IJSRET » Blog Archives

Author Archives: Kajal Tripathi

Ethnomycological Investigation and Domestication of Wild Edible Mushrooms from the Department of Bamboutos (West Cameroon)

Uncategorized

Ethnomycological Investigation and Domestication of Wild Edible Mushrooms from the Department of Bamboutos (West Cameroon)/strong>
Authors:-Kamgoue Ngamaleu Yves Bertin, Sumer Singh Rathore, Sudhanshu Mishra, Donkeng Voumo Sylvain meinrad, Prashakha Jyotiprakash Shula, Nanda Djomou Giresse Ledoux, Ladoh Yemeda Christelle Flora, Essouman Ebouel Pyrus Flavien, Wamba Fotso Oscar, Asseng Charles Carnot

Abstract-Food security remains one of the major problems in the world. Wild edible mushrooms constitute an important source of food due to their nutritional and medical values, as well as a source of income for populations. This study aims to domesticate wild edible mushrooms that grow in the Bamboutos department. An ethnomycological survey was conducted among 154 people through direct and semi-structured interviews in the 04 Districts and in 15 villages of the Department. The macroscopic identification of the different species was carried out in situ using identification keys. The domestication test was carried out in the laboratory, the species inoculated on PDA medium and transplanted onto cereal seeds then onto corn cobs in order to obtain seeds. The seeds obtained were tested on corncob and sawdust substrates with the use of two additives, wheat bran and corn bran.The different substrates composed of slaked lime, urea, fungicide and water. This work reveals that the largest percentage of respondents is made up of men (65%). Knowledge related to the edibility of mushrooms is mainly transmitted by family members (68%). The wild edible mushrooms collected (04 species) belong to the Lyophyllaceae family and the Termitomyces genus: Termitomyces letestui, T. striatus, T. aurantiacus and T. brunneopileatus. The seed production process was a complete success. The substrate made up of corn stalks and wheat bran presented the best weights at harvest (221,66±3,36 g , 89,24±3,74 g and 93,58±7,13g). However, the carpophores obtained from the harvested and cultivated species were undifferentiated.

DOI: 10.61137/ijsret.vol.10.issue6.428

Published by:

Structural Design and Analysis of Wind Turbine

Uncategorized

Structural Design and Analysis of Wind Turbine/strong>
Authors:- Md Fakhor Uddin

Abstract- This thesis presents a comprehensive exploration into the design, modeling, and analysis of a wind turbine, employing a multidisciplinary approach to optimize its performance. The blade geometry was generated using QBlade software, a robust tool for blade design in wind turbine applications. The 3D model was then meticulously crafted using SolidWorks, integrating aerodynamic principles and structural considerations. The heart of this project lies in the utilization of SolidWorks Flow Simulation for a detailed analysis of the aerodynamic characteristics of the designed wind turbine. The simulation facilitated a thorough examination of airflow patterns, turbulence effects, and pressure distributions around the blades, offering valuable insights into the efficiency and energy-capturing potential of the turbine under various wind conditions.

DOI: 10.61137/ijsret.vol.10.issue6.378

Published by:

Development of Forensic Analysis Model for Investigating the Cybercrime Over TOR Network

Uncategorized

Development of Forensic Analysis Model for Investigating the Cybercrime Over TOR Network
Authors:-Atchaya. S, Bavana. D, Dharshini. V, Suganthi. D, Mythili. J, Greeshma K

Abstract-The proliferation of crimes using anonymised networks such as The Onion Router (TOR) has posed considerable hurdles for law enforcement and cybersecurity experts. Conventional forensic methods often have difficulties in tracking illegal activity carried out on TOR because of its encryption and anonymity attributes. This study aims to provide a forensic analysis model tailored for the investigation of criminality inside the TOR network. The model utilises sophisticated data analysis methods, using machine learning classifiers like as Naïve Bayes, Support Vector Machines (SVM), Random Forest, and K-Nearest Neighbours (KNN), to identify anomalous activity and discern attack patterns. Furthermore, it incorporates feature selection techniques to improve classification precision and minimise false positives. The proposed methodology utilises publicly accessible information and network traffic analysis to enhance the detection and investigation of criminality inside the TOR network, providing significant insights for security experts and law enforcement authorities.

DOI: 10.61137/ijsret.vol.10.issue6.653

Published by:

Automated Malware and Phishing Website Detection Using Cluster Ensemble Techniques for Cybercrime Prevention

Uncategorized

Automated Malware and Phishing Website Detection Using Cluster Ensemble Techniques for Cybercrime Prevention
Authors:-Nega. B, Rithika. K, Rithika. V, D. Suganthi, J. Mythili, Dr. N. Prabhu

Abstract-Cybercrime is a specialised field that use internet communication networks to enhance the identification of cyber offenders via cyber laws. Extensive study is being undertaken to provide appropriate legal methodologies for preventing and regulating cybercriminal activity. Malware and phishing detection have become as prominent subjects in the last decade because to the harm they inflict on internet users. The identification of phishing websites is a novel area in the discipline. Phishing websites are regarded as a significant threat for the exploitation of personal information for the benefit of cybercriminals. This research presents an automated classification system designed to identify malware and phishing websites by integrating several clustering techniques using a cluster ensemble approach. .

