This document summarizes and compares previous research on secure offline micro-payment systems. It describes FRoDO, a new proposed system that features an identity element and coin element to enable secure offline payments. The identity element is embedded in the customer's device and is used to link a coin element to that specific device. This provides two-factor authentication. The coin element uses a physical unclonable function and regenerative keys to securely read and redeem digital coins. The document reviews related work on context-aware and software-based authentication solutions, offline micropayment schemes without trusted hardware, and approaches using hash-chaining in mobile networks. It concludes that FRoDO is the first solution able to provide fully secure offline
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
This document summarizes a research paper that proposes a new security method for internet banking transactions using graphical secret codes. The proposed method generates a unique ID for each currency unit during a transaction to allow tracking of currency movement. It uses encryption, pixel identification and multiple authentication factors for secure login. This provides improved security over traditional password-based authentication by making transactions and login credentials more difficult to steal or guess. The method aims to reduce fraud, hacking vulnerabilities and the spread of untaxed "black money".
IRJET- Enhancement in Netbanking SecurityIRJET Journal
This document discusses enhancing security for online banking. It describes some existing security issues with online banking such as passwords being vulnerable to attacks like phishing. The proposed system aims to provide two-factor authentication for online banking login by adding a secret question step before transactions. This would help filter out unauthorized users at the login phase before they can access transactions. The system would use time-based one-time passwords and secret questions that only the real user can answer to authenticate users in a secure manner. The integration of these components is expected to significantly improve online banking security.
IRJET - A Survey Paper on Secure Digital PaymentIRJET Journal
This document summarizes several research papers on providing security for digital payment systems. It discusses using digital tokens along with blockchain technology to protect personal and account details. It also reviews using RFID technology and mobile phones for authentication instead of security tokens. Blind signatures with blockchain are proposed to build a private reputation system. Overall, the literature survey analyzes different approaches for building secure transaction applications.
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
In the current internet technology, most of the transactions to banking system are effective through online transaction. Predominantly all these e-transactions are done through e-commerce web sites with the help of credit/debit cards, net banking and lot of other payable apps. So, every online transaction is prone to vulnerable attacks by the fraudulent websites and intruders in the network. As there are many security measures incorporated against security vulnerabilities, network thieves are smart enough to retrieve the passwords and break other security mechanisms. At present situation of digital world, we need to design a secured online transaction system for banking using multilevel encryption of blowfish and AES algorithms incorporated with dual OTP technique. The performance of the proposed methodology is analyzed with respect to number of bytes encrypted per unit time and we conclude that the multilevel encryption provides better security system with faster encryption standards than the ones that are currently in use.
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
This document discusses an approach for continuous and transparent user identification for secure web services using biometrics. It proposes a framework called CASHMA (Context-Aware Security by Hierarchical Multilevel Architecture) that uses multi-modal biometrics for continuous authentication. CASHMA authenticates users using biometric traits instead of usernames and passwords, and periodically re-authenticates users during a session to ensure security. The document describes how CASHMA works, including how it issues authentication certificates to validate user identity on an ongoing basis and adaptively sets session timeouts. It concludes that CASHMA enhances security and usability for user sessions through continuous multi-modal biometric authentication and verification.
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
This document proposes a method for anonymous and authentic data sharing with enhanced key security using identity-based ring signatures. It discusses how identity-based cryptography eliminates the need for public key certificates and the associated validation process. The proposed method uses identity-based ring signatures to allow a third party auditor to privately validate shared data in the cloud while maintaining signer anonymity. It also enhances security by providing forward security, meaning previously generated signatures remain valid even if a signer's private key is compromised in the future. This property is important for large-scale data sharing systems.
IRJET- Phishing Attack based on Visual CryptographyIRJET Journal
This document proposes a novel anti-phishing framework based on visual cryptography to address the problem of phishing. It involves using an image-based authentication with visual cryptography. When a user registers, an image captcha is selected and decomposed into two shares - one stored with the user and one with the server. This prevents either party from seeing the full captcha alone. When logging in, the shares are combined to reveal the original captcha image for the user to enter as a password. This allows the user to verify the authenticity of the website before entering credentials, protecting against phishing attacks. The proposed system aims to improve online security for tasks like corporate elections that currently require in-person voting.
This document discusses using blockchain technology to improve the insurance industry. It describes how blockchain could automate the insurance process through smart contracts, removing human errors and fraud. Smart contracts would encode the agreed terms between insurer and insured to automatically process claims and payments. The blockchain would provide a secure, distributed ledger to verify transactions and identities, making the system more transparent and trustworthy. This could reduce expenses from fraudulent claims by 15-25% and save the insurance industry $5-10 billion annually. The document outlines the basic hardware, software and methodology needed to create a prototype blockchain-based insurance system using Ethereum and Solidity.
