首页 > 最新文献

International Journal of Recent Technology and Engineering最新文献

英文 中文
Baseband Signal Generation for Multi-Function Phased Array Radar 多功能相控阵雷达基带信号的产生
Pub Date : 2020-05-30 DOI: 10.35940/ijrte.f9536.059120
The multi-function phased array radar (MPAR) is used for weather monitoring, air-traffic control requirements and non-cooperative elements monitoring in a parallel manner. The amplitude of the radio frequency signal is varied depending on the location of the target from the radar. The proposed work generates a signal which is used as a input for RF transmitter of Multifunction Phased Array Radar. To achieve this MPAR requirement, the in-phase and quadrature-phase samples are generated for a high data rate using MATLAB and then VHDL output was obtained from Xilinx for QPSK and QAM modulation techniques.
多功能相控阵雷达(MPAR)以并行方式用于天气监测、空中交通管制要求和非合作要素监测。无线电频率信号的幅度根据雷达上目标的位置而变化。所提出的工作产生的信号作为多功能相控阵雷达射频发射机的输入。为了实现这种MPAR要求,使用MATLAB生成高数据速率的同相和正交相样本,然后从Xilinx获得QPSK和QAM调制技术的VHDL输出。
{"title":"Baseband Signal Generation for Multi-Function Phased Array Radar","authors":"","doi":"10.35940/ijrte.f9536.059120","DOIUrl":"https://doi.org/10.35940/ijrte.f9536.059120","url":null,"abstract":"The multi-function phased array radar (MPAR) is used for weather monitoring, air-traffic control requirements and non-cooperative elements monitoring in a parallel manner. The amplitude of the radio frequency signal is varied depending on the location of the target from the radar. The proposed work generates a signal which is used as a input for RF transmitter of Multifunction Phased Array Radar. To achieve this MPAR requirement, the in-phase and quadrature-phase samples are generated for a high data rate using MATLAB and then VHDL output was obtained from Xilinx for QPSK and QAM modulation techniques.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125572423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
URL Based Phishing Detection 基于URL的网络钓鱼检测
Pub Date : 2020-05-30 DOI: 10.35940/ijrte.a2657.059120
Damage caused due to phishing attacks is that which targets the user's personal information. Phishing includes sending a user an email, or causing a phishing page to steal personal information from a user. Blacklist-based detection techniques can detect this form of attack; however, these approaches have certain limitations, and the number of people affecting have continued to grow. The aim of a technique for phishing detection using machine learning to identify each URL into either a legitimate URL or a phished URL. Data availability here in this proposed solution is the key to executing the solution and if there is any issue with data availability it can cost the project accuracy. Data used for model testing must be reliable and appropriate to almost identify all the websites that the user wants to check. Model consistency is another factor that may trigger project failure so the model has to be accurate in determining a true identity of URLs. This technique employs features of a standardized resource locator (URL). The features have been defined which contain URLs for the phishing site. The suggested approach employs certain characteristics to detect phishing. The strategy was tested with a data collection of 3,000 URLs for the phishing site and 3,000 valid URLs for the site. The findings show that more than 90 percent of phishing sites can be identified by the proposed technique
网络钓鱼攻击针对的是用户的个人信息。网络钓鱼包括向用户发送电子邮件,或导致网络钓鱼页面窃取用户的个人信息。基于黑名单的检测技术可以检测到这种形式的攻击;但是,这些办法有一定的局限性,受影响的人数继续增加。网络钓鱼检测技术的目的是使用机器学习将每个URL识别为合法URL或被网络钓鱼的URL。在此建议的解决方案中,数据可用性是执行解决方案的关键,如果数据可用性出现任何问题,可能会影响项目的准确性。用于模型测试的数据必须是可靠和适当的,以几乎确定用户想要检查的所有网站。模型一致性是另一个可能引发项目失败的因素,因此模型在确定url的真实身份时必须准确。该技术使用了标准化资源定位器(URL)的特性。已经定义了包含钓鱼网站url的特性。建议的方法采用某些特征来检测网络钓鱼。对该策略进行了测试,收集了网络钓鱼站点的3,000个url和该站点的3,000个有效url的数据。研究结果表明,超过90%的网络钓鱼网站可以通过提出的技术来识别
