Version-4 (Sep-Oct 2018)
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Abstract: The project entitled as Brute Force Attack On Open Functionality Secured is to design and develop the application package for well secured dynamic application. A common threat web developer's face is a password-guessing attack known as a brute force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. In the world of Cyber crimes, brute force attack is an activity which involves repetitive successive attempts of trying various password combinations to break into any website. This attempt is carried out vigorously by the hackers who also make use of bots they have installed maliciously in other computers to boost the computing power required to run such type of attacks. Usually, every common ID (for e.g. "admin") has a password. All you need to do is try to guess the password..........
[1]. Adleman, Leonard M.; Rothemund, Paul W.K.; Roweis, Sam; Winfree, Erik (June 10–12, 1996). On Applying Molecular Computation To The Data Encryption Standard. Proceedings of the Second Annual Meeting on DNA Based Computers. Princeton University.
[2]. Cracking DES – Secrets of Encryption Research, Wiretap Politics & Chip Design. Electronic Frontier Foundation. ISBN 1-56592-520-3.
[3]. Burnett, Mark; Foster, James C. (2004). Hacking the Code: ASP.NET Web Application Security. Syngress. ISBN 1-932266-65-8. [4]. Diffie, W.; Hellman, M.E. (1977). "Exhaustive Cryptanalysis of the NBS Data Encryption Standard". Computer. 10: 74–84. doi:10.1109/c-m.1977.217750.
[5]. Graham, Robert David (22 June 2011). "Password cracking, mining, and GPUs". erratasec.com. Retrieved 17 August 2011.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Following the recent hike of the Smartphone use, applications with diverse purposes have been developed and provided to users. In case of agricultural products, seeing the actual products before buying them was conventional in the past. However, the on-line trading of agricultural products is also increasing these days, which have different characteristics from the industrial products. This paper designed and implemented an application for trading agricultural products that connects between producers and consumers of the agricultural products. The application developed in this paper addressed some of the shortcomings of the similar existing applications and differentiated functions were applied under the goal of helping more and more users make reasonable decision when buying and selling agricultural products.
Keywords–Android, Farmer System, Mobile Application, Web Contents, Web Service
[1] Hyesoo Kim and Sunhee Seo, Factors influencing on intention to intake fruit: moderating effect of fruit intake habit, Journal of Nutrition and Health, 47(2), 2014, 134-144.
[2] Junghyun Kwon, Jaeeun Shim, Minkyung Park and Heeyoung Paik, Evaluation of Fruits and Vegetables Intake for Prevention of Chronic Disease in Korean Adults Aged 30 Years and Ove, Journal of Nutrition and Health, 42(2), 2009, 146-157,.
[3] HealthNewspaper, http://healthcare.joins.com/master/healthmaster_article.asp?Total_ID=6402922
[4] Hyunok Ju, Adolescent Girls‟ obesity and Eating Pattern in Daegu Area, Graduate School Keimyung University, Korea, 2008.
[5] Rural Development Administration, The Study on Trends on in Agri-food Consumption, Rural Development Administration, 2017.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper studies the performance and efficiency of the classification approaches on the satellite images. In this work, two methods will be used for image classification: the neural network and fuzzy inference methods. Also, this study displays the comparison between the previous approaches for explaining the amount of the efficiency and accuracy of these approaches in the image classification. The performance of two satellite image classification approaches has been examined. The experimental results prove that the neural network approach (NN) has the high efficiency and efficacy in the satellite image classification than the other classification approaches.
Keywords–Satellite image, neural network approach, fuzzy inference technique
[1]. Muhammad, S., Aziz, G., Aneela, N. and Muhammad, S. "Classification by Object Recognition in SatelliteImages by using Data Mining". In Proc. Proceedings of the World Congress on Engineering (WCE 2012), Vol I, July 4 - 6, London, U.K. 2012.
[2]. Chaichoke, V., Supawee, P., Tanasak, V. and Andrew, K, S. "A Normalized Difference Vegetation Index (NDVI) Time-Series of Idle Agriculture Lands: A Preliminary Study", Engineering Journal. Vol. 15, Issue 1, pp. 9-16.2011.
[3]. Jaswal, Deepika&Vishvanathan, Sowmya&Kp, Soman. (2014). Image Classification Using Convolutional Neural Networks.International Journal of Scientific and Engineering Research. 5. 1661-1668. 10.14299/ijser.2014.06.002.
[4]. Anders Karlsson, "Classification of high resolution satellite images", available at http://infoscience.epfl.ch/record/63248/files/TPD_Karlss on.pdf. August 2003.
