key that can decrypt multiple ciphertexts. The key has the combined decryption power of all individual secret keys. An intrusion detection system also monitors communication between hosts to only allow data sharing between trusted hosts, improving security. The proposed system aims to address issues with existing approaches that require distributing multiple decryption keys or have fixed hierarchies for access control. It allows flexible delegation of decryption rights for dynamic sets of ciphertexts in cloud storage.
Key aggregate searchable encryption (kase) for group data sharing via cloud s...Pvrtechnologies Nellore
This document describes a proposed cryptosystem for secure and efficient data sharing in cloud storage. It allows a user to encrypt files with different public keys but send a receiver a single constant-size decryption key that gives decryption rights to any set of ciphertexts. This allows flexible sharing of encrypted data while keeping decryption keys compact. The proposed system aims to address disadvantages of existing approaches like unexpected privilege escalation exposing all data or inefficient key sizes. It provides security based on number-theoretic assumptions without relying on servers for access control.
The document discusses various techniques for implementing access controls and protecting data. It provides examples of using Apache Shiro to implement permission-based access control checks. It also discusses the benefits of HTTPS for encrypting data in transit, including confidentiality, integrity and authenticity. Best practices for HTTPS configuration are outlined. Hard-coded role checks and lack of centralized access control logic are identified as anti-patterns to avoid.
A novel authenticated cipher for rfid systemsijcisjournal
In this paper, we present RBS (Redundant Bit Security) algorithm which is a low-complexity symmetric
encryption with a 132-bit secret key. In this algorithm redundant bits are distributed among plaintext data
bits to change the location of the plaintext bits in the transmitted data without changing their order. The
location of redundant bits inside the transmitted data represents the secret key between sender and
receiver. The algorithm provides integrity and authentication of the original data as well. The
implementation comparison of this algorithm with other algorithms confirms that it a good candidate for
resource-constraint devices such as RFID systems and wireless sensors.
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
This document discusses using a combination of symmetric and asymmetric encryption algorithms to securely transmit data over a network. Specifically, it proposes a system where data packets are first encrypted with the symmetric AES algorithm. The AES secret key is then encrypted with the public key of the asymmetric RSA algorithm. At the receiving end, the private RSA key and a one-time password are used to decrypt the AES key and allow decryption of the data packets. This approach leverages the strengths of both AES for fast encryption and RSA for strong authentication to provide secure data transmission.
Similar to IRJET- Encrypted Negative Password using RSA Algorithm (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.