INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES

Journal Information
ISSN / EISSN : 2394-9910 / 2322-0821
Published by: Createcom Technologies (10.55083)
Total articles ≅ 31
Filter:

Latest articles in this journal

Priya Parameswarappa
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES, Volume 10, pp 42-48; https://doi.org/10.55083/irjeas.2022.v10i03013

Abstract:
Model-based security metrics are an emerging topic of cyber security research that focuses on assessing an information system's risk exposure. We propose an end-to-end solution with the deployment of a zero-trust network utilising Artificial Intelligence in this article to understand the security posture of a system before it is rolled out and as it matures. The major part contains a discussion about the key methods and techniques which was utilized in the development process and simplified operation principles of each developed process. Some developed processes were tested practically to evaluate the problems in the processes. Modules for automatic processing and data analysis were also developed. These modules can be connected in case it is needed. The most important data collection methods were benchmarked to detect problematic situations in the operation in different realistic situations. With the perception from the benchmark test, the problematic parts of the data collection were discovered and proposals for the solution were made which could be developed and tested in the next iterations of the development process. Working Artificial intelligence-based detection and data enrichment methods were created. The results of the article allow multiple continuous research and development projects related to data collection and data analysis with statistical and artificial intelligence-based methods.
, Kelyn Nataly Muñoz-Alejo, Cledi Puma-Condori
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES, Volume 10, pp 34-41; https://doi.org/10.55083/irjeas.2022.v10i03006

Abstract:
Nowadays e-commerce and online transaction is growing rapidly. For online and offline transaction most of the customer uses credit card. Credit card used globally for online transaction, buy goods, product, and payment. The rising use of credit card can increase the chances of fraud in credit card. Credit card system is at risk now. The effect of this fraudulent transaction is on the bank and institute causing a financial loss to them. For the detection of distinguish frauds, several machine learning models are utilized for better prediction. The major objective of this article is to identify the fraudulent transaction and outlier in credit card transaction. The dataset of credit card is unbalanced. There are various techniques by which fraudulent transaction can be detected and we have used these techniques such as isolation forest method, local outlier factor and support vector machine to determine fraud in credit card. We have used different matrices for enhancing the performance and accuracy. At last comparison analysis is done by using isolation forest, support vector machine, and local outlier which give the better result.
Jatinder Pal Singh, Arshdeep Singh
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES, Volume 10, pp 01-09; https://doi.org/10.55083/irjeas.2022.v10i03001

Abstract:
This research work, presents Fuzzy Logic Controller (FLC) based D-STATCOM for power quality (PQ) enhancement in power distribution network. In the power distribution system, PQ is the major issue that is occurring due to non-linearity and dynamic changes in the connected loads. The proposed work utilizes FLC for generating switching Pulses for IGBT switches in the D-STATCOM to enhance quality of power in distribution systems. This research work also shows superior performance over conventional PI controllers in mitigation of harmonics by using proposed FLC topology. The proposed system is simulated with Matlab/Simulink software to ensure effective realization.
Umang Garg, Neha Gupta, Mahesh Manchandana
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES, Volume 10, pp 10-23; https://doi.org/10.55083/irjeas.2022.v10i03002

Abstract:
Cloud computing is delivered as a storage service by third party. It gains wide acceptance from various Business organizations & Information Technology (IT) Industries. Cloud computing provides various services to users through the internet; those services are like Applications, computation, and storage etc. In spite of these advantages, cloud technology faces different types of privacy and security related issues. These issues become major barriers to adopt cloud technology into various organizations. This survey paper addresses the cloud architecture, various security and privacy issues, challenges and threats, attacks, and future research directions to overcome the security and privacy related problems in the cloud environment.
Amrik Singh, Puneet Jain, Ajay Kumar
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES, Volume 10, pp 24-33; https://doi.org/10.55083/irjeas.2022.v10i03003

Abstract:
Internet-based provision of computer resources is known as cloud computing. It is possible to utilise data that is controlled by a third party or some other individual at a distant place through cloud computing. Service Level Agreements (SLAs) are used by the majority of Cloud providers to define the services they provide. As part of the SLA, the service provider promises a certain level of quality of the service. Computing and data clouds are two sorts of clouds in a cloud-based system. In cloud technology, task scheduling is critical to ensuring service quality and SLA. One of the most important aspects of cloud computing is a well-organized work schedule. In this article, we have designed an optimal task scheduling method using RAO approach. The RAO algorithm is simple, required number of parameters, and required no tuning of parameters as compared to the other algorithm. Further, a multi-objective function is designed based on RAO algorithm performs the optimal scheduling. The performance evaluation is done by considering number of tasks such as 50,100,200, 300,400, and 500. Further, number of performance metrics are determined for it. The outcomes represents that the presented technique provides lesser values of AWT, ATT, and make span over the existing method.
Vseem Zahir, Puneet Jain
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES, Volume 10, pp 33-41; https://doi.org/10.55083/irjeas.2022.v10i02007

