This document discusses privacy and security issues related to social media. It begins by introducing how social media has become integral to modern life but also presents privacy risks if users share personal information publicly. Some key privacy threats on social media mentioned include data breaches, passive attacks like unauthorized data collection, and active attacks trying to access other user accounts. The document then reviews literature around social media security and privacy concerns. It outlines common security risks like unmonitored accounts, human error, and vulnerabilities in third-party apps linked to social media profiles. Potential threats to social networks are categorized as data breaches, passive attacks, and active attacks. The document concludes that social networks pose significant security and privacy risks and all users should take steps to protect
IRJET- Secure Social Network using Text MiningIRJET Journal
This document proposes a secure social network that uses text mining techniques. It discusses authenticating users with Aadhar numbers to allow only one account per user. It aims to restrict improper words and vulgar images/videos by maintaining dictionaries of abusive terms and notifying users about tagged inappropriate content. The proposed system focuses on privacy, restricting multiple accounts and abusive content through authentication, keyword detection, and notification processes to make user profiles and posts more secure.
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
This document provides a comprehensive review of cyber security, threats, and cyber attacks. It discusses key topics such as cyber crimes, cyber security, cyber space threats, and types of cyber threats. The main points are:
1) Cyber security is critical in today's world where most activity occurs in cyberspace. Cyber crimes and attacks are major concerns for individuals, companies, and governments.
2) Common cyber threats include malware, phishing, denial of service attacks, man-in-the-middle attacks, SQL injection, and zero-day exploits.
3) The goals of cyber security are confidentiality, integrity, and availability of information based on the CIA triad model.
4)
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IJITE
The data mining figures out accurate information for requesting user after the raw data is analyzed. Among
lots of developments, data mining face hot issues on security, privacy and integrity. Data mining use one of the latest technique called privacy preserving data publishing (PPDP), which enforces security for the digital information provided by governments, corporations, companies and individuals in social networks. People become embarrassed when adversary tries to know the sensitive information shared. Sensitive information is gathered through the vertex and multi community identities of the user. Vertex identity denotes the self-information of user like name, address, mobile number, etc. Multi community identity denotes the community group in which the user participates. To prevent such identity disclosures, this paper proposes KW -structural diversity anonymity technique, for the protection of vertex and multi community identity disclosure. In KW -structural diversity anonymity technique, k is privacy level applied for users and W is an adversary monitoring time.
IRJET- Private Social Media and Data SecurityIRJET Journal
This document discusses the development of a private social media application called Ping Meee using the Ruby on Rails framework. It begins with an introduction that outlines the benefits of private social media over public platforms for organizations, such as better control over data and interactions. The document then reviews relevant literature on social media security challenges and cyber attacks. Finally, it provides a brief overview of how the Ping Meee application works using the Ruby on Rails framework.
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisIRJET Journal
This document discusses cyber security, attacks, and crimes. It provides an overview of cyber security and defines key terms like cyber attacks, cyber crimes, and malware. It then analyzes some of the common problems related to cyber security like not updating software, not using antivirus protection, using weak passwords, and connecting to public Wi-Fi networks. These issues can leave systems vulnerable to attacks. The document also compares different approaches to cyber security presented in other papers and their strengths and weaknesses. Overall, the document aims to discuss and analyze cyber security threats and challenges.
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
This document summarizes a research paper that proposes a framework called SecureWall to implement fine-grained access controls on online social networks to mitigate privacy leaks. The framework combines multiple security models - Chinese Wall policy for community privacy, Biba model for integrity, and Bell-LaPadula (BLP) model for confidentiality. It was implemented on a prototype social network and evaluated based on information flow metrics and user surveys. Results found the framework reduced information leakage compared to popular social networks while maintaining usability and sociability according to majority of user feedback.
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Spear phishing attacks target individuals within an organization using personalized emails to trick them into revealing sensitive information or clicking malicious links. One such attack began when a worker clicked a spear phishing link, allowing attackers to access the network. The attackers then used information from the Active Directory to identify databases and steal large amounts of personal information, including social security numbers and birth dates. Organizations need integrated security solutions across email and other vectors to detect and block these advanced targeted attacks involving spear phishing and credentials theft. FireEye Email Security aims to provide more effective protection against these types of email-based cyberattacks.
IRJET- Secure Social Network using Text MiningIRJET Journal
This document proposes a secure social network that uses text mining techniques. It discusses authenticating users with Aadhar numbers to allow only one account per user. It aims to restrict improper words and vulgar images/videos by maintaining dictionaries of abusive terms and notifying users about tagged inappropriate content. The proposed system focuses on privacy, restricting multiple accounts and abusive content through authentication, keyword detection, and notification processes to make user profiles and posts more secure.
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
This document provides a comprehensive review of cyber security, threats, and cyber attacks. It discusses key topics such as cyber crimes, cyber security, cyber space threats, and types of cyber threats. The main points are:
1) Cyber security is critical in today's world where most activity occurs in cyberspace. Cyber crimes and attacks are major concerns for individuals, companies, and governments.
2) Common cyber threats include malware, phishing, denial of service attacks, man-in-the-middle attacks, SQL injection, and zero-day exploits.
3) The goals of cyber security are confidentiality, integrity, and availability of information based on the CIA triad model.
4)
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IJITE
The data mining figures out accurate information for requesting user after the raw data is analyzed. Among
lots of developments, data mining face hot issues on security, privacy and integrity. Data mining use one of the latest technique called privacy preserving data publishing (PPDP), which enforces security for the digital information provided by governments, corporations, companies and individuals in social networks. People become embarrassed when adversary tries to know the sensitive information shared. Sensitive information is gathered through the vertex and multi community identities of the user. Vertex identity denotes the self-information of user like name, address, mobile number, etc. Multi community identity denotes the community group in which the user participates. To prevent such identity disclosures, this paper proposes KW -structural diversity anonymity technique, for the protection of vertex and multi community identity disclosure. In KW -structural diversity anonymity technique, k is privacy level applied for users and W is an adversary monitoring time.
IRJET- Private Social Media and Data SecurityIRJET Journal
This document discusses the development of a private social media application called Ping Meee using the Ruby on Rails framework. It begins with an introduction that outlines the benefits of private social media over public platforms for organizations, such as better control over data and interactions. The document then reviews relevant literature on social media security challenges and cyber attacks. Finally, it provides a brief overview of how the Ping Meee application works using the Ruby on Rails framework.
Cyber Attacks and Crimes in Cyber Security: A Comparative AnalysisIRJET Journal
This document discusses cyber security, attacks, and crimes. It provides an overview of cyber security and defines key terms like cyber attacks, cyber crimes, and malware. It then analyzes some of the common problems related to cyber security like not updating software, not using antivirus protection, using weak passwords, and connecting to public Wi-Fi networks. These issues can leave systems vulnerable to attacks. The document also compares different approaches to cyber security presented in other papers and their strengths and weaknesses. Overall, the document aims to discuss and analyze cyber security threats and challenges.
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
This document summarizes a research paper that proposes a framework called SecureWall to implement fine-grained access controls on online social networks to mitigate privacy leaks. The framework combines multiple security models - Chinese Wall policy for community privacy, Biba model for integrity, and Bell-LaPadula (BLP) model for confidentiality. It was implemented on a prototype social network and evaluated based on information flow metrics and user surveys. Results found the framework reduced information leakage compared to popular social networks while maintaining usability and sociability according to majority of user feedback.
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
Spear phishing attacks target individuals within an organization using personalized emails to trick them into revealing sensitive information or clicking malicious links. One such attack began when a worker clicked a spear phishing link, allowing attackers to access the network. The attackers then used information from the Active Directory to identify databases and steal large amounts of personal information, including social security numbers and birth dates. Organizations need integrated security solutions across email and other vectors to detect and block these advanced targeted attacks involving spear phishing and credentials theft. FireEye Email Security aims to provide more effective protection against these types of email-based cyberattacks.
This document describes a project to detect fake news and messages using machine learning techniques. The goal is to classify news stories and messages as real or fake, and check the validity of websites publishing the news. The project will use concepts from artificial intelligence, natural language processing, and machine learning, including logistic regression, decision trees, gradient boosting, and random forests. The system is intended as a web application that provides guidance to users on identifying fake news and messages spread on social media platforms. It will analyze data from online sources to identify main keywords and topics associated with fake content. Tips will also be provided on how to prevent the spread of misinformation.
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
Internet Society (ISOC) aims are:
make security an integrated function of connected objects and encourages IoT device and service providers for consumers to adopt the Online Trust Alliance (OTA) security and privacy principles ;
increase the consumer demand for security and privacy in the IoT devices they purchase;
create government policies and regulations that promote better security and privacy features in IoT devices.
