Android Pc Controller Using Wifi

Android Mobile development, Sensor
Android Pc Controller Using Wifi An Android based PC Controller using Wi-Fi is an android application that works like PC mouse. This application smartly controls pc keyboard functions and mouse operations through an android mobile phone. This android application is based on the concept of using an android phone as a mouse. The software application once installed on an android phone can allows users to play games or control other pc functionality through their android phone. The application is made using Eclipse and creates a QWERTY keypad buttons similar to the one used in PC. With the keypad, user can even use it for typing it on any word processor and can operate any application. The application when installed and run on an android based phone shows a mouse settings…
Read More

Student Faculty Document Sharing Android Project

Android Mobile development, Web | Desktop Application
Student Faculty Document Sharing Android Project This project is an online portal between students and faculty. This innovative system allows college faculty to share important data as well as notifications with engineering students. It consists of a faculty login along with student login. Since college faculty operates through pc and document uploading is simpler through a pc, the faculty login is to be performed through a computer. Faculty may upload documents of subject syllabus, timetable document, notifications, e notes etc through their provided login. The documents are uploaded by faculty to different corresponding departments. We propose to build this system on an online server that allows faculty to upload data and students may view search and download required documents through their android device. Here students only see and download data…
Read More

Android Local Train Ticketing Project

Android Mobile development, BSC IT & BCA, BSC IT & BSC CS, MCA, MSC IT, Web | Desktop Application
Android Local Train Ticketing Project A local train ticketing system project for local trains that allows users to book local train tickets and get ticket receipt online. This local train project provides login rights for normal users and admin. A normal user may login and get a ticket online, print it and travel by train. The ticketing process consists of a ticket booking form. The form allows the user to choose his source and destination. The source is the station from where the user will be boarding the train. Destination is the station he needs to get down at. The project database is already filled with stations on Mumbai western central and harbor line. It can be modified for any other city as needed. The system also consists of an…
Read More

Vehicle Tracking Using Driver Mobile Gps Tracking

Android Mobile development, Web | Desktop Application
Vehicle Tracking Using Driver Mobile Gps Tracking The Global Positioning System (GPS) is a space-based satellite navigation system that provides location information .This system uses GPS to track the location of the vehicle. This system will track location of the vehicle and will send details about the location to the admin. This system helps admin to find out the location of the driver driving the vehicle. Admin will know which driver is in which location. This system can be implemented in call taxi to find out the location of the driver driving the vehicle and will help the admin to allocate taxi to the customer. User login to the system using his user id and password. System will track the user’s location with the help of GPS and will send…
Read More

Android Employee Tracker

Android Mobile development, Web | Desktop Application
Android Employee Tracker This system is a combination of web as well as android application where the user will be using the android application and admin as well as HR will work with web application. This application is meant for field work Employers. The Employee will have this application in his android phone, when the user will login to the system his image will be captured and his GPS location will be send to the admin where admin will view image and GPS location in web application. After Login, GPS location of the employee will be tracked automatically by the system and send to the admin after every 5 minutes .When employee logout the system again the image will be captured as well as GPS location will be send to…
Read More

Android AI Diet Consultant

Android Mobile development, Artificial Intelligence & ML, Web | Desktop Application
Android AI Diet Consultant Artificial dietician project is an application with artificial intelligence about human diets. It acts as a diet consultant similar to a real dietician. This system acts in a similar way as that of a dietician. A person in order to know his/her diet plan needs to give some information to the dietician such as its body type, weight, height and working hour details. Similar way this system also provides the diet plan according to the information entered by the user. The system asks all his data from the user and processes it to provide the diet plan to the user. Thus the user does not need to visit any dietician which also saves time and the user can get the required diet plan in just a…
Read More

Android Voting System

Android Mobile development, Web | Desktop Application
Android Voting System This application provides is a new technique of casting votes using mobile phones. Android voting system is an application developed for android devices to deploy an easy and flexible way of casting votes anytime and from anywhere. The application is especially developed for organizations to get employees votes for any new policy regulation or issues. The issues or arguments are fed into the system by the admin. Employees can then cast their vote as yes or no. One voter can only post one vote for an argument. Each and every vote casted is stored in the database for the respective argument. At the end of the voting process the system counts the total votes and generates a brief report of it to the admin. Thus the app…
Read More

