82 research outputs found

    Video annotation by crowd workers with privacy-preserving local disclosure

    Get PDF
    Advancements in computer vision are still not reliable enough for detecting video content including humans and their actions. Microtask crowdsourcing on task markets such as Amazon Mechnical Turk and Upwork can bring humans into the loop. However, engaging crowd workers to annotate non-public video footage risks revealing the identities of people in the video who may have a right to anonymity. This thesis demonstrates how we can engage untrusted crowd workers to detect behaviors and objects, while robustly concealing the identities of all faces. We developed a web-based system that presents obfuscated videos to crowd workers, and provides them with a mechanism to test their hypotheses about what behaviors and/or objects might be present in the videos. Our system, called Fovea, works by initially applying a heavy median blur to the videos. This guarantees privacy but impedes recognition of other content of interest. An algorithm was developed as a part of this thesis to calculate the radius of a safe-to-reveal region around a pixel. It was implemented into an interactive system that allows workers watching the blurred videos to selectively reveal small regions by clicking. We compared two approaches for local disclosure of information–foveated mode and keyhole mode–together with a non-interactive blur-only mode as a control. The results showed that both modes led to superior recognition of actions while keeping the odds of correct face recognition close to that of the control

    Common Mechanism for Detecting Multiple DDoS Attacks

    Get PDF
    An important principle of an internet-based system is information security. Information security is a very important aspect of distributed systems and IoT (Internet of Things) based wireless systems. The attack which is more harmful to the distributed system and IoT-based wireless system is a DDoS (Distributed Denial of Service) attack since in this attack, an attacker can stop the work of all other connected devices or users to the network. For securing distributed applications, various intrusion detection mechanisms are used. But most existing mechanisms are only concentrated on one kind of DDoS attack. This paper focuses on the basic architecture of IoT systems and an overview of single intrusion detection systems. This paper presents a single detection method for different DDoS attacks on distributed systems with an IoT interface. In the future, the system will provide support for detecting and preventing different DDoS attacks in IoT-based systems

    An Experimental-Numerical Study of Heat Transfer Enhancement in a Minichannel Using Asymmetric Pulsating Flows

    Get PDF
    The development of current and next-generation high-performance electronic devices has led to miniaturization in more densely packed spaces. The increasing power levels have resulted in ever-increasing heat flux densities which necessitates the evolution of new liquid-based heat exchange technologies. Implementation of single-phase cooling systems using pulsating flow is viewed as a potential solution to the problems involving high energy density electronics. This work involves a combined experimental and numerical analysis of pulsating flows in a rectangular mini channel undergoing asymmetric sinusoidal flow pulsation formats. The mini channel design includes a heated bottom section approximated as a constant heat flux boundary by uniformly heating a 12.5 μm thick Inconel foil. Infrared thermography (IRT) is used for thermal measurements of the heated boundary from the hydrodynamically and thermally developed region of the mini channel. A 3-D conjugate heat transfer ANSYS CFX model is used for simulations. Asymmetric sinusoidal pulsating flows in the form of leading and lagging profiles with Womersley number of 2.5 and a flow rate amplitude ratio of 0.5 and 3 are investigated

    Software Piracy Root Detection Framework Using SVM Based On Watermarking

    Get PDF
    Software root piracy detection is tool to use for detect the owner of java software project or unauthorized copy of jar file. Existing system content the licensing mechanism for protecting our software from piracy but by skipping license or cracking that key piracy is done. The proposed system java based piracy detection software tool to overcome from this problem of piracy and find the offender. Proposed system use ‘Watermarking’ is a technique which attempts to protect the software by adding copyright notices or unique identifiers into software to prove ownership. We evaluate the existing Java watermarking systems and algorithms by using them to watermark byte code files. We develop the piracy root detection mechanism in this system. The advantage of this technique is that software watermarking is handled as the knowledge embedded into support vector machine and is closely associated with the program logic. It makes watermark more impossible to be destroyed and removed. We have to apply the watermarking content to the jar files of java software in this system the invisible watermarking is use. The results of the experiment further indicate that the proposed technique is a lightweight and effective software watermarking scheme

    Structural and compositional properties of 2D CH3NH3PbI3 hybrid halide perovskite: a DFT study