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
Increasingly, all kinds of organizations and institutions are adopting the E-business model to conduct their
activities and provide E-Services for their customers. In the process, whether they know it or not, those
organizations are also opening themselves up to the risk of information security breaches. Therefore
protecting an organization’s ICT infrastructure, IT systems, and Data is a vital issue that is often
underestimated. Research has shown that one of the most significant threats to information security comes
not from external attack but rather from the system's users, because they are familiar with the
infrastructure and have access to its resources, but may be unaware of the risks. Moreover, using only
technological solutions to protect an organization’s assets is not enough; there is a need to consider the
human factor by raising users’ security awareness. Our contribution to this problem is to propose an
Information Security Awareness Program that aims at raising and maintaining the level of users’ security
awareness. This paper puts forward a general model for an information security awareness program and
describes how it could be incorporated into an organization’s website through the process of development
life cycle.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
The document discusses the main cybersecurity challenges faced in social computing. It identifies several key challenges: (1) big data breaches as more personal data is collected and stored; (2) the expansion of AI which could help detect cyberattacks but also poses risks; and (3) limited IT resources making it difficult for organizations to adequately monitor and secure expanding networks and devices. Additional challenges discussed include threats posed by the growing number of internet-connected devices and vulnerabilities in serverless applications. Real-world examples are provided to illustrate incidents and the potential damage from successful cyberattacks.
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
This document discusses techniques for protecting Facebook accounts from malicious attacking applications. It proposes a novel rank-based image watermarking strategy that embeds a secret message into images using digital watermarking and encryption. The strategy splits images into pieces, embeds watermarks into DCT coefficients of blocks, and encrypts the secret message before combining it with the watermarks. This provides high security for secret messages shared through image watermarking while maintaining imperceptibility and robustness against attacks. The system can detect hackers who try to decrypt images with the wrong secret key by notifying an administrator.
This document summarizes 10 research papers related to privacy and security aspects of big data. It discusses the key challenges around big data privacy including how large amounts of consumer data collected by companies may be misused and how securely storing and analyzing this information is critical. Various papers propose mechanisms for encrypting data and complying with data privacy laws. Overall, the review finds that big data brings important security and privacy issues given its scale, and continued research is needed to develop solutions that balance data needs with individual privacy.
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
This document discusses privacy protection challenges in big data environments. It first introduces security issues posed by big data, including privacy leaks caused by data collection, storage, and use. It then analyzes causes of privacy problems like social network connectivity, commercial interests, and government needs. Key principles for privacy protection discussed are limiting data use scope, ensuring data quality, and individual participation. The document concludes by outlining some technical approaches to privacy protection, such as anonymity, watermarking, provenance tracking, and access control technologies.
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
Now big data has become a hot topic in academia and industry, it is affecting the mode of thinking and working, daily life. But there are many security risks in data collection, storage and use. Privacy leakage caused serious problems to the user, false data will lead to error results of big data analysis. This paper first introduces the security problems faced by big data,analyzes the causes of privacy problems,discussesthe principle to solve the problem. Finally,discusses technical means for privacy protection.
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET Journal
This document discusses detecting spiteful accounts in social networks. It proposes a framework to identify malicious accounts based on features identified in previous research. The framework would analyze posts and URLs to classify accounts as malicious or not without visiting landing pages. The architecture describes the detection mechanism analyzing content during posting to flag malicious posts which are sent directly to administrators. Previous research on classifying applications and events on social networks is discussed. The proposed system aims to easily identify malicious posts and users while maintaining database of malicious accounts and upholding social network values.
Cyberbullying Detection on Social Networks Using Machine Learning ApproachesIRJET Journal
This document discusses using machine learning approaches to detect cyberbullying on social networks. It begins with an abstract that introduces the problem of cyberbullying and its negative impacts. It then discusses related work on using natural language processing and machine learning like SVM, neural networks, and co-training models to identify cyberbullying. The document aims to compare different machine learning algorithms (Naive Bayes, Decision Tree, Random Forest, SVM, DNN) to determine the most effective technique for detecting cyberbullying. It discusses preprocessing data and extracting features before applying the algorithms. The results will show which algorithm has the highest accuracy on a Twitter comment dataset.
This document is a seminar report submitted by Supriya R to fulfill the requirements for a Master of Technology degree. The report discusses big data privacy issues in public social media. It provides an overview of big data and how the vast amounts of user-generated content uploaded to social media each day makes it difficult for individuals to be aware of everything that could impact their privacy. The report reviews literature related to location privacy and privacy issues on Facebook. It then analyzes threats to privacy from awareness of damaging media in big datasets and privacy policies of different services. Finally, it proposes surveying metadata from social media to help users stay informed about relevant privacy issues.
