Many of the networks are existing but little of them that believe the quality and security together, the secure transmission of the information with high quality remains the primary goal of all engineers, which is considered the ideal goal of this theory either in fact, get a high quality of service comes at the expense of security and vice versa, has been expressed networks fiber optic for the best possible speed while maintaining a good level of security. In the Internet network, person-to-person communication can be enhanced with high quality images and videos, and access to information and services on public and private networks will be enhanced by higher data rates, quality of service (QoS), security measures, location-awareness, energy efficiency, and new flexible communication capabilities. So some networks are characterized by the QOS offered in addition to the security that we will discuss extensively later. This distinction is linked to the quality of communication and service over the network and security[1]. The quality of a network is evaluated on the basis of the quality of service, and especially on its security features. The use of security mechanisms is important in knowing the identity, saving the information, and ensuring that there is no tampering.in this research we try to ensure the security for QoS with two different methods using the Tunnel like the L2TP and IPSec that mean the security of layer two and three of OSI model, and we compared the differential impact between the two types of security on QoS parameters.
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLIJNSA Journal
Protocol and technology convergence, the core of near future communication, will soon be forming the interoperating heterogeneous networks. Attaining a strict secure authentication without risking the QoS performance and call success rates is a major concern when it comes to wireless heterogeneous
networks. In order to achieve this, a generic, fast and secure, Authentication and Key Agreement protocol is to be used; a version of which is to be implemented between each two technologies. In this research, different existing EPS-EPS AKA protocols will be compared with our proposed protocol EC-AKA
(Ensure Confidentiality Authentication and Key Agreement) based on security, cost effectiveness, signaling overhead, delay and performance. It is proven that EC-AKA is the exclusive protocol satisfying the New Generation Network’s KPIs and it will be promoted as the target generic AKA protocol in
heterogeneous networks.
An efficient approach for secured communication in wireless sensor networks IJECEIAES
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
4.report (cryptography & computer network)JIEMS Akkalkuwa
This document discusses network security and cryptography. It begins by defining network security and explaining the key areas of secrecy, authentication, non-repudiation, and integrity control. It then discusses what cryptography is, explaining that it uses mathematics to encrypt and decrypt data to provide security. The document provides an overview of symmetric and asymmetric key encryption techniques as well as hash functions. It also discusses some existing network security systems and their use of symmetric encryption with periodic key distribution and refresh.
Security Model for Hierarchical Clustered Wireless Sensor NetworksCSCJournals
The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during the routing protocol design phase is the main focus of this paper. The proposed security framework viz. ‘Secure and Hierarchical, a Routing Protocol’ (SHARP) is designed for the wireless sensor network applications which is deployed particularly for data collection purpose in a battlefield where the security aspect of the network cannot be compromised at any cost. SHARP consists of three basic integrated modules and each module performs a well defined task to make the whole security framework a complete system on its own.
Enhanced Authentication Mechanism in WLAN via MMBSPSRAJESH DUVVURU
The ability to provide a Quality of Service (QoS) is one of the
challenging aspects of any Wireless Network. This paper
concentrates in improvising the speedy authentication
mechanism in Wireless Local Area Network (WLAN). To
fulfill the specified important issue, this work introduces a
novel Multi Merged Bio-Cryptographic Security-Aware
Packet Scheduling (MMBSPS) algorithm. In merging the
different biometric images, it is commenced with the new
merging mechanism called Triple Equally Segmented Bio-
Image (TESB) algorithm and later it is encrypted with the
RSA algorithm for efficient security. Matlab tool is used for
conducting the simulations on Multi Merged Bio-Images
(MMBI) and Bio-Images. The results of MMBSPS algorithm
is presented in contrast with the EMBSPS and EBSPS
algorithms. In the results, it is observed that, MMBSPS
algorithm is working better than existing EMBSPS and
EBSPS algorithms with respect to the speedy authentication
besides assuring security in WLAN. It is also observed the
overall performance of MMBSPS is improved by
approximately 23% in terms of authentication mechanism in
WLAN.
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...IJECEIAES
Security problems in Wireless Sensor Network (WSN) have been researched from more than a decade. There are various security approaches being evolving towards resisting various forms of attack using different methodologies. After reviewing the existing security approaches, it can be concluded that such security approaches are highly attack-specific and doesnt address various associated issues in WSN. It is essential for security approach to be computationally lightweight. Therefore, this paper presents a novel analytical modelling that is based on n-tier approach with a target to generate an optimized secret key that could ensure higher degree of security during the process of data aggregation in WSN. The study outcome shows that proposed system is computationally lightweight with good performance on reduced delay and reduced energy consumption. It also exhibits enhanced response time and good data delivery performance to balance the need of security and data forwarding performance in WSN.
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...IJECEIAES
An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process.
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Tương Hoàng
This document is the master's thesis of Nadeem Ahmad and M. Kashif Habib submitted to Blekinge Institute of Technology. The thesis analyzes network security threats and vulnerabilities and develops a network security monitoring solution. It contains chapters on networks and protocols, security threats and attacks, countermeasures techniques and tools, security solutions, and simulation/testing results. The abstract indicates it will address questions about network security implementation and management and give an idea of the current state of network security.
SECURITY V/S QOS FOR LTE AUTHENTICATION AND KEY AGREEMENT PROTOCOLIJNSA Journal
Protocol and technology convergence, the core of near future communication, will soon be forming the interoperating heterogeneous networks. Attaining a strict secure authentication without risking the QoS performance and call success rates is a major concern when it comes to wireless heterogeneous
networks. In order to achieve this, a generic, fast and secure, Authentication and Key Agreement protocol is to be used; a version of which is to be implemented between each two technologies. In this research, different existing EPS-EPS AKA protocols will be compared with our proposed protocol EC-AKA
(Ensure Confidentiality Authentication and Key Agreement) based on security, cost effectiveness, signaling overhead, delay and performance. It is proven that EC-AKA is the exclusive protocol satisfying the New Generation Network’s KPIs and it will be promoted as the target generic AKA protocol in
heterogeneous networks.
An efficient approach for secured communication in wireless sensor networks IJECEIAES
Wireless sensor network (WSN) have limited bandwidth, low computational functions, energy constraints. Inspite of these constraints, WSN is useful where communication happens without infrastructure support. The main concern of WSN is the security as the sensor nodes may be attacked and information may be hacked. Security of WSN should have the capability to ensure that the message received was sent by the particular sent node and not modified during transmission. WSN applications require lightweight and strong authentication mechanisms for obtaining data from unprivileged users. In wireless sensor networks, authentication is the effective method to stop unauthorized and undisrupted communication service. In order to strengthen the authenticated communication, several researchers have developed mechanisms. Some of the techniques work with identifying the attacked node or detecting injected bogus message in the network. Encryption and decryption are the popular methods of providing the security. These are based on either public-key or symmetric-key cryptosystems.Many of the existing solutions have limitations in communication and computational expertise. Also, the existing mechanisms lack in providing strength and scalability of the network. In order address these issues; a polynomial based method was introduced in recent days. Key distribution is a significant aspect in key management in WSNs. The simplest method of distribution of key is by hand which was used in the days of couriers. Now a day, most distribution of keys is done automatically. The automatic distribution of keys is essential and convenient in networks that require two parties to transmit their security keys in the same communication medium. In this work, a new type of key exchange mechanism is proposed. The proposed method for authentication among sensor nodes proves to be promising as per the simulation results. The nodes which are unknown to each other setup a private however arbitrary key for the symmetric key cryptosystem.
