129 research outputs found

    Peer to Peer Communication between Android Device and PC and Video Surveillance using Android Device

    Get PDF
    Peer to peer technology is used for sharing of various contents that are already saved on PC. In this mobile is one peer and PC is another peer. Connection is established between computer and android smart phone which is peer to peer networking. This system is useful for like viewing or browsing a file which is stored on a remote computer, saving image files and text files to the computer and handling control of a remote computer using a android smart phone. Not only remote computer but also we can have control over various extended devices which are connected to that computer. It also represents architecture to improve video surveillance using android Smart-phone. This system allows application dynamic composition which is increases the overall flexibility of the system. This video surveillance system satisfies all needs of dynamism which results into easy allowing use of system to different users. This system provides better surveillance by selecting access live for past videos from different locations. DOI: 10.17762/ijritcc2321-8169.15013

    A Run-time Detection System for Malicious URLs in Twitter

    Get PDF
    Twitter is web based application which provide the service of sharing and mentioning the tweets and messages, which is social networking service. Twitter message could be a context information, or a URLs. Spam, scam, malicious distribution can be done easily with these URLs, spams and malicious data are usually a suspicious URLs with share another URLs in it. These URLs are known as URLs redirect chains, it is a repetition URLs. They itself contain too many URLs which is called as spam URLs. Generally there are several schemes to find such spam URLs, and they are evasion using time – based and evasion using crawling. This system is design to find- detect such spam or suspicious URLs- tweets from many other tweets, The URLS redirect chains frequently share the same URLs, and have been reused usually by attackers because they have limited resources. A Run-time Detection System for Malicious URLs in Twitter has method to show and detect the suspiciousness of the correlated URLs redirect chains, which are commonly shared URLs. DOI: 10.17762/ijritcc2321-8169.15013

    An Intrusion Detection System Algorithm for Defending MANET against the DDoS Attacks.

    Get PDF
    Mobile ad hoc network (MANET) is rapidly deployable, self configuring network able to communicate with each other without the aid of any centralized system. There is no need for existing infrastructure base network. In MANET Wireless medium is radio frequencies and nodes are mobile, topology can be very dynamically. Nodes must be able to relay traffic since communicating nodes might be out of range. A MANET can be a standalone network or it can be connected to external networks like internet. Multihop operation of MANET requires a routing mechanism designed for mobile nodes are internet access mechanisms, self configuring networks requires an address allocation mechanism, mechanism to detect and act on, merging of existing networks and security mechanisms. As we know that there is no any centralized system so routing is done by node itself. Due to its mobility and self routing capability nature, there are many weaknesses in its security

    Effect of Phosphorus Nutrition on Growth and Physiology of Cotton Under Ambient and Elevated Carbon Dioxide

    Get PDF
    Phosphorous deficiency in soil limits crop growth and productivity in the majority of arable lands worldwide and may moderate the growth enhancement effect of rising atmospheric carbon dioxide (CO2) concentration. To evaluate the interactive effect of these two factors on cotton (Gossypium hirsutum) growth and physiology, plants were grown in controlled environment growth chambers with three levels of phosphate (Pi) supply (0.20, 0.05 and 0.01 mM) under ambient and elevated (400 and 800 μmol mol‒1, respectively) CO2. Phosphate stress caused stunted growth and resulted in early leaf senescence with severely decreased leaf area and photosynthesis. Phosphate stress led to over 77 % reduction in total biomass across CO2 levels. There was a below-ground (roots) shift in biomass partitioning under Pi deficiency. While tissue phosphorus (P) decreased, tissue nitrogen (N) content tended to increase under Pi deficiency. The CO2 × Pi interactions were significant on leaf area, photosynthesis and biomass accumulation. The stimulatory effect of elevated CO2 on growth and photosynthesis was reduced or highly depressed suggesting an increased sensitivity of cotton to Pi deficiency under elevated CO2. Although, tissue P and stomatal conductance were lower at elevated CO2, these did not appear to be the main causes of cotton unresponsiveness to elevated CO2 under severe Pi-stress. The alteration in the uptake and utilization of N was suggested due to a consistent reduction (18–21 %) in the cotton plant tissue N content under elevated CO2

    Multi-Language based Android Application for Motor Control

    Get PDF
    some wise individual once aforementioned that system could be a system wherever we will finish off the machine whenever we'd like. That’s the distinction between controlled and uncontrolled system. Our project is regarding create this system economical and dynamic. Because the name instructed the automated management is for dominant the motor from remote place, look over its operational conditions; get feedback from the motor itself. Our target is to manage the motor from distant place by mobile DTMF tone and conjointly get feedback by SMS whereas it's in ON or OFF condition. We tend to conjointly make sure the safe operation of the motor by police investigation the voltage of the supply and guarantee feedback from system whereas it's over or below voltage. Once more we tend to conjointly get these feedbacks by SMS additionally. GSM network is all over in our country that’s why we decide GSM network to control our motor conjointly transferring feedback data through it. We tend to conjointly use GSM network as a result of if we tend to use it then we tend to don’t have to be compelled to establish further instrumentation for networking. To transmit feedback signals we tend to use GSM electronic equipment at the motor finish conjointly generate management signal by mobile DTMF as a result of it's terribly simple to get DTMF by mobile station and send feedback SMS by electronic equipment additionally. In industrial sector we tend to hope our project is become handy and value effective to control motor and provides its protection

