The "Privacy Preservation in Surveillance Video Using Selective Encryption" study addresses the issue of privacy in surveillance videos. Video surveillance systems are widely deployed in many public places such as banks, supermarkets, airports, roads, and residential areas. However, the privacy of individuals in these videos is a major concern. The proposed system aims to conceal faces while not interfering with the observation and recognition of human activities. The system uses selective encryption to encrypt only the face region of the frames while other parts of the frame are retained as it is. The proposed method is reversible for revealing faces whenever needed to the authorized person using proper secret keys. The project also aims to ensure the security of the encryption algorithm used and provide a user-friendly interface for ease of use. Overall, this study aims to provide an efficient and scalable solution to the problem of privacy in surveillances.
{"title":"Protecting Privacy in Surveillance Systems via Selective Video Encryption","authors":"Mr. Nandish M","doi":"10.55041/ijsrem34554","DOIUrl":"https://doi.org/10.55041/ijsrem34554","url":null,"abstract":"The \"Privacy Preservation in Surveillance Video Using Selective Encryption\" study addresses the issue of privacy in surveillance videos. Video surveillance systems are widely deployed in many public places such as banks, supermarkets, airports, roads, and residential areas. However, the privacy of individuals in these videos is a major concern. The proposed system aims to conceal faces while not interfering with the observation and recognition of human activities. The system uses selective encryption to encrypt only the face region of the frames while other parts of the frame are retained as it is. The proposed method is reversible for revealing faces whenever needed to the authorized person using proper secret keys. The project also aims to ensure the security of the encryption algorithm used and provide a user-friendly interface for ease of use. Overall, this study aims to provide an efficient and scalable solution to the problem of privacy in surveillances.","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"80 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141101718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The innovative integration of real-time human detection improves both security and user experience in identity authentication. This approach improves authentication processes by analysing physiological and behavioural indicators such as face movements and eye movements, hence reducing fraud risks. Its deployment across sectors promises to enhance security in finance, healthcare, e-commerce, and law enforcement. Despite the hurdles, the benefits of this human-centered approach are enormous, indicating a more secure digital future. Keywords— Identity verification, live human detection, digital security, biometric authentication, user experience, fraud prevention, computer vision, physiological and behavioural cues, facial and vocal patterns, finance, healthcare, e-commerce, law enforcement.
{"title":"Revolutionizing Identity Verification and Recognition","authors":"Priti Nagtode","doi":"10.55041/ijsrem34580","DOIUrl":"https://doi.org/10.55041/ijsrem34580","url":null,"abstract":"The innovative integration of real-time human detection improves both security and user experience in identity authentication. This approach improves authentication processes by analysing physiological and behavioural indicators such as face movements and eye movements, hence reducing fraud risks. Its deployment across sectors promises to enhance security in finance, healthcare, e-commerce, and law enforcement. Despite the hurdles, the benefits of this human-centered approach are enormous, indicating a more secure digital future. Keywords— Identity verification, live human detection, digital security, biometric authentication, user experience, fraud prevention, computer vision, physiological and behavioural cues, facial and vocal patterns, finance, healthcare, e-commerce, law enforcement.","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"33 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141102765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Camshafts play a critical role in internal combustion engines, dictating the timing and duration of valve opening and closing events. To ensure optimal engine performance and longevity, camshaft design must balance factors such as strength, durability, and weight. Finite Element Analysis (FEA) offers a powerful tool for evaluating camshaft designs under varying operating conditions. This paper presents a comprehensive study on the design and analysis of camshafts using FEA, focusing on the influence of different heat-treated materials. The study begins with an overview of material selection criteria for camshaft applications, considering factors such as strength, fatigue resistance, and wear characteristics. Various materials high-performance alloys are investigated for their suitability and performance enhancements through heat treatment processes such as carburizing, quenching, and tempering. A detailed 3D CAD model of the camshaft geometry is developed, capturing key features such as lobes, journals, and bearings. Finite element meshing techniques are employed to ensure accurate representation of the geometry and precise stress analysis. Boundary conditions are defined to simulate realistic operating conditions, including forces exerted by cam followers and valve springs. Material properties are assigned to finite elements based on the selected materials and heat treatment parameters. Static and dynamic FEA analyses are conducted to evaluate stress distribution, deformation, fatigue life, and natural frequencies of the camshaft under varying load scenarios. The results of the FEA analyses are used to optimize the camshaft design iteratively, considering factors such as weight reduction, performance enhancement, and durability improvement. Validation of FEA results is performed through physical testing and comparison with empirical data. Overall, this paper provides valuable insights into the design and analysis of camshafts using FEA, highlighting the importance of material selection and heat treatment processes in optimizing camshaft performance and reliability in automotive engine applications. Key Words: Design, Analysis, geartrain, idler gear, FEA, reciprocating motion, Solid works, CAD, ANSYS, efficiency, IC engines, camshaft.