{"title":"URL Based Phishing Detection","authors":"","doi":"10.35940/ijrte.a2657.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2657.059120","url":null,"abstract":"Damage caused due to phishing attacks is that which targets the user's personal information. Phishing includes sending a user an email, or causing a phishing page to steal personal information from a user. Blacklist-based detection techniques can detect this form of attack; however, these approaches have certain limitations, and the number of people affecting have continued to grow. The aim of a technique for phishing detection using machine learning to identify each URL into either a legitimate URL or a phished URL. Data availability here in this proposed solution is the key to executing the solution and if there is any issue with data availability it can cost the project accuracy. Data used for model testing must be reliable and appropriate to almost identify all the websites that the user wants to check. Model consistency is another factor that may trigger project failure so the model has to be accurate in determining a true identity of URLs. This technique employs features of a standardized resource locator (URL). The features have been defined which contain URLs for the phishing site. The suggested approach employs certain characteristics to detect phishing. The strategy was tested with a data collection of 3,000 URLs for the phishing site and 3,000 valid URLs for the site. The findings show that more than 90 percent of phishing sites can be identified by the proposed technique","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126823166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of Different Security Mechanisms and Methods to Protect Data in the Cloud Computing Enviornment 云计算环境下数据保护的不同安全机制和方法评估
Pub Date : 2020-05-30 DOI: 10.35940/ijrte.a2186.059120
M. Moudgil, A. Lamba, Priya Gupta
Cloud Computing has a several advantages, but it also carries additional issues like security, application security, virtualization security, authentication, access control and identity management. This paper is focusing on the current research relating on the cloud computing. This paper visualizes and deals on the various areas of security parameters in the cloud computing which includes Risk Management, Framework, Compliance, Interoperability, Lifecycle Management, Internet access Security, Data Centre Operations, Business Continuity, Incident Response, Key Management and Encryption, Access Management and identity, Dynamic access Security and Static Access Security and a lot more. In this paper we use various assessments and classification results to clear the similarities, also to exploring the various differences in the architectural methods of the cloud computing and further to determine the arears demanding with research. This paper provides findings and the assessments which can help the researcher to analysing the finest scenario for designing a well secured environment of cloud computing
云计算有几个优点,但它也带来了额外的问题,如安全性、应用程序安全性、虚拟化安全性、身份验证、访问控制和身份管理。本文对云计算的研究现状进行了综述。本文对云计算安全参数的各个领域进行了可视化处理,包括风险管理、框架、合规性、互操作性、生命周期管理、互联网访问安全、数据中心运营、业务连续性、事件响应、密钥管理和加密、访问管理和身份、动态访问安全和静态访问安全等等。在本文中,我们使用各种评估和分类结果来明确相似之处,并探索云计算架构方法的各种差异,进一步确定需要研究的领域。本文提供了研究结果和评估,可以帮助研究人员分析设计良好安全的云计算环境的最佳场景
{"title":"Assessment of Different Security Mechanisms and Methods to Protect Data in the Cloud Computing Enviornment","authors":"M. Moudgil, A. Lamba, Priya Gupta","doi":"10.35940/ijrte.a2186.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2186.059120","url":null,"abstract":"Cloud Computing has a several advantages, but it also carries additional issues like security, application security, virtualization security, authentication, access control and identity management. This paper is focusing on the current research relating on the cloud computing. This paper visualizes and deals on the various areas of security parameters in the cloud computing which includes Risk Management, Framework, Compliance, Interoperability, Lifecycle Management, Internet access Security, Data Centre Operations, Business Continuity, Incident Response, Key Management and Encryption, Access Management and identity, Dynamic access Security and Static Access Security and a lot more. In this paper we use various assessments and classification results to clear the similarities, also to exploring the various differences in the architectural methods of the cloud computing and further to determine the arears demanding with research. This paper provides findings and the assessments which can help the researcher to analysing the finest scenario for designing a well secured environment of cloud computing","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123304746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Insight into Traffic Light Discernment and Cognizance using Support Vector Machine, Multi Class Learning and Deep Learning Concepts 基于支持向量机、多类学习和深度学习概念的交通信号灯识别与识别