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
This document summarizes a research paper that proposes a new security method for internet banking transactions using graphical secret codes. The proposed method generates a unique ID for each currency unit during a transaction to allow tracking of currency movement. It uses encryption, pixel identification and multiple authentication factors for secure login. This provides improved security over traditional password-based authentication by making transactions and login credentials more difficult to steal or guess. The method aims to reduce fraud, hacking vulnerabilities and the spread of untaxed "black money".
IRJET- Enhancement in Netbanking SecurityIRJET Journal
This document discusses enhancing security for online banking. It describes some existing security issues with online banking such as passwords being vulnerable to attacks like phishing. The proposed system aims to provide two-factor authentication for online banking login by adding a secret question step before transactions. This would help filter out unauthorized users at the login phase before they can access transactions. The system would use time-based one-time passwords and secret questions that only the real user can answer to authenticate users in a secure manner. The integration of these components is expected to significantly improve online banking security.
IRJET - A Survey Paper on Secure Digital PaymentIRJET Journal
This document summarizes several research papers on providing security for digital payment systems. It discusses using digital tokens along with blockchain technology to protect personal and account details. It also reviews using RFID technology and mobile phones for authentication instead of security tokens. Blind signatures with blockchain are proposed to build a private reputation system. Overall, the literature survey analyzes different approaches for building secure transaction applications.
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
In the current internet technology, most of the transactions to banking system are effective through online transaction. Predominantly all these e-transactions are done through e-commerce web sites with the help of credit/debit cards, net banking and lot of other payable apps. So, every online transaction is prone to vulnerable attacks by the fraudulent websites and intruders in the network. As there are many security measures incorporated against security vulnerabilities, network thieves are smart enough to retrieve the passwords and break other security mechanisms. At present situation of digital world, we need to design a secured online transaction system for banking using multilevel encryption of blowfish and AES algorithms incorporated with dual OTP technique. The performance of the proposed methodology is analyzed with respect to number of bytes encrypted per unit time and we conclude that the multilevel encryption provides better security system with faster encryption standards than the ones that are currently in use.
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
This document discusses an approach for continuous and transparent user identification for secure web services using biometrics. It proposes a framework called CASHMA (Context-Aware Security by Hierarchical Multilevel Architecture) that uses multi-modal biometrics for continuous authentication. CASHMA authenticates users using biometric traits instead of usernames and passwords, and periodically re-authenticates users during a session to ensure security. The document describes how CASHMA works, including how it issues authentication certificates to validate user identity on an ongoing basis and adaptively sets session timeouts. It concludes that CASHMA enhances security and usability for user sessions through continuous multi-modal biometric authentication and verification.
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key SecurityIRJET Journal
This document proposes a method for anonymous and authentic data sharing with enhanced key security using identity-based ring signatures. It discusses how identity-based cryptography eliminates the need for public key certificates and the associated validation process. The proposed method uses identity-based ring signatures to allow a third party auditor to privately validate shared data in the cloud while maintaining signer anonymity. It also enhances security by providing forward security, meaning previously generated signatures remain valid even if a signer's private key is compromised in the future. This property is important for large-scale data sharing systems.
IRJET- Phishing Attack based on Visual CryptographyIRJET Journal
This document proposes a novel anti-phishing framework based on visual cryptography to address the problem of phishing. It involves using an image-based authentication with visual cryptography. When a user registers, an image captcha is selected and decomposed into two shares - one stored with the user and one with the server. This prevents either party from seeing the full captcha alone. When logging in, the shares are combined to reveal the original captcha image for the user to enter as a password. This allows the user to verify the authenticity of the website before entering credentials, protecting against phishing attacks. The proposed system aims to improve online security for tasks like corporate elections that currently require in-person voting.
This document discusses using blockchain technology to improve the insurance industry. It describes how blockchain could automate the insurance process through smart contracts, removing human errors and fraud. Smart contracts would encode the agreed terms between insurer and insured to automatically process claims and payments. The blockchain would provide a secure, distributed ledger to verify transactions and identities, making the system more transparent and trustworthy. This could reduce expenses from fraudulent claims by 15-25% and save the insurance industry $5-10 billion annually. The document outlines the basic hardware, software and methodology needed to create a prototype blockchain-based insurance system using Ethereum and Solidity.
IRJET- Crypto-Currencies How Secure are they?IRJET Journal
This document discusses the security of cryptocurrencies. It begins by defining cryptocurrency and explaining how cryptocurrency transactions work using blockchain technology. It then discusses some of the key properties of cryptocurrencies like irreversibility, pseudonymity, and controlled supply. The document outlines some benefits of cryptocurrencies like lack of third party seizure and anonymity, but also challenges like high energy usage and possibility of lost wallets. It then discusses some specific security issues with blockchain like its complexity, size of the network, and traditional scams. It concludes by covering security issues with cryptocurrencies like spoofing payment information, errors in user addresses, and loss of wallet files.