凸轮轴在内燃机中起着至关重要的作用,它决定着气门开启和关闭的时间和持续时间。为确保发动机的最佳性能和使用寿命,凸轮轴的设计必须兼顾强度、耐用性和重量等因素。有限元分析(FEA)为评估不同工作条件下的凸轮轴设计提供了强有力的工具。本文介绍了利用有限元分析进行凸轮轴设计和分析的综合研究,重点是不同热处理材料的影响。研究首先概述了凸轮轴应用的材料选择标准,考虑了强度、抗疲劳性和磨损特性等因素。通过渗碳、淬火和回火等热处理工艺,研究了各种材料高性能合金的适用性和性能提升。开发了凸轮轴几何形状的详细 3D CAD 模型,捕捉了叶片、轴颈和轴承等关键特征。采用有限元网格划分技术确保几何形状的准确表达和精确的应力分析。定义了边界条件,以模拟真实的工作条件,包括凸轮从动件和气门弹簧施加的力。根据所选材料和热处理参数为有限元分配材料属性。进行静态和动态有限元分析,以评估凸轮轴在不同负载情况下的应力分布、变形、疲劳寿命和固有频率。考虑到减轻重量、提高性能和耐用性等因素,利用有限元分析的结果反复优化凸轮轴的设计。通过物理测试以及与经验数据的比较,对有限元分析结果进行了验证。总之,本文为使用有限元分析设计和分析凸轮轴提供了宝贵的见解,突出了材料选择和热处理工艺在优化汽车发动机应用中凸轮轴性能和可靠性方面的重要性。关键字设计,分析,传动系统,惰轮,有限元分析,往复运动,Solid works,CAD,ANSYS,效率,集成电路发动机,凸轮轴。
{"title":"FEA-Based Camshaft Design and Analysis on a Range of Heat-Treated Materials","authors":"Puppala Nagababu","doi":"10.55041/ijsrem34479","DOIUrl":"https://doi.org/10.55041/ijsrem34479","url":null,"abstract":"Camshafts play a critical role in internal combustion engines, dictating the timing and duration of valve opening and closing events. To ensure optimal engine performance and longevity, camshaft design must balance factors such as strength, durability, and weight. Finite Element Analysis (FEA) offers a powerful tool for evaluating camshaft designs under varying operating conditions. This paper presents a comprehensive study on the design and analysis of camshafts using FEA, focusing on the influence of different heat-treated materials. The study begins with an overview of material selection criteria for camshaft applications, considering factors such as strength, fatigue resistance, and wear characteristics. Various materials high-performance alloys are investigated for their suitability and performance enhancements through heat treatment processes such as carburizing, quenching, and tempering. A detailed 3D CAD model of the camshaft geometry is developed, capturing key features such as lobes, journals, and bearings. Finite element meshing techniques are employed to ensure accurate representation of the geometry and precise stress analysis. Boundary conditions are defined to simulate realistic operating conditions, including forces exerted by cam followers and valve springs. Material properties are assigned to finite elements based on the selected materials and heat treatment parameters. Static and dynamic FEA analyses are conducted to evaluate stress distribution, deformation, fatigue life, and natural frequencies of the camshaft under varying load scenarios. The results of the FEA analyses are used to optimize the camshaft design iteratively, considering factors such as weight reduction, performance enhancement, and durability improvement. Validation of FEA results is performed through physical testing and comparison with empirical data. Overall, this paper provides valuable insights into the design and analysis of camshafts using FEA, highlighting the importance of material selection and heat treatment processes in optimizing camshaft performance and reliability in automotive engine applications. Key Words: Design, Analysis, geartrain, idler gear, FEA, reciprocating motion, Solid works, CAD, ANSYS, efficiency, IC engines, camshaft.","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"49 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141109066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Speech-to-text translation is pivotal in overcoming language barriers and enhancing communication across cultures. This paper introduces a novel application that leverages the Seamless M4T model and Gradio UI for accurate and efficient speech-to-text translation. The system supports multiple languages, with a focus on English and Tamil, and integrates audio input from diverse sources. Gradio UI’s intuitive interface ensures the application’s accessibility to a broad audience. The system’s performance, evaluated through various test cases, demonstrates its robustness and accuracy, marking a significant advancement in communication technology. Keywords— Artificial Intelligence, Multilingual Communication, Speech Recognition, Speech-to-Text Translation, User Interface Design, Gradio UI, Seamless M4T.
