International Journal of Advanced Computer Technology
Not a member yet
    63 research outputs found

    A review of Two Factor Authentication Security Challenges in the Cyberspace

    Get PDF
    Today, single-factor authentication, e.g. Passwords, is no longer considered secure on the cyberspace and electronic learning environment. With the advancement of technology, passwords are becoming easier for cyber-attacks to forcibly test and eventually guess passwords or harvest them with technologies such as keystroke loggers. Two factor Authentication (2FA) has been recently introduced to overcome this problem by providing an additional layer of security using secondary means (ownership factor or inherent factor), however, the users of 2FA are still facing challenges such as delays in receiving SMS codes, expiry of codes before use, burden of carrying hardware tokens all the time and in some instances payment for incoming SMS. A review of literature on studies conducted on two factor authentication security issues and challenges is done in this paper. The paper concludes that 2FA has a number of challenges ranging from the cost of manufacturing tokens, maintaining codes, distribution of millions of tokens to users and delays in receiving verification codes. Therefore, based on the findings, the study recommends that other studies be conducted on an alternative multifactor authentication schemes that are easy to use and will protect users in an appropriate manner

    Light Load Path Selection Techniques for Control Congestion in MANET (ENBA)

    Get PDF
    The nodes have limited bandwidth and processing capability. The routing protocols cannot handle the congestion due to heavy load in mobile ad hoc networks. Several routes are established in the network, and some intermediate nodes are common. The dynamic behaviour of the network creates problems for strong link establishment. The routing protocol establishes the connection between the sender and receiver. The efficient routing approach uses the concept of load balancing to reduce packet loss in a network. The heavy load on the network affects the node’s buffer capacity and link capacity. The research proposed the Effective Network Behavior Analyze (ENBA) for route sections to control congestion in MANET. This paper’s effort is driven by the idea of considering several aspects of the routing design of Mobile Ad hoc Networks (MANETs) in a unified manner. ENBA is a routing strategy that uses the shortest path for routing and balances the load by managing incoming and outgoing packets on links and nodes. In this routing scheme, the shortest path measures the buffer capacity of the nodes with higher TTL values selected for sending the data packets in the network. The link capacity is based on the flow of packets in the network. Queue optimisation is a continuous optimisation in which we count the number of packets incoming and decide the link reliability in a dynamic network. The performance of ENBA is compared with the Ad hoc On-demand Multipath Distance Vector -Modified (AOMDV-M) routing protocol. The ENDA strategy outperforms the competition in terms of performance over a shorter period. In the proposed technique, performance matrices like PDR, overhead, and delay provide better results than the previous AOMDV-M routing approach

    Improving the accessibility of digital content via mobile technology. A case study of Mount Kenya University

    Get PDF
    Globally, Higher Education Institutions (HEI) have embraced the use of mobile technology in the delivery of instructional resources which has promised multiple benefits in digital or blended learning, HEIs are facing the challenge of high internet tariffs. The current study sought to improve the accessibility of digital content via mobile technology within limited Internet connectivity contexts. The study used a quantitative research approach within which a descriptive survey research design was adopted. The case study was Mount Kenya University in Kenya. The study was guided by the Technology Acceptance Model (TAM). The target population was 15123 individuals comprising of 15,000 students and 123 were educators/ ICT staff who accessed digital content in the academic year 2018/2019. The mobile-based model used a WIFI router device which is not internet supported as an alternative to a wired internet connection where students and educators access digital content from the mobile sub-server which was not connected to the internet through their mobile technology. The findings showed that there is a statistically significant relationship between internet connectivity, type of mobile technology, user literacy, data caching, and eLearning policy had a significant effect on the accessibility of digital content. The variables were statistically significant. The adjusted R squared was 0.862 indicating that 86.2 percent of the total variation of accessibility of digital content can be explained by Internet connectivity, e-learning policy, type of mobile technology, data caching, and user literacy. The study then went ahead to develop a mobile-based e-learning model. The findings showed that the use of mobile-based e-learning (m-learning) in universities will greatly improve access to digital content and hence e-learning. The study recommends the use of m-learning as it will provide alternative means of optimizing Internet connectivity

    An Efficient Digital Image Watermarking Based on DCT and Advanced Image Data Embedding Method

    Get PDF
    Digital image enhancement and digital content or data image secure using DCT and advanced image data embedding method (AIDEM). AIDEM improved robustness based on particle shifting concept is reproduced secure image data and manipulated there’s a robust would like for a digital image copyright mechanism to be placed in secure image data. There’s a necessity for authentication of the content because of the owner. It’s become more accessible for malicious parties to create scalable copies of proprietary content with any compensation to the content owner. Advanced Watermarking is being viewed as a potential goal to the current downside. Astounding watermarking plans are arranged assaults on the watermarked picture are twisted and proposed to give insurance of proprietorship freedoms, information treating, and information uprightness. These methods guarantee unique information recuperation from watermarked information, while irreversible watermarking plans safeguard proprietorship freedoms. This attribute of reversible watermarking has arisen as an applicant answer for the assurance of proprietorship freedoms of information, unfortunate to alterations, for example, clinical information, genetic information, Visa, and financial balance information. These attacks are also intentional or unintentional. The attacks are classified as geometric attacks. This research presents a comprehensive and old method of these techniques that are developed and their effectiveness. Digital watermarking was developed to supply copyright protection and owners’ authentication. Digital image watermarking may be a methodology for embedding some information into digital image sequences, like text image, image data, during this research analysis on image watermarking and attacks on watermarking process time image data, classification of watermarking and applications. We aim to secure image data using advanced image data embedding method (AIDEM) improved robustness based particle shifting concept is reproduced secure image data. To develop compelling digital image watermarking methodology using mat lab tool and reliable and robust

    Speed Control of BLDC Motor Using Microprocessor

    Get PDF
    This paper presents a method of speed control Brushless DC Motor (BLDC) using a microprocessor. Brushless DC motor plays a vital role in all applications such as ling fans, pumps, automotive drivers, and robotic Automations, and Many technologies are available in the motor from controlling the speed of the motor as per the designed applications. In this regard, for control of speed in a BLDC motor application, using Ardunio Board with PWM Technique be used Speed Control of BLDC motor with various Techniques such as using mobile applications,  100th based BMS from the mobile phone. Brushless DC motors (BLDC) find wide applications in industries due to their high power density and ease of control. These motors are generally controlled using a three-phase power semiconductor bridge. In order to start and provide a proper commutation sequence to turn on the power devices in the inverter bridge, the rotor position sensors are required. The power devices are commutated sequentially every 60 degrees based on the rotor position. The motor requires suitable speed controllers to achieve the desired level of performance. In the case of permanent magnet motors, speed control is usually achieved by using a proportional-integral (PI) controller. Although conventional PI controllers are widely used in the industry due to their simple control structure and ease of implementation, these controllers pose difficulties where there are some control complexities such as nonlinearity

    A Survey on Deep Learning Techniques for Sentiment Analysis

    Get PDF
    Social media is a rich source of information nowadays. If we look into social media, sentiment analysis is one of the challenging problems. Sentiment analysis is a substantial area of research in the field of Natural Language Processing. This survey paper reviews and provides the comparative study of deep learning approaches CNN, RNN, LSTM and ensemble-based methods

    Collaborative Profile Assessment to Secure MANET by DDOS Attack

    Get PDF
    In the Mobile Ad-hoc Network, nodes bind together in the centralised authority's absence because reliability is one of the main challenges. The MANETS protective architecture provides some consequential problems due to the specific features of MANETS. The DDoS attack in the network is not quickly detectable. A management infrastructure that guarantees extensive security and the required network performance from attacks must be developed to overcome the barriers. Direct methods cannot be found successfully in mobile ad hoc networks in which network topology differs animatedly. Different DDoS security systems boost the network's output in front of an attacker to deactivate mismanagement, like NTRS. In this study, the Distributed Profile Evaluation Mechanism (DPEAP) DDoS Attack Effect in the Network proposes that compromise packets tossed out of the network beyond the network's capacity. The NTRS was a modern methodology in the study, and the DPEAP suggested is a new technique. The DPEAP identifies the attacker's behaviour by matching an attacker's profile with the ordinary nodes on the network, provided that the Node Profile is regular in the foaming of the proper network data delivery. The DPEAP then declare that the attacker's network has no hazard. In contrast with NTRS in MANET, the DPEAP method is stable and efficient

    Wind Energy Conversion System With Permanent Magnetic Synchronous Generator

    Get PDF
    This paper presents a study on grid-connected WECS with PMSG. The application of non-conventional energy resources develops much rapidly to improve low carbon energy resources in India. Nowadays, we are going to depend on solar, wind for the fulfillment of energy demand. Wind energy applications develop much more rapidly than other renewable resources such as solar, geothermal, and so on in the 21st century. It becomes the third core energy resource following non-conventional fuels as oil and chemical. The electrical energy generated by wind power plants is the best developing and most promising renewable energy source. The wind is a clean, free, and limitless energy source. Wind Energy Generation Systems (WECS) are confronted with increasing demands for power quality and harmonic distortion control. With the advance in power electronics technology, the fast growth of variable speed WECS is now witnessed

    ENHANCEMENT OF VOLTAGE PROFILE IN TRANSMISSION LINE USING DSTATCOM AND DVR

    Get PDF
    In this paper, a STATCOM and DVR  are used to mitigate power quality issues in power system (Transmission Line), STATCOM and DVR  both are used in transmission line simultaneously for enhancement of  Voltage quality in Transmission Line Voltage related issues sags and swells are the by-products of symmetrical as well as unsymmetrical faults of the electrical power system(Transmission Line ). The excessive reactive power demand in the line degrades the voltage magnitude from its specified limit.  Power quality has become a crucial factor today due to the wide application of power electronics-based equipment. Day by day, power electronics-based devices are widely used in industries and distribution areas and create more power quality problems. The quality of the power is defective for certain reasons. This power quality improvement is seen, e.g., as sag, swell, overvoltages, Undervoltage, and harmonics. Conventional equipment for enhancement of power quality is becoming inadequate

    Power Flow Control of Wind Generation System Using DFIG

    Get PDF
    Due to its clean and renewable nature, wind energy is becoming one of the world's important renewable sources of energy. Through its collaboration with other renewable sources of energy, such as solar energy, the world energy crisis can be solved in the future. Comparatively, with the past and due to the progressive integration of the nonlinear loads in the grid, the principal role of a Wind Energy Conversion System (WECS) is to capture the maximum power from the wind and improve the quality of power. Consequently, with the development of wind farms integrated into the grid, power quality could be better improved in the future. Variable speed wind generators are used in this work, which is more attractive than fixed speed systems because of their efficient energy production, improved power quality, and dynamic performance during grid faults. In this work, a design simulation model of wind power plant using doubly-fed induction generator with PI controller system for mitigation of power quality issue. The obtained results show that the output power (active and reactive) is free from harmonics and stable

    62

    full texts

    63

    metadata records
    Updated in last 30 days.
    International Journal of Advanced Computer Technology is based in India
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