VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE最新文献

筛选
英文 中文
A Comprehensive Overview on Cybersecurity: Threats and Attacks 网络安全全面概述:威胁与攻击
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE Pub Date : 2021-06-30 DOI: 10.35940/ijitee.h9242.0610821
S. Preetha, P. Lalasa, R. Pradeepa
{"title":"A Comprehensive Overview on Cybersecurity: Threats and Attacks","authors":"S. Preetha, P. Lalasa, R. Pradeepa","doi":"10.35940/ijitee.h9242.0610821","DOIUrl":"https://doi.org/10.35940/ijitee.h9242.0610821","url":null,"abstract":"In the world of evolving technologies, we are being driven by online transaction, AI technologies and automated processes. With the increased use of technologies in our life, the cybercrimes have amplified. Various new attacks, tools and techniques have been developed which allow the attackers to access more complex and well-managed systems, creating damage and even remain untraceable. The statistics about cyber crime tell that as of 2021 January, google has registered around 2 million phishing websites. In 2019 around 93.6% of observed malware was polymorphic, which means it changes the code continuously to evade detection. According to FBI and internet crime complaint center 2020crime report has doubled compared to 2019. International Data Corporation predicts that global spending on cybersecurity solutions will reach $133.7 billion by 2022 as cyber threats continue to increase. Governments around the world have acknowledged to growing cyber-attacks by providing directions to organizations implementing efficient cybersecurity practices. Cybersecurity protects computer systems and networks from creating damage to hardware and software, information disclosure, theft and from the interference or misdirection of the services they provide. The need to understand different kinds of cybercrime. In order to develop necessary measures against cybercrime, we need to understand different kinds of cybercrime. Our paper gives you an overview of various types of cyber-crime like malware, phishing, zero-day exploit, Advanced Persistent Threat (APT). The study provides an overview to different preventive existing solutions proposal and methods to detect attack. A strong understanding of such attacks would benefit us to be cautious and develop effective solutions.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"76 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76327896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Single Input Multiple Output Buck Converter with Light Load Efficiency 轻负载效率单输入多输出降压变换器的设计
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE Pub Date : 2021-06-30 DOI: 10.35940/ijeat.e2787.0610521
Pragnya R Mogha, Manish. G. Rathi
{"title":"Design of Single Input Multiple Output Buck Converter with Light Load Efficiency","authors":"Pragnya R Mogha, Manish. G. Rathi","doi":"10.35940/ijeat.e2787.0610521","DOIUrl":"https://doi.org/10.35940/ijeat.e2787.0610521","url":null,"abstract":"The major demand for portable electronics devices\u0000such as pagers, laptops, cellular phones etc. Single input\u0000multiple output (SIMO) converter will be proposed to give\u0000different supply voltages while keep up prolong battery life. A\u0000single-discharge (SDC) control scheme is introduce to simplify\u0000the Single inductor multiple output design, attain to low cross\u0000regulation, and to support board range of loads with decent\u0000efficiency of power. A Single discharge control single input\u0000multiple output buck converter with 4 outputs composed of\u0000comparators, phased-locked loop, finite state machine (FSM)\u0000controller, and an output stage. In addition to the basic switching\u0000functions, the FSM controller provides a state skipping feature to\u0000allow no-load regulation. Single input multiple output converter\u0000is available for less cost and used for maintaining long battery\u0000life and they are growing in vast range with rich feature portable\u0000electronic device. The design of converter is designed for limited\u0000range for prolonged battery life. The SIMO converters are used\u0000for the reduction of cost and switching losses, hence improve\u0000system efficiency. In our study, we proposed buck converter\u0000topology with single input of 24v and multiple output of 12v and\u00005v. The 12v voltage is used for electric vehicles. In electric\u0000vehicles it is used in horns and headlights. 5v voltage is used for\u0000small signal and stability analysis. The simulated conversion\u0000efficiency for peak power is 86% the power ranging for output is\u000050 to 300mW. The ICs exhibit has a low measured peak\u0000efficiency of 73% and cross regulation of 0.24 mV/mA because\u0000of parasitic bond wire resistance. The proposed system is\u0000simulated in MATLAB/Simulink software.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"342 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76153841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fundamentals of Transportation Problem 交通问题基础
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE Pub Date : 2021-06-30 DOI: 10.35940/ijeat.e2654.0610521
Bhabani Mallia Mrs., M. Das, C. Das
{"title":"Fundamentals of Transportation Problem","authors":"Bhabani Mallia Mrs., M. Das, C. Das","doi":"10.35940/ijeat.e2654.0610521","DOIUrl":"https://doi.org/10.35940/ijeat.e2654.0610521","url":null,"abstract":"Transportation Problem is a linear programming\u0000problem. Like LPP, transportation problem has basic feasible\u0000solution (BFS) and then from it we obtain the optimal solution.\u0000Among these BFS the optimal solution is developed by\u0000constructing dual of the TP. By using complimentary slackness\u0000conditions the optimal solutions is obtained by the same iterative\u0000principle. The method is known as MODI (Modified Distribution)\u0000method. In this paper we have discussed all the aspect of\u0000transportation problem.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85842876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT Based Automatic Seat Vacancy Detection in Travel Buses using Cloud Database 基于云数据库的基于物联网的客车空位自动检测
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE Pub Date : 2021-06-30 DOI: 10.35940/ijitee.h9163.0610821
M. V. Dr, R. Subashree
{"title":"IoT Based Automatic Seat Vacancy Detection in Travel Buses using Cloud Database","authors":"M. V. Dr, R. Subashree","doi":"10.35940/ijitee.h9163.0610821","DOIUrl":"https://doi.org/10.35940/ijitee.h9163.0610821","url":null,"abstract":"The world has improving with lot of people utilities for living case. In this development technologies make the purpose of surviving easier. Internet of things is the inter-connecting technology used to pass the data to the required people via physical devices which are embedded with the software’s, sensors, electronics etc. IoT lift up smart cities, transportation, industries with new innovations for the development. The proposed system is done in transport sector to effectively manage the vacant seats particularly on travel buses. The vacant seats may happen due to last minute cancellation, the passengers who missed bus, or the passengers who doesn’t cancel their ticket even after they decide not to travel. In present situation, the seat allocation for the travelers is mostly done through online but when it comes to the vacant seats, the ticket checker has to allocate it manually. The system purpose is to verify whether all booked seats are occupied or not using sensors, and it automatically sends the signal to centralized server and make enable that particular seat for fresh booking. So that, the passengers who planned for travel by last minute can able to book ticket through online from the upcoming boarding stations.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"150 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77415160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Numerical Solution of Integral Equation by using New Modified Adomian DecompositionMethod and Newton Raphson Methods 用改进的Adomian分解法和Newton Raphson法求解积分方程
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE Pub Date : 2021-06-30 DOI: 10.35940/ijitee.h9069.0610821
N. Ahmad, B. Singh
{"title":"Numerical Solution of Integral Equation by using New Modified Adomian Decomposition\u0000Method and Newton Raphson Methods","authors":"N. Ahmad, B. Singh","doi":"10.35940/ijitee.h9069.0610821","DOIUrl":"https://doi.org/10.35940/ijitee.h9069.0610821","url":null,"abstract":"In this paper, we discuss the numerical solution of\u0000Adomian decomposition method and Taylor’s expansion method\u0000in Volterra linear integral equation. And we apply modified\u0000Adomian decomposition method and Newton Raphson method in\u0000Volterra nonlinear integral equation with the help of example and\u0000estimated an error in MATLAB 13 versions.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"88 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84438436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Qgis Plugin to Monitor the Health Condition of a Lake 湖泊健康状况监测Qgis插件的开发
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE Pub Date : 2021-06-30 DOI: 10.35940/ijeat.d2540.0610521
K. Shibu, S. Ayoob
{"title":"Development of Qgis Plugin to Monitor the Health Condition of a Lake","authors":"K. Shibu, S. Ayoob","doi":"10.35940/ijeat.d2540.0610521","DOIUrl":"https://doi.org/10.35940/ijeat.d2540.0610521","url":null,"abstract":"Monitoring the quality of surface water is an\u0000important step towards sustainability of water resources.\u0000Quantum Geographic Information System (QGIS) is an opensource desktop application which is used for editing and\u0000analysing geospatial data. This study aims to develop a QGIS\u0000plugin named Lake Ecosystem Tool to monitor the health\u0000condition of a lake in terms of water quality index, trophic state\u0000index, hazard quotient, aerial water spread and volumetric\u0000change and the same can be used as a planning tool for the\u0000sustainable management of existing water bodies.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"221 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76618803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Different Real Time Operating Systems 不同实时操作系统综述
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE Pub Date : 2021-06-30 DOI: 10.35940/ijeat.e2762.0610521
Santhosh M S, N. G S
{"title":"A Survey on Different Real Time Operating Systems","authors":"Santhosh M S, N. G S","doi":"10.35940/ijeat.e2762.0610521","DOIUrl":"https://doi.org/10.35940/ijeat.e2762.0610521","url":null,"abstract":"To minimise development costs and enhance\u0000dependability, modern embedded system development is\u0000increasingly emphasising on software modularity and reuse.\u0000Microcontrollers are extensively employed in embedded\u0000applications that have a very specific and specialised job to\u0000complete. The embedded applications are always resource\u0000constraint which requires efficient utilization of available\u0000resources. A Real Time Operating System (RTOS) is frequently\u0000used in this context to plan task execution as well as enable\u0000intertask communication and synchronisation. This paper\u0000provides the survey of different RTOS available in market and\u0000their applications. Several open source RTOS such as Free RTOS,\u0000VxWorks, SmallRTOS and TinyOS are compared with respect to\u0000the scheduling algorithms used.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74753746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Electronic Healthcare Records in Web Applications 保护Web应用程序中的电子医疗记录
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE Pub Date : 2021-06-30 DOI: 10.35940/ijeat.e2781.0610521
Iishi Patel, Sambhav Jain, J. K. Vishwajeet, Vibhuti Aggarwal, Pragati Mehra
{"title":"Securing Electronic Healthcare Records in Web Applications","authors":"Iishi Patel, Sambhav Jain, J. K. Vishwajeet, Vibhuti Aggarwal, Pragati Mehra","doi":"10.35940/ijeat.e2781.0610521","DOIUrl":"https://doi.org/10.35940/ijeat.e2781.0610521","url":null,"abstract":"In such an unfortunate situation of a medical\u0000emergency, a lot of people tend to lose their lives which can be a\u0000result of misplaced/delayed paperwork. Thus it is essential to have\u0000the patient’s medical record history before going into major\u0000surgery and it is often unavailable at the required time due to the\u0000chain of communication between different hospitals. As a possible\u0000solution to this problem we propose a central chain of all medical\u0000records of a patients in an electronic format. The electronic health\u0000records (EHRs) are patient-centered, real-time records that make\u0000information available to authorized users and help doctors\u0000diagnose cases more quickly, reduce medical errors, and deliver\u0000safer care. EHRs improve the communication gap and make the\u0000process of getting medical attention quicker. Our methodology\u0000includes an easy to use 2 module approach (doctor portal and\u0000patient portal) with multiple sub modules all linked to a common\u0000database. We create a secure and centralized database for EHRs\u0000with an easy approach and manageable methodology. Security is\u0000important in our use case and we thus include- Secure\u0000authentication (and verification of doctor’s ID while creating a\u0000new account) , two factor authentication and OTP verification\u0000while accessing patient reports. We are using block chain for\u0000safely storing multiple patient records for maintaining a safe\u0000storage of multiple records. The doctors will be able to access the\u0000patients with few clicks and verification and understand the\u0000patient background. This will majorly help in maintaining\u0000records, accessing prescription and getting an overview of the\u0000patient's medical history while saving a lot of manual paper work.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74876230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Financial Fraud Detection in Plastic Payment Cards using Isolation Forest Algorithm 基于隔离森林算法的塑料支付卡金融欺诈检测
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE Pub Date : 2021-06-30 DOI: 10.35940/ijitee.g8873.0610821
Ankaj Kumar, G. S. Mishra, P. Nand, Madhav Singh Chahar, Sonu Kumar Mahto
{"title":"Financial Fraud Detection in Plastic Payment Cards using Isolation Forest Algorithm","authors":"Ankaj Kumar, G. S. Mishra, P. Nand, Madhav Singh Chahar, Sonu Kumar Mahto","doi":"10.35940/ijitee.g8873.0610821","DOIUrl":"https://doi.org/10.35940/ijitee.g8873.0610821","url":null,"abstract":"The need for technology has always found space in Financial Transaction as the number of fraud in financial transactions increases day by day. In this research we have proposed a new methodology by using the isolation forest algorithm and local outlier detection algorithm to detect the financial fraud. A standard data set is used in experimentation to classify a transaction occurred is a fraudulent or not. We have used neural networks and machine learning for classification. We have focused on the deployment of anomaly detection algorithms that is Local Outlier Factor and Isolation Forest algorithm (IFA) on financial fraud transactions data.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80374990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Multi-Objective Optimization Algorithm for Routing Path Selection and WavelengthAllocation for Dynamic WDM Network using MO-HLO 基于MO-HLO的动态WDM网络路由路径选择和波长分配多目标优化算法
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE Pub Date : 2021-06-30 DOI: 10.35940/ijeat.d2444.0610521
Hamsaveni M, Savita Choudhary
{"title":"A Multi-Objective Optimization Algorithm for Routing Path Selection and Wavelength\u0000Allocation for Dynamic WDM Network using MO-HLO","authors":"Hamsaveni M, Savita Choudhary","doi":"10.35940/ijeat.d2444.0610521","DOIUrl":"https://doi.org/10.35940/ijeat.d2444.0610521","url":null,"abstract":"The data transmission system in the optical WDM\u0000network increases the speed of packet transmission by the\u0000wavelength of light beams . The Selection of the wavelength and\u0000the shortest path to transmit the packets form source to destination\u0000is a challenge in a large network architecture. To solve these two\u0000problems, the optimization model must handle both the objectives.\u0000In this paper we are proposing a novel multi-objective\u0000optimization algorithm to solve both the problem of wavelength\u0000allocation and shortest path identification in a WDM network.\u0000This can be achieved by the enhanced model of Multi-Objective\u0000Hunger Locust Optimization algorithm (MO-HLO). In this, it\u0000analyse traffic level in a network path and the availability of\u0000wavelength present at each time instant. The proposed system\u0000retrieves the parameters of network architecture and with the\u0000weight value of dynamic traffic occur in the routing path. Among\u0000these data, the optimization selects the best among overall feature\u0000set of the WDM arrangement. The MO-HLO algorithm extracts\u0000the combination of each attribute to form the cluster that\u0000segregates the routing path along with the traffic range. From the\u0000fitness of the objective function of MO-HLO, the best routing path\u0000and the availability of wavelength for a node can be analysed at\u0000each time instant.","PeriodicalId":23601,"journal":{"name":"VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE","volume":"158 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72707633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信