{"title":"SEAMLESS M4T-POWERED SPEECH TO TEXT WITH GRADIO UI","authors":"M. R","doi":"10.55041/ijsrem33886","DOIUrl":"https://doi.org/10.55041/ijsrem33886","url":null,"abstract":"Speech-to-text translation is pivotal in overcoming language barriers and enhancing communication across cultures. This paper introduces a novel application that leverages the Seamless M4T model and Gradio UI for accurate and efficient speech-to-text translation. The system supports multiple languages, with a focus on English and Tamil, and integrates audio input from diverse sources. Gradio UI’s intuitive interface ensures the application’s accessibility to a broad audience. The system’s performance, evaluated through various test cases, demonstrates its robustness and accuracy, marking a significant advancement in communication technology. Keywords— Artificial Intelligence, Multilingual Communication, Speech Recognition, Speech-to-Text Translation, User Interface Design, Gradio UI, Seamless M4T.","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"64 30","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141110654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
alzheimer's Disease (AD) is a progressive neurodegenerative disorder that affects millions of people worldwide and causes cognitive impairment. It is the most common cause of dementia, a general term for a decline in cognitive abilities that interfere with daily life. Deep Learning, the subset of Artificial Intelligence is used in the early detection of Alzheimer's Disease. The human-level performance of the Deep Learning algorithm has been effectively shown in different disciplines. There isn’t a specific algorithm that is universal, but various Deep Learning algorithms, are used for the early detection of Alzheimer’s Disease. Researchers developed a blood test that could detect Alzheimer’s Disease promoting compounds in blood before the symptoms emerged. These findings may lead to early diagnostic tests for Alzheimer’s and other neurodegenerative diseases. Through research on the “Early detection of Alzheimer’s Disease using Deep Learning”, we can learn more about the potential of using advanced technology to identify the disease at its earliest stages. It also discusses the challenges and limitations of using Deep Learning for Alzheimer's Disease detection and highlights the need for future research in this area. Additionally, it can provide insights into the progression of the disease and potentially lead to the development of more accurate diagnostic tools. KEYWORDS: Alzheimer’s Disease, neurodegenerative, dementia, Early diagnosis, Deep Learning algorithms
{"title":"Early detection of Alzheimer’s Disease using Deep Learning","authors":"M. M. B. S. Sree","doi":"10.55041/ijsrem34463","DOIUrl":"https://doi.org/10.55041/ijsrem34463","url":null,"abstract":"alzheimer's Disease (AD) is a progressive neurodegenerative disorder that affects millions of people worldwide and causes cognitive impairment. It is the most common cause of dementia, a general term for a decline in cognitive abilities that interfere with daily life. Deep Learning, the subset of Artificial Intelligence is used in the early detection of Alzheimer's Disease. The human-level performance of the Deep Learning algorithm has been effectively shown in different disciplines. There isn’t a specific algorithm that is universal, but various Deep Learning algorithms, are used for the early detection of Alzheimer’s Disease. Researchers developed a blood test that could detect Alzheimer’s Disease promoting compounds in blood before the symptoms emerged. These findings may lead to early diagnostic tests for Alzheimer’s and other neurodegenerative diseases. Through research on the “Early detection of Alzheimer’s Disease using Deep Learning”, we can learn more about the potential of using advanced technology to identify the disease at its earliest stages. It also discusses the challenges and limitations of using Deep Learning for Alzheimer's Disease detection and highlights the need for future research in this area. Additionally, it can provide insights into the progression of the disease and potentially lead to the development of more accurate diagnostic tools. KEYWORDS: Alzheimer’s Disease, neurodegenerative, dementia, Early diagnosis, Deep Learning algorithms","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"23 22","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141110304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research paper introduces a groundbreaking Solar-powered wireless charging solution for electric vehicles, responding to the global shift toward sustainable transportation. The project employs solar panels to efficiently capture and store energy, utilizing wireless energy transfer technology for eco-friendly EV charging. Key objectives include harnessing solar energy, wireless power transmission, DC charging, and lowering our dependency on traditional grid electricity. The project's weight stems from its potential to advance sustainable transportation, reduce emissions, and drive innovation in wireless power transfer and solar technology. It serves as a proof-of-concept, demonstrating feasibility, inspiring investment, and promoting awareness of renewable energy's role in EV charging for a greener future. Keywords : Future mobility trends, Innovation in charging technology, Sustainable transportation, Wireless energy transfer