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
This document discusses various multi-factor authentication methods including smart cards, graphical passwords, risk assessment, mobile phone tokens, GPS location and timestamp, hand vein recognition, DNA recognition, and biometric authentication. It provides details on how each method works and evaluates factors like universality, uniqueness, collectability, performance and acceptability for multi-factor authentication. The document aims to review different technical approaches to implement multi-factor authentication for secure user identification.
This document summarizes a research paper on M-Pass, a proposed user authentication protocol that aims to prevent password stealing and reuse attacks. M-Pass leverages cell phones and SMS to authenticate users on untrusted devices without requiring them to enter passwords. It involves a registration phase where users register with a website and encrypt a password with their phone number. For login, users provide their username and long-term phone password, and the website generates a one-time password using a secret credential. The protocol aims to eliminate the need to remember multiple passwords by using the phone for authentication across websites. Evaluation shows registration and login times average around 4 and 3.5 minutes respectively. The researchers conclude M-Pass can prevent password stealing and reuse
1. The document analyzes the risks of using SMS-based two-factor authentication for user authentication and transaction authentication.
2. It outlines threats including eavesdropping, man-in-the-middle attacks, SMS delays and losses, lack of coverage, and increasing costs.
3. The document recommends using message authentication codes instead of random numbers or hashes for signatures to protect against attacks. It also suggests verifying transaction data is unchanged when signatures are submitted.
Two-factor authentication provides a more secure method of authentication than simple passwords alone. It adds a second factor of authentication, such as a one-time password (OTP) generated on a user's device, in addition to a username and password. The white paper explores how OTPs delivered via software or text message can provide two-factor authentication without hardware tokens. It also discusses standards-based OTP generation algorithms and integrating two-factor authentication with remote access systems.
IRJET - Securing Aadhaar Details using BlockchainIRJET Journal
This document discusses securing Aadhaar details in India using blockchain technology. It proposes storing Aadhaar data across hundreds of computers in a distributed manner on the blockchain. User data would be encrypted using hashing algorithms before being stored in blocks across nodes. Only authenticated hash codes could be shared for verification. Ethereum smart contracts would ensure restricted access and prevent unauthorized access to personal information. The blockchain-based system would solve security and privacy issues with Aadhaar by making data tamper-proof and restricting what information is accessible. This would increase citizen confidence in the security of their Aadhaar data.
Instant Messaging is a form of real-time communication between users online. It allows users to see if contacts are available and chat with them instantly. While early instant messaging predated the internet on multi-user systems in the 1960s, it grew popular in the 1990s following predecessors like internet relay chat and multi-user dungeons. Instant messaging uses a client-server model where clients communicate with a server to locate other users and exchange encrypted messages. While useful for social and work communication, instant messaging poses security risks if not properly configured within an organization.
IRJET - Securing Communication among IoT Devices using Blockchain ProxyIRJET Journal
This document proposes a blockchain proxy scheme to secure communication among IoT devices. The proxy requires a slim SDK on IoT devices to connect them to the blockchain while retaining full control over transactions. The proxy offloads communication tasks to save CPU and bandwidth for IoT devices. A preliminary implementation on Hyperledger Fabric shows potential savings. The proposed system uses a custom blockchain and smart contracts to analyze performance and security when IoT data is shared using this proxy scheme.
This document proposes a system for multi-factor authentication using one-time passwords (OTPs) generated on a user's mobile device without needing an internet or SMS connection. The system would work by registering user devices based on identifiers like IMEI and IMSI numbers. During login, the server would send random index variables to the mobile app to generate an OTP using those values, a secret seed derived from the device identifiers, and cryptographic hashing functions. If the server-generated and mobile app-generated OTPs match, access would be granted. This approach aims to securely generate OTPs offline to strengthen authentication without relying on SMS or internet connections.
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
This document proposes a passwordless authentication system using unique identification tokens. It discusses the limitations of traditional password-based authentication systems, including susceptibility to phishing and users reusing passwords across multiple accounts. The proposed system would generate a unique token during authentication on the server-side rather than requiring the user to store and enter multiple passwords. This token would be included in the authorization header for authentication to protected routes on the server. The system aims to provide a more secure and usable authentication method compared to existing password-based systems.
This document discusses various authentication techniques for web applications and their security issues. It provides an overview of traditional techniques like HTTP Basic authentication and digest authentication. It also covers Windows integrated authentication, structure-based authentication and CAPTCHAs. The document conducts a literature review of previous work analyzing authentication methods and security challenges. It then discusses the JSON web token authentication scheme as an improvement over older techniques that addresses issues like scalability and third party access.