4.report (cryptography & computer network)JIEMS Akkalkuwa
This document discusses network security and cryptography. It begins by defining network security and explaining the key areas of secrecy, authentication, non-repudiation, and integrity control. It then discusses what cryptography is, explaining that it uses mathematics to encrypt and decrypt data to provide security. The document provides an overview of symmetric and asymmetric key encryption techniques as well as hash functions. It also discusses some existing network security systems and their use of symmetric encryption with periodic key distribution and refresh.
Security Model for Hierarchical Clustered Wireless Sensor NetworksCSCJournals
The proposed security system for the Wireless Sensor Network (WSN) is based on the WSN security design goal that ‘to design a completely secure WSN, security must be integrated into every node of the system’. This paper discusses on two main components of the security framework viz. the secure key management module and the secure routing scheme. The incorporation of security mechanism during the routing protocol design phase is the main focus of this paper. The proposed security framework viz. ‘Secure and Hierarchical, a Routing Protocol’ (SHARP) is designed for the wireless sensor network applications which is deployed particularly for data collection purpose in a battlefield where the security aspect of the network cannot be compromised at any cost. SHARP consists of three basic integrated modules and each module performs a well defined task to make the whole security framework a complete system on its own.
Enhanced Authentication Mechanism in WLAN via MMBSPSRAJESH DUVVURU
The ability to provide a Quality of Service (QoS) is one of the
challenging aspects of any Wireless Network. This paper
concentrates in improvising the speedy authentication
mechanism in Wireless Local Area Network (WLAN). To
fulfill the specified important issue, this work introduces a
novel Multi Merged Bio-Cryptographic Security-Aware
Packet Scheduling (MMBSPS) algorithm. In merging the
different biometric images, it is commenced with the new
merging mechanism called Triple Equally Segmented Bio-
Image (TESB) algorithm and later it is encrypted with the
RSA algorithm for efficient security. Matlab tool is used for
conducting the simulations on Multi Merged Bio-Images
(MMBI) and Bio-Images. The results of MMBSPS algorithm
is presented in contrast with the EMBSPS and EBSPS
algorithms. In the results, it is observed that, MMBSPS
algorithm is working better than existing EMBSPS and
EBSPS algorithms with respect to the speedy authentication
besides assuring security in WLAN. It is also observed the
overall performance of MMBSPS is improved by
approximately 23% in terms of authentication mechanism in
WLAN.
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...IJECEIAES
Security problems in Wireless Sensor Network (WSN) have been researched from more than a decade. There are various security approaches being evolving towards resisting various forms of attack using different methodologies. After reviewing the existing security approaches, it can be concluded that such security approaches are highly attack-specific and doesnt address various associated issues in WSN. It is essential for security approach to be computationally lightweight. Therefore, this paper presents a novel analytical modelling that is based on n-tier approach with a target to generate an optimized secret key that could ensure higher degree of security during the process of data aggregation in WSN. The study outcome shows that proposed system is computationally lightweight with good performance on reduced delay and reduced energy consumption. It also exhibits enhanced response time and good data delivery performance to balance the need of security and data forwarding performance in WSN.
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...IJECEIAES
An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process.
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Tương Hoàng
This document is the master's thesis of Nadeem Ahmad and M. Kashif Habib submitted to Blekinge Institute of Technology. The thesis analyzes network security threats and vulnerabilities and develops a network security monitoring solution. It contains chapters on networks and protocols, security threats and attacks, countermeasures techniques and tools, security solutions, and simulation/testing results. The abstract indicates it will address questions about network security implementation and management and give an idea of the current state of network security.
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
MANET is a kind of Ad Hoc network with mobile, wireless nodes. Because of its special characteristics like
dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges
allegorically routing, security and clustering. The security challenges arise due to MANET’s selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of issues in
MANET security. Based on MANET’s special characteristics, we define three security parameters for
MANET. In addition we divided MANET security into two different aspects and discussed each one in
details. A comprehensive analysis in security aspects of MANET and defeating approaches is presented. In
addition, defeating approaches against attacks have been evaluated in some important metrics. After
analyses and evaluations, future scopes of work have been presented.
An analysis of security challenges in mobile ad hoc networkscsandit
Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes with restricted
transmission range and resources, no fixed infrastructure and quick and easy setup. Because of
special characteristics, wide-spread deployment of MANET faced lots of challenges like
security, routing and clustering. The security challenges arise due to MANETs selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of
issues in MANET security. We discussed both security services and attacks in detail. Three
important parameters in MANET security are defined. Each attack has been analyses briefly
based on its own characteristics and behaviour. In addition, defeating approaches against
attacks have been evaluated in some important metrics. After analyses and evaluations, future
scopes of work have been presented
User Selective Encryption Method for Securing MANETs IJECEIAES
Security issue is getting important day by day. At present, there are a variety of methodologies to provide protection for data confidentiality. MANETs have lots of security challenges than traditional networks like infrastructureless and self-organizing requirements. As t he MANETs are dynamic networks that’s make every transmission in such networks vulnerable to many attacks and improving security level becomes a main issue. This paper introduces a user selective encryption method by operating Data Encryption Standard (DES ), Triple DES (3DES), Advanced Encryption Standard (AES) and the Diffie-Hellman Key Exchange (DHKE) protocol for key management in order to improve MANET security. Through the Network Simulator-2 (NS-2), the we investigat e the performance of the proposed method in terms of data transfer time and network throughput for different data sizes and different sender-to-receiver number of hops. The results show the superiority of AES over other encryption algorithms. Furthermore, the effectiveness of our proposed method is verified through comparing our results with those obtained from previous studies.
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...IJECEIAES
An effective key management plays a crucial role in imposing a resilient security technique in Wireless Sensor Network (WSN). After reviewing the existing approaches of key management, it is confirmed that existing approachs does not offer good coverage on all potential security breaches in WSN. With WSN being essential part of Internet-of-Things (IoT), the existing approaches of key management can definitely not address such security breaches. Therefore, this paper introduces a Framework for Secure Data Aggregation (FSDA) that hybridizes the public key encryption mechanism in order to obtain a novel key management system. The proposed system does not target any specific attacks but is widely applicable for both internal and external attacks in WSN owing to its design principle. The study outcome exhibits that proposed FSDA offers highly reduced computational burden, minimal delay, less energy consumption, and higher data transmission perforance in contrast to frequency used encryption schemes in WSN.
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
This document analyzes the performance of wireless trusted software defined networks (SDNs) by considering metrics like energy consumption, throughput, end-to-end delay, and packet delivery ratio. It finds that SDNs perform better than conventional networks without SDN capabilities. It also compares the energy consumption of different SDN topology models. The key findings are that SDNs provide centralized control, programmability, and flexibility that improve performance compared to traditional networks. Additionally, different SDN topology models have varying levels of energy efficiency.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
Nowadays security is an evident matter in designing networks and much research has been done in this
field. The main purpose of the research is to provide an appropriate instruction for data transmission in a
reliable platform. One of the instructions of transferring information is to use public networks like internet.
The main purpose of the present paper is to introduce that enables the users to enter to a new security level.
In this paper, VPN as one of the different instructions for establishing the security proposed to be
examined. In this type, tunneling method of internet protocol security (IPsec) is used. Furthermore, the
advanced method of scanning fingerprint is applied to establish authentication and Diffie-Hellman
algorithm for coding and decoding data, of course with conversion in this algorithm.
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
This document discusses security challenges in mobile ad hoc networks (MANETs). It begins by defining MANETs and explaining their key characteristics that pose security challenges, such as dynamic topology and lack of centralized management. The document then outlines three important security parameters for MANETs: network overhead, processing time, and energy consumption. It analyzes security from two aspects - security services and attacks against those services. For each, it discusses the challenges in providing or preventing them in MANETs. Finally, it examines approaches that integrate security with other challenges in MANETs like routing protocols, clustering, and energy efficiency.
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
This document proposes two novel techniques for authenticating short encrypted messages for mobile and pervasive applications. Existing message authentication codes (MACs) are not designed to utilize encryption functionality and are inefficient for short messages. The proposed techniques are more efficient by using the encryption process to generate authentication information, rather than applying encryption and a MAC separately. The first technique appends a short random string during encryption for authentication. The second improves on this by leveraging properties of block ciphers. Analysis shows the techniques provide security while maintaining efficiency needed for mobile applications.
The document discusses securing symmetric key distribution in a network through implementing identity-based cryptography. It proposes a new security scheme that overcomes limitations of public- and symmetric-key protocols by using a one-way hash function for data authenticity between nodes and a mix of symmetric and public key cryptography for data confidentiality. The scheme guarantees secure communication between in-network nodes using symmetric keys, and secure data delivery between source and sink nodes using public keys. Testing shows the scheme is scalable and provides strong security while maintaining efficiency.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
This document proposes a hierarchical key agreement protocol for wireless sensor networks that uses both symmetric and asymmetric cryptographic techniques. Specifically, it uses probabilistic key pre-distribution for sensor nodes within clusters to establish secure communication with low computational overhead. It uses identity-based asymmetric key distribution between cluster heads and the base station to achieve secure communication with low communication overhead. The goal is to balance security, resilience, and resource overhead of the key management protocol for the constrained sensor nodes. It provides mathematical background on bilinear pairings and elliptic curves needed to implement the identity-based cryptographic techniques.
Integrated Framework for Secure and Energy Efficient Communication System in ...IJECEIAES
Irrespective of different forms and strategies implementing for securing Wireless Sensor Network (WSN), there are very less strategies that offers cost effective security over heterogeneous network. Therefore, this paper presents an integrated set of different processes that emphasize over secure routing, intellectual and delay-compensated routing, and optimization principle with a sole intention of securing the communication to and from the sensor nodes during data aggregation. The processed system advocates the non-usage of complex cryptography and encourages the usage of probability their and analytical modelling in order to render more practical implementation. The simulated outcome of study shows that proposed system offers reduced delay, more throughputs, and reduced energy consumption in contrast to existing system.
This document summarizes previous work on optimizing firewall performance by removing redundant rules. It discusses how previous approaches identified redundant rules between adjoining firewalls without revealing the firewall policies. However, these approaches required the firewalls to know each other's policies or be administered under one domain. The document also reviews literature on anomaly detection techniques, traffic-aware firewall optimization, and analysis tools for modeling and checking firewall configurations. Overall, it provides context on the challenges of optimizing firewalls through redundancy removal while preserving the privacy of each firewall's policies.
The document describes a pairwise key establishment scheme for ad hoc networks. It proposes using cellular automata rules to dynamically establish shared keys between two nodes. Each node sends either a cellular automata rule or the initialization parameters to the other node. The receiving node then uses the rule and parameters along with cellular automata computations to independently derive the shared key. This allows keys to be established dynamically without transmitting the actual keys or requiring an online server. The scheme aims to provide secure communication through pairwise key establishment while being computationally efficient and not relying on predistributed keys.
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
This document summarizes an article about attribute-based encryption for securing data access in cloud storage. It discusses how attribute-based encryption (ABE) can allow users to encrypt data in the cloud in a way that only authorized users who match certain attributes can decrypt and access the data. The document provides background on ABE and homomorphic encryption, which allows computations on encrypted data. It proposes a system using partial homomorphic encryption with RSA and user-generated keys to provide security while allowing data operations without decryption. Evaluation results show the proposed approach provides faster encryption times and less overhead compared to traditional methods.
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...IRJET Journal
This document proposes a new secure routing technique for wireless mesh networks using unmanned aerial vehicles. The technique uses encryption algorithms like Data Encryption Standard and neural networks to establish a secure routing algorithm. It generates unique IDs for nodes, uses a key distribution center for authentication, and implements encryption to prevent attacks. Simulation results show the proposed approach reduces delay and improves packet delivery rate compared to existing routing protocols like PASER when there is frame error.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Airports can optimize communications with passengers by having them sign up for automated messages and reminders about their flights through various channels like texting, social media, and newsletters. Collecting subscriber information allows airports to sort travelers into a customer relationship manager and tailor automated communications like reminders, answers to texted questions, social media posts, and newsletter content based on engagement data from tracked website and email links. This helps improve airport efficiency while keeping passengers informed through their preferred methods of contact.
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
MANET is a kind of Ad Hoc network with mobile, wireless nodes. Because of its special characteristics like
dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges
allegorically routing, security and clustering. The security challenges arise due to MANET’s selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of issues in
MANET security. Based on MANET’s special characteristics, we define three security parameters for
MANET. In addition we divided MANET security into two different aspects and discussed each one in
details. A comprehensive analysis in security aspects of MANET and defeating approaches is presented. In
addition, defeating approaches against attacks have been evaluated in some important metrics. After
analyses and evaluations, future scopes of work have been presented.
An analysis of security challenges in mobile ad hoc networkscsandit
Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes with restricted
transmission range and resources, no fixed infrastructure and quick and easy setup. Because of
special characteristics, wide-spread deployment of MANET faced lots of challenges like
security, routing and clustering. The security challenges arise due to MANETs selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of
issues in MANET security. We discussed both security services and attacks in detail. Three
important parameters in MANET security are defined. Each attack has been analyses briefly
based on its own characteristics and behaviour. In addition, defeating approaches against
attacks have been evaluated in some important metrics. After analyses and evaluations, future
scopes of work have been presented
User Selective Encryption Method for Securing MANETs IJECEIAES
Security issue is getting important day by day. At present, there are a variety of methodologies to provide protection for data confidentiality. MANETs have lots of security challenges than traditional networks like infrastructureless and self-organizing requirements. As t he MANETs are dynamic networks that’s make every transmission in such networks vulnerable to many attacks and improving security level becomes a main issue. This paper introduces a user selective encryption method by operating Data Encryption Standard (DES ), Triple DES (3DES), Advanced Encryption Standard (AES) and the Diffie-Hellman Key Exchange (DHKE) protocol for key management in order to improve MANET security. Through the Network Simulator-2 (NS-2), the we investigat e the performance of the proposed method in terms of data transfer time and network throughput for different data sizes and different sender-to-receiver number of hops. The results show the superiority of AES over other encryption algorithms. Furthermore, the effectiveness of our proposed method is verified through comparing our results with those obtained from previous studies.
FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for En...IJECEIAES
An effective key management plays a crucial role in imposing a resilient security technique in Wireless Sensor Network (WSN). After reviewing the existing approaches of key management, it is confirmed that existing approachs does not offer good coverage on all potential security breaches in WSN. With WSN being essential part of Internet-of-Things (IoT), the existing approaches of key management can definitely not address such security breaches. Therefore, this paper introduces a Framework for Secure Data Aggregation (FSDA) that hybridizes the public key encryption mechanism in order to obtain a novel key management system. The proposed system does not target any specific attacks but is widely applicable for both internal and external attacks in WSN owing to its design principle. The study outcome exhibits that proposed FSDA offers highly reduced computational burden, minimal delay, less energy consumption, and higher data transmission perforance in contrast to frequency used encryption schemes in WSN.
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
This document analyzes the performance of wireless trusted software defined networks (SDNs) by considering metrics like energy consumption, throughput, end-to-end delay, and packet delivery ratio. It finds that SDNs perform better than conventional networks without SDN capabilities. It also compares the energy consumption of different SDN topology models. The key findings are that SDNs provide centralized control, programmability, and flexibility that improve performance compared to traditional networks. Additionally, different SDN topology models have varying levels of energy efficiency.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
Nowadays security is an evident matter in designing networks and much research has been done in this
field. The main purpose of the research is to provide an appropriate instruction for data transmission in a
reliable platform. One of the instructions of transferring information is to use public networks like internet.
The main purpose of the present paper is to introduce that enables the users to enter to a new security level.
In this paper, VPN as one of the different instructions for establishing the security proposed to be
examined. In this type, tunneling method of internet protocol security (IPsec) is used. Furthermore, the
advanced method of scanning fingerprint is applied to establish authentication and Diffie-Hellman
algorithm for coding and decoding data, of course with conversion in this algorithm.
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEYIAEME Publication
This document discusses security challenges in mobile ad hoc networks (MANETs). It begins by defining MANETs and explaining their key characteristics that pose security challenges, such as dynamic topology and lack of centralized management. The document then outlines three important security parameters for MANETs: network overhead, processing time, and energy consumption. It analyzes security from two aspects - security services and attacks against those services. For each, it discusses the challenges in providing or preventing them in MANETs. Finally, it examines approaches that integrate security with other challenges in MANETs like routing protocols, clustering, and energy efficiency.
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
This document proposes two novel techniques for authenticating short encrypted messages for mobile and pervasive applications. Existing message authentication codes (MACs) are not designed to utilize encryption functionality and are inefficient for short messages. The proposed techniques are more efficient by using the encryption process to generate authentication information, rather than applying encryption and a MAC separately. The first technique appends a short random string during encryption for authentication. The second improves on this by leveraging properties of block ciphers. Analysis shows the techniques provide security while maintaining efficiency needed for mobile applications.
The document discusses securing symmetric key distribution in a network through implementing identity-based cryptography. It proposes a new security scheme that overcomes limitations of public- and symmetric-key protocols by using a one-way hash function for data authenticity between nodes and a mix of symmetric and public key cryptography for data confidentiality. The scheme guarantees secure communication between in-network nodes using symmetric keys, and secure data delivery between source and sink nodes using public keys. Testing shows the scheme is scalable and provides strong security while maintaining efficiency.
Hierarchical Key Agreement Protocol for Wireless Sensor Networksidescitation
This document proposes a hierarchical key agreement protocol for wireless sensor networks that uses both symmetric and asymmetric cryptographic techniques. Specifically, it uses probabilistic key pre-distribution for sensor nodes within clusters to establish secure communication with low computational overhead. It uses identity-based asymmetric key distribution between cluster heads and the base station to achieve secure communication with low communication overhead. The goal is to balance security, resilience, and resource overhead of the key management protocol for the constrained sensor nodes. It provides mathematical background on bilinear pairings and elliptic curves needed to implement the identity-based cryptographic techniques.
Integrated Framework for Secure and Energy Efficient Communication System in ...IJECEIAES
Irrespective of different forms and strategies implementing for securing Wireless Sensor Network (WSN), there are very less strategies that offers cost effective security over heterogeneous network. Therefore, this paper presents an integrated set of different processes that emphasize over secure routing, intellectual and delay-compensated routing, and optimization principle with a sole intention of securing the communication to and from the sensor nodes during data aggregation. The processed system advocates the non-usage of complex cryptography and encourages the usage of probability their and analytical modelling in order to render more practical implementation. The simulated outcome of study shows that proposed system offers reduced delay, more throughputs, and reduced energy consumption in contrast to existing system.
This document summarizes previous work on optimizing firewall performance by removing redundant rules. It discusses how previous approaches identified redundant rules between adjoining firewalls without revealing the firewall policies. However, these approaches required the firewalls to know each other's policies or be administered under one domain. The document also reviews literature on anomaly detection techniques, traffic-aware firewall optimization, and analysis tools for modeling and checking firewall configurations. Overall, it provides context on the challenges of optimizing firewalls through redundancy removal while preserving the privacy of each firewall's policies.
The document describes a pairwise key establishment scheme for ad hoc networks. It proposes using cellular automata rules to dynamically establish shared keys between two nodes. Each node sends either a cellular automata rule or the initialization parameters to the other node. The receiving node then uses the rule and parameters along with cellular automata computations to independently derive the shared key. This allows keys to be established dynamically without transmitting the actual keys or requiring an online server. The scheme aims to provide secure communication through pairwise key establishment while being computationally efficient and not relying on predistributed keys.
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
This document summarizes an article about attribute-based encryption for securing data access in cloud storage. It discusses how attribute-based encryption (ABE) can allow users to encrypt data in the cloud in a way that only authorized users who match certain attributes can decrypt and access the data. The document provides background on ABE and homomorphic encryption, which allows computations on encrypted data. It proposes a system using partial homomorphic encryption with RSA and user-generated keys to provide security while allowing data operations without decryption. Evaluation results show the proposed approach provides faster encryption times and less overhead compared to traditional methods.
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...IRJET Journal
This document proposes a new secure routing technique for wireless mesh networks using unmanned aerial vehicles. The technique uses encryption algorithms like Data Encryption Standard and neural networks to establish a secure routing algorithm. It generates unique IDs for nodes, uses a key distribution center for authentication, and implements encryption to prevent attacks. Simulation results show the proposed approach reduces delay and improves packet delivery rate compared to existing routing protocols like PASER when there is frame error.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Airports can optimize communications with passengers by having them sign up for automated messages and reminders about their flights through various channels like texting, social media, and newsletters. Collecting subscriber information allows airports to sort travelers into a customer relationship manager and tailor automated communications like reminders, answers to texted questions, social media posts, and newsletter content based on engagement data from tracked website and email links. This helps improve airport efficiency while keeping passengers informed through their preferred methods of contact.
Delirium is a common condition affecting approximately 30% of older adult inpatients and anywhere from 10-50% of older patients who have had surgery. It is defined as an acute onset of fluctuating mental status changes, inattention, and either disorganized thinking or altered level of consciousness. Delirium can present as hyperactive, hypoactive, or mixed. The first steps in assessing delirium are to explore potential causes such as infection, pain, constipation through tests like bloodwork and imaging, and to treat the underlying cause. Non-pharmacological interventions like reassurance and redirection are preferred, with medication being a last resort option. It is important to involve nursing, occupational therapy, and other experienced colleagues for
Sobór Watykański II i samookreślenie Kościoła: w kierunku nowoczesnej religii...Piotr Burgonski
Burgoński P., Sobór Watykański II i samookreślenie Kościoła: w kierunku nowoczesnej religii publicznej?, w: J. Grosfeld (red.), 50 lat później. Posoborowe dylematy współczesnego Kościoła, Instytut Politologii UKSW, Centrum Myśli Jana Pawła II, Warszawa 2014, s. 47-60.
Science had missed out on the meaning of the angle (theta) in radian measure. It is actually a transformation operator which people had taken so naturally without understanding it. It will form one of the essential ingredient of the rotation vector.
1) Gandhi faced discrimination and hardship from a young age. He was punished unfairly in school and struggled to fit in, which led him to focus on his studies instead of social activities.
2) As a young man, Gandhi experimented with behaviors against his religion like meat-eating and smoking due to peer pressure. He later realized the errors of his ways.
3) Gandhi's nonviolent protests and civil disobedience campaigns in South Africa and India helped achieve greater rights and independence for Indians and other groups facing discrimination. His leadership inspired millions and led to India's independence through nonviolent means.
The document analyzes and compares three different configurations of 220kV transmission line towers: a square base self-supporting tower, a triangular base self-supporting tower, and a square base guyed mast tower. Each tower is modeled and analyzed using STAAD software. The triangular tower has the heaviest member sections for the legs to handle the same loads with fewer legs. The guyed mast tower has the lowest forces in the leg members due to load transfer through guy ropes. The triangular tower experiences the highest forces in the leg members. Overall, the triangular tower requires the heaviest member sections to support the same loads as the other tower configurations.
تتحدث سورة الصف عن الجهاد فى سبيل الله لإعزاز دينه وإعلاء كلمته وهو المحور الذى تدور حوله هذه السورة ولهذا سُميت سورة الصف كما تتحدث عن التجارة الرابحة التي بها سعادة المؤمن في الدنيا والآخرة .
وقد ذكر المفسرون فى سبب نزولها أن المسلمون كانوا يقولون : " لو نعلم أحب الأعمال إلى الله تعالى لبذلنا فيه أموالنا وأنفسنا " فدلهم الله على أحب الأعمال إليه ، فقال : ( إن الله يحب الذين يقاتلون في سبيله صفا ) ، فابتلوا يوما بذلك فولوا مدبرين ، فأنزل الله تعالى ( لم تقولون ما لا تفعلون ) .
فاحرص على وحدة الصف مع إخوانك واسأل الله الثبات والنصر .
Load Balancing for Achieving the Network Lifetime in WSN-A SurveyAM Publications
a wireless sensor network is network form of sense compute, and communication elements which helps to
observe, events in a specified environment. Sensor nodes in wireless sensor network are depends on battery power they
have limited transmission range that’s why energy efficiency plays a vital role to minimize the overhead through which
the Network Lifetime can be achieved. The lifetime of network, depends on number of nodes, strength, range of area
and connectivity of nodes in the network. In this paper we are over viewing techniques which are used in wireless sensor
network for load balancing. Wireless sensor network having different nodes with different kind of energy which can be
improve the lifetime of the network and its dependability. This paper will provide the person who reads with the
groundwork for research in load balancing techniques for wireless sensor networks.
The Amarillo Craft Beer Company business plan outlines their mission to become the leading craft brewery in Texas by producing four styles of high-quality beer and developing strong customer loyalty. Their president and brewmaster, Matt Helm, has extensive brewing and business experience. ACBC will focus on the 25 major Texas metro areas and promote brand awareness through community events and tours of their brewery. They require $1.32 million in funding and project sales growth from $1.43 million in year one to $3.34 million in year five, allowing repayment of investors with a 19.4% rate of return.
The document discusses color theory and psychology, describing the primary color categories and their warm and cool properties. It notes that black and white are not true colors but are used to darken or lighten hues. It then examines the psychological associations of different colors, such as red being associated with energy, warmth, and passion; blue with water, air, tranquility, and masculinity; and green with nature, harmony, and peace.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has presented using Petrinet production model. We present the designed SCTP petrinet models and its analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization, security and intruder prevention.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
This document presents an improved secure cloud transmission protocol (SCTP) that was designed to achieve strong authentication, secure channels, and intruder detection in cloud computing. SCTP uses multi-level authentication with multidimensional password generation, multi-level cryptography, and usage profile-based intruder detection. SCTP was modeled using Petri net production models to analyze its design and performance. The analysis shows that SCTP outperforms existing techniques in authentication, authorization, security, and intruder prevention for cloud applications requiring high security. However, SCTP may introduce unnecessary complexity for simpler cloud applications.
EVALUATING GALOIS COUNTER MODE IN LINK LAYER SECURITY ARCHITECTURE FOR WIRELE...IJNSA Journal
Due to the severe resource constraints in the Wireless Sensor Networks (WSNs), the security protocols therein, should be designed to optimize the performance maximally. On the other hand a block cipher and the mode of operation in which it operates, play a vital role in determining the overall efficiency of a security protocol. In addition, when an application demands confidentiality and message integrity, the overall efficiency of a security protocol can be improved by using the Authenticated Encryption (AE) block cipher mode of operation as compared to the conventional sequential encryption and authentication. Amongst the AE block cipher modes, the Galois Counter mode (GCM) is the latest recommended AE mode by the NIST. In this paper, we attempt at evaluating the performance of the GCM mode in the link layer security protocol for a WSN viz. TinySec and compare it with the default conventional block cipher modes of operation used therein. To the best of our knowledge ours is the first experimental evaluation of Galois Counter Mode with Advanced Encryption Standard Cipher at the link layer security architecture for WSNs.
The rapid growth that has taken place in Computer Vision has been instrumental in driving the advancement of Image processing techniques and drawing inferences from them. Combined with the enormous capabilities that Deep Neural networks bring to the table, computers can be efficiently trained to automate the tasks and yield accurate and robust results quickly thus optimizing the process. Technological growth has enabled us to bring such computationally intensive tasks to lighter and lower-end mobile devices thus opening up a wide range of possibilities. WebRTC-the open-source web standard enables us to send multimedia-based data from peer to peer paving the way for Real-time Communication over the Web. With this project, we aim to build on one such opportunity that can enable us to perform custom object detection through an android based application installed on our mobile phones. Therefore, our problem statement is to be able to capture real-time feeds, perform custom object detection, generate inference results, and appropriately send intruder alerts when needed. To implement this, we propose a mobile-based over-the-cloud solution that can capitalize on the enormous and encouraging features of the YOLO algorithm and incorporate the functionalities of OpenCV’s DNN module for providing us with fast and correct inferences. Coupled with a good and intuitive UI, we can ensure ease of use of our application.
The document proposes a real-time mobile surveillance system using WebRTC. It utilizes computer vision techniques like YOLO for object detection on live video feeds captured by an Android application. The feeds are sent to a NodeJS server and then to a Flask server using REST APIs where OpenCV's DNN module performs inference. Detected objects and alerts are then sent back to the Android device. The system aims to provide low-latency, remote surveillance capabilities using mobile devices and over-the-cloud solutions.
Classification of Software Defined Network Traffic to provide Quality of ServiceIRJET Journal
This document discusses classifying network traffic using machine learning to provide quality of service in software defined networks. It aims to classify traffic by application to prioritize user required traffic and restrict unnecessary traffic like from over-the-top platforms to improve quality of service. The document reviews several related works applying techniques like naive bayes, support vector machines, and fuzzy logic for traffic classification and management in software defined networks to improve quality of service metrics.
EXPLORING THE EFFECTIVENESS OF VPN ARCHITECTURE IN ENHANCING NETWORK SECURITY...IJNSA Journal
The rapid development of technology in communications has transformed the operations of companies and institutions, paving the way for increased productivity, revenue growth, and enhanced customer service. Multimedia calls and other modern communication technologies boost mobile network, thus their utilization is critical to moving the business forward. However, these widely used networks are also vulnerable to security threats, leading network vendors and technicians to implement various techniques to ensure network safety. As the need to safeguard technologies grow and there has been a significant increase in growth the idea of a virtual private network (VPN) emerged as a key strategy for tackling the threat to network security. the authors suggested looking into this issue and presenting the findings of a study that contained insightful observations from the literature reviews that served as the primary source of research besides questionnaire responses as opinions from those who have experience in the network industry and its security. Through this research, it became evident that several technologies and approaches exist to safeguard networks, but the Transport Layer Security (TLS) architecture stood out as a superior solution, particularly for mobile networks.
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
Cloud computing refers to a type of networked computing whereby an application can be run on connected servers instead of local servers. Cloud can be used to store data, share resources and also to provide services. Technically, there is very little difference between public and private cloud architecture. However, the security and privacy of the data is a very big issue when sensitive data is being entrusted to third party cloud service providers. Thus encryption with a fine grained access control is inevitable to enforce security in clouds. Several techniques implementing attribute based encryption for fine grained access control have been proposed. Under such approaches, the key management overhead is a little bit high in terms of computational complexity. Also, secret sharing mechanisms have added complexity. Moreover, they lack mechanisms to handle existence of traitors. Our proposed approach addresses these requirements and reduces the overhead of the key management as well as secret sharing by using efficient algorithms and protocols. Also, a traitor tracing technique is introduced into the cloud computing two layer encryption environment.
Survey on cloud computing security techniqueseSAT Journals
This document summarizes techniques for ensuring security in cloud computing. It discusses different cloud deployment models and types of threats to cloud security. It then analyzes several intrusion detection and prevention system techniques for providing data security in cloud computing, including proof of retrievability models and cryptographic storage services. It compares the advantages and disadvantages of techniques proposed by Juels, Shacham, Bowers, and Kamara regarding their ability to verify data integrity and availability while tolerating security breaches.
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSIJNSA Journal
The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process.
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...IJNSA Journal
Security has become paramount in modern software services as more and more security breaches emerge, impacting final users and organizations alike. Trends like the Microservice Architecture bring new security challenges related to communication, system design, development, and operation. The literature presents a plethora of security-related solutions for microservices-based systems, but the spread of information difficult practitioners' adoption of novel security related solutions. In this study, we aim to present a catalogue and discussion of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 75 security solutions for the communication of microservices.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document proposes routing and security software components that can be integrated into remote laboratories and e-laboratories. It describes implementing routing and security management services using virtual routers. These services allow centralized network management while labs are distributed. The services provide address management of connected nodes, routing of packets between networks, encryption of transmitted information, management of public/private keys, and support for mobile devices through WAP. The services are defined using WSDL and can be accessed programmatically using languages like C# and Visual Basic.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The document discusses wireless body area networks and wireless sensor networks. It describes the goals of the project which are to implement the Tate pairing and Weil pairing protocols, analyze their performance with respect to time and memory consumption, and implement the better performing one for security purposes. The document provides background on sensor network technology, including how sensors have evolved from large specialized systems to smaller low-power devices. It outlines some of the applications of wireless sensor networks.
This document discusses security challenges in cloud computing and proposes a framework to address them. It begins by reviewing existing literature on cloud security that identifies threats like VM-level attacks, management interface compromise, and compliance risks. It then discusses specific threats to cloud computing like changes to business models, abusive use of cloud resources, insecure APIs, and issues from shared infrastructure and multitenancy. The document proposes a cloud security model and framework to define security challenges and help providers enforce complex security policies to detect and prevent attacks in cloud environments.
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
The document proposes a defensive cross-layer architecture for MANETs to identify and correct misbehavior in routing. The architecture has four levels: 1) Network topological level outlines basic node connections; 2) Routing level applies security to routing protocols and individual nodes, using a new Time On Demand Distance Vector (TODV) routing; 3) Detection level encrypts packets and uses acknowledgements to detect tampering; 4) Correction level calculates packet loss ratios to identify alternative routes when attacks are detected. The architecture aims to provide end-to-end security across three layers while maintaining network performance.
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
Millions of people all over the world are now connected to the Internet for doing business. Therefore, the demand for Internet and web-based services continues to grow. So, need to install required infrastructure to balance the computing. In spite the success of new infrastructure, it is susceptible to several critical
malfunctions. Therefore, to guarantee the secure operations on Network and Data, several solutions need to be developed. The researchers are working in this direction to have the better solution for security. In distributed environment, at the time of management of resources both computing and networking,
resource allocation and resource utilization, etc, the security is most crucial problem. In this paper, an extensive review has been made on the different security aspect, different types of attack and techniques to sustain and block the attack in the distributed environment.
Similar to The Difference Impact on QoS Parameters between the IPSEC and L2TP (20)
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...AM Publications
Toddler family cadre is a community members work voluntarily in fostering and providing information to parents of toddlers about how to properly care for children. Toddler Family cadre desperately need training to increase their skills. There are still a few Toddler family cadres who get training so that the knowledge and skills of parents and other family members in developing toddlers' growth through physical stimulation, motoric intelligence, emotional and social economy as well as possible are still lacking. The purpose of this study is to develop an Android- assisted Toddler family cadre training model in Demak. This research is research in tian research and development. The research location was in Demak Regency. Toddler family cadres became the object of this research. Development of Toddler family cadre training models assisted by Android in Demak is feasible to be used as an effort to improve Toddler Family cadres' capabilities.
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...AM Publications
In recent years the use of composite materials in structural components has become increasingly common in a wide range of engineering applications. Composite materials offer numerous advantages over more conventional materials because of their superior specific properties, but a serious obstacle to a more widespread use of these materials is their high sensitivity to localized impact loading. This paper presents an experimental study to assess the impact response of drop weight impact tests on fiber reinforced polymer composites with deferent load and damage identification of composite using Non-destructive testing techniques ultrasonic testing (UT) C scan. In the study includes checking the strength of the specimen, plotting of graphs between the height and the impact energy obtained and tabulating the results after conducting the various functional tests.
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGNAM Publications
In this paper I will present the use of fractal geometry to design tile motifs. A fractal is a geometric figure that combines the several characteristics among others: its parts have the same form as the whole, fragmented, and formation by iteration. The concept of fractals has been spread over all fields of sciences, technology, and art. This paper aims to provide an algorithm to creating motifs of tile algorithm for create the tile motif consists of base, iteration, coloration and duplication. In order to help the reader better understand the algorithm, I will present some script using Matlab. We describe a mathematically based algorithm that can fill a spatial region with sequence of randomly placed which may be transformed copies of one motif or several motifs. By using this algorithm, I can produce thousand variety of aesthetically pleasing tile motifs, of which we show a number of examples.
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...AM Publications
Two-dimensional resistivity analysis of magnetotelluric data has been done at “Z” geothermal area which is located in southern part of Indonesia. The objective is to understand subsurface structure beneath reasearch area based on 2-D modeling of magnetotelluric data. The inversion finite element method were used for numerical simulations which requires discretization on the boundary of the modeling domain. The modeling results of magnetotelluric data shows relativity structure dissemination: 0-10 ohm.m in a thickness of 1 km (Clay Cap), 10-100 ohm.m with 1-2 km depth respectively (reservoir zone), and on a scale of 100-1000 ohm.m in a depth of 2-3 km (heat source zone). The result of relativity structure can be used to delineate an area with geothermal prospect around 12 km2.
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...AM Publications
This document presents an optimization of laser welding parameters for martensitic stainless steel using a genetic algorithm. The algorithm aims to minimize the difference between the actual and desired weld size (width and depth) by optimizing laser power, welding speed, and fiber diameter. The genetic algorithm was run 10 times with a population of 30 over 200 iterations each time. The results showed errors between optimized and experimental values of less than 5% for the parameters. The study demonstrates that genetic algorithms can effectively optimize laser welding parameters to achieve a preset weld size.
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISESAM Publications
The Ministry of Cooperatives and Small and Medium Enterprises launched in 2018 the number of Micro, Small and Medium Enterprises (MSMEs) in Indonesia as many as 58.97 million people. It is predicted that the number of MSMEs players in 2019 will amount to 59.2 million. This shows that the Indonesian people have made changes in the field of family economics which initially as consumptive are now productive. The community prefers to carry out activities that can increase family income. Future MSMEs remain the mainstay of the national economy. In accordance with the government roadmap, in 2020 e-commerce transactions are predicted to reach Rp1,300 trillion or equivalent to USD130 billion. According to data from the Central Statistics Agency (BPS), the contribution of MSMEs to Indonesia's Gross Domestic Product (GDP) reached 61.41%, with the number of MSMEs reaching almost 60 million units. However, only around 8% or 3.79 million of the 59.2 million MSMEs players have used online platforms to market their products. Based on the above problems, researchers conducted research on the analysis and display of E-Marketplace for MSMEs in Indonesia. The type of research used is action research. The object of research is MSMEs which are under the Office of Industry and Trade of Sragen Regency. The method of data collection is by techniques: (1) interview, (2) documentation (3) observation, (4) literature study. The researcher uses the waterfall method in developing the system. The research team has successfully analyzed the E-Market place according to the results of data collection. The research team has succeeded in designing the E-Marketplace for MSMEs. E-Marketplace designed can be used by admin, MSME and user. Admin is in charge of managing E-Marketplace and has full access rights. MSMEs can register online and manage their products in E-Marketplace. Users or buyers can search data in E-Marketplace as desired. To make transactions, users can interact directly with MSMEs according to the data provided in E-Marketplace. E-Marketplace can be used for marketing together MSMEs products. This e-marketplace can be accessed at www.umkmonline.com
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS AM Publications
Remote sensing technology's increasing accessibility helps us observe research and learn about our globe in ways we could only imagine a generation ago. Guides to profound knowledge of historical, conceptual and practical uses of remote sensing which is increasing GIS technology. This paper will go briefly through remote sensing benefits, history, technology and the GIS and remote sensing integration and their applications. Remote sensing (RS) is used in mapping the predicted and actual species and dominates the ecosystem canopy.
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...AM Publications
Currently, the finite element method (FEM) is still one of the useful tools in numerical simulation for technical problems. With this method, a continuum model presented by a certain number of elements with a simple approximation field causes the presence of discretization error in solutions. This paper considers the butt weld by laser which subjected the tension for AISI 1018 steel highness 8 mm. The aim of the study is to use the h-refinement of the FEM in estimation the strain energy error for the laser weld mentioned. The results show that the stability of the h-refinement shown by the value of the relative error of the strain energy is quite small, specifically; FEM is less than 5.7% and extra is no more than 3.7%.
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITIONAM Publications
Speech recognition is always being an all-time trendy topic for discussion and also for researches and we see a major application in our life. This paper provides the work done on the application of Hidden Markov model to implement isolated word speech recognition on MATLAB and to develop and train the system for set of self-selective words for specific user (user dependent) to get maximum efficiency in word recognition system. Which uses the forward and Baum-welch algorithm and fitting Gaussian of the Baum-welch algorithm for all the iteration perform. We use a sample of 7 alphabets which are recorded in 15 different ways giving total of 105 word to use for training with each word with 15 variations. This system can be used in real world in system security using voice security system and mainly for children and impaired people.
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...AM Publications
Detecting pedestrians in low resolution videos is a challenging task, due to the small size of pedestrians in the images and the limited information. In practical outdoor surveillance scenarios the pedestrian size is usually small. Existing state-of-the-art pedestrian detection methods that use histogram of oriented gradient (HOG) features have poor performance in this problem domain. To compensate for the lack of information in a single frame, we propose a novel detection method that recognizes pedestrians in a short sequence of frames. Namely, we take the single-frame HOG-based detector and extend it to multiple frames. Our detector is applied to regions containing potential moving objects. In the case of video taken from a moving camera on an aerial platform, video stabilization is first performed to register the frames. A classifier is then applied to features extracted from spatio-temporal volumes surrounding the potential moving objects. On challenging stationary and aerial video datasets, our detection accuracy outperforms several state-of-the-art algorithms.