{"title":"SOLAR WIRELESS ELECTRIC VEHICLE CHARGING SYSTEM","authors":"Amar Kamble,","doi":"10.55041/ijsrem34501","DOIUrl":"https://doi.org/10.55041/ijsrem34501","url":null,"abstract":"This research paper introduces a groundbreaking Solar-powered wireless charging solution for electric vehicles, responding to the global shift toward sustainable transportation. The project employs solar panels to efficiently capture and store energy, utilizing wireless energy transfer technology for eco-friendly EV charging. Key objectives include harnessing solar energy, wireless power transmission, DC charging, and lowering our dependency on traditional grid electricity. The project's weight stems from its potential to advance sustainable transportation, reduce emissions, and drive innovation in wireless power transfer and solar technology. It serves as a proof-of-concept, demonstrating feasibility, inspiring investment, and promoting awareness of renewable energy's role in EV charging for a greener future. Keywords : Future mobility trends, Innovation in charging technology, Sustainable transportation, Wireless energy transfer","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"59 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141113153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Water tanks are essential for storing and supplying clean water in both residential and industrial settings. However, over time, these tanks can accumulate sediment, algae, and other contaminants that can compromise water quality. Cleaning and maintaining water tanks is a critical task to ensure the supply of safe and clean water to consumers. The IoT-Based Water Tank Cleaner using STM32 project aims to address this issue by developing an innovative solution that automates the cleaning process of water tanks. This project leverages the power of the Internet of Things (IoT) and the capabilities of the STM32 microcontroller to create an intelligent and efficient water tank cleaning system. This project presents an innovative solution for water tank cleaning using the STM32 microcontroller and IoT (Internet of Things) technology. The proposed system automates the process of cleaning and monitoring water tanks, ensuring efficient operation and minimizing manual intervention. Water scarcity is a pressing global issue, necessitating efficient management of water resources. One significant aspect of water management is maintaining the cleanliness of water storage tanks, which often harbor contaminants due to neglect or inadequate cleaning procedures. This project introduces an IoT-based solution leveraging the STM32 microcontroller to automate the cleaning process of water tanks. The system employs sensors to monitor water quality, an actuator for tank cleaning, and IoT connectivity for remote monitoring and control. Key Words: Water tank cleaning, IoT-based solution, STM32, Water quality, Sediment removal
{"title":"IoT based Water Tank Cleaner using STM32","authors":"Gite Rutuja","doi":"10.55041/ijsrem34430","DOIUrl":"https://doi.org/10.55041/ijsrem34430","url":null,"abstract":"Water tanks are essential for storing and supplying clean water in both residential and industrial settings. However, over time, these tanks can accumulate sediment, algae, and other contaminants that can compromise water quality. Cleaning and maintaining water tanks is a critical task to ensure the supply of safe and clean water to consumers. The IoT-Based Water Tank Cleaner using STM32 project aims to address this issue by developing an innovative solution that automates the cleaning process of water tanks. This project leverages the power of the Internet of Things (IoT) and the capabilities of the STM32 microcontroller to create an intelligent and efficient water tank cleaning system. This project presents an innovative solution for water tank cleaning using the STM32 microcontroller and IoT (Internet of Things) technology. The proposed system automates the process of cleaning and monitoring water tanks, ensuring efficient