book of abstracts - giapjournals.orgbook of abstracts [information technology related projects &...
TRANSCRIPT
Book of Abstracts[Information Technology Related Projects & Help]
Edited by
Vijay T Raisinghani, PhD
Ketan D Shah, PhD
Pintu R Shah
Pratidnya S Hegdepatil
Department of Information Technology
Mukesh Patel School of Technology, Management and Engineering
NMIMS (Deemed to be University), Mumbai
GYANDHARA INTERNATIONAL
ACADEMIC PUBLICATIONS,
THANE, INDIA
Book of Abstracts Edited by Vijay T Raisinghani, Ketan D Shah, Pintu R Shah, Pratidnya S Hegdepatil
© Copyright lies with Editors and Compilers of this book
All rights reserved. No part of this publication may be reproduced or transmitted, in any form or by any means, without permission. Any person who does any unauthorized act in relation to this publication shall be liable to criminal prosecution and civil claims for damages
First Edition, November 2013
Gyandhara International Academic Publications (GIAP)
Thane, Maharashtra California
New Delhi Oman
Allahabad
ISBN: 9788192578187
Publisher: Gyandhara International Academic Publications (GIAP)
www.giapjournals.com
Email: [email protected]
Contact: +968 9712 4850
Disclaimer
The views and contents of this book are solely of authors only. This book is being sold on the condition and understanding that its contents are merely for information and reference.
The author and publisher specifically disclaim all and any liability for any loss, damage, risk, injury, distress etc. suffered by any person, whether or not a purchaser of this book, as a consequence whether direct or indirect, of any action taken or not taken on the basis of the contents of this book.
The publisher believes that the contents of this book do not violate any existing copyright / intellectual property of others in any manner what so ever. However, in the event the author has been unable to track any source and if any copyright has been inadvertently infringed, please notify the publisher in writing for corrective action.
This Work has been compiled by following faculties of Department of Information Technology, Mukesh Patel School of Technology, Management and Engineering, NMIMS (Deemed to be University), Mumbai, India:
Anuja Ajay
Ashwini Rao
Nikita Bhandari
Pallavi Rao
Rejo Mathew
Sanjay Sange
Shubhra Goyal Jindal
Sulalah Mirkar
Surabhi Thatte
CONTENT LIST
Name of Compilers
Chapter 1: Two factor authentication using Mobile phone1.1 Abstract 1
1.2 Details / Working 1
1.3 Advantages of Two Factor Authentication 2
1.4 Limitations of Two Factor Authentication 2
1.5 Conclusion and Future Work 2
Chapter 2: Human Ear Identification using vector quantization algorithms2.1 Abstract 4
2.2 Details 4
2.3 Advantages of Ear Biometrics 5
2.4 Conclusion 6
Chapter 3: Audio Fingerprinting3.1 Abstract 7
3.2 Details / Working 7
3.3 Haitsma and Kalker’s Algorithm 8
3.4 Avery Wang Shazam Algorithm 8
3.5 Philips Robust Hashing Algorithm 8
3.6 Proposed algorithm 9
3.7 Conclusion 10
3.8 Future Work 10
Chapter 4: Authentication using graphical password and sound signature4.1 Abstract 11
4.2 Details / Working 11
4.3 Major Design and Implementation Issues 13
4.4 Conclusion 13
4.5 Future Work 14
Chapter 5: Information Hiding5.1 Abstract 15
5.2 Details / Working 15
5.3 Key generation algorithm 16
5.4 Conclusion 17
5.5 Future Scope 17
Chapter 6: HCI for Semi-Literate and Illiterate6.1 Abstract 19
6.2 Details 19
6.3 Design Principle 19
6.4 Conclusion 20
Chapter 7: Sequential pattern mining using intelligent tutoring agent7.1 Abstract 22
7.2 Details / Working 22
7.3 Conclusions 24
Chapter 8: Importance of social Networking in mobile Application understood by developing a student planner8.1 Abstract 25
8.2 Details / Working 25
8.3 Major Features 27
8.4 Conclusion 28
8.5 Future Works 28
Chapter 9: Real Time Server Monitoring9.1 Abstract 30
9.2 Details / Working 30
9.3 Conclusion 31
9.4 Future scope 32
Chapter 10: Mac Protocol Tutor 10.1 Abstract 33
10.2 Details / Working 33
10.3 Conclusion and Future scope 35
Chapter 11: Cross Platform mobile Dashboard11.1 Abstract 36
11.2 Details / Working 37
11.3 Conclusion and Future Work 38
Chapter 12: Programmable Industrial Robotic Arm12.1 Abstract 40
12.2 Details / Working 40
12.3 Advantages 41
12.4 Conclusion 41
12.5 Future enhancement 42
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 1
1. Two factor authentication using Mobile phoneDomain: Network Security
Keywords: Credential Theft attacks, two factor authentications, SMS gateway.
Technologies used: Visual Basic 2008, MySQL.
1.1 Abstract: Two factor authentications is an approach to authentication which requires the
presentation of two or more of three authentication factors.
Three factors are:
1) something the user knows
2) something the user has
3) something user is
Traditional authentication schemes use username and password to authenticate users which
provides minimal security. In two factor authentication something user has component is
provided by small token card. Two factor authentication seeks to decrease the probability that the
requestor is presenting false evidence of its identity.
1.2 Details / Working:1. The Signup: The user shall first have to enroll himself into the application. The
registration form will require three important basic fields – username, password and
mobile number. There are some other secondary fields as well, including address, email
id, name, image, etc. On successful registration, the user shall receive a one-time
password on his registered mobile phone. This serves the purpose of authenticating the
mobile phone as claimed by the user. Once, phone number is authenticated, the user is
successfully enrolled.
2. The application in action: The process starts when the client accesses the application
and logs in to his account. The first factor of authentication is proved by the client when
the client inserts his password. The server checks if the password entered is correct by
matching the entered password with the password in the database. If the two passwords
match, then the server initiates the one-time password generator, for the second factor of
authentication.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 2
The password is sent to the GSM modem connected to the server. Here, the work of
modem comes into action. The modem converts the one-time password into a SMS and
sends to the user’s mobile phone.