This document proposes IASL, an image-based authentication system that uses CAPTCHAs (tests to distinguish humans from computers) as graphical passwords. IASL addresses security issues with traditional text passwords by requiring users to click on points in a sequence of CAPTCHA images during login. It protects against online dictionary attacks since each login requires solving a new CAPTCHA. The document discusses recognition-based and text-based IASL schemes, and explains that IASL offers protection against guessing, shoulder surfing, and relay attacks by using computationally difficult CAPTCHAs that change for each login attempt.
Two factor authentication-in_your_network_e_guideNick Owen
This document provides instructions for adding two-factor authentication to a corporate network using WiKID as the authentication server. It discusses configuring Radius clients like VPNs from Cisco and Juniper to communicate with an Active Directory server through a Radius server. The Active Directory server would authorize users while the WiKID server authenticates users with two-factor authentication. It provides step-by-step examples of configuring Network Policy Server and WiKID to enable two-factor authentication for remote access to a corporate network.
Smart-Authentication: A secure web service for providing bus pass renewal systemIRJET Journal
The document describes a secure bus pass renewal system called Smart-Authentication that uses camera-based two-factor authentication to counter password attacks. It uses a mobile device's camera to scan a QR code sent to both the user's computer and phone to log into a web-based bus pass renewal system. The system aims to provide a more convenient online renewal process while improving security through public-key cryptography and preventing man-in-the-middle and phishing attacks. A prototype was implemented with an Android app, browser extension, and Java web server to demonstrate the feasibility and usability of the camera-based authentication scheme.
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDIJNSA Journal
In a distributed system, authentication protocols are the basis of security to ensure that these protocols function properly. Passwords are one of the most common authentication protocol used nowadays. Because of low entropy of passwords makes the systems vulnerable to password guessing attacks. This paper presents a simple scheme that strengthens password-based authentication protocols and helps prevent dictionary attacks, replay attacks and man in the middle attacks etc., The proposed scheme presents a new password authentication protocol by using the user and server system identification/serial number. Here there is no possibility to store the user passwords so an attacker who gets the password cannot use it directly to gain immediate access and compromise security.
This document discusses several topics related to cyber security including:
1. Windows security features such as User Account Control, BitLocker Drive Encryption, and Windows Firewall.
2. Network security challenges such as verifying user identity, protecting against DDoS attacks, and securing web applications.
3. Limitations of today's security solutions and how the modern workplace has increased risks from factors like telecommuting and use of mobile devices.
4. Types of internet security protocols and cryptography techniques as well as common forms of malicious software like viruses, worms, and trojan horses.
A secure communication in smart phones using two factor authenticationseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Cryptomathic white paper 2fa for bankingHai Nguyen
This document provides an overview of two-factor authentication for banking, including: threats to internet banking like phishing; a range of authentication methods like hardware tokens, SMS codes, and smart cards; and factors to consider in the business case for deployment like customer acceptance, confidence, and cost savings. It aims to help financial institutions understand opportunities for security, business growth, and reduced costs through two-factor authentication.
This document discusses two-factor authentication and its importance for securing PHIN systems. It analyzes different two-factor authentication methods like digital certificates, one-time passwords, and biometrics. Digital certificates support open standards and interoperability for automated B2B authentication and messaging. One-time passwords provide mobility but require digital certificates for server authentication. The document proposes two approaches: Approach A uses passwords and client certificates for users and Approach B uses key-fobs for users but requires managing two infrastructures. It concludes by emphasizing strong authentication, authorization, and identity management for perimeter security.
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
Identity and authentication management, or IAM, represents the greatest security return on investment an organization can make. Former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States, Richard Clarke, once famously said, "If you spend more on coffee than on IT security, then you will be hacked." Many analysts concur that spending on strong authentication provides the greatest security return on investment. This educational white paper, written by Richard Stiennon, Chief Research Analyst at IT-Harvest and Executive Editor of securitycurrent, explores the concept of identity platforms.
• How to fix intrinsic weaknesses in authentication regimes that result in gaping and trivially exploitable vulnerabilities
• Explore the core features of an authentication and identity platform
• Examine specific features and components organizations should require in a software authentication platform
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.IRJET Journal
This document proposes an OCR detection and biometric authenticated credit card payment system. It aims to simplify online transactions by using fingerprint authentication and OCR to detect credit/debit card details from images, reducing the multi-step verification process to a single step. The system utilizes convolutional neural networks for OCR and fingerprint authentication via web authentication standards. It analyzes the architecture and implementation steps for OCR detection and fingerprint verification. The document concludes the proposed system could increase security for credit card companies and help reduce online transaction fraud.
IRJET- A Mobile Payment System Based on Face RecognitionIRJET Journal
This document proposes a new mobile payment framework based on face recognition. It aims to improve security over existing frameworks by using biological characteristics like facial features to verify a user's identity. The framework would use face detection and feature extraction techniques like 2D-PCA to analyze a user's face image during payment. It also incorporates a third party to authenticate transactions. The proposed system is described as having high security and efficiency while still working to improve accuracy under different lighting conditions.