operation and minimizing manual intervention. Water scarcity is a pressing global issue, necessitating efficient management of water resources. One significant aspect of water management is maintaining the cleanliness of water storage tanks, which often harbor contaminants due to neglect or inadequate cleaning procedures. This project introduces an IoT-based solution leveraging the STM32 microcontroller to automate the cleaning process of water tanks. The system employs sensors to monitor water quality, an actuator for tank cleaning, and IoT connectivity for remote monitoring and control. Key Words: Water tank cleaning, IoT-based solution, STM32, Water quality, Sediment removal","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"57 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141108480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research study thoroughly examines the situation of female entrepreneurship in India, focusing on its evolution, present state, challenges, and promising prospects. It meticulously examines the socio-cultural, economic, and regulatory barriers women entrepreneurs face, as well as the significant, positive impact of government efforts and policy assistance specifically designed to support female-led firms. It also highlights the socioeconomic contributions of women entrepreneurs, particularly in terms of economic growth, social empowerment, and community development. The study concludes with a set of recommendations for improving access to funding, mentorship, regulatory reforms, and cultural change in India, all aimed at fostering a more conducive environment for women entrepreneurs. The findings highlight the significant advancements in women's entrepreneurship in India, characterised by burgeoning participation and expansion into diverse industries. Female entrepreneurs are not just making socio-economic contributions; they are also driving economic expansion, promoting social empowerment, and fostering community development. Despite these achievements, they face persistent obstacles such as socio-cultural impediments, budgetary limitations, a lack of guidance, and regulatory hurdles. However, the potential of women entrepreneurs to overcome these challenges and contribute even more to India's progress is immense. Addressing these issues through ongoing government assistance, legislative overhauls, inclusion in financial services, skill enhancement, and societal transformation is crucial for establishing a more comprehensive and vibrant entrepreneurial environment. The promotion of the economic and social advancement of women entrepreneurs is not just a necessity but a beacon of hope for achieving long-term and equitable progress in India. Key Words: Women Entrepreneurs, Women Empowerment, Entrepreneurship
{"title":"COMPREHENSIVE STUDY ON PROSPECTS AND CHALLENGES OF WOMEN ENTREPRENEURSHIP IN INDIA","authors":"Ashutosh Singh","doi":"10.55041/ijsrem34464","DOIUrl":"https://doi.org/10.55041/ijsrem34464","url":null,"abstract":"This research study thoroughly examines the situation of female entrepreneurship in India, focusing on its evolution, present state, challenges, and promising prospects. It meticulously examines the socio-cultural, economic, and regulatory barriers women entrepreneurs face, as well as the significant, positive impact of government efforts and policy assistance specifically designed to support female-led firms. It also highlights the socioeconomic contributions of women entrepreneurs, particularly in terms of economic growth, social empowerment, and community development. The study concludes with a set of recommendations for improving access to funding, mentorship, regulatory reforms, and cultural change in India, all aimed at fostering a more conducive environment for women entrepreneurs. The findings highlight the significant advancements in women's entrepreneurship in India, characterised by burgeoning participation and expansion into diverse industries. Female entrepreneurs are not just making socio-economic contributions; they are also driving economic expansion, promoting social empowerment, and fostering community development. Despite these achievements, they face persistent obstacles such as socio-cultural impediments, budgetary limitations, a lack of guidance, and regulatory hurdles. However, the potential of women entrepreneurs to overcome these challenges and contribute even more to India's progress is immense. Addressing these issues through ongoing government assistance, legislative