This document presents a technique for classifying network traffic and detecting unknown flows in wireless sensor networks. The technique aims to improve on previous work by using fewer labeled training samples and investigating flow correlation in real-world network environments. It proposes a method that selects a sender and receiver node, establishes a path between them by avoiding faulty nodes, and evaluates the system based on propagation rate, training purity, and accuracy. The results show the proposed method achieves higher propagation rate, training purity, and overall accuracy compared to an existing semi-supervised technique.
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
This document analyzes the data rate performance of a point-to-multipoint wireless link in the University of Ilorin campus network. It describes using Ubiquiti Rocket M5 Titanium wireless devices located at the Network Operations Center to connect to five access points across campus. Monitoring software recorded transmission rates, reception rates, signal strength, noise, latency, and throughput between the access points. The analyses aimed to evaluate the impact of impairments like interference on network performance and compute regression coefficients to show how packet loss varies between access points.
An analysis of a large scale wireless image distribution system deployment
This document describes two setups of a wireless image distribution system:
1. A setup using commercial network equipment like access points and an access controller, which supported over 125 connected devices and provided sufficient bandwidth for the system load during a conference.
2. A setup using a wireless mesh network of NICT NerveNet nodes, which provided a quick and easy setup but had room for improved performance based on analysis of the wireless backhaul links and connected devices. Both setups were tested and analyzed to evaluate network technologies for smart community applications.
Performance Analysis of Data Traffic Offload Scheme on Long Term Evolution (L...
One of new mobile technology is being developed by 3GPP is Long Term Evolution (LTE). LTE
usually used by user because provide high data rate. Many traffic sending over LTE, makes several users
didn’t get good Quality of Service (QoS). Traffic diversion is needed to increasing QoS value. It can be
done with offloading data method from LTE to Wi-Fi network. This paper using 802.11ah standard to
evaluate Wi-Fi network. IEEE 802.11ah have 1000 meters coverage area and efficiency energy
mechanism, which is proposed for M2M in 5G techonology. Some research has proven that traffic
diversion with offloading can increasing network performance. The contribution of this paper is to evaluate
the impact of traffic offload between LTE and IEEE 802.11ah standard. This paper propose two scenarios
using increment number of user and increment mobility speed of user to evaluate throughput and delay
value before and after the offload process. The simulation will simulate using Network Simulator-3. We can
conclude that network performance after offloading is better for every scenario. For increment number of
user scenario, throughput value increasing 29.08%, and delay decreasing 8.12%. Scenario with increment
mobility speed of user obtain throughput value increasing 37,57%, and delay value decreasing 27.228%.
EMPIRICAL PERFORMANCE EVALUATION OF ENHANCED THROUGHPUT SCHEMES OF IEEE802.11...ijwmn
This document summarizes previous research on evaluating the performance of enhanced throughput schemes in IEEE802.11 wireless area networks. It discusses how previous studies have analyzed coverage, signal strength, and throughput using simulations and empirical models. This study aims to build on previous work by evaluating IEEE802.11ac networks using real applications to analyze metrics like throughput, capacity, and reliability under various quality of service enhancement schemes like beamforming.
IRJET - Securing Computers from Remote Access Trojans using Deep Learning...IRJET Journal
This document presents a system that uses deep learning to detect Remote Access Trojans (RATs) with high accuracy. The proposed system has two operators - a host analyzer that monitors the host for irregularities, and a network analyzer that monitors network traffic for RAT patterns using an Artificial Neural Network algorithm. The system was tested on real datasets and achieved over 99.3% accuracy in detecting RAT files, with low false positive rates. Future work includes further reducing false positives and increasing the number of RAT samples to improve accuracy.
This document presents an Intelligent Vertical Handoff Algorithm (IVHA) that uses fuzzy logic to improve handoff decisions between heterogeneous wireless networks. The algorithm has two phases: 1) The handoff initialization phase uses fuzzy logic to adaptively set the handoff threshold based on RSSI, SINR, and data rate to trigger handoffs at the right time. 2) The handoff decision phase uses fuzzy logic to select the best network among available options based on bandwidth, network load, coverage, and user velocity. The algorithm aims to improve quality of service by reducing problems like ping-ponging during handoffs.