3. The final result: The user then enters the one-time password on the application, the
server matches with the one-time password that it had generated and transferred. If the
passwords match, then the user successfully qualifies the second factor of authentication
as well and it becomes sure that the user is genuine.
1.3 Advantages of Two Factor Authentication:1. Enhances security of private data and information by requiring two factors for
authentication.
2. Reduces the risk of weak passwords.
3. The use of mobile phones eliminates the requirement of several tokens for authentication
over different accounts.
4. It eliminates several passive and active attacks which only username-password
combination was vulnerable to.
1.4 Limitations of Two Factor Authentication:1. The system implementation can be slightly costly.
2. The users may not be willing to go through the process.
3. Two factor authentication, although, protects from several usual attacks, it cannot protect
from attacks such as man-in-the middle. Fake websites by fraudsters could deceive users
from entering their credit card numbers and such details.
4. If the attacker has access to the computer itself, then if the user tries to access some
website, then the attacker can piggybank the details. Such cases cannot be eliminated by
two factor authentication either.
1.5 Conclusion and Future Work:The project successfully enrolled new users and authenticated their registered mobile numbers
for genuine enrollments. The project even implemented the concept of two factor authentication
successfully. Authentication of the user on the basis of generated one time password was done.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 3
The project has a vast scope for strengthening in the future. The security can be made stronger by
using newly developed random number generators. The security can be strengthened by adding
some hardware functionality, such as Radio Frequency ID and NFC technology. The project can
also be made more authenticate by adding more factors for authentication.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 4
2. Human Ear Identification using vector quantization algorithmsDomain: Biometrics
Keywords: Ear biometric, edge detection, image processing, vector quantization
Technologies used: MATLAB
2.1 Abstract: Biometrics refers to the identification of humans by their characteristics or traits.
It has become popular as a means of personal identification. A major challenge of personal
identification system is to provide secure access to authorized users. Biometric provides an
efficient solution to this problem.
Ear is relatively new class of biometrics. Researchers have found that the features and shape of
the ear are unique for each individual and remain unchanged with age, which has made ear a
biometric trait. Several approaches have been proposed for ear recognition.
Vector quantization has been used in a number of applications such as speech recognition, face
detection, pattern recognition, speech data compression, image segmentation and content based
image retrieval. In this project, several VQ algorithms such as:
Linde-Buzo-Gray(LBG),
Kekre’s proportionate Error (KPE)
Kekre’s Fast codebook Generation (KFCG)
Kekre’s Error Vector Rotation (KEVR) and
Kekre’s Median Codebook Generation (KMCG)
are used to classify human ears and their performance will be compared.
The algorithms will be implemented using varying number of clusters and based on the results
generated their accuracy will be compared.
2.2 Details:Biometrics refers to identification of human by their characteristics and behaviour. There are
different human traits that can be used by a biometric system such as face, fingerprint, iris, voice,
speech, hand geometry and retina. The selection of a particular biometric trait for use in a
specific application involves the following factors.
Universality means that trait should be possessed by every person using a system.
Uniqueness means how well the trait distinguishes an individual from another.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 5
Permanence means how the trait changes with time.
Measurability (collectability) means how easy it is to acquire the trait.
Performance indicates the accuracy, speed, and robustness of technology used.
Acceptability means the degree of public’s approval to the technology.
Circumvention means how easily a trait might be imitated using a substitute.
Biometric verification is the methodology by which a person can be identified uniquely by
evaluating one or more distinguishing biological traits. Whatever be the biometric methodology,
the identification verification process remains the same. A record of a person's unique
characteristic is captured and kept in a database. When identification verification is required, a
new record is captured and then it is matched with the previous record in the database. If the data
in the new record matches the data that is maintained in the database then the person’s identityis
confirmed.
A benefit of using biometrics is that people are relieved from the burden of remembering
passwords or changing passwords frequently. Also it safeguards against intruders and password
cracking softwares on the internet. Thus it provides an efficient and reliable security solution to
the password-based security systems.
Ear Biometrics:
Ear biometric system is a recognition system where the input image is condensed to a set of
features which are used for comparison with the feature sets of other image to determine the
identity.
2.3 Advantages of Ear Biometrics: Ear does not vary with age and thus is a stable biometric.
It has unique shape and geometry.
It has all the factors that are required to be a biometric trait.
The features of the ears are fixed and unchangeable as it is unaffected by emotions and
expressions of a person.
The distribution of colour is uniform in the ear and thus not much information is lost
while working with the grey scale image or binary image.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 6
As ears are small in size it becomes faster to work with greater efficiency even with the
low resolution images.
Also ear images cannot be changed by makeup, nor glasses.
Ear biometric system has two possible modes of operation:
Verification Mode: In this mode, the subject claims an identity. The input ear image is
then compared against the subject’s claimed identity in order to validate the claim.
Identification Mode: In this mode, the subject does not claim an identity. The input image
is compared to a set of labeled images in the database so as to determine the best match
(its identity).
2.4 Conclusion:The highest accuracy is observed for KFCG algorithm. In LBG, the clusters are elongated at
1350 with the horizontal axis resulting in inefficient clustering. The problem is solved to some
extent by KPE but the variation is limited to only + and - 450. In KEVR, error vector is rotated in
k-dimensional space thereby increasing clustering efficiency. In KMCG, median of the sorted
matrix is computed and all training vectors above the median are grouped into the first cluster
and training vectors below the median in the second cluster. This results in imbalanced
clustering. This problem is solved using KFCG. The centroid of the training set is computed. The
first element of training vector is compared with first element of centroid and based on the
comparison two clusters are formed in the first iteration. As a result, clustering is more balanced
than KMCG. KFCG takes lesser time to generate codebook compared to the above algorithms. In
LBG, KPE and KEVR, Euclidean distance needs to be computed every time. KMCG also
involves certain degree of complexity to implement sorting technique.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 7
3. Audio FingerprintingDomain: Biometrics
Keywords: Content Based Audio Identification
Technologies used: MATLAB
3.1 Abstract: The objective of the work is to build an audio fingerprinting system which can
be used to identify songs efficiently from large database with limited computing. Audio
fingerprinting is the technique in which each song after being processed can be identified by a
sequence of bits which can be uniquely used to determine a particular song. An audio fingerprint
thus essentially plays the role of a hash function that maps an audio object of a large number of
bits to a ‘fingerprint’ of only limited number of bits.
