To see the other types of publications on this topic, follow the link: MFA Systems.

Journal articles on the topic 'MFA Systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'MFA Systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Karim, Nader Abdel, Hasan Kanaker, Waleed K. Abdulraheem, Majdi Ali Ghaith, Essam Alhroob, and Abdulla Mousa Falah Alali. "Choosing the right MFA method for online systems: A comparative analysis." International Journal of Data and Network Science 8, no. 1 (2024): 201–12. http://dx.doi.org/10.5267/j.ijdns.2023.10.003.

Full text
Abstract:
A robust authentication method is needed to protect online user accounts and data from cyber-attacks. Using only passwords is insufficient because they can be easily stolen or cracked. Multi-factor authentication (MFA) increases security by requiring two or more verification factors from the user before granting access to a resource such as an online account or an application. MFA is essential to a strong identity and access management (IAM) policy. This study evaluates and contrasts several MFA methods for online systems, including Microsoft Authenticator, FIDO2 security keys, SMS, voice calls, and biometrics. We assess these methods based on four criteria: security, usability, cost, and compatibility. We discover that only some MFA methods excel across the board. The best MFA method will depend on the organization's and users' specific needs and preferences. Each MFA method has benefits and drawbacks on its own. Based on our analysis, we do, however, make some general observations and recommendations, such as preferring FIDO2 security keys and certificate-based authentication for high-security scenarios, choosing Microsoft Authenticator and biometrics for high-usability scenarios, and avoiding SMS and voice calls for low-security and low-usability scenarios.
APA, Harvard, Vancouver, ISO, and other styles
2

Xu, Jianliang, Zhen Sui, Feng Xu, and Yulong Wang. "A Novel Model-Free Adaptive Proportional–Integral–Derivative Control Method for Speed-Tracking Systems of Electric Balanced Forklifts." Applied Sciences 13, no. 23 (2023): 12816. http://dx.doi.org/10.3390/app132312816.

Full text
Abstract:
Similar to many complex systems, the operation process of electric balanced forklifts has characteristics such as time-varying model parameters and nonlinearity. Establishing an accurate mathematical model becomes challenging, making it difficult to apply model-based control methods in engineering practice. Aiming at the longitudinal control system of electric forklifts containing external disturbances, this paper proposes an improved full-format dynamic linearization model-free adaptive PID control (iFFDL-MFA-PID) method. Firstly, the full-format dynamic linearization (FFDL) method is employed to transform the operating system of the electric balanced forklift into a virtual equivalent linear data model. Secondly, the nonlinear residual term and pseudo-gradient (PG) of the data model are estimated using the difference estimation algorithm and the optimal criterion function, respectively. Furthermore, in order to enhance the robustness of the system, the idea of intelligent PID (iPID) is introduced and the principle of equivalent feedback is utilized to derive the iFFDL-MFA-PID control scheme. The design process of this scheme only requires the use of the input and output data of the system, without relying on the mathematical model of the system. Finally, the iFFDL-MFA-PID method proposed in this paper is simulated and tested with the EFG-BC/320 counterbalanced forklift equipped in the Special Equipment Testing Center and compared with the model-free adaptive control method (FFDL-MFAC) and the PID control method. Simulation results show that the speed-tracking error of the electric forklift truck under the action of the iFFDL-MFA-PID algorithm is maintained within ±0.132 m/s throughout the process, achieving higher tracking accuracy and better robustness compared to the MFAC and PID methods.
APA, Harvard, Vancouver, ISO, and other styles
3

Che Mamat, Rufaizal, Azuin Ramli, Abd Hakim Abd Aziz, Muhammad Daniel Hakim Azhari, and Angelyna Jackson. "A Comparative Analysis of Fly Ash Enhanced Micropiles in Sustainable Foundation Systems." Smart and Green Materials 2, no. 1 (2025): 35–46. https://doi.org/10.70028/sgm.v2i1.35.

Full text
Abstract:
The construction industry is increasingly pressured to adopt sustainable practices that reduce environmental impact while ensuring structural integrity. This study investigates the comparative performance and sustainability of micro piles constructed with fly ash-enhanced grout mixtures (MFA) and conventional micro piles (MC). Fly ash, an industrial by-product is incorporated into the grout mixture to improve sustainability and enhance soil-structural stability. Comprehensive site investigations and numerical simulations were conducted to evaluate critical performance metrics, including Factor of Safety (FoS), deformation, settlement, and strain distribution, during pre- and post-construction phases. The results demonstrate that MFA systems exhibit superior performance, characterized by higher FoS, reduced deformation, and enhanced stability in settlement and strain profiles. These findings indicate that MFA delivers structural benefits and contributes to sustainability by utilizing waste materials. The study underscores the potential of MFA as a viable alternative to traditional micro pile systems, offering significant environmental and performance advantages. Further research is recommended to assess MFA systems' long-term performance and scalability in diverse geotechnical applications.
APA, Harvard, Vancouver, ISO, and other styles
4

Baseer, Shagufta. "Multi-Factor Authentication: A User Experience Study." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 06 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem36006.

Full text
Abstract:
Usability issues prevent multi-factor authentication (MFA) systems from being widely used, despite the fact that they are essential for improving security measures. This study explores the problems with MFA systems' usability and suggests possible fixes to enhance the user experience. The study emphasizes the value of good design while highlighting the efficacy of graphical password systems as a user-friendly substitute for conventional MFA techniques. The report also makes recommendations for future research directions, such as assessing resilience against complex assaults, improving support for mobile applications, and weighing the benefits and drawbacks of image-based authentication systems. Comprehensive user research and assessments can yield important insights to improve the effectiveness and usability of different MFA approaches. Additionally, a two-way image-based mobile device authentication system devices is introduced in the article, demonstrating improved login success rates and security threat resistance. In order to further enhance the authentication process, future development will focus on scalability, user input surveys, and bolstering system security. Keywords: Multi-Factor Authentication (MFA), User Experience (UX), Security, Usability, Graphical Passwords, Biometric Authentication, Mobile Devices, Image- Based Authentication, Psychological Aspects, Resilience,Scalability, Advanced Security Features
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Shuhua, and Ronghu Chi. "Model-free adaptive PID control for nonlinear discrete-time systems." Transactions of the Institute of Measurement and Control 42, no. 10 (2020): 1797–807. http://dx.doi.org/10.1177/0142331219896649.

Full text
Abstract:
This work explores a model-free adaptive PID (MFA-PID) control for nonlinear discrete-time systems with rigorous mathematical analysis under a data-driven framework. An improved compact form dynamic linearization (iCFDL) is proposed to transfer the original nonlinear system into an affined linear data model including a nonlinear residual term. Both a time-difference estimator and a gradient parameter estimator are designed to estimate the nonlinear residual uncertainties and the unknown parameters in the iCFDL model. Subsequently, a novel improved CFDL based MFA-PID (iCFDL-MFA-PID) control is proposed by incorporating these two estimators. The results are extended by the use of improved partial format dynamic linearization (iPFDL) and full format dynamic linearization (iFFDL). The theoretical results are shown using contraction mapping principle-based mathematical analysis, as well as simulations.
APA, Harvard, Vancouver, ISO, and other styles
6

Allafi, Randa, and Abdulbasit A. Darem. "Usability and security in online authentication systems." International Journal of ADVANCED AND APPLIED SCIENCES 12, no. 6 (2025): 1–12. https://doi.org/10.21833/ijaas.2025.06.001.

Full text
Abstract:
This study examines the balance between usability and security in electronic online services by comparing the effectiveness and user experience of different authentication methods, including password-only authentication, multi-factor authentication (MFA), and biometric authentication. A mixed-methods approach was used to collect both quantitative and qualitative data through usability tests, surveys, semi-structured interviews, and case studies. The findings reveal a clear trade-off between usability and security. While MFA offers stronger protection, it poses usability challenges, especially for novice users who face more errors and take longer to complete tasks. In contrast, password-only authentication was faster and easier, but was seen as inadequate for protecting sensitive data. Biometric authentication emerged as the most preferred option, receiving high satisfaction ratings from both novice and experienced users due to its balance between ease of use and security. These results emphasize the importance of designing user-centered security solutions, such as increasing the adoption of biometric methods and simplifying MFA to enhance the user experience without sacrificing security. The study offers practical recommendations for developers and security professionals to create more accessible and secure online services.
APA, Harvard, Vancouver, ISO, and other styles
7

Matey, Pritesh. "Securing Backup Systems: Addressing Vulnerabilities with Encryption, MFA, and RBAC." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem41173.

