This document proposes a new interface called Steganopin that aims to improve security for personal identification number (PIN) entry. It introduces two methods: 1) A "virtual PIN" or "Steganopin" that can be used for fixed or limited online transactions with additional one-time password verification. 2) A "two-faced keypad" with a standard keypad and a shuffled keypad. The standard keypad is used to enter the PIN, while the shuffled keypad appears briefly to derive the one-time password, hiding the actual PIN from potential onlookers. Together these methods aim to enhance security by making the PIN entry process more indirect and discrete.
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
This document proposes improvements to ATM security through wireless password transfer and keypad shuffling. It discusses how shoulder surfing allows thieves to steal PINs and introduces two techniques to prevent this. Keypad shuffling randomly rearranges keys after each user to confuse onlookers. Wireless password transfer involves the user entering their PIN on their phone via Bluetooth, which is then verified by the ATM. The document provides details on implementing these techniques using components like Arduino, Bluetooth and WiFi modules, buttons, and displays. It describes algorithms for random number generation and OTP creation. The proposed methods aim to enhance security by confusing password guessing and preventing PIN theft.
Moving ATM Applications to Smartphones with a Secured PinEntry MethodsIOSR Journals
The document summarizes a research paper that proposes moving ATM applications to smartphones with a secured PIN-entry method. It first discusses existing PIN-entry methods and their vulnerabilities. It then proposes an improved Black-White method for PIN entry that uses bi-colored keys and overlapping color groups to increase security against shoulder surfing and covert recording attacks. Finally, it describes creating an ATM application for Android smartphones that uses a virtual currency concept to allow ATM transactions on mobile devices with the proposed more secure PIN entry method.
The Security Challenges of The Rhythmprint Authentication IJECEIAES
The Rhythmprint authentication combines an advantage of the traditional keystroke authentication and the multi-touch technology based on a touchable device such as touchpad on a laptop, a smartphone and a tablet. With the Rhythmprint authentication, the user is less likely to suffer from shoulder surfing and eavesdropping attacks. This research provides empirical evidence to verify the security performance of the Rhythmprint authentication comparing to the traditional keystroke authentication for shoulder surfing and eavesdropping attacks, when the user tries to login to a website on a laptop for 10 times in a public place while the attacker stands behind. The experimental result s show that t he Rhythmprint authentication provides higher security than the traditional keystroke authentication in both shoulder surfing and eavesdropping attacks.
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
This document proposes enhancing credit card transaction security in ATMs through a three-step verification process using password, fingerprint recognition, and one-time passwords (OTPs). It involves using KNN clustering to verify passwords, displaying a dummy balance if the password is incorrect, matching fingerprints to stored templates, and sending an OTP to the registered phone number if fingerprints match. This approach aims to strengthen user authentication and prevent fraudulent transactions using stolen cards and passwords guessed through brute force attacks. The system is analyzed in MATLAB and is found to provide improved security over existing one-step password verification methods.
This document proposes an advanced security system for ATMs using fingerprint scanners, sensors, and messaging to address issues with current ATM security. The system would require users to scan their fingerprint to enter the ATM cabin. Sensors would detect any unauthorized entry and trigger an alarm along with alert messages sent to authorities. The system aims to restrict entry only to authorized users, log entry details, and quickly notify police of any intrusions or issues. The design uses an Arduino board along with fingerprint scanner, PIR motion sensor and GSM module. This system seeks to prevent ATM robbery and damage through automated access control and rapid emergency notification.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
This document describes a proposed system for enhancing security at ATM machines using fingerprint recognition and SMS authentication. The key points are:
1. The system would collect customers' fingerprints and mobile numbers when opening accounts, and use fingerprints to identify customers at the ATM.
2. When a customer places their finger on the fingerprint module, a unique 4-digit code would be sent via SMS to their registered mobile.
3. The customer must enter the code on the ATM touchscreen for authentication. If correct, the ATM transaction could proceed. Otherwise, police would be alerted.
This approach aims to more securely identify customers than cards and PINs alone by adding fingerprint and SMS verification layers
This document describes a proposed system for operating an ATM machine without an ATM card by using finger vein recognition. The system would use an RFID module for initial user authentication and communication. An image acquisition module would collect finger vein images which would then be analyzed by an embedded control unit using a finger vein recognition algorithm. A communication module would display results and receive inputs. The system aims to provide more secure authentication than other biometric methods like fingerprints. It would allow blind or visually impaired people to independently use ATMs through added features like voice guidance.
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
This document proposes improvements to ATM security through wireless password transfer and keypad shuffling. It discusses how shoulder surfing allows thieves to steal PINs and introduces two techniques to prevent this. Keypad shuffling randomly rearranges keys after each user to confuse onlookers. Wireless password transfer involves the user entering their PIN on their phone via Bluetooth, which is then verified by the ATM. The document provides details on implementing these techniques using components like Arduino, Bluetooth and WiFi modules, buttons, and displays. It describes algorithms for random number generation and OTP creation. The proposed methods aim to enhance security by confusing password guessing and preventing PIN theft.
