54 research outputs found

    Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network

    Get PDF
    Device to Device (D2D) communication is a type of technology where two devices can communicate directly with each other without the need to contact Base Station or any central infrastructure. With emerging of Long Term Evaluation (LTE) and Fifth Generation (5G) technology, D2D has gained a lot of attention for communication between closely located mobile devices for offering high speed, energy efficiency, throughput, less delay, and efficient spectrum usage. D2D has changed recent wireless networks with new trends as D2D can play a vital role in sharing resources by load off the network in local areas by direct communication between devices and useful in natural disasters where BS is destroyed. D2D has revolutionized the direct communication as it is a basis for 5G network. D2D allows miniature devices like cell phone, tablets and radio devices to work as Non-Transparent Relays (NTR) where they can provide services as well as forward traffic, request services by direct communication without the need of Base Station (BS) or central network infrastructure. Multi-hop D2D can be used for peer-to-peer communication or even access to cellular networks. This concept of multihop D2D communication has introduced a number of issues and challenges that were not prevalent in traditional current cellular communication. One of the major issues in D2D is security that is required in D2D communication to transmit information securely over non secure channel. The major challenge when considering security is that current established security techniques cannot be modified as security-requiring devices are miniature with restricted processing and storage or are constrained by power and bandwidth issues. Another issue is that how devices can get secure mutual authentication for secure communication. To tackle these issues, a lightweight multifactor authentication scheme that allows multihop secure communication over open channel is designed called as Lightweight ECC based Multifactor Authentication Protocol (LEMAP) in multihop D2D communication. Formal analysis of scheme is performed using well known BAN Logic method which is used to check correctness of protocol. The formal analysis of LEMAP proves that it can mitigate replay attack, Man-in-the-Middle (MITM) attack, Rogue device attack, Denial of Service (DoS) attack, timestamp exploitation attack, impersonation attack and masquerading attack. LEMAP also achieves security requirements confidentiality, integrity, privacy, non-repudiation, secure mutual authentication and anonymity. The communication cost and computational overhead of benchmark protocols and the proposed scheme LEMAP are also calculated. The results show that LEMAP is 6%-28% percent stronger than the selected benchmark algorithms such as 2PAKEP, Chaotic based authentication and TwoFactor authentication protocol. Additionally, LEMAP provides additional security by using trust validation, double hashing, and reduced authentication overhead. Discrete logarithm analysis shows that LEMAP is more secure compared to current security algorithms or current security algos are used as attacks against LEMAP. LEMAP is a lightweight and flexible scheme which can be used in 5G as well as multihop D2D communication to provide secure communication environment. Keywords: D2D security, multihop D2D security, multi factor, light-weight security, EC

    Enhancement automatic speech recognition by deep neural networks

    Get PDF
    The performance of speech recognition tasks utilizing systems based on deep learning has improved dramatically in recent years by utilizing different deep designs and learning methodologies. A popular way to boosting the number of training data is called Data Augmentation (DA), and research shows that using DA is effective in teaching neural network models how to make invariant predictions. furthermore, EM approaches have piqued machine-learning researchers' attention as a means of improving classifier performance. In this study, have been presenteded a unique deep neural network speech recognition that employs both EM and DA approaches to improve the system's prediction accuracy. firstly, reveal an approach based on vocal tract length disturbance that already exists and then propose a Feature perturbation is an alternative Data Augmentation approach. in order to make amendment training data sets. This is followed by an integration of the posterior probabilities obtained from several DNN acoustic models trained on diverse datasets. The study's findings reveal that the proposed system's recognition skills have improved

    Benefit Cost Ratio of Buds Chips Planting and its Effects on Yield and Quality of Sugarcane

    Get PDF
    Background: High price and poor quality of seed material is a great concern to Farmers. Sugarcane seed is 20% of total cost of production. Cane Growers used setts having 2-3 buds with 8-10 t ha-1 cane stalk as Seed. The large quantity of seed carriages a great problematic in handling, transport, seed treatment for diseases, storage ,  viability of buds and their germination. The use of bud chips is less bulky, easily handling in seed treatment, storage and transportation.Methods: In this view, a research experiment was designed at Sugarcane Research Institute, Faisalabad during 2016 and 2017, to study the feasibility of bud chips as an alternate to conventional planting in sugarcane crop. The experiment was planted with sugarcane variety CPF-252 in randomized complete block design with split plot arrangement having three replications.Results: The results of study revealed that setts planting on 15 April gave maximum cane (61 t ha-1) and sugar yield (7.15 t ha-1). While bud chips sown on 15 April produced higher yield. The benefit cost ratio (BCR) was high in bud chips planting (1.63) than setts planting of sugarcane.Conclusion: The study concludes that bud chip planting on 15 April is an improved technique with greater potential to provide disease free seed, improve the yield with minimum quantity of seed than conventional planting.Keywords: Bud chips; Seedling; Setts; Benefit cost rati