DOI: 10.61137/ijsret.vol.10.issue6.652

Published by:

Detection PF DDOS Attacks and Classification

Uncategorized

Detection of DDOS Attacks and Classification/strong>
Authors:-Gopi A G, Professor Dr. M Anand Kumar

Abstract-Distributed Denial of Service (DDoS) attacks are a significant threat to the stability and availability of network services, often resulting in financial and reputational damage to organizations. Detecting and mitigating these attacks is a complex task due to their large scale, diverse attack vectors, and evolving nature. This paper explores various methods for DDoS attack detection and classification, with a focus on leveraging machine learning and statistical techniques. The primary objective is to identify attack patterns in network traffic data and classify them in real-time to distinguish between legitimate and malicious activities. We review traditional methods such as signature-based detection and anomaly detection, alongside modern machine learning-based approaches, including supervised and unsupervised classification techniques. Machine learning algorithms, such as decision trees, support vector machines, and neural networks, are evaluated for their effectiveness in detecting various types of DDoS attacks, including volumetric, protocol, and application-layer attacks. Additionally, we discuss the challenges posed by high traffic volumes, the need for low-latency detection, and the impact of adversarial tactics on detection systems. Finally, the paper highlights the importance of developing robust, scalable, and adaptive classification models that can efficiently handle the evolving nature of DDoS attacks in dynamic network environments.

DOI: 10.61137/ijsret.vol.10.issue6.425

Published by:

Automated Temperature Control System by Using Atmega 328 Micro-Controller and DC Fan

Uncategorized

Automated Temperature Control System by Using Atmega 328 Micro-Controller and DC Fan/strong>
Authors:- Deepavarthini S, Subaranjani B S, Karpagam P

Abstract- The main aim of this project is to design the system by using the micro-controller (ATmega328) and temperature sensor for sensing the room temperature with a small DC fan. The system was designed to maintain the constant and comfortable room temperature by automatically activating the DC fan when the temperature exceeds the normally fixed temperature value and deactivates the DC fan when the temperature value falls below the fixed value. The temperature sensor used here will statically monitors the temperature value of the room. By using the reading data the controller makes the decision either to activate the DC fan or to deactivate the DC fan. This system is the energy saving way that activate the DC fan when only the temperature exceeds the fixed value else the fan will be deactivated. It is one of the best solution for maintaining indoor conditions, minimizing the manual interaction of the user and provide the overall comfort to the user.

DOI: 10.61137/ijsret.vol.10.issue6.377

Published by:

Budget-Beacon

Uncategorized

Budget-Beacon/strong>
Authors:- Assistant Professor Princy Shrivastava, Sejal Raghuwanshi, Supraja Krishnan

Abstract- The ‘Budget Beacon’ is an unadorned web application designed to make it easy for people to manage their finances and monitor their expenses. It provides users with the facilities to make financial decisions and strategies. Incorporating advanced features makes it easier for users to maintain their finances with precision and make more financial decision with precision. The web application gives users the ability to keep track of their daily expenses and break down their spending by category [1].It helps users keep their financial information digitally eliminating the traditional book keeping system.

DOI: 10.61137/ijsret.vol.10.issue6.376

Published by:

A 12 Switch Operated 19-Level Inverter to Reduce Distortion

Uncategorized

A 12 Switch Operated 19-Level Inverter to Reduce Distortion/strong>
Authors:-Mtech Scholar Umang Soni, Assistant Professor Shyam Kumar Barode, Assistant Professor Hari Mohan Soni, Assistant Professor Sachin Jain

Abstract-Purpose: The idea of a multilayer inverter originated from the development of inverters to more than two layers in order to lessen distortion from the basic sinusoidal waveform. One drawback of employing multiple level inverters is the installation of more switches, which raises system bulk and cost and reduces system dependability due to the increased component count. In order to address the issue of the system becoming bigger, more expensive, and less dependable with less distortion, this work provides a nineteen-level inverter (19-LI) with fewer switches than a symmetrical H-bridged nineteen-level inverter. The idea is developed using the MATLAB platform, then analysis is done to determine how valuable the final product is.

DOI: 10.61137/ijsret.vol.10.issue6.423

Published by:

Development of an Automated Penetration Testing Tool for Enhanced Cybersecurity

Uncategorized

Development of an Automated Penetration Testing Tool for Enhanced Cybersecurity/strong>
Authors:-Sanskriti Grover

Abstract-The continuous evolution of digitalization and the rapid growth of tools and technologies have led to a parallel rise in sophisticated cyberattacks. Attackers deploy advanced techniques to compromise critical systems, steal sensitive data, and disrupt operations. Traditional vulnerability detection and penetration testing methods, which rely heavily on manual processes and frameworks like Metasploit, are labour-intensive, time-consuming, and prone to human error. To address these challenges, this research presents the development of an Automated Penetration Testing Tool (APTT) to streamline cybersecurity assessments. Integrated with the Metasploit framework, APTT automates reconnaissance, vulnerability scanning, and exploitation, reducing time complexity and human error. Initial testing in diverse environments showed a 50% reduction in testing time and improved reliability of results, making it scalable and adaptable to various security needs.

DOI: 10.61137/ijsret.vol.10.issue6.427

Published by: