首页 > 最新文献

International Journal of Scientific Research in Computer Science, Engineering and Information Technology最新文献

英文 中文
Evaluating NSGA-III : A Comprehensive Study on Multi-objective Optimization NSGA-III评价:多目标优化的综合研究
None Ms. Shilpi Jain, None Prof Kamlesh Kumar Dubey, None Dr. Madhur Jain, None Divyansh Rampal
This research paper provides a comprehensive analysis of NSGA-III, a state-of-the-art multi-objective optimization algorithm. We delve into its principles, advancements, applications, and comparative studies to showcase its effectiveness and limitations.
本文对目前最先进的多目标优化算法NSGA-III进行了全面分析。我们深入研究了它的原理、进展、应用和比较研究,以展示它的有效性和局限性。
{"title":"Evaluating NSGA-III : A Comprehensive Study on Multi-objective Optimization","authors":"None Ms. Shilpi Jain, None Prof Kamlesh Kumar Dubey, None Dr. Madhur Jain, None Divyansh Rampal","doi":"10.32628/cseit2390523","DOIUrl":"https://doi.org/10.32628/cseit2390523","url":null,"abstract":"This research paper provides a comprehensive analysis of NSGA-III, a state-of-the-art multi-objective optimization algorithm. We delve into its principles, advancements, applications, and comparative studies to showcase its effectiveness and limitations.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135098501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fortifying Data Availability and Security in Cloud Servers Via Verification Protocols 通过验证协议加强云服务器中的数据可用性和安全性
None N. Ananda Reddy, None Dr. P. Dileep Kumar Reddy
Distributed computing networks play a significant role in contemporary computer architecture, facilitating the processing, analysis, and storage of sensitive data. This issue has garnered significant interest in the realm of investigating various encryption techniques. There is a pressing need to establish a dependable and validated security approach that enhances the data-processing efficacy of Cloud servers, as current cryptographic investigations suggest the vulnerability of server-side data security to potential breaches. This paper elucidates the process of implementing a cloud-centric cloud storage architecture and presents a unique security schema that validates the evidence of encrypted secret data storage. The researchers in this paper propose a novel computational security technique to tackle the issue of internal nodes by using efficient security strategies, hence minimizing computational overhead. The experimental results reported in this paper provide evidence of the greater effectiveness of the suggested mechanism in comparison to other commonly used security strategies.
分布式计算网络在当代计算机体系结构中发挥着重要作用,促进了敏感数据的处理、分析和存储。这个问题在研究各种加密技术的领域引起了极大的兴趣。目前迫切需要建立一种可靠的、经过验证的安全方法,以增强云服务器的数据处理效率,因为目前的加密调查表明,服务器端数据安全存在潜在漏洞。本文阐述了实现以云为中心的云存储架构的过程,并提出了一种独特的安全模式,用于验证加密秘密数据存储的证据。本文提出了一种新的计算安全技术,通过使用有效的安全策略来解决内部节点的问题,从而最大限度地减少计算开销。与其他常用的安全策略相比,本文报告的实验结果证明了所建议的机制具有更高的有效性。
{"title":"Fortifying Data Availability and Security in Cloud Servers Via Verification Protocols","authors":"None N. Ananda Reddy, None Dr. P. Dileep Kumar Reddy","doi":"10.32628/cseit2390521","DOIUrl":"https://doi.org/10.32628/cseit2390521","url":null,"abstract":"Distributed computing networks play a significant role in contemporary computer architecture, facilitating the processing, analysis, and storage of sensitive data. This issue has garnered significant interest in the realm of investigating various encryption techniques. There is a pressing need to establish a dependable and validated security approach that enhances the data-processing efficacy of Cloud servers, as current cryptographic investigations suggest the vulnerability of server-side data security to potential breaches. This paper elucidates the process of implementing a cloud-centric cloud storage architecture and presents a unique security schema that validates the evidence of encrypted secret data storage. The researchers in this paper propose a novel computational security technique to tackle the issue of internal nodes by using efficient security strategies, hence minimizing computational overhead. The experimental results reported in this paper provide evidence of the greater effectiveness of the suggested mechanism in comparison to other commonly used security strategies.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135098502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Depression on Social Media : A Comprehensive Review of Data Analysis, Deep Learning, NLP, and Machine Learning Approaches 在社交媒体上检测抑郁症:对数据分析、深度学习、NLP和机器学习方法的全面回顾
None Tamanna Dhaker, None Aarju Kumar, None Dr. Abirami G
Social media platforms are vast reservoirs of human sentiment and behavior, making them ripe for depression detection. This literature review delves into approaches for this detection using data analysis, deep learning, natural language processing (NLP), and machine learning (ML). We discuss data types used and explore deep learning techniques like CNN, RNN, and DNN, applied across platforms such as Facebook, Twitter, and Reddit. The review also highlights NLP's role and ML algorithms, notably SVM, Naive Bayes, K-Nearest Neighbour, Random Forest, and Decision Trees. We analyze depression causes, its link with social media, and variations across age and gender. This comprehensive study guides researchers and practitioners in technology-driven mental health solutions.