    Pharmacological evaluation of the hypoglycemic and anti- Alzheimer’s activities of aerial parts of Breynia distachia (Phyllanthaceae)

    Get PDF
    Purpose: To determine the cytotoxic, bronchorelaxant, spasmolytic, antidiabetic, α-glucosidase, acetylcholinesterase, butyrylcholinesterase, α-chymotrypsin and lipoxygenase inhibitory attributes of methanol and dichloromethane extracts of the aerial parts of Breynia distachia.Methods: The dichloromethane and methanol extracts of the aerial parts of the plant were prepared by maceration. Various ex vivo assays were employed, such as the brine shrimp lethality assay, lipoxygenase inhibitory activity assay, α-glucosidase inhibitory assay and α-chymotrypsin assay, as well as assays to assess the spasmolytic and bronchorelaxant activity. Meanwhile, the hypoglycaemic effect were analysed using an alloxan-induced diabetic model in Wistar albino rats.Results: The methanol extract (aerial) showed significant (p ≤ 0.05) cytotoxicity towards brine shrimp larvae at concentrations of 10, 100 and 1,000 μg/mL, respectively, whereas the dichloromethane extract (aerial) of the plant showed non-significant (p ≥ 0.05) results. The methanol extract (aerial parts) also demonstrated significant (p ≤ 0.05) α-glucosidase inhibitory activity and lipoxygenase inhibitory activity, with IC50 (half-maximal inhibitory concentration) values of 40.37 ± 5.29 μg/mL and 132.9 ± 0.33 μg/mL, respectively, while the dichloromethane extract exhibited significant (p ≤ 0.05) α-glucosidase inhibitory activity, with an IC50 value of 135.43 ± 8.29 μg/mL. An in vivo antidiabetic model showed that the administration of 150 and 300 mg/kg methanol extract of the aerial parts significantly (p ≤ 0.05) lowered the blood glucose level in alloxan-induced diabetic rats compared to control (treated with water).Conclusion: Data from different in vitro and in vivo models suggest that the methanol extract (aerial parts) of B. distachia shows significant cytotoxic, bronchorelaxant, spasmolytic, antidiabetic and anti-Alzheimer’s activity Hence, these findings validate the folkloric use of B. distachia and highlight the need to further explore its medicinal potential and the phytoconstituents responsible for its pharmacological actions

    Viscosity of lead bismuth gallate glasses containing minor addition of silica and germania

    Get PDF
    Heavy metal oxide glasses with and without minor additions of Silica and Germania in the system PbO-Bi203-Ga203 have been prepared which have potential applications for infrared fibers. Viscosity measurements using penetration viscometry were first carried out on sample of glass No. 711 provided by National Bureau of Standards (NBS) over a range of 107 to 1010 Pa.s and showed good agreement with NBS data with a mean error of 1.35% using modified-Nemilov equation. The viscosity of glasses studied fell sharply about three orders of magnitude in a temperature interval of less than 45 degrees (on Celsius scale). The results have been discussed in relation to activation energy for viscous flow and the fragility of the melts has been compared

    Consumer Purchasing decision: Choosing the Marketing Strategy to influence consumer decision making

    Get PDF
    The purpose of this study was to investigate the role that marketing strategy plays as a determining element in the decision-making process of consumers. The current study made use of the quantitative research approach by customizing a questionnaire based on information gleaned from academic sources. This particular study had a sample size of 162 participants, all of whom were selected at random throughout the selection process. According to the findings, penetration pricing exerts a substantial and beneficial impact on the decision-making process of consumers at the 5% level. According to the findings, price skimming has a substantial and favorable effect on the decision-making process of consumers at the 5% level. According to the findings, marketing sharing websites have a considerable beneficial impact on the decision-making process of consumers at the 5% level. The findings indicate that blogs have a considerable and beneficial effect on the decision-making process of consumers at the 5% level. According to the findings, competitive pricing has a substantial and favorable impact on the choice-making process of consumers at the 5% level. Furthermore, every beta value exceeds the.001 threshold. All of the models have extremely high adjusted R2, which indicates that the models are very capable of explaining the variance in consumer decision-making that is caused by the variation in the independent variables. The F-value demonstrates that the explanatory variables are jointly statistically significant in the model, and the Durbin-Watson (DW) statistics demonstrate that there is autocorrelation in the models. Both of these findings are supported by the model\u27s positive autocorrelation