overhauls, inclusion in financial services, skill enhancement, and societal transformation is crucial for establishing a more comprehensive and vibrant entrepreneurial environment. The promotion of the economic and social advancement of women entrepreneurs is not just a necessity but a beacon of hope for achieving long-term and equitable progress in India. Key Words: Women Entrepreneurs, Women Empowerment, Entrepreneurship","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"48 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141110851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The breakthrough of the self-driving car technology is a double-edged sword that gives us incredible opportunities and at the same time, it is the source of huge cybersecurity challenges. This paper champions the creation of a complete legal system and worldwide standards, like the ISO 26262, to regulate different parts of the autonomous vehicle (AV) operations, such as safety testing, liability, data privacy, and cybersecurity. By highlighting the significance of cybersecurity from the very start, the stakeholders and the automakers have to incorporate the practices like secure programming, routine updates, intrusion detection systems and encryption methods which will be the effective shield against the unauthorized access and data breaches. People should be informed and educated about the cybersecurity risks of AVs so that they can take the steps to protect themselves. Nevertheless, the integration of AVs with the Internet of Things (IoT) and other devices makes the cybersecurity landscape even more complicated, which means that there is a constant need for research and development to deal with problems like adversarial attacks. Presently, the deep learning-driven AV systems do not have the explainability which complicates the safety-critical applications, hence the need to increase the resilience training and deepen the deep learning models against attacks. The paper goes through all the literature on AV cybersecurity which stresses the need for functional safety standards and cybersecurity engineering guidelines. Collaboration between the governments, the industry, and the researchers is a must to set the legal foundations and the technical details for the AV cybersecurity across all levels of automation. Finally, solid cybersecurity is the key to the success of the autonomous vehicle revolution, hence the road to transformative safety, efficiency, and sustainability is paved. INDEX TERMS: Autonomous vehicles, Cybersecurity, ISO 26262, Encryption methods, ISO 21434, EU regulations, Security and Privacy.
自动驾驶汽车技术的突破是一把双刃剑,在给我们带来巨大机遇的同时,也带来了巨大的网络安全挑战。本文倡导建立完整的法律体系和世界性标准,如 ISO 26262,以规范自动驾驶汽车(AV)运营的各个环节,如安全测试、责任、数据隐私和网络安全。通过从一开始就强调网络安全的重要性,利益相关者和汽车制造商必须将安全编程、例行更新、入侵检测系统和加密方法等做法纳入其中,从而有效防止未经授权的访问和数据泄露。人们应该了解和认识到自动驾驶汽车的网络安全风险,以便采取措施保护自己。然而,自动驾驶汽车与物联网(IoT)和其他设备的整合使网络安全形势变得更加复杂,这意味着需要不断研发以应对对抗性攻击等问题。目前,深度学习驱动的视听系统不具备可解释性,这使得安全关键型应用变得更加复杂,因此有必要增加复原力训练,深化深度学习模型以应对攻击。本文详述了有关视听网络安全的所有文献,强调了功能安全标准和网络安全工程指南的必要性。政府、行业和研究人员之间必须开展合作,为各级自动化的视听网络安全制定法律基础和技术细节。最后,坚实的网络安全是自动驾驶汽车革命取得成功的关键,从而为实现安全、高效和可持续的变革铺平道路。索引词条:自动驾驶汽车、网络安全、ISO 26262、加密方法、ISO 21434、欧盟法规、安全与隐私。
{"title":"A Holistic Approach to Cybersecurity Integration in Autonomous Vehicles","authors":"Chandana R M","doi":"10.55041/ijsrem34426","DOIUrl":"https://doi.org/10.55041/ijsrem34426","url":null,"abstract":"The breakthrough of the self-driving car technology is a double-edged sword that gives us incredible opportunities and at the same time, it is the source of huge cybersecurity challenges. This paper champions the creation of a complete legal system and worldwide standards, like the ISO 26262, to regulate different parts of the autonomous vehicle (AV) operations, such as safety testing, liability, data privacy, and cybersecurity. By highlighting the significance of cybersecurity from the very start, the stakeholders and the automakers have to incorporate the practices like secure programming, routine updates, intrusion detection systems and encryption methods which will be the effective shield against the unauthorized access and data breaches. People should be informed and educated about the cybersecurity risks of AVs so that they can take the steps to protect themselves. Nevertheless, the integration of AVs with the Internet of Things (IoT) and other devices makes the cybersecurity landscape even more complicated, which means that there is a constant need for research and development to deal with problems like