    Get PDF
    Two-dimensional (2D) hybrid halide perovskites have been scrutinized as candidate materials for solar cells because of their tunable structural and compositional properties. Results based on density functional theory demonstrate its thickness-dependent stability. We have observed that the bandgap decreases from the mono- to quad-layer because of the transformation from 2D towards 3D. Due to the transformation, the carrier mobility is lowered with the corresponding smaller effective mass. On the other hand, the multilayer structures have good optical properties with an absorption coefficient of about 105 cm−1. The calculated absorption spectra lie between 248 nm and 496 nm, leading to optical activity of the 2D multilayer CH3NH3PbI3 systems in the visible and ultraviolet regions. The strength of the optical absorption increases with an increase in thickness. Overall results from this theoretical study suggest that this 2D multilayer CH3NH3PbI3 is a good candidate for photovoltaic and optoelectronic device applications

    Filtration in OSN for Personalized Message

    Get PDF
    In recent year’s online social network (OSN) is popularly increased day by day in the form of sharing, commenting, posting, tagging messages or other data. Today’s condition about unwanted post or unwanted messages in social networking is very bad thing happens when peoples work on social networking then unwanted malicious data is post by any person on their wall. System provides a safety by providing the variety of filtering method for data. Also system gives security to user when someone is repeatedly post or share unwanted data. Reliability is provided by system to user by giving offline security that reduce user’s efforts in always online to safe from unwanted data from OSN wall. For user provide the facility to create a blacklist (BL) which is for block a person for particular duration when he/she irritate from that person’s vulgar messages. Whenever user sends a message or comment on another user wall against his/her wish then recipient user does him/her in blacklist. All this things also covered by Undo function and User can able to undo message. System include two sections that for both peoples in this way those who don’t like unwanted or malicious data and those who want malicious data. Short text classification method is use for finding or filtering malicious data. Stemmer algorithm is use filtered data for word comparison and finding unnecessary data and stop word algorithm use for blocking unwanted words from user OSN wall

    Geo-Sensor Network System for Industrial Pollution Monitoring

    Get PDF
    Air pollution is a major environmental health problem in today’s life. For pollution free environment it’s necessary to monitor the environment phenomena by using Environment Observation and Forecasting System (EOFS). An air pollution monitoring system provides a context model which is use for understanding status of pollution in air. System provides acquisition policy which contains corporate actions against pollution problem. Pollution status is calculated by measuring amount of CO2, NO2 and SO2 in air. Depending on context model condition provides safety guidelines and alarm facility. System provides a flexible sampling interval. As per context model pollution condition the interval is change. It also use for saving batteries of geo-sensors

    Wireless Sensor Network using DRINA

    Get PDF
    On demand routing protocols give climbable and price effective solutions for transferring packets in mobile spontaneous networks (MANET). A wireless detector network could be a assortment of distributed nodes to watch and additionally to transmit their information from detector network to a sink node. In wireless detector network, detector nodes area unit set close to every different and additionally act with one another through information routing. In wireless detector network, the information routing takes place in non-aggregated manner would force a lot of energy. Energy conservation is that the major issue in wireless detector network. During this work we have a tendency to propose jury-rigged information routing with in-network aggregation formula which may address this energy consumption issue. It uses information aggregation technique and it will be effective in routing. so information aggregation is beneficial for increasing information accuracy, elimination of information redundancy, and reduction of communication load alongside reducing energy consumption

    Decentralized Anonymous User Authentication For Securing Data Storage in Cloud

    Get PDF
    The main objective of system is secure data storage on clouds. Cloud checks the authentication of the user without knowing the user’s identity. For encryption use Attribute Base Encryption algorithm (ABE) in which encryption is takes place and also set access policies. Decryption is only possible for valid users in Access control policy. System prevents replay attacks because of Attribute Base Signature algorithm (ABS) and provides the facilities for creation, modification, and reading data stored in the cloud. This scheme provides facility for user revocation by that user cannot access the data. Therefore, emphasize that cloud should take a decentralized approach which is robust instead of using access control schemes designed for clouds which are centralized. In this scheme there is one limitation is that the cloud already know the access policy for each record or user stored in the cloud. In future, system can also hide the attributes and access policy of a user. DOI: 10.17762/ijritcc2321-8169.15010
    • …
    corecore