By matching the fingerprint of the audio input with the existing database, audio fingerprinting
technique can be used to identify unlabeled audio in wave (.wav) format. The ability to do so has
various applications like:
1. In the field of broadcast monitoring for detection of copyright infringement.
2. Building smart plug-in to identify and fetch the meta data of unlabeled audio content.
3. P2p filtering by identifying and preventing transfer of copyrighted material from being
transferred between a pair of peers.
4. Identifying foreign language content which cannot be identified via the normal textual
search engines
We aim to successfully implement a fingerprinting technique which can be used to identify a
particular song via fingerprint matching against a given database by providing an audio input of
the song in the wave format, using MATLAB.
3.2 Details / Working:Audio Fingerprinting is a technique which can be used to identify audio from the signal directly,
instead of the tags or the file names or other metadata. Such a technology can not only be used
for tagging unlabeled audio or for identifying tracks but also for more serious applications like
broadcast monitoring.
Existing Audio Fingerprinting Schemes and Algorithms:
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 8
3.3 Haitsma and Kalker’s Algorithm:The process followed in this algorithm is briefly explained below:
This algorithm has fingerprint extraction scheme that is based on a general streaming
approach.
An audio signal is framed into windows of 370ms length for every 11.6ms.
Then the FFT is computed and this is stored into 32- bit sub Fingerprints.
The unidentified audio sample should be of 3-30 seconds in length doe the algorithm to
provide a match.
3.4 Avery Wang Shazam Algorithm:The process followed in this algorithm is briefly explained below:
This algorithm makes use of a spectrogram.
The spectrogram is the squared magnitude of the STFT(Short-Time Fourier Transform)
The spectrogram is divided into small sizes called windows or frames.
This algorithm uses the peaks in the frame ad form spectral pair landmarks.
The local maxima within a defined section are grouped into pairs.
Then the hash values are computed.
It is then compared with the entry.
The one with the most hits is returned as a match.
Generally more than 9 spectral peaks is considered as a match.
3.5 Philips Robust Hashing AlgorithmThere are two steps in the PRH algorithm:
Fingerprint extraction
Database searching
Steps followed:
The audio signal is divided into overlapping frames with length of about 370 ms,
and the frame shift is 1/32 of the frame length.
Power spectrum is obtained by performing FFT; then the energies for 33 nonoverlapping
logarithmically spaced subbands covering the frequency range from
300 Hz to 2000 Hz are calculated.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 9
Hash strings (referred to as subfingerprints) are computed from the sub and energies in each
frame as follows:
ED(n,m)=E(n,m)-E(n,m+1)-(E(n-1,m)-E(n-1,m+1) ………………..(1)
F(n)=[F(n,0)……F(n,31)] …………………………………………..(2)
F(n,m)=1, ED(n,m)>0
F(n,m)=0, ED(n,m)<=0 .…………………………………………...(3)
Where:
E(n,m)= mth subband energy in the nth frame
ED(n,m)= output difference
F(n)= 32-bit subfingerprint of a frame n
F(n,m)= mth bit of subfingerprint of frame n
For Database:
For the audio files stored in the database, all the subfingerprints computed are registered in a
hash table with the subfingerprints being treated as the keys.
Each entry of the hash table stors a list of pointers to the positions in the audio files where the
sub fingerprint occurs.
3.6 Proposed algorithm:The first three parts, i.e., framing, FFT and band energy calculation are the same as those in the
PRH algorithm.
Before computing the hash strings, DCT is performed on the L consecutive sub and energies.
DCT is applied to the temporal sequence of energies in each subband, and a subfingerprint is
constructed for each DCT coefficient stream.
Among the L DCT coefficients, only the lower-ordered K values are retained for the
computation of subfingerprints.
The subfingerprints extracted from the database are registered in hash tables to enable an
efficient searching algorithm. Since K subfingerprints are computed for each frame, K hash
tables are constructed.
For example- the subfingerprints obtained from the second DCT coefficients in each frame are
registered in the second hash table.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 10
3.7 Conclusion:The algorithm was successfully tested on a small dataset for returning a match. The results were
encouraging and we are motivated to test the system with a much larger dataset.
3.8 Future Work: As mentioned previously, the algorithm should be tested on a larger dataset and with several
levels of signal degradation before making a conclusive comment on its efficacy.
Thus far, the work which we did was mainly concentrated on audio fingerprinting for song
recognition. The concept of fingerprinting of files can be further extended to include non-audio
files as well. Audio Fingerprinting has extensive research potential and we have only scratched
its surface.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 11
4. Authentication using graphical password and sound signatureDomain: Information security
Keywords: Cued Click Points, graphical password, Pass face technique, pass point system.
Technologies used: Java, J2SE, MySQL
4.1 Abstract: Here a graphical password system with a supportive sound signature to increase
the remembrance of password is discussed. Here a click-based graphical password scheme called
Cued Click Points (CCP) is presented. In this system password consists of sequence of some
images in which user can select one click-point per image. In addition user is asked to select a
sound signature corresponding to each click point on an image. Research says that CCP is more
preferred to pass Points, because selecting and remembering only one point per image was easier
and sound signature helps considerably in recalling the click points.
4.2 Details / Working: In the proposed work we have integrated sound signature to help in recalling the password. No
system has been developed so far which uses sound signature in graphical password
authentication. Study says that sound signature or tone can be used to recall facts like images,
text etc. In daily life we see various examples of recalling an object by the sound related to that
object. Our idea is inspired by this novel human ability.
Profile of Vectors:
The proposed system creates user profile as follows- Master vector - (User ID, Sound Signature
frequency, Tolerance) Detailed Vector - (Image, Click Points) As an example of vectors - Master
vector (Smith, 2689, 50) Detailed Vector enters User ID and select one sound frequency which
he want to be played at login time, a tolerance value is also selected with will decide that the user
is legitimate or an imposter. To create detailed vector user has to select sequence of images and
clicks on each image at click points of his choice. Profile vector is created. After creation of the
login vector, system calculates the Euclidian distance between login vector and profile vectors
stored. Euclidian distance between two vectors p and q is given by- Above distance is calculated
for each image if this distance comes out less than a tolerance value D. The value of D is decided
according to the application. In our system this value is selected by the user.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 12
Cued Click Points:
Cued Click Points (CCP) is a proposed alternative to Pass Points. In CCP, users click one point
on each of c = 5 images rather than on five points on one image. It offers cued-recall and
introduces visual cues that instantly alert valid users if they have made a mistake when entering
their latest click-point (at which point they can cancel their attempt and retry from the
beginning). It also makes attacks based on hotspot analysis more challenging. Each click results
in showing a next-image, in effect leading users down a path as they click on their sequence of
points. A wrong click leads down an incorrect path, with an explicit indication of authentication
failure only after the final click. Users can choose their images only to the extent that their click-
point 4 Cued Click Points dictates the next image. If they dislike the resulting images, they could
create a new password involving different clickpoints to get different images. We envision that
CCP fits into an authentication model where a user has a client device (which displays the
images) to access an online server (which authenticates the user). We assume that the images are
stored server-side with client communication through SSL/TLS. For implementation, CCP
initially functions like Pass Points. During pass-word creation, a discretization method is used to
determine a click-points tolerance square and corresponding grid. For each click-point in a
subsequent login attempt, this grid is retrieved and used to determine whether the click-point
falls within tolerance of the original point. With CCP, we further need to determine which next-
image to display. Similar to the Pass Points studies, our example system had images of size
451x331 pixels and tolerance squares of 19x19 pixels. If we used robust discretization, we would
have 3 overlapping candidate grids each containing approximately 400 squares and in the
simplest design, 1200 tolerance squares per image (although only 400 are used in a given grid).
We use a function f(username, current Image, current Tolerance Square) that uniquely maps each
tolerance square to a next-image. This suggests a minimum set of 1200 images required at each
stage. One argument against using fewer images, and having multiple tolerance squares map to
the same next-image, is that this could potentially result in misleading implicit feed-back in
(albeit rare) situations where users click on an incorrect point yet still see the correct next-image.
Each of the 1200 next-images would have 1200 tolerance squares and thus require 1200 next-
images of their own. The number of images would quickly become quite large.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 13
4.3 Major Design and Implementation Issues:Security In the above section, we have briefly examined the security issues with graphical
passwords. One of the main arguments for graphical passwords is that pictures are easier to
remember than text strings. Preliminary user studies presented in some research papers seem to
support this. However, current user studies are still very limited, involving only a small number
of users. We still do not have convincing evidence demonstrating that graphical passwords are
easier to remember than text based passwords. A major complaint among the users of graphical
passwords is that the password registration and login process take too long, especially in
recognition-based approaches. For example, during the registration stage, a user has to pick
images from a large set of selections. During authentication stage, a user has to scan many
images to identify a few pass images. Users may find this process long and tedious. Because of
this and also because most users are not familiar with the graphical passwords, they often find
graphical passwords less convenient than text based passwords. Reliability is the major design
issue for recall-based methods is the reliability and accuracy of user input recognition. In this
type of method, the error tolerances have to be set carefully overly high tolerances may lead to
many false positives while overly low tolerances may lead to many false negatives. In addition,
the more error tolerant the program, the more vulnerable it is to attacks. Storage and
communication Graphical passwords require much more storage space than text based
passwords. Tens of thousands of pictures may have to be maintained in a centralized database.
Network transfer delay is also a concern for graphical passwords, especially for recognition-
based techniques in which a large number of pictures may need to be displayed for each round of
verification.
4.4 ConclusionPasswords are used for Authentication (Establishes that the user is who they say they are).
Authorization (The process used to decide if the authenticated person is allowed to access
specific information or functions) and Access Control (Restriction of access-includes
authentication authorization). Mostly user select password that is predictable. This happens with
both graphical and text based passwords. Users tend to choose memorable password which
becomes easier for attackers to guess. Thus we have tried and implemented a novel approach
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 14
which uses sound signature to recall graphical password click points. This system is helpful
when user is logging after a long time.
4.5 Future Work The future work of our project is improving the efficiency of the system. This can be done by
further analyzing the Profile vectors generated. Also efforts have to be made to reduce the
system tolerance up to such a level that it improves system efficiency and does not increase user
difficulty. Based on the security analysis done measure can be taken so as to improve the
security of the system. Also such a system can be built for mobile phones, tablet PC’s etc. Cross
platform independence can be worked upon which can form a major part of future scope. Also
the developed system can be further improved by add features like sense of touch.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 15
5. Information HidingDomain: Information security
Keywords: Cryptography, Steganography.
Technologies used: .NET, MS-SQL server 2008
5.1 Abstract: The project derives its life from the basic need of users to keep their message
secret.
Objective of this project is:
To produce security tool based on stenography technique.
To explore techniques of hiding data using encryption and stenography module
To extract techniques of getting secret data using decryption and de-stego module
5.2 Details / Working:Since the rise of the Internet one of the most important factors of information technology and
communication has been the security of information. Everyday tons of data are transferred
through the Internet through e-mail, file sharing sites, social networking sites etc to name a few.
As the number of Internet users rises, the concept of Internet security has also gain importance.
Hence, to protect or secure the confidential data we have to use some sort of security. We came
with the idea of creating a project that could hide text into normal images.
The major use of steganography is basically when secret data needs to be sent over internet. It
also helps Military, industrial organizations to hiding the data from the becoming known to the
people out of the organization or an unwanted user.