Moving ATM Applications to Smartphones with a Secured PinEntry MethodsIOSR Journals
The document summarizes a research paper that proposes moving ATM applications to smartphones with a secured PIN-entry method. It first discusses existing PIN-entry methods and their vulnerabilities. It then proposes an improved Black-White method for PIN entry that uses bi-colored keys and overlapping color groups to increase security against shoulder surfing and covert recording attacks. Finally, it describes creating an ATM application for Android smartphones that uses a virtual currency concept to allow ATM transactions on mobile devices with the proposed more secure PIN entry method.
The Security Challenges of The Rhythmprint Authentication IJECEIAES
The Rhythmprint authentication combines an advantage of the traditional keystroke authentication and the multi-touch technology based on a touchable device such as touchpad on a laptop, a smartphone and a tablet. With the Rhythmprint authentication, the user is less likely to suffer from shoulder surfing and eavesdropping attacks. This research provides empirical evidence to verify the security performance of the Rhythmprint authentication comparing to the traditional keystroke authentication for shoulder surfing and eavesdropping attacks, when the user tries to login to a website on a laptop for 10 times in a public place while the attacker stands behind. The experimental result s show that t he Rhythmprint authentication provides higher security than the traditional keystroke authentication in both shoulder surfing and eavesdropping attacks.
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
This document proposes enhancing credit card transaction security in ATMs through a three-step verification process using password, fingerprint recognition, and one-time passwords (OTPs). It involves using KNN clustering to verify passwords, displaying a dummy balance if the password is incorrect, matching fingerprints to stored templates, and sending an OTP to the registered phone number if fingerprints match. This approach aims to strengthen user authentication and prevent fraudulent transactions using stolen cards and passwords guessed through brute force attacks. The system is analyzed in MATLAB and is found to provide improved security over existing one-step password verification methods.
This document proposes an advanced security system for ATMs using fingerprint scanners, sensors, and messaging to address issues with current ATM security. The system would require users to scan their fingerprint to enter the ATM cabin. Sensors would detect any unauthorized entry and trigger an alarm along with alert messages sent to authorities. The system aims to restrict entry only to authorized users, log entry details, and quickly notify police of any intrusions or issues. The design uses an Arduino board along with fingerprint scanner, PIR motion sensor and GSM module. This system seeks to prevent ATM robbery and damage through automated access control and rapid emergency notification.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
This document describes a proposed system for enhancing security at ATM machines using fingerprint recognition and SMS authentication. The key points are:
1. The system would collect customers' fingerprints and mobile numbers when opening accounts, and use fingerprints to identify customers at the ATM.
2. When a customer places their finger on the fingerprint module, a unique 4-digit code would be sent via SMS to their registered mobile.
3. The customer must enter the code on the ATM touchscreen for authentication. If correct, the ATM transaction could proceed. Otherwise, police would be alerted.
This approach aims to more securely identify customers than cards and PINs alone by adding fingerprint and SMS verification layers
This document describes a proposed system for operating an ATM machine without an ATM card by using finger vein recognition. The system would use an RFID module for initial user authentication and communication. An image acquisition module would collect finger vein images which would then be analyzed by an embedded control unit using a finger vein recognition algorithm. A communication module would display results and receive inputs. The system aims to provide more secure authentication than other biometric methods like fingerprints. It would allow blind or visually impaired people to independently use ATMs through added features like voice guidance.
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
As we are moving in a World of advancement, so the security is the major concern in order to keep data isolate from the unauthorised users to access. In today’s World, we need high degree security system for the protection of our document, important data, as well as memory and jewellery. This review paper presents a secure fingerprint locker which is feasible. This system is proved successful on all norms of security of lockers. There are other methods of verifying authentication through password, RFID but this method is most efficient and reliable. To provide perfect security to the lockers and to make the work easier, this project is taking help of two different technologies, i.e. Embedded System and Biometrics. Biometrics is basically the measurement and use of unique characteristics of living beings to make them distinguish from one another. And this is more reliable then passwords and tokens which can be lost or stolen by the humans. In this paper we are providing the work done on this technique.
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
This document describes a RFID-based automatic door locking system for home security. The system uses an Arduino nano microcontroller, RFID reader and tags, wireless transmitter and receiver modules, NodeMCU for WiFi connectivity, a 3x4 keypad, and servo motor. The system provides three ways to unlock the door - using a password via keypad, detecting an authorized RFID tag, or using a mobile application. It aims to remotely control the door unlock via a web connection and message passing between the owner and door lock for increased security and convenience.
Design of Banking Security System Using Mems And Rfid Technologytheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
This project presents a door locking system which suggests two ways for unlocking a door using Internet of Things (IoT) and Fingerprint. Most of the major door lock security systems have several loopholes which could be broken down to gain access to the desired places, and it creates a concern for a secure lifestyle and proper working environment. People can access Internet services by using their cell phone, laptop and various gadgets. Fingerprint is a reliable biometric feature having a wide range of applications that require authentication. Biometric systems such as fingerprint provide tools to enforce reliable logs of system transactions and protect an individual’s right to privacy. In the proposed system, fingerprints of the authorized users are enrolled and verified to provide access to a facility that is used by multiple users. A user can also be removed and a new user can be enrolled in the system. We have implemented a centralized control system from where we can control who can enter in which rooms and who cannot. This is an Arduino Mega device based. Fingerprints are stored dynamically in a database for computing the different statistics.