Android Bluetooth Chat

Android Mobile development, Sensor
Android Bluetooth Chat The project Bluetooth Messenger is a system developed on android that will enable the users to create profile and chat with server with the help of device’s Bluetooth. Using the system one can create profile, update their status message and even add a profiler picture. The system requires both the device to be connected via Bluetooth. Every user can chat with this profile and can even transfer text file from one node to another. The communication process that the system exhibits is one-to-many that means users can only chat with the server and not with other users. Another useful feature of the system is that it maintains all the chat history so one can view it whenever required.
Read More

Android Graphical Image Password Project

Android Mobile development, Web | Desktop Application
Android Graphical Image Password Project Picture Patten Locking System allows the user to set a Custom Picture may be from the gallery or click it instantly and set it as a Password. The Picture is then Divided into 9 parts and represented as a 3X3 Patten of Cubes for Authentication in any order i.e. they are scrambled. The User has to select all the Nine Cubes as per the Original Picture Row Wise similar to solving a puzzle. The Pictures are Stored in the Phones Device Memory with the Folder Named User’s Full Name Underscore User Id (username_userid). In this app if the user credentials are correct a Custom Calculator is opened, while you can use any app.
Read More

Android Based School Bus Tracking System

Android Mobile development, Web | Desktop Application
Android Based School Bus Tracking System This system is a combination of web as well as android application where the driver will be using the android application whereas admin and parent will be using web application. This application is meant for drivers who is driving the school bus. System allows admin to add a new driver where driver id and password is generated and stored into the system. The driver will have the android application installed in his android phone, when the driver will login to the application, his GPS location will be sent and stored into database. As soon as driver logs in, GPS location of the driver will be tracked automatically by the application and stores the GPS co-ordinates into database after every 5 minutes. When driver logs…
Read More

Android File Manager Application Project

Android Mobile development, Web | Desktop Application
Android File Manager Application Project Android by delivering tons of great features that work well together to make your life easier in the long run. You’ll see the usual features like moving, sharing and deleting the files on your phone, as well as less common features like compressing files, and streaming files located in cloud storage. Of course you’ll also find the ability to easily browse your files, and manage your files with their cadre of useful disk tools. Android File Manager delivers a great experience with all of the features you didn’t realize that you wanted. From managing files, to storage, their features all work well together delivering a simple and easy to use app. The application will connect with online database to store the user uploaded files.
Read More

Voice Assistant For Visually Impaired

Android Mobile development, Web | Desktop Application
Voice Assistant For Visually Impaired This is an innovative System for visually impaired people and acts as a voice assistant for them. This system is used to help the visually impaired to have access to the most important features of the phone enhancing the quality of the system making use of different custom layouts and using speech to text. The System has custom messaging feature with inbox and sent items, call log and dialer, notes and battery level checking and reminder. All actions performed by the user the system speaks out and helps the user to know his current position. The System helps the user to also read the contents of the message along with the sender and the date and time, in whole everything. The system also allows the…
Read More

Your Personal Nutritionist Using FatSecret API

Android Mobile development, Web | Desktop Application
Your Personal Nutritionist Using FatSecret API Personal Nutritionist as the name, the system can act as your personal nutritionist while this system can be used also by nutritionist gaining a lot of information and help in many ways. FatSecret API helps the System to get the information in many ways. The user can get details about a number of nutrients, vitamins etc of a fruit or vegetable. The user can add his recipes or get recopies using the API. The System basically helps the user in what to eat and which is good, what will help him and etc, the system will help him filter things easily. The System also allows the user to make a diet plan and remind him his food timings.
Read More

