首页 > 最新文献

International Journal of Engineering and Computer Science最新文献

英文 中文
Computer Network: An Implementation of MAC Spoofing 计算机网络:一种MAC欺骗的实现
Pub Date : 2023-05-16 DOI: 10.18535/ijecs/v12i05.4733
Lalit Jain
An exponential growth has observed of network or internet users due to diverse resource and information sharing services. Contrary, network uses also increased in different kinds of attacks. Means network is vulnerable for many types of attacks. Computer network may exploit in different contexts such as denial of service, ping death, malfunction routing, flooding, man in the middle and spoofing attack. Among of these MAC spoofing is kind of attack spoofing attack that target to MAC or physical address of the network host or router. It tampers original address to any other random or user defined address. The aim of the study is to present MAC address and its types. With this, MAC spoofing attack also presented. Implementation environment and method for the MAC spoofing also presented. MAC spoofing is implemented in the KALI Linux operating system with the help of MACCHANGER tool.  
由于资源和信息共享服务的多样化,网络或互联网用户呈指数级增长。相反,网络在各种攻击中的使用也有所增加。意味着网络容易受到多种攻击。计算机网络可以在不同的情况下利用,如拒绝服务、ping死亡、故障路由、洪水、中间人攻击和欺骗攻击。其中,MAC欺骗是一种针对网络主机或路由器的MAC或物理地址的欺骗攻击。它将原始地址篡改为任何其他随机或用户定义的地址。本研究的目的是介绍MAC地址及其类型。在此基础上,提出了MAC欺骗攻击。给出了MAC欺骗的实现环境和实现方法。MAC欺骗是在KALI Linux操作系统中利用MACCHANGER工具实现的。
{"title":"Computer Network: An Implementation of MAC Spoofing","authors":"Lalit Jain","doi":"10.18535/ijecs/v12i05.4733","DOIUrl":"https://doi.org/10.18535/ijecs/v12i05.4733","url":null,"abstract":"An exponential growth has observed of network or internet users due to diverse resource and information sharing services. Contrary, network uses also increased in different kinds of attacks. Means network is vulnerable for many types of attacks. Computer network may exploit in different contexts such as denial of service, ping death, malfunction routing, flooding, man in the middle and spoofing attack. Among of these MAC spoofing is kind of attack spoofing attack that target to MAC or physical address of the network host or router. It tampers original address to any other random or user defined address. The aim of the study is to present MAC address and its types. With this, MAC spoofing attack also presented. Implementation environment and method for the MAC spoofing also presented. MAC spoofing is implemented in the KALI Linux operating system with the help of MACCHANGER tool. \u0000 ","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129299710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reduction Of Blow Hole Formation In Die Casting And Enhancement Of Strength Of Casting 减少压铸过程中气孔的形成,提高铸件强度
Pub Date : 2023-04-07 DOI: 10.18535/ijecs/v12i04.4705
V. Verma, Sandeep Phogat, Sanjeev K. Sharma
In automotive and other manufacturing industries making light weight part with corrosion resistance was the challenges. Looking at these challenges, casting part is the best replacement which can fulfil both the requirements corrosion resistance and light weight. Minimizing the operational cost is the today’s requirement .High pressure die casting process is the best solution, multicavity die can be used to produce the components with in few seconds. In HDPC there is inherent characteristics of porosity or voids or shrinkage porosity these casting defects can be managed and controlled but it cannot be eliminated permanently. Looking at this phenomenon, in this research work process parameters optimization have been taken to reduce porosity /shrinkage porosity those parameters are holding furnace temperature ,die temperature , first phase plunger speed, second phase plunger speed and third phase intensification pressure or accumulated pressure best result achieved on following parameters. Holding Furnace temperature 700 ˚C, Die temperature 195 ˚ ˚C First phase speed 0.23 m/s, second phase speed 2.5 m/s, intensification pressure 285 bar. Taguchi methodology have been used for optimization of process parameters. UTM has been used for testing strength, radiography machine used for porosity level assessment and spectro machine have been used for chemical composition.