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
This document summarizes a research project that developed a high security system for money carrying vans. The system uses both a password entered on a keypad and fingerprint authentication for security. It contains a microcontroller, fingerprint sensor, LCD display, GSM module, and keypad. If an unauthorized person enters the wrong password, access is denied and an alert message is sent via the GSM module. If the password is correct but the fingerprint does not match, access is again denied and an alert sent. The system is designed to improve security when transporting money in vans compared to using guards alone.
This document describes a multipurpose security system using RFID and GSM technologies. The system provides four stages of verification: RFID verification, time limit verification, SIM card contact number verification, and password matching. If any verification fails, a message is sent to security within a specified time period. The system was implemented using an Arduino Uno, RFID reader, and GSM module. It was tested and able to open a door or trigger a motor when all verifications passed successfully. The system provides a robust, efficient form of security and could be adapted for various applications.
This document discusses a security system project that uses fingerprint and keypad authentication to allow authorized individuals access. The system is programmed using an embedded microcontroller and C language. When a person places their finger on the reader, the system will check if they are authorized and prompt for a pin entry via keypad or mobile. If authorized, a message is sent to their mobile via GSM technology. The system aims to provide low-cost, automated security access for applications like ATMs.
This document presents a project titled "Fingerprint Recognition for Security" by Bisangabagabo Alphonse. The project aims to use fingerprint recognition to improve student identification for security at KIST by replacing the current system of using ID cards. The system will utilize fingerprint scanning, matching, and identification algorithms built with C programming language. It seeks to address issues like unauthorized access and students missing classes when cards are lost or forgotten by implementing an accurate biometric authentication solution based on individuals' unique fingerprint data.
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
This document proposes an advanced security system for bank lockers using biometric authentication and GSM technology. The system aims to provide more secure access to bank lockers than traditional key-based systems. It works by enrolling users through fingerprint scanning and storing their fingerprint data and mobile number in a database. When a user wants to open their locker, the system verifies their identity by matching their fingerprint and sends a one-time password via SMS to their registered mobile number. The user then enters this password to unlock the locker, providing two-factor authentication through biometrics and mobile verification. The system is designed to address security issues with lost or duplicated keys and keep pace with digital authentication methods.
IRJET- Authenticated Locker System using Watchword ProtectionIRJET Journal
This document describes an authenticated locker system using password protection that is designed using an Arduino kit. The system uses a password entered on a 4x4 keypad to control a servo motor that opens and closes a door. If the correct password is entered, the door will open for 30 seconds before closing. If an incorrect password is entered multiple times, a buzzer will sound. The system aims to provide effective security for applications like bank lockers or secure doors at an affordable cost. It analyzes the entered password and stored password in the Arduino's memory to determine if access should be granted.
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
Abstract In this paper, MEMS (Micro Electro Mechanical System) is implemented using Embedded controller PIC 16F877A. MEMS can be used to sense motion. Microcontroller detect any motion while they are occurs or not. The user can assign a password by fixed set of motions as decided by them. In that there are three techniques uses for user’s authentication. Firstly Microcontroller senses any motion which is matches with exist motion password, then first phase will unlock and it goes into next phase is human interface method of keypad that is traditional where the user enters the predefined password, if it is matched with the predefined password then second phase will be unlock. Then user will directly enter into the final phase which is a RFID card that is read by a RFID reader module connected to the Micro controller if the card is matched the final phase get completed and the desired operation will start. A buzzer is used for an indication of wrong password. This buzzer is ON until right password matches with existing password. Key Words: -Codebooks, Key Logger, PIC Microcontroller, Secret Little Functions, RFID, MEMS.
IRJET - Three Layered Security for BankingIRJET Journal
This document describes a proposed three-layered security system for online banking authentication. The system uses username and password for the first layer of authentication. For the second layer, a QR code encrypted with the user's IMEI number is displayed, which must be scanned by their smartphone. For the third layer, an OTP is sent to the user's smartphone after successful QR code scan. This three-layered approach provides stronger security than username and password alone by distributing the authentication process across multiple devices and utilizing different authentication methods at each layer. The system is designed to be more secure against attacks like keylogging compared to a single-factor authentication system.
This document describes a fingerprint-based security system project. The system uses a fingerprint sensor and microcontroller to scan fingerprints and compare them to registered fingerprints to grant access. It has two modes - master mode to add and delete users, and user mode to authenticate employees. If the scanned fingerprint matches a registered print, the microcontroller sends the user ID to the computer and activates devices like unlocking a door. The system aims to provide secure access control for organizations using biometric fingerprint identification.