Steganography in civilian engineering applications can help add new functionality to legacy
protocols while maintaining compatibility (the security aspect is subordinated in this case). Some
steganography techniques are also applicable in digital rights management systems to protect
intellectual property rights of media data. However, this is mainly the domain of digital
watermarking, which is related to but adequately distinct from pure steganography to fall beyond
the scope of this book.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 16
Both areas are usually subsumed under the term ‘information hiding’ Progress in steganography
is beneficial from a broader academic perspective because it is closely connected to an ever
better understanding of the stochastic processes behind cover data, i.e., digital representations of
natural images and sound. Refined models, for whatever purpose, can serve as building blocks
for better compression and recognition algorithms.
Steganography is interdisciplinary and touches fields of computer security, particularly
cryptography, signal processing, coding theory, and machine learning (pattern matching).
Steganography is also closely connected (both methodologically but also by an overlapping
academic community) to the emerging field of multimedia forensics. This branch develops and
challenges methods to detect forgeries in digital media.
The application uses the RSA algorithm for two reasons. First, by using a public key algorithm
the need for a private shared key between the sender and recipient of the data is eliminated.
Shared keys are impractical because they require a secure way of distributing the key to every
person who you may want to communicate with. A public key for a person can be distributed
fairly easily by publishing it on a website, or by emailing it to people you expect would need to
send you secret information. Second, the RSA algorithm is also widely known and demonstrably
secure if large enough prime numbers are used to generate the keys.
5.3 Key generation algorithm: 1. Generate two large random primes p and q, of approximately equal size such that their product
n= pq is of their required bit length, e.g. 1024 bits
2. Compute n= pq
3. Choose an integer e,relatively prime to (p-1)(q-1)
4. Denote e by d
5. ed=1 mod (p-1)(q-1)
6. Compute the secret exponent d,a<d<phi, such that ed=1(mod phi)
7. The public key is (n, e) and the private key is (n, d). Keep all the values d, p, q.
n is known as modulus
e is the encryption exponent
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 17
d is the decryption exponent
Now, RSA key pair consists of Public key :( n, e) and Private Key: d
Encryption
1. Obtain recipients public key (n, e)
2. Cipher text C=M^e mod N where M is message
Decryption
1. Use private key(n, d) to compute M=C^d mod N
2. Extract the plaintext from message M
5.4 Conclusion: The proposed approach in this project uses a new steganography approach called image
steganography. The application creates a stego image in which the personal data is
embedded and is protected with a password which is highly secured.
The main intention of the project is to analyze the various steganography algorithms and
develop a steganography application using those algorithms such that it provides good
security. The proposed approach provides higher security and can protect the message
from stego attacks. The image resolution doesn’t change much and is negligible when we
embed the message into the image and the image is protected with the personal password.
So, it is not possible to damage the data by unauthorized personnel.
5.5 Future Scope: In this application, we are using 24- bit bitmap images as carrier image. Since LSB embedding
technique has been used in our steganography tool we have to use the image formats which fall
under image domain. Thus, we can add .GIF type images as carrier image to hide the secret
message.
Furthermore, we can also use JPEG images which fall under the transform domain of an image
type. But to do so, we need to use different technique for hiding secret message behind an image
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 18
because .jpeg image is compressed form of an image and thus we cannot use LSB embedding
technique.
We can also add the feature which will embed the message behind an audio file or video file.
Furthermore, we can optimize the code so that more images will be added in the database and
application will run efficiently.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 19
6. HCI for Semi-Literate and IlliterateDomain: Human Computer Interaction
Keyword: Interface Design, Mobile Interface
Technologies used:
6.1 Abstract: The purpose of the Human computer interface project is to create a set of
guidelines and applications that would be useful for the semi-literate and illiterate. The
applications are made on android platform, and much of the design considerations in this project
focus on building accessible interfaces for the android device.
6.2 Details:Interaction Design and Principle:
The application that has good interface creates good impact, understanding and consciousness
among the users for guiding them in different dimensional modes for achieving their goals.
The effective design presents the organization of objects which communicate information to a
target user. According to, the primary focus of designing goals decrease the intellectual visual
memory, and motor work and also reduce the technological instruction that put burden on the
user.
The design mainly concerns the end users to interact with the system in the organization. The
following profile factors of end user plays an important role in user interface development:
1. Age—and the indirect cultural influences and education levels
3. Life experiences—and family background
3. Language—words, tone and usage
4. Visual literacy—understanding level of symbols and metaphors.
6.3 Design Principle1. Learnability
An interface should be easy to use for the user. The amount of functionality on the interface
should be limited to exactly what the user will need.
2. Efficiency
Key tasks on your interface should be as efficient as possible.
3. Memorability
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 20
The interface should become easier and easier to use each time the user interacts with it.
4. Simplicity
Usual tasks should be easy and less common tasks should be possible in a good UI. Unnecessary
functionality is avoided and the visual design and layout is uncluttered so even the clumsiest of
thumbs can maneuver easily.
5. Visibility
Understanding the user's end goal is critical for good visibility on a interface. Important
information should be the most visible and less important information should be less visible.
Generally most common design principle such as Visibility, Consistency, Familiarity,
Affordance, Navigation, Control, Feedback, Recovery, Constraints, and Flexibility, are normally
concerned to the development process.
The main focus of visibility is to ensure the things that are clearly seen to users in the provided
interface for better understanding. Familiarity is concern the language, to make system more
memorable with user. Affordable means display in a way that makes clear understanding such as
links and buttons presents their meaningful message to user. Through Navigation, the users allow
to move everywhere in the system. Control gives access permission to the users.
User received quick feedback from the system through Feedback method. Through Recovery, the
user recover the system from error or mistake when occur while the Constraints prevent them
from improper actions. Flexibility permits different approaches to do things for learning reasons.
The style of interface should be attractive and smart that makes a friendly association between
users and system.
Mobile Phone Interface Design:User Interface defined as aggregate means through which a user communicates with a system.
The user interface is an important component of any program because it determines how easily
you can interact with the system. Software interface focus on the designing of the menus such as
color, font size, navigation logic and application.
