2023
Vol 8, No 1 (2023): Enhancing IoT Security through Encryption Challenges and Solutions
Authors Name:-Â Dr. Gourav Kumar, Janavi Devi
Abstract:-Â The increasing adoption of Internet of Things (IoT) devices has brought about significant improvements in the way we live and work. However, the widespread use of these devices has also led to an increase in security risks. IoT devices are vulnerable to a range of security threats, including eavesdropping, data manipulation, and unauthorized access. Encryption algorithms have been identified as a crucial tool for improving the security of IoT devices. This paper explores the challenges and solutions associated with implementing encryption algorithms in IoT devices. The paper discusses how encryption algorithms can be used to secure data transmission and data at rest, and the challenges associated with implementing encryption algorithms in resource-constrained devices. The paper also examines the key management challenges associated with encryption in IoT devices and presents solutions to these challenges. The paper concludes by highlighting the importance of encryption algorithms in securing IoT devices and the need for continued research in this area.
Keywords:-Â Internet of Things, IoT security, encryption algorithms, data encryption, data transmission, data at rest, key management, resource-constrained devices, lightweight encryption, centralized key management, LKMP, CoAP.
Vol 8, No 1 (2023): Artificial Immune System Architecture for Computer Security Applications: A Review of Strengths, Limitations, and Applic
Authors Name:-Â Anindita Saha, Deepak Harbola
Abstract:-Â Artificial immune system (AIS) is a biologically-inspired computational paradigm that mimics the functionality of the natural immune system. AIS has been widely used in various computer security applications such as intrusion detection, malware detection, and anomaly detection. This research paper discusses the architecture of artificial immune systems and its applications in computer security. The paper also presents an overview of the existing research on AIS-based computer security systems and highlights the strengths and limitations of AIS.
Keywords:-Â Artificial immune system, AIS, computer security, intrusion detection, malware detection, network security
Vol 8, No 1 (2023): Live Forensics Analysis of Web Browser Sessions Using Volatility Framework and Wireshark
Authors Name:-Â Himanshu Suyal, Sagar Mal Nitharwal, Dr. Anirudh Sharma
Abstract:-Â The use of web browsers has become ubiquitous in modern times. People use them to access a vast amount of information and perform various tasks, ranging from online shopping to accessing social media platforms. With the increase in the use of web browsers, cybercrime has also increased, and it has become essential to analyze web browser sessions to identify and investigate malicious activities. This paper presents an experimental analysis of web browser sessions using live forensics methods. We propose a methodology that enables the collection and analysis of volatile data from running web browser sessions. We also present experimental results that demonstrate the effectiveness of our methodology in detecting and analyzing malicious activities in web browser sessions.
Keywords:-Â Live forensics, Web browser sessions, Volatility Framework, Wireshark, Memory analysis, Network traffic analysis, Malware, Process analysis
Vol 8, No 1 (2023): Negotiating Traffic Times for Internet Optimization: A Traffic Scheduling Algorithm Based on Traffic Prediction and User
Authors Name:-Â Dr. Vishal Singh Kunwar, Rajendra Kumar Bharti, Ramesh Belwal
Abstract:-Â Internet optimization has become a major challenge for internet service providers and users alike. The exponential increase in internet traffic and the number of connected devices has led to congestion and slow internet speeds. In this research paper, we propose a solution to this problem by optimizing internet traffic through negotiating traffic times. We discuss the concept of traffic negotiation, its benefits, and its challenges. We also provide a detailed overview of existing solutions, their limitations, and how our proposed solution can overcome these limitations. Our proposed solution involves a traffic scheduling algorithm that optimizes traffic by allocating bandwidth and time slots to users based on their traffic demands. Our simulations show that this algorithm can significantly improve internet speeds and reduce congestion.