社交媒体平台是人类情感和行为的巨大储存库,因此发现抑郁症的时机已经成熟。这篇文献综述深入探讨了使用数据分析、深度学习、自然语言处理(NLP)和机器学习(ML)进行这种检测的方法。我们讨论了使用的数据类型,并探索了CNN、RNN和DNN等深度学习技术,这些技术应用于Facebook、Twitter和Reddit等平台。该综述还强调了NLP的作用和ML算法,特别是支持向量机,朴素贝叶斯,k近邻,随机森林和决策树。我们分析了抑郁症的原因,它与社交媒体的联系,以及年龄和性别之间的差异。这项全面的研究为技术驱动的心理健康解决方案的研究人员和从业者提供了指导。
{"title":"Detecting Depression on Social Media : A Comprehensive Review of Data Analysis, Deep Learning, NLP, and Machine Learning Approaches","authors":"None Tamanna Dhaker, None Aarju Kumar, None Dr. Abirami G","doi":"10.32628/cseit2390510","DOIUrl":"https://doi.org/10.32628/cseit2390510","url":null,"abstract":"Social media platforms are vast reservoirs of human sentiment and behavior, making them ripe for depression detection. This literature review delves into approaches for this detection using data analysis, deep learning, natural language processing (NLP), and machine learning (ML). We discuss data types used and explore deep learning techniques like CNN, RNN, and DNN, applied across platforms such as Facebook, Twitter, and Reddit. The review also highlights NLP's role and ML algorithms, notably SVM, Naive Bayes, K-Nearest Neighbour, Random Forest, and Decision Trees. We analyze depression causes, its link with social media, and variations across age and gender. This comprehensive study guides researchers and practitioners in technology-driven mental health solutions.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135205817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational Linguistics: A Research Survey on Ambiguity and Anaphora Resolution 计算语言学:歧义与回指消解研究综述
None Harjit Singh
In this paper we briefly discuss main areas of computational linguistics particularly focus on the problem of ambiguity in computational linguistics. Then we take up the issue of ambiguity with inclusion of term anaphora which is well known in most of the languages and it is seen under pronouns specifically reflexives and reciprocals. In general, we have total five sections in this paper. First section primarily deals with introduction related to the topic and elaborates it in detail. Second section defines ambiguity with its background investigations in relation with computational linguistics. Third section presents detailed study on anaphoric ambiguity with strict sloppy readings at syntax level. Fourth section discusses about anaphora and soon it adds anaphora resolution irrespective of any specific language and most of the work related to anaphora resolution is mentioned from natural language processing point of view. Fifth is the last section where we conclude that ambiguity and anaphora both are difficult tasks for machine translation until unless we don’t train machine (computer) to learn as per given instructions and all.