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
This document analyzes the data rate performance of a point-to-multipoint wireless link in the University of Ilorin campus network. It describes using Ubiquiti Rocket M5 Titanium wireless devices located at the Network Operations Center to connect to five access points across campus. Monitoring software recorded transmission rates, reception rates, signal strength, noise, latency, and throughput between the access points. The analyses aimed to evaluate the impact of impairments like interference on network performance and compute regression coefficients to show how packet loss varies between access points.
An analysis of a large scale wireless image distribution system deploymentConference Papers
This document describes two setups of a wireless image distribution system:
1. A setup using commercial network equipment like access points and an access controller, which supported over 125 connected devices and provided sufficient bandwidth for the system load during a conference.
2. A setup using a wireless mesh network of NICT NerveNet nodes, which provided a quick and easy setup but had room for improved performance based on analysis of the wireless backhaul links and connected devices. Both setups were tested and analyzed to evaluate network technologies for smart community applications.
Performance Analysis of Data Traffic Offload Scheme on Long Term Evolution (L...TELKOMNIKA JOURNAL
One of new mobile technology is being developed by 3GPP is Long Term Evolution (LTE). LTE
usually used by user because provide high data rate. Many traffic sending over LTE, makes several users
didn’t get good Quality of Service (QoS). Traffic diversion is needed to increasing QoS value. It can be
done with offloading data method from LTE to Wi-Fi network. This paper using 802.11ah standard to
evaluate Wi-Fi network. IEEE 802.11ah have 1000 meters coverage area and efficiency energy
mechanism, which is proposed for M2M in 5G techonology. Some research has proven that traffic
diversion with offloading can increasing network performance. The contribution of this paper is to evaluate
the impact of traffic offload between LTE and IEEE 802.11ah standard. This paper propose two scenarios
using increment number of user and increment mobility speed of user to evaluate throughput and delay
value before and after the offload process. The simulation will simulate using Network Simulator-3. We can
conclude that network performance after offloading is better for every scenario. For increment number of
user scenario, throughput value increasing 29.08%, and delay decreasing 8.12%. Scenario with increment
mobility speed of user obtain throughput value increasing 37,57%, and delay value decreasing 27.228%.
Low-cost wireless mesh communications based on openWRT and voice over interne...IJECEIAES
Technology makes it easier for us to communicate over a distance. However, there are still many remote areas that find it difficult to communicate. This is due to the fact that communication infrastructure in some areas is expensive to build while the profit will be low. This paper proposes to combine voice over internet protocol (VoIP) over mesh network implemented on openWRT router. The routers are performing mesh functions. We set up a VoIP server on a router and enabled session initiation protocol (SIP) clients on other routers. Therefore, we only need routers as a means of communication. The experiment showed very good results, in the line-of-sight (LOS) condition, they are limited to reception distances up to 145 meters while in the non-lineof-sight (NLOS) condition, they are limited to reception distances up to 55 meters.
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
This document summarizes a research paper that proposes a Challenge-Response Authentication Protocol (CRAP) to detect Sybil attacks in wireless sensor networks. The CRAP generates unique keys for each transmission to provide encrypted communication. It is used to prevent Sybil attacks where an attacker steals node identities during data transmission. The performance of the detection scheme is evaluated using detection ratio. The proposed CRAP involves three phases: 1) nodes are selected and grouped, 2) two nearby nodes transmit packets to detect collisions indicating Sybil nodes, 3) if no hop is detected between Sybil identities, the nodes are confirmed to be under attack. The scheme is analyzed using performance metrics like packet delivery ratio, energy efficiency, and attack detection ratio.
IRJET- Energy Efficient Technique to Reduce Energy Consumption in IoTIRJET Journal
This document proposes an energy efficient technique (ETREC) to reduce energy consumption in Internet of Things (IoT) networks based on packet size. It summarizes existing energy efficient routing protocols for IoT and identifies energy consumption as a key issue. The proposed ETREC technique selects the path with the minimum packet size from among available paths between a source and destination. It classifies paths as low, medium or maximum based on packet size and prioritizes forwarding along low packet size paths to minimize energy consumption. Simulation results using the Network Simulator 2 tool demonstrate that ETREC reduces energy consumption compared to existing techniques.