在汽车和其他制造业中,制造具有耐腐蚀性的轻质部件是一项挑战。面对这些挑战,铸造件是最好的替代品,既能满足耐腐蚀要求,又能减轻重量。最大限度地降低操作成本是当今的要求,高压压铸工艺是最好的解决方案,多腔模具可以在几秒钟内生产出零件。在HDPC中,存在固有的多孔性或空洞或缩孔性,这些铸造缺陷可以管理和控制,但无法永久消除。针对这一现象,在本研究工作中,通过工艺参数优化来降低孔隙率/缩孔率,即保温炉温度、模具温度、第1相柱塞速度、第2相柱塞速度和第3相强化压力或累积压力,在以下参数上取得最佳效果。保温炉温度700℃,模具温度195℃,第一相速度0.23 m/s,第二相速度2.5 m/s,强化压力285 bar。采用田口法对工艺参数进行优化。UTM用于测试强度,x射线机用于孔隙度水平评估,光谱机用于化学成分。
{"title":"Reduction Of Blow Hole Formation In Die Casting And Enhancement Of Strength Of Casting","authors":"V. Verma, Sandeep Phogat, Sanjeev K. Sharma","doi":"10.18535/ijecs/v12i04.4705","DOIUrl":"https://doi.org/10.18535/ijecs/v12i04.4705","url":null,"abstract":"In automotive and other manufacturing industries making light weight part with corrosion resistance was the challenges. Looking at these challenges, casting part is the best replacement which can fulfil both the requirements corrosion resistance and light weight. Minimizing the operational cost is the today’s requirement .High pressure die casting process is the best solution, multicavity die can be used to produce the components with in few seconds. In HDPC there is inherent characteristics of porosity or voids or shrinkage porosity these casting defects can be managed and controlled but it cannot be eliminated permanently. Looking at this phenomenon, in this research work process parameters optimization have been taken to reduce porosity /shrinkage porosity those parameters are holding furnace temperature ,die temperature , first phase plunger speed, second phase plunger speed and third phase intensification pressure or accumulated pressure best result achieved on following parameters. Holding Furnace temperature 700 ˚C, Die temperature 195 ˚ ˚C First phase speed 0.23 m/s, second phase speed 2.5 m/s, intensification pressure 285 bar. Taguchi methodology have been used for optimization of process parameters. UTM has been used for testing strength, radiography machine used for porosity level assessment and spectro machine have been used for chemical composition.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126815798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability analysis of first order homogeneous Sylvester system of Difference equations 差分方程一阶齐次Sylvester系统的稳定性分析
Pub Date : 2023-04-05 DOI: 10.18535/ijecs/v12i04.4728
R. P, Murty K.n
This paper presents a criteria for the analysis of Stability, Observability and Realizability criteria for the homogeneous first order Sylvester system. Stability, Observability and Realizability for homogeneous Lyapunov system are deduced as a particular case of our results.
本文给出了齐次一阶Sylvester系统的稳定性、可观测性和可实现性分析准则。作为本文结果的一个特例,导出了齐次Lyapunov系统的稳定性、可观测性和可实现性。
{"title":"Stability analysis of first order homogeneous Sylvester system of Difference equations","authors":"R. P, Murty K.n","doi":"10.18535/ijecs/v12i04.4728","DOIUrl":"https://doi.org/10.18535/ijecs/v12i04.4728","url":null,"abstract":"This paper presents a criteria for the analysis of Stability, Observability and Realizability criteria for the homogeneous first order Sylvester system. Stability, Observability and Realizability for homogeneous Lyapunov system are deduced as a particular case of our results.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131431775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differential Privacy “Working Towards Differential Privacy for Sensitive Text “ 差分隐私“为敏感文本的差分隐私而努力”
Pub Date : 2023-04-02 DOI: 10.18535/ijecs/v12i04.4727
Mohammad Naeem Kanyar
The differential-privacy idea states that maintaining privacy often includes adding noise to a data set to make it more challenging to identify data that corresponds to specific individuals. The accuracy of data analysis is typically decreased when noise is added, and differential privacy provides a technique to evaluate the accuracy-privacy trade-off. Although it may be more difficult to discern between analyses performed on somewhat dissimilar data sets, injecting random noise can also reduce the usefulness of the analysis. If not, enough noise is supplied to a very tiny data collection, analyses could become practically useless. The trade-off between value and privacy should, however, become more manageable as the size of the data set increase. Along these lines, in this paper, the fundamental ideas of sensitivity and privacy budget in differential privacy, the noise mechanisms utilized as a part of differential privacy, the composition properties, the ways through which it can be achieved and the developments in this field to date have been presented.