    Organizational effectiveness: Educational leadership and its impact on organizational effectiveness

    Get PDF
    This paper aims to explore the link between educational leadership and organizational effectiveness, Erbil was selected as the place to carry out the research at small and medium-sized businesses. current studies are assessing the impact of strategic absorbency (ability), capacity to adjust strategies, and managerial wisdom on small and medium-sized companies in the Kurdistan region of Iraq\u27s educational leadership a separate regression analysis was used to quantify the impact of each independent variable on organizational effectiveness in the researchers applied a straight line of reasoning to small and medium-sized businesses in the Kurdistan region of Iraq. this ended up being a total of 175 questionnaires that were completed, as 152 of the 152 participants answered them correctly The study discovered that the greatest impact was found in the absorptive capability, with regard to sustainability, but on the least effect in terms of management expertise

    Production Management: Analyzing the alignment of knowledge management with production management

    Get PDF
    The development of new information in the field of project management has had a significant effect on the manufacturing industry. As a result, it is critical that service development procedures be optimized in every project. The rise in cement manufacturing production was supposed to be accomplished through the utilization of knowledge management principles and knowledge management as a mediator, which was the purpose of this research. The research was carried out across a number of different cement-producing sites in the Kurdistan area of Iraq. The researchers looked at four different aspects of knowledge management in order to determine how much production could be increased by using knowledge management. These aspects were knowledge creation, knowledge storage management, knowledge sharing, and knowledge application, with knowledge management acting as a mediator. The researchers utilized a quantitative research methodology in the form of a survey in order to carry out the current analysis that is being presented. The questionnaire was handed out in a randomized fashion to around one hundred and forty administrative staff members working for a variety of cement production enterprises in the Kurdistan area. However, the researchers did manage to gather a total of 128 completed surveys. The study employed hierarchical multiple regression analysis as well as the Sobel test in order to evaluate the research hypotheses that had been created. According to the findings, each component of knowledge management—knowledge creation, knowledge storage development, knowledge sharing, and knowledge application—had a distinct and significant positive relationship with increased production at carpet manufacturers in the Kurdistan region of Iraq. This was the case regardless of which component of knowledge management was examined. In addition, the findings indicated that all knowledge management concepts with a mediator (a project management development program) had an indirect positive and significant relationship with increased production at cement manufacturing facilities in the Kurdistan region of Iraq. The mediator in this case was the project management development progra

    Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security

    Get PDF
    This study presents the current state of research on multi-factor authentication. Authentication is one of the important traits in the security domain as it ensures that legitimate users have access to the secure resource. Attacks on authentication occur even before digital access is given, but it becomes quite challenging with remote access to secure resources. With increasing threats to single authentication schemes, 2Factor and later multi-factor authentication approaches came into practice. Several studies have been done in the multi-factor authentication discipline, and most of them proposed the best possible approaches, but there are very limited studies in the area that can comprehend all these innovative and effective approaches. Using Web of Science data of the research publications on the topic, the study adopted the bibliometric approach to find the evolution of authentication in the security domain, especially multi-factor authentication. This study finds the impact of the research in the selected domain using bibliometric analysis. This research also identifies the key research trends that most of the researchers are paying attention to. The highest number of publications on multi-factor authentication were published in 2019 while the highest number of citations were received in 2014. United States, India, and China are the leading countries publishing the most on multi-factor authentication

    Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review

    Get PDF
    There are continued advances in the internet and communication fields regarding the deployment of 5G-based applications. It is expected that by 2030, 6G applications will emerge as a continued evolution of the mobile network. Blockchain technology is one of the leading supporting technologies predicted to provide a secure and unique network to 6G-enabled devices, transactions, and applications. It is anticipated that the 6G mobile networks will be virtualized, have cloud-based systems, and aim to be the foundation for the Internet of Everything. However, along with the development of communication technologies, threats from malicious parties have become more sophisticated, making security a significant concern for the 6G era in the future. Despite enormous efforts by researchers to improve security and authentication protocols, systems still face novel intrusion and attacks. Recently, multifactor authentication techniques (MFA) have been deployed as potential solutions to attacks in blockchains. The 6G applications and the cellular network have specific vulnerabilities that need to be addressed using blockchain-based MFA technologies. The current paper is a systematic review that discusses the three technologies under consideration; then, several studies are reviewed that discuss MFA techniques in general and use blockchains as potential solutions to future security and authentication issues that may arise for 6G application
    • …
    corecore