This document summarizes a student's paper on using reinforcement learning for anomaly detection in software defined networks. The student aims to use machine learning techniques, specifically reinforcement learning, to make network traffic control decisions given certain network attack scenarios. The student's methodology involves using network statistics collected from an OpenFlow switch to define states for a reinforcement learning algorithm. The algorithm is deployed on the application plane of an SDN architecture and aims to identify anomalous traffic flows based on features like flow size and packet counts, then take actions through the controller to stop anomalous traffic from affecting the network. Initial testing of the approach showed potential for detecting ping flood and SYN flood attacks on the simulated network.
Noor’s Algorithmic Flow of Electronics and Communication EngineeringIRJET Journal
This document outlines an algorithmic flowchart for electronics and communication engineering. It begins with an introduction to analog electronics, digital electronics, and communication. The fundamental blocks are then described as analog electronics, digital electronics, and analog and digital communication. A flow chart is presented showing the interrelationships between these areas. The document then discusses how analog and digital electronics and communication relate and provide examples of applications in both fields. It concludes by emphasizing the importance of understanding both analog and digital aspects and their combined use in engineering applications.
Multiple intrusion detection in RPL based networks IJECEIAES
Routing Protocol for Low Power and Lossy Networks based networks consists of large number of tiny sensor nodes with limited resources. These nodes are directly connected to the Internet through the border router. Hence these nodes are susceptible to different types of attacks. The possible attacks are rank attack, selective forwarding, worm hole and Denial of service attack. These attacks can be effectively identified by intrusion detection system model. The paper focuses on identification of multiple intrusions by considering the network size as 10, 40 and 100 nodes and adding 10%, 20% and 30% of malicious nodes to the considered network. Experiments are simulated using Cooja simulator on Contiki operating system. Behavior of the network is observed based on the percentage of inconsistency achieved, energy consumption, accuracy and false positive rate. Experimental results show that multiple intrusions can be detected effectively by machine learning techniques.
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
This document analyzes the performance of wireless trusted software defined networks (SDNs) by considering metrics like energy consumption, throughput, end-to-end delay, and packet delivery ratio. It finds that SDNs perform better than conventional networks without SDN capabilities. It also compares the energy consumption of different SDN topology models. The key findings are that SDNs provide centralized control, programmability, and flexibility that improve performance compared to traditional networks. Additionally, different SDN topology models have varying levels of energy efficiency.
The document summarizes the design of an HDLC controller with CRC generation using VHDL. It discusses:
1. HDLC is a standard protocol that organizes data into frames for point-to-point transmission with error detection. It includes address, control and CRC fields.
2. The design of the HDLC controller includes transmitter and receiver sections. The transmitter adds flag sequences and CRC to frames. The receiver detects flags, removes stuffing and checks the CRC.
3. Simulation results show the controller can generate and check CRC to detect errors for an example transmission of an 8-bit data byte and 8-bit address.
Best strategy to control data on internet-of-robotic-things in heterogeneous ...IJECEIAES
1. The document proposes a new routing strategy called Routing Information and Distance Vector (RIDV) to improve data transmission in heterogeneous networks used for Internet of Robotic Things (IoRT) applications.
2. The RIDV strategy activates the Routing Information Protocol version 2 (RIPv2) on routers in wired networks and the Ad-hoc On-demand Distance Vector (AODV) protocol in wireless networks. It unifies their routing tables to reduce congestion.
3. Simulation results show that RIDV improved quality of service over other strategies and individual protocols by reducing data and traffic drop, queue delay, and increasing throughput.
Dynamic resource allocation for opportunistic software-defined IoT networks: s...IJECEIAES
This document proposes a dynamic resource allocation algorithm for opportunistic software-defined IoT networks using a stochastic optimization framework. It formulates the problem as a two-stage binary linear stochastic program that aims to maximize network throughput while selecting transmission powers to minimize total power consumption under uncertain interference and traffic demands. Due to interference being a continuous random variable correlated over time, the algorithm instead solves a suboptimal sampling problem exploiting interference correlation. It periodically runs over time to adapt to changing channel and interference conditions, significantly increasing simultaneous IoT transmissions and achieved throughput compared to typical algorithms.