6.4 Conclusion:Helping illiterate users operate a computing device is a difficult problem that unravels more
layers of complexity as it is explored. During the design process, it was discovered how
profoundly the various types of literacy challenges complicate a user’s ability to interact with a
traditional interface. Aside from the most obvious problem that users would have reading pages
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 21
of textual information for themselves, users would encounter difficulties interacting with
interface buttons and menus, recognizing and understanding numerical information, browsing
lists of options to make a selection, determining the status of the device from inspecting the
screen, taking information away from the device, and interacting with labeled graphical elements
like maps, diagrams, and charts. While the initial issue of users not being able to read paragraphs
of text can be addressed via the addition of speech project screen reading software, the other
challenges mentioned above require more profound modifications to the user-interface. The fact
that these users would also have little or no familiarity with computer systems places an even
larger burden on the interface designer.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 22
7. Sequential pattern mining using intelligent tutoring agentDomain: Database mining
Keyword: Sequential pattern mining
Technologies used: ASP.net, C#, SQL
7.1 Abstract: The intelligent agents fundamentally work with respect to pre-obtained domain
knowledge. The basic need of intelligent tutoring agents is to guide or provide feedback in
problem solving situations based on the procedural domain knowledge. Our ITA needs as
appropriate method for considering factors associated with specific operating conditions. So, we
propose integrating a data-mining process called sequential pattern – mining into an ITA to
exploit the huge amount of data that human users produce.
Our approach involves collection of user data like user interest, habits, priorities etc; as an input
to the Agent. The agent uses this information in helping the user in finding the desired
information by analyzing the user’s interest and priorities along with user’s requirements and
based on it, provides the best possible answer. It also guides the user to attain the suggested
result by providing a detailed description to attain it.
7.2 Details / Working:The Intelligent Agents fundamentally work with respect to the pre-obtained domain knowledge.
The basic need of Intelligent Tutoring Agents is to guide or provide feed back in Problem-
Solving situations based on the procedural domain knowledge. There is considerably number of
methods for providing the ITAs with the Domain Knowledge like expert systems, cognitive task
analyses, and constraint-based modeling approaches. However, these methods are complicated
and difficult to use or don‘t work in ill-defined domains. Our ITA needs an appropriate method
for considering factors associated with specific operating conditions. So, we propose integrating
a data-mining process into an ITA to exploit the huge amount of data that human users produce
during problem solving. This approach allows the ITA to gain useful problem-solving
knowledge automatically. These include dynamic data production, given that new data is
constantly gathered, the temporal dimension of events, actions with parameters, and so on. These
factors suggest that we need a temporal pattern-mining technique that operates in dynamic
environments. Because no existing temporal pattern-mining algorithms consider all these factors,
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 23
we propose a new sequential pattern-mining algorithm. For this work, we developed a custom
sequential pattern mining algorithm that combines several features from other algorithms,
including accepting time constraints, processing databases with dimensional information, and
eliminating redundancy.
The proposed system include dynamic data production the temporal dimension of events, actions
with parameters, the user‘s profile, the rationality of actions, and so on. These factors suggest
that we need a temporal pattern-mining technique that operates in dynamic environments.
Because no existing temporal pattern-mining algorithms consider all these factors, we propose a
new sequential pattern-mining algorithm. we developed a custom sequential pattern mining
algorithm that combines several features from other algorithms, including accepting time
constraints, processing databases with dimensional information, and eliminating redundancy.
The algorithm takes as input a database D of event sequences and parameters and finds all event
sequences that occur frequently in the database.
An intelligent tutoring system (ITS) is a computer system that aims to provide immediate and
customized instruction or feedback to learners, usually without intervention from a human
teacher. ITSs have the common goal of enabling learning in a meaningful and effective manner
by using a variety of computing technologies. There are many examples of ITSs being used in
both formal education and professional settings in which they have demonstrated their
capabilities and limitations. There is a close relationship between intelligent tutoring, cognitive
learning theories and design; and there is ongoing research to improve the effectiveness of ITS.
Intelligent tutoring systems (ITSs) are complex, integrated systems that apply Artificial
Intelligence (AI) techniques to problems of education and training. In their role as knowledge
communication systems ITSs strive to optimize learning of domain concepts and problem
solving skills by means of adaptive, individualized coached practice on domain tasks.
The system can ask the student questions and it must be able to understand the student's answers,
as well as determine the student's knowledge based on what answers were given. This should
then affect what is presented and what other questions are asked of the student. The student can
ask questions of the system, and so the system should be able to solve problems in the physics
domain.
In terms of the black box definition of an agent in the figure below, an intelligent tutoring system
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 24
has the following as inputs: prior knowledge, provided by the agent designer, about the subject
matter being taught, teaching strategies, possible errors, and misconceptions of the students.
past experience, which the tutoring system has acquired by interacting with students, about
what errors students make, how many examples it takes to learn something, and what students
forget. This can be information about students in general or about a particular
student.
preferences about the importance of each topic, the level of achievement of the student
that is desired, and costs associated with usability. There are often complex trade-offs
among these observations of a student's test results and observations of the student's
interaction (or noninteraction) with the system. Students can also ask questions or
provide new examples with which they want help.
The output of the tutoring system is the information presented to the student, tests the students
should take, answers to questions, and reports to parents and teachers.
7.3 Conclusions:A simple genetic algorithm is developed to find the shortest path routing in a dynamic network.
The developed algorithm uses an efficient coding scheme. The chromosome length depends on
the number of nodes in the network. The coding environment searches the shortest path using
Dijkstra's algorithm as the default one. The algorithm is simulated to solve the network of 10
nodes for the first one as the source node. Also, the developed GA is simulated to find the
solution for the same problem. The obtained results affirmed the potential of the proposed
algorithm that gave the same results as Dijkstra'a algorithm. In the future, the developed GA will
be more investigated to decrease the chromosome length especially for network with a large
number of nodes. Dijkstra‘s is quiet efficient in various routing problems to find the optimal
paths but its limited to small problems consisting of few nodes and shorter routes and is less
efficient when it comes to a large number of nodes and large route as the process becomes slow
and complex. Whereas genetic algorithm is applicable to any kind of routing problem and is
more efficient than compared to Dijkstra‘s algorithm consisting a large number of nodes and
routes.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 25
8. Importance of social Networking in mobile Application understood by developing a student planner.
Domain: Networking
Technologies used: Android SDK, JAVA, XML.