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
This document proposes an artificial intelligence-based smart ATM system with enhanced security features. It summarizes existing ATM security issues and proposes adding biometric authentication using fingerprints instead of cards and PINs. The proposed system uses AI for easy user interaction, image processing to detect issues like insufficient funds, and additional security measures like automatic door locking, alerts to law enforcement, and limiting the number of users in the ATM area at one time. The goal is to add multiple layers of security to reduce ATM fraud and theft compared to existing card-and-PIN based systems.
The ultimate across the board user authentication approach in use today is evidently the password-based authentication.
When we carry out a credit card transaction through the EDC (Electronic Data Capture) machine in the public, the user’s PIN number
becomes very much vulnerable to the direct observation by nearby adversaries in huddled places, promoted by vision enhancing and/or
recording appliances. Devising a secure PIN entry method during the credit card transaction in such a situation is a strenuous task.
Currently, there is no pragmatic solution being implemented for this problem. This paper starts with the investigation of the current
status about the direct experiential attacks. Our analysis about these attacks terminates that no practical available solution at present for
these direct observational attacks. This paper introduces a model which attempts to make the PIN number entry secure during credit
card transactions in public places. Our model aims to use the user’s mobile phone for PIN number entry rather than the merchant’s
user machine. The best tract about the proposed model is that the PIN number does not get revealed to any of the direct observational
attacks, be it direct human observation or observation by a video camera.
Hades InfoTech provides academic and project services related to embedded systems and software. It offers consultancy for embedded and software projects, delivering all relevant materials and documentation. It develops projects on various topics like embedded microcontrollers, VLSI, biomedical, and more. It also provides implementation of IEEE papers and journals using embedded microcontrollers with working models.
IRJET - Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET Journal
This document describes a face recognition and fingerprint-based attendance monitoring system that uses biometrics to record student attendance without manual intervention. The system uses an Arduino UNO to scan fingerprints with an optical sensor and identify matches in a database. A Raspberry Pi uses a camera and local binary patterns histograms method to recognize student faces and identify matches. Fingerprint and face data are sent to a database hosted online. If the fingerprint and face data for a student match database records, their attendance is marked with a timestamp. The system aims to automate attendance tracking while preventing errors and malpractices compared to traditional manual methods.
This document describes a fingerprint-based security system that uses a microcontroller and fingerprint module to open a lock only for authorized users. The system scans a fingerprint and verifies it matches one stored on the microcontroller. If so, it activates a relay that opens the locked system. The fingerprint module can store up to 750 fingerprints and is connected to the microcontroller via a serial port. The system provides security for items like medications, jewelry, and documents without needing passwords.
This document proposes a finger print based door access system using biometrics for authentication. It uses a FIM 30N high voltage fingerprint scanner module stored on an ARM7 microcontroller. Employees first register their fingerprints which are stored with a unique ID. When employees attempt to enter, their live fingerprint is scanned and compared to stored prints. If it matches, they must enter a password via keypad. If both authenticate, a stepper motor opens the door which automatically closes after a delay. The system aims to provide secure access for organizations and uses embedded C programming on an ARM microcontroller with various hardware components.
The document describes a project to simulate a secure ATM using an Arduino board and sensors to detect two potential attack scenarios: 1) physical access of the ATM's internal components, and 2) removing the entire ATM from its location. The system uses an Arduino board connected to various sensors to monitor for threats. If sensor readings match rules indicating a threat, an alarm is triggered. RabbitMQ and Node-RED are used to process sensor data in real-time and evaluate the rules. Kibana visualizes the sensor data for analysis. The goal is to prototype an IoT-based security system to protect ATMs from physical attacks.
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
The document proposes a new authentication method called the revolving flywheel PIN-entry method to prevent shoulder surfing attacks. The method uses a revolving flywheel with three layers and sections containing randomly placed numbers and colors. Users register a PIN and for authentication must enter the PIN by clicking color pads associated with the numbers on the flywheel instead of entering the actual digits. The method aims to provide secure, usable authentication in a short time period and could be applied to systems like ATMs.
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
The scope of this work extends to system components (for example service providers, networks,
servers, hosts, applications, processes and personnel) which are used to exchange PIN-related data. The PIN
Guidelines in this document encompass PIN security within any one system or sub-system and between systems.
This process designs 10 digit keypad with random RGB color SCHEME using a Fast Finite-State Algorithm for
Generating RGB Palettes of Color. In this work, we propose a color finite-state LBG (CFSLBG) algorithm that
reduces the computation time by exploiting the correlations of palette entries between the current and previous
iterations.
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
As we are moving in a World of advancement, so the security is the major concern in order to keep data isolate from the unauthorised users to access. In today’s World, we need high degree security system for the protection of our document, important data, as well as memory and jewellery. This review paper presents a secure fingerprint locker which is feasible. This system is proved successful on all norms of security of lockers. There are other methods of verifying authentication through password, RFID but this method is most efficient and reliable. To provide perfect security to the lockers and to make the work easier, this project is taking help of two different technologies, i.e. Embedded System and Biometrics. Biometrics is basically the measurement and use of unique characteristics of living beings to make them distinguish from one another. And this is more reliable then passwords and tokens which can be lost or stolen by the humans. In this paper we are providing the work done on this technique.