本文简要讨论了计算语言学的主要领域,重点讨论了计算语言学中的歧义问题。然后我们讨论歧义的问题,包括术语回指,这在大多数语言中都是众所周知的,它在代词中很常见,特别是反身代词和往复式代词。总的来说,本文共分为五个部分。第一部分主要介绍了本课题的相关内容,并对其进行了详细阐述。第二部分定义了歧义及其与计算语言学相关的背景调查。第三部分从句法层面对回指歧义进行了详细的研究。第四部分讨论了回指,很快就增加了回指分解,而不考虑任何特定的语言,大多数与回指分解相关的工作都是从自然语言处理的角度提到的。第五部分是最后一部分,我们得出结论,歧义和回指都是机器翻译的困难任务,除非我们不训练机器(计算机)按照给定的指令学习。
{"title":"Computational Linguistics: A Research Survey on Ambiguity and Anaphora Resolution","authors":"None Harjit Singh","doi":"10.32628/cseit239059","DOIUrl":"https://doi.org/10.32628/cseit239059","url":null,"abstract":"In this paper we briefly discuss main areas of computational linguistics particularly focus on the problem of ambiguity in computational linguistics. Then we take up the issue of ambiguity with inclusion of term anaphora which is well known in most of the languages and it is seen under pronouns specifically reflexives and reciprocals. In general, we have total five sections in this paper. First section primarily deals with introduction related to the topic and elaborates it in detail. Second section defines ambiguity with its background investigations in relation with computational linguistics. Third section presents detailed study on anaphoric ambiguity with strict sloppy readings at syntax level. Fourth section discusses about anaphora and soon it adds anaphora resolution irrespective of any specific language and most of the work related to anaphora resolution is mentioned from natural language processing point of view. Fifth is the last section where we conclude that ambiguity and anaphora both are difficult tasks for machine translation until unless we don’t train machine (computer) to learn as per given instructions and all.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135368847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DALL. E 2 (。(2)
None Sudershan Manasvi Malhar
DALL.E 2 is a language model developed by OpenAI, which builds on the original DALL.E model. DALL.E is a neural network that can generate images from textual descriptions, allowing users to input written prompts and receive corresponding images. DALL.E 2 is an improved version of this technology, which has been trained on a larger and more diverse dataset, allowing it to generate more complex and varied images. DALL.E 2 can generate a wide variety of images, including objects, scenes, animals, and more, and can produce images that are surreal, humorous, or just plain bizarre. DALL·E 2 can understand the meaning of text and create images that match that meaning. This technology has many potential applications, from creative visual art to product design and advertising.
达尔。e2是由OpenAI开发的语言模型,它建立在原始的DALL之上。E模型。达尔。E是一个神经网络,可以从文本描述生成图像,允许用户输入书面提示并接收相应的图像。达尔。e2是该技术的改进版本,它已经在更大、更多样化的数据集上进行了训练,使其能够生成更复杂、更多样化的图像。达尔。e2可以生成各种各样的图像,包括物体、场景、动物等等,并且可以生成超现实的、幽默的或纯粹奇怪的图像。DALL·e2可以理解文本的含义,并创建与该含义相匹配的图像。这项技术有许多潜在的应用,从创造性的视觉艺术到产品设计和广告。
{"title":"DALL. E 2","authors":"None Sudershan Manasvi Malhar","doi":"10.32628/cseit239052","DOIUrl":"https://doi.org/10.32628/cseit239052","url":null,"abstract":"DALL.E 2 is a language model developed by OpenAI, which builds on the original DALL.E model. DALL.E is a neural network that can generate images from textual descriptions, allowing users to input written prompts and receive corresponding images. DALL.E 2 is an improved version of this technology, which has been trained on a larger and more diverse dataset, allowing it to generate more complex and varied images. DALL.E 2 can generate a wide variety of images, including objects, scenes, animals, and more, and can produce images that are surreal, humorous, or just plain bizarre. DALL·E 2 can understand the meaning of text and create images that match that meaning. This technology has many potential applications, from creative visual art to product design and advertising.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Utilizing Machine Learning and Big Data Analysis for Risk Mitigation and Fraud Detection in Finance 利用机器学习和大数据分析降低金融风险和欺诈检测
None Aayushi Waghela, None Dev Makadia, None Monika Mangla
With the rise of online banking systems and easy transactions, there is an increase in fraud in the banking system and in the field of finance. To reduce fraud in the transactions we can apply the systems of machine learning algorithms and big data analysis. In this research paper, we discuss various methods used in the field such as Supervised learning, Unsupervised learning, and Ensemble Methods in the field of machine learning and transaction monitoring, behavior analytics, network analytics, and pattern recognition in the field of real-time monitoring. We have used a data set from Kaggle on credit card transactions and the methods of Random Forest Classification and Support Vector Machine which comes under the supervised learning method in machine learning and discussed other results and benefits achieved from it.