Keywords:-Â Internet optimization, Traffic scheduling, Peak-hour traffic, Network congestion, Traffic prediction, User demand analysis, Resource allocation, Telecommunications, Data centers, Cloud computing, Network performance, Server efficiency, Cloud costs, Fairness, Prediction accuracy, User demand bias, Advanced prediction models, Heterogeneous user demands Reinforcement learning, QoS-based traffic management, Joint user association, Machine learning, Game theory
Vol 8, No 1 (2023): Mobile Applications and It’s Global Impact
Authors: B. Gayathri , N. Chithra, D. Anusha, D. Srilekha, K. Poojitha, , Sumaya Khatun, Dr. Ankitha Nigam
Abstract: This paper presents the uses and effect of mobile application in every individuals, business and social area etc. In modern ages society is very concerned about mobile applications rapidly developing technology. This paper demonstrates that how individual mobile user facilitate using mobile application and the popularity of the mobile application. Here we are presenting the consequence of mobile application in Global communication ,development and risks of the past and present situation of mobile application from different parts of the world has been presented here to express the impact. This paper also presents some effect of mobile application on society from the ethical perspective.
Keywords: - Global communication, Ethical perspective, Impact and uses in past, present, future era.
Â
2022
Vol 7, No 3 (2022): Improving Security in Internet of Things with Software Defined Networking
Authors:-Â Dr. Avinash G. Patil, Bhuhan N.Ghodake, Ganesh G. Patil
Abstract:-Â The future Internet of Things (IoT) will connect billions of heterogeneous smart gadgets capable of interacting with the environment to the Internet. As a result, suggested IoT networking solutions must consider the scalability of IoT nodes as well as the operating cost of establishing the networking infrastructure. This will create a massive amount of data, posing a significant challenge in terms of both data transfer and information processing. Furthermore, security concerns arise as a result of untrusted IoT devices being linked to aggregation networks. We suggest using Software-Defined Networking (SDN) architecture to implement security in IoT gateways in this study. An experimental validation of the framework is proposed, resulting in network security enforcement at the network edge.
Keywords:-Â IoT, SDN, Security, Analytics, Software
Vol 7, No 3 (2022): Novel Approach to Antivirus and Phishing Guard
Authors:-Â Keerthi.V.S, Dr. R. Selva Kumar
Abstract:-Â "Phishing" is one of the simplest methods to breach people's private boundaries in the internet world. Several approaches for dealing with these enigmatic events have been proposed, but none of them has shown to be genuinely successful. In this article, we will discuss a novel way for countering "Phishing" with the assistance of an anti-virus. The topic of user trust and dependence by employing anti-virus is underlined in the offered technique introduced by us. Previously, using anti-virus software was one method of dealing with "Phishing," but our procedure can improve on previous methods and reduce the possibility of users becoming trapped.
Keywords:-Â SAM'08, Hack, Security, Antivirus, Phishing, and Guard .Â
Â
Vol 7, No 3 (2022): Use of Asymmetric Cryptography of RSA and ElGamal Algorithm for Secured Mail System
Authors:-Â Bharath. K, Dr. V. Vengateshkumar
Authors:-Â Mail messages are a type of secure communication that is sent from one computer to another. In this system, a user sends a mail message to another user, and the message is saved on the server via the SMTP protocol. Before storing emails on a mail server, ElGamal encryption and the RSA method are used. After obtaining emails from the mail server, ElGamal and RSA decryption is performed. When a user receives an email, the server retrieves it via the POP protocol. This technology is used to safeguard the mail server system for crucial mail communications sent by the local government. The system's implementation resulted in a secure patient records report for the health department. For a certain department, patient records must be protected. This system is based on a locally owned mail server mail client and is written in C# using SQL Server to store mail messages.
Keywords:-Â Mail Server, Secure Communication, SMTP, POP, ElGamal algorithm, RSA algorithm.
