Computer technology has advanced to a greater extent which leads to increase in cyber crime committed in recent years. The detection of cyber crime is not an easy task. From the literature, many researchers used various technologies to detect the cyber crime. In this paper, performance evaluation of various techniques are analysed to determine the cyber criminal. Firstly the detection of synthetic identity theft is checked. Secondly, the intrusion detection is checked using the honey pot security mechanism. Thirdly, the detection is further strengthened using the lie detection technique where the false speech of a person is determined. Finally by analysing the user profile, the detection of cyber crime is done using the clustering techniques. Synthetic Identity Theft method performs better than the remaining methods when considered for evaluation. Experimental results show that comparison of the final list of criminal users and the list of criminals determined, the number of genuine users eliminated are 41 out of 100 users, where as the number of genuine users eliminated from other methods are 16, 36 and 38 only. The number of attributes used is only 4, where as the number of attributes used for other methods are 5, 10 and 25. The percentage of performance metrics is also 37.1 and gradient is 31.1 which are better compared to other methods considered for performance analysis.
Recent growth in technology makes our life faster and easier. This development in technologies leads to enhance the traffic hazards. In this paper, Internet of Things based accident prevention and detection system is proposed to deduce accidents and save human life. The vehicle performance has been continuously monitored for safety purposes. This technique is annoying to maintain speed balance to avoid accident and provide safety to the driver. Hence, a novel approach is proposed to avoid accidents and save the victims while accidents occur. Sensors are exploited to give alarm 'ON' when distance between two vehicles is too short. If accident happens, then the camera is automatically turned on and captures the images around 180 degree angles. This emergency alert information including the location is transferred to nearest police station, ambulance service and relatives through GSM modem. The major component of the project includes a Arduino, motion sensor, touch sensors, relay and GSM modem.
Phishing is a novel kind of website/network attack which makes a deceitful attempt and influences the amenities or information security instead of stealing personal, financial and transactional data, etc. To preclude users or network from the phishing different techniques has been proposed and implemented.This paper, present the review of literature about the techniques offered by different researchers for exposing and avoiding from the phishing attack also discusses the advantages and limitation of the approaches.
We explain a hierarchy of Friedel sum rule like formulas that help us understand response of mesoscopic systems to applied electric and magnetic fields. The formulas can be derived fully quantum mechanically and then there is a mathematical way to take a semiclassical limit which make the formulas practically relevant. But a proper understanding of what exactly is the physical semiclassical limit is not known and require future work.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.