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
There are various root causes of software failures. Few years ago, software used to fail mainly due to functionality related bugs. That used to happen due to requirement misunderstanding, code issues and lack of functional testing. A lot of work has been done in past on this and software engineering has matured over time, due to which software’s hardly fail due to functionality related bugs. To understand the most recent failures, we had to understand the recent software development methodologies and technologies. In this paper we have discussed background of technologies and testing progression over time. A survey of more than 50 senior IT professionals was done to understand root cause of their software project failures. It was found that most of the softwares fail due to lack of testing of non-functional parameters these days. A lot of research was also done to find most recent and most severe software failures. Our study reveals that main reason of software failures these days is lack of testing of non-functional requirements. Security and Performance parameters mainly constitute non-functional requirements of software. It has become more challenging these days due to lots of development in the field of new technologies like Internet of things (IoT), Cloud of things (CoT), Artificial Intelligence, Machine learning, robotics and excessive use of mobile and technology in everything by masses. Finally, we proposed a software development model called as T-model to ensure breadth and depth of software is considered while designing and testing of software.
Cybersecurity Business Risk, Literature ReviewEnow Eyong
Cybersecurity poses a significant business risk to social media corporations. These companies generate revenue through targeted advertising based on analyzing user information and engagement. However, cybersecurity threats could diminish the customer experience and engagement, reducing companies' ability to generate revenue. Social media sites must implement best practices from fields like the military to strengthen cyber defense, including developing reliable information systems, collecting intelligence on cyber criminals, and understanding potential cyber attack threats. Failure to address cybersecurity risks could jeopardize the success and sustainability of social media businesses.
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due to the different protocols and variety of mobile apps used to access OSNs. Therefore, traditional security techniques fail to provide the needed security and privacy, and more intelligence is required. Computational intelligence adds high-speed computation, fault tolerance, adaptability, and error resilience when used to ensure security in OSN apps. This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs. In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks before they happen.
The document discusses security issues related to social networks. It notes that social networks store large amounts of private user data, making personal information vulnerable to malicious actors like hackers. It emphasizes the importance of using strong, unique passwords for each account and limiting personal details shared publicly. The document also examines privacy controls, identity theft, malware, social engineering and other fraud risks associated with using social media platforms. Protecting privacy and being aware of potential threats are key to staying secure in social networks.
Posn private information protection in online social networks 2IAEME Publication
This document summarizes a research paper on protecting private information in online social networks. The paper proposes a Protected Online Social Network (POSN) system that uses cryptographic techniques like RC4, AES and RSA to encrypt user data. The POSN system provides different privacy levels for user profiles and sharing that control who can access information. It encrypts sensitive user data with symmetric and asymmetric encryption and redistributes encryption keys when privacy settings or friends lists change to strengthen security. The POSN aims to offer the functionality of online social networks while enhancing privacy through encryption methods and access controls.
Posn private information protection in online social networks 2IAEME Publication
This document summarizes a research paper on protecting private information in online social networks. The paper proposes a Protected Online Social Network (POSN) system that uses cryptographic techniques like RC4, AES, and RSA to encrypt user data and encryption keys. The POSN system provides different privacy levels for user profiles and sharing that control who can access information. This allows the system to function like a regular online social network while adding privacy benefits and preventing unauthorized access to private user data.
This document discusses the influence of social networks, particularly Facebook, on electronic business and customer online security. It begins by introducing social media marketing and how businesses use Facebook for e-marketing. It then analyzes how social media can be integrated into different stages of the business process model, including marketing, sales, and customer interaction. The document also examines privacy and security issues for customers, such as third party access to user data and attacks on public profiles. It concludes that while social media provides benefits for business, customers must be careful about sharing private information online and limiting third party access.
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
More Related Content
Similar to Social Media Privacy Protection for Blockchain with Cyber Security Prediction Framework
This document describes a project to detect fake news and messages using machine learning techniques. The goal is to classify news stories and messages as real or fake, and check the validity of websites publishing the news. The project will use concepts from artificial intelligence, natural language processing, and machine learning, including logistic regression, decision trees, gradient boosting, and random forests. The system is intended as a web application that provides guidance to users on identifying fake news and messages spread on social media platforms. It will analyze data from online sources to identify main keywords and topics associated with fake content. Tips will also be provided on how to prevent the spread of misinformation.
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
Internet Society (ISOC) aims are:
make security an integrated function of connected objects and encourages IoT device and service providers for consumers to adopt the Online Trust Alliance (OTA) security and privacy principles ;
increase the consumer demand for security and privacy in the IoT devices they purchase;
create government policies and regulations that promote better security and privacy features in IoT devices.
Social media platform and Our right to privacyvivatechijri
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
Increasingly, all kinds of organizations and institutions are adopting the E-business model to conduct their
activities and provide E-Services for their customers. In the process, whether they know it or not, those
organizations are also opening themselves up to the risk of information security breaches. Therefore
protecting an organization’s ICT infrastructure, IT systems, and Data is a vital issue that is often
underestimated. Research has shown that one of the most significant threats to information security comes
not from external attack but rather from the system's users, because they are familiar with the
infrastructure and have access to its resources, but may be unaware of the risks. Moreover, using only
technological solutions to protect an organization’s assets is not enough; there is a need to consider the
human factor by raising users’ security awareness. Our contribution to this problem is to propose an
Information Security Awareness Program that aims at raising and maintaining the level of users’ security
awareness. This paper puts forward a general model for an information security awareness program and
describes how it could be incorporated into an organization’s website through the process of development
life cycle.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
The document discusses the main cybersecurity challenges faced in social computing. It identifies several key challenges: (1) big data breaches as more personal data is collected and stored; (2) the expansion of AI which could help detect cyberattacks but also poses risks; and (3) limited IT resources making it difficult for organizations to adequately monitor and secure expanding networks and devices. Additional challenges discussed include threats posed by the growing number of internet-connected devices and vulnerabilities in serverless applications. Real-world examples are provided to illustrate incidents and the potential damage from successful cyberattacks.
Protecting Facebook Account From Malicious Attacking ApplicationsIRJET Journal
This document discusses techniques for protecting Facebook accounts from malicious attacking applications. It proposes a novel rank-based image watermarking strategy that embeds a secret message into images using digital watermarking and encryption. The strategy splits images into pieces, embeds watermarks into DCT coefficients of blocks, and encrypts the secret message before combining it with the watermarks. This provides high security for secret messages shared through image watermarking while maintaining imperceptibility and robustness against attacks. The system can detect hackers who try to decrypt images with the wrong secret key by notifying an administrator.
This document summarizes 10 research papers related to privacy and security aspects of big data. It discusses the key challenges around big data privacy including how large amounts of consumer data collected by companies may be misused and how securely storing and analyzing this information is critical. Various papers propose mechanisms for encrypting data and complying with data privacy laws. Overall, the review finds that big data brings important security and privacy issues given its scale, and continued research is needed to develop solutions that balance data needs with individual privacy.
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
This document discusses privacy protection challenges in big data environments. It first introduces security issues posed by big data, including privacy leaks caused by data collection, storage, and use. It then analyzes causes of privacy problems like social network connectivity, commercial interests, and government needs. Key principles for privacy protection discussed are limiting data use scope, ensuring data quality, and individual participation. The document concludes by outlining some technical approaches to privacy protection, such as anonymity, watermarking, provenance tracking, and access control technologies.
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
Now big data has become a hot topic in academia and industry, it is affecting the mode of thinking and working, daily life. But there are many security risks in data collection, storage and use. Privacy leakage caused serious problems to the user, false data will lead to error results of big data analysis. This paper first introduces the security problems faced by big data,analyzes the causes of privacy problems,discussesthe principle to solve the problem. Finally,discusses technical means for privacy protection.
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET Journal
This document discusses detecting spiteful accounts in social networks. It proposes a framework to identify malicious accounts based on features identified in previous research. The framework would analyze posts and URLs to classify accounts as malicious or not without visiting landing pages. The architecture describes the detection mechanism analyzing content during posting to flag malicious posts which are sent directly to administrators. Previous research on classifying applications and events on social networks is discussed. The proposed system aims to easily identify malicious posts and users while maintaining database of malicious accounts and upholding social network values.
Cyberbullying Detection on Social Networks Using Machine Learning ApproachesIRJET Journal
This document discusses using machine learning approaches to detect cyberbullying on social networks. It begins with an abstract that introduces the problem of cyberbullying and its negative impacts. It then discusses related work on using natural language processing and machine learning like SVM, neural networks, and co-training models to identify cyberbullying. The document aims to compare different machine learning algorithms (Naive Bayes, Decision Tree, Random Forest, SVM, DNN) to determine the most effective technique for detecting cyberbullying. It discusses preprocessing data and extracting features before applying the algorithms. The results will show which algorithm has the highest accuracy on a Twitter comment dataset.
This document is a seminar report submitted by Supriya R to fulfill the requirements for a Master of Technology degree. The report discusses big data privacy issues in public social media. It provides an overview of big data and how the vast amounts of user-generated content uploaded to social media each day makes it difficult for individuals to be aware of everything that could impact their privacy. The report reviews literature related to location privacy and privacy issues on Facebook. It then analyzes threats to privacy from awareness of damaging media in big datasets and privacy policies of different services. Finally, it proposes surveying metadata from social media to help users stay informed about relevant privacy issues.
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
There are various root causes of software failures. Few years ago, software used to fail mainly due to functionality related bugs. That used to happen due to requirement misunderstanding, code issues and lack of functional testing. A lot of work has been done in past on this and software engineering has matured over time, due to which software’s hardly fail due to functionality related bugs. To understand the most recent failures, we had to understand the recent software development methodologies and technologies. In this paper we have discussed background of technologies and testing progression over time. A survey of more than 50 senior IT professionals was done to understand root cause of their software project failures. It was found that most of the softwares fail due to lack of testing of non-functional parameters these days. A lot of research was also done to find most recent and most severe software failures. Our study reveals that main reason of software failures these days is lack of testing of non-functional requirements. Security and Performance parameters mainly constitute non-functional requirements of software. It has become more challenging these days due to lots of development in the field of new technologies like Internet of things (IoT), Cloud of things (CoT), Artificial Intelligence, Machine learning, robotics and excessive use of mobile and technology in everything by masses. Finally, we proposed a software development model called as T-model to ensure breadth and depth of software is considered while designing and testing of software.
Cybersecurity Business Risk, Literature ReviewEnow Eyong
Cybersecurity poses a significant business risk to social media corporations. These companies generate revenue through targeted advertising based on analyzing user information and engagement. However, cybersecurity threats could diminish the customer experience and engagement, reducing companies' ability to generate revenue. Social media sites must implement best practices from fields like the military to strengthen cyber defense, including developing reliable information systems, collecting intelligence on cyber criminals, and understanding potential cyber attack threats. Failure to address cybersecurity risks could jeopardize the success and sustainability of social media businesses.
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due to the different protocols and variety of mobile apps used to access OSNs. Therefore, traditional security techniques fail to provide the needed security and privacy, and more intelligence is required. Computational intelligence adds high-speed computation, fault tolerance, adaptability, and error resilience when used to ensure security in OSN apps. This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs. In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks before they happen.
The document discusses security issues related to social networks. It notes that social networks store large amounts of private user data, making personal information vulnerable to malicious actors like hackers. It emphasizes the importance of using strong, unique passwords for each account and limiting personal details shared publicly. The document also examines privacy controls, identity theft, malware, social engineering and other fraud risks associated with using social media platforms. Protecting privacy and being aware of potential threats are key to staying secure in social networks.
Posn private information protection in online social networks 2IAEME Publication
This document summarizes a research paper on protecting private information in online social networks. The paper proposes a Protected Online Social Network (POSN) system that uses cryptographic techniques like RC4, AES and RSA to encrypt user data. The POSN system provides different privacy levels for user profiles and sharing that control who can access information. It encrypts sensitive user data with symmetric and asymmetric encryption and redistributes encryption keys when privacy settings or friends lists change to strengthen security. The POSN aims to offer the functionality of online social networks while enhancing privacy through encryption methods and access controls.
Posn private information protection in online social networks 2IAEME Publication
This document summarizes a research paper on protecting private information in online social networks. The paper proposes a Protected Online Social Network (POSN) system that uses cryptographic techniques like RC4, AES, and RSA to encrypt user data and encryption keys. The POSN system provides different privacy levels for user profiles and sharing that control who can access information. This allows the system to function like a regular online social network while adding privacy benefits and preventing unauthorized access to private user data.
This document discusses the influence of social networks, particularly Facebook, on electronic business and customer online security. It begins by introducing social media marketing and how businesses use Facebook for e-marketing. It then analyzes how social media can be integrated into different stages of the business process model, including marketing, sales, and customer interaction. The document also examines privacy and security issues for customers, such as third party access to user data and attacks on public profiles. It concludes that while social media provides benefits for business, customers must be careful about sharing private information online and limiting third party access.
Similar to Social Media Privacy Protection for Blockchain with Cyber Security Prediction Framework (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.