Vol 7, No 3 (2022): SOA-based Design for E-Commerce System’s Logical Security
Authors:-Â Dr. V. Chinnaiyan , K. DivyaÂ
Abstract:-Â Rapid advances in information technology have also converted physical markets into electronic markets (e-commerce). Similarly, as e-commerce evolves, businesses must rediscover a more secure strategy for deploying e-commerce and preserving its logical security. SOA is one of the most effective strategies for meeting these needs. SOA has the advantage of being simple to use, adaptable, and recyclable. SOA has the added benefit of making message manipulation and unauthorised access easier. This makes E-commerce security technology implementation exceedingly tough in other technical fields. This study explores the significance of SOA in E-commerce and finds problems in previous e-commerce platform security analyses. This editorial proposed an implementation design of the logical security framework for SOA-supported E-commerce system based on the foundation of discovering faults.
Keywords:-Â system consolidation, web services, logical security, Service oriented Architecture,
Vol 7, No 3 (2022): A Network Security System in Internet Penetration to Decrease E-Commerce Risks
Authors:-Â Snehalata Singh, Ankita Rathore
Abstract:-Â E-commerce security is a subset of the information security framework that focuses on the components that influence e-commerce, such as computer security, data security, and other broad areas of the information security framework. E-commerce security has its own complexities, and it is one of the most obvious security components that affect end users through their everyday financial interactions with businesses. E-commerce security is the safeguarding of e-commerce assets against illegal access, use, modification, or destruction. Integrity, non-repudiation, authenticity, confidentiality, privacy, and availability are the dimensions of e-commerce security. How to decrease e-commerce security risk has become a topic worthy of further investigation in order to avoid system security flaws and defects causing users substantial damage. The important security need for the e-commerce system is explored in this work, and the quality characteristics for the e-commerce software security requirement are inferred. Using the quantifiable quality characteristics, the Security Requirement Quality Measurement (SRQM) model is proposed. The article provides a Security Requirement Quality Improvement (SRQI) approach based on the SRQM model to detect security requirement quality problems and defects.
Keywords:-Â Security Vulnerability, SRQI, Quality measurement model, Digital E-commerce, Security Threats, Security measures,
Vol 7, No 2 (2022): Multiple-Factor Authentication Detecting Vulnerabilities Using an Attack Recognition Technique
Authors:-Â Tarun Garg, Dr.Subroto Mandal
Abstract:-Â Authentication is a crucial part of any information security system and should never be overlooked. It is now considered to be one of the most fundamental needs for maintaining network communication security. There is a requirement for a high degree of authentication in today's world in order to guarantee that a considerable level of security is being transmitted to the application. As a result, it makes difficult problems regarding efficiency and security much easier to solve. The lack of control and authority can lead to problems with data privacy and integrity, which are both important aspects of information security. In addition, the most significant challenge presented by multi-factor authentication is the lengthy execution time, which ultimately results in a drop in overall performance. The majority of currently available research on multi-factor authentication solutions does not discover vulnerabilities based on user behaviour. Because they are solely concerned with enhancing the authentication process's safety, the majority of the most recent studies do not investigate the effectiveness of the system. Because of this, the study presented here suggests a novel multi-factor authentication strategy that is both based on user behaviour and capable of retaining the highest possible level of efficiency. In order to assess the effectiveness of this strategy, experiments were carried out. According to the findings of the experiment, the processing time required by the scheme that was presented takes much less time than the processing time required by other schemes. After further safety measures have been built into the system, this aspect becomes an even greater level of significance.
Keywords:-Â Vulnerabilities Detection, Security, Safety Measures, Attack Recognition Technique
Vol 7, No 2 (2022): The Model for Safe and Reliable Home Networks in a Globally Converging Environment
Authors:-Â Dr. Prakash Chander Aggarwal, Shobhit YadavÂ
Abstract:-Â The social interest in and demand for Home-Network has grown dramatically. Although different services are being developed to meet such requests, they might present major security issues when connected to an open network such as the Internet. This study examines the security requirements for protecting service users under the premise that the Home-Network environment is linked to the Internet, and then presents a security model based on the needs. The suggested security model meets the majority of the requirements and may also be dynamically adapted to future ubiquitous home-networks.