Android Text Encryption Using Various Algorithms

Android Mobile development, Security and Encryption, Web | Desktop Application
Android Text Encryption Using Various Algorithms Users communicate over all social media, but messages are not secured when it passes through network. Intruder can access user’s message easily. We want to secure users communication over all social media. So here we proposed a system where user will enter the plain text and select the algorithm type from AES,DES,MD5,….. and provide the key, a chipper text will be formed that can be sent via any communication application and end user can decrypt the text by selecting the same algorithm type and must enter the same sender secret key. User can use our application and can enter the plain text and must select the algorithm type and must enter the secret key to encrypt the message and receiver can decrypt the message…
Read More

Android Smart City Traveler

Android Mobile development, Artificial Intelligence & ML, Web | Desktop Application
Android Smart City Traveler The purpose of developing this android application is to create a schedule for the traveler travelling to city and wanted to explore the city by specifying the time in hours. System then smartly analyzes the questionnaire and creates a schedule for traveler based on provided time. The development is done in two technical languages as Java for Android Application for User/Traveler and Asp .net for Web portal which is used by Admin. First of all, traveler need to register himself by filling up the details using android application. After successful registration, user can login now using login credentials which then proceeds with questionnaire where application ask user about their likings and habits. Based on questionnaire, application smartly analyzes for the place based on user specified time.…
Read More

Advanced Intelligent Tourist Guide

Android Mobile development, Artificial Intelligence & ML, Web | Desktop Application
Advanced Intelligent Tourist Guide The project is developed using Visual Studio with Asp .Net as programming language. There are two entities who will have the access to the system. One is the admin and another one will be the registered user. Admin will add places with their details such as place name, image, address, area, latitude-longitude, tags and description. Admin can view all the added places and also can edit if required. User is new he/she will have to fill the registration form (username, password, email, full name, contact no. and type of places i.e. tags.). After registration, user can login with the valid id and password. After login, user will get the places recommendation based on the preferences which were taken in the form of tags while registration. Based…
Read More

Intelligent Tourist Guide

Android Mobile development, Web | Desktop Application
Intelligent Tourist Guide Nowadays people use mobile phones and other mobile devices. Most of us have a small computing device that is always with us. People use it example for calling, as calendar and organizer. Mobile devices with GPS receiver are also used to find paths in navigation. The main idea of this thesis was to design a system that will run on most of phones and palms and will be helpful when visiting some new places and cities. This system should be able to find a route using user criteria. Those criteria should be simple and natural, like for example: a list of museums, the most famous historical objects, restaurants to visit, constraints to travel by bus and by walking. The system should find a path that fulfills those…
Read More

Android Smart Ticketing Using Rfid

Android Mobile development
Android Smart Ticketing Using Rfid This is an advanced Ticketing System making it easier for the commuter to travel in the bus and the driver to keep exact records of the passengers. This System is a web and Android Based System where the Android will have to apps one for the passenger and one for the bus which is connected to the RFID Reader while the web part is Purely Admin to set the fares and bus tops and to keep and monitor the current updates of a particular bus and passengers on it. This System has the potential of letting the admin know where the bus is exactly and how many passengers are travelling on the bus with their details. This System makes it very easier for security purposes…
Read More

Restaurant Table Booking Android Application

Android Mobile development
Restaurant Table Booking Android Application Table management systems and restaurant reservation systems are becoming increasingly sophisticated, if you’re considering installing a reservation system for your restaurant there are a number of factors to consider when selecting a system and provider. A restaurant reservation and table management system should provide you with the tools to plan and run your restaurant bookings effectively and manage tables, efficient table management means that a restaurant can maximize the potential of their dining room and this in turn should increase profits. Restaurant reservation systems with the option of combining a table management system are increasing in popularity with restaurant operators. With an increasing number of diners now using the web to find details of their favored dining location having the facility to take booking via…
Read More

Android Geo Fencing App Project

Android Mobile development, Web | Desktop Application
Android Geo Fencing App Project This developed project work for parents and their children’s. The parents and children’s both should have GPS based smart phones. The application is used to track the child’s location using their smartphone. To access this application, parent need to create an account by filling up basic registration details and create a login id and password. Using valid login credentials, parent can login and access the application modules. After successful login, parent need to add their child details and also need to create a login id and password for their child in order to track their location. While registering their child name, parent need to set a geo fence around their children by selecting a point on map. Parent can also update the fence around their…
Read More