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
This document describes a RFID-based automatic door locking system for home security. The system uses an Arduino nano microcontroller, RFID reader and tags, wireless transmitter and receiver modules, NodeMCU for WiFi connectivity, a 3x4 keypad, and servo motor. The system provides three ways to unlock the door - using a password via keypad, detecting an authorized RFID tag, or using a mobile application. It aims to remotely control the door unlock via a web connection and message passing between the owner and door lock for increased security and convenience.
Design of Banking Security System Using Mems And Rfid Technologytheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
This project presents a door locking system which suggests two ways for unlocking a door using Internet of Things (IoT) and Fingerprint. Most of the major door lock security systems have several loopholes which could be broken down to gain access to the desired places, and it creates a concern for a secure lifestyle and proper working environment. People can access Internet services by using their cell phone, laptop and various gadgets. Fingerprint is a reliable biometric feature having a wide range of applications that require authentication. Biometric systems such as fingerprint provide tools to enforce reliable logs of system transactions and protect an individual’s right to privacy. In the proposed system, fingerprints of the authorized users are enrolled and verified to provide access to a facility that is used by multiple users. A user can also be removed and a new user can be enrolled in the system. We have implemented a centralized control system from where we can control who can enter in which rooms and who cannot. This is an Arduino Mega device based. Fingerprints are stored dynamically in a database for computing the different statistics.
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
This document summarizes a research project that developed a high security system for money carrying vans. The system uses both a password entered on a keypad and fingerprint authentication for security. It contains a microcontroller, fingerprint sensor, LCD display, GSM module, and keypad. If an unauthorized person enters the wrong password, access is denied and an alert message is sent via the GSM module. If the password is correct but the fingerprint does not match, access is again denied and an alert sent. The system is designed to improve security when transporting money in vans compared to using guards alone.
This document describes a multipurpose security system using RFID and GSM technologies. The system provides four stages of verification: RFID verification, time limit verification, SIM card contact number verification, and password matching. If any verification fails, a message is sent to security within a specified time period. The system was implemented using an Arduino Uno, RFID reader, and GSM module. It was tested and able to open a door or trigger a motor when all verifications passed successfully. The system provides a robust, efficient form of security and could be adapted for various applications.
This document discusses a security system project that uses fingerprint and keypad authentication to allow authorized individuals access. The system is programmed using an embedded microcontroller and C language. When a person places their finger on the reader, the system will check if they are authorized and prompt for a pin entry via keypad or mobile. If authorized, a message is sent to their mobile via GSM technology. The system aims to provide low-cost, automated security access for applications like ATMs.
This document presents a project titled "Fingerprint Recognition for Security" by Bisangabagabo Alphonse. The project aims to use fingerprint recognition to improve student identification for security at KIST by replacing the current system of using ID cards. The system will utilize fingerprint scanning, matching, and identification algorithms built with C programming language. It seeks to address issues like unauthorized access and students missing classes when cards are lost or forgotten by implementing an accurate biometric authentication solution based on individuals' unique fingerprint data.
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
This document proposes an advanced security system for bank lockers using biometric authentication and GSM technology. The system aims to provide more secure access to bank lockers than traditional key-based systems. It works by enrolling users through fingerprint scanning and storing their fingerprint data and mobile number in a database. When a user wants to open their locker, the system verifies their identity by matching their fingerprint and sends a one-time password via SMS to their registered mobile number. The user then enters this password to unlock the locker, providing two-factor authentication through biometrics and mobile verification. The system is designed to address security issues with lost or duplicated keys and keep pace with digital authentication methods.
IRJET- Authenticated Locker System using Watchword ProtectionIRJET Journal
This document describes an authenticated locker system using password protection that is designed using an Arduino kit. The system uses a password entered on a 4x4 keypad to control a servo motor that opens and closes a door. If the correct password is entered, the door will open for 30 seconds before closing. If an incorrect password is entered multiple times, a buzzer will sound. The system aims to provide effective security for applications like bank lockers or secure doors at an affordable cost. It analyzes the entered password and stored password in the Arduino's memory to determine if access should be granted.
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
Abstract In this paper, MEMS (Micro Electro Mechanical System) is implemented using Embedded controller PIC 16F877A. MEMS can be used to sense motion. Microcontroller detect any motion while they are occurs or not. The user can assign a password by fixed set of motions as decided by them. In that there are three techniques uses for user’s authentication. Firstly Microcontroller senses any motion which is matches with exist motion password, then first phase will unlock and it goes into next phase is human interface method of keypad that is traditional where the user enters the predefined password, if it is matched with the predefined password then second phase will be unlock. Then user will directly enter into the final phase which is a RFID card that is read by a RFID reader module connected to the Micro controller if the card is matched the final phase get completed and the desired operation will start. A buzzer is used for an indication of wrong password. This buzzer is ON until right password matches with existing password. Key Words: -Codebooks, Key Logger, PIC Microcontroller, Secret Little Functions, RFID, MEMS.