Full text
Abstract:
Backup systems are an essential part of data protection, ensuring that businesses can recover from data loss caused by accidental deletions, hardware failures, or cyberattacks. However, these systems are often overlooked when it comes to security, making them vulnerable to a range of risks. As organizations increasingly depend on backup data for continuity, addressing the vulnerabilities in these systems is critical. This study highlights common security threats like ransomware, insider attacks, and unauthorized access, and examines how advanced measures—such as encryption, Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC)—can mitigate these risks. Encryption secures backup data, MFA enhances authentication procedures, and RBAC restricts user access to minimize the impact of internal threats. The paper evaluates the effectiveness of these measures, discusses implementation challenges, and offers best practices for improving backup system security. The aim is to provide a roadmap for organizations to protect their backup infrastructure against evolving cyber threats. Keywords: Backup Systems, Cybersecurity, Encryption, MFA, RBAC, Insider Threats, Data Protection, Cloud Security, Risk Management
APA, Harvard, Vancouver, ISO, and other styles
8

Abdul Ghani, Latifah. "Use of a Socio-Ecological Framework and MFA to Assess the Resilience of Local Food Chain Systems." Proceedings of International Conference on Social Science, Political Science, and Humanities (ICoSPOLHUM) 3 (January 8, 2023): 00034. http://dx.doi.org/10.29103/icospolhum.v3i.151.

Full text
Abstract:
This paper proposes the basic procedures to examine the biodiversity of food chain systems using cross-disciplinary methods based on social, ecological, and material dimensions. The application of SES and MFA methods to track internal and external disturbances in the food chain highlights some of the flaws and gaps in this decision support system approach. In contrast to the single method, this SES-MFA overlapping approach contributes more information, including the literature on local food governance. Furthermore, the SES-MFA method would offer recommendations to researchers and policy practitioners to manage changes in the food chain system to attain uninterrupted biodiversity sustainability.
APA, Harvard, Vancouver, ISO, and other styles
9

Shinde1, Aditya S. "Multi-Factor Authentication: A Comprehensive Review." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50831.

Full text
Abstract:
Multi-factor authentication (MFA) has become a fundamental security measure in modern information systems, significantly reducing the risk of unauthorized access. This paper reviews current literature, standards, and best practices to evaluate the effectiveness, implementation challenges, and future directions of MFA. MFA works by requiring two or more distinct credentials—such as knowledge (passwords), possession (tokens), or inherence (biometrics)—making it far more resilient than single-factor methods. Despite its security benefits, MFA introduces usability challenges, additional costs, and integration issues, especially with legacy systems. Biometric-based authentication offers convenience but raises concerns regarding user privacy and the secure storage of immutable biometric data. Organizations often face administrative overhead and user resistance due to increased complexity. Integration strategies such as federated identity management are discussed for supporting older environments. The paper also explores emerging innovations, including adaptive authentication that adjusts based on contextual risk, password less approaches like passkeys, decentralized identity systems that empower users, and the influence of artificial intelligence and the Internet of Things on authentication mechanisms. The study concludes by identifying research opportunities in developing authentication systems that strike an optimal balance between security, usability, and privacy, and by calling for exploration into quantum-resistant authentication techniques. Key Words: Multi-factor authentication, cybersecurity, biometrics, passwordless, adaptive authentication, decentralized identity.
APA, Harvard, Vancouver, ISO, and other styles
10

AL-Khaleefa, Ahmad, Isa, AL-Saffar, Esa, and Malik. "MFA-OSELM Algorithm for WiFi-Based Indoor Positioning System." Information 10, no. 4 (2019): 146. http://dx.doi.org/10.3390/info10040146.

Full text
Abstract:
Indoor localization is a dynamic and exciting research area. WiFi has exhibited a tremendous capability for internal localization since it is extensively used and easily accessible. Facilitating the use of WiFi for this purpose requires fingerprint formation and the implementation of a learning algorithm with the aim of using the fingerprint to determine locations. The most difficult aspect of techniques based on fingerprints is the effect of dynamic environmental changes on fingerprint authentication. With the aim of dealing with this problem, many experts have adopted transfer-learning methods, even though in WiFi indoor localization the dynamic quality of the change in the fingerprint has some cyclic factors that necessitate the use of previous knowledge in various situations. Thus, this paper presents the maximum feature adaptive online sequential extreme learning machine (MFA-OSELM) technique, which uses previous knowledge to handle the cyclic dynamic factors that are brought about by the issue of mobility, which is present in internal environments. This research extends the earlier study of the feature adaptive online sequential extreme learning machine (FA-OSELM). The results of this research demonstrate that MFA-OSELM is superior to FA-OSELM given its capacity to preserve previous data when a person goes back to locations that he/she had visited earlier. Also, there is always a positive accuracy change when using MFA-OSELM, with the best change achieved being 27% (ranging from eight to 27% and six to 18% for the TampereU and UJIIndoorLoc datasets, respectively), which proves the efficiency of MFA-OSELM in restoring previous knowledge.
APA, Harvard, Vancouver, ISO, and other styles
11

Cahyanto, Iman, Husnul Madihah, Iwan Budiarso, Andy Sutrisno, and Tofan Hidayat. "EFFECTIVENESS OF MULTIFACTOR AUTHENTICATION TECHNOLOGY FOR PROTECTING STUDENT PRIVACY : A SYSTEMATIC LITERATURE REVIEW." Edum Journal 7, no. 2 (2025): 253–69. https://doi.org/10.31943/edumjournal.v7i2.286.

Full text
Abstract:
Student privacy is a major concern in the digital era, especially with the increasing use of educational technologies such as Learning Management Systems (LMS) and IoT devices. Traditional authentication systems are considered inadequate in the face of complex security threats. Therefore, this study evaluates the effectiveness of Multi-Factor Authentication (MFA) in protecting student privacy in an educational environment. This study uses a Systematic Literature Review (SLR) design based on 86 relevant articles selected from Scopus indexed journals (2020–2024). The articles were analyzed thematically using PRISMA Flow Diagram to identify patterns, trends, and gaps related to MFA implementation. The findings show that MFA can improve student privacy protection by reducing the risk of data leaks by up to 80%, lowering unauthorized access, and increasing user trust. Key technologies include biometrics, OTP, and blockchain, which have proven to be effective in improving security. However, MFA implementation faces obstacles such as cost, system complexity, and biometric data privacy concerns. This research makes an important contribution to academic literature and educational data security practices. Recommendations for further research include the exploration of behavior-based authentication methods, studies on user perception, and the implementation of MFA in educational environments with limited infrastructure. The practical implications include strengthening technology security policies in educational institutions and educating users to raise awareness of the importance of data privacy protection. Keywords: Student privacy, Multi-Factor Authentication (MFA), Educational Data Security, Biometric Technology
APA, Harvard, Vancouver, ISO, and other styles
12

Matey, Preeti. "Backup System Vulnerabilities: Assessing Risks and Implementing Encryption, MFA, and RBAC." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41890.

Full text
Abstract:
Backup systems are a critical component of modern data protection strategies, yet they are frequently targeted by cybercriminals and vulnerable to various security risks. As organizations increasingly rely on backup data for business continuity, it is essential to assess and mitigate the vulnerabilities inherent in these systems. This research examines the common security threats faced by backup systems, including ransomware, insider threats, and unauthorized access. It then explores how advanced security measures—such as encryption, Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) can effectively address these risks. Encryption ensures the confidentiality and integrity of backup data, while MFA provides an additional layer of access control to prevent unauthorized access. RBAC, on the other hand, helps organizations manage user permissions and minimize the risk of insider threats. This study evaluates the effectiveness of these security measures, identifies the challenges involved in their implementation, and offers best practices for securing backup systems. By emphasizing the need for robust security frameworks, this research aims to guide organizations in strengthening their backup infrastructure against evolving cyber threats. Keywords—Backup Systems, Cybersecurity, Data Protection, Encryption, Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC), Insider Threats, Data Integrity, Risk Assessment, Business Continuity, Cloud Backup Security.
APA, Harvard, Vancouver, ISO, and other styles
13

Matey, Preeti. "Strengthening Data Protection Strategies: Leveraging Advanced Encryption, Multi-Factor Authentication, and Disaster Recovery for Enterprise Resilience." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41337.

Full text
Abstract:
With the growing dependence on digital data, organizations face an increasing need for robust systems that protect data integrity and ensure swift recovery in case of failures or attacks. This paper examines the role of advanced encryption, multi-factor authentication (MFA), and disaster recovery planning as pivotal strategies in enhancing data protection across enterprise systems. By focusing on secure data storage, identity verification, and business continuity, these approaches work in tandem to create a resilient backup framework. Encryption protects data both at rest and in transit, ensuring confidentiality, while MFA introduces an extra layer of security against unauthorized access. Effective disaster recovery planning guarantees that organizations can quickly restore operations after a disruption. The study evaluates the integration of these strategies within modern enterprise architectures, identifies common challenges, and forecasts future innovations in backup and recovery systems. The paper aims to provide enterprises with actionable insights into building secure, scalable, and compliant data protection systems. Keywords: Data Protection, Multi-Factor Authentication (MFA), Encryption, Disaster Recovery, Business Continuity, Data Security, Enterprise Solutions, Cybersecurity, Compliance
APA, Harvard, Vancouver, ISO, and other styles
14

Researcher. "ADAPTIVE MULTI-FACTOR AUTHENTICATION SYSTEMS: A COMPREHENSIVE ANALYSIS OF MODERN SECURITY APPROACHES." International Journal of Computer Engineering and Technology (IJCET) 15, no. 6 (2024): 787–95. https://doi.org/10.5281/zenodo.14235976.

Full text
Abstract:
This comprehensive article examines the architecture, implementation, and effectiveness of Adaptive Multi-Factor Authentication (MFA) systems in modern cybersecurity environments. The article presents an in-depth analysis of core components, including behavioral biometrics, contextual risk assessment frameworks, and AI-driven authentication mechanisms. Through extensive examination of system implementation strategies and performance metrics, this research demonstrates how adaptive MFA systems dynamically adjust security requirements based on real-time risk assessments while maintaining optimal user experience. The investigation encompasses advanced authentication mechanisms, including device security integration, geospatial authentication, and continuous biometric verification protocols. The article reveals significant improvements in security effectiveness, with successful implementation cases showing dramatic reductions in account compromise attempts while maintaining high user satisfaction rates. Performance analysis indicates that organizations implementing these systems experience substantial decreases in security incidents while achieving exceptional system reliability. The article also addresses critical challenges in privacy considerations, scalability issues, and emerging technology integration, providing valuable insights into future research directions in the field of adaptive authentication. This article contributes to the growing body of knowledge in cybersecurity by offering a comprehensive framework for understanding and implementing adaptive MFA systems in contemporary digital environments.
APA, Harvard, Vancouver, ISO, and other styles
15

Puspita Ayu, Yolanda Dewi, Daeng Rahmatullah, and Istiyo Winarno. "Koordinasi Adaptif DOCR Pada Sistem Transmisi Loop Multi Generator Menggunakan Modified Firefly Algorithm-Artificial Neural Network." Jurnal Ilmiah Telsinas Elektro, Sipil dan Teknik Informasi 4, no. 1 (2022): 31–40. http://dx.doi.org/10.38043/telsinas.v4i1.2093.

Full text
Abstract:
Protection system is a very important component in the electric power distribution system. With good reliability, the distribution of electrical power will be better, one of which is by minimizing disruption to the system quickly, precisely and accurately. Components used in protection systems are directional overcurrent relays (DOCR). In this study proposed optimal and adaptive protection coordination using the Modified Firefly Algorithm-Artificial Neural Network (MFA-ANN) tested on the IEEE 9 real bus loop system with 4 generation combinations. Optimization using MFA will get the Time Delay Setting (TDS) and Ipickup (lowset) values. The ANN used is Backpropagation Lavenberg Marquardt (BPLM) After the BPLM learning process, we will get the weight and bias values of the training results and later as a reference value to get the value of TDS and Ipickup relay. The process will produce relay settings automatically based on the results of optimization and MFA-ANN training which are then simulated on the IEEE 9 bus loop system. The results achieved by MFA-ANN are suitable methods for modeling optimal and adaptive relay coordination systems. ANN training with the BPLM algorithm produces the smallest MSE value of 5.9308xE-10.
APA, Harvard, Vancouver, ISO, and other styles
16

Cheng, G. S. "Model-free adaptive (MFA) control." Computing and Control Engineering 15, no. 3 (2004): 28–33. http://dx.doi.org/10.1049/cce:20040305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Song, Bingjie, Guy Robinson, and Douglas Bardsley. "Measuring Multifunctional Agricultural Landscapes." Land 9, no. 8 (2020): 260. http://dx.doi.org/10.3390/land9080260.

Full text
Abstract:
Multifunctional agriculture (MFA) has attracted increased attention from academics and policymakers in recent years. Academic researchers have utilised various approaches to assess and measure the multifunctionality of agriculture and rural landscapes. This paper outlines the nature of MFA and key supporting policies, before reviewing the applied research approaches, drawing primarily from the European Union and China where specific policies on MFA have been implemented to support rural development and promote sustainable rural communities. Four distinct types of valuation of modern MFA are recognised: economic, biophysical, socio-cultural, and holistic. Following a search of both the recent and older MFA literature, evaluations of the strengths and weaknesses of quantitative, qualitative, and mixed methods applications are provided using examples from a range of recent studies. The review illustrates the diversity of approaches to measure MFA. While noting that many studies operate at a landscape scale, the challenge remains that the lack of commonality in the research approaches applied means it is difficult to provide effective comparisons between studies or to compare findings. A future research agenda will need to emphasise the need for more consideration of the roles of MFA research to support decision-makers, especially policy makers, but also farmers who largely make decisions for individual farms but, if considered collectively, can transform production systems at a landscape scale.
APA, Harvard, Vancouver, ISO, and other styles
18

Arutyunov, A. G., T. I. Batluk, R. A. Bashkinov, and M. A. Trubnikova. "Multifocal atherosclerosis: focus on the prevention of ischemic events." Russian Journal of Cardiology 26, no. 12 (2021): 4808. http://dx.doi.org/10.15829/1560-4071-2021-4808.

Full text
Abstract:
In patients with atherosclerotic lesions of two or more systems or multifocal atherosclerosis (MFA), the risks of ischemic events are extremely high. MFA leads not only to cardiovascular outcomes, but also to a decrease in the patient’s quality of life, life expectancy, and in most cases to disability. The prevalence of this pathology and the importance of preventing adverse outcomes are often underestimated. This literature review examines the problem of MFA in the context of key studies on the prevalence, course of multivessel disease and the reduction of the risk of cardiovascular events in this group of patients, with an emphasis on antiplatelet and anticoagulant therapy.
APA, Harvard, Vancouver, ISO, and other styles
19

Desai, Trunil S., and Shireesh Srivastava. "FluxPyt: a Python-based free and open-source software for 13C-metabolic flux analyses." PeerJ 6 (April 27, 2018): e4716. http://dx.doi.org/10.7717/peerj.4716.

Full text
Abstract:
13C-Metabolic flux analysis (MFA) is a powerful approach to estimate intracellular reaction rates which could be used in strain analysis and design. Processing and analysis of labeling data for calculation of fluxes and associated statistics is an essential part of MFA. However, various software currently available for data analysis employ proprietary platforms and thus limit accessibility. We developed FluxPyt, a Python-based truly open-source software package for conducting stationary 13C-MFA data analysis. The software is based on the efficient elementary metabolite unit framework. The standard deviations in the calculated fluxes are estimated using the Monte-Carlo analysis. FluxPyt also automatically creates flux maps based on a template for visualization of the MFA results. The flux distributions calculated by FluxPyt for two separate models: a small tricarboxylic acid cycle model and a larger Corynebacterium glutamicum model, were found to be in good agreement with those calculated by a previously published software. FluxPyt was tested in Microsoft™ Windows 7 and 10, as well as in Linux Mint 18.2. The availability of a free and open 13C-MFA software that works in various operating systems will enable more researchers to perform 13C-MFA and to further modify and develop the package.
APA, Harvard, Vancouver, ISO, and other styles
20

Tidke, Sonali. "Fortifying Data Resilience: A Comprehensive Approach to Securing Backup Systems." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem41174.

Full text
Abstract:
Backup systems are the backbone of data recovery and business continuity strategies, yet they remain vulnerable to various security threats. With increasing reliance on backups for data protection, organizations must prioritize securing these systems against cyberattacks, insider threats, and unauthorized access. This paper explores the core vulnerabilities in backup systems, such as ransomware and internal misuse, and evaluates how advanced security measures—encryption, Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC)—can be deployed to mitigate these risks. These strategies are essential in maintaining the integrity, confidentiality, and accessibility of backup data. The study examines the strengths, challenges, and best practices for implementing these measures, ultimately providing a roadmap for building a more resilient backup infrastructure. Keywords: Backup Systems, Cybersecurity, Encryption, Multi-Factor Authentication (MFA), Role-Based Access Control (RBAC), Insider Threats, Data Integrity, Business Continuity, Cloud Security.
APA, Harvard, Vancouver, ISO, and other styles
21

AGYAPONG, KWAKYE, and ISAAC BOAKYE. "EVALUATING THE EFFECTIVENESS OF MULTI-FACTOR AUTHENTICATION IN MITIGATING CYBER THREATS IN DIGITAL BANKING PLATFORM IN GHANA." International Journal of Social Sciences and Management Review 08, no. 01 (2025): 91–104. https://doi.org/10.37602/ijssmr.2025.8106.

Full text
Abstract:
With the rapid growth of digital banking platforms in Ghana, cyber threats have become a major concern for financial institutions and consumers alike. Multi-Factor Authentication (MFA) has emerged as a critical security measure to protect sensitive financial data and prevent unauthorized access to digital banking systems. This study aims to evaluate the effectiveness of MFA in mitigating cyber threats within the Ghanaian digital banking ecosystem. The research investigates how various MFA methods, including SMS-based one-time passwords (OTPs), biometric verification, and hardware tokens, contribute to enhancing the security posture of banks operating in Ghana. Through a combination of quantitative data analysis and expert interviews, the study examines the extent to which MFA reduces risks such as phishing attacks, account takeovers, and unauthorized transactions. It also explores the user experience and adoption challenges associated with MFA, including its impact on customer convenience and trust. By analysing real-world cyber incidents in Ghanaian banks, the study identifies gaps in current MFA implementations and suggests areas for improvement. The findings reveal that while MFA significantly lowers the risk of cyberattacks, factors such as user education, infrastructure reliability, and the sophistication of cybercriminals impact its overall effectiveness. The study concludes with policy recommendations for financial institutions, suggesting a more layered approach to security, the integration of advanced authentication techniques, and the importance of fostering user awareness to combat evolving cyber threats in Ghana's digital banking sector.
APA, Harvard, Vancouver, ISO, and other styles
22

Westrell, T., O. Bergstedt, G. Heinicke, and E. Kärrman. "A systems analysis comparing drinking water systems - central physical-chemical treatment and local membrane filtration." Water Supply 2, no. 2 (2002): 11–18. http://dx.doi.org/10.2166/ws.2002.0040.

Full text
Abstract:
This paper presents a first attempt at an integrated systems analysis of drinking water systems using Microbiological Risk Assessment (MRA) and Material Flow Analysis (MFA) with focus on the comparison of central physical-chemical treatment (conventional system) and local membrane filtration. The MFA shows that energy use is the most significant environmental impact of the three studied drinking water systems, but there are no considerable differences in energy use comparing central physical-chemical treatment and local membrane filtration. According to the MRA, the conventional system might not reduce the microbial risks sufficiently, but such a reduction can not confidently be achieved in a one-step ultrafiltration system either, since membrane filter integrity can hardly be guaranteed over the service life of the equipment. A quite costly two-step membrane filtration system, where water for all household purposes passes microfiltration and further reverse osmosis for drinking and cooking, seems to fulfil this criterion. On the other hand, this system does not reduce the microbial risks from ingestion of water from showers compared with the one-step ultrafiltration alternative. In order to achieve drinking water systems with sufficient microbial barriers and with reasonable costs for operation, a promising solution seems to be a combination of one-step membrane filtration and other methods e.g. biological treatment.
APA, Harvard, Vancouver, ISO, and other styles
23

Bezzateev, Sergey, Vadim Davydov, and Aleksandr Ometov. "On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication." Cryptography 4, no. 4 (2020): 34. http://dx.doi.org/10.3390/cryptography4040034.

Full text
Abstract:
Security and access control aspects are becoming more and more essential to consider during the design of various systems and the tremendous growth of digitization. One of the related key building blocks in this regard is, essentially, the authentication process. Conventional schemes based on one or two authenticating factors can no longer provide the required levels of flexibility and pro-activity of the access procedures, thus, the concept of threshold-based multi-factor authentication (MFA) was introduced, in which some of the factors may be missing, but the access can still be granted. In turn, secret sharing is a crucial component of the MFA systems, with Shamir’s schema being the most widely known one historically and based on Lagrange interpolation polynomial. Interestingly, the older Newtonian approach to the same problem is almost left without attention. At the same time, it means that the coefficients of the existing secret polynomial do not need to be re-calculated while adding a new factor. Therefore, this paper investigates this known property of Newton’s interpolation formula, illustrating that, in specific MFA cases, the whole system may become more flexible and scalable, which is essential for future authentication systems.
APA, Harvard, Vancouver, ISO, and other styles
24

Mahmud, Md Rasel, Ahmed F. Abdou, and Hemanshu Pota. "Stability Analysis of Grid-Connected Photovoltaic Systems with Dynamic Phasor Model." Electronics 8, no. 7 (2019): 747. http://dx.doi.org/10.3390/electronics8070747.

Full text
Abstract:
The typical layout of power systems is experiencing significant change, due to the high penetration of renewable energy sources (RESs). The ongoing evaluation of power systems is expecting more detailed and accurate mathematical modeling approaches for RESs which are dominated by power electronics. Although modeling techniques based on state–space averaging (SSA) have traditionally been used to mathematically represent the dynamics of power systems, the performance of such a model-based system degrades under high switching frequency. The multi-frequency averaging (MFA)-based higher-index dynamic phasor modeling tool is proposed in this paper, which is entirely new and can provide better estimations of dynamics. Dynamic stability analysis is presented in this paper for the MFA-based higher-index dynamical model of single-stage single-phase (SSSP) grid-connected photovoltaic (PV) systems under different switching frequencies.
APA, Harvard, Vancouver, ISO, and other styles
25

Bai, Liang, Yun-Wen Feng, Ning Li, and Xiao-Feng Xue. "Robust Model-Free Adaptive Iterative Learning Control for Vibration Suppression Based on Evidential Reasoning." Micromachines 10, no. 3 (2019): 196. http://dx.doi.org/10.3390/mi10030196.

Full text
Abstract:
Through combining P-type iterative learning (IL) control, model-free adaptive (MFA)control and sliding mode (SM) control, a robust model-free adaptive iterative learning (MFA-IL)control approach is presented for the active vibration control of piezoelectric smart structures.Considering the uncertainty of the interaction among actuators in the learning control process,MFA control is adopted to adaptively adjust the learning gain of the P-type IL control in order toimprove the convergence speed of feedback gain. In order to enhance the robustness of the systemand achieve fast response for error tracking, the SM control is integrated with the MFA control todesign the appropriate learning gain. Real-time feedback gains which are extracted fromcontrollers construct the basic probability functions (BPFs). The evidence theory is adopted to thedesign and experimental investigations on a piezoelectric smart cantilever plate are performed tovalidate the proposed control algorithm. The results demonstrate that the robust MFA-IL controlpresents a faster learning speed, higher robustness and better control performance in vibrationsuppression when compared with the P-type IL control.
APA, Harvard, Vancouver, ISO, and other styles
26

Akula, Kishore Kumar, Maura Marcucci, Romain Jouffroy, et al. "Medical Image Classification using a Many to Many Relation, Multilayered Fuzzy Systems and AI." WSEAS TRANSACTIONS ON COMPUTERS 23 (July 3, 2024): 173–86. http://dx.doi.org/10.37394/23205.2024.23.16.