IRJET- Crypto-Currencies How Secure are they?IRJET Journal
This document discusses the security of cryptocurrencies. It begins by defining cryptocurrency and explaining how cryptocurrency transactions work using blockchain technology. It then discusses some of the key properties of cryptocurrencies like irreversibility, pseudonymity, and controlled supply. The document outlines some benefits of cryptocurrencies like lack of third party seizure and anonymity, but also challenges like high energy usage and possibility of lost wallets. It then discusses some specific security issues with blockchain like its complexity, size of the network, and traditional scams. It concludes by covering security issues with cryptocurrencies like spoofing payment information, errors in user addresses, and loss of wallet files.
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
This document discusses various multi-factor authentication methods including smart cards, graphical passwords, risk assessment, mobile phone tokens, GPS location and timestamp, hand vein recognition, DNA recognition, and biometric authentication. It provides details on how each method works and evaluates factors like universality, uniqueness, collectability, performance and acceptability for multi-factor authentication. The document aims to review different technical approaches to implement multi-factor authentication for secure user identification.
This document summarizes a research paper on M-Pass, a proposed user authentication protocol that aims to prevent password stealing and reuse attacks. M-Pass leverages cell phones and SMS to authenticate users on untrusted devices without requiring them to enter passwords. It involves a registration phase where users register with a website and encrypt a password with their phone number. For login, users provide their username and long-term phone password, and the website generates a one-time password using a secret credential. The protocol aims to eliminate the need to remember multiple passwords by using the phone for authentication across websites. Evaluation shows registration and login times average around 4 and 3.5 minutes respectively. The researchers conclude M-Pass can prevent password stealing and reuse
1. The document analyzes the risks of using SMS-based two-factor authentication for user authentication and transaction authentication.
2. It outlines threats including eavesdropping, man-in-the-middle attacks, SMS delays and losses, lack of coverage, and increasing costs.
3. The document recommends using message authentication codes instead of random numbers or hashes for signatures to protect against attacks. It also suggests verifying transaction data is unchanged when signatures are submitted.
Two-factor authentication provides a more secure method of authentication than simple passwords alone. It adds a second factor of authentication, such as a one-time password (OTP) generated on a user's device, in addition to a username and password. The white paper explores how OTPs delivered via software or text message can provide two-factor authentication without hardware tokens. It also discusses standards-based OTP generation algorithms and integrating two-factor authentication with remote access systems.
IRJET - Securing Aadhaar Details using BlockchainIRJET Journal
This document discusses securing Aadhaar details in India using blockchain technology. It proposes storing Aadhaar data across hundreds of computers in a distributed manner on the blockchain. User data would be encrypted using hashing algorithms before being stored in blocks across nodes. Only authenticated hash codes could be shared for verification. Ethereum smart contracts would ensure restricted access and prevent unauthorized access to personal information. The blockchain-based system would solve security and privacy issues with Aadhaar by making data tamper-proof and restricting what information is accessible. This would increase citizen confidence in the security of their Aadhaar data.
Instant Messaging is a form of real-time communication between users online. It allows users to see if contacts are available and chat with them instantly. While early instant messaging predated the internet on multi-user systems in the 1960s, it grew popular in the 1990s following predecessors like internet relay chat and multi-user dungeons. Instant messaging uses a client-server model where clients communicate with a server to locate other users and exchange encrypted messages. While useful for social and work communication, instant messaging poses security risks if not properly configured within an organization.
IRJET - Securing Communication among IoT Devices using Blockchain ProxyIRJET Journal
This document proposes a blockchain proxy scheme to secure communication among IoT devices. The proxy requires a slim SDK on IoT devices to connect them to the blockchain while retaining full control over transactions. The proxy offloads communication tasks to save CPU and bandwidth for IoT devices. A preliminary implementation on Hyperledger Fabric shows potential savings. The proposed system uses a custom blockchain and smart contracts to analyze performance and security when IoT data is shared using this proxy scheme.
This document proposes a system for multi-factor authentication using one-time passwords (OTPs) generated on a user's mobile device without needing an internet or SMS connection. The system would work by registering user devices based on identifiers like IMEI and IMSI numbers. During login, the server would send random index variables to the mobile app to generate an OTP using those values, a secret seed derived from the device identifiers, and cryptographic hashing functions. If the server-generated and mobile app-generated OTPs match, access would be granted. This approach aims to securely generate OTPs offline to strengthen authentication without relying on SMS or internet connections.
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
This document proposes a passwordless authentication system using unique identification tokens. It discusses the limitations of traditional password-based authentication systems, including susceptibility to phishing and users reusing passwords across multiple accounts. The proposed system would generate a unique token during authentication on the server-side rather than requiring the user to store and enter multiple passwords. This token would be included in the authorization header for authentication to protected routes on the server. The system aims to provide a more secure and usable authentication method compared to existing password-based systems.