Visualization of Computer Forensics Analysis on Digital EvidenceMuhd Mu'izuddin
- This is my first article, its for my Final Year Project for Bachelor's of Computer Science (Systems and Networking)
- It also will be uploaded into CyberSecurity Malaysia E-Bulletin for 2017
As the enormous use of internet increases day by day so as security concern is also raise day by day over
the internet. In this paper we discuss the network security and its related threats and also study the types of
protocols and few issues related to protocols in computer networks. We also simulate the design of 5 node
wired network scenario, its packet drop rate analysis through TCP protocol using NS2 as a simulator.
Analyzed the performance of 5-node network when the packet is drop down by graphical method also
called as Xgraph when rate parameter is in mb and also analyzed the performance of same network by
changing the value of rate parameter at same time so no packets would drop down at same time and also
analyzed the performance by Xgraph method.
This document discusses the challenges facing next-generation networks. It describes how current networks are struggling to handle the exponential growth in data usage and number of users. Next-generation networks aim to address this by improving network capabilities. However, developing these advanced networks presents challenges such as maintaining energy efficiency, addressing environmental impacts, and dealing with security and software issues. Specific challenges mentioned include utilizing spectrum efficiently using technologies like cognitive radio, reducing carbon emissions, and handling problems associated with software-defined networking.
IRJET - Detecting and Securing of IP Spoofing Attack by using SDNIRJET Journal
This document discusses detecting and preventing IP spoofing attacks using software-defined networking (SDN). It begins with an abstract that outlines using SDN architecture to implement controls for IP spoofing through an algorithm to manage flows of unused IP addresses via the shortest path. It then discusses how IP spoofing works by creating packets with fake source IP addresses. The proposed approach uses SDN destination networking to associate source networks with cryptographic keys added to packets for authentication by routers. This provides incentives for internet service providers to implement spoofing prevention. Evaluation shows the proposed approach improves performance metrics like IP address usage, intrusion detection, secure data transmission, and synchronization compared to existing methods.
Novel Method to Overcome Vulnerability in Wi-Fi NetworkIRJET Journal
This document proposes a novel method called Basil's Numbering Scheme (BNS) to overcome denial-of-service (DoS) attacks in Wi-Fi networks. In a BNS, the source node checks if communicating nodes are authorized using an Intruder Check Table. For suspicious packets, BNS redirects them and asks the user to enter a custom initial sequence number rather than a random one. This makes it difficult for hackers to predict sequence numbers and launch MAC spoofing attacks. Simulations show that under DoS attack, BNS improves throughput to near 100% and reduces packet loss compared to no security method.
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET Journal
This document proposes a deep learning model for detecting and identifying cyber attacks in wireless networks. The model uses an autoencoder and random forest classifier to extract features from network data and classify behaviors as malicious or benign. The model was evaluated on the NSL KDD Cup dataset and achieved an accuracy of 82% in detecting attacks. Key aspects of the model include using a non-symmetric deep autoencoder for feature extraction and dimensionality reduction, identifying and removing low frequency attacks from the data, and evaluating performance metrics like detection rate and precision.
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET Journal
This document proposes an efficient model for detecting and identifying cyber attacks in wireless networks using deep learning approaches. The model is designed to perform feature selection and classification on network data to detect malicious behavior. The model architecture includes input, hidden, and output layers for feature extraction, and uses a random forest classifier trained on the NSL KDD Cup dataset. Experimental results using the KDD Cup and NSL-KDD datasets show the model can accurately classify network behaviors and detect cyber attacks with over 82% accuracy.
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET Journal
This document discusses a proposed wireless sensor network system for border monitoring using clusters. Sensor nodes would be deployed randomly along the border to detect intruders. The nodes would be organized into clusters with cluster heads that form a virtual grid network. If a cluster head detects an inconsistency in border activity compared to expected states, it would inform neighboring nodes and the base station that a border breach has occurred. The system aims to enhance border security while reducing human presence through use of an autonomous wireless sensor network.