Railway Ticket Booking System Using Qr Code

Android Mobile development, Web | Desktop Application
Railway Ticket Booking System Using Qr Code This project deals with the development and implementation of smart phone application which is more effective and simple than current ticketing system. The “Ticket Checker System” can be bought easily anytime, anywhere and ticket will be present in the customer’s phone in the form of “Quick Response Code”. GPS facility is used for validation of the ticket at the source and deletion at the destination. The information for each user is stored in a SQL database for security purpose which is unavailable in the current suburban railway system. Also the ticket checker is provided with an application to search for the user’s ticket with the ticket number in the cloud database for checking purposes.
Read More

Mobile Based Attendance System

Android Mobile development, Web | Desktop Application
Mobile Based Attendance System built to eliminate the time and effort wasted in taking attendances in schools and colleges. It also greatly reduces the amount of paper resources needed in attendance data management.This is an android mobile app. It’s built to be used for school/college faculty so that they may take student attendance on their phones. The system is divided into following modules:Student Attendance List Creation: Once this App is installed on a phone, a it allows user to create a student attendance sheet consisting of name, roll number, date, Absent/Present mark and subject. He has to fill student names along with associated roll numbers. Attendance Marking: The faculty has the list on his phone now. He may see the list call roll numbers and select absent id the student…
Read More

Design of a Secured E-voting System

Android Mobile development
Design of a Secured E-voting System E-voting systems are becoming popular with the widespread use of computers and embedded systems. Security is the vital issue should be considered in such systems. This paper proposes a new e-voting system that fulfills the security requirements of e-voting. It is based on homomorphic property and blind signature scheme. The proposed system is implemented on an embedded system which serves as a voting machine. The system employes RFID to store all conditions that comply with the rule of the government to check voter eligibility.
Read More

Shopping Application System With Near Field Communication (NFC) Based on Android

Android Mobile development, Web | Desktop Application
Shopping Application System With Near Field Communication (NFC) Based on Android The rapid development of mobile communications systems today, along with the changing times and technology, both in terms of hardware, operating system used and the use of Internet bandwidth, making some mobile applications also contribute to exploit these developments. Mobile Commerce Applications for an example, became the most popular applications for mobile users who do not want to trouble yourself with having to carry cash everywhere. An important technology behind mobile payments is called Near Field Communication (NFC). As an indication that NFC represents the potential and tremendous business, leading companies such as Nokia, Microsoft and NXP Semiconductors, actively engaged in the NFC Forum. Shopping application process integrated with NFC technologybased on Android. Shopping application system designed, for the…
Read More

Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval.

Image Processing
Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval. With many potential practical applications, content- based image retrieval (CBIR) has attracted substantial attention during the past few years. A variety of relevance feedback (RF) schemes have been developed as a powerful tool to bridge the semantic gap between low-level visual features and high-level semantic concepts, and thus to improve the performance of CBIR systems. Among various RF approaches, support-vector-machine (SVM)-based RF is one of the most popular techniques in CBIR. Despite the success, directly using SVM as an RF scheme has two main drawbacks. First, it treats the positive and negative feedbacks equally, which is not appropriate since the two groups of training feedbacks have distinct properties. Second, most of the SVM-based RF techniques do not take into account the…
Read More

Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords

Image Processing, Web | Desktop Application
Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords Photos with people (e.g., family, friends, celebrities, etc.) are the major interest of users. Thus, with the exponentially growing photos, large-scale content-based face image retrieval is an enabling technology for many emerging applications. In this work, we aim to utilize automatically detected human attributes that contain semantic cues of the face photos to improve content- based face retrieval by constructing semantic codewords for effi-cient large-scale face retrieval. By leveraging human attributes in a scalable and systematic framework, we propose two orthogonal methods named attribute-enhanced sparse coding and attribute- embedded inverted indexing to improve the face retrieval in the offline and online stages. We investigate the effectiveness of different attributes and vital factors essential for face retrieval. Experimenting on two public datasets, the…
Read More

An effective image steganalysis method based on neighborhood information of pixels