Keywords:-Â Response, Countermeasure, Security, Home-Network, Vulnerability
Vol 7, No 2 (2022): Cyberattacks on Networks and Their Classification for Effective Use of Cognitive Fog Computing
Authors:-Â Dr. R. C. Udenia, Shivangi Dixit, Kamlesh Nigam
Abstract:-Â IoT is a network that connects and communicates with billions of devices through the internet. Because of the widespread usage of IoT devices, shared data between devices or via the network is no longer secure owing to the rise in cyberattacks. Because these loT devices are connected to sensors that are directly connected to large-scale cloud servers, network traffic via loT systems is rapidly increasing and posing new cybersecurity issues. To decrease these intrusions, developers must create new approaches for recognising corrupted IoT devices. To ensure the security of data on a cloud, the fog layer is presented in this work to control cyberattacks. In addition, the operation of the fog layer and various anomaly detection approaches for preventing cyberattacks has been investigated.
Keywords:-Â IoT, Anomaly Detection, Cyberattacks, Network, Fog Layer
Vol 7, No 2 (2022): Ransomware and Computer Security: A Critical Evaluation
Author:-Â Apoorva Kaushal
Abstract:-Â As we can see, the computer has begun to play a significant part in the way we go about our everyday lives. If we look back to the very beginning, we can see that humans are not overly reliant on computers. However, if we look to the present, we can see that computers have become so ingrained in our daily lives that we just cannot function without them. While the usage of computers in our everyday lives has expanded as a result of this, the complexity of maintaining our online security has also increased. The very next day, we hear about new kinds of cyberattacks that have been carried out against our computers; this not only disrupts our everyday lives but also our digital worlds. Despite the fact that new forms of malware, such as ransomware, are being developed at the same time as the number of cyberattacks is growing at an alarming rate, the most harmful type of malware is still known as ransomware. We will investigate and learn more about ransomware, including how it infects and affects your computer, how it truly works like, and how dangerous it is, during the course of this article.
Keywords:-Â Ransomware, System Security, malicious file, Attacks
Vol 7, No 2 (2022): A Study on Cognitive Packet Networks to Ensure the Safety of Internet of Things Transactions
Authors:-Â Gautam Kapoor, Manya Sharma
Abstract:-Â In today's networks, the idea of Security Aware Routing has not yet gained widespread acceptance. However, the newly developed core networks that are centred on IoT present opportunities to reopen that field of research. Routing is something that we believe to be an addition to the already established network security approaches, particularly in the IoT arena. The standard set of measurements is supplemented with security and safety metrics with the implementation of security-aware routing (bandwidth, network delay, hop count, path cost, load etc.). The research demonstrates a novel strategy in which, on the basis of software-defined networks (SDN), we estimate trust connections between nodes and flows and then utilise those estimations to design SDN pathways on the basis of the Cognitive Packet Network (CPN) concept. When it comes to making judgments regarding routing, Random Neural Networks (RNN), which are backed by cognitive packets, are utilised. Within the context of the SerIoT project, the suggested solution was conceived of and is currently being put into action in order to show the viability of secure networks for the Internet of Things (IoT).