IRJET - Three Layered Security for BankingIRJET Journal
This document describes a proposed three-layered security system for online banking authentication. The system uses username and password for the first layer of authentication. For the second layer, a QR code encrypted with the user's IMEI number is displayed, which must be scanned by their smartphone. For the third layer, an OTP is sent to the user's smartphone after successful QR code scan. This three-layered approach provides stronger security than username and password alone by distributing the authentication process across multiple devices and utilizing different authentication methods at each layer. The system is designed to be more secure against attacks like keylogging compared to a single-factor authentication system.
This document describes a fingerprint-based security system project. The system uses a fingerprint sensor and microcontroller to scan fingerprints and compare them to registered fingerprints to grant access. It has two modes - master mode to add and delete users, and user mode to authenticate employees. If the scanned fingerprint matches a registered print, the microcontroller sends the user ID to the computer and activates devices like unlocking a door. The system aims to provide secure access control for organizations using biometric fingerprint identification.
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
This document proposes an artificial intelligence-based smart ATM system with enhanced security features. It summarizes existing ATM security issues and proposes adding biometric authentication using fingerprints instead of cards and PINs. The proposed system uses AI for easy user interaction, image processing to detect issues like insufficient funds, and additional security measures like automatic door locking, alerts to law enforcement, and limiting the number of users in the ATM area at one time. The goal is to add multiple layers of security to reduce ATM fraud and theft compared to existing card-and-PIN based systems.
The ultimate across the board user authentication approach in use today is evidently the password-based authentication.
When we carry out a credit card transaction through the EDC (Electronic Data Capture) machine in the public, the user’s PIN number
becomes very much vulnerable to the direct observation by nearby adversaries in huddled places, promoted by vision enhancing and/or
recording appliances. Devising a secure PIN entry method during the credit card transaction in such a situation is a strenuous task.
Currently, there is no pragmatic solution being implemented for this problem. This paper starts with the investigation of the current
status about the direct experiential attacks. Our analysis about these attacks terminates that no practical available solution at present for
these direct observational attacks. This paper introduces a model which attempts to make the PIN number entry secure during credit
card transactions in public places. Our model aims to use the user’s mobile phone for PIN number entry rather than the merchant’s
user machine. The best tract about the proposed model is that the PIN number does not get revealed to any of the direct observational
attacks, be it direct human observation or observation by a video camera.
Hades InfoTech provides academic and project services related to embedded systems and software. It offers consultancy for embedded and software projects, delivering all relevant materials and documentation. It develops projects on various topics like embedded microcontrollers, VLSI, biomedical, and more. It also provides implementation of IEEE papers and journals using embedded microcontrollers with working models.
IRJET - Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET Journal
This document describes a face recognition and fingerprint-based attendance monitoring system that uses biometrics to record student attendance without manual intervention. The system uses an Arduino UNO to scan fingerprints with an optical sensor and identify matches in a database. A Raspberry Pi uses a camera and local binary patterns histograms method to recognize student faces and identify matches. Fingerprint and face data are sent to a database hosted online. If the fingerprint and face data for a student match database records, their attendance is marked with a timestamp. The system aims to automate attendance tracking while preventing errors and malpractices compared to traditional manual methods.
This document describes a fingerprint-based security system that uses a microcontroller and fingerprint module to open a lock only for authorized users. The system scans a fingerprint and verifies it matches one stored on the microcontroller. If so, it activates a relay that opens the locked system. The fingerprint module can store up to 750 fingerprints and is connected to the microcontroller via a serial port. The system provides security for items like medications, jewelry, and documents without needing passwords.
This document proposes a finger print based door access system using biometrics for authentication. It uses a FIM 30N high voltage fingerprint scanner module stored on an ARM7 microcontroller. Employees first register their fingerprints which are stored with a unique ID. When employees attempt to enter, their live fingerprint is scanned and compared to stored prints. If it matches, they must enter a password via keypad. If both authenticate, a stepper motor opens the door which automatically closes after a delay. The system aims to provide secure access for organizations and uses embedded C programming on an ARM microcontroller with various hardware components.
The document describes a project to simulate a secure ATM using an Arduino board and sensors to detect two potential attack scenarios: 1) physical access of the ATM's internal components, and 2) removing the entire ATM from its location. The system uses an Arduino board connected to various sensors to monitor for threats. If sensor readings match rules indicating a threat, an alarm is triggered. RabbitMQ and Node-RED are used to process sensor data in real-time and evaluate the rules. Kibana visualizes the sensor data for analysis. The goal is to prototype an IoT-based security system to protect ATMs from physical attacks.
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
The document proposes a new authentication method called the revolving flywheel PIN-entry method to prevent shoulder surfing attacks. The method uses a revolving flywheel with three layers and sections containing randomly placed numbers and colors. Users register a PIN and for authentication must enter the PIN by clicking color pads associated with the numbers on the flywheel instead of entering the actual digits. The method aims to provide secure, usable authentication in a short time period and could be applied to systems like ATMs.