    Information Searching Using Web Data Extraction for Acquiring Enrich MM Results

    Get PDF
    There are many question answer sites are available now a day. In that Community Question Answering Sites are achieved lots of popularity over last years. But the drawback of available question answering system is that it can only provide multiple solutions of the textual answer and user need to select one of them. In this paper, we propose a scheme that enriches the textual answer with multimedia data. Our scheme consists of four models: QA pair extraction, answer medium selection, query generation and selection and presentation. The type media information added with the textual data is determined. The question answer pair is generated from the available Community Question Answering Sites database. Query is generated for the multimedia data. The final resulting data must be selected after re-ranking and removal operation and then present to the user. DOI: 10.17762/ijritcc2321-8169.15014

    Avoid duplicate key overheads for same data in storage

    Get PDF
    De-duplication is a technique used to weaken the amount of storage needed by service providers. Now a day the most originating challenge is to perform secure de-duplication in cloud storage. Although convergent encryption has been extensively adopted for secure de-duplication, a demanding issue of making convergent encryption practical is to efficiently and reliably managea massive number of convergent keys. We first introduce a baseline approach in which each user holds an autonomous master key forencrypting the convergent keys and outsourcing them to the server. As a proof of concept, encompass the implementation framework of proposed authorized duplicate check scheme and conduct experiments using these prototype. In proposed system involve authorized duplicate checkscheme sustain minimal overhead compared to normal operations.De-duplication is one of important data compression techniques for eliminating duplicate copies of repeating data. For that purpose Authorized duplication check system is used. This paper addresses problem of privacy preserving de-duplication in cloud computing and introduce a new de-duplication system supporting for Differential Authorization, Authorized Duplicate Check, Unfeasiblity of file token/duplicate-check token, In distinguishability of file token/duplicate-check token, Data affinity.In this project we are presenting the certified data de-duplication toprotect the data security by counting differential privileges of users in the duplicate check.Different new de-duplication constructions presented for supporting authorized duplicate check

    Three dimensional ink-jet printing of biomaterials using ionic liquids and co-solvents

    Get PDF
    1-Ethyl-3-methylimidazolium acetate ([C2C1Im][OAc]) and 1-butyl-3-methylimidazolium acetate ([C4C1Im][OAc]) have been used as solvents for the dissolution and ink-jet printing of cellulose from 1.0 to 4.8 wt%, mixed with the co-solvents 1-butanol and DMSO. 1-Butanol and DMSO were used as rheological modifiers to ensure consistent printing, with DMSO in the range of 41–47 wt% producing samples within the printable range of a DIMATIX print-head used (printability parameter < 10) at 55 °C, whilst maintaining cellulose solubility. Regeneration of cellulose from printed samples using water was demonstrated, with the resulting structural changes to the cellulose sample assessed by scanning electron microscopy (SEM) and white light interferometry (WLI). These results indicate the potential of biorenewable materials to be used in the 3D additive manufacture process to generate single-component and composite materials

    Initial Steps of Thermal Decomposition of Dihydroxylammonium 5,5′-bistetrazole-1,1′-diolate Crystals from Quantum Mechanics

    Full text link
    Dihydroxylammonium 5,5?-bistetrazole-1,1?-diolate (TKX-50) is a recently synthesized energetic material (EM) with most promising performance, including high energy content, high density, low sensitivity, and low toxicity. TKX-50 forms an ionic crystal in which the unit cell contains two bistetrazole dianions {c-((NO)N3C)-[c-(CN3(NO)], formal charge of ?2} and four hydroxylammonium (NH3OH)+ cations (formal charge of +1). We report here quantum mechanics (QM)-based reaction studies to determine the atomistic reaction mechanisms for the initial decompositions of this system. First we carried out molecular dynamics simulations on the periodic TKX-50 crystal using forces from density functional based tight binding calculations (DFTB-MD), which finds that the chemistry is initiated by proton transfer from the cation to the dianion. Continuous heating of this periodic system leads eventually to dissociation of the protonated or diprotonated bistetrazole to release N2 and N2O. To refine the mechanisms observed in the periodic DFTB-MD, we carried out finite cluster quantum mechanics studies (B3LYP) for the unimolecular decomposition of the bistetrazole. We find that for the bistetrazole dianion, the reaction barrier for release of N2 is 45.1 kcal/mol, while release of N2O is 72.2 kcal/mol. However, transferring one proton to the bistetrazole dianion decreases the reaction barriers to 37.2 kcal/mol for N2 release and 59.5 kcal/mol for N2O release. Thus, we predict that the initial decompositions in TKX-50 lead to N2 release, which in turn provides the energy to drive further decompositions. On the basis of this mechanism, we suggest changes to make the system less sensitive while retaining the large energy release. This may help improve the synthesis strategy of developing high nitrogen explosives with further improved performance
    • …
    corecore