Keywords:-Â Se- rIoT, Internet of Things (IoT), Security, SDN, Energy, Cognitive Packet Network
Vol 7, No 1 (2022): Cloud-based Integrated Sensor Network with Low Energy Consumption
Author:Â Rahul Sharma
Abstract:Â Wireless sensor network applications are useful in a wide range of fields, including human healthcare monitoring, defence monitoring, environmental monitoring, infrastructure monitoring, and so on. In a wireless sensor network, there are several concerns and obstacles such as security, scalability, storage, network longevity, and so on. Sensor Cloud (SC) has become an important component of today's research period in order to solve concerns and obstacles. Sensor clouds are the synthesis of two distinct technologies. As a result of the fantastic data collection capabilities of wireless sensor networks, as well as the strong data storage and processing capabilities of cloud computing, Sensor Cloud integration is currently gaining more attention from both academic and industrial sources. Virtualization is a crucial Sensor Cloud idea in which several applications run on each sensor device at the same time. Sensor Cloud provides us with an open, adaptable, and changeable platform for monitoring and controlling a variety of applications. Here, we will focus on an essential topic about Sensor Cloud Architecture, which will provide us with Sensor Cloud Design, Applications, Issues, and Challenges. In our suggested study, we will explore Social Sensor Cloud, in which we will create an algorithm for both parameter energy efficiency and security through virtualization. Our work will assist academics as well as industry professionals in the design and development of sensor clouds.
Keywords:Â Virtualization, Sensor Cloud, Wireless Sensor Network, Cloud Computing, Physical Sensor, Research, Virtual Sensor
Vol 7, No 1 (2022): Mobile Security through Cryptography
Authors:Â Ananya Gupta, Janhavi Peshkar, Mrunmayee Deshpande, Prof Sakshi Khamankar
Abstract:Â Security plays a critical position in preserving information privacy and secrecy. This system is developed so that employees and other mobile users can store and operate on sensitive data on their mobile phones without having to worry of it being leaked. This software project concentrates on securing data such as text, passwords, images, audios, on mobile phones by storing it in encrypted form using cryptography. Many encryption strategies are available to protect data during transmission or storage.
Keywords: Cryptography, Encrypted, Transmission
Vol 7, No 1 (2022): An Iot Based Dynamic Road Traffic Control System for Bangladesh Using Image Processing
Author:Â Md Rakibul Hasan
Abstract: Traffic management has become one of the biggest problems due to the increase in vehicles. A manual system of traffic control is not effective for the present traffic jam situation [1]. A traffic management system utilizing the Internet of Things (IoT) and Image Processing techniques are presented in the paper. Real-time data can be analyzed using image processing in the proposed system [5][9]. Using multiple camera lanes are monitored continuously with different lanes. Analyze the obtained data from the different lanes. Using image processing, the number of vehicles in each lane can be detected and counted. Information about the count from each lane is passed to the central processing unit [6]. The algorithm determines the amount of time each lane might wait based on the number of vehicles, and then it determines the timing of the signal lights [11]. As a result, the average expectancy time is reduced, and the clearance of traffic is more efficient. Adaptive traffic management using the Internet of Things (IoT) also reduces pollution resulting from carbon dioxide (〖CO〗_2) emissions and can be helpful in emergency situations.
Keywords: Internet of Things, IoT, Embedded Systems, Road Traffic Management, Adaptive traffic management system.
Vol 7, No 1 (2022): Application of Chit Fund System with Crypto Payments
Authors:Â Megha Bisane, Nupur Jain, Supriya Gupta
Abstract:Â Our idea focuses on building a crypto currency for P&G, say P&G coin which would be used for cashless transaction and using them for chit fund system in order to popularize crypto payments among suppliers and retailers. This P&G coin will be the use case of block chain. Hence it would be more secure compared to other cashless payment methods. Value of each coin could be decided by company as per their profits or any other criteria.
Supplier and retailer will have a choice whether they want to be a part of the chit fund system. Each subscriber in the chit fund would be asked to keep a bid, say one P&G coin, suppose there are 50 subscribers in this chain, so the total bid amount would be 50 P&G coins. A lucky name would be picked up and 45 P&G coins will be served in the account of that lucky supplier or retailer. Rest 5 coins would be distributed among rest of the members. This withdrawal of lucky names would be done monthly and will continue for 50 months, as there are 50 subscribers, every member will get a chance to win the fund. Once a particular subscriber wins, we can decrease his probability to win next time, so that everybody gets a chance to win. Actual chit fund system works with a little difference in India. It was given below in the uploaded images. Chit fund system can bring many suppliers and retailers who believes cash payments as more secure way of transaction to crypto payment methods. Hence cashless economy of P&G would increase with more secure way of transaction i.e by using P&G coin Blockchain.
Keywords: - Bitcoin, Cryptocurrency, Blockchain, Chit Fund SystemÂ
2021
Vol 6, No 3 (2021): Improved Data Security and Scalability in Cloud Environments: A Comparative Study
Author:Â Avantika Chouhan, Radhika Bansal
Abstract:Â Distributed computing, a distributed method for distributing information via the internet, serves as an adaptable online information reinforcement. The study displays many classes of mists that rely on the utilisation of cloud and the administrations provided by the cloud. One of the major challenges that cloud providers and clients face is information security. Cryptography is suggested as a suitable solution for certifying cloud data. This study also includes a survey of some of the current solutions for verifying and growing data stored in the cloud. Data owners have the ability to migrate data to the cloud and make approvals on that data in order to manage how it is accessed by various types of consumers. When cryptographic systems and other techniques are used with traditional access control measures, the security and adaptability of information is greatly improved. The survey's analysis focuses on insider threats to cloud security and adaptability as one of the most pressing challenges in distributed computing.
Keywords: Access control, cloud computing, cryptography, security, scalability
Vol 6, No 3 (2021): A Study on Techniques of Data-Mining for Defeating Attacks in Wireless Sensor Networks
Author:Â Deepika Shrivastava, Amit Shukla, Vivek Tyagi
Abstract:Â As wireless sensor networks get more complicated, and as the number of wireless sensor devices and networks grows, security becomes a major concern for sensing networks. In this paper, a method is proposed for detecting anomaly nodes in wireless sensor networks using association with rules and applying a clustering approach to optimise routing. The technique employs the ANN algorithm to extract traffic patterns from routing tables and network traffic packets, after which the K-means cluster algorithm builds an adaptive detection model. Routing attacks may be detected effectively and automatically using the combination of these two approaches. The suggested study has enhanced the detection of attacks that were previously undetectable using other methods. The suggested detection approach requires no prior knowledge and is effective in detecting routing assaults in a variety of wireless sensor networks.
Keywords: Wireless sensor network, Data Mining, Attacks, ANN algorithm
Vol 6, No 3 (2021): An Analytical Study of Improvement Required in Security
Author:Â Kavya Sharma, Rahul Bisht
Abstract:Â Security is the most important aspect of life, and the increasing frequency and likelihood of IT frameworks make security a key worry. Reports of programming security failures have recently become common. The exposure to IT security disappointments has put a strain on programming designers to construct and ensure programming at the appropriate level of security (Common Criteria Board, 2009). The most notable difficulty with programming is that it has several flaws and errors that enable programmers to abuse the wellness and make the product bargain utilising any and all ways. In a piece of writing titled 'Why is Software So Bad?', the author C. Mann explains that undesirable behaviour patterns and inadequate programming life cycle forms have resulted in the occurrence of shaky application (C Mann, 2002). Almost definitely, the client's increased use of programming had caused him to be in need. Programming has advanced to provide easy, multi-client, online, and continual registration frameworks. This product generates profit and proficiency, but it also invites programmers and aggressors to make the product unsteady. Programmers work hard to find existing flaws on a regular basis. There are a lot of defenceless details in an application when security isn't concerned as a requirement of the entire architecture. For example, under the Mastercard framework, the uncovered information of numerous card holders' details may easily be stolen through the historical backdrop of trades saved by the product (Sullivan, R. J. 2014 ). Another source where security has been easily defeated is word reference secret phrase and PIN assault that hardly reflect one's mentality. These models suggest that if the framework does not improve via safety initiatives, it will have a direct financial impact. When developing safe frameworks, it is critical to address security from the ground up. These are the fundamentals of secure programming development. It is a well-known fact in the product industry that requirements design is critical to the success of any substantial advancement of tasks. While many development initiatives generate subsequent releases based on previous releases, the requirements stage gives the most straightforward opportunity to create secure programming. Because of the importance of security requirements, training should be included as early as possible in the requirement development process.