Keyword: Social Networking, android architecture, Google’s cloud Messing Service.
8.1 Abstract: The purpose of this project was to study the importance of social network
accessible from smart phones, which would increase collaboration and dissemination of
information about classroom events on a day to day basis. In order to do so, we strived on
making an Andriod application which serves our purpose. We performed a pre-survey to better
understand social networking needs of students and use this information while developing our
application. In end we discovered some interesting social and some interesting opinion amongst
student body. The current work done in developing the application also laid a stable foundation
for future projects to build upon.
8.2 Details / Working:The introduction of internet just a few decades ago has brought about drastic changes in the way
people live their everyday lives. Over the years, the internet has changed dramatically, going
from a simple source of information, to a search-power juggernaut, and from a single person
experience, to one of the most socially interactive ways to meet and share experiences with
others. In recent years, online social networks have started to thrive, and today the largest social
networks host hundreds of millions of people, allowing new ideas that were never thought
possible to come to fruition.
This project focused on social networking in the context of a college environment using smart
phones. It brought together the social experiences of social networks, the mobility and advanced
capabilities of today’s modern smart phones, and the learning based environment of colleges.
The mobile nature of smart phones allows users to access social networks anywhere they desire
and post about events while attending them. The main objective of this project, was to test the
viability of social networks in a college environment and to see what uses were facilitated by the
introduction of the mobile platform. An overarching objective was to find all student related
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 26
information in one interactive application which would provide an easier way for the students to
stay updated and connected.
The project integrated two core social networking ideas:
Exchange of on-campus event information to allow students to see what events were
happening on campus.
Having multiple users all work together to solve academic problems. Students were able
to ask questions and receive feedback from other students.
By integrating these two core social networking ideas, this project intended to keep students
involved and interested in the mobile social network and allowed new interactions for all
students involved.
The idea was to make an application that acted exactly like any other social networking website
on the computer and featured all of the same functions like finding friends and posting new
content to the network all from the Android application.
The application retrieves all of its information from the back end web service. To do so, it has to
open an HTTP connection between the endpoints through the devices current Wi-Fi or mobile
network connection.
The application primarily uses code already available in Java. All of the HTTP connections and
image downloading is done with standard Java libraries. External libraries include XML and
Json parsers to parse the information retrieved from the API calls. All API calls return a Json or
XML string which then needs to be parsed and the relevant information retrieved.
Student-O is a student friendly application we intended to build to manage a student�s day to
day activities during the busy times of the year. It keeps up-to date with the student�s college
work, grades, to-do�s, teacher�s information, and almost everything else one needs during the
year.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 27
8.3 Major Features Local Notifier: Student-O allows the student to set alarms for Assignments and Reminders. Be
notified of an upcoming test or paper even when the student doesn�t have Student-O open. User
can even set how far in advance they want to be notified.
Assignments: Keep track of all the upcoming work for a period of time. Records the
student�s grades for every assignment and Email assignments to friends. Organize
one�s information however they like it. Keep track of their work on Student-O�s built-
in coded calendar.
Reading and Books repository: Keep track of any reading assignments students have
during the week. Link the reading with a course and any assignments that are related.
Bookmark definitions or important paragraphs so one can go back to them anytime. The
user�s list of books is a great place to keep notes about your text books (like how
expensive they are) and the author.
Reminders: Reminders are available so the user does not forget those daily to-do's that
you need to get done
Courses: Keep track of the course information and teacher contact info. Student-O can
calculate ones grade using a simple point-based grading system or a very highly
customizable weighted system.
Schedule: Student-O lets one record class times no matter what kind of schedule.
Whether weekly or block schedule, Student-O lets the students enter their schedule and
keep track of all their courses.
Teachers: Keep track of the teacher's contact information.Quick access to teacher's office
hours and email.
Live News feed: This is the page the application opens to. This contains all the dynamic
information flow from any user group which is available publicly to that group. The live
feed page helps notify urgent messages to the users and the users become aware of the
events on the campus.
Discussion forum: This functionality essentially allows the users of the group to discuss
issues faced by them or solve academic problems. It allows the user to select a sub group
within the group and form selective private forums as well.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 28
8.4 Conclusion: This project studied interactions of MPSTME students in an academic social network focused on
collaboration and user-submitted content. We studied both the marketing aspect of social
networks and the technical aspect of it. The interest shown in the application, and the data we
were able to gather, has helped us reach some interesting conclusions regarding small social
networks and academically based networks.
There is still a lot of potential in the project, and a lot of future projects will have the opportunity
to expand the application to fit the needs of the students even more; however, the core features of
the student planner and integrating the third party chat application are enough to get things going
for the students.
8.5 Future Works Today’s social networks have endless possibilities and countless features. They allow users to
upload pictures and videos, are location aware, and they even have advanced facial recognition
technologies built in. Due to the incredible scope of creating a social network from scratch there
wasn�t enough time to add all the features we wanted and because of that there are many ideas
still out there that can be implemented.
Seamless Integration with the Planner
We had planned to make a fully functioning social network with the planner we have
made that would automatically update and broadcast common appointments,
assignments, test and exam dates to everyone on the network and automatically give them
reminders too.
Location Aware Check-Ins
Social networks like foursquare and Facebook allow users to check in at locations to let
other users know they were actually at an event or a restaurant. This could be easily
adapted to the application by adding GPS coordinates to each location and using Googles
Maps APIs.
Global Calendar Interface
We had planned on making a global calendar interface, where one person on the network
would add a test date on a particular day, and that information would be broadcasted to
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 29
all the users in the same class and hence, students would not go through the hassle of
setting up their own appointments.