IRJET- Machine Learning based Network SecurityIRJET Journal
The document discusses using machine learning algorithms to classify network traffic as malicious or non-malicious. It describes capturing packets from a dummy website under distributed denial of service (DDoS) attack to create a dataset. Two machine learning algorithms, naive Bayes and support vector machines (SVM), are used to classify the network traffic. Both algorithms achieved over 98% accuracy in detecting spam traffic. The paper proposes creating a real-time network traffic classification system using machine learning algorithms to improve network security.
IRJET- Vanet Connection Performance Analysis using GPSR ProtocolIRJET Journal
The document discusses performance analysis of VANET (vehicular ad hoc network) connections using the GPSR (Greedy Perimeter Stateless Routing) protocol. It proposes an energy-aware version of GPSR that optimizes greedy forwarding by selecting neighbor nodes to forward packets to based on both distance to the destination and remaining energy. The methodology section describes simulating the VANET network, implementing traffic monitoring using probe messages, predicting link lifetimes, using Bloom filters for 2-hop neighbor management, and evaluating performance based on data throughput and transmission time. The conclusion states that incorporating link lifetime prediction into an existing reliable routing protocol like RIVER can improve reliability in VANETs.
IRJET- Software Defined Network: DDOS Attack DetectionIRJET Journal
This document discusses software defined networks (SDNs) and detecting distributed denial-of-service (DDoS) attacks in SDNs. It provides background on SDN architecture and how DDoS attacks work. The paper aims to address risks of DDoS attacks in SDNs and focuses on detection. It describes existing DDoS attack techniques and solutions. The document proposes using algorithms like TCM-KNN and DPTCM-KNN for detection of attacks in network traffic flows, and compares the two algorithms using parameters like packet length and response time.
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET Journal
This document discusses securing the Ad-Hoc On-Demand Distance Vector (AODV) routing protocol from wormhole attacks in mobile ad-hoc networks. It proposes using clustering to mitigate the effects of wormhole attacks. Wormhole attacks are powerful attacks in ad-hoc networks that involve tunneling network traffic between two colluding attackers. The document reviews related work on clustering algorithms, TCP and SYN cookies, security-enhanced RFID systems, wormhole detection algorithms, analyzing the impact of wormhole attacks, and new clustering protocols for mobile ad-hoc networks. It aims to simulate the effect of wormhole attacks on AODV and analyze network performance with and without such attacks using the NS2 network simulator.
Enhanced Bee Colony Optimization Mechanism In Content Recommendation SystemIRJET Journal
The document discusses an enhanced bee colony optimization mechanism for content recommendation systems. It begins by discussing how bee colony optimization, inspired by the foraging behavior of honeybees, is often used as the basis for recommendation algorithms. It then describes the existing recommendation system process of acquiring user information, preprocessing it, and providing recommendations to users. The proposed system aims to provide more optimized recommendations to users using a bee colony optimization approach that classifies items based on features to avoid ambiguity.
IRJET- A Study on IOT Approach for Monitoring Water Quality using MQTT Al...IRJET Journal
This document describes a study on using an Internet of Things (IOT) approach to monitor water quality using the MQTT (Message Queuing Telemetry Transport) algorithm. The study developed a low-cost system to measure water quality parameters such as pH, temperature, and dissolved oxygen in real-time using sensors. The MQTT algorithm allows data from the sensors to be published and subscribed between the sensor system and end devices simultaneously. This provides faster, more reliable, and secure data transmission compared to previous methods. The data is analyzed using the Naive Bayes' theorem to determine water quality.
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
The Network administrators usually rely on generic and built-in monitoring tools for network
security. Ideally, the network infrastructure is supposed to have carefully designed strategies to scale up
monitoring tools and techniques as the network grows, over time. Without this, there can be network
performance challenges, downtimes due to failures, and most importantly, penetration attacks. These can lead to
monetary losses as well as loss of reputation. Thus, there is a need for best practices to monitor network
infrastructure in an agile manner. Network security monitoring involves collecting network packet data,
segregating it among all the 7 OSI layers, and applying intelligent algorithms to get answers to security-related
questions. The purpose is to know in real-time what is happening on the network at a detailed level, and
strengthen security by hardening the processes, devices, appliances, software policies, etc. The Multi Router
Traffic Grapher, or just simply MRTG, is free software for monitoring and measuring the traffic load
on network links. It allows the user to see traffic load on a network over time in graphical form.
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
1) The document discusses detection and prevention of denial of service (DoS) attacks in mobile ad-hoc networks.
2) It focuses on identifying malicious nodes that conduct traffic jamming attacks by disrupting communication.
3) The proposed approach detects malicious nodes using a reliability value determined by broadcast reliability packets, where nodes that don't respond in a set time have their reliability value decreased until it reaches below zero, identifying them as malicious.
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless NetworksIRJET Journal
1) The document presents a method for network selection in heterogeneous wireless networks using the Analytic Hierarchy Process (AHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) along with utility functions.
2) It aims to select the best network to avoid excessive switching between networks and provide smooth handover for different application types.
3) The proposed AHP and TOPSIS method incorporates quality of service parameters like data rate, delay, jitter and cost to calculate scores for each network and select the most suitable one for different application types including conversational, streaming and interactive.
The Utility based AHP& TOPSIS Methods for Smooth Handover in Wireless NetworksIRJET Journal
1) The document presents a method for network selection in heterogeneous wireless networks using the Analytic Hierarchy Process (AHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) along with utility functions.
2) It aims to select the best network to avoid excessive switching between networks and provide smooth handovers for different application types while meeting their quality of service requirements.
3) The proposed AHP and TOPSIS approach considers attributes like data rate, cost, delay and jitter to calculate scores for different networks and select the optimal one for the application and user preferences.
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...IRJET Journal
This document proposes a cross-layer commit protocol for sensor data aggregation in smart cities. It implements query-based data aggregation using the network and application layers. The application layer initiates queries that are sent to sensor nodes. Nodes that can provide the requested data reply to form clusters. The node with the highest residual energy and closest average distance to members is selected as cluster head. As cluster head, it collects and aggregates data from members and sends it to the sink node. This approach reduces energy consumption compared to other data aggregation methods. A prototype was created to test the protocol for applications like garbage monitoring and weather sensing.
IRJET - A Review on Analysis of Location Management in Mobile ComputingIRJET Journal
This document reviews location management in mobile computing. It discusses various location management schemes including location updates and location queries. Static update strategies like location areas and reporting cells are described, as well as dynamic update strategies that account for user mobility and call frequency. Key components of location management systems are outlined, including base stations, base station controllers, cells, handoffs, home location registers, and location areas. Issues in location management like location registration, paging, and call delivery are also summarized. The document provides an overview of the important area of location management for tracking user locations in mobile networks.
Classification of Software Defined Network Traffic to provide Quality of ServiceIRJET Journal
This document discusses classifying network traffic using machine learning to provide quality of service in software defined networks. It aims to classify traffic by application to prioritize user required traffic and restrict unnecessary traffic like from over-the-top platforms to improve quality of service. The document reviews several related works applying techniques like naive bayes, support vector machines, and fuzzy logic for traffic classification and management in software defined networks to improve quality of service metrics.
Intelligent traffic light controller using embedded systemIRJET Journal
This document describes an intelligent traffic light controller system using embedded technology. The system uses IR sensors to detect vehicle counts on roads and an ADC to convert the analog sensor data to digital data for processing by a microcontroller. A K-means clustering algorithm is used to determine optimal traffic light timing schedules based on vehicle counts. The timings are sent to traffic lights through the microcontroller. Vehicle counts and timings are stored in a MySQL database. The system aims to minimize traffic delays by dynamically adjusting light schedules in real-time based on current traffic conditions.
Energy Efficinet Intrusion Detection System in mobile ad-hoc networksIJARIIE JOURNAL
This document summarizes a proposed energy efficient intrusion detection system for mobile ad-hoc networks. It begins with an introduction to intrusion detection systems and mobile ad-hoc networks. It then discusses related work on intrusion detection in mobile ad-hoc networks. The proposed system uses an "impact factor" calculation to select cluster heads in an energy-efficient manner while preventing selfish behavior. Cluster heads run the intrusion detection system using a watchdog method to detect misbehaving nodes. Simulation results show that forming clusters reduces energy consumption compared to all nodes running intrusion detection independently.
Signal Classification and Identification for Cognitive RadioIRJET Journal
This document discusses signal classification and identification techniques for cognitive radios. It evaluates machine learning and statistical signal processing approaches for tasks like automatic modulation classification (AMC) and multi-transmitter identification. For AMC, machine learning outperforms signal processing with 100% accuracy beyond 10dB for 100 test samples, except for 64-QAM. For multi-transmitter identification, machine learning achieves 70-80% accuracy for 2-5 users, outperforming signal processing which achieves 50% accuracy. However, signal processing is faster. The document generates test data using GNU radio and evaluates algorithms like K-nearest neighbor and maximum likelihood for the tasks. It concludes machine learning has higher accuracy but signal processing is faster, so algorithm
Similar to An Enhanced Technique for Network Traffic Classification with unknown Flow Detection (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Development of Chatbot Using AI/ML Technologiesmaisnampibarel
The rapid advancements in artificial intelligence and natural language processing have significantly transformed human-computer interactions. This thesis presents the design, development, and evaluation of an intelligent chatbot capable of engaging in natural and meaningful conversations with users. The chatbot leverages state-of-the-art deep learning techniques, including transformer-based architectures, to understand and generate human-like responses.
Key contributions of this research include the implementation of a context- aware conversational model that can maintain coherent dialogue over extended interactions. The chatbot's performance is evaluated through both automated metrics and user studies, demonstrating its effectiveness in various applications such as customer service, mental health support, and educational assistance. Additionally, ethical considerations and potential biases in chatbot responses are examined to ensure the responsible deployment of this technology.
The findings of this thesis highlight the potential of intelligent chatbots to enhance user experience and provide valuable insights for future developments in conversational AI.
In May 2024, globally renowned natural diamond crafting company Shree Ramkrishna Exports Pvt. Ltd. (SRK) became the first company in the world to achieve GNFZ’s final net zero certification for existing buildings, for its two two flagship crafting facilities SRK House and SRK Empire. Initially targeting 2030 to reach net zero, SRK joined forces with the Global Network for Zero (GNFZ) to accelerate its target to 2024 — a trailblazing achievement toward emissions elimination.
OCS Training Institute is pleased to co-operate with
a Global provider of Rig Inspection/Audits,
Commission-ing, Compliance & Acceptance as well as
& Engineering for Offshore Drilling Rigs, to deliver
Drilling Rig Inspec-tion Workshops (RIW) which
teaches the inspection & maintenance procedures
required to ensure equipment integrity. Candidates
learn to implement the relevant standards &
understand industry requirements so that they can
verify the condition of a rig’s equipment & improve
safety, thus reducing the number of accidents and
protecting the asset.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...YanKing2
Pre-trained Large Language Models (LLM) have achieved remarkable successes in several domains. However, code-oriented LLMs are often heavy in computational complexity, and quadratically with the length of the input code sequence. Toward simplifying the input program of an LLM, the state-of-the-art approach has the strategies to filter the input code tokens based on the attention scores given by the LLM. The decision to simplify the input program should not rely on the attention patterns of an LLM, as these patterns are influenced by both the model architecture and the pre-training dataset. Since the model and dataset are part of the solution domain, not the problem domain where the input program belongs, the outcome may differ when the model is trained on a different dataset. We propose SlimCode, a model-agnostic code simplification solution for LLMs that depends on the nature of input code tokens. As an empirical study on the LLMs including CodeBERT, CodeT5, and GPT-4 for two main tasks: code search and summarization. We reported that 1) the reduction ratio of code has a linear-like relation with the saving ratio on training time, 2) the impact of categorized tokens on code simplification can vary significantly, 3) the impact of categorized tokens on code simplification is task-specific but model-agnostic, and 4) the above findings hold for the paradigm–prompt engineering and interactive in-context learning and this study can save reduce the cost of invoking GPT-4 by 24%per API query. Importantly, SlimCode simplifies the input code with its greedy strategy and can obtain at most 133 times faster than the state-of-the-art technique with a significant improvement. This paper calls for a new direction on code-based, model-agnostic code simplification solutions to further empower LLMs.