差分隐私思想指出,维护隐私通常包括在数据集中添加噪声,以使识别与特定个人对应的数据更具挑战性。当加入噪声时,数据分析的准确性通常会降低,而差分隐私提供了一种评估准确性与隐私权衡的技术。虽然在不同的数据集上进行的分析可能更难以区分,但注入随机噪声也会降低分析的有用性。如果不这样做,就会给非常小的数据收集提供足够的噪声,分析实际上可能变得毫无用处。然而,随着数据集规模的增加,价值和隐私之间的权衡应该变得更易于管理。在此基础上,本文介绍了差分隐私中灵敏度和隐私预算的基本思想、差分隐私中使用的噪声机制、组成特性、实现方法以及该领域迄今为止的研究进展。
{"title":"Differential Privacy “Working Towards Differential Privacy for Sensitive Text “","authors":"Mohammad Naeem Kanyar","doi":"10.18535/ijecs/v12i04.4727","DOIUrl":"https://doi.org/10.18535/ijecs/v12i04.4727","url":null,"abstract":"The differential-privacy idea states that maintaining privacy often includes adding noise to a data set to make it more challenging to identify data that corresponds to specific individuals. The accuracy of data analysis is typically decreased when noise is added, and differential privacy provides a technique to evaluate the accuracy-privacy trade-off. Although it may be more difficult to discern between analyses performed on somewhat dissimilar data sets, injecting random noise can also reduce the usefulness of the analysis. If not, enough noise is supplied to a very tiny data collection, analyses could become practically useless. The trade-off between value and privacy should, however, become more manageable as the size of the data set increase. Along these lines, in this paper, the fundamental ideas of sensitivity and privacy budget in differential privacy, the noise mechanisms utilized as a part of differential privacy, the composition properties, the ways through which it can be achieved and the developments in this field to date have been presented.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122934459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solar Powered Soil And Weather Monitoring System Using Iot 使用物联网的太阳能土壤和天气监测系统
Pub Date : 2023-03-29 DOI: 10.18535/ijecs/v12i03.4726
Lakshmi Kothapalli, Nivedith Chinnam, Krishna Kumari Kodali, Uday Kiran Kasthala
The proposed project is designed to monitor the environmental conditions such as Temperature, Humidity, Soil Moisture, Rain level and Light Intensity in order to monitor the conditions of agricultural farm land. Through this design the farmers can receive the informationin remote mode. The farmers can use this information as a reference to improve the agricultural productivity. When correct information is collected every day, the farmers can predict the problems and can take necessary precautions.
该项目旨在监测环境条件,如温度、湿度、土壤湿度、降雨水平和光照强度,以监测农业用地的状况。通过本设计,农民可以远程接收信息。农民可以利用这些信息作为参考来提高农业生产力。当每天收集到正确的信息时,农民就可以预测问题并采取必要的预防措施。
{"title":"Solar Powered Soil And Weather Monitoring System Using Iot","authors":"Lakshmi Kothapalli, Nivedith Chinnam, Krishna Kumari Kodali, Uday Kiran Kasthala","doi":"10.18535/ijecs/v12i03.4726","DOIUrl":"https://doi.org/10.18535/ijecs/v12i03.4726","url":null,"abstract":"The proposed project is designed to monitor the environmental conditions such as Temperature, Humidity, Soil Moisture, Rain level and Light Intensity in order to monitor the conditions of agricultural farm land. Through this design the farmers can receive the informationin remote mode. The farmers can use this information as a reference to improve the agricultural productivity. When correct information is collected every day, the farmers can predict the problems and can take necessary precautions.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131412175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The IoT Based Health Monitoring with Alcohol Detection And Control System 基于物联网的健康监测与酒精检测与控制系统
Pub Date : 2023-03-29 DOI: 10.18535/ijecs/v12i03.4725
Rohith Yerrapalem, Navya Ravuri, Bala Venkata Aditya Seelam, Roshan Sagar Pallala
Accidents caused due to drunken drive are increasing tremendously in this modern world. To prevent these kinds of accidents, we propose an IoT based health monitoring system with alcohol detection and control. The proposed project is designed to reduce accidents caused due to drunken driving. Globally the cases of accidents are increasing due to this aspect. In order to prevent these accident cases, in this project   an IoT based method has been designed. In that Arduino, Alcohol Sensor, Heart beat rate sensor, Global System for Mobile communication, Wi-Fi modem, are utilized. Once the alcohol rate and heart beat rate are exceeding the specified limit, the command will be given to the ignition system of the vehicle to stop the operation of the vehicle.