Pub Date : 2020-05-30 DOI: 10.35940/ijrte.a3074.059120
This paper principally combines ideas of laptop vision, machine learning and deep learning for correct detection of traffic lights and their classifications. It checks for each circular and arrow stoplight cases. Color filtering and blob discover ion area unit principally to detect the candidates (traffic lights) [6]. Then, a PCA network is employed as a multiclass classifier which provides the result sporadically. MOT will used for more trailing method and prediction filters out false positives. Sometimes, vote theme can even be used rather than MOT. This method will be simply fitted into ADAS vehicles once hardware thinks about. Recognition is as vital as detective work the traffic lights. While not recognition, no full data will be transmitted [2]. Many complicated TLR’s will give advance functions like observing the most the most for a specific route (when there's quite one) and the way removed from the driving force [3]. Deep learning is additionally one among the rising techniques for analysis areas [7]. Object detection comes as associate integral a part of laptop vision. Object detection will be best utilized in create estimation, vehicle detection, police work etc. In detection algorithms, we tend to incline to draw a bounding box round the object of interest to find it among the image. Also, the drawing of the bounding box isn't distinctive and might hyperbolically looking on the need [9].
本文主要结合了笔记本电脑视觉、机器学习和深度学习的思想,对交通灯进行正确的检测和分类。它检查每个圆形和箭头信号灯的情况。颜色滤波和斑点发现离子面积单元主要用于检测候选点(交通灯)[6]。然后,采用PCA网络作为多类分类器,零星地提供结果。MOT将用于更多的跟踪方法和预测过滤掉误报。有时,投票主题甚至可以使用,而不是MOT。一旦硬件考虑,这种方法将简单地应用于ADAS车辆。识别就像侦探工作和交通灯一样重要。虽然不能识别,但不会传输完整的数据[2]。许多复杂的TLR会提供一些先进的功能,比如观察一条特定路线(当有一条路线时)和从驱动力中移除的路线[3]。深度学习也是分析领域的新兴技术之一[7]。目标检测是笔记本电脑视觉的一个重要组成部分。目标检测将在创建估计、车辆检测、警务工作等方面得到最好的应用。在检测算法中,我们倾向于在感兴趣的对象周围画一个边界框,以便在图像中找到它。此外,边界框的绘制并不独特,可能会夸张地看待需求[9]。
{"title":"An Insight into Traffic Light Discernment and Cognizance using Support Vector Machine, Multi Class Learning and Deep Learning Concepts","authors":"","doi":"10.35940/ijrte.a3074.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a3074.059120","url":null,"abstract":"This paper principally combines ideas of laptop vision, machine learning and deep learning for correct detection of traffic lights and their classifications. It checks for each circular and arrow stoplight cases. Color filtering and blob discover ion area unit principally to detect the candidates (traffic lights) [6]. Then, a PCA network is employed as a multiclass classifier which provides the result sporadically. MOT will used for more trailing method and prediction filters out false positives. Sometimes, vote theme can even be used rather than MOT. This method will be simply fitted into ADAS vehicles once hardware thinks about. Recognition is as vital as detective work the traffic lights. While not recognition, no full data will be transmitted [2]. Many complicated TLR’s will give advance functions like observing the most the most for a specific route (when there's quite one) and the way removed from the driving force [3]. Deep learning is additionally one among the rising techniques for analysis areas [7]. Object detection comes as associate integral a part of laptop vision. Object detection will be best utilized in create estimation, vehicle detection, police work etc. In detection algorithms, we tend to incline to draw a bounding box round the object of interest to find it among the image. Also, the drawing of the bounding box isn't distinctive and might hyperbolically looking on the need [9].","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123392016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Isothermal Treatment at Low Temperatures Applied to AISI 4340 Steel: Effects on Hardness, Toughness and Microstructure AISI 4340钢低温等温处理对硬度、韧性和显微组织的影响
