PREVIOUS ISSUES » Volume 9 Issue 2 April-June 2021

Volume 9 Issue 2                         April-June 2021


HANDLING VULNERABLE SCRIPT CODE IN WEB ENGINEERING [pp 01-04]

Country- INDIA

Deshbhratar Meena, Srivastava Anurag

DOI – 10.55083/irjeas.2021.v09i02001

Abstract: Network protection in our everyday lives is becoming increasingly critical today. Since we cannot live without the Internet, it is important to have a good and security environment for networking. Cross site scripting (XSS) does, however, attack millions of websites. We can use XSS to insert malicious scripting code into apps and then return it to the customer side. If users are using the web browser to visit the injecting place of the malicious script code, it is directly run on the customer machine. The main words of XSS are commonly found in the JavaScript browser or on the server component to filter malicious code. However, it is difficult to collect all keywords in the detecting-list in order to prevent XSS attack. However, it is possible to create various forms of malicious scripting. It is also worthwhile for more people to work on XSS and find more ways to prevent XSS attacks.

Cite this Article

MeenaDeshbhratar,  Anurag Srivastava. HANDLING VULNERABLE SCRIPT CODE IN WEB ENGINEERING. International Research Journal of Engineering & Applied Sciences, (IRJEAS). 9(2), pp. 01-04, 2021. https://doi.org/10.55083/irjeas.2021.v09i02001.


CONTEMPORARY SMART ANTENNA FOR MOBILE COMMUNICATION WITH ADAPTIVE BEAMFORMING ALGORITHM [pp 05-09]

Country- UBERLANDIA, MG

DOI – 10.55083/irjeas.2021.v09i02005

Franklin Oloko, Michael Derrek

Abstract: The selection of smart antenna framework is a guarantee to the arrangements of the remote correspondence debilitations like wasteful use of recurrence range, week signal due to multipath engendering, and so on. The keen reception apparatus works in conjunction with advanced flag processor which is dependable to modify different parameters of the framework keeping in mind the end goal to eliminate obstruction signals and to upgrade gathering in the coveted direction(s). In this paper, an endeavor is made to create different adaptive beamforming calculations that prompt general change in the execution of the smart antenna.

Cite this Article

Franklin Oloko, Michael Derrek. CONTEMPORARY SMART ANTENNA FOR MOBILE COMMUNICATION WITH ADAPTIVE BEAMFORMING ALGORITHM. International Research Journal of Engineering & Applied Sciences, (IRJEAS). 9(2), pp. 05-09, 2021. https://doi.org/10.55083/irjeas.2021.v09i02005.


AN ASSESSMENT OF FUZZY TEMPORAL EVENT CORRELATION TOWARDS CYBER CRIME INVESTIGATION [pp 10-14 ]

Country- USA

DOI – 10.55083/irjeas.2021.v09i02006

James Murray

Abstract: Event logging and event logs play an important role in modern IT systems criminal investigation which is generated when end user with each other in web environment and stored in various logs like firewall log file at side, network log file at gateway and web log file at server side. But log file is not to be over emphasized as a source of information in systems and network management. Whereas conduct efficient investigation and gathering of use full information need to correlate different log file. Task of analysing event log files with the ever-increasing size and complexity of today’s event logs has become cumbrous to carry out manually. Nowadays latest spotlighted is automatic analysis of these logs files. . This paper presents a bird eye on two basic concepts one is temporal data mining and another is fuzzy association rules. Using log files it is possible to classify the attacker from the normal user.

Cite this Article

James Murray. AN ASSESSMENT OF FUZZY TEMPORAL EVENT CORRELATION TOWARDS CYBER CRIME INVESTIGATION. International Research Journal of Engineering & Applied Sciences, (IRJEAS). 9(2), pp. 10-14, 2021. https://doi.org/10.55083/irjeas.2021.v09i02006.


EFFICIENCY OPTIMIZATION OF SOLAR PHOTO VOLTAIC SYSTEM BY MODULE RETROFFITING [15-18]

Country- INDIA

DOI – 10.55083/irjeas.2021.v09i02007

Shan Bahadur, Umang Dayal

Abstract: In day today life because of lack energy resources man move towards renewable energy source. When we go towards solar system it can use the sun energy to boil water or to generate electricity. Our aim is to develop a system which uses solar energy in both form thermal and solar form. The Hybrid Solar Solution is able to produce more electricity than PV, more reliable hot water than solar thermal, and heating at a better CoP than most conventional heat pumps – all with little or no CO2 emissions. Current projections suggest that a PV-T will produce sufficient electricity over the course of the year to cover the demand of the heat pump, which will meet a reasonably insulated building’s total annual heating and hot water requirements. Further to this the incorporation of a solar thermally charged. The efficiency of the system to a point that it outperforms any thermal system or solar system.

Cite this Article

Shan Bahadur, Umang Dayal. EFFICIENCY OPTIMIZATION OF SOLAR PHOTO VOLTAIC SYSTEM BY MODULE RETROFFITING. International Research Journal of Engineering & Applied Sciences, (IRJEAS). 9(2), pp. 15-18, 2021. https://doi.org/10.55083/irjeas.2021.v09i02007.


HEAT EXCHANGER DESIGN OPTIMISATION [pp 19-28]

Country – VIETNAM

DOI – 10.55083/irjeas.2021.v09i02008

Wong Ye

Abstract: In this paper, an optimized model of Shell and Tube Parallel Flow Heat Exchanger of water and oil type is proposed using C++ programming language. Shell and tube heat exchangers are of special importance in boilers, oil coolers, condensers, pre-heaters etc. They are also used in high pressure operations, refrigeration and air conditioning industry and process applications. In this paper, a number of practical cases of shell and tube heat exchangers are taken and the analysis of thermal and constructional design of every case is done. The optimised design is obtained by minimising the pressure drop by maximising the heat exchanger area to reduce pumping and running cost. Also considering that large sizes lead to increased capital cost, heat exchanger area is also optimised to overcome this problem. Effect of designparameters on pressure drop and heat exchanger area is also explained.

Cite this Article

Wong Ye. HEAT EXCHANGER DESIGN OPTIMISATION. International Research Journal of Engineering & Applied Sciences, (IRJEAS). 9(2), pp. 19-28, 2021. https://doi.org/10.55083/irjeas.2021.v09i02008.


 

IMPLEMENTING END-TO-END ENCRYPTION IN MOBILE APPLICATIONS: CHALLENGES AND SOLUTIONS  [pp 29-33]

Country – INDIA

DOI – 10.55083/irjeas.2021.v09i02009

Venkat Nutalapati

Abstract: End-to-end encryption (E2EE) is a pivotal technology in ensuring the privacy and security of communications within mobile applications. By encrypting data at its origin and decrypting it only at its destination, E2EE prevents unauthorized access during transmission. However, implementing E2EE in mobile applications presents a range of challenges, including technical limitations, usability issues, compliance with regulatory standards, and potential security vulnerabilities. This paper explores these challenges in detail and proposes practical solutions to address them. Through a comprehensive review of current methodologies and case studies of prominent applications such as WhatsApp and Signal, this study aims to provide a nuanced understanding of how E2EE can be effectively integrated into mobile platforms. The paper highlights best practices for overcoming implementation obstacles and discusses future directions for enhancing mobile security through E2EE. By offering insights into both the theoretical and practical aspects of E2EE, this research contributes to the broader discourse on safeguarding user data in an increasingly digital world.