Full text
Abstract:
One of the research gaps in the medical sciences is the study of orphan diseases or rare diseases, due to limited data availability of rare diseases. Our previous study addressed this successfully by developing an Artificial Intelligence (AI)-based medical image classification method using a multilayer fuzzy approach (MFA), for detecting and classifying image abnormalities for large and very small datasets. A fuzzy system is an AI system used to handle imprecise data. There are more than three types of fuzziness in any image data set: 1) due to a projection of a 3D object on a 2D surface, 2) due to the digitalization of the scan, and 3) conversion of the digital image to grayscale, and more. Thus, this was referred to in the previous study as a multilayer fuzzy system, since fuzziness arises from multiple sources. The method used in MFA involves comparing normal images containing abnormalities with the same kind of image without abnormalities, yielding a similarity measure percentage that, when subtracted from a hundred, reveals the abnormality. However, relying on a single standard image in the MFA reduces efficiency, since images vary in contrast, lighting, and patient demographics, impacting similarity percentages. To mitigate this, the current study focused on developing a more robust medical image classification method than MFA, using a many-to-many relation and a multilayer fuzzy approach (MCM) that employs multiple diverse standard images to compare with the abnormal image. For each abnormal image, the average similarity was calculated across multiple normal images, addressing issues encountered with MFA, and enhancing versatility. In this study, an AI-based method of image analysis automation that utilizes fuzzy systems was applied to a cancer data set for the first time. MCM proved to be highly efficient in detecting the abnormality in all types of images and sample sizes and surpassed the gold standard, the convolutional neural network (CNN), in detecting the abnormality in images from a very small data set. Moreover, MCM detects and classifies abnormality without any training, validation, or testing steps for large and small data sets. Hence, MCM may be used to address one of the research gaps in medicine, which detects, quantifies, and classifies images related to rare diseases with small data sets. This has the potential to assist a physician with early detection, diagnosis, monitoring, and treatment planning of several diseases, especially rare diseases.
APA, Harvard, Vancouver, ISO, and other styles
27

Goel, Narendra S., and Richard L. Thompson. "Movable Finite Automata (MFA) models for biological systems II: Protein biosynthesis." Journal of Theoretical Biology 134, no. 1 (1988): 9–49. http://dx.doi.org/10.1016/s0022-5193(88)80300-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Heideman, Geert, Jacques W. M. Noordermeer, Rabin N. Datta, and Ben van Baarle. "Multifunctional Additives as Zinc-Free Curatives for Sulfur Vulcanization." Rubber Chemistry and Technology 79, no. 4 (2006): 561–88. http://dx.doi.org/10.5254/1.3547952.

Full text
Abstract:
Abstract Concern about the release of eco-toxic zinc species from rubbers into the environment leads to an increasing interest in potential substitutes. This investigation reports on the application of Multifunctional Additives, amines complexed with fatty acids, for sulfur vulcanization of rubbers. Good physical properties can be obtained in s-SBR compounds using the MFA/S cure system, albeit at the cost of a shortened scorch time as compared to a ZnO/stearic acid system. Inclusion of ZnO lengthens the scorch time, though it reduces the state of cure and ultimate properties. The amount of ZnO used in the MFA-formulations is considerably lower than in the conventional systems. The introduction of CaO and MgO leads to an improvement in the state of cure and physical properties. Amines play a vital role in the vulcanization process, hence various amine-complexes have been synthesized and investigated as zinc-free curatives in s-SBR compounds. It is observed that the scorch time is related to the basicity of the amines. The results of Model Compound Vulcanization studies with MFAs reveal a fast decomposition of the accelerator and some differences in the distribution of the crosslinked products. The conclusion must be drawn, that the chemistry involved in the MFA-systems is fundamentally different from the conventional vulcanization systems.
APA, Harvard, Vancouver, ISO, and other styles
29

Rebecca Ling Ze Siew, Brendan Chan Kah Le, Lee Kai Yue, Nuri Nazirah Binti Ismail, Xavier Liong Zhi Hao, and Muhammad Faisal. "Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain Technology." International Journal of Computer Technology and Science 1, no. 3 (2024): 87–105. http://dx.doi.org/10.62951/ijcts.v1i3.29.

Full text
Abstract:
The rapid advancement of Industrial Internet of Things (IIoT) technology necessitates robust authentication solutions to ensure security, scalability, and efficiency. This project, titled "Enhancing Security in Industrial IoT: Authentication Solutions Leveraging Blockchain," examines various blockchain-based authentication methods for IIoT and identifies their strengths and weaknesses. Despite the enhanced security and decentralized nature of blockchain, issues such as scalability, high latency, and computational load persist. To address these challenges, we propose the integration of Multi-Factor Authentication (MFA) as a supplementary solution. MFA can distribute the authentication load, enhance flexibility and security, and reduce latency by utilizing quick-to-verify factors. Moreover, MFA ensures high availability and scalable storage and processing through cloud services, seamlessly integrating with existing systems to provide a superior user experience. This comprehensive approach not only mitigates the inherent limitations of blockchain technology in IIoT but also reinforces the overall security framework, ensuring resilient and efficient authentication mechanisms. The results demonstrate significant improvements in system performance and user satisfaction, establishing MFA as a viable enhancement to blockchain-based IIoT security solutions.
APA, Harvard, Vancouver, ISO, and other styles
30

Rivera, JJD, A. Muhammad, and WC Song. "Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication." Ieee Open Journal Of The Communications Society 5 (January 1, 2024): 2792–814. https://doi.org/10.1109/OJCOMS.2024.3391728.

Full text
Abstract:
As network systems advance and become more sophisticated, the associated security challenges grow more complex. The zero trust model emerges as a new paradigm to address this, significantly emphasizing robust and continuous identity verification. Multi-factor authentication (MFA) methods have become crucial for enhancing authentication security within this framework. Additionally, the integration of blockchain technology is increasingly recognized for its potential to strengthen identity trustworthiness further, complementing the zero trust approach by providing a more secure and transparent identity verification process. However, privacy concerns remain, especially in public blockchain environments where personal data is vulnerable to inadvertent exposure. Also, using centralized servers for authentication, even in systems integrated with blockchain, presents the risk of creating single points of failure. This paper introduces a privacy-preserving MFA system that harnesses the decentralized capabilities of blockchain technology to enable a Distributed Authentication Mechanism (DAM) as a network of authenticators for enhancing the reliability of the authentication process. This system utilizes blockchain-based Zero-Knowledge Proofs (ZKP) as a privacy mechanism to prove the knowledge of a One-Time Password (OTP). This approach not only ensures the authenticity of the proof authenticity but also confirms the identity of the prover. In the final stage of the MFA process, non-transferable, non-fungible tokens (NFTs) are employed as authentication tokens for identity verification. Our experimental results and comparative security analyses suggest a relevant contribution to secure, private, and dependable MFA framework research. © 2020 IEEE.
APA, Harvard, Vancouver, ISO, and other styles
31

Madhavi, Dasari, V. S. Bharath Dr., Palati Dr.Madhu, and M. Ganapathi Dr.D. "UPQC BASED POWER QUALITY IMPROVEMENT OF SOLAR PHOTOVOLTAIC SYSTEMS USING ANFIS AND MFA." Journal of NeuroQuantology 20, no. 14 (2022): 505–20. https://doi.org/10.5281/zenodo.7497176.

Full text
Abstract:
The ability of energy to reach consumer devices is determined by the quality of the power that was used to create it. Using a Unified Power Quality Conditioner (UPQC) improves the power quality on feeders in distribution system. The Unified Power Quality Conditioner is the most effective customized power equipment available in the market. An UPQC system with a three-phase bus that is fed by PV is modeled and tested. Sagging is caused by heavy loads, whereas swelling is caused by light loads. Solar arrays fed by UPQC are becoming increasingly popular as a means of reducing the severity of these power quality issues. The ANFIS–PSO basedMPPT method has no extra sensor requirement for measurement of irradiance and temperature variables. The employed methodology delivers remarkable driving control to enhance PV potential extraction.The Classical maximum power point tracking (MPPT) techniques, developed for uniform solar radiation on PV arrays such as P&O algorithm sometimes, are unable to discriminate between local and global maximum power points. Therefore, this research under partial shading condition (PSC) is aimed for enhancing the efficiency of the PV system by using modernistic techniques such as ANFIS-Particle Swarm Optimization (ANFIS-PSO), and ANFIS BASED Modified Firefly Algorithm (ANFIS- MFA). The main function of each algorithm is to find the optimal duty cycle for the DC-DC converter in order to increase the output power and efficiency. The P&O algorithm shows larger convergence time with high oscillation as compared with the other three algorithms which showed success in finding and tracking the GMPP, especially the last algorithm (MFA), as it was characterized by its speed, efficiency and convergence in finding the GMPP compared to the previous algorithms. The ripple in MFA in steady-state conditions is lower than P&O, PSO, and FA methods.
APA, Harvard, Vancouver, ISO, and other styles
32

Matey, Preeti. "Combining Disaster Recovery, Backup Security, and Compliance: Best Practices for Encryption, RBAC, and MFA." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 02 (2025): 1–9. https://doi.org/10.55041/ijsrem41891.