Pub Date : 2020-05-30 DOI: 10.35940/ijrte.a2722.059120
The effect of the parameters of isothermal treatment at low temperatures, also called Austempering, on the impact toughness, hardness and microstructure of AISI 4340 steel was investigated. For this purpose, specimens for impact toughness tests were machined according to ASTM E 23-93a. For hardness tests, prismatic bars of 10mmx10mmx30 mm were manufactured. Austempering was performed in a salt bath furnace using 55% sodium nitrate and 45% potassium nitrate. Three temperatures: 300, 325 and 350 °C, and four soaking times: 1 min, 10 min, 1 hour and 10 hours, were used. Hardness tests were performed on Rockwell durometer and three indentations per sample on HRc scale were made. The impact toughness test was done with the Charpy method. The specimens, previously machined, were subjected to austempering, and then subjected to the respective tests. The maximum hardness value 56.75 HRC was found at 300 °C with 10 min of soaking time, and the maximum impact toughness value was 27.67 J, found under the same conditions. It was observed that the hardness and impact resistance are not always inversely related during Austempering. In all microstructure tests, a biphasic structure composed of lower bainite with lath martensite in different proportions was observed, showing that the bainitic reaction is never complete. it is concluded that when alloyed steels are subjected to the Austempering treatment, a decrease in hardness with the soaking time or variation in temperatura, is not always accompanied by an increase in impact toughness, since undissolved alloyed carbides can produce embrittlement at any time and temperature interval.
研究了低温等温(奥氏回火)工艺参数对AISI 4340钢冲击韧性、硬度和显微组织的影响。为此,根据ASTM E 23-93a加工冲击韧性试验试样。为进行硬度测试,制作了10mmx10mmx30 mm的棱柱棒。采用55%硝酸钠和45%硝酸钾在盐浴炉中进行等温回火。采用300、325、350℃三种温度,1 min、10 min、1 h、10 h四种浸泡时间。在洛氏硬度计上进行硬度测试,每个样品在HRc标尺上做3个压痕。用夏比法进行了冲击韧性试验。将预先加工的试样进行等温回火,然后进行相应的试验。在300℃、浸泡时间10 min时,合金的最大硬度值为56.75 HRC,相同条件下的最大冲击韧性值为27.67 J。在等温回火过程中,硬度与抗冲击性能并不总是成反比关系。在所有的显微组织测试中,观察到由不同比例的下贝氏体和板条马氏体组成的双相组织,表明贝氏体反应不完全。结果表明,合金钢经奥氏回火处理后,硬度随浸泡时间或温度的变化而降低,但冲击韧性并不总是增加,因为未溶解的合金碳化物在任何时间和温度区间都能产生脆化。
{"title":"Isothermal Treatment at Low Temperatures Applied to AISI 4340 Steel: Effects on Hardness, Toughness and Microstructure","authors":"","doi":"10.35940/ijrte.a2722.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2722.059120","url":null,"abstract":"The effect of the parameters of isothermal treatment at low temperatures, also called Austempering, on the impact toughness, hardness and microstructure of AISI 4340 steel was investigated. For this purpose, specimens for impact toughness tests were machined according to ASTM E 23-93a. For hardness tests, prismatic bars of 10mmx10mmx30 mm were manufactured. Austempering was performed in a salt bath furnace using 55% sodium nitrate and 45% potassium nitrate. Three temperatures: 300, 325 and 350 °C, and four soaking times: 1 min, 10 min, 1 hour and 10 hours, were used. Hardness tests were performed on Rockwell durometer and three indentations per sample on HRc scale were made. The impact toughness test was done with the Charpy method. The specimens, previously machined, were subjected to austempering, and then subjected to the respective tests. The maximum hardness value 56.75 HRC was found at 300 °C with 10 min of soaking time, and the maximum impact toughness value was 27.67 J, found under the same conditions. It was observed that the hardness and impact resistance are not always inversely related during Austempering. In all microstructure tests, a biphasic structure composed of lower bainite with lath martensite in different proportions was observed, showing that the bainitic reaction is never complete. it is concluded that when alloyed steels are subjected to the Austempering treatment, a decrease in hardness with the soaking time or variation in temperatura, is not always accompanied by an increase in impact toughness, since undissolved alloyed carbides can produce embrittlement at any time and temperature interval.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121447220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Based Post Disaster Recovery System using Smartphone 基于物联网的智能手机灾后恢复系统