随着网上银行系统的兴起和交易的便捷,银行系统和金融领域的欺诈行为有所增加。为了减少交易中的欺诈,我们可以应用机器学习算法和大数据分析系统。在这篇研究论文中,我们讨论了在机器学习和事务监控、行为分析、网络分析和实时监控领域的模式识别领域中使用的各种方法,如监督学习、无监督学习和集成方法。我们使用了来自Kaggle的信用卡交易数据集和机器学习中监督学习方法下的随机森林分类和支持向量机的方法,并讨论了它所获得的其他结果和好处。
{"title":"Utilizing Machine Learning and Big Data Analysis for Risk Mitigation and Fraud Detection in Finance","authors":"None Aayushi Waghela, None Dev Makadia, None Monika Mangla","doi":"10.32628/cseit2390529","DOIUrl":"https://doi.org/10.32628/cseit2390529","url":null,"abstract":"With the rise of online banking systems and easy transactions, there is an increase in fraud in the banking system and in the field of finance. To reduce fraud in the transactions we can apply the systems of machine learning algorithms and big data analysis. In this research paper, we discuss various methods used in the field such as Supervised learning, Unsupervised learning, and Ensemble Methods in the field of machine learning and transaction monitoring, behavior analytics, network analytics, and pattern recognition in the field of real-time monitoring. We have used a data set from Kaggle on credit card transactions and the methods of Random Forest Classification and Support Vector Machine which comes under the supervised learning method in machine learning and discussed other results and benefits achieved from it.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Corporate Governance on Financial Performance of Selected Insurance Companies in India 公司治理对印度保险公司财务绩效的影响
Indrajit Mondal, Dr. Biswambhar Mandal
Corporate Governance is the coalescence of rules, laws, processes by which businesses are regulated, operated and controlled. In-essence, corporate governance entails stabilizing the interests of the stakeholders of a company, such as investors, customers, employees, suppliers, communities, governments, or trade associations and the society as a whole. The rudimentary principles of corporate governance are accountability, transparency, fairness, and responsibility. In this study, we have tried to analyze the impact of corporate governance on the financial performance of the Indian insurance industry. For this purpose, a sample of 10 insurance companies has been selected among 56 insurance companies operating in India as per IRDA Annual Report (2021-22) from the accounting year 2018-19 to 2022-23 (5 years) using Purposive Sampling method. This study is fully based on secondary data, derived from annual reports, public disclosures, financial statements of IRDA and selected insurance companies. For analyzing the data, we have used correlation and multiple regression techniques. This study found that Board Mix and Independent Directors are positively and Female Board Members and CEO Duality are negatively associated with the financial performance of the Indian insurance industry.
公司治理是规则、法律和流程的结合,企业通过这些规则、法律和流程进行监管、运营和控制。从本质上讲,公司治理需要稳定公司利益相关者的利益,如投资者、客户、员工、供应商、社区、政府或行业协会以及整个社会。公司治理的基本原则是问责、透明、公平和责任。在本研究中,我们试图分析公司治理对印度保险业财务绩效的影响。为此,根据IRDA年度报告(2021-22),从2018-19会计年度到2022-23会计年度(5年),使用有目的抽样方法,在印度经营的56家保险公司中选择了10家保险公司的样本。本研究完全基于二手数据,这些数据来源于年度报告、公开披露、IRDA财务报表和选定的保险公司。为了分析数据,我们使用了相关和多元回归技术。本研究发现,董事会结构和独立董事与印度保险业的财务绩效呈正相关,女性董事会成员和首席执行官二元性与财务绩效呈负相关。
{"title":"Impact of Corporate Governance on Financial Performance of Selected Insurance Companies in India","authors":"Indrajit Mondal, Dr. Biswambhar Mandal","doi":"10.32628/cseit2390449","DOIUrl":"https://doi.org/10.32628/cseit2390449","url":null,"abstract":"Corporate Governance is the coalescence of rules, laws, processes by which businesses are regulated, operated and controlled. In-essence, corporate governance entails stabilizing the interests of the stakeholders of a company, such as investors, customers, employees, suppliers, communities, governments, or trade associations and the society as a whole. The rudimentary principles of corporate governance are accountability, transparency, fairness, and responsibility. In this study, we have tried to analyze the impact of corporate governance on the financial performance of the Indian insurance industry. For this purpose, a sample of 10 insurance companies has been selected among 56 insurance companies operating in India as per IRDA Annual Report (2021-22) from the accounting year 2018-19 to 2022-23 (5 years) using Purposive Sampling method. This study is fully based on secondary data, derived from annual reports, public disclosures, financial statements of IRDA and selected insurance companies. For analyzing the data, we have used correlation and multiple regression techniques. This study found that Board Mix and Independent Directors are positively and Female Board Members and CEO Duality are negatively associated with the financial performance of the Indian insurance industry.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient Technique for Data Security using Improved Elliptic Curve Cryptosystem over Cloud Computing 基于云计算的改进椭圆曲线密码系统的有效数据安全技术
