Pub Date : 2023-05-16DOI: 10.18535/ijecs/v12i05.4733
Lalit Jain
An exponential growth has observed of network or internet users due to diverse resource and information sharing services. Contrary, network uses also increased in different kinds of attacks. Means network is vulnerable for many types of attacks. Computer network may exploit in different contexts such as denial of service, ping death, malfunction routing, flooding, man in the middle and spoofing attack. Among of these MAC spoofing is kind of attack spoofing attack that target to MAC or physical address of the network host or router. It tampers original address to any other random or user defined address. The aim of the study is to present MAC address and its types. With this, MAC spoofing attack also presented. Implementation environment and method for the MAC spoofing also presented. MAC spoofing is implemented in the KALI Linux operating system with the help of MACCHANGER tool.
{"title":"Computer Network: An Implementation of MAC Spoofing","authors":"Lalit Jain","doi":"10.18535/ijecs/v12i05.4733","DOIUrl":"https://doi.org/10.18535/ijecs/v12i05.4733","url":null,"abstract":"An exponential growth has observed of network or internet users due to diverse resource and information sharing services. Contrary, network uses also increased in different kinds of attacks. Means network is vulnerable for many types of attacks. Computer network may exploit in different contexts such as denial of service, ping death, malfunction routing, flooding, man in the middle and spoofing attack. Among of these MAC spoofing is kind of attack spoofing attack that target to MAC or physical address of the network host or router. It tampers original address to any other random or user defined address. The aim of the study is to present MAC address and its types. With this, MAC spoofing attack also presented. Implementation environment and method for the MAC spoofing also presented. MAC spoofing is implemented in the KALI Linux operating system with the help of MACCHANGER tool. \u0000 ","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129299710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-07DOI: 10.18535/ijecs/v12i04.4705
V. Verma, Sandeep Phogat, Sanjeev K. Sharma
In automotive and other manufacturing industries making light weight part with corrosion resistance was the challenges. Looking at these challenges, casting part is the best replacement which can fulfil both the requirements corrosion resistance and light weight. Minimizing the operational cost is the today’s requirement .High pressure die casting process is the best solution, multicavity die can be used to produce the components with in few seconds. In HDPC there is inherent characteristics of porosity or voids or shrinkage porosity these casting defects can be managed and controlled but it cannot be eliminated permanently. Looking at this phenomenon, in this research work process parameters optimization have been taken to reduce porosity /shrinkage porosity those parameters are holding furnace temperature ,die temperature , first phase plunger speed, second phase plunger speed and third phase intensification pressure or accumulated pressure best result achieved on following parameters. Holding Furnace temperature 700 ˚C, Die temperature 195 ˚ ˚C First phase speed 0.23 m/s, second phase speed 2.5 m/s, intensification pressure 285 bar. Taguchi methodology have been used for optimization of process parameters. UTM has been used for testing strength, radiography machine used for porosity level assessment and spectro machine have been used for chemical composition.
{"title":"Reduction Of Blow Hole Formation In Die Casting And Enhancement Of Strength Of Casting","authors":"V. Verma, Sandeep Phogat, Sanjeev K. Sharma","doi":"10.18535/ijecs/v12i04.4705","DOIUrl":"https://doi.org/10.18535/ijecs/v12i04.4705","url":null,"abstract":"In automotive and other manufacturing industries making light weight part with corrosion resistance was the challenges. Looking at these challenges, casting part is the best replacement which can fulfil both the requirements corrosion resistance and light weight. Minimizing the operational cost is the today’s requirement .High pressure die casting process is the best solution, multicavity die can be used to produce the components with in few seconds. In HDPC there is inherent characteristics of porosity or voids or shrinkage porosity these casting defects can be managed and controlled but it cannot be eliminated permanently. Looking at this phenomenon, in this research work process parameters optimization have been taken to reduce porosity /shrinkage porosity those parameters are holding furnace temperature ,die temperature , first phase plunger speed, second phase plunger speed and third phase intensification pressure or accumulated pressure best result achieved on following parameters. Holding Furnace temperature 700 ˚C, Die temperature 195 ˚ ˚C First phase speed 0.23 m/s, second phase speed 2.5 m/s, intensification pressure 285 bar. Taguchi methodology have been used for optimization of process parameters. UTM has been used for testing strength, radiography machine used for porosity level assessment and spectro machine have been used for chemical composition.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126815798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.18535/ijecs/v12i04.4728
R. P, Murty K.n
This paper presents a criteria for the analysis of Stability, Observability and Realizability criteria for the homogeneous first order Sylvester system. Stability, Observability and Realizability for homogeneous Lyapunov system are deduced as a particular case of our results.