Full text
Abstract:
In the current digital age, ensuring the security of disaster recovery (DR) systems and backup data has become a critical concern for organizations focused on safeguarding their assets and maintaining seamless business operations. This paper explores the integration of essential security practices—encryption, Role-Based Access Control (RBAC), and Multi-Factor Authentication (MFA)—into disaster recovery and backup security frameworks. These technologies work synergistically to enhance data protection, mitigate unauthorized access risks, and ensure regulatory compliance. Encryption protects data both during transmission and storage, RBAC limits access based on user roles, and MFA adds an additional layer of defense by requiring multiple forms of verification before granting access. By leveraging these strategies, organizations can build a more resilient, secure, and compliant disaster recovery plan that meets evolving cyber threats and regulatory standards such as GDPR, HIPAA, and PCI-DSS. This study also examines the challenges organizations face in implementing these security measures and offers actionable insights to help establish a robust backup and recovery strategy. Ultimately, the research serves as a comprehensive guide for businesses seeking to strengthen their disaster recovery systems through encryption, access controls, and authentication mechanisms. Keywords: Disaster Recovery, Backup Security, Encryption, Role-Based Access Control (RBAC), Multi-Factor Authentication (MFA), Compliance, Cybersecurity, Business Continuity, Data Protection, GDPR, HIPAA, PCI-DSS, Regulatory Compliance, Security Best Practices, Backup Systems, Data Integrity, IT Security.
APA, Harvard, Vancouver, ISO, and other styles
33

Manoj, Greeshma. "Export performance of Indian Textile Industry in the Post Multi Fibre Agreement Regime." Artha - Journal of Social Sciences 13, no. 4 (2014): 63. http://dx.doi.org/10.12724/ajss.31.5.

Full text
Abstract:
The Multi Fibre Agreement (MFA) and the quota system which governed the international trade in textiles and clothing came to an end on 1st January, 2005. The quota systems were more restrictive against cotton based fibres, which dominate India’s textile exports. Since India has a natural comparative advantage in cotton and cotton based fibres, abolition of MFA was expected to benefit India’s cotton industry as well as cotton based textiles and clothing sectors. This paper analyses the export performance of Indian textile industry in the post quota regime in terms of different sub sectors of Indian textiles during the period from 1992 to 2012.The entire period of the study is divided into Pre MFA (1992-2004) and Post MFA (2005-2012). Export performance has been examined in terms of annual growth rate and Compound Annual Growth Rate for the period from 1992-2012. The study finds that the textile exports have registered a strong growth rate in the post quota period (2005-2006), increasing from 2.69% in 2004-2005 to 23.14% in 2005-2006. A comparison of the different sectors of the textile export shows that all the sectors recorded an increase in the export values at different phases of the quota removal. If we compare the pre MFA growth (III Phase) and Post MFA growth (IV Phase), there has been a remarkable improvement in the export performance of all the sub sectors. Biggest gainer in the post MFA period is manmade textiles followed by cotton textiles and readymade garments. But India was not able to continue the same momentum in the succeeding years. This clearly indicates that Indian textile industry is facing so many challenges in the post quota regime. Thus, it is imperative to improve the competitiveness of our exports through policy changes, new investment and efficient supply chain management. Keywords: Textiles and clothing, Quota removal, MFA, Export performance, Trend analysis.
APA, Harvard, Vancouver, ISO, and other styles
34

Mali, Saroj. "Assessing the Effectiveness of Multi-Factor Authentication in Cloud-Based Big Data Environments." Internet of Things and Cloud Computing 12, no. 2 (2024): 17–27. http://dx.doi.org/10.11648/j.iotcc.20241202.11.

Full text
Abstract:
There is increasing popularity of Big data and cloud computing in recent years, and it is offering both individuals and businesses a number of advantages. But as data volume and complexity rise, data security and privacy have become a serious problem. In order to safeguard sensitive data stored in the cloud from sophisticated cyberattacks, it is crucial to have strong security measures in place. Although multi-factor authentication (MFA) has gained popularity as a security mechanism, Because of the lack of in depth analysis of its efficacy in large data systems based in the cloud is not fully known. In order to determine if MFA is effective in large data environments based on the cloud, this study will examine how well it can defend against different types of cyberattacks. The study will analyze the benefits and drawbacks of MFA in this situation as well as the trade-offs that must be made between security and usability when putting this security measure into place. This study aims to evaluate the efficacy of MFA in cloud-based big data environments in order to offer insightful recommendations for the most effective ways to secure sensitive data in the cloud.
APA, Harvard, Vancouver, ISO, and other styles
35

Okeke, Remigius Obinna, and Stanislaus Okechukwu Orimadike. "Enhanced Cloud Computing Security Using Application-Based Multi-Factor Authentication (MFA) for Communication Systems." European Journal of Electrical Engineering and Computer Science 8, no. 2 (2024): 1–8. http://dx.doi.org/10.24018/ejece.2024.8.2.593.

Full text
Abstract:
The objective of this study is to create an advanced cloud computing security system that addresses the security vulnerabilities inherent in existing authentication processes in communication systems. Specifically, the study developed an application-based multi-layer and multi-factor authentication (MFA) program that enhances cloud security measures. The system presented an improved approach to cloud computing security through the implementation of application-based multi-factor authentication (MFA). By leveraging encryption techniques, the system guarantees secure access based on user profiles. These profiles consist of valid usernames, passwords, and token numbers generated by the application. In addition, the system enhances security by integrating the Time-based One-Time Password (TOTP) algorithm (IETF RFC 6238) with location checks, augmenting the overall protection measures. A thorough testing procedure was carried out on the system, with a specific focus on a test web application hosted on the cloud server. The result validated the efficacy of all three authentication factors integrated within the application.
APA, Harvard, Vancouver, ISO, and other styles
36

Aravind Ayyagiri, Shalu Jain, and Anshika Aggarwal. "Innovations in Multi-Factor Authentication: Exploring OAuth for Enhanced Security." Innovative Research Thoughts 9, no. 4 (2023): 254–67. http://dx.doi.org/10.36676/irt.v9.i4.1461.

Full text
Abstract:
In an era where digital security breaches are becoming increasingly sophisticated, multi-factor authentication (MFA) has emerged as a critical defense mechanism to protect sensitive data and systems. OAuth (Open Authorization) has gained prominence as an advanced protocol in the landscape of MFA, offering enhanced security through its token-based authorization model. This paper explores innovations in multi-factor authentication with a particular focus on OAuth, analyzing its effectiveness, implementation challenges, and the benefits it brings to modern security frameworks. OAuth operates as a protocol that provides secure delegated access to applications without exposing user credentials. Traditionally, MFA combines multiple forms of authentication, such as passwords, biometric data, and hardware tokens, to verify user identity. OAuth enhances this process by enabling secure, token-based access, which minimizes the risks associated with credential theft and phishing attacks. By allowing users to authorize third-party applications to access their data on their behalf, OAuth reduces the need for users to share their passwords with multiple services, thereby mitigating potential security threats. The adoption of OAuth in MFA strategies introduces several innovations. Firstly, it supports the use of access tokens that are short-lived and specific to particular resources or actions. This temporary nature of tokens limits the impact of a potential breach, as compromised tokens have a limited lifespan. Secondly, OAuth incorporates scopes, which define the exact permissions granted to a third party. This granular control over access rights ensures that applications only receive the minimum level of access necessary, further reducing security risks. Implementing OAuth for MFA, however, is not without its challenges. One major issue is the complexity of integrating OAuth with existing authentication systems. Organizations must ensure that OAuth tokens are securely generated, transmitted, and validated to prevent unauthorized access. Additionally, the secure management of refresh tokens, which are used to obtain new access tokens, is crucial to maintaining the integrity of the authentication process. The need for rigorous token management practices and robust security measures is essential to prevent potential vulnerabilities. Despite these challenges, the benefits of incorporating OAuth into MFA strategies are significant. OAuth enhances user experience by allowing single sign-on (SSO) capabilities, reducing the need for users to remember multiple passwords. This streamlined approach not only improves user convenience but also strengthens security by minimizing password-related vulnerabilities. Moreover, OAuth's support for various authentication factors, including biometric verification and hardware tokens, allows organizations to implement a comprehensive MFA strategy that aligns with their security requirements. The evolution of OAuth in MFA represents a significant advancement in the field of digital security. By leveraging OAuth’s token-based model, organizations can enhance their authentication processes, reduce the risk of credential-related attacks, and provide a more secure user experience. As cybersecurity threats continue to evolve, the integration of OAuth into MFA strategies will play a pivotal role in safeguarding sensitive information and ensuring the integrity of digital interactions.
APA, Harvard, Vancouver, ISO, and other styles
37

Terekhanova, T. A., B. Helm, J. Traenckner, and P. Krebs. "IWRM decision support with material flow analysis: consideration of urban system input." Water Science and Technology 66, no. 11 (2012): 2432–38. http://dx.doi.org/10.2166/wst.2012.470.

