{"title":"Multi User Authentication for Reliable Data Storage in Cloud Computing","authors":"Richa Shah, Shatendra Kumar Dubey","doi":"10.32628/cseit2410138","DOIUrl":"https://doi.org/10.32628/cseit2410138","url":null,"abstract":"Today's digital environment, Multi-user authentication plays a crucial role in ensuring data integrity and confidentiality, emphasizing its importance of reliable and secure data storage in cloud computing environments. The exploration extends to the strategies for implementing secure multi-user authentication, encompassing aspects such as password policies, biometric verification, encryption, role-based access control (RBAC), and multi-factor authentication (MFA). The issue of reliable data storage is covered in further detail, on the importance of data availability and integrity. Real-world applications of multi-user authentication and reliable data storage are examine. The paper elucidates how these applications enhance overall security, mitigating risks associated with unauthorized access and cyber threats.The paper concludes by integration of multi-user authentication and reliable data storage is explored through considerations the critical role of multi-user authentication in ensuring reliable data storage in cloud computing such as secure API access, token-based authentication, and adherence to security best practices. Challenges in user authentication are addressed, with solutions proposed for seamless access across cloud platforms, including the adoption of Single Sign-On (SSO), multi-factor authentication, regular security audits, collaboration with cloud security experts, and user education and training. The synthesis of challenges, benefits, drawbacks, and implementation strategies provides organizations with a comprehensive guide for enhancing their data security measures. ","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"62 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140253062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Sentiment and Emotion Analysis for Computational Literary Studies","authors":"Nasrullah Makhdom, H. N. Verma, Arun Kumar Yadav","doi":"10.32628/cseit241029","DOIUrl":"https://doi.org/10.32628/cseit241029","url":null,"abstract":"In sentiment analysis, emotions refer to the subjective feelings expressed in a text or speech that can be classified as positive, negative or neutral. Emotions are an important aspect of sentiment analysis because they provide insights into the attitudes, opinions and behaviors of individuals toward a particular topic or entity. The emergence of digital humanities has allowed for a more computational approach to understanding emotions in literature. The passage provides an overview of existing research in this area and understanding the emotionality involved in text. Throughout this survey, it has been demonstrated that sentiment and emotion analysis is increasingly attracting attention within the field of digital humanities, particularly in computational literary studies. ","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"23 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140254360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metropolitan Marvels : To Forge Seamless Possibilities for Urban Discoverability and Connectivity","authors":"Divya Shree B, Disha R, Ms. Sreelatha, Shivangi Vishwakarma","doi":"10.32628/cseit241028","DOIUrl":"https://doi.org/10.32628/cseit241028","url":null,"abstract":"Embodies a particular approach with the devising set out to enrich the quality of the city living experience incorporating technology and real human relationships in applying information in the city. The research journey is going to trace dynamic pathways underpinning in software development through powerful tools like Android Studio among others that helps in designing simple and user-friendly interfaces that easily adjust themselves to the diversity of the residents who live in cities and visitors come to the city. It now focuses to build proper links of implementation not on the technological strides but only by increasing the spotlight. Reliability as well as availability is ensuring that hustling has a strong back-end that would handle the data smoothly by the use of applications like Firebase and Room Persistence. Added to it, the approach makes use of offline capabilities as well part of validation of strict security precursors for performing through real-user trials while designing the likes of the application in conformance to the changing user preferences of the urban communities. This methodology visualizes transformative fostering of people-centric cities in successfully intricacy technology by richness of human experiences within innovative city information application, and elevated urbanlifestyles. ","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"11 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140261953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Effectiveness of Machine Learning Algorithms in Image Forgery Detection","authors":"Niyati Patel, Premal J.Patel","doi":"10.32628/cseit2390669","DOIUrl":"https://doi.org/10.32628/cseit2390669","url":null,"abstract":"This study investigates the efficacy of various machine learning algorithms for detecting image forgery, a prevalent issue in the realm of digital media manipulation. The research focuses on assessing the performance of these algorithms in accurately identifying instances of image tampering, aiming to contribute valuable insights to the field of digital forensics. The evaluation encompasses a diverse set of machine learning techniques, including but not limited to convolutional neural networks (CNNs), support vector machines (SVMs), and decision trees. Through rigorous experimentation and comparative analysis, the research aims to discern the strengths and limitations of each algorithm in the context of image forgery detection. The findings of this study hold significance for enhancing the capabilities of digital forensics tools, thereby aiding in the mitigation of fraudulent activities, and ensuring the integrity of visual content in the digital' domain.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"48 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139440869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Review on Object Detectors for Urban Mobility on Smart Traffic Management","authors":"Shivani Mistry, S. Degadwala","doi":"10.32628/cseit2361050","DOIUrl":"https://doi.org/10.32628/cseit2361050","url":null,"abstract":"This comprehensive review explores the landscape of object detectors in the context of urban mobility for smart traffic management. With the increasing complexity of urban environments and the integration of intelligent transportation systems, the demand for accurate and efficient object detection algorithms has surged. This paper provides a thorough examination of state-of-the-art object detectors, evaluating their performance, strengths, and limitations in the specific context of urban mobility. The review encompasses a wide range of detectors, including traditional computer vision methods and modern deep learning approaches, discussing their applicability to real-world urban traffic scenarios. By synthesizing insights from diverse methodologies, this review aims to guide researchers, practitioners, and policymakers in selecting suitable object detectors for enhancing smart traffic management systems in urban settings.