IRJEAS

Volume 11 Issue 1                        January-Marchr 2023

Original Article

LICENCED UNDER

FIND ON

CROSSREF

SCILIT

 

CROSSMARK

Study of Structural Properties of Co1+xZrxFe2-2xO4 Spinel Ferrite 

DOI: 10.55083/irjeas.2022.v11i01001

Country- INDIA

Dr. Jairam B. Mote, Dr. Pravin K. Gaikwad

PAPER ID: IRJEAS04V11I1001

Published: 21 February 2023

Journal: IRJEAS, Volume 11, Issue 1

Pages: 01-11

Keywords: Cobalt Ferrite, Sol-gel auto Combustion, Structural Properties

Abstract:

Nanocrystalline Co1+xZrxFe2-2xO4 with different compositions with x = 0.0, 0.1, 0.2, 0.3, 0.4, 0.5 and x = 0.6 were efficiently prepared by sol-gel self-combustion. Citric acid served as fuel and metal nitrates were AR grade. X-ray diffraction results showed that a single-phase cubic spinel structure was produced. The crystallite size, lattice constant, and X-ray density are all within the above limits. The crystallite size supports the nanocrystallinity of the material. Porosity increases because the bulk density is much lower than the X-ray density. The cation distribution results indicate that the cobalt ferrite sample has an inverse spinel structure, with Zr4+ ions occupying [B] positions exclusively and Co2+ and Fe3+ ions occupying tetrahedral (A) and octahedral [B] positions, respectively. indicates possession.

Cite this Article

Dr. Jairam B. Mote, Dr. Pravin K. Gaikwad. Study of Structural Properties of Co1+xZrxFe2-2xO4 Spinel Ferrite. International Research Journal of Engineering & Applied Sciences (IRJEAS). 11(1), pp. 01-11, 2023. https://doi.org/10.55083/irjeas.2022.v11i01001.

Original Article 

LICENCED UNDER

FIND ON

CROSSREF

SCILIT

 

CROSSMARK

Optimized Data Hiding Method based on Meerkat Clan Algorithm for Image Steganography

DOI: 10.55083/irjeas.2022.v11i01002

Country- INDIA

Navrinder Kaur, Sarabjeet Kaur

PAPER ID: IRJEAS04V11I1002

Published: 21 February 2023

Journal: IRJEAS, Volume 11, Issue 1

Pages: 12-18

Keywords: Canny Edge Detection, Chaotic Logistic Map, Data Hiding, Image Steganography, Meerkat clan optimization, Security

Abstract:

To fulfill the security criterion of imperceptibility, the secret info is hidden in the cover image using image steganography. To do this, a hidden data bit swaps out the least important part of the cover image. The replacement process produces variability, which has an effect on the imperceptibility parameter. To address this restriction, this research proposes a unique optimal data concealing approach based on the meerkat clan optimization algorithm. This method seeks the best secret data to conceal in the cover image to be able to improve the imperceptibility parameter. The secret data is also divided into 2:4 ratios. The cover image is then divided into smooth and edge regions. A 2-bit LSB technique is utilized to hide data in the smooth area, whereas data hiding in the edge region is accomplished with a 4-bit LSB approach. The simulation is evaluated using multiple performance measures to compare its performance to existing approaches. The suggested technique outperforms the previous method in terms of imperceptibility.

Cite this Article

Navrinder Kaur, Sarabjeet Kaur. Optimized Data Hiding Method based on Meerkat Clan Algorithm for Image Steganography. International Research Journal of Engineering & Applied Sciences (IRJEAS). 11(1), pp  12-18, 2023. https://doi.org/10.55083/irjeas.2022.v11i01002

Original Article 

LICENCED UNDER

FIND ON

CROSSREF

SCILIT

 

CROSSMARK

Structural, Magnetic and Dielectric Properties of Ni0.3Cu0.7CoxCrFeO4 Sol-gel Synthesized Nano Thin Films

DOI: 10.55083/irjeas.2023.v11i01003

Country- INDIA

Dr. Damodar Dattatraya Birajdar

PAPER ID: IRJEAS04V11I1003

Published: 23 February 2023

Journal: IRJEAS, Volume 11, Issue 1

Pages: 19-25

Keywords: Magnetic oxide layer, MOKE, Thin films, SILAR, VSM, XRD

Abstract:

A thin magnetic oxide layer with composition Ni0.3Cu0.7CoxCrFeO4 (0.0<x<1) is produced by the SILAR process. X-ray diffraction, cation distribution and infrared spectra were investigated as structural features. Permittivity and dissipation factor are properties of interest. Magnetic properties were studied using MOKE. The lamellae have been shown to have spinal structures. As Co grows, the lattice constant also increases. Observed I.R. spectra show tetrahedral and octahedral bonds. Increase in the dielectric properties because enhancement of space charge polarization.

Cite this Article

D.D. Birajdar. Structural, Magnetic and Dielectric Properties of Ni0.3Cu0.7CoxCrFeO4 Sol-gel Synthesized Nano Thin Films. International Research Journal of Engineering & Applied Sciences (IRJEAS). 11(1), pp.  19-25, 2023. https://doi.org/10.55083/irjeas.2023.v11i01003.

Review Article 

LICENCED UNDER

FIND ON

CROSSREF

SCILIT

 

CROSSMARK

Automated Security Testing for Mobile Apps: Tools, Techniques, and Best Practices

DOI: 10.55083/irjeas.2023.v11i01004

Country- INDIA

Venkat Nutalapati

PAPER ID:IRJEAS04V11I1004

Published: 23 February 2023

Journal: IRJEAS, Volume 11, Issue 1

Pages: 26-31

Keywords: Automated Security Testing, OWASP ZAP, Burp Suite, Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Vulnerability Detection, Mobile Security Tools, Mobile Threats, Security Vulnerabilities.

Abstract:

With the increasing dependence on mobile applications for a wide range of functions—from communication and financial transactions to health monitoring and entertainment—ensuring these apps are secure against vulnerabilities is more critical than ever. Automated security testing has emerged as a vital component in safeguarding mobile applications, offering a structured methodology for detecting and addressing security risks. Unlike manual testing methods, automated security testing provides enhanced efficiency, broader coverage, and greater consistency in identifying potential vulnerabilities. This paper delves into the landscape of automated security testing for mobile applications, focusing on prominent tools such as OWASP ZAP, Burp Suite, and Fortify, which are instrumental in evaluating security aspects. The discussion encompasses various testing techniques, including Static Application Security Testing (SAST), which analyzes source code for vulnerabilities; Dynamic Application Security Testing (DAST), which assesses applications in real-time during runtime; and Interactive Application Security Testing (IAST), which combines elements of both SAST and DAST for comprehensive analysis. Furthermore, the paper underscores best practices for integrating automated security testing into the development lifecycle, addressing common challenges like false positives and the need for continuous updates, and exploring future trends and advancements in the field. By adopting these best practices and leveraging appropriate tools, developers can significantly bolster the security framework of mobile applications, thereby protecting user data from evolving and sophisticated threats.