在现代社会,因酒后驾车引起的交通事故正在急剧增加。为了防止此类事故的发生,我们提出了一种基于物联网的酒精检测和控制健康监测系统。拟议中的项目旨在减少酒后驾车造成的事故。在全球范围内,由于这方面的原因,事故的情况正在增加。为了防止这些事故的发生,本项目设计了一种基于物联网的方法。其中使用了Arduino,酒精传感器,心率传感器,全球移动通信系统,Wi-Fi调制解调器。一旦酒精浓度和心跳超过规定的限值,就会命令车辆的点火系统停止车辆的运行。
{"title":"The IoT Based Health Monitoring with Alcohol Detection And Control System","authors":"Rohith Yerrapalem, Navya Ravuri, Bala Venkata Aditya Seelam, Roshan Sagar Pallala","doi":"10.18535/ijecs/v12i03.4725","DOIUrl":"https://doi.org/10.18535/ijecs/v12i03.4725","url":null,"abstract":"Accidents caused due to drunken drive are increasing tremendously in this modern world. To prevent these kinds of accidents, we propose an IoT based health monitoring system with alcohol detection and control. The proposed project is designed to reduce accidents caused due to drunken driving. Globally the cases of accidents are increasing due to this aspect. In order to prevent these accident cases, in this project   an IoT based method has been designed. In that Arduino, Alcohol Sensor, Heart beat rate sensor, Global System for Mobile communication, Wi-Fi modem, are utilized. Once the alcohol rate and heart beat rate are exceeding the specified limit, the command will be given to the ignition system of the vehicle to stop the operation of the vehicle.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128927092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Detection of Amblyopia Risk Factor Using Smart Phone Eye Testing Application 利用智能手机视力检测应用程序有效检测弱视危险因素
Pub Date : 2023-03-17 DOI: 10.18535/ijecs/v12i03.4724
Hanmant Fadewar
Amblyopia also called as lazy eye. In this disease there is week communication between human eyes with human brain. Due to this reason one of the eye is not working properly compare to other eye. Amblyopia starts in early childhood, and most of the children are loss his vision. In the world 3 to 4 child’s are affected of amblyopia risk factors out of 100 children. If we give the early treatment on affected eye may be prevents long-term vision problems. This problem is focus in mind and author is doing study to accurately identify children at risk for amblyopia by using existing application from smartphone platforms. This study is not replace the advice of doctors on any condition. Keywords: Amblyopia Risk Factor, Visual Acuity Test,
弱视又称懒眼。在这种疾病中,人眼与人脑之间的交流很少。由于这个原因,一只眼睛比另一只眼睛工作不正常。弱视开始于儿童早期,大多数儿童都失去了视力。在世界上,每100名儿童中就有3至4名儿童受到弱视危险因素的影响。如果我们对受影响的眼睛进行早期治疗,可能会预防长期的视力问题。这个问题是我们关注的焦点,作者正在进行研究,通过使用智能手机平台上的现有应用程序,准确识别有弱视风险的儿童。这项研究在任何情况下都不能取代医生的建议。关键词:弱视危险因素;视力测试;
{"title":"Effective Detection of Amblyopia Risk Factor Using Smart Phone Eye Testing Application","authors":"Hanmant Fadewar","doi":"10.18535/ijecs/v12i03.4724","DOIUrl":"https://doi.org/10.18535/ijecs/v12i03.4724","url":null,"abstract":"Amblyopia also called as lazy eye. In this disease there is week communication between human eyes with human brain. Due to this reason one of the eye is not working properly compare to other eye. Amblyopia starts in early childhood, and most of the children are loss his vision. In the world 3 to 4 child’s are affected of amblyopia risk factors out of 100 children. If we give the early treatment on affected eye may be prevents long-term vision problems. This problem is focus in mind and author is doing study to accurately identify children at risk for amblyopia by using existing application from smartphone platforms. This study is not replace the advice of doctors on any condition. \u0000Keywords: Amblyopia Risk Factor, Visual Acuity Test,","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124803972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Haptic body position improver during a workout 在锻炼过程中,体位触觉改善器