This document discusses various authentication techniques for web applications and their security issues. It provides an overview of traditional techniques like HTTP Basic authentication and digest authentication. It also covers Windows integrated authentication, structure-based authentication and CAPTCHAs. The document conducts a literature review of previous work analyzing authentication methods and security challenges. It then discusses the JSON web token authentication scheme as an improvement over older techniques that addresses issues like scalability and third party access.
This document proposes IASL, an image-based authentication system that uses CAPTCHAs (tests to distinguish humans from computers) as graphical passwords. IASL addresses security issues with traditional text passwords by requiring users to click on points in a sequence of CAPTCHA images during login. It protects against online dictionary attacks since each login requires solving a new CAPTCHA. The document discusses recognition-based and text-based IASL schemes, and explains that IASL offers protection against guessing, shoulder surfing, and relay attacks by using computationally difficult CAPTCHAs that change for each login attempt.
Two factor authentication-in_your_network_e_guideNick Owen
This document provides instructions for adding two-factor authentication to a corporate network using WiKID as the authentication server. It discusses configuring Radius clients like VPNs from Cisco and Juniper to communicate with an Active Directory server through a Radius server. The Active Directory server would authorize users while the WiKID server authenticates users with two-factor authentication. It provides step-by-step examples of configuring Network Policy Server and WiKID to enable two-factor authentication for remote access to a corporate network.
Smart-Authentication: A secure web service for providing bus pass renewal systemIRJET Journal
The document describes a secure bus pass renewal system called Smart-Authentication that uses camera-based two-factor authentication to counter password attacks. It uses a mobile device's camera to scan a QR code sent to both the user's computer and phone to log into a web-based bus pass renewal system. The system aims to provide a more convenient online renewal process while improving security through public-key cryptography and preventing man-in-the-middle and phishing attacks. A prototype was implemented with an Android app, browser extension, and Java web server to demonstrate the feasibility and usability of the camera-based authentication scheme.
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDIJNSA Journal
In a distributed system, authentication protocols are the basis of security to ensure that these protocols function properly. Passwords are one of the most common authentication protocol used nowadays. Because of low entropy of passwords makes the systems vulnerable to password guessing attacks. This paper presents a simple scheme that strengthens password-based authentication protocols and helps prevent dictionary attacks, replay attacks and man in the middle attacks etc., The proposed scheme presents a new password authentication protocol by using the user and server system identification/serial number. Here there is no possibility to store the user passwords so an attacker who gets the password cannot use it directly to gain immediate access and compromise security.
This document discusses several topics related to cyber security including:
1. Windows security features such as User Account Control, BitLocker Drive Encryption, and Windows Firewall.
2. Network security challenges such as verifying user identity, protecting against DDoS attacks, and securing web applications.
3. Limitations of today's security solutions and how the modern workplace has increased risks from factors like telecommuting and use of mobile devices.
4. Types of internet security protocols and cryptography techniques as well as common forms of malicious software like viruses, worms, and trojan horses.
A secure communication in smart phones using two factor authenticationseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Cryptomathic white paper 2fa for bankingHai Nguyen
This document provides an overview of two-factor authentication for banking, including: threats to internet banking like phishing; a range of authentication methods like hardware tokens, SMS codes, and smart cards; and factors to consider in the business case for deployment like customer acceptance, confidence, and cost savings. It aims to help financial institutions understand opportunities for security, business growth, and reduced costs through two-factor authentication.
This document discusses two-factor authentication and its importance for securing PHIN systems. It analyzes different two-factor authentication methods like digital certificates, one-time passwords, and biometrics. Digital certificates support open standards and interoperability for automated B2B authentication and messaging. One-time passwords provide mobility but require digital certificates for server authentication. The document proposes two approaches: Approach A uses passwords and client certificates for users and Approach B uses key-fobs for users but requires managing two infrastructures. It concludes by emphasizing strong authentication, authorization, and identity management for perimeter security.
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
Identity and authentication management, or IAM, represents the greatest security return on investment an organization can make. Former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States, Richard Clarke, once famously said, "If you spend more on coffee than on IT security, then you will be hacked." Many analysts concur that spending on strong authentication provides the greatest security return on investment. This educational white paper, written by Richard Stiennon, Chief Research Analyst at IT-Harvest and Executive Editor of securitycurrent, explores the concept of identity platforms.
• How to fix intrinsic weaknesses in authentication regimes that result in gaping and trivially exploitable vulnerabilities
• Explore the core features of an authentication and identity platform
• Examine specific features and components organizations should require in a software authentication platform
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.IRJET Journal
This document proposes an OCR detection and biometric authenticated credit card payment system. It aims to simplify online transactions by using fingerprint authentication and OCR to detect credit/debit card details from images, reducing the multi-step verification process to a single step. The system utilizes convolutional neural networks for OCR and fingerprint authentication via web authentication standards. It analyzes the architecture and implementation steps for OCR detection and fingerprint verification. The document concludes the proposed system could increase security for credit card companies and help reduce online transaction fraud.
IRJET- A Mobile Payment System Based on Face RecognitionIRJET Journal
This document proposes a new mobile payment framework based on face recognition. It aims to improve security over existing frameworks by using biological characteristics like facial features to verify a user's identity. The framework would use face detection and feature extraction techniques like 2D-PCA to analyze a user's face image during payment. It also incorporates a third party to authenticate transactions. The proposed system is described as having high security and efficiency while still working to improve accuracy under different lighting conditions.
E AUTHENICATION SYSTEM USING QR CODE AND OTPIRJET Journal
This document proposes an e-authentication system using QR codes and OTP (one-time passwords) for secure login. It discusses how QR codes containing login information and OTPs sent via SMS could provide multiple layers of security. The system aims to prevent hacking of login credentials, shoulder surfing attacks, and accidental logins. The document provides background on QR codes and OTPs, describes the proposed system and authentication process, reviews related work, and concludes the system allows for a simple yet secure login experience for users.
This document proposes a system for strengthening security for online banking transactions. It involves multi-level authentication including face recognition, graphical OTP authentication using a 4x4 grid of random numbers, and security questions. Users first register security images, a security pattern by selecting indexes on a 4x4 grid, answers to security questions, and their face is recorded. For login, the security images and username/password are verified. Transactions require face recognition if a webcam is available, otherwise graphical OTP authentication is used where the user selects numbers from the indexes of their security pattern on a randomly generated 4x4 grid. Additionally, two random security questions are asked before completing a transaction. The system aims to provide secure electronic transactions through this multi-factor
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
This document presents a proposed two-factor authentication system for banking using QR codes and mobile phones. The system aims to improve security over traditional username and password authentication. It would generate a unique QR code for each login attempt, encoding a random string along with user details like their IMEI number. Users would scan the QR code with their registered mobile phone, with the phone number and IMEI number validating their identity. If the network is available, the encoded string would automatically login the user. Otherwise, a one-time password would be displayed to manually enter. The system seeks to establish a secure authentication method using mobile phones as trusted devices to both display login QR codes and verify user identities.
Comparative Study of Blockchain based Verifiable CredentialsIRJET Journal
1) The document discusses self-sovereign identity (SSI) and blockchain-based verifiable credentials. SSI aims to give individuals control over their digital identity and credentials.
2) It reviews several papers on SSI approaches and specifications. Paper 1 discusses an implementation of revocable and offline-verifiable SSI. Paper 2 proposes specifications for evaluating SSI solutions. Paper 3 presents a formal treatment of SSI using a mathematical model.
3) The document compares different blockchain-based SSI models and their ability to provide user sovereignty over digital identity credentials while maintaining integrity. It finds that SSI has potential to empower users but technical challenges remain in ensuring revocability and offline verification.
This document discusses public key infrastructure (PKI) which supports the distribution and identification of public encryption keys to allow secure data exchange over networks. PKI allows users to confirm the identity of other parties they are exchanging data with. Without PKI, data can be encrypted but there is no guarantee of the identity of the other party. PKI consists of hardware, software, policies, administration and distribution of keys and digital certificates which bind identities to public keys.
IRJET- Secure Banking System using Block Chain TechnologyIRJET Journal
This document discusses using blockchain technology to improve security in the banking sector. It proposes a secure banking system using blockchain that stores transaction and account details in encrypted blocks linked together. Each block contains data, hash values, and the hash of the previous block, making it difficult for hackers to alter records. The system would use MD5 hashing for passwords and manage user identities, bank operations, and ensure transparency. Experimental results show how user details, transactions, and admin functions would work on the blockchain-based system. In conclusion, the document discusses how blockchain can strengthen security for financial records and monitoring.
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET Journal
This document describes a proposed cloud-based health monitoring system using IoT technology. The system uses various sensors to collect patient health data and transmit it securely to the cloud for storage and remote access by doctors. The key components of the system include sensors, a microcontroller, customized software, and cloud server infrastructure. The document discusses the system architecture, data authentication and security mechanisms like encryption that are used to securely transmit sensitive patient health data via the cloud. It proposes using a Real-Or-Random model and Elliptic Curve Cryptography algorithm to authenticate users and encrypt the data transmission between sensors and the cloud server.
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
This document proposes a multi-factor authentication security framework using blockchain for cloud computing. It discusses using one-time passwords and unique codes for login along with blockchain technology to securely store data in the cloud. The framework aims to improve security, securely share data online, and secure cloud data storage. It presents a system architecture with three modules - data owner, user, and authority - to allow data owners to securely upload files via blockchain that users can view and download with authentication.