Full text
Abstract:
A review of material flow analysis (MFA) tools, comparison of case studies and analysis of approximately 20 MFA tools (static, semi-empirical models) are performed. The evaluation of the quantification procedures revealed several deficits in the approaches. The following principal complications for a reliable quantification of inputs from the urban water system are identified: (1) frequently insufficient data for urban system model validation (e.g. combined sewer overflow (CSO) discharges); (2) the necessity for additionally quantifying diffuse sources in order to verify modelling results at basin scale, where both input pathways occur, and (3) the contradictions arising when describing the highly dynamic urban system with the help of static MFA models. However, a wise selection of appropriate calculation procedures with regard to the concrete systems characteristics and available data can minimize the model deviations significantly. Criteria and suggestions for designing adapted quantification procedures are given.
APA, Harvard, Vancouver, ISO, and other styles
38

Wiesen, B., K. H. Weyrich, and R. Siems. "Comparison of MFA and MD Results for Systems with an Isolated Defect." Japanese Journal of Applied Physics 24, S2 (1985): 995. http://dx.doi.org/10.7567/jjaps.24s2.995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Zhi, Jing, Ze Qiang Fu, Peng Shen, and Bao Gao. "Analysis of Material Metabolism for Ningdong Energy(Coal) and Coal Chemical Base." Applied Mechanics and Materials 71-78 (July 2011): 2132–35. http://dx.doi.org/10.4028/www.scientific.net/amm.71-78.2132.

Full text
Abstract:
Material flow analysis (MFA) has become a useful tool fo to analyze the metabolism of social systems. This paper proposes to use the indicators derived from MFA, complemented with water and energy indicators, to analyze the efficiency and the materialization ranks of Ningdong energy(coal) and coal chemical base (China). The companies in the base have many opportunities to improve on these aspects and the indicators can measure and reflect their evolution. In addition, the results show the importance that some flows such as water inputs which often are omitted, can have in some study cases.
APA, Harvard, Vancouver, ISO, and other styles
40

Asim, Jamil, Adnan Shahid Khan, Rashad Mahmood Saqib, et al. "Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review." Applied Sciences 12, no. 7 (2022): 3551. http://dx.doi.org/10.3390/app12073551.

Full text
Abstract:
There are continued advances in the internet and communication fields regarding the deployment of 5G-based applications. It is expected that by 2030, 6G applications will emerge as a continued evolution of the mobile network. Blockchain technology is one of the leading supporting technologies predicted to provide a secure and unique network to 6G-enabled devices, transactions, and applications. It is anticipated that the 6G mobile networks will be virtualized, have cloud-based systems, and aim to be the foundation for the Internet of Everything. However, along with the development of communication technologies, threats from malicious parties have become more sophisticated, making security a significant concern for the 6G era in the future. Despite enormous efforts by researchers to improve security and authentication protocols, systems still face novel intrusion and attacks. Recently, multifactor authentication techniques (MFA) have been deployed as potential solutions to attacks in blockchains. The 6G applications and the cellular network have specific vulnerabilities that need to be addressed using blockchain-based MFA technologies. The current paper is a systematic review that discusses the three technologies under consideration; then, several studies are reviewed that discuss MFA techniques in general and use blockchains as potential solutions to future security and authentication issues that may arise for 6G applications.
APA, Harvard, Vancouver, ISO, and other styles
41

Huang, Yu-Pei, Cheng-En Ye, and Xiang Chen. "A Modified Firefly Algorithm with Rapid Response Maximum Power Point Tracking for Photovoltaic Systems under Partial Shading Conditions." Energies 11, no. 9 (2018): 2284. http://dx.doi.org/10.3390/en11092284.

Full text
Abstract:
A rapid response optimization technique for photovoltaic maximum power point tracking (MPPT) under partial shading conditions (PSCs) is proposed in this study. To improve the solar MPPT tracking speed for rapidly-changing environmental conditions and to prevent the conventional firefly algorithm (FA) from becoming trapped at the local peaks and oscillations during the search process, a novel fusion algorithm, named the modified firefly algorithm (MFA), is proposed. The MFA integrates and modifies the processes of two algorithms, namely the firefly algorithm with neighborhood attraction (NaFA) and simplified firefly algorithm (SFA). A modified attraction process for the NaFA is used in the first iteration to avoid trapping at local maximum power points (LMPPs). In addition, in order to improve the convergence speed, the attractiveness factor of the attraction process is designed to be related to the power and position difference of the fireflies. Furthermore, the number of fireflies is designed to decrease in proportion with the iterations in the modified SFA process. Results from both the simulations and evaluations verify that the proposed algorithm offers rapid response with high accuracy and efficiency when encountering PSCs. In addition, the MFA can avoid becoming trapped at LMPPs and ease the oscillations during the search process. Consequently, the proposed method could be considered to be one of the most promising substitutes for existing approaches. In addition, the proposed method is adaptable to different types of solar panels and different system formats with specifically designed parameters.
APA, Harvard, Vancouver, ISO, and other styles
42

LEANDRA SHANIA ANDERSON and USHA J. "MedSecure: Blockchain-enhanced patient data security with asymmetric cryptography and MFA." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 718–27. https://doi.org/10.30574/wjaets.2024.13.2.0386.

Full text
Abstract:
In the rapidly evolving digital landscape, safeguarding sensitive patient information is crucial for healthcare systems. Traditional data management systems encounter significant security vulnerabilities, lack of decentralisation, and limited user access. This paper introduces a secure and decentralized patient data management system utilising a custom blockchain framework combined with asymmetric cryptography. The system employs Python for algorithm development, OpenSSL for RSA encryption, and a custom PHP-based blockchain to create a secure, decentralised platform. Patient data is encrypted with public keys, ensuring that only authorized healthcare providers can access it using corresponding private keys and access tokens. Multi-factor authentication (MFA) via SMS further enhances security by controlling access to these keys. The system’s key modules—key management, data encryption, blockchain storage, and a centralized ID resolver—ensure robust security, data integrity, and controlled accessibility of patient data. Blockchain integration maintains a secure, tamper-proof ledger of all data transactions, improving privacy, data integrity, and healthcare delivery by ensuring secure and authorized access to patient information.
APA, Harvard, Vancouver, ISO, and other styles
43

Siswanto, Markhaban, Saiful Arfaah, Rukslin Rukslin, Muhlasin Muhlasin, and Machrus Ali. "Rekonfigurasi 33 Kanal Irigasi Menggunakan Metode Firefly Algorithm (MFA)." Jurnal FORTECH 4, no. 1 (2023): 43–47. http://dx.doi.org/10.56795/fortech.v4i1.4106.

Full text
Abstract:
Providing irrigation water on agricultural land aims to meet plants' water needs. In its use, irrigation water must be used optimally. An automatic irrigation system is needed to provide water to plants in the desired conditions. The irrigation canal system is a simulation system using a software program (Matlab 2013b). Reconfiguration simulations applied to irrigation systems are used to increase efficiency and determine the amount of irrigation water to regulate the provision of irrigation water according to needs. As a controller comparison, an artificial intelligence method is used for controller tuning based on the Modified Firefly Algorithm (MFA). The furthest water discharge results can be reduced in the reconfiguration model with a minimum discharge before reconfiguration of 0.91308 pu, and after reconfiguration, it becomes 0.93337 pu. So by reconfiguring the network with MFA, you can reduce water discharge losses by 30.3337% from previous losses.
APA, Harvard, Vancouver, ISO, and other styles
44

Han, Jinho. "CNN-Based Multi-Factor Authentication System for Mobile Devices Using Faces and Passwords." Applied Sciences 14, no. 12 (2024): 5019. http://dx.doi.org/10.3390/app14125019.

Full text
Abstract:
Multi-factor authentication (MFA) is a system for authenticating an individual’s identity using two or more pieces of data (known as factors). The reason for using more than two factors is to further strengthen security through the use of additional data for identity authentication. Sequential MFA requires a number of steps to be followed in sequence for authentication; for example, with three factors, the system requires three authentication steps. In this case, to proceed with MFA using a deep learning approach, three artificial neural networks (ANNs) are needed. In contrast, in parallel MFA, the authentication steps are processed simultaneously. This means that processing is possible with only one ANN. A convolutional neural network (CNN) is a method for learning images through the use of convolutional layers, and researchers have proposed several systems for MFA using CNNs in which various modalities have been employed, such as images, handwritten text for authentication, and multi-image data for machine learning of facial emotion. This study proposes a CNN-based parallel MFA system that uses concatenation. The three factors used for learning are a face image, an image converted from a password, and a specific image designated by the user. In addition, a secure password image is created at different bit-positions, enabling the user to securely hide their password information. Furthermore, users designate a specific image other than their face as an auxiliary image, which could be a photo of their pet dog or favorite fruit, or an image of one of their possessions, such as a car. In this way, authentication is rendered possible through learning the three factors—that is, the face, password, and specific auxiliary image—using the CNN. The contribution that this study makes to the existing body of knowledge is demonstrating that the development of an MFA system using a lightweight, mobile, multi-factor CNN (MMCNN), which can even be used in mobile devices due to its low number of parameters, is possible. Furthermore, an algorithm that can securely transform a text password into an image is proposed, and it is demonstrated that the three considered factors have the same weight of information for authentication based on the false acceptance rate (FAR) values experimentally obtained with the proposed system.
APA, Harvard, Vancouver, ISO, and other styles
45

Cai, Ji Wei, Ji Xu Wu, Zheng Hang Lü, and Guang Liang Gao. "Effects of Powdery Mill Tailings from Magnetite on Workability and Strength of Concretes." Key Engineering Materials 477 (April 2011): 233–38. http://dx.doi.org/10.4028/www.scientific.net/kem.477.233.

