International Journal of Scientific Research in Computer Science, Engineering and Information Technology最新文献

筛选
英文 中文
Multi User Authentication for Reliable Data Storage in Cloud Computing 云计算中可靠数据存储的多用户身份验证
Richa Shah, Shatendra Kumar Dubey
{"title":"Multi User Authentication for Reliable Data Storage in Cloud Computing","authors":"Richa Shah, Shatendra Kumar Dubey","doi":"10.32628/cseit2410138","DOIUrl":"https://doi.org/10.32628/cseit2410138","url":null,"abstract":"Today's digital environment, Multi-user authentication plays a crucial role in ensuring data integrity and confidentiality, emphasizing its importance of reliable and secure data storage in cloud computing environments. The exploration extends to the strategies for implementing secure multi-user authentication, encompassing aspects such as password policies, biometric verification, encryption, role-based access control (RBAC), and multi-factor authentication (MFA). The issue of reliable data storage is covered in further detail, on the importance of data availability and integrity.  Real-world applications of multi-user authentication and reliable data storage are examine. The paper elucidates how these applications enhance overall security, mitigating risks associated with unauthorized access and cyber threats.The paper concludes by integration of multi-user authentication and reliable data storage is explored through considerations the critical role of multi-user authentication in ensuring reliable data storage in cloud computing such as secure API access, token-based authentication, and adherence to security best practices. Challenges in user authentication are addressed, with solutions proposed for seamless access across cloud platforms, including the adoption of Single Sign-On (SSO), multi-factor authentication, regular security audits, collaboration with cloud security experts, and user education and training. The synthesis of challenges, benefits, drawbacks, and implementation strategies provides organizations with a comprehensive guide for enhancing their data security measures.              ","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"62 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140253062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Sentiment and Emotion Analysis for Computational Literary Studies 情感与情绪分析在计算文学研究中的应用综述
Nasrullah Makhdom, H. N. Verma, Arun Kumar Yadav
{"title":"A Review on Sentiment and Emotion Analysis for Computational Literary Studies","authors":"Nasrullah Makhdom, H. N. Verma, Arun Kumar Yadav","doi":"10.32628/cseit241029","DOIUrl":"https://doi.org/10.32628/cseit241029","url":null,"abstract":"In sentiment analysis, emotions refer to the subjective feelings expressed in a text or speech that can be classified as positive, negative or neutral. Emotions are an important aspect of sentiment analysis because they provide insights into the attitudes, opinions and behaviors of individuals toward a particular topic or entity. The emergence of digital humanities has allowed for a more computational approach to understanding emotions in literature. The passage provides an overview of existing research in this area and understanding the emotionality involved in  text. Throughout this survey, it has been demonstrated that sentiment and emotion analysis is increasingly attracting attention within the field of digital humanities, particularly in computational literary studies.              ","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"23 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140254360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Metropolitan Marvels : To Forge Seamless Possibilities for Urban Discoverability and Connectivity 大都会奇迹:为城市探索性和连通性创造无缝可能性
Divya Shree B, Disha R, Ms. Sreelatha, Shivangi Vishwakarma
{"title":"Metropolitan Marvels : To Forge Seamless Possibilities for Urban Discoverability and Connectivity","authors":"Divya Shree B, Disha R, Ms. Sreelatha, Shivangi Vishwakarma","doi":"10.32628/cseit241028","DOIUrl":"https://doi.org/10.32628/cseit241028","url":null,"abstract":"Embodies a particular approach with the devising set out to enrich the quality of the city living experience incorporating technology and real human relationships in applying information in the city. The research journey is going to trace dynamic pathways underpinning in software development through powerful tools like Android Studio among others that helps in designing simple and user-friendly interfaces that easily adjust themselves to the diversity of the residents who live in cities and visitors come to the city. It now focuses to build proper links of implementation not on the technological strides but only by increasing the spotlight. Reliability as well as availability is ensuring that hustling has a strong back-end that would handle the data smoothly by the use of applications like Firebase and Room Persistence. Added to it, the approach makes use of offline capabilities as well part of validation of strict security precursors for performing through real-user trials while designing the likes of the application in conformance to the changing user preferences of the urban communities. This methodology visualizes transformative fostering of people-centric cities in successfully intricacy technology by richness of human experiences within innovative city information application, and elevated urbanlifestyles. ","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"11 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140261953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Effectiveness of Machine Learning Algorithms in Image Forgery Detection 探索机器学习算法在图像伪造检测中的有效性
Niyati Patel, Premal J.Patel
{"title":"Exploring the Effectiveness of Machine Learning Algorithms in Image Forgery Detection","authors":"Niyati Patel, Premal J.Patel","doi":"10.32628/cseit2390669","DOIUrl":"https://doi.org/10.32628/cseit2390669","url":null,"abstract":"This study investigates the efficacy of various machine learning algorithms for detecting image forgery, a prevalent issue in the realm of digital media manipulation. The research focuses on assessing the performance of these algorithms in accurately identifying instances of image tampering, aiming to contribute valuable insights to the field of digital forensics. The evaluation encompasses a diverse set of machine learning techniques, including but not limited to convolutional neural networks (CNNs), support vector machines (SVMs), and decision trees. Through rigorous experimentation and comparative analysis, the research aims to discern the strengths and limitations of each algorithm in the context of image forgery detection. The findings of this study hold significance for enhancing the capabilities of digital forensics tools, thereby aiding in the mitigation of fraudulent activities, and ensuring the integrity of visual content in the digital' domain.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"48 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139440869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review on Object Detectors for Urban Mobility on Smart Traffic Management 智能交通管理中的城市交通物体检测器综述
Shivani Mistry, S. Degadwala
{"title":"A Comprehensive Review on Object Detectors for Urban Mobility on Smart Traffic Management","authors":"Shivani Mistry, S. Degadwala","doi":"10.32628/cseit2361050","DOIUrl":"https://doi.org/10.32628/cseit2361050","url":null,"abstract":"This comprehensive review explores the landscape of object detectors in the context of urban mobility for smart traffic management. With the increasing complexity of urban environments and the integration of intelligent transportation systems, the demand for accurate and efficient object detection algorithms has surged. This paper provides a thorough examination of state-of-the-art object detectors, evaluating their performance, strengths, and limitations in the specific context of urban mobility. The review encompasses a wide range of detectors, including traditional computer vision methods and modern deep learning approaches, discussing their applicability to real-world urban traffic scenarios. By synthesizing insights from diverse methodologies, this review aims to guide researchers, practitioners, and policymakers in selecting suitable object detectors for enhancing smart traffic management systems in urban settings.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"461 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139263454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review on Email Spam Classification with Machine Learning Methods 利用机器学习方法对垃圾邮件进行分类的综合评述
Prachi Bhatnagar, S. Degadwala
{"title":"A Comprehensive Review on Email Spam Classification with Machine Learning Methods","authors":"Prachi Bhatnagar, S. Degadwala","doi":"10.32628/cseit2361048","DOIUrl":"https://doi.org/10.32628/cseit2361048","url":null,"abstract":"This comprehensive review delves into the realm of email spam classification, scrutinizing the efficacy of various machine learning methods employed in the ongoing battle against unwanted email communication. The paper synthesizes a wide array of research findings, methodologies, and performance metrics to provide a holistic perspective on the evolving landscape of spam detection. Emphasizing the pivotal role of machine learning in addressing the dynamic nature of spam, the review explores the strengths and limitations of popular algorithms such as Naive Bayes, Support Vector Machines, and neural networks. Additionally, it examines feature engineering, dataset characteristics, and evolving threats, offering insights into the challenges and opportunities within the field. With a focus on recent advancements and emerging trends, this review aims to guide researchers, practitioners, and developers in the ongoing pursuit of robust and adaptive email spam classification systems.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"98 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139279838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review on Multi-Class DDoS Attack Classification in IoT 物联网多类 DDoS 攻击分类综述
Shivani Sinha, Sheshang Degadwala