Symmetric Key Encryption Decryption Technique Using Image Based Key GenerationIRJET Journal
This document proposes a symmetric key encryption and decryption technique using image-based key generation. It discusses using a one-time private key (OTPK) approach in the context of password authentication key exchange (PAKE) protocols to address security issues. The protocol aims to provide mutual authentication between two parties, agreement on a session key, and resistance to attacks. It further enhances security by generating strong session keys using an imaged-based true random number generation method.
The document reviews several existing PAKE protocols and their limitations. It then discusses using OTPK to destroy keys immediately after authentication and encryption/decryption to improve security. Literature on PAKE protocols using techniques like verifiable escrows, RSA-based signatures, and
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
The document discusses various security mechanisms for cloud computing including encryption, hashing, digital signatures, public key infrastructure, identity and access management, single sign-on, cloud-based security groups, hardened security server images, user behavior profiling, and decoy technology. It focuses on how user behavior profiling and decoy technology can play an important role in detecting unauthorized access by monitoring a user's behavior and sending fake data to verify genuine user information. The document concludes that while most security mechanisms provide a level of protection, user behavior profiling and decoy technology are particularly effective for enhancing cloud computing security.
This document discusses the advantages and disadvantages of e-commerce security. It begins by defining e-commerce security as protecting e-commerce assets from unauthorized access, modification, or deletion according to the CIA model of information security. While e-commerce provides benefits, the growth in its use also increases potential for security exploits and white collar crimes. Some key advantages discussed include flexibility of online payments and convenience for customers. However, fraud is a major risk that companies spend billions to mitigate. The document recommends several security best practices like using antivirus software, shopping at secure websites, using strong unique passwords, and reviewing orders carefully to reduce risks of e-commerce.
The document proposes a virtual password system to improve security for online banking transactions. In the proposed system, a mobile application is used to generate one-time virtual passwords based on a permanent PIN number and random number, removing the vulnerabilities of password delivery via SMS. This virtual password system aims to enhance security by making password guessing and hacking techniques like phishing and keylogging more difficult to exploit.
This document discusses the latest trends in cybersecurity, including increased use of machine learning and artificial intelligence to more effectively detect cyber threats. It also covers growing issues like ransomware attacks, the need for multi-factor authentication beyond passwords, and security challenges around cloud computing and the Internet of Things. Advantages of addressing these trends include better protecting networks and data from unauthorized access and vulnerabilities while enabling earlier threat detection. The conclusion emphasizes that new cybersecurity trends constantly emerge, so organizations must stay informed of developments to best secure themselves.
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET Journal
This document proposes an algorithm called ID-PUIC for remote data uploading and integrity checking in public clouds. It aims to address security issues when clients store sensitive data in public clouds, which they do not fully control. The proposed system uses a proxy to upload client data and perform remote integrity checks with the public cloud server. It introduces a protocol for the proxy to generate tags for file blocks and upload them along with the data for integrity verification. The ID-PUIC algorithm is more efficient for integrity checking than existing solutions as it ignores certificate management and uses bilinear pairings for security. The document outlines the system model, data flow, modules including key generation, tag generation and proofs to check integrity remotely between the client and public cloud server
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
This document discusses implementing multi-factor authentication for cloud services using handwritten signatures and passwords. It proposes a system that uses behavioral biometrics (signatures) collected on mobile devices along with standard passwords. The system shifts computational tasks to a cloud-based server, allowing for platform-independent, ubiquitous two-factor authentication. The system was tested on iOS and Android apps connected to the cloud server, achieving 98.4% accuracy in signature verification.
IRJET- Data Security with Multifactor AuthenticationIRJET Journal
This document discusses a multi-factor authentication system for improving data security. It proposes using passwords, one-time passwords via QR codes, and encryption/decryption of stored data. The system uses three stages of verification: login with username and password, verification with a randomly generated OTP QR code, and encrypting uploaded data and decrypting downloaded data with keys. By adding multiple layers of authentication and encrypting data, the system aims to minimize unauthorized access to secure systems and stored information.
This document proposes a blockchain-based solution for Know Your Customer (KYC) verification that allows for a single verification and shared database across financial institutions. The solution aims to address issues with the traditional KYC process being manual, time-consuming, requiring third-party involvement, and resulting in redundant checks across institutions. The proposed system performs a one-time KYC verification and stores information securely on a blockchain database. Then, with user permission, other financial institutions on the network can access the user's KYC information. This eliminates redundant verifications and saves time, while also giving users control over their personal data.
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
This document describes a proposed system for enhancing authentication security for banking transactions through the use of graphical passwords. The system uses a two-step verification process, with pass-point authentication to validate the user during login by requiring them to click on a sequence of points on an image. For transactions, a color palette technique is used where the user must enter a pin number by selecting the corresponding color pairs. The system aims to improve security over traditional text passwords and prevent fraud by automatically filing a complaint if unauthorized access is detected and notifying the user via mobile if a transaction is halted.
Similar to Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.