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionBert Blevins
Cybersecurity breaches are a growing threat in today’s interconnected digital landscape, affecting individuals, businesses, and governments alike. These breaches compromise sensitive information and erode trust in online services and systems. Understanding the causes, consequences, and prevention strategies of cybersecurity breaches is crucial to protect against these pervasive risks.
Cybersecurity breaches refer to unauthorized access, manipulation, or destruction of digital information or systems. They can occur through various means such as malware, phishing attacks, insider threats, and vulnerabilities in software or hardware. Once a breach happens, cybercriminals can exploit the compromised data for financial gain, espionage, or sabotage. Causes of breaches include software and hardware vulnerabilities, phishing attacks, insider threats, weak passwords, and a lack of security awareness.
The consequences of cybersecurity breaches are severe. Financial loss is a significant impact, as organizations face theft of funds, legal fees, and repair costs. Breaches also damage reputations, leading to a loss of trust among customers, partners, and stakeholders. Regulatory penalties are another consequence, with hefty fines imposed for non-compliance with data protection regulations. Intellectual property theft undermines innovation and competitiveness, while disruptions of critical services like healthcare and utilities impact public safety and well-being.
Best Practices of Clothing Businesses in Talavera, Nueva Ecija, A Foundation ...IJAEMSJORNAL
This study primarily aimed to determine the best practices of clothing businesses to use it as a foundation of strategic business advancements. Moreover, the frequency with which the business's best practices are tracked, which best practices are the most targeted of the apparel firms to be retained, and how does best practices can be used as strategic business advancement. The respondents of the study is the owners of clothing businesses in Talavera, Nueva Ecija. Data were collected and analyzed using a quantitative approach and utilizing a descriptive research design. Unveiling best practices of clothing businesses as a foundation for strategic business advancement through statistical analysis: frequency and percentage, and weighted means analyzing the data in terms of identifying the most to the least important performance indicators of the businesses among all of the variables. Based on the survey conducted on clothing businesses in Talavera, Nueva Ecija, several best practices emerge across different areas of business operations. These practices are categorized into three main sections, section one being the Business Profile and Legal Requirements, followed by the tracking of indicators in terms of Product, Place, Promotion, and Price, and Key Performance Indicators (KPIs) covering finance, marketing, production, technical, and distribution aspects. The research study delved into identifying the core best practices of clothing businesses, serving as a strategic guide for their advancement. Through meticulous analysis, several key findings emerged. Firstly, prioritizing product factors, such as maintaining optimal stock levels and maximizing customer satisfaction, was deemed essential for driving sales and fostering loyalty. Additionally, selecting the right store location was crucial for visibility and accessibility, directly impacting footfall and sales. Vigilance towards competitors and demographic shifts was highlighted as essential for maintaining relevance. Understanding the relationship between marketing spend and customer acquisition proved pivotal for optimizing budgets and achieving a higher ROI. Strategic analysis of profit margins across clothing items emerged as crucial for maximizing profitability and revenue. Creating a positive customer experience, investing in employee training, and implementing effective inventory management practices were also identified as critical success factors. In essence, these findings underscored the holistic approach needed for sustainable growth in the clothing business, emphasizing the importance of product management, marketing strategies, customer experience, and operational efficiency.
Software Engineering and Project Management - Introduction to Project ManagementPrakhyath Rai
Introduction to Project Management: Introduction, Project and Importance of Project Management, Contract Management, Activities Covered by Software Project Management, Plans, Methods and Methodologies, some ways of categorizing Software Projects, Stakeholders, Setting Objectives, Business Case, Project Success and Failure, Management and Management Control, Project Management life cycle, Traditional versus Modern Project Management Practices.
Online music portal management system project report.pdfKamal Acharya
The iMMS is a unique application that is synchronizing both user
experience and copyrights while providing services like online music
management, legal downloads, artists’ management. There are several
other applications available in the market that either provides some
specific services or large scale integrated solutions. Our product differs
from the rest in a way that we give more power to the users remaining
within the copyrights circle.