Pub Date : 2020-05-30 DOI: 10.35940/ijrte.a2873.059120
In recent decade’s severe natural or artificial disaster and further geologic processes have occurred with catastrophic consequences. Timely it should be detected and make it recovery. So, in this paper, we had proposed a multiterrain robot and other software systems to ease the detection. As the demand for multi-terrain robot applications are increasing significantly. This robot can be deployed for the use of assured future surveillance and extricate purposes in the isolated areas. In isolated areas robot stability will be challenging task due to varied terrain. A new design is propounded for the mobile robot which aims to execute monitoring performances while travelling on terrain types in balanced way. A chain-wheeled multi-terrain robot has been evolved which has ability to run in rough and unmanned surfaces.
近十年来发生的严重的自然或人为灾害和进一步的地质过程带来了灾难性的后果。应该及时发现并使其恢复。因此,在本文中,我们提出了一个多地形机器人和其他软件系统来简化检测。随着多地形机器人应用需求的显著增加。该机器人可用于确保未来在偏远地区的监视和救援目的。在偏远地区,由于地形多变,机器人的稳定性将是一项具有挑战性的任务。提出了一种新的移动机器人的设计方案,其目的是在不同地形类型上以平衡的方式行进时执行监测性能。研制了一种能够在粗糙地面和无人地面上运行的链轮多地形机器人。
{"title":"IoT Based Post Disaster Recovery System using Smartphone","authors":"","doi":"10.35940/ijrte.a2873.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2873.059120","url":null,"abstract":"In recent decade’s severe natural or artificial disaster and further geologic processes have occurred with catastrophic consequences. Timely it should be detected and make it recovery. So, in this paper, we had proposed a multiterrain robot and other software systems to ease the detection. As the demand for multi-terrain robot applications are increasing significantly. This robot can be deployed for the use of assured future surveillance and extricate purposes in the isolated areas. In isolated areas robot stability will be challenging task due to varied terrain. A new design is propounded for the mobile robot which aims to execute monitoring performances while travelling on terrain types in balanced way. A chain-wheeled multi-terrain robot has been evolved which has ability to run in rough and unmanned surfaces.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122276364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TASM: Trust Aware Scheme for Secure and Reliable Data Transmission in MANETS 基于信任感知的MANETS安全可靠数据传输方案
Pub Date : 2020-05-30 DOI: 10.35940/ijrte.f9596.059120
Wireless sensor nodes are tiny and have limited battery and memory. These sensor nodes are distributed and self organizing networks. Mobile Ad Hoc network (MANETs) has wide range of applications areas. Growing usage of MANETs in various applications makes a paramount issue in providing QoS. MANETs are vulnerable to different kinds of malicious attacks due to its dynamic nature, which affects nodes connectivity, increase in energy consumption and functionality. Centralized and cryptographic security approaches requires more computational functions which increases overhead. Traditional approaches have more overhead. Most existing trust-based security schemes for mobile ad-hoc networks (MANETs) consider packet loss an indicator of possible attacks by malicious nodes. Thus to achieve secure and reliable data transfer a trust aware scheme is required to evaluate trust level among honest and malicious nodes. In this paper we propose Trust Aware Scheme for Moving nodes (TASM) which discovers efficient node by computing each node’s trust value. In this scheme moving nodes exchange their trust information and analyses the received trust value and makes judgement. This scheme modifies the existing AODV routing protocol and determines malicious nodes based on trust value and log information. Received Signal Strength Indicator (RSSI) determines efficient and trusted neighbour node selection while routing. Proposed scheme is compared with the existing trust based scheme and network parameters like throughput, packet delivery ratio and end to end delay is evaluated. Trusted routing can efficiently deliver data for different routing applications used in military, Fanets and mobile IoT.
无线传感器节点很小,电池和内存有限。这些传感器节点是分布式自组织网络。移动自组网(manet)具有广泛的应用领域。在各种应用中不断增长的manet使用使得提供QoS成为一个至关重要的问题。由于其动态特性,manet容易受到各种恶意攻击,这会影响节点的连接,增加能耗和功能。集中式和加密安全方法需要更多的计算功能,这增加了开销。传统方法的开销更大。大多数现有的基于信任的移动自组织网络(manet)安全方案都将数据包丢失作为恶意节点可能攻击的指标。因此,为了实现安全可靠的数据传输,需要一种信任感知方案来评估诚实节点和恶意节点之间的信任程度。本文提出了移动节点信任感知方案(TASM),该方案通过计算每个节点的信任值来发现有效节点。在该方案中,移动节点相互交换信任信息,并对接收到的信任值进行分析和判断。该方案修改了现有的AODV路由协议,根据信任值和日志信息判断恶意节点。RSSI (Received Signal Strength Indicator,接收信号强度指示器)在路由过程中决定有效和可信的邻居节点选择。将提出的方案与现有的基于信任的方案进行了比较,并对吞吐量、分组投递率和端到端延迟等网络参数进行了评估。可信路由可以有效地为军事、fanet和移动物联网中使用的不同路由应用提供数据。
{"title":"TASM: Trust Aware Scheme for Secure and Reliable Data Transmission in MANETS","authors":"","doi":"10.35940/ijrte.f9596.059120","DOIUrl":"https://doi.org/10.35940/ijrte.f9596.059120","url":null,"abstract":"Wireless sensor nodes are tiny and have limited battery and memory. These sensor nodes are distributed and self organizing networks. Mobile Ad Hoc network (MANETs) has wide range of applications areas. Growing usage of MANETs in various applications makes a paramount issue in providing QoS. MANETs are vulnerable to different kinds of malicious attacks due to its dynamic nature, which affects nodes connectivity, increase in energy consumption and functionality. Centralized and cryptographic security approaches requires more computational functions which increases overhead. Traditional approaches have more overhead. Most existing trust-based security schemes for mobile ad-hoc networks (MANETs) consider packet loss an indicator of possible attacks by malicious nodes. Thus to achieve secure and reliable data transfer a trust aware scheme is required to evaluate trust level among honest and malicious nodes. In this paper we propose Trust Aware Scheme for Moving nodes (TASM) which discovers efficient node by computing each node’s trust value. In this scheme moving nodes exchange their trust information and analyses the received trust value and makes judgement. This scheme modifies the existing AODV routing protocol and determines malicious nodes based on trust value and log information. Received Signal Strength Indicator (RSSI) determines efficient and trusted neighbour node selection while routing. Proposed scheme is compared with the existing trust based scheme and network parameters like throughput, packet delivery ratio and end to end delay is evaluated. Trusted routing can efficiently deliver data for different routing applications used in military, Fanets and mobile IoT.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"60 20","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rfid Based Smart Trolley for Automatic Billing System 基于Rfid的智能推车自动计费系统
Pub Date : 2020-05-30 DOI: 10.35940/ijeat.a2401.069520
RachanaDoshi, AmritaSutar, SonaliAher, Sanvida Dalvi, Prof. B R Chandani
The modern technology has increased the standard of living for the humans and the large crowds are seen at shopping malls. To save time for the customers,it is important to reduce the process of the billing time. This is done using smart shopping system based on RFID. Items that are put in a smart shopping cart are read one by one and the bill is generated and displayed. After the final bill is generated, the customer pays the bill by using their Pre-charged cards provided by the shopping mall. The aim is to reduce the time consumption needed for the billing system.
现代科技提高了人们的生活水平,在购物中心可以看到大群人。为了节省客户的时间,减少计费过程的时间是很重要的。这是通过基于RFID的智能购物系统来实现的。放入智能购物车的物品会被逐一读取,然后生成并显示账单。最终账单生成后,顾客使用商场提供的预付卡支付账单。其目的是减少计费系统所需的时间消耗。
{"title":"Rfid Based Smart Trolley for Automatic Billing System","authors":"RachanaDoshi, AmritaSutar, SonaliAher, Sanvida Dalvi, Prof. B R Chandani","doi":"10.35940/ijeat.a2401.069520","DOIUrl":"https://doi.org/10.35940/ijeat.a2401.069520","url":null,"abstract":"The modern technology has increased the standard of living for the humans and the large crowds are seen at shopping malls. To save time for the customers,it is important to reduce the process of the billing time. This is done using smart shopping system based on RFID. Items that are put in a smart shopping cart are read one by one and the bill is generated and displayed. After the final bill is generated, the customer pays the bill by using their Pre-charged cards provided by the shopping mall. The aim is to reduce the time consumption needed for the billing system.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"35 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114127914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Extractive and Abstractive Text Summarization Techniques 抽取和抽象文本摘要技术
Pub Date : 2020-05-30 DOI: 10.35940/ijrte.a2235.059120
Text summarization generates an abstract version of information on a particular topic from various sources without modifying its originality. It is essential to dig information from the large repository of data, thereby eliminating the irrelevant information. The manual summarization consumes a large amount of time and hence an automated text summarization model is required. The summarization can be performed from a single source or multiple sources. The Natural Language Processing (NLP) based text summarization can be generally categorized as abstractive and extractive methods. The extractive methods mine the essential text from the document whereas the abstractive methods summarize the document by rewriting. The extractive summarization methods rely on topics and centrality of the document. The abstractive techniques transform the sentences based on the language resources available. This paper deals with the study of extractive as well as abstractive strategies in text summarization. Overall objective of this paper is to provide a significant direction to the researchers to learn about different strategies applied in text summarization.
文本摘要在不改变其原创性的情况下,从各种来源生成关于特定主题的信息的抽象版本。从庞大的数据存储库中挖掘信息,从而消除不相关的信息是至关重要的。手动摘要耗费大量的时间,因此需要一个自动文本摘要模型。可以从单个源或多个源执行汇总。基于自然语言处理(NLP)的文本摘要可以分为抽象方法和抽取方法。抽取方法从文档中挖掘关键文本,而抽象方法通过重写对文档进行总结。提取摘要方法依赖于文档的主题和中心性。抽象技术根据可用的语言资源对句子进行转换。本文研究了文本摘要中的抽取策略和抽象策略。本文的总体目的是为研究人员了解不同的文本摘要策略提供一个有意义的方向。
{"title":"Extractive and Abstractive Text Summarization Techniques","authors":"","doi":"10.35940/ijrte.a2235.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2235.059120","url":null,"abstract":"Text summarization generates an abstract version of information on a particular topic from various sources without modifying its originality. It is essential to dig information from the large repository of data, thereby eliminating the irrelevant information. The manual summarization consumes a large amount of time and hence an automated text summarization model is required. The summarization can be performed from a single source or multiple sources. The Natural Language Processing (NLP) based text summarization can be generally categorized as abstractive and extractive methods. The extractive methods mine the essential text from the document whereas the abstractive methods summarize the document by rewriting. The extractive summarization methods rely on topics and centrality of the document. The abstractive techniques transform the sentences based on the language resources available. This paper deals with the study of extractive as well as abstractive strategies in text summarization. Overall objective of this paper is to provide a significant direction to the researchers to learn about different strategies applied in text summarization.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"422 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113998455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Economical and Technical Assessment of Hybrid Renewable Energy Systems for Optimal Performance Applied in Hurghada, Egypt. 混合可再生能源系统在埃及赫尔格达应用的最佳性能的经济和技术评估。
Pub Date : 2020-05-30 DOI: 10.35940/ijrte.a1302.059120
Fathy Ghonima, M. Ezzat, T. Abdel-salam
This paper deals with economic and technical evaluation of the hybrid power system which is fed six-megawatt load located in a city in Egypt called Hurghada. There is two types of economical evaluation. The first type is Economical evaluation which has two parts, the first part is cost estimation to know the price of generating power of the hybrid system in every season to reveal the lowest and the highest cost of the power unit in every season and The second part is an economic load dispatch for the six-megawatt load to know which hybrid system topology gives the required power at low cost and which topology gives the required power at a higher cost, economic load dispatch made for eight possible hybrid system topologies for four hybrid system units. The technical evaluation made by studying generating reliability indices Loss of Load Probability (LOLP), Loss of Load Expectation, (LOLE) Expected Energy Not Supplied (EENS) in every season of the year to know which season is more reliable to supply power to the load area. Studying generating reliability at the probabilities for generating units to achieve reliability index calculation according to the load duration curve of the load area in one year. The evaluation made by simulation of the hybrid system in MATLAB Simulink in every season and optimize power by using the Genetic Algorithm and Partial Swarm Optimization to ensure economical and technical optimal performance of the hybrid system
本文对埃及赫尔格达市6兆瓦负荷的混合电力系统进行了经济技术评价。经济评价有两种类型。第一类是经济评价两个部分,第一部分是成本估算知道发电的价格每个赛季揭示混合动力系统的动力装置的最低和最高的成本在每一个季节,第二部分是一个经济负载配电six-megawatt负载知道哪个混合系统拓扑结构以低成本提供所需的电力,拓扑所需的功率以更高的成本,对四个混合系统单元的八种可能的混合系统拓扑结构进行了经济负荷调度。通过研究一年中各个季节的发电可靠性指标——负荷损失率(LOLP)、负荷预期损失率(LOLE)、预期无供能(EENS),进行技术评价,了解哪个季节向负荷区供电更可靠。根据负荷区一年的负荷持续曲线,研究发电机组实现可靠性指标计算的概率下的发电可靠性。在MATLAB Simulink中对混合动力系统在每个季节进行仿真评估,并采用遗传算法和部分群算法进行功率优化,以确保混合动力系统的经济和技术性能最优
{"title":"Economical and Technical Assessment of Hybrid Renewable Energy Systems for Optimal Performance Applied in Hurghada, Egypt.","authors":"Fathy Ghonima, M. Ezzat, T. Abdel-salam","doi":"10.35940/ijrte.a1302.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a1302.059120","url":null,"abstract":"This paper deals with economic and technical evaluation of the hybrid power system which is fed six-megawatt load located in a city in Egypt called Hurghada. There is two types of economical evaluation. The first type is Economical evaluation which has two parts, the first part is cost estimation to know the price of generating power of the hybrid system in every season to reveal the lowest and the highest cost of the power unit in every season and The second part is an economic load dispatch for the six-megawatt load to know which hybrid system topology gives the required power at low cost and which topology gives the required power at a higher cost, economic load dispatch made for eight possible hybrid system topologies for four hybrid system units. The technical evaluation made by studying generating reliability indices Loss of Load Probability (LOLP), Loss of Load Expectation, (LOLE) Expected Energy Not Supplied (EENS) in every season of the year to know which season is more reliable to supply power to the load area. Studying generating reliability at the probabilities for generating units to achieve reliability index calculation according to the load duration curve of the load area in one year. The evaluation made by simulation of the hybrid system in MATLAB Simulink in every season and optimize power by using the Genetic Algorithm and Partial Swarm Optimization to ensure economical and technical optimal performance of the hybrid system","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131593353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Recent Technology and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1