Image Processing, Web | Desktop Application
An effective image steganalysis method based on neighborhood information of pixels This project focuses on image steganalysis. We use higher order image statistics based on neighborhood information of pixels (NIP) to detect the stego images from original ones. We use subtracting gray values of adjacent pixels to capture neighborhood information, and also make use of ―rotation invariant‖ property to reduce the dimensionality for the whole feature sets. We tested two kinds of NIP feature, the experimental results illustrates that our proposed feature sets are with good performance and even outperform the state-of-art in certain aspect.
Read More

Automatic Plant Leaf Classification for a Mobile Field Guide

Image Processing
Automatic Plant Leaf Classification for a Mobile Field Guide In this paper we describe the development of an Android application that gives users the ability to identify plant species based on photographs of the plant’s leaves taken with a mobile phone. At the heart of this application is an algorithm that acquires morphological features of the leaves, computes welldocumented metrics such as the angle code histogram (ACH), then classifies the species based on a novel combination of the computed metrics. The algorithm is first trained against several samples of known plant species and then used to classify unknown query species. Aided by features designed into the application such as touchscreen image rotation and contour preview, the algorithm is very successful in properly classifying species contained in the training library.
Read More

Cloud Data Protection for the Masses

Cloud Computing, Web | Desktop Application
Cloud Data Protection for the Masses Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.
Read More

Dynamic Bandwidth Allocation in Cloud Computing

Cloud Computing, Web | Desktop Application
Dynamic Bandwidth Allocation in Cloud Computing Cloud Computing is a use of computing resources that is delivered as a service over a network. Sharing the data in the cloud depends on the network performance of the data centers. Bandwidth allocation plays a major role in sharing the resources towards the data center networks. Server performance is the major problem in cloud computing. When multiple users send a request for the same server at a time, the performance of the server is considerably decreased. So we describe a novel method of reallocating the bandwidth dynamically from passive users to active users using bandwidth mutual sharing and fair sharing technique.
Read More

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS

Cloud Computing, Web | Desktop Application
DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS Abstract Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. So researchers of modern days have gone for alternative methods wherein graphical pictures are used as passwords. Graphical passwords essentially use images or representation of images as passwords. Human brain is good in remembering picture than textual character. There are various graphical password schemes or graphical password software in the market. However, very little research has been done…
Read More

Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing

Cloud Computing, Web | Desktop Application
Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing With the growing popularity of data and service outsourcing, where the data resides on remote servers in encrypted form, there remain open questions about what kind of query operations can be performed on the encrypted data. In this paper, we focus on one such important query operation, namely range query. One of the basic security primitive that can be used to evaluate range queries is secure comparison of encrypted integers. However, the existing secure comparison protocols strongly rely on the encrypted bit-wise representations rather than on pure encrypted integers. Therefore, in this paper, we first propose an efficient method for converting an encrypted integer z into encryptions of the individual bits of z. We then utilize the proposed security primitive…
Read More

N-Square Approach For Lossless Image Compression And Decompression

Image Processing, Web | Desktop Application
N-Square Approach For Lossless Image Compression And Decompression There are several lossy and lossless coding techniques developed all through the last two decades. Although very high compression can be achieved with lossy compression techniques, they are deficient in obtaining the original image. While lossless compression technique recovers the image exactly. In applications related to medical imaging lossless techniques are required, as the loss of information is deplorable. The objective of image compression is to symbolize an image with a handful number of bits as possible while preserving the quality required for the given application. In this paper we are introducing a new lossless encoding and decoding technique which even better reduces the entropy there by reducing the average number of bits with the utility of Non Binary Huffman coding through…
Read More

An Efficient Real Time Moving Object Detection Method for Video Surveillance System

Image Processing, Web | Desktop Application
An Efficient Real Time Moving Object Detection Method for Video Surveillance System Moving object detection has been widely used in diverse discipline such as intelligent transportation systems, airport security systems, video monitoring systems, and so on. In this paper, we propose an efficient moving object detection method using enhanced edge localization mechanism and gradient directional masking for video surveillance system. In our proposed method, gradient map images are initially generated from the input and background images using a gradient operator. The gradient difference map is then calculated from gradient map images. The moving object is then detected by using appropriate directional masking and thresholding. Simulation results indicate that the proposed method consistently performs well under different illumination conditions including indoor, outdoor, sunny, and foggy cases. Moreover, it outperforms well known…
Read More