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
The scope of this work extends to system components (for example service providers, networks,
servers, hosts, applications, processes and personnel) which are used to exchange PIN-related data. The PIN
Guidelines in this document encompass PIN security within any one system or sub-system and between systems.
This process designs 10 digit keypad with random RGB color SCHEME using a Fast Finite-State Algorithm for
Generating RGB Palettes of Color. In this work, we propose a color finite-state LBG (CFSLBG) algorithm that
reduces the computation time by exploiting the correlations of palette entries between the current and previous
iterations.
IRJET- Security for Building & ATM MachineIRJET Journal
This document proposes a system to improve security for buildings and ATM machines using Aadhar verification and biometric authentication. The system would require users to verify their identity via Aadhar number and fingerprint scan to enter a building or use an ATM. This would help reduce theft and allow unauthorized activities to be tracked via CCTV footage. The system aims to make ATM transactions more secure by replacing cards with biometric verification through Aadhar. Fingerprint data would be stored along with user details in a database for identity matching and transaction authorization.
This document describes a proposed system to assist visually impaired people in using ATMs. The system would allow users to select either a normal or special "blind mode" using voice commands. In blind mode, a fingerprint scanner and encrypted smart card are used for authentication instead of a PIN. Voice prompts then guide the user through transactions like checking balances or withdrawing cash. The system aims to provide independent banking access for the visually impaired through fingerprint authentication and voice interaction instead of traditional screen-based ATM interfaces.
The document describes an improved PIN entry method to prevent shoulder surfing attacks. The basic BW method divides numbers between two colored halves in each round. An observer can group entries over rounds to determine a PIN digit. The improved method displays four random colors across ten digit keys in each round. Users enter based on their PIN digit's color. This prevents grouping as colors randomly change, securing PINs even from skilled observers. The method uses sets and permutations to partition colors after each entry.
The document summarizes a research paper that proposes moving ATM applications to smartphones with a secured PIN-entry method. It first discusses existing PIN-entry methods and their vulnerabilities. It then proposes an improved Black-White method for PIN entry that uses bi-colored keys and random digit grouping to prevent shoulder surfing attacks. The document also discusses creating an ATM application for Android smartphones that uses a virtual money concept to allow transactions with simulated funds for added security when accessing accounts on a mobile device.
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
This document proposes a system that uses triangular location detection with IoT, OpenCV, and Zigbee hardware for user authentication during ATM cash loading for improved security. The system uses three Zigbees connected to the delivery vehicle, user's mobile phone, and ATM. When all three are within range, indicating the vehicle is at the ATM, an OTP is generated and verified between the vehicle and ATM Zigbees. In addition to OTP, user signature is verified using OpenCV after cash is loaded into the ATM, providing multi-factor authentication. This integrated system aims to provide more reliable and effective security compared to existing signature or PIN-based authentication alone.
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
This document discusses a proposed biometric and magic PIN authentication system for ATMs. The system would combine the use of a physical access card, a randomly generated "MagicPIN", and facial recognition using deep convolutional neural networks. If adopted, the system aims to improve security by verifying card owners' identities through biometric authentication in addition to requiring possession of the access card. The system is intended to help solve problems of account security and ensure only the real account owner can access their accounts. It analyzes related work on ATM security and discusses how the proposed system could provide benefits like being more secure, convenient, and preventing fraud compared to existing PIN-based authentication methods.
This document describes a fingerprint-based security system using an Arduino Uno microcontroller and fingerprint sensor module. It provides an introduction to fingerprint biometrics and explains the components of the system, including how fingerprints are captured and matched. The system is capable of enrollment and verification of fingerprints to control access and will trigger different outputs like a buzzer or motor depending on if a match is found or not. Potential applications of this technology include security systems, employee verification, and border control.
Fingerprint Authentication for ATM was about the biometric authentication security system for ATM which enabled the fingerprint authentication for traditional cash machines.
# Synopsis
https://www.slideshare.net/ParasGarg14/project-synopsis-68167417
# Report
https://github.com/ParasGarg/Fingerprint-Authentication-for-ATM/blob/master/Reports/Project%20Report.pdf
# Code
https://github.com/ParasGarg/Fingerprint-Authentication-for-ATM
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
This document discusses various multi-factor authentication methods including smart cards, graphical passwords, risk assessment, mobile phone tokens, GPS location and timestamp, hand vein recognition, DNA recognition, and biometric authentication. It provides details on how each method works and evaluates factors like universality, uniqueness, collectability, performance and acceptability for multi-factor authentication. The document aims to review different technical approaches to implement multi-factor authentication for secure user identification.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET- Deceptive Visual Impression to Prevent Shoulder Surfer AttackIRJET Journal
This document proposes a method called deceptive visual impression PIN to prevent shoulder surfing attacks during password authentication. It uses a hybrid image on a virtual keypad that shows different digit arrangements to the user and anyone standing behind them, based on viewing distance and angle. An algorithm determines whether the user's keypad is visible at a given distance. This creates confusion and prevents attackers from seeing the actual PIN entered. The goal is to make password authentication more secure by resisting visual observation attacks.