{"title":"Stability analysis of first order homogeneous Sylvester system of Difference equations","authors":"R. P, Murty K.n","doi":"10.18535/ijecs/v12i04.4728","DOIUrl":"https://doi.org/10.18535/ijecs/v12i04.4728","url":null,"abstract":"This paper presents a criteria for the analysis of Stability, Observability and Realizability criteria for the homogeneous first order Sylvester system. Stability, Observability and Realizability for homogeneous Lyapunov system are deduced as a particular case of our results.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131431775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-02DOI: 10.18535/ijecs/v12i04.4727
Mohammad Naeem Kanyar
The differential-privacy idea states that maintaining privacy often includes adding noise to a data set to make it more challenging to identify data that corresponds to specific individuals. The accuracy of data analysis is typically decreased when noise is added, and differential privacy provides a technique to evaluate the accuracy-privacy trade-off. Although it may be more difficult to discern between analyses performed on somewhat dissimilar data sets, injecting random noise can also reduce the usefulness of the analysis. If not, enough noise is supplied to a very tiny data collection, analyses could become practically useless. The trade-off between value and privacy should, however, become more manageable as the size of the data set increase. Along these lines, in this paper, the fundamental ideas of sensitivity and privacy budget in differential privacy, the noise mechanisms utilized as a part of differential privacy, the composition properties, the ways through which it can be achieved and the developments in this field to date have been presented.
{"title":"Differential Privacy “Working Towards Differential Privacy for Sensitive Text “","authors":"Mohammad Naeem Kanyar","doi":"10.18535/ijecs/v12i04.4727","DOIUrl":"https://doi.org/10.18535/ijecs/v12i04.4727","url":null,"abstract":"The differential-privacy idea states that maintaining privacy often includes adding noise to a data set to make it more challenging to identify data that corresponds to specific individuals. The accuracy of data analysis is typically decreased when noise is added, and differential privacy provides a technique to evaluate the accuracy-privacy trade-off. Although it may be more difficult to discern between analyses performed on somewhat dissimilar data sets, injecting random noise can also reduce the usefulness of the analysis. If not, enough noise is supplied to a very tiny data collection, analyses could become practically useless. The trade-off between value and privacy should, however, become more manageable as the size of the data set increase. Along these lines, in this paper, the fundamental ideas of sensitivity and privacy budget in differential privacy, the noise mechanisms utilized as a part of differential privacy, the composition properties, the ways through which it can be achieved and the developments in this field to date have been presented.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122934459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The proposed project is designed to monitor the environmental conditions such as Temperature, Humidity, Soil Moisture, Rain level and Light Intensity in order to monitor the conditions of agricultural farm land. Through this design the farmers can receive the informationin remote mode. The farmers can use this information as a reference to improve the agricultural productivity. When correct information is collected every day, the farmers can predict the problems and can take necessary precautions.
{"title":"Solar Powered Soil And Weather Monitoring System Using Iot","authors":"Lakshmi Kothapalli, Nivedith Chinnam, Krishna Kumari Kodali, Uday Kiran Kasthala","doi":"10.18535/ijecs/v12i03.4726","DOIUrl":"https://doi.org/10.18535/ijecs/v12i03.4726","url":null,"abstract":"The proposed project is designed to monitor the environmental conditions such as Temperature, Humidity, Soil Moisture, Rain level and Light Intensity in order to monitor the conditions of agricultural farm land. Through this design the farmers can receive the informationin remote mode. The farmers can use this information as a reference to improve the agricultural productivity. When correct information is collected every day, the farmers can predict the problems and can take necessary precautions.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131412175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Accidents caused due to drunken drive are increasing tremendously in this modern world. To prevent these kinds of accidents, we propose an IoT based health monitoring system with alcohol detection and control. The proposed project is designed to reduce accidents caused due to drunken driving. Globally the cases of accidents are increasing due to this aspect. In order to prevent these accident cases, in this project an IoT based method has been designed. In that Arduino, Alcohol Sensor, Heart beat rate sensor, Global System for Mobile communication, Wi-Fi modem, are utilized. Once the alcohol rate and heart beat rate are exceeding the specified limit, the command will be given to the ignition system of the vehicle to stop the operation of the vehicle.
{"title":"The IoT Based Health Monitoring with Alcohol Detection And Control System","authors":"Rohith Yerrapalem, Navya Ravuri, Bala Venkata Aditya Seelam, Roshan Sagar Pallala","doi":"10.18535/ijecs/v12i03.4725","DOIUrl":"https://doi.org/10.18535/ijecs/v12i03.4725","url":null,"abstract":"Accidents caused due to drunken drive are increasing tremendously in this modern world. To prevent these kinds of accidents, we propose an IoT based health monitoring system with alcohol detection and control. The proposed project is designed to reduce accidents caused due to drunken driving. Globally the cases of accidents are increasing due to this aspect. In order to prevent these accident cases, in this project an IoT based method has been designed. In that Arduino, Alcohol Sensor, Heart beat rate sensor, Global System for Mobile communication, Wi-Fi modem, are utilized. Once the alcohol rate and heart beat rate are exceeding the specified limit, the command will be given to the ignition system of the vehicle to stop the operation of the vehicle.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128927092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-17DOI: 10.18535/ijecs/v12i03.4724
Hanmant Fadewar
Amblyopia also called as lazy eye. In this disease there is week communication between human eyes with human brain. Due to this reason one of the eye is not working properly compare to other eye. Amblyopia starts in early childhood, and most of the children are loss his vision. In the world 3 to 4 child’s are affected of amblyopia risk factors out of 100 children. If we give the early treatment on affected eye may be prevents long-term vision problems. This problem is focus in mind and author is doing study to accurately identify children at risk for amblyopia by using existing application from smartphone platforms. This study is not replace the advice of doctors on any condition. Keywords: Amblyopia Risk Factor, Visual Acuity Test,
{"title":"Effective Detection of Amblyopia Risk Factor Using Smart Phone Eye Testing Application","authors":"Hanmant Fadewar","doi":"10.18535/ijecs/v12i03.4724","DOIUrl":"https://doi.org/10.18535/ijecs/v12i03.4724","url":null,"abstract":"Amblyopia also called as lazy eye. In this disease there is week communication between human eyes with human brain. Due to this reason one of the eye is not working properly compare to other eye. Amblyopia starts in early childhood, and most of the children are loss his vision. In the world 3 to 4 child’s are affected of amblyopia risk factors out of 100 children. If we give the early treatment on affected eye may be prevents long-term vision problems. This problem is focus in mind and author is doing study to accurately identify children at risk for amblyopia by using existing application from smartphone platforms. This study is not replace the advice of doctors on any condition. \u0000Keywords: Amblyopia Risk Factor, Visual Acuity Test,","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124803972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-07DOI: 10.18535/ijecs/v12i03.4723
Rıza Ilhan, Faysal Bouzouidja
Fitness is one of the popular physical activities performed individually most of the time. While doing an activity, if the proper posture is not adopted, it can result in major injury that makes it difficult to lead a healthy life. By adopting wearable technology and haptic technology not only correct motion could be achieved but also damages due to wrong motion could be prevented. In this article we introduce a simple and convenient wearable device that can sense the position of the body during the exercise and provide haptic feedback if an improper motion was performed. The wearable system includes four gyroscopes and four coin types of vibration motors. The body position was recorded using gyroscopes and haptic feedback was applied using vibration motors. To test the system three positions were chosen and tested on five participants. The results show that the device can be used by people to have an injury-free activity where a coach is not available. Using wearable technology accompanied by the haptic feedback will improve the skills and will lead to an injury free exercise.
{"title":"Haptic body position improver during a workout","authors":"Rıza Ilhan, Faysal Bouzouidja","doi":"10.18535/ijecs/v12i03.4723","DOIUrl":"https://doi.org/10.18535/ijecs/v12i03.4723","url":null,"abstract":"Fitness is one of the popular physical activities performed individually most of the time. While doing an activity, if the proper posture is not adopted, it can result in major injury that makes it difficult to lead a healthy life. By adopting wearable technology and haptic technology not only correct motion could be achieved but also damages due to wrong motion could be prevented. In this article we introduce a simple and convenient wearable device that can sense the position of the body during the exercise and provide haptic feedback if an improper motion was performed. The wearable system includes four gyroscopes and four coin types of vibration motors. The body position was recorded using gyroscopes and haptic feedback was applied using vibration motors. To test the system three positions were chosen and tested on five participants. The results show that the device can be used by people to have an injury-free activity where a coach is not available. Using wearable technology accompanied by the haptic feedback will improve the skills and will lead to an injury free exercise. ","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123770206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-19DOI: 10.18535/ijecs/v12i02.4719
Sailaja P, K. Murty
Existence and unicity of solutions of third order non-linear differential equations is an interesting area of current research and a great deal of work has been done by many authors during the last few years. The idea of matching solutions of two-point boundary value problems at the common point of solutions is very fascinating.
{"title":"Existence and Uniqueness of Solutions to Three-point Boundary Value Problems associated with Third Order Non-Linear Fuzzy differential Equations","authors":"Sailaja P, K. Murty","doi":"10.18535/ijecs/v12i02.4719","DOIUrl":"https://doi.org/10.18535/ijecs/v12i02.4719","url":null,"abstract":"Existence and unicity of solutions of third order non-linear differential equations is an interesting area of current research and a great deal of work has been done by many authors during the last few years. The idea of matching solutions of two-point boundary value problems at the common point of solutions is very fascinating.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125057610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-28DOI: 10.18535/ijecs/v12i01.4715
Arvind K. Panpatte
The recent growth of digital transactions over the internet is high. This is the newest topic which is to be implemented as well as need to study related with the security. The development of technology we need to improve and build the safe authentication scheme over the internet. The safe authentication scheme is protecting the user valuable information against security threats. While performing digital transactions over the internet, the protection is turn into high importance and demand for authentication is more necessary than before. In the traditional authentication there are so many problems such as username, password & so on. Also, intruders will crack various ways of hacking user information, passwords including brute force attack, shoulder surfing, dictionary attacks, etc. This paper is useful to performing a secure authentication scheme using different fusion techniques for digital transactions. The propose system approach here combines user details as like user name, password, OTP and biometrics (traits as like fingerprint, face & iris) fusion verification for a more valid user authentication. Our proposed point of view has been initiating to improve security benefits for various forms of invasion & authentication layers turn on password-based attacks.
{"title":"Multi-Factor Biometric Authentication Framework to User for Securing Digital Transaction","authors":"Arvind K. Panpatte","doi":"10.18535/ijecs/v12i01.4715","DOIUrl":"https://doi.org/10.18535/ijecs/v12i01.4715","url":null,"abstract":"The recent growth of digital transactions over the internet is high. This is the newest topic which is to be implemented as well as need to study related with the security. The development of technology we need to improve and build the safe authentication scheme over the internet. The safe authentication scheme is protecting the user valuable information against security threats. While performing digital transactions over the internet, the protection is turn into high importance and demand for authentication is more necessary than before. In the traditional authentication there are so many problems such as username, password & so on. Also, intruders will crack various ways of hacking user information, passwords including brute force attack, shoulder surfing, dictionary attacks, etc. \u0000This paper is useful to performing a secure authentication scheme using different fusion techniques for digital transactions. The propose system approach here combines user details as like user name, password, OTP and biometrics (traits as like fingerprint, face & iris) fusion verification for a more valid user authentication. Our proposed point of view has been initiating to improve security benefits for various forms of invasion & authentication layers turn on password-based attacks.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126607060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}