A robust skew detection method based on maximum gradient difference and R-signature

Image Processing, Web | Desktop Application
A robust skew detection method based on maximum gradient difference and R-signature In this paper we study the detection of skewed text lines in scanned document images. The aim of our work is to develop a new automatic approach able to estimate precisely the skew angle of text in document images. Our new method is based on Maximum Gradient Difference (MGD) and R-signature. It detects zones that have high variations of gray values in different directions using the MGD transform. We consider these zones as being text regions. R-signature which is a shape descriptor based on Radon transform is then applied in order to approximate the skew angle. The accuracy of the proposed algorithm is evaluated on an open dataset by comparing error rates.
Read More

Image-based object detection under varying illumination in environments with specular surfaces

Image Processing, Web | Desktop Application
Image-based object detection under varying illumination in environments with specular surfaces Image-based environment representations capture the appearance of the surroundings of a mobile robot and are useful for the detection of novelty. However, image-based novelty detection can be impaired by illumination effects. In this paper we present an approach for the image-based detection of novel objects in a scene under varying lighting conditions and in the presence of objects with specular surfaces. The computation of an illumination-invariant image-based environment representation allows for the extraction of the shading of the environment from camera images. Using statistical models infered from the luminance and the saturation component of the shading images, secularities and shadows are detected and suppressed in the process of novelty detection. Experimental results show that the proposed method outperforms two…
Read More

A New Block Compressive Sensing to Control the Number of Measurements

Image Processing, Web | Desktop Application
A New Block Compressive Sensing to Control the Number of Measurements Compressive Sensing (CS) aims to recover a sparse signal from a small number of projections onto random vectors. Be- cause of its great practical possibility, both academia and in- dustries have made efforts to develop the CS’s reconstruction performance, but most of existing works remain at the theo- retical study. In this paper, we propose a new Block Compres- sive Sensing (nBCS), which has several benefits compared to the general CS methods. In particular, the nBCS can be dynamically adaptive to varying channel capacity because it conveys the good inheritance of the wavelet transform.
Read More

Lossless image compression based on data folding

Image Processing, Web | Desktop Application
Lossless image compression based on data folding The paper presents an approach for lossless image compression in spatial domain for continuous-tone images using a novel concept of image folding. The proposed method uses the property of adjacent neighbor redundancy for prediction. In this method, column folding followed by row folding is applied iteratively on the image till the image size reduces to a smaller pre-defined value. For column folding, elements of even columns are subtracted from elements of odd columns. Thereafter, row folding is applied on odd columns in a similar fashion. In row folding, even rows are subtracted from odd rows and the resultant odd rows are used for next iteration. The difference data, thus obtained, is stored in a tile format; which along with the reduced image is…
Read More

A chaotic system based fragile watermarking scheme for image tamper detection

Image Processing, Web | Desktop Application
A chaotic system based fragile watermarking scheme for image tamper detection In the past few years, various fragile watermarking techniques have been proposed for image authen- tication and tamper detection. In this paper, a novel chaos based watermarking scheme for image authentication and tamper detection is proposed. Tamper localization and detection accuracy are two important aspects of the authentication watermarking schemes. Our scheme can detect any modifica- tion made to the image and can also indicate the specific locations that have been modified. To improve the security of the proposed scheme two chaotic maps are employed. Since chaotic maps are sensitive to initial values, the corresponding position relation between pixels in the watermarked image and the watermark get disturbed, which helps the watermarking scheme to withstand counterfeiting attacks. Initial values…
Read More