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"461 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139263454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Review on Email Spam Classification with Machine Learning Methods","authors":"Prachi Bhatnagar, S. Degadwala","doi":"10.32628/cseit2361048","DOIUrl":"https://doi.org/10.32628/cseit2361048","url":null,"abstract":"This comprehensive review delves into the realm of email spam classification, scrutinizing the efficacy of various machine learning methods employed in the ongoing battle against unwanted email communication. The paper synthesizes a wide array of research findings, methodologies, and performance metrics to provide a holistic perspective on the evolving landscape of spam detection. Emphasizing the pivotal role of machine learning in addressing the dynamic nature of spam, the review explores the strengths and limitations of popular algorithms such as Naive Bayes, Support Vector Machines, and neural networks. Additionally, it examines feature engineering, dataset characteristics, and evolving threats, offering insights into the challenges and opportunities within the field. With a focus on recent advancements and emerging trends, this review aims to guide researchers, practitioners, and developers in the ongoing pursuit of robust and adaptive email spam classification systems.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"98 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139279838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Review on Multi-Class DDoS Attack Classification in IoT","authors":"Shivani Sinha, Sheshang Degadwala","doi":"10.32628/cseit2361053","DOIUrl":"https://doi.org/10.32628/cseit2361053","url":null,"abstract":"This review paper provides a comprehensive analysis of multi-class Distributed Denial of Service (DDoS) attack classification in the context of Internet of Things (IoT) environments. The exponential growth of IoT devices has introduced new challenges in securing networks against sophisticated DDoS attacks. In this study, we explore and evaluate various classification techniques and methodologies designed to identify and mitigate multi-class DDoS attacks in IoT ecosystems. The paper synthesizes existing research, highlights key advancements, and identifies gaps in the current literature, offering insights into the state-of-the-art approaches for enhancing the security posture of IoT systems.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139281482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Review on COVID-19 Cough Audio Classification through Deep Learning","authors":"Praveen Gupta, S. Degadwala","doi":"10.32628/cseit2361049","DOIUrl":"https://doi.org/10.32628/cseit2361049","url":null,"abstract":"This review paper provides a comprehensive analysis of the advancements in COVID-19 cough audio classification through deep learning techniques. With the ongoing global pandemic, there is a growing need for non-intrusive and rapid diagnostic tools, and the utilization of audio-based methods for COVID-19 detection has gained considerable attention. The paper systematically reviews and compares various deep learning models, methodologies, and datasets employed for COVID-19 cough audio classification. The effectiveness, challenges, and future directions of these approaches are discussed, shedding light on the potential of audio-based diagnostics in the context of the current public health crisis.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"83 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139281570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Review on Adversarial Attack Detection Analysis in Deep Learning","authors":"Soni Kumari, S. Degadwala","doi":"10.32628/cseit2361054","DOIUrl":"https://doi.org/10.32628/cseit2361054","url":null,"abstract":"This comprehensive review investigates the escalating concern of adversarial attacks on deep learning models, offering an extensive analysis of state-of-the-art detection techniques. Encompassing traditional machine learning methods and contemporary deep learning approaches, the review categorizes and evaluates various detection mechanisms while addressing challenges such as the need for benchmark datasets and interpretability. Emphasizing the crucial role of explaining ability and trustworthiness, the paper also explores emerging trends, including the integration of technologies like explainable artificial intelligence (XAI) and reinforcement learning. By synthesizing existing knowledge and outlining future research directions, this review serves as a valuable resource for researchers, practitioners, and stakeholders seeking a nuanced understanding of adversarial attack detection in deep learning.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139281047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Review on Deep Learning for Accurate Papaya Disease Identification","authors":"Monali Parmar, S. Degadwala","doi":"10.32628/cseit2361047","DOIUrl":"https://doi.org/10.32628/cseit2361047","url":null,"abstract":"This comprehensive review delves into the application of deep learning techniques for the precise identification of papaya diseases. With the increasing importance of papaya as a major tropical fruit crop, the accurate and timely diagnosis of diseases is crucial for effective disease management. The paper synthesizes recent advancements in deep learning methodologies, including convolutional neural networks (CNNs), recurrent neural networks (RNNs), and their variants, applied to image-based disease identification in papaya plants. The review assesses the strengths and limitations of various deep learning models, explores the integration of multi-modal data sources, and evaluates the performance metrics employed for disease detection accuracy. Additionally, the study discusses challenges and future directions in leveraging deep learning for papaya disease identification, aiming to provide a comprehensive understanding of the current state and potential advancements in this critical agricultural domain.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139281533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}