International Journal of Scientific Research in Network Security and Communication
Not a member yet
    270 research outputs found

    A Survey of Linux Operating System as an Alternative to Other Operating Systems

    Get PDF
    Linux is an operating system for Intel 386/456/Pentium-based IBM PCs and is congenial. A worldwide group of enthusiastic volunteers has joined forces in developing many aspects of Linux on the INTERNET. Linux can run the powerful set of compilers and programming tools of free software foundation and X-free 86, a port of the X Windows system from MIT. One useful feature of Linux is its ability to coexist with other operating systems. Thus, a user invested in DOS/MS Windows software may continue running these applications on the machine and install them. Our scope for review of this paper is to study and review the Linux Operating system and its various features and functions such as History and Development, the Linux Kernel, Processes Scheduling in the Linux Operating System, Memory Management, I/O operations, networking and how it is done in the Linux OS. &nbsp

    Credit Risk Assessment in Non-Banking Financial Institutions: Lessons from Shadow Banking Sector

    Get PDF
    This research paper explores the credit risk assessment practices in non-banking financial institutions (NBFIs) with a focus on lessons learned from the shadow banking sector. NBFIs have gained significant prominence in the financial landscape, and their role in credit intermediation has expanded. However, the inherent complexities and unique characteristics of NBFIs pose challenges to credit risk assessment. Drawing insights from the shadow banking sector, this study aims to identify key lessons and best practices that can enhance credit risk assessment in NBFIs. The research adopts a qualitative approach, analyzing relevant literature, regulatory frameworks, and case studies to develop a comprehensive understanding of credit risk assessment practices in NBFIs. The findings highlight the importance of robust risk management frameworks, adequate risk governance, effective monitoring mechanisms, and the use of innovative tools and technologies in mitigating credit risks in NBFIs. The research concludes by providing recommendations for policymakers, regulators, and NBFIs to strengthen credit risk assessment practices and ensure the stability and resilience of the financial system. &nbsp

    Measures of Effectiveness for E learning of University Students During the Covid-19 Pandemic Using the Statistical Model

    Get PDF
    E-learning considers the best solution for continuing education during the COVID-19 pandemic, especially in tertiary education. The present study aims to analyze and the evaluation efficacy of learning in an e-learning system measures to improve the technical skills among dental and medical undergraduate students during Covid-19 outbreak. One thousand five-hundred students were assigned for this study and the answers for the given questionnaire were collected. The rate of response was 96.86% among respondents who use module and classroom tools, techniques, or platforms. The statistical model was applied to the analysis of the questionnaire. Principle component analysis techniques were used to determine the variables` efficacy on the E-learning model. The reliability of the associated components was measured using ( Cronbach’s ? ) test gives 0.801. The findings of this study that medical education skills have been slightly affected by the use of e-learning during the COVID-19 pandemic. Therefore, the idea E-learning entails Familiarity with the technology; Usability, Learned skills, and Competency; Quick Responsiveness; Learning Quality of the learner; Time and Cost; Faster Learning; Information quality; and Knowledge sharing. &nbsp

    A Review of the Security Architecture for SDN in Light of Its Security Issues

    Get PDF
    Software-defined networking (SDN) simplifies and enhances network management for administrators. It is a modern approach that liberates networks from conventional constraints and is considered a game-changing concept for the future of the web. SDN can detect and prevent malicious traffic through its three-tiered architecture, consisting of a control layer , application layer and a forwarding layer. Our work distinguishes between DoS and DDoS attacks, which pose varying degrees of security risk for SDN users. SDN-based 5G networks are vulnerable to DDoS assaults by malevolent users, but can be secured using tools like Mininet. The SDN security architecture can be improved by methods such as network monitoring, verification, automation, improvised threat detection, and dynamic reaction. By separating network control and data planes and using software applications, SDN can effectively detect and stop malicious traffic. Combining SDN and ML enables the detection and prevention of low-rate DoS attacks, providing a security solution for SDN-based 5G networks. The coming model enhances efficacy in detecting and protecting against DoS and DDoS attacks, allowing enterprises to defend their networks and crucial services. &nbsp

    Unlocking the Potential of Open and Distance Learning with Artificial Intelligence

    Get PDF
    The integration of Artificial Intelligence (AI) in the field of education presents a vast array of possibilities, particularly for Open and Distance Learning (ODL) institutions. AI offers various ways for open universities to tackle challenges in areas such as learning, teaching effectiveness, and the advantages and limitations of computer-based systems in education, which are crucial for ODL institutions that heavily rely on human-machine interactions. Indira Gandhi Open University in India, has been utilizing information and communication technologies (ICTs), including AI, to enhance its operations and services for the past seven years. Although AI has not yet been fully implemented in education, IGNOU recognizes its potential to improve quality, pedagogy, and the overall teaching and learning experience. The purpose of this study is to explore how AI can be utilized in ODL institutions, with a focus on expert systems for program advising, automated class scheduling, assignment grading, plagiarism detection, learner retention and adaptation to diverse needs and backgrounds, property maintenance, and security. IGNOU is optimistic that AI has the potential to bring about a significant and positive transformation in ODL and shape the future of open and distance learners. &nbsp