Linear distance coding for image classification

Image Processing, Web | Desktop Application
Linear distance coding for image classification The traditional SPM approach based on bag-of-features (BoF) requires nonlinear classifiers to achieve good image classification performance. This paper presents a simple but effective coding scheme called Locality-constrained Linear Coding (LLC) in place of the VQ coding in traditional SPM. LLC utilizes the locality constraints to project each descriptor into its local-coordinate system, and the projected coordinates are integrated by max pooling to generate the final representation. With linear classifier, the proposed approach performs remarkably better than the traditional nonlinear SPM, achieving state-of-the-art performance on several benchmarks. Compared with the sparse coding strategy [22], the objective function used by LLC has an analytical solution. In addition, the paper proposes a fast approximated LLC method by first performing a K-nearest-neighbor search and then solving a…
Read More

Security Enhancement Scheme for Image Steganography using S-DES Technique

Image Processing
Security Enhancement Scheme for Image Steganography using S-DES Technique In today‟s information age, information sharing and transfer has increased exponentially. The information vulnerable to unauthorised access and interception, while in storage or transmission. Cryptography and Steganography are the two major techniques for secret communication. The contents of secret message are scrambled in cryptography, where as in steganography the secret message is embedded into the cover medium. This paper presents a new generalized model by combining cryptographic and steganographic Technique. These two techniques encrypt the data as well as hide the encrypted data in another medium so the fact that a message being sent is concealed. In cryptography we are using Simplified Data Encryption Standard (S-DES) algorithm to encrypt secret message and then alteration component method is used to hide encrypted…
Read More

Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing

Networking
Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing It has been observed that transient failures are fairly common in IP backbone networks and there have been several proposals based on local rerouting to provide high network availability despite failures. While most of these proposals are effective in handling single failures, they either cause loops or drop packets in the case of multiple independent failures. To ensure forwarding continuity even with multiple failures, we propose Localized On-demand Link State (LOLS) routing. Under LOLS, each packet carries a blacklist, which is a minimal set of failed links encountered along its path, and the next hop is determined by excluding the blacklisted links. We show that the blacklist can be reset when the packet makes forward progress towards the…
Read More

FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks

Networking
FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks Distributed denial-of-service (DDoS) attacks remain a major security problem, the mitigation of which is very hard especially when it comes to highly distributed botnet-based attacks. The early discovery of these attacks, although challenging, is necessary to protect end-users as well as the expensive network infrastructure resources. In this paper, we address the problem of DDoS attacks and present the theoretical foundation, architecture, and algorithms of FireCol. The core of FireCol is composed of intrusion prevention systems (IPSs) located at the Internet service providers (ISPs) level. The IPSs form virtual protection rings around the hosts to defend and collaborate by exchanging selected traffic information. The evaluation of FireCol using extensive simulations and a real dataset is presented, showing FireCol…
Read More

Participatory Privacy: Enabling Privacy in Participatory Sensing

Networking
Participatory Privacy: Enabling Privacy in Participatory Sensing Participatory Sensing is an emerging computing paradigm that enables the distributed collection of data by self-selected participants. It allows the increasing number of mobile phone users to share local knowledge acquired by their sensor-equipped devices, e.g., to monitor temperature, pollution level or consumer pricing information. While research initiatives and prototypes proliferate, their real-world impact is often bounded to comprehensive user participation. If users have no incentive, or feel that their privacy might be endangered, it is likely that they will not participate. In this article, we focus on privacy protection in Participatory Sensing and introduce a suitable privacy-enhanced infrastructure. First, we provide a set of definitions of privacy requirements for both data producers (i.e., users providing sensed information) and consumers (i.e., applications accessing…
Read More

A Fast Re-Route Method

Networking
A Fast Re-Route Method We present a method to find an alternate path, after a link failure, from a source node to a destination node, before the Interior Gateway Protocol (e.g., OSPF or IS-IS) has had a chance to reconverge in response to the failure. The target application is a small (up to tens of nodes) regional access subnetwork of a service provider’s network, which is a typical access scale encountered in practice. We illustrate the method and prove that it will find a path if one exists.
Read More

Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks

Networking
Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks The Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, prior research work on topology control considers CC only in the aspect of energy saving, not that of coverage extension. We identify the challenges in the development of a centralized topology control scheme, named Cooperative Bridges, which reduces transmission power of nodes as well as increases network connectivity. Prior research on topology control with CC only focuses on maintaining the network connectivity, minimizing the transmission power of each node, whereas ignores the energy efficiency of paths in constructed topologies. This may cause inefficient routes and hurt the overall network performance in cooperative ad hoc networks.…
Read More

Efficient and Discovery of Patterns in Sequence Data Sets.