[5]. Jassbi, J. Alavi, S.H. Serra, P.J.A. Ribeiro, R.A. " Transformation of a Mamdani FIS to First Order Sugeno FIS "Fuzzy Systems Conference, 2007. FUZZ-IEEE 2007. IEEE International.2007.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:A data grid is a structural design or cluster of services that enables transmission of a huge amount of
geographically distributed data. Hence, it requires massive storage resources to store enormous data files. Data
replication provides a solution for efficiently managing the data files in the huge distributed grid environment.
It aids in enhancing the data availability and reducing the overall access time of the file. This paper presents an
algorithm called Enhanced Dynamic Popular File Replication and Scheduling (EDPFRS) to enhance the data
replication and scheduling of a file based on its popularity and the temporal localities in a data grid
environment efficiently. For which a connectivity graph is created for a set of dependent files in each grid site to
find the frequently accessed......
Keywords: Data Grid, Dynamic Replication, Popular File Replication, Scheduling
[1]. R. Mondardini, "Distributed Production Environment for Physics Data Processing," 2006.
[2]. R.-S. Chang and P.-H. Chen, "Complete and fragmented replica selection and retrieval in Data Grids," Future Generation Computer
Systems, vol. 23, pp. 536-546, 2007.
[3]. P. Vashisht and A. Sharma, "Decentralized P2P grid resources discovery model in LC-Trie structured overlay," in Parallel
Distributed and Grid Computing (PDGC), 2010 1st International Conference on, 2010, pp. 330-333.
[4]. L. M. Khanli, A. Isazadeh, and T. N. Shishavan, "PHFS: A dynamic replication method, to decrease access latency in the multi -tier
data grid," Future Generation Computer Systems, vol. 27, pp. 233-244, 2011.
[5]. P. Vashisht, R. Kumar, and A. Sharma, "Efficient dynamic replication algorithm using agent for data grid," The Scientific World
Journal, vol. 2014, 2014..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Estimation of Residual Flux for the Regulated Transformer Switching |
Country | : | |
Authors | : | Manoj Kumar Swain || Sibananda mishra |
: | 10.9790/0661-2005043242 |
Abstract:My paper basically explores the practical considerations of core flux transients and the applications
of circuit breakers to control transformer inrush transients. The magnetizing inrush current which occurs at the
time of energization of a transformer is due to temporary overfluxing in the transformer core. Transformer
inrush currents are high magnitude, harmonic-rich currents generated when transformer cores are driven into
saturation during energization. These currents have undesirable effects, including potential damage or loss-oflife
to the transformer, protective relay misoperation, and reduced power quality on the system. Controlled
transformer switching can potentially eliminate these transients if residual core and core flux transients are
taken into account in the closing......
Key Word::Power transformers, over fluxing, energization
[1]. Paul C. Y. Ling and AmitavaBasak, "Investigation of Magnetising Inrush Current in s Single Phase Transformer", IEEE transaction
on magnetics, Volume 24, number 6,November 1988
[2]. AbdolmutalabAbou-safe and Gordon Kettleborough,"Modelling and Calculating the inrush currents in power transformer",
Damascus University Journal Volume 21, number(1), 2005
[3]. M. Jamali and M. Mirzaie and S. Asghar Gholamian, "Calculation and analysis of transformer inrush current based on parameters
of transformer and operating conditions", ISSN 1392-1215 Electronics and Electrical Engineering, number 3 (109), 2011
[4]. Rich Hunt, Joe Schaefer and Bob Bentert, "Practical Experience in Setting Transformer Differential Inrush restraint", 2005
[5]. Goran Petrovic, Tomislav Kilic and Stanko Milun, "Remanent Flux Measurement and optimal energisation instant determination of
power transformer", XVII IMEKO World congress, June 22-27 2003.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:In this paper, we prove a fixed point theorem in fuzzy metric spaces using logical inequality. Our
result generalizes and extends the result of Vishal Gupta et al. [13]. We justify our result by a suitable example.
Some applications are also submitted in support of our results.
Subject Classification: 54H25, 47H10.
Keywords: Fuzzy metric space, Fixed point, Rational expression, t-norms.
[1]. L.A. Zadeh, Fuzzy sets, Inform and Control, 8(1965),338 − 353.
[2]. I.Kramosil, J. Michalek, Fuzzy metric and statistical metric spaces, Kybernetika, 11(1975),326 −334.
[3]. A. George, P. Veeramani, On some results in fuzzy metric spaces, Fuzzy Sets and Systems, 64(1994),395 − 399.
[4]. .M.Grabiec,Fixed points in fuzzy metric specs, Fuzzy Sets and Systems, 27(1988),385 −389.
[5]. R. Vasuki, P. Veeramani, Fixed point theorems and Cauchy sequences in fuzzy metric spaces, Fuzzy Sets and Systems,
135(2003),415 −417..