None Sunil Manoi, None S C Lingareddy
Recent years have seen a rapid expansion of the cloud computing industry, which may be visualized as a distributed computing environment where cloud resources can be distributed shared. In comparison to traditional systems, there are thousands of computers operating in parallel, completing the specified task quickly. The parallel processing is made possible by the low cost of these virtualized hardware resources. In this paper, we discuss several cloud deployment options and how they differ from conventional computers in terms of security. Different methods that minimize the cloud and the limitations of current cryptographic techniques can be used to analyse this security. This research introduces ecliptic curve cryptography technique for various cloud-based applications and compares this technique with existing RSA algorithm-based applications to analyse the security in deployment models. The suggested elliptic curve based public key cryptography is shown to be superior to the current RSA algorithm based applications in this paper's experimental and theoretical results. Our experimental findings show that the suggested ECA approach outperforms the RSA algorithm. This aids in the use of security solutions for the various cloud computing deployment patterns that have been studied.
近年来,云计算产业发展迅速,可以将其可视化为一个分布式计算环境,云资源可以在其中进行分布式共享。与传统系统相比,有数千台计算机并行运行,可以快速完成指定的任务。这些虚拟化硬件资源的低成本使得并行处理成为可能。在本文中,我们将讨论几种云部署选项,以及它们在安全性方面与传统计算机的区别。可以使用不同的方法来最小化云和当前加密技术的局限性来分析这种安全性。本研究将黄道曲线加密技术引入各种基于云的应用程序,并将该技术与现有的基于RSA算法的应用程序进行比较,以分析部署模型中的安全性。本文的实验和理论结果表明,本文提出的基于椭圆曲线的公钥加密优于目前基于RSA算法的应用。我们的实验结果表明,建议的ECA方法优于RSA算法。这有助于为已经研究过的各种云计算部署模式使用安全解决方案。
{"title":"An efficient Technique for Data Security using Improved Elliptic Curve Cryptosystem over Cloud Computing","authors":"None Sunil Manoi, None S C Lingareddy","doi":"10.32628/cseit239053","DOIUrl":"https://doi.org/10.32628/cseit239053","url":null,"abstract":"Recent years have seen a rapid expansion of the cloud computing industry, which may be visualized as a distributed computing environment where cloud resources can be distributed shared. In comparison to traditional systems, there are thousands of computers operating in parallel, completing the specified task quickly. The parallel processing is made possible by the low cost of these virtualized hardware resources. In this paper, we discuss several cloud deployment options and how they differ from conventional computers in terms of security. Different methods that minimize the cloud and the limitations of current cryptographic techniques can be used to analyse this security. This research introduces ecliptic curve cryptography technique for various cloud-based applications and compares this technique with existing RSA algorithm-based applications to analyse the security in deployment models. The suggested elliptic curve based public key cryptography is shown to be superior to the current RSA algorithm based applications in this paper's experimental and theoretical results. Our experimental findings show that the suggested ECA approach outperforms the RSA algorithm. This aids in the use of security solutions for the various cloud computing deployment patterns that have been studied.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of a Document Management System with MVC Framework 基于MVC框架的文档管理系统的设计与实现
Sadik Khan, Aaesha T. Khanam
In order to solve the sharing document problem of the organizations online technically, we described the methods and advantages of building the DMS based on MVC Framework, achieve document sharing and information exchange among the heterogeneous systems. According to this model, we established a CodeIgniter MVC framework of the PHP, and designed and developed the realization of the internal DMS platform in detail. In this paper, we try to solve “how to share and store documents easily”. A Document Management System (DMS) provides a centralized platform to store, retrieve, and track documents, improving productivity and reducing manual errors. This research paper explores the design and implementation of a robust DMS using the Model-View-Controller (MVC) architectural pattern.
为了从技术上解决组织在线文档共享问题,阐述了基于MVC框架构建DMS的方法和优点,实现了异构系统之间的文档共享和信息交换。根据该模型,我们建立了PHP的CodeIgniter MVC框架,并详细设计开发了内部DMS平台的实现。在本文中,我们试图解决“如何方便地共享和存储文档”。文档管理系统(Document Management System, DMS)提供了一个集中的平台来存储、检索和跟踪文档,从而提高了工作效率并减少了人工错误。本研究论文探讨了使用模型-视图-控制器(MVC)架构模式的健壮的DMS的设计和实现。
{"title":"Design and Implementation of a Document Management System with MVC Framework","authors":"Sadik Khan, Aaesha T. Khanam","doi":"10.32628/cseit2390451","DOIUrl":"https://doi.org/10.32628/cseit2390451","url":null,"abstract":"In order to solve the sharing document problem of the organizations online technically, we described the methods and advantages of building the DMS based on MVC Framework, achieve document sharing and information exchange among the heterogeneous systems. According to this model, we established a CodeIgniter MVC framework of the PHP, and designed and developed the realization of the internal DMS platform in detail. In this paper, we try to solve “how to share and store documents easily”. A Document Management System (DMS) provides a centralized platform to store, retrieve, and track documents, improving productivity and reducing manual errors. This research paper explores the design and implementation of a robust DMS using the Model-View-Controller (MVC) architectural pattern.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135937209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on MVC Framework for Web Development in PHP PHP中Web开发的MVC框架研究
Sadik Khan, Aaesha T. Khanam
The Model–View–Controller (MVC) design pattern is widely used in web development and ERP to separate data layer, presentation layer, and user interaction concerns. In recent years there have been many PHP frameworks available for web developers to choose from right one. Developers face difficulty in choosing the relevant frameworks and appropriate support functions with libraries to include in their projects. For this reason, a clear understanding of the various frameworks is now becoming an important requirement for web developers. In this paper, we studied several research papers talking about different PHP frameworks, and we compared them with each other for result. In PHP, there are several MVC frameworks available that provide a structured approach to developing web applications. The purpose of this research paper is to explore and review some of the popular MVC frameworks for web development in PHP.
模型-视图-控制器(Model-View-Controller, MVC)设计模式被广泛应用于web开发和ERP中,用于分离数据层、表示层和用户交互。近年来,有许多PHP框架可供web开发人员选择。开发人员在选择相关框架和适当的库支持功能以包含在他们的项目中时面临困难。由于这个原因,对各种框架的清晰理解现在成为web开发人员的重要要求。在本文中,我们研究了几篇关于不同PHP框架的研究论文,并对它们进行了比较。在PHP中,有几个可用的MVC框架,它们提供了开发web应用程序的结构化方法。这篇研究论文的目的是探索和回顾一些流行的PHP web开发MVC框架。
{"title":"Study on MVC Framework for Web Development in PHP","authors":"Sadik Khan, Aaesha T. Khanam","doi":"10.32628/cseit2390450","DOIUrl":"https://doi.org/10.32628/cseit2390450","url":null,"abstract":"The Model–View–Controller (MVC) design pattern is widely used in web development and ERP to separate data layer, presentation layer, and user interaction concerns. In recent years there have been many PHP frameworks available for web developers to choose from right one. Developers face difficulty in choosing the relevant frameworks and appropriate support functions with libraries to include in their projects. For this reason, a clear understanding of the various frameworks is now becoming an important requirement for web developers. In this paper, we studied several research papers talking about different PHP frameworks, and we compared them with each other for result. In PHP, there are several MVC frameworks available that provide a structured approach to developing web applications. The purpose of this research paper is to explore and review some of the popular MVC frameworks for web development in PHP.","PeriodicalId":313456,"journal":{"name":"International Journal of Scientific Research in Computer Science, Engineering and Information Technology","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135937207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1