The aim of this paper is to help the blind people to identify and catch the public transport vehicles with the help of Light Fidelity technology. It is a Navigation aid. When the bus arrives at the bus stand, transmitter in the bus transmits the light signals and receiver in the stick, receives the light signals and a sound signal is generated through the speaker present in the stick. The sound message contains the bus number and the destination of the bus. In addition to this, if the person is absconded or lost, details of the location will be sent to his/her family members by pressing a button. This is made possible with the help of Global System for Mobile (GSM). Finally, presence of water can be detected along the blind person’s path, with the help of water sensors.
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...AM Publications
A digital radiography delivers a radiation dose to patients; therefore it poses potential risk to the patients. One effort to reduce dose is carried out using a radiation filter, e.g. Silicone Rubber (SR) sheet. The purpose of this research was to determine the impact of the SR sheet on the high contrast objects (HCO) and the low contrast objects (LCO). The dose reduction was determined from attenuation x-rays before and after using the SR sheet. Assessment of HCO and LCO was observed from CDR TOR phantom at tube voltage of 48 kVp and tube current of 8 mAs. The physical parameter to assess image quality was the Signal to Noise Ratio (SNR) value in LCO. The maximum x-ray attenuation using the SR sheet is 48.82%. The visibility of the HCO remains the same, namely 16 objects; however the LCO slighly decreases from 14 objects to 13 objects after using the SR sheet. The SNR value decreases with an average value of 15.17%.Therefore, the SR sheet as a alternative filter has no effect on the HCO and has realtively little effect on the LCO. Thus, the SR sheet potentially is used for radiation protection in patients, especially on examinations that do not require low contrast resolution.
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...AM Publications
Immunization is the key strategy to curb communicable diseases which are the number one killer of children under five. Immunization prevents mortalities of approximating three million children under five annually. This study aimed to assess utilization of immunization services among children under five of age in Kirinyaga County, Kenya.
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...AM Publications
The article presents the study of cryptographic transformations of the Kuznyechik algorithm in relation to differential analysis and the translation of their representations into a more convenient form for cryptanalysis. A simplification of the type of transformations of the algorithm to algebraic the form, in which cryptanalysis software will be more effective. Since the description of the algorithm in the analytical form allows for 16 cycles of execution of the shift register with linear feedback, each of which will be carried out 16 operations of multiplication and 15 operations of addition, reduced to 16 multiplying and 15 the operations of addition. The result is an algebraic form of a linear transformation (from a shift register with linear feedback to the multiplication of the matrix in a finite field). In the future, the algebraic type of transformation can be used to effectively carry out differential cryptanalysis.
Optical character recognition (OCR) is process of classification of optical patterns contained in a digital image. The process of OCR Recognition involves several steps including pre-processing, segmentation, feature extraction, classification. Pre-processing is for done the basic operation on input image like noise reduction which remove the noisy signal from image. Segmentation stage for segment the given image into line by line and segment each character from segmented line. Future extraction calculates the characteristics of character. A Radial Basis Function Neural Network (RBFNN) is used to classification contains the database and does the comparison.
Surveillance refers to the task of observing a scene, often for lengthy periods in search of particular objects or particular behaviour. This task has many applications, foremost among them is security (monitoring for undesirable behaviour such as theft or vandalism), but increasing numbers of others in areas such as agriculture also exist. Historically, closed circuit TV (CCTV) surveillance has been mundane and labour Intensive, involving personnel scanning multiple screens, but the advent of reasonably priced fast hardware means that automatic surveillance is becoming a realistic task to attempt in real time. Several attempts at this are underway.
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENTAM Publications
Interest in air pollution investigation of urban environment due to existence of industrial and commercial activities along with vehicular emission and existence of buildings and streets which setup natural barrier for pollutant dispersion in the urban environment has increased. The air pollution modelling is a multidisciplinary subject when the entire cities are taken under consideration where urban planning and geometries are complex which needs a large software packages to be developed like Operational Street Pollution Model (OSPM), California Line Source model (CALINE series) etc. On overviewing various works it can be summarized that the air pollutant dispersion in urban street canyons and all linked phenomenon such as wind flow, pollutant concentrations, temperature distribution etc. generally depend on wind speed and direction, building heights and density, road width, source and intensity of air pollution, meteorological variables like temperature, humidity etc. A unique and surprising case is observed every time on numerous combinations of these factors. The main aim of this study is to simulate the atmospheric pollutant dispersion for given pollutant like carbon monoxide, sulphur dioxide and nitrogen dioxide and given atmospheric conditions like wind speed and direction. Computational Fluid Dynamics (CFD) simulation for analysing the atmospheric pollutant dispersion is done after natural airflow analysis. Volume rendering is done for variables such as phase 2 volume fraction and velocity with resolution as 250 pixels per inch and transparency as 20%. It can be observed that all the three pollutant namely nitrogen dioxide, sulphur dioxide and carbon monoxide the phase 2 volume fraction changes from 0 to 1. The wind velocity changes from 3.395×10-13 m/s to 1.692×102 m/s. The dispersion of pollutants follow the sequence Sulphur dioxide>Carbon monoxide>Nitrogen dioxide.
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...AM Publications
In this article, we have extracted keratin from deccani wool waste and prepared the wool keratin based Chitosan nanofibers by electrospinning technique. The prepared nanofibers mat were prepared with different weight percent ratio like 1wt.%, 3wt.% and 5wt.% with respect to polymer i.e Chitosan. The physicochemical and filtration properties of wool keratin based Chitosan nanofibers were studied. Wool keratin based Chitosan nanofibers were characterized by Fourier transform infrared spectroscopy (FTIR), X-ray diffraction (XRD), differential scanning calorimetry (DSC) and scanning electron microscopy (FESEM). The filtration efficiency of keratin Chitosan nanofibers were investigated through DOP test and heavy metal removal capacity of evaluated through Atomic absorption spectroscopy. FTIR results were showed that Keratin gets compatible with Chitosan. XRD patterns revealed keratin was in crystalline nature and increase the crystalline nature of Chitosan nanofibers. FESEM images showed that uniform nanofibers generation with average fiber diameter 80nm. Nanofibers filtration efficiency against a particulate matter in air was obtained more than 99.53% and excellent property of removal of heavy metal.
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...AM Publications
Cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. The cloud is just a metaphor for the Internet. The elements involved in cloud computing are clients, data center and distributed server. One of the main problems in cloud computing is load balancing. Balancing the load means to distribute the workload among several nodes evenly so that no single node will be overloaded. Load can be of any type that is it can be CPU load, memory capacity or network load. In this paper we presented an architecture of load balancing and algorithm which will further improve the load balancing problem by minimizing the response time. In this paper, we have proposed the enhanced version of existing regulated load balancing approach for cloud computing by comping the Randomization and greedy load balancing algorithm. To check the performance of proposed approach, we have used the cloud analyst simulator (Cloud Analyst). Through simulation analysis, it has been found that proposed improved version of regulated load balancing approach has shown better performance in terms of cost, response time and data processing time.
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY AM Publications
This paper presents various security features and configurations commonly implemented in WLANs and their aggregated security levels and then proposes a model that enables implementation and evaluation of WLAN security
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.