Abstract:
Maximum power point tracking (MPPT) techniques are considered a crucial part in photovoltaic system design to maximise the output power of a photovoltaic array. PID controllers are deployed in the photovoltaic system to track the maximum power point. The performance of the PID controller is influence by controlling parameters. In this paper, we have calculated the optimal parameter values of PID controller using the hybrid combination of GA-PSO algorithm. The proposed method Simulink is designed in MATLAB. After that, various parameters such as settling time, rise time, overshoot, peak time, undershoot, rotor speed, and power generated. The results show that the proposed method provides lower undershoot and settling time as compared to the existing method.
Mukesh Kumar, Puneet Jain, Ajay Kumar
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES, Volume 10, pp 23-32; https://doi.org/10.55083/irjeas.2022.v10i02006

Abstract:
Users' electricity use may be shared nearly instantly with utilities companies on the smart grid due to Smart Meters (SMs). The data is communicated between individuals in the company, which has prompted privacy issues. In this paper, a privacy-preserving method for smart meter data is designed using a swarm intelligence algorithm. In the swarm intelligence algorithm, JAYA algorithm is taken under consideration and deployed for key generation in the planned method. After that, an XOR operation was performed between the smart meter sensitive data and key generated using a JAYA algorithm for encryption purposes. In MATLAB, numerous performance metrics are computed for the planned technique's performance evaluation. From Simulation results it is clear that the planned method gives better results as compared to the previous methods.
Inderjeet Singh, Sarabjeet Kaur
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES, Volume 10, pp 16-22; https://doi.org/10.55083/irjeas.2022.v10i02005

Abstract:
The most important aspect of all forms of confidential communication is security. Although cryptography can be used to safeguard information, it also reveals the presence of covert communication. As a result, steganography, the art of secret communication, was devised. Steganography conceals the presence of covert communication by putting the secret information in a cover image. The inserting process generates the variability in the cover image that negatively impact the imperceptibility parameter. In this paper, we have designed an optimized data hiding method based on bumble bee optimization algorithm. The bumble bee optimization algorithm searches the optimal secret data order before data hiding. After determining the optimal secret data order, the data hiding is achieved using least significant bit (LSB) method. Besides that, in the proposed method, optimal cover image is also chosen by determining the 0’s and 1’s probability in the LSB of the cover image. The performance evaluation of the proposed method is done on five standard dataset images and performance evaluation is done using mean square error (MSE), peak signal to noise ratio (PSNR), and embedding capacity (EC). The result shows that the proposed method reduces the MSE and enhances the PSNR without impacting the embedding capacity.
Palwinder Singh, Manpreet Kaur, Naveen Dhillon
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES, Volume 10, pp 09-15; https://doi.org/10.55083/irjeas.2022.v10i02004

Abstract:
For photovoltaic systems to be more efficient, maximum power point (MPP) tracking of the solar arrays is necessary. The output power of solar arrays is influenced by two factors: temperature and solar irradiation. It is also possible that a traditional MPP tracker would operate incorrectly because to the mismatch effect produced by partial shadow. There are many maximum values for the solar array power–current characteristics when it is partly shaded. For PV systems in partly shadowed conditions, this research provides an MPPT approach with enhanced particle swarm optimization algorithm.
Abul Bashar, Awal Ahmed Bappy, Foysal Ahmed Shobuj, Muktadir Sumon, Aminur Islam
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES, Volume 10, pp 01-08; https://doi.org/10.55083/irjeas.2022.v10i02003

Abstract:
Increased population results in an increase in travel demand. Greater road length and construction of new roads result in faster and longer travels and increase car ownership, which contributes to increased traffic congestion and pollution. The bus form of travel is a critical component of resolving this issue. A bus can carry 30-40 passenger per trip on the other hand a private car carries 2-3 passengers per trip. So, bus transport could decrease the number of vehicles in road if it can provide better service quality in bus mode. In this experiment, the main objectives are to better understand overall passengers’ satisfaction in bus transport in Uttara-Gazipur route and predict the individual factors contributing to the comfort of the bus modes in this route. To evaluate this result, a questionnaire survey form was created with about 19 service quality parameters such as safe speed, temperature, noise, required time, waiting time for bus, station service, seat comfort service, cleanness, staff behaviour, payment system fare. In this experiment, opinions of 100 passengers were collected regarding the service quality. Data were analyzed using descriptive and multiple linear regression, analyzed by SPSS software. One main finding reported that passengers are not satisfied yet with bus service quality. This study revealed that 75% of feedback was poor or very poor, and 25% of feedback was positive or good regarding the level of satisfaction for bus mode. The regression analysis reported that the overall P-value is less than 0.05 and the regression coefficient, R2 is 0.64, which rejected the null hypothesis and makes the survey significant to assess the overall comfort of passengers traveling with bus in Uttara-Gazipur route. It was also found that three parameters: reliability (ẞ = 0.170, P=0.027), safe speed (ẞ = 0.240, P = 0.021) and travel time (ẞ = 0.320, P = 0.01) are individually contributing to overall satisfaction of passenger in Uttara-Gazipur route.
Back to Top Top