International Journal on Recent and Innovation Trends in Computing and Communication
Not a member yet
    7998 research outputs found

    BATTLE AGAINST PHISHING

    Get PDF
    Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misguide) users. There are two novel interaction techniques to prevent spoofing. First, our browser extension provides a trusted window in the browser dedicated to username and password entry. We use a photographic image to create a trusted path between the user and this window to prevent spoofing of the window and of the text entry fields. Second, our scheme allows the remote server to generate a unique abstract image for each user and each transaction. This imag e creates a "skin" that automatica lly customizes the browser window or the user interface elements in the content of a remote web page. Our extension allows the users browser to independently compute the image that it expects to receive from the server. To authenticate cont ent from the se rver, the user can visually verify that the images match. We contrast our work with existing anti - phishing proposals. In contrast to other proposals, our scheme places a very low burden on the user in terms of effort, memory and time. To authenticate himse lf the user has to recognize only one image and remember one low entropy password, no matter how many servers he wishes to interact with. To authenticate content from an authenticated server, the us er only needs to perform one visual matching operation to compare two images. Furthermore, it places a high burden of effort on an attacker to spoof customized security indicators

    A Survey on Disease and Nutrient Deficiency Detection in Cotton Plant

    Get PDF
    Cotton is most important fibre crop which plays very important role in economic and social affairs of people, especially in India, but if disease like Alternaria Leaf Spot and deficiency of some major nutrients goes undetected in early stage then it can reduce as much as 25% of total production. In this paper, Various methods and algorithm has been discussed and compared for the detection of above. Since thousands of years, farmers have been detecting these defects in cotton. Number of methods has been proposed by various researchers which vary largely in technology. Earlier visual symptoms were the main source for defect detection in every plant, but then researchers have come with technologies like Image Processing, Optical Sensor, and Spectroscopic Determination etc. Ultimate goal of our research is to detect disease and nutrient deficiency in cotton plant. These techniques and methodologies have been studied thoroughly and then compared to get a single view in this paper

    Survey on Various Intelligent Traffic Management Schemes for Emergency Vehicle

    Get PDF
    Traffic congestion on city road networks is one of the main issues to be addressed by todays traffic management schemes. Traffic congestion on city roads many times leads to delay in emergency services (i.e. Ambulance, Firefighter, Police, etc.). A survey on various traffic management schemes specifically designed to help emergency vehicle has been presented in this pap er. Traffic management schemes used currently and their limitations have been discussed. Researchers have used several techniques such as Embedded Systems, Wireless Sensors Network, Intelligent Ambulance and Image Processing for traffic management. These techniques have been discussed thoroughly and comparative analysis has been made

    iWireless Vision Based Crop Harvesting Control Technique

    Get PDF
    Now a day harvesting the crops from the field is very difficult because shortage of labors and high risk factors, so that the harvesting cost is higher than that of seeding and maintaining. In this project we want to make the work very easier by controlling th e harvesting device from remote location. I t will reduce the time an d cost for harvesting the crops and it also give less physical strain to us. This paper describes the design and development of our wireless crop harvesting control techni que. Wi - Fi camera is used to monitor the field by the user. The zigbee wireless communication technology is used to transfe r the data between the user and RENESAS microcontroller. RENESAS micro controller is used to control the reaper direction and the speed of the reaper motors

    Performance Analysis of a signal by removing ICI using Kalman Filter for OFDM Channel

    Get PDF
    The OFDM communication is very much inspired from the channel frequencies over the network. In such network some kind of orthogonal di stortion occur over the channel called Inter carrier Interference. Here we will improve the ICI using Kalman Filtering improv ed by using repetitive slot and correlated channel tap. The Kalman Filter is been improved by implementing the two stage kalman fil ter. In first stage the Kalman based statistical analysis is performed to estimate the PAPR and the respective Phase variated PAPR reduction is performed. In second stage the ICI reduction is performed by implementing the Kalman filter based carrier offset values. The proposed work of this paper is when data travel over some channel it suffers from the problem of interference. The interf erence results the high signal to noise ratio as well as high bit error rate. The proposed system will improved the si gnal by removing the different kind of impurities over the signal. These impurities includes the ICI, PAPR and the noise over the signal. The signal will be more ef fective than standard OFDM. S o we neednt many pilot symbols in practice, still can ensure the algorithm performance and reduce the time - delay and complexity of this algorith

    A new Approach on Survey of Cut Detection in Wireless Sensor Networks

    Get PDF
    A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a "cut". In this article we consider the problem of detecting cuts by the remaining nodes of a wireless senso r network. We propose an algorithm that a llows (i) every node to detect when the connectivity to a specially designated node has been lost, and (ii) one or more nodes (that are connected to the special node after the cut) to detect the occurrence of the cut. The algorithm is distributed and asynchronous: every node needs to communicate with only those nodes that are within its communication range. The algorithm is base d on the iterative computation of a fictitious "electrical potential" of the nodes. The convergence rate of the underlying iter ativ e scheme is independent of the size and structure of the network. Wireless Sensor Networks (WSNs) consist of thousands of tiny nodes having the capability of sensing, computation, and wireless communications. Wireless sensor network can suffer partition problem in the network which is called a cut. So a single topology of the network breaks into two or more parts. Here we discuss several cut detecti on techniques to detect the cuts in WSN

    Analyzing the Importance of Learnability and Understandability Quality Attributes in Reference to SPL Feature Models

    Get PDF
    The modeling foundation of SPL is promoting software reuse by segregation of variant features of all the products whi ch belong to a family. The analysis of various quality attribute s is very important in reference to SPL feature models. Identifying whether a feature model is easy to use and learn will help develop a successful product line. Two important quality sub factors of usability i.e. understandability and communicativeness play a great role in development of successful product line feature model. If the understanding of any feature model is low, it will result in lesser use of that feature model. Same applies to communicativeness , the more the communicativeness of a feature model, the more the usability. In other words, the successful reuse of any feature model will depend on the degree of its understa nding and communicativeness. C urrent analysis methods usually focus only on functional requirements of the product lines and do not focus on product quality. Whereas, non functional requirement s like maintainability, dependability and usability etc are essential dimensions of variability. This paper is intended to study the role of understandability and communicativeness over feature models. It also throws light on t he effect of these quality su b factors on SPL feature models and suggests ways to improve their degr

    A Mechanism using the Electronic Signature to Verify the Power of Attorney and the Requested Activity

    Get PDF
    The rapid development that accompanies computer and information technology imposes its applications on all societies in general and developed coun tries in particular. In this paper, we present an algorithm to apply the electronic signature to verify the credibility of power of attorney and the credibility of activity requested using power of attorney. The verification algorithm is to be used in cour ts of law; the algorithm ensures a credible approval by the owner to the agent who has the power of attorney to submit the activity under concern. Selling a real estate property is an example of an activity which might be con ducted by the agent using the " power of attorney". This system, which we designed, implemented and tested, takes into consideration all the financial and security information needed. Our system requirements adopted the financial requirements such as banks and financial firms in number o f societies and countries such as the United States, the European Union and Jordan

    7,900

    full texts

    7,999

    metadata records
    Updated in last 30 days.
    International Journal on Recent and Innovation Trends in Computing and Communication
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