{"title":"A Comprehensive Review on Multi-Class DDoS Attack Classification in IoT","authors":"Shivani Sinha, Sheshang Degadwala","doi":"10.32628/cseit2361053","DOIUrl":"https://doi.org/10.32628/cseit2361053","url":null,"abstract":"This review paper provides a comprehensive analysis of multi-class Distributed Denial of Service (DDoS) attack classification in the context of Internet of Things (IoT) environments. The exponential growth of IoT devices has introduced new challenges in securing networks against sophisticated DDoS attacks. In this study, we explore and evaluate various classification techniques and methodologies designed to identify and mitigate multi-class DDoS attacks in IoT ecosystems. The paper synthesizes existing research, highlights key advancements, and identifies gaps in the current literature, offering insights into the state-of-the-art approaches for enhancing the security posture of IoT systems.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139281482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review on COVID-19 Cough Audio Classification through Deep Learning 通过深度学习对 COVID-19 咳嗽音频进行分类的综合评述
Praveen Gupta, S. Degadwala
{"title":"A Comprehensive Review on COVID-19 Cough Audio Classification through Deep Learning","authors":"Praveen Gupta, S. Degadwala","doi":"10.32628/cseit2361049","DOIUrl":"https://doi.org/10.32628/cseit2361049","url":null,"abstract":"This review paper provides a comprehensive analysis of the advancements in COVID-19 cough audio classification through deep learning techniques. With the ongoing global pandemic, there is a growing need for non-intrusive and rapid diagnostic tools, and the utilization of audio-based methods for COVID-19 detection has gained considerable attention. The paper systematically reviews and compares various deep learning models, methodologies, and datasets employed for COVID-19 cough audio classification. The effectiveness, challenges, and future directions of these approaches are discussed, shedding light on the potential of audio-based diagnostics in the context of the current public health crisis.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"83 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139281570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review on Adversarial Attack Detection Analysis in Deep Learning 深度学习中的对抗性攻击检测分析综述
Soni Kumari, S. Degadwala
{"title":"A Comprehensive Review on Adversarial Attack Detection Analysis in Deep Learning","authors":"Soni Kumari, S. Degadwala","doi":"10.32628/cseit2361054","DOIUrl":"https://doi.org/10.32628/cseit2361054","url":null,"abstract":"This comprehensive review investigates the escalating concern of adversarial attacks on deep learning models, offering an extensive analysis of state-of-the-art detection techniques. Encompassing traditional machine learning methods and contemporary deep learning approaches, the review categorizes and evaluates various detection mechanisms while addressing challenges such as the need for benchmark datasets and interpretability. Emphasizing the crucial role of explaining ability and trustworthiness, the paper also explores emerging trends, including the integration of technologies like explainable artificial intelligence (XAI) and reinforcement learning. By synthesizing existing knowledge and outlining future research directions, this review serves as a valuable resource for researchers, practitioners, and stakeholders seeking a nuanced understanding of adversarial attack detection in deep learning.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139281047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review on Deep Learning for Accurate Papaya Disease Identification 深度学习用于准确识别番木瓜病害的综述
Monali Parmar, S. Degadwala
{"title":"A Comprehensive Review on Deep Learning for Accurate Papaya Disease Identification","authors":"Monali Parmar, S. Degadwala","doi":"10.32628/cseit2361047","DOIUrl":"https://doi.org/10.32628/cseit2361047","url":null,"abstract":"This comprehensive review delves into the application of deep learning techniques for the precise identification of papaya diseases. With the increasing importance of papaya as a major tropical fruit crop, the accurate and timely diagnosis of diseases is crucial for effective disease management. The paper synthesizes recent advancements in deep learning methodologies, including convolutional neural networks (CNNs), recurrent neural networks (RNNs), and their variants, applied to image-based disease identification in papaya plants. The review assesses the strengths and limitations of various deep learning models, explores the integration of multi-modal data sources, and evaluates the performance metrics employed for disease detection accuracy. Additionally, the study discusses challenges and future directions in leveraging deep learning for papaya disease identification, aiming to provide a comprehensive understanding of the current state and potential advancements in this critical agricultural domain.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139281533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信