Keywords: IT framework, IT security, Programming, Software behaviour
Vol 6, No 3 (2021): Models for Federated Market Clouds
Author:Â P. Swetha
Abstract: Multi-cloud systems have enabled resource and service providers to co-exist in a market where the relationship between clients and services depends on the nature of an application and can be subject to a variety of different Quality of Service (QoS) constraints. Deciding whether a cloud provider should host (or finds it profitable to host) a service in the long-term would be influenced by parameters such as the service price, the QoS guarantees required by customers, the deployment cost (taking into account both cost of resource provisioning and operational expenditure, e.g. energy costs) and the constraints over which these guarantees should be met. In a federated cloud system users can combine specialist capabilities offered by a limited number of providers, at particular cost bands – such as availability of specialist co-processors and software libraries. In addition, federation also enables applications to be scaled on-demand and restricts lock in to the capabilities of a particular provider. We devise a market model to support federated clouds and investigate its efficiency in two real application scenarios: (i) energy optimisation in built environments and (ii) cancer image processing both requiring significant computational resources to execute simulations. We describe and evaluate the establishment of such an application based federation and identify a cost-decision based mechanism to determine when tasks should be outsourced to external sites in the federation. The following contributions are provided: (i) understanding the criteria for accessing sites within a federated cloud dynamically, taking into account factors such as performance, cost, user perceived value, and specific application requirements; (ii) developing and deploying a cost based federated cloud framework for supporting real applications over three federated sites at Cardiff (UK), Rutgers and Indiana (USA), (iii) a performance analysis of the application scenarios to determine how task submission could be supported across these three sites, subject to particular revenue targets.
Keywords: Federated Clouds, Cloud Computing, Cost Models, Market Mechanism, Comet Cloud
Vol 6, No 2 (2021): The Interconnect Data Network Architecture for Parallel Systems
Authors:Â Dr. Rakesh Kumar Katare, Manisha Singh, Charvi Katare
Abstract:Â The performances of various multiprocessor architectures by taking into account their topological properties. It is evaluated that, an interconnect data network is giving better performance in terms of nodes and average distance. Whereas, better performance in terms of diameter and message traffic and density respectively. The option of the interconnect data network may affect as node complexity, bisection width, scalability, switching model, degree, cost of network etc. And, they design high performance interconnection network, which can be used in designing of multiprocessor server.
Keywords: Interconnect Data Network, Parallel Systems, Subsystems, Processor
Â
Vol 6, No 2 (2021): A review on the Convolutional Neural Networks (CNN) and Hand-written digit recognition using Deep CNN
Authors:Â Md. Rakibul Hasan, Al Mahmud Al Mamun, Md. Mokhlesur Rahman, Md. Yasin Khan, Md. Sahid Hossain, Razib Hasan
Abstract:Â In deep learning, the Convolutional Neural Networks (CNN) has been used extensively with the most accurate results to solve real-world problems. A CNN is a type of artificial neural network made up of neurons with learnable weights and biases. In this paper, we review convolutional neural networks and we proposed a model for Hand-written digit recognition using Deep Convolutional Neural Networks. Our model achieved an accuracy rate of 97.59% for the digit 0 to 9. In our case, we have reduced the training set such that all digits appear with equal frequency so that there is no bias toward any one particular digit. Here, the validation set is not used, as early stopping does not apply. We tried to develop a system so that digits can be recognized in an easy, fast, and more accurate way, and to be dynamic so that it can be used in different critical situations.
Keywords: Convolutional Neural Networks, Deep Convolutional Neural Networks, Hand-written digit recognition