Full text
Abstract:
The discarded mill tailings behind the dam will cause disasters at any time. A solution to this problem may be to utilize those wastes, e.g. mill tailings from magnetite, as the Manufactured Fine Aggregates (MFA) for preparation of concretes. The mill tailings from magnetite can be considered as new resources of sand. However, in production of MFA from mill tailings, the particles smaller than 75 μm were strictly eliminated. The degranulation results in not only lower utilization of the resources but also worse micro grading of MFA. The micro fines, i.e. powdery mill tailings from magnetite, supplements powder content in concrete systems in w/c>0.40 to modify the ratio of water to total powder (w/p). The perfect micro grading for good workability can be reached in the case of optimal w/p ratio. The filling effect owing to perfect micro grading of powdery mill tailings makes concretes more compact and the pozzolanic constituents in micro particles of the tailings contribute to the strength of concretes.
APA, Harvard, Vancouver, ISO, and other styles
46

NISHIYAMA, SEIYA, JOÃO DA PROVIDÊNCIA та OSAMU OHNO. "EFFICIENT DESCRIPTION FOR π AND σ MESONS BY RESONATING MEAN-FIELD APPROXIMATION TO TWO-FLAVOR NAMBU-JONA-LASINIO MODEL". International Journal of Modern Physics E 15, № 05 (2006): 1087–114. http://dx.doi.org/10.1142/s0218301306004703.

Full text
Abstract:
We have applied the resonating (Res-) mean-field approximation (MFA) to fermion systems with large quantum fluctuations over the usual MFA to a naive Nambu-Jona-Lasinio (NJL) model involving no current quark mass term. In our approach, as part of the model the normalization volume is kept finite, which plays an important role. This attempt has been quite successful in explaining the pion and sigma-meson masses, but the values of the order parameter for quark condensate and the pion decay constant are too small. This fact suggests us that the Res-MFA including no isospin causes such a problem. To avoid the serious drawback, if we naturally extend the NJL model to include two-flavor degrees of freedom and make an SU(2)f resonating Hartree-Fock (Res-HF) approximation, it is expected that the magnitudes of the order parameter and the pion decay constant are much improved. Using this extended NJL model, they are calculated again and both the numerical values [Formula: see text] and fπ reach good agreements with their experimental ones.
APA, Harvard, Vancouver, ISO, and other styles
47

Shatrunjai, Singh, Singh Ishan, Shanker Yadav Hari, Kumar Sharma Sunil, Anna Alphy Dr., and Gajendra Kumar Dr. "Payment Gateway with Multifactor Authentication: A Security Mechanism." International Journal of Innovative Science and Research Technology (IJISRT) 9, no. 12 (2025): 1966–73. https://doi.org/10.5281/zenodo.14576753.

Full text
Abstract:
The rapid growth of e-commerce has led to an increasing reliance on payment gateways for secure online transactions. To address vulnerabilities such as phishing and fraud, multifactor authentication (MFA) has emerged as a robust solution for ensuring the integrity and security of transactions. This paper explores the implementation of MFA in payment gateways, its impact on user experience, security protocols, and compliance with regulatory standards. A comparative analysis of popular MFA methods and a discussion of future trends, such as biometric authentication and blockchain integration, are also provided. Organizations are implementing wireless online payment applications to facilitate their global business expansion. This trend has heightened the demand for regulatory measures aimed at safeguarding sensitive information, particularly in the realm of internet-based financial transactions. Current internet authentication systems typically rely on either the web or mobile channels independently to verify the identity of remote users. This approach presents a vulnerability, as it depends solely on single-factor authentication, which is insufficient for ensuring the security of user data. Therefore, there is a pressing need for multifactor authentication solutions.
APA, Harvard, Vancouver, ISO, and other styles
48

Thompson, Richard L., and Narendra S. Goel. "Movable Finite Automata (MFA) models for biological systems I: Bacteriophage assembly and operation." Journal of Theoretical Biology 131, no. 3 (1988): 351–85. http://dx.doi.org/10.1016/s0022-5193(88)80230-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Ramli, Nur Fariza, Nor Azwan Mohamed Kamari, Syahirah Abd Halim, Asrul Ibrahim, and Ismail Musirin. "Implementation of Flower Pollination Algorithm for Solving Economic Dispatch Problems in Power System." Jurnal Kejuruteraan 33, no. 4 (2021): 1053–60. http://dx.doi.org/10.17576/jkukm-2021-33(4)-27.

Full text
Abstract:
This study presents the efficiency of the Flower Pollination Algorithm (FPA) in solving economic dispatch. The best economic dispatch for a power system is that the system can generate energy at low generation costs. The calculation of the generating cost is subject to a number of constraints, such as the power demand for the entire system and the generation limit for each generator unit in the system. In addition, the system should also produce low power loss to reduce the impact of greenhouse gas emission. FPA optimization technique is developed based on the transfer of pollen from one flower to another on the same tree or another tree using natural pollinators such as honey bees, birds, water, or wind. Among the advantages of FPA over other techniques are simplicity in computational formulas and fast search simulation time. The proposed algorithm has been implemented in two systems namely IEEE 9 bus 3 generator system and IEEE 30 bus 6 generator. Both of these systems were tested in a Matlab environment. To highlight the capabilities of FPA, the results using this proposed technique are compared with the Moth Flame Algorithm (MFA) technique to determine the efficiency of the proposed approach in solving economic dispatch. MFA is an optimization technique that has been widely used in finding optimal results, especially in engineering research. The simulation results show that FPA performs better than MFA in determining the optimal power generation value with minimum generation cost and low rate of power loss.
APA, Harvard, Vancouver, ISO, and other styles
50

Nica, Mihaela-Alexandra, Valentina Anuța, Cristian Andi Nicolae, et al. "Exploring Deep Eutectic Solvents as Pharmaceutical Excipients: Enhancing the Solubility of Ibuprofen and Mefenamic Acid." Pharmaceuticals 17, no. 10 (2024): 1316. http://dx.doi.org/10.3390/ph17101316.

Full text
Abstract:
Objectives: The study explores the potential of various deep eutectic solvents (DESs) to serve as drug delivery systems and pharmaceutical excipients. The research focuses on two primary objectives: evaluating the ability of the selected DES systems to enhance the solubility of two poorly water-soluble model drugs (IBU and MFA), and evaluating their physicochemical properties, including density, viscosity, flow behavior, surface tension, thermal stability, and water dilution effects, to determine their suitability for pharmaceutical applications. Methods: A range of DES systems containing pharmaceutically acceptable constituents was explored, encompassing organic acid-based, sugar- and sugar alcohol-based, and hydrophobic systems, as well as menthol (MNT)-based DES systems with common pharmaceutical excipients. MNT-based DESs exhibited the most significant solubility enhancements. Results: IBU solubility reached 379.69 mg/g in MNT: PEG 400 (1:1) and 356.3 mg/g in MNT:oleic acid (1:1), while MFA solubility peaked at 17.07 mg/g in MNT:Miglyol 812®N (1:1). In contrast, solubility in hydrophilic DES systems was significantly lower, with choline chloride: glycerol (1:2) and arginine: glycolic acid (1:8) showing the best results. While demonstrating lower solubility compared to the MNT-based systems, sugar-based DESs exhibited increased tunability via water and glycerol addition both in terms of solubility and physicochemical properties, such as viscosity and surface tension. Conclusions: Our study introduces novel DES systems, expanding the repertoire of pharmaceutically acceptable DES formulations and opening new avenues for the rational design of tailored solvent systems to overcome solubility challenges and enhance drug delivery.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography