{"title":"BLOCKCHAIN IN SECURITY: EVOLUTION, PPLICATIONS AND CHALLENGES","authors":"Dr. Maassoumeh (Afsaneh) Javadi","doi":"10.26483/ijarcs.v13i5.6913","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i5.6913","url":null,"abstract":"Currently, blockchain as a core technology of much application has received attention. It is actually a distributed database which maintains a data record list that continuously grows. The secured distributed key behind of blockchain have the potential to address many online transactional applications such as Bitcoin. Due to increasing the usage of blockchain technology, especially in security- based applications, in this paper, we provide an analysis of security issues in the blockchain. Furthermore, we will discuss some use cases as well as challenges in this area.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128112968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INTERNET OF THINGS (IOT) TECHNOLOGIES FOR SHIMLA CITY-A CASE STUDY","authors":"Anshul Kalia, Rishi Rana, Sumesh Sood, Aayushi Kalia, Nikhlesh Kumar Badoga","doi":"10.26483/ijarcs.v13i4.6900","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i4.6900","url":null,"abstract":"The large deployment of Internet of Things (IoT) is actually enabling Smart City projects and initiatives all over the world. Objects used in daily life are being equipped with electronic devices and protocol suites in order to make them interconnected and connected to the Internet. According to a recent Gartner study, 50 billion connected objects have been deployed in smart cities by 2020. These connected objects will make our cities smart. However, they will also open up risks and privacy issues. As various smart city initiatives and projects have been launched in recent years, we have witnessed not only the expected benefits but the risks introduced. The current and future trends of smart city with respect to IoT have been described. It also discussed the interaction between smart cities and IoT. The drivers behind the evolution & development of IoT and smart cities have been explained. Finally, the IoT weaknesses and how they can be addressed when used for smart cities has been discussed","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122553161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"REVIEW ON SCENE SEMANTICS EXTRACTION FOR DECISION MAKING SYSTEM IN AUTONOMOUS VEHICLES","authors":"Y. Hembade, D. S. Shirbahadurkar, D. A. Gaikwad","doi":"10.26483/ijarcs.v13i4.6882","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i4.6882","url":null,"abstract":"It is a worldwide witnessed fact that traditional manual driving mechanism will be superseded by Autonomous Vehicles [AVs] in coming years. Autonomous vehicles are going to be most foreseen development in the automotive industry. That would require Decision Making System which will enable AVs to intuitively interpret the real-time situations around. Most importantly scene recognition on streets & extracting relevant semantics from the scene is challenging task. So, image classification & object detection techniques using Deep Convolutional Neural Networks [DCNN] are going to play vital role in every other methodology designed for scene semantics extraction. As per the extracted scene semantics DMS actuates the necessary devices which control the speed of vehicle & steering angel. So for that matter information extraction from road scene images covering all aspects to take intuitive decisions has huge concern with overall performance of the AV’s.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122900788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STUDY ON MICROSTRUCTURE AND CORROSION RESISTANCE OF LASER CLADDING FE BASED ALLOY COATING","authors":"Qiu Yuwei","doi":"10.26483/ijarcs.v13i4.6886","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i4.6886","url":null,"abstract":"","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128446774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GRID-BASED DESIGN FOR DUAL MONITORING APPLICATIONS IN WSN WITH MOBILE SINK","authors":"Shivani S. Bhasgi, Dr. Sujatha Terdal","doi":"10.26483/ijarcs.v13i4.6894","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i4.6894","url":null,"abstract":"wireless sensors are used in ample number of applications for sensing different data. They are used in environmental monitoring or event based, but applications requiring both are not very familiar. These kinds of applications require data to be delivered based on the deadline. Such hybrid systems are considered and a method feasible for both is proposed in this paper. Sensors are grouped into clusters and group heads are selected based on some parameters which will help to save energy, balance the network as well as extend the lifetime. The sensors collect data and send to group heads using TDMA and data is collected by mobile sink time slots are allotted for time sensitive event data. The proposed technique is implemented in NS2 and compared with existing algorithms in terms of lifetime, delay etc. The proposed procedure has 15% more lifetime than previous methods","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132702722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A FINGERPRINT BASED GENDER DETECTOR SYSTEM USING FINGERPRINT PATTERN ANALYSIS","authors":"Faluyi Bamidele Ibitayo, Olowojebutu Akinyemi Olanrewaju, Makinde Bukola Oyeladun","doi":"10.26483/ijarcs.v13i4.6885","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i4.6885","url":null,"abstract":"Humans have distinctive and unique traits which can be used to distinguish them thus, acting as a form of identification. Biometrics identifies people by measuring some aspect of individual’s anatomy or physiology such as hand geometry or fingerprint which consists of a pattern of interleaved ridges and valleys. The aim of this research is to analyse humans fingerprint texture in order to determine their gender, and correlation of RTVTR and Ridge Count on gender detection. The study is to analyze the effectiveness of physical biometrics (thumbprint) in order to determine gender in humans. Humans have distinctive and unique traits which can be used to distinguish them thus, acting as a form of identification. Biometrics identify people by measuring some aspect of individual’s anatomy or physiology such as hand geometry or fingerprint which consists of a pattern of interleaved ridges and valleys. This work developed a system that determines human gender using fingerprint analysis trained with SVM+CNN (for gender classification). To build an accurate fingerprint based model for gender detection system using fingerprint pattern analysis, there are certain steps that must be taken, which include; Data collection (in conducting research, the first step is collecting data in the form of a set of fingerprint image), Pre-processing Data (before entering the training data, pre-processing data is performed, which is resize the fingerprint image 96x96 pixels). Training Data (in this processing the dataset will be trained using the Convolutional neural network and Support vector machine methodology. This training data processing is a stage where CNN + SVM are trained to obtained high accuracy from the classification conducted). Result Verification (after doing all the above process, at this stage, we will display the results of gender prediction based on fingerprint images in the application that has been making). SOCOFing database is made up of 6,000 fingerprint images from 600 African subjects. It contains unique attributes such as labels for gender, hand and finger name as well as synthetically altered versions with three different levels of alteration for obliteration, central rotation, and z-cut. The values for accuracy, sensitivity and precision using the CNN classifier at threshold 0.25 were 96%, 97.8% and 96.92% respectively. At threshold 0.45 the values were 96.3%, 97.6% and 97.6% respectively. At threshold 0.75 the values were 96.5%, 97.3% and 97.9% respectively. In case of the SVM classifier, at threshold 0.25 were 94.3%, 96.6% and 95.8% respectively. At threshold 0.45 the values were 94.5%, 96.4% and 96.2% respectively. At threshold 0.75 the values were 94.8%, 97.3% and 96.8% respectively. From the 600 fingerprints classified, it was observed that a total of 450 fingerprints were detected for male and 150 for female. Results were obtained for gender accuracy, sensitivity and precision through several thresholds to compare the two classifiers. Howe","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122967042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A SURVEY ON EFFECTIVE MACHINE LEARNING TECHNIQUES IN THE FIELD OF CYBER SECURITY","authors":"Rishin Pandit","doi":"10.26483/ijarcs.v13i4.6893","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i4.6893","url":null,"abstract":"","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114514454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A REVIEW ON OPTIMIZATION TECHNIQUE FOR FAULT TOLERANCE IN CLOUD COMPUTING","authors":"Ms Nilophar, Ms Ankita Srivastava","doi":"10.26483/ijarcs.v13i4.6883","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i4.6883","url":null,"abstract":"It is the outcome of the emergence of on demand service in big scale distributed computing models. Adaptable technology because it delivers software and resources that can be flexibly scaled up and down. These systems have varying degrees of reliability. Tolerance to unexpected hardware or software failures is measured by a system's fault tolerance. As a result of cloud computing’s inability to handle a wide range of errors, its reputation has been tarnished. Tolerating Byzantine errors is difficult since they typically go unnoticed at the beginning and can quickly spread to other virtual machines before being discovered. Thus, vital applications such as air traffic control, online baking, and so on are still avoiding the cloud because of these concerns. As well as some existing models, the goal of this research is to better understand and compare fault tolerance strategies utilised for fault tolerance in cloud systems. The purpose of this work is to evaluate a cloud -based fault-optimization strategy that will address the shortcomings of existing algorithms.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133557203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ELEVATING INFORMATION SECURITY PRACTICES WITHIN SUDANESE HEALTHCARE ESTABLISHMENTS' STAFF","authors":"K. Saeed","doi":"10.26483/ijarcs.v13i4.6835","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i4.6835","url":null,"abstract":": In today’s digital era healthcare establishments find information technologies invaluable in daily tasks. The paper strongly based upon a research that is currently being conducted by the author and according to the results from the research survey only 20% of healthcare establishments in Sudan has security initiatives for their employees and make use of electronic security systems or even physical instruments to protect their assets and patients’ information, whilst on the contrary, 80% have no security measures or any security policies. This is due to there is a lack of academic and professional literature about information security management and information security culture. Moreover, as grew to the best knowledge of the author and extracted from the results, healthcare community thought their role is to heal patients and they do not have any responsibility to protect patients’ information, whereas they deem such role belong to the computer department, even if, these security breaches computer related (e.g. viruses), or socially motivated (e.g. theft of equipment). Therefore, the overall aim of this paper is to identify factors that assist the implementation of information security culture and practices within healthcare establishments, and assist when conducting awareness programmers, so it discusses the need to promote information security issues within contemporary Sudanese healthcare establishments and the consequent need for appropriate training and awareness schemes. In addition, the paper highlights sequence basic elements that healthcare establishments should consider when construct a training and awareness program.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115380328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rushabh Kela, Abhinav Chawla, Pratishtha Gaur, Dr. Manikandan K
{"title":"IMPLEMENTATION OF CYBER SECURITY ATTACKS AND STRATEGIC MITIGATION MECHANISMS","authors":"Rushabh Kela, Abhinav Chawla, Pratishtha Gaur, Dr. Manikandan K","doi":"10.26483/ijarcs.v13i4.6890","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i4.6890","url":null,"abstract":"Cyber threats have increased drastically in the recent years and the most common targets are organisation applications or systems for data theft, disrupting the operations or any other malicious use. Incorporating website security prevents these sorts of attacks on the system. It is the act/practice of protecting websites from unauthorized access, use, modification, destruction, or disruption. A web application will be created and tested on various attacks such as Brute Force Dictionary attack, Denial-of-Service attacks, Cross Site Scripting (XSS) attack, NoSQL injections and WebSocket attacks. The vulnerabilities will be analysed, and resolved to ensure that the confidentiality, integrity, and authenticity of the user data is not compromised. To improve the website security and privacy, measures will be taken to add security features and the code of the website will be modified.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"2 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133169203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}