Data mining, Web | Desktop Application
Efficient and Discovery of Patterns in Sequence Data Sets. Existing sequence mining algorithms mostly focus on mining for subsequences. However, a large class of applications, such as biological DNA and protein motif mining, require efficient mining of “approximate” patterns that are contiguous. The few existing algorithms that can be applied to find such contiguous approximate pattern mining have drawbacks like poor scalability, lack of guarantees in finding the pattern, and difficulty in adapting to other applications. In this paper, we present a new algorithm called Flexible and Accurate Motif DEtector (FLAME). FLAME is a flexible suffix-tree-based algorithm that can be used to find frequent patterns with a variety of definitions of motif (pattern) models. It is also accurate, as it always finds the pattern if it exists. Using both real…
Read More

Detecting and Resolving Firewall Policy Anomalies

Networking
Detecting and Resolving Firewall Policy Anomalies As the network dramatically extended security considered as major issue in networks. There are many methods to increase the network security at the moment such as encryption, VPN, firewall etc. but all of these are too static to give an effective protection against attack and counter attack. We use data mining algorithm and apply it to the anomaly detection problem. In this work our aim to use data mining techniques including classification tree and support vector machines for anomaly detection. The result of experiments shows that the algorithm C4.5 has greater capability than SVM in detecting network anomaly and false alarm rate by using 1999 KDD cup data.
Read More

Detecting and Resolving Firewall Policy Anomalies

Networking
Detecting and Resolving Firewall Policy Anomalies As the network dramatically extended security considered as major issue in networks. There are many methods to increase the network security at the moment such as encryption, VPN, firewall etc. but all of these are too static to give an effective protection against attack and counter attack. We use data mining algorithm and apply it to the anomaly detection problem. In this work our aim to use data mining techniques including classification tree and support vector machines for anomaly detection. The result of experiments shows that the algorithm C4.5 has greater capability than SVM in detecting network anomaly and false alarm rate by using 1999 KDD cup data.
Read More

Denial of Service Defense through Web Referral

Networking
Denial of Service Defense through Web Referral The web is a complicated graph, with millions of websites interlinked together. In this paper, we propose to use this web sitegraph structure to mitigate flooding attacks on a website, using a new web referral architecture for privileged service (?WRAPS?). WRAPS allows a legitimate client to obtain a privilegeURL through a click on a referral hypherlink, from a website trusted by the target website. Using that URL, the client can get privileged access to the target website in a manner that is far less vulnerable to a DDoS flooding attack. WRAPS does not require changes to web client software and is extremely lightweight for referrer websites, which eases its deployment. The massive scale of the web sitegraph could deter attempts to isolate a…
Read More

Slicing A New Approach to Privacy Preserving Data Publishing.

Data mining, Security and Encryption, Web | Desktop Application
Slicing A New Approach to Privacy Preserving Data Publishing. Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing. Recent work has shown that general- ization loses considerable amount of information, especially for high-dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi- identifying attributes and sensitive attributes.
Read More

A Bayesian Approach to Filtering Junk E-Mail

Data mining, Web | Desktop Application
A Bayesian Approach to Filtering Junk E-Mail Abstract In addressing the growing problem of junk E-mail on the Internet, we examine methods for the automated construction of lters to eliminate such unwanted mes- sages from a user's mail stream. By casting this prob- lem in a decision theoretic framework, we are able to make use of probabilistic learning methods in conjunc- tion with a notion of di erential misclassi cation cost to produce lters which are especially appropriate for the nuances of this task. While this may appear, at rst, to be a straight-forward text classi cation prob- lem, we show that by considering domain-speci c fea- tures of this problem in addition to the raw text of E-mail messages, we can produce much more accurate lters. Finally, we show the ecacy of such…
Read More