Pub Date : 2023-03-07 DOI: 10.18535/ijecs/v12i03.4723
Rıza Ilhan, Faysal Bouzouidja
Fitness is one of the popular physical activities performed individually most of the time. While doing an activity, if the proper posture is not adopted, it can result in major injury that makes it difficult to lead a healthy life. By adopting wearable technology and haptic technology not only correct motion could be achieved but also damages due to wrong motion could be prevented. In this article we introduce a simple and convenient wearable device that can sense the position of the body during the exercise and provide haptic feedback if an improper motion was performed. The wearable system includes four gyroscopes and four coin types of vibration motors. The body position was recorded using gyroscopes and haptic feedback was applied using vibration motors. To test the system three positions were chosen and tested on five participants. The results show that the device can be used by people to have an injury-free activity where a coach is not available. Using wearable technology accompanied by the haptic feedback will improve the skills and will lead to an injury free exercise.  
健身是大多数时候个人进行的流行体育活动之一。在进行一项活动时,如果没有采取正确的姿势,可能会导致严重的伤害,使健康的生活变得困难。采用可穿戴技术和触觉技术,既可以实现正确的运动,又可以防止错误运动造成的损伤。在本文中,我们介绍了一种简单方便的可穿戴设备,它可以在运动过程中感知身体的位置,并在进行不当动作时提供触觉反馈。可穿戴系统包括四个陀螺仪和四个硬币型振动马达。用陀螺仪记录体位,用振动电机进行触觉反馈。为了测试这个系统,我们选择了三个位置,并对五名参与者进行了测试。结果表明,在没有教练的情况下,人们可以使用该设备进行无伤害的活动。使用带有触觉反馈的可穿戴技术将提高技能,并将导致无伤害的运动。
{"title":"Haptic body position improver during a workout","authors":"Rıza Ilhan, Faysal Bouzouidja","doi":"10.18535/ijecs/v12i03.4723","DOIUrl":"https://doi.org/10.18535/ijecs/v12i03.4723","url":null,"abstract":"Fitness is one of the popular physical activities performed individually most of the time. While doing an activity, if the proper posture is not adopted, it can result in major injury that makes it difficult to lead a healthy life. By adopting wearable technology and haptic technology not only correct motion could be achieved but also damages due to wrong motion could be prevented. In this article we introduce a simple and convenient wearable device that can sense the position of the body during the exercise and provide haptic feedback if an improper motion was performed. The wearable system includes four gyroscopes and four coin types of vibration motors. The body position was recorded using gyroscopes and haptic feedback was applied using vibration motors. To test the system three positions were chosen and tested on five participants. The results show that the device can be used by people to have an injury-free activity where a coach is not available. Using wearable technology accompanied by the haptic feedback will improve the skills and will lead to an injury free exercise.  ","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123770206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Existence and Uniqueness of Solutions to Three-point Boundary Value Problems associated with Third Order Non-Linear Fuzzy differential Equations 三阶非线性模糊微分方程三点边值问题解的存在唯一性
Pub Date : 2023-02-19 DOI: 10.18535/ijecs/v12i02.4719
Sailaja P, K. Murty
Existence and unicity of solutions of third order non-linear differential equations is an interesting area of current research and a great deal of work has been done by many authors during the last few years. The idea of matching solutions of two-point boundary value problems at the common point of solutions is very fascinating.
三阶非线性微分方程解的存在性和唯一性是当前研究的一个有趣的领域,近年来许多作者已经做了大量的工作。两点边值问题在解的公共点处的解匹配的思想是非常吸引人的。
{"title":"Existence and Uniqueness of Solutions to Three-point Boundary Value Problems associated with Third Order Non-Linear Fuzzy differential Equations","authors":"Sailaja P, K. Murty","doi":"10.18535/ijecs/v12i02.4719","DOIUrl":"https://doi.org/10.18535/ijecs/v12i02.4719","url":null,"abstract":"Existence and unicity of solutions of third order non-linear differential equations is an interesting area of current research and a great deal of work has been done by many authors during the last few years. The idea of matching solutions of two-point boundary value problems at the common point of solutions is very fascinating.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125057610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Factor Biometric Authentication Framework to User for Securing Digital Transaction 保护数字交易安全的用户多因素生物特征认证框架
Pub Date : 2023-01-28 DOI: 10.18535/ijecs/v12i01.4715
Arvind K. Panpatte
The recent growth of digital transactions over the internet is high. This is the newest topic which is to be implemented as well as need to study related with the security.  The development of technology we need to improve and build the safe authentication scheme over the internet. The safe authentication scheme is protecting the user valuable information against security threats. While performing digital transactions over the internet, the protection is turn into high importance and demand for authentication is more necessary than before.  In the traditional authentication there are so many problems such as username, password & so on. Also, intruders will crack various ways of hacking user information, passwords including brute force attack, shoulder surfing, dictionary attacks, etc. This paper is useful to performing a secure authentication scheme using different fusion techniques for digital transactions. The propose system approach here combines user details as like user name, password, OTP and biometrics (traits as like fingerprint, face & iris) fusion verification for a more valid user authentication. Our proposed point of view has been initiating to improve security benefits for various forms of invasion & authentication layers turn on password-based attacks.
最近互联网上的数字交易增长很快。这是与安全相关的最新课题,也是需要研究的课题。随着技术的发展,我们需要改进和构建安全的互联网认证方案。安全认证方案保护用户的重要信息不受安全威胁。在互联网上进行数字交易时,保护变得越来越重要,对身份验证的需求比以前更加必要。传统的认证方式存在用户名、密码等诸多问题。此外,入侵者还会破解各种破解用户信息、密码的方法,包括暴力破解、肩部冲浪、字典攻击等。本文对使用不同的融合技术实现数字交易的安全认证方案是有用的。这里提出的系统方法结合了用户详细信息,如用户名、密码、OTP和生物特征(如指纹、面部和虹膜等特征)融合验证,以实现更有效的用户身份验证。我们提出的观点已经开始提高各种形式的入侵和身份验证层对基于密码的攻击的安全性。
{"title":"Multi-Factor Biometric Authentication Framework to User for Securing Digital Transaction","authors":"Arvind K. Panpatte","doi":"10.18535/ijecs/v12i01.4715","DOIUrl":"https://doi.org/10.18535/ijecs/v12i01.4715","url":null,"abstract":"The recent growth of digital transactions over the internet is high. This is the newest topic which is to be implemented as well as need to study related with the security.  The development of technology we need to improve and build the safe authentication scheme over the internet. The safe authentication scheme is protecting the user valuable information against security threats. While performing digital transactions over the internet, the protection is turn into high importance and demand for authentication is more necessary than before.  In the traditional authentication there are so many problems such as username, password & so on. Also, intruders will crack various ways of hacking user information, passwords including brute force attack, shoulder surfing, dictionary attacks, etc. \u0000This paper is useful to performing a secure authentication scheme using different fusion techniques for digital transactions. The propose system approach here combines user details as like user name, password, OTP and biometrics (traits as like fingerprint, face & iris) fusion verification for a more valid user authentication. Our proposed point of view has been initiating to improve security benefits for various forms of invasion & authentication layers turn on password-based attacks.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126607060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Engineering and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1