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
This document presents an eye tracking system for password authentication using machine learning. It aims to overcome shoulder surfing attacks by allowing users to enter passwords using their eye movements instead of a keyboard. The system detects the user's eye pupil location using a Haar cascade algorithm and measures the distance between the eye center and pupil to determine if the user is looking left, right, or center. Numbers are displayed on screen and the user selects them by focusing on them with their eyes. The entered password is compared to a trained dataset and access is allowed only if it matches. This gaze-based authentication method leaves no trace of the password and makes it difficult for observers to steal authentication information through shoulder surfing.
Color Code PIN Authentication System Using Multi-TouchTechnologyIRJET Journal
This document summarizes a research paper that proposes using color codes instead of numbers for PIN entry on mobile devices to increase security against shoulder surfing attacks. The system generates a random arrangement of four colors for the user to select for each digit of their PIN. Attackers would have a difficult time determining the PIN since they don't know the color mapping. The paper also describes using patterns like dots or stripes to help visually impaired users. It analyzes related work on improving PIN security and discusses evaluation results showing the color code method prevents easy observation of PIN entry.
IRJET - Precocious ATM System using Iris ScannerIRJET Journal
This document proposes a new ATM system with enhanced security features using iris scanning and fingerprint scanning technologies. The system uses an iris scanner as the primary authentication method along with a fingerprint sensor embedded in the ATM card as a secondary authentication. It aims to address the increasing problem of ATM skimming and fraud. The system architecture includes a Raspberry Pi microcontroller, RFID module to access customer accounts, fingerprint sensor for authentication, iris scanner, and a database containing user iris and fingerprint data. The iris scanning provides strong authentication since iris patterns do not change over a person's lifetime. The addition of fingerprint scanning on the ATM card adds another layer of security by requiring both biometrics to authenticate transactions. The proposed system is expected
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...IRJET Journal
The document proposes a secure ATM system using facial recognition and one-time passwords (OTPs) sent via SMS to increase security and prevent fraud. The system would allow cardless transactions authenticated by matching a user's live photo taken at the ATM to their registered photo on file. For guest users, the system would send an OTP to the account holder's phone that must be entered on a shuffled keypad to complete the transaction. This two-factor authentication approach aims to eliminate vulnerabilities of the existing card and PIN-based system like card cloning and shoulder surfing to obtain PINs.
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET Journal
The document proposes a sixth sense ATM machine that enables contactless transactions using hand gestures recognized by cameras rather than physical interfaces, eliminating the spread of bacteria while also incorporating sensors to prevent theft and monitor users to increase security. Current ATM systems are susceptible to bacterial spread through physical interfaces and card/PIN skimming, while proposed solutions in previous research had limitations, so the sixth sense ATM aims to address both issues simultaneously through a non-touch gesture-based interface and integrated alarm sensors.
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop...Eswar Publications
Payment transactions initiated through a mobile device are growing and security concerns must be addressed. People
coming from payment card industry often talk passionately about porting ISO 9564 PIN standard based authentication
in open-loop card payment to closed-loop mobile financial transactions and certification of closed-loop payment product or solution against this standard. In reality, so far this standard has not been adopted in closed-loop mobile payment authentication and applicability of this ISO standard must be studied carefully before adoption. The authors do a critical analysis of the applicability of this ISO specification and make categorical statement about relevance of compliance to closed-loop mobile payment. Security requirements for authentication in closed-loop mobile payment systems are not standardised through ISO 9564 standard, Common Criteria [3], etc. Since closed-loop mobile payment is a relatively new field, the authors make a case for Common Criteria Recognition Agreement (CCRA) or other standards organization to push for publication of a mobile device-agnostic Protection Profile or standard for it, incorporating the suggested authentication approaches.
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
This document summarizes a survey on cardless automated teller machines (ATMs). It discusses using fingerprint authentication and one-time passwords (OTPs) sent via global system for mobile communications (GSM) to allow customers to withdraw cash from an ATM without a debit card. The proposed system uses a fingerprint module and microcontroller to authenticate users via their fingerprint. An OTP is then sent to the user's mobile phone for an additional layer of security. If the fingerprint and OTP match, the user's bank account will open on the ATM machine and allow cash withdrawals. The document compares this approach to existing card-based ATM security and pin-based authentication methods.
Similar to IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement of PIN Entry Security (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Height and depth gauge linear metrology.pdfq30122000
Height gauges may also be used to measure the height of an object by using the underside of the scriber as the datum. The datum may be permanently fixed or the height gauge may have provision to adjust the scale, this is done by sliding the scale vertically along the body of the height gauge by turning a fine feed screw at the top of the gauge; then with the scriber set to the same level as the base, the scale can be matched to it. This adjustment allows different scribers or probes to be used, as well as adjusting for any errors in a damaged or resharpened probe.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.