    Three Hash Functions Comparison on Digital Holy Quran Integrity Verification

    Get PDF
    This paper provides a study of hash functions comparison on holy Quran integrity verification to ensure integrity of data in digital copy of holy Quran. There are many methods available in data security area for integrity verification. This study presents a comparison of three cryptographic hash functions SHA256, RIPEMD160 and Blake3 which used to verify the integrity of digital holy Quran and determine which one is better. Blake3 hash function is chosen in this proposed schema because it has many characteristics, the most important of which is the speed characteristic, and it will be mentioned in detail in Background section. Furthermore security analysis and performance analysis are focused on this study. In security analysis by apply four experiments to find out the strength and effectiveness of each three hash functions and all possible possibilities of hash collisions be carefully analysed and studied. Speed in term of execution time is measuring for all three hash function and this is under the umbrella of the performance analysis. The results that we have obtained say that the Blake3 hash function is the fastest function with the rest two hash functions. And the resulting number of the time that the attacker need to come up with a fake verse using SHA256/BLAKE3 will be greater than the number obtained by using RIPEMD160. &nbsp

    Real-Time Monitoring and Smart Transformer Protection by Using IoT

    Get PDF
    Transformers is the basic design of the electrical device which provides power transmission by transforming induced current from one circuit to another. The induced current can be converted step up or step down of current or voltage. This application mainly concentrates on the distribution as well as power transformers which are used in between the electrical Power system. Real-time monitoring and protection are done for basic features like oil level, temperature, over-voltage, over-current, under-voltage, maintenance, etc. These features are essential for effective power transmission and the long life of transformers. The monitoring and protection of the transformer are done by using an ATmega16L microcontroller, IoT, and sensors which check the level of oil, over-voltage, smoke detect and maintain temperature by continuous real-time monitoring. There are various transformer maintenance techniques, but this kit gives real-time monitoring and control of transformers by using the ATmega16L microcontroller. The design is to sense the parameters of the transformer and send the parametric information regularly to the control room. So, this design makes it possible to attain real-time protection and monitoring by using IoT. This project gives us an efficient system as well as we are connected all the power system transformers online for regular monitoring and get uninterrupted power supply to the consumer. &nbsp

    Digital Number System Calculator Using Intel Atom Kit

    Get PDF
    A number system is a set of rules & symbols used to represent a number. And, a number system calculator is a software calculator used to perform mathematical computations on number systems. The knowledge of number systems, their representation, arithmetic, compliments and inter-conversion of numbers between prescribed number systems is essential for understanding of computers and successful programming for digital devices. Understanding all these number systems and related terms/concepts requires allot of time and a large number of techniques to expertise. To overcome this problem, we propose calculating software which will cover and perform all the prescribed calculations within a fraction of second using Intel Atom Kit: The Inforce® SYS940X-01 with Linux as Operating System has capability of performing many applications. In this work its performance for various operations like, arithmetic’s, conversion from one to another system and the compliments of number in any required system is shown. Four most common number systems taken under the consideration are binary, octal, decimal, and hexadecimal. &nbsp

    Air Quality Measurement: Digital Dashboard Using Smartphone

    Get PDF
    In cities all over the globe are transforming into smart cities. Smart cities initiatives need to address environmental concerns such as air pollution to provide clean air. A scalable and cost-effective air monitoring system is imperative to monitor and control air pollution for smart city development. Air pollution has notable effects on the well-being of the population a whole, global atmosphere, and worldwide economy. This paper presents a scalable smart air quality monitoring system with low cost sensors and long-range communication protocol. The sensors collect four parameters, temperature, humidity, dust and carbon dioxide in the air. The proposed end-to-end system has been implemented and deployed in Yangon, the business capital of Myanmar, as a case study since Jun 2018. The system allows the users to log in to an online dashboard to monitor the real-time status. In addition, based the collected air quality parameters for the past two months, a Machine Learning model has been trained to make predictions of parameters such that proactive actions can be taken to alleviate the impacts from air pollution. &nbsp

    The Double Laplace-Stieltjes Transform and their Applications in solving Integral and partial Differential Equations

    Get PDF
    Most phenomena in nature are represented using ordinary or partial differential equations which are easy to solve when combined with double integral transforms, Therefore, We find many previous studies talking about double integral transformations, the most famous of which is the double Laplace transform and the double Milline transform. In our research, we present a new double transform of a special nature, which is the double Laplace-Stieltjes transform, where we are found the relationship between it and the double Laplace transform, in addition to proving some of its properties and applying them in finding solutions to partial Differential equations and Integral Equations. &nbsp

    266

    full texts

    270

    metadata records
    Updated in last 30 days.
    International Journal of Scientific Research in Network Security and Communication is based in India
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