adversarial attacks. Presently, the deep learning-driven AV systems do not have the explainability which complicates the safety-critical applications, hence the need to increase the resilience training and deepen the deep learning models against attacks. The paper goes through all the literature on AV cybersecurity which stresses the need for functional safety standards and cybersecurity engineering guidelines. Collaboration between the governments, the industry, and the researchers is a must to set the legal foundations and the technical details for the AV cybersecurity across all levels of automation. Finally, solid cybersecurity is the key to the success of the autonomous vehicle revolution, hence the road to transformative safety, efficiency, and sustainability is paved. INDEX TERMS: Autonomous vehicles, Cybersecurity, ISO 26262, Encryption methods, ISO 21434, EU regulations, Security and Privacy.","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"49 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141111365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the current landscape where important processes are almost entirely dependent on web apps, SQL injection becomes an important issue for information-stealing throughout many organizations worldwide. This paper aims to review that data leak can be detected from a technical perspective of SQL injection including strategies and techniques to minimize related risk. As a first step, as an overview SQL injection and its associates with them consequences, the paper then go further to various important detection methods such as signatures and anomalies-based processes. It is noteworthy that the paper also explores the function of machine learning and artificial intelligence in improving recognition correctness. As we illustrate the effects of SQL injection attacks on various organizations, we will as well simulate the process of drawing the lessons learnt to prevent and combat the attacks. Obstacles and perspectives in the sphere are stated, which will guide a researcher and a practitioner on his way to raise the quality of data leak detecting technologies used across numerous branches of the economy. This article will weaving together the current blackout and will aims at identifying the gaps through which the attackers are able to get access to the system by the means of SQL injection. Keywords— Data leak detection, SQL injection, Web applications, Security, Detection techniques, Machine learning, Anomaly-based detection, Signature-based detection, Prevention, Mitigation.
{"title":"Advances in Data Leak Detection: A Review of SQL Injection Detection Techniques and Challenges","authors":"Komalseerut Kaur","doi":"10.55041/ijsrem34454","DOIUrl":"https://doi.org/10.55041/ijsrem34454","url":null,"abstract":"In the current landscape where important processes are almost entirely dependent on web apps, SQL injection becomes an important issue for information-stealing throughout many organizations worldwide. This paper aims to review that data leak can be detected from a technical perspective of SQL injection including strategies and techniques to minimize related risk. As a first step, as an overview SQL injection and its associates with them consequences, the paper then go further to various important detection methods such as signatures and anomalies-based processes. It is noteworthy that the paper also explores the function of machine learning and artificial intelligence in improving recognition correctness. As we illustrate the effects of SQL injection attacks on various organizations, we will as well simulate the process of drawing the lessons learnt to prevent and combat the attacks. Obstacles and perspectives in the sphere are stated, which will guide a researcher and a practitioner on his way to raise the quality of data leak detecting technologies used across numerous branches of the economy. This article will weaving together the current blackout and will aims at identifying the gaps through which the attackers are able to get access to the system by the means of SQL injection. Keywords— Data leak detection, SQL injection, Web applications, Security, Detection techniques, Machine learning, Anomaly-based detection, Signature-based detection, Prevention, Mitigation.","PeriodicalId":13661,"journal":{"name":"INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT","volume":"13 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141112323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}