Direct Photo and Video Uploads
We had intended to allow users to upload direct photos or videos of say, the exam
timetable. Just uploading a picture of the timetable is much better than manually setting
up a reminder for it.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 30
9. Real Time Server Monitoring. Domain: Networking
Keyword: Client Server architecture, Linux, GID
Technologies used: Red Hat version 6.2, VMware Workstation 4.04, MySQL Server 5.5.24
9.1 Abstract: The real time monitoring software is software that is supposed to check security
parameters of a server in real time. Whenever the tool comes across any changes in a parameter
from its’ desired setting, the software should be able to prompt it to the concerned person. It will
cover Windows and Linux OS security parameters.
The software will have client-server architecture. The client agent will be installed on the target
server. The client will monitor the server with the help of centralized administration application
that will be installed on both, the client and the server. The client will fire command to check
each parameter, periodically. The result of this check will be sent to the central application which
in return will compare this result with its desired value which is stored in a database. If any
mismatch occurs, the central application will notify concerned person of that server.
9.2 Details / Working:The real time monitoring software is software which checks security parameters of a server in
real time like checking for any deviation in services from actual settings of the services,
password settings, duplicate GIDs if present, file and group permissions and many more.
The main objective is to develop software which can perform real time monitoring of the
security parameters of the server. Whenever the tool comes across any changes in a parameter
from its desired setting, the software will prompt it to the concerned person by email or alert
message. The project is based on Red Hat Linux 6.2(Santiago) and windows. The software is
based on client-server architecture. A database will be used to store default parameters. Along
with that, an agent will be developed to enable communication between the administrator and the
servers. A GUI will be developed for monitoring purpose. Real time monitoring data includes
statistics that represent the current activity on the system that can helps determine usage patterns
and resource allocation and identify problem areas.
This software system will perform real time monitoring of the security parameters of the server
for the administrator. The server is monitored by the administrator with some security
parameters. Along with the security parameters, database is maintained wherein default
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 31
parameters are stored. Whenever there are any changes taken place in the parameter, the software
is designed such that the parameter is checked with the default parameter in the database and any
change will automatically prompt to the administrator via email or alert message. Further the
GUI is built to monitor the purpose.
Thus the scope of the project is:
Monitor the security parameter in real time.
Manage the database and check the security parameters with the default parameter.
The proposed system is real time server monitoring system which is used to monitor the server in
real-time.
The system works on Red Hat Linux 6.2.
The system generates client-server communication.
The system consists of an agent who enables communication between admin and the
server.
The system will ease the work by checking the parameters with the default ones stored in
the database.
The system provides alert message to the administrator via email for any changes applied
to the parameters.
9.3 Conclusion:The main focus of the project is to monitor the security parameters of the server in real time. For
this purpose, we implemented a client-server model where Red hat Linux 6.2 act as client and
windows operating system act as a server. We have implemented security parameters related user
accounts, permissions of system files and folders, services of Linux, network services, kernel
services and performance. Any deviation in the default parameters will be notified to the admin
via email.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 32
9.4 Future scope:The system is Linux based project which helps in monitoring the Linux server though Windows.
The architecture designed for the system can be implemented for Windows and other operating
systems in the future. More security parameters will be studied and implemented. The system
will provide reliable information about the performance of the critical elements of the server like
CPU load, available memory, used memory, disk usage, process, services and network
utilization.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 33
10. Mac Protocol Tutor Domain: Networking
Year: 2013
Technologies Used: Eclipse Indigo IDE, Ubuntu based operating systems
Keywords: Medium Access Control,CSMA/CA Carrier Sense Multiple Access/Collision
Avoidance, Short Inter frame Space, Model View Controller
10.1 Abstract: The project’s aim was to develop a web based tutor for MAC (Medium Access
Control) Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA). MAC protocol IEEE
802.11 is taken into consideration. IEEE 802.11 is a set of standards for Wireless Local Area
Network (WLAN) computer communication. CSMA/CA is one of the most prominent and
widely used protocols for Wireless communication. CSMA/CA is one of the mechanisms that
come under MAC protocols. The main aim of the project was to provide students with a web
based tutor on CSMA/CA which delivers the concepts, mechanism, and working with by means
of animations. The tutor aims at deliver the concepts in such a manner that any individual can
learn from it in an efficient and simple manner. In this report we have discussed and analysed
various aspects of computer and human interaction and study of existing tutoring systems. Based
on the concepts analysed an efficient design for the tutor was formulated which is also
documented in this reports. Further this design was implemented to develop a web-browser and a
desktop based MAC protocol tutor. The developmental and testing process and the features of
the tutors have been discussed in this report.
10.2 Details / Working:This project aims to develop a web based tutor for MAC (Medium Access Control) Carrier Sense
Multiple Access (CSMA), for Wireless Local Area Networks (WLANs). MAC protocol IEEE
802.11[5] is taken into consideration. IEEE 802.11 is a set of standards for Wireless Local Area
Network (WLAN) computer communication. We select this protocol as we found it as the most
prominent specification for Wireless LANs.
It also aims to develop a tutor to help students understand the concepts of CSMA/CA. The tutor
will give details about the mechanism behind CSMA/CA and also show animations about the
concepts. It will be made such that any individual can learn it in an efficient and simple manner.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 34
It will be designed to cater the needs of a student/learner who has no idea about CSMA/CA and
would also be beneficial to students and learners who are aware of the basic concepts and are
looking forward to an in depth and details study of CSMA/CA. The web based tutor is made
such that it would be platform independent. It would be further made to run on tablets, mobiles
along with any Operating System.
The scope of the CSMA/CA tutor will provide the users with the CSMA/CA theory, CSMA/CA
animation, Hidden node animation, CSMA/CA timeline animation and CSMA/CA Simulator.
Depending on the level of the user (Beginner, Acquainted or Experimental) the respective
animations will be enabled. The theory tab will describe all the concepts of the CSMA/CA
protocol along with its features and its working mechanisms. It will be a non-interactive pictorial
representation. The tutor will include a CSMA/CA animation which would describe the basic
concepts of CSMA/CA and its mechanism in the depth by means of animated motion of packets.
The tutor will include another simple CSMA/CA animation which would describe the hidden
node problem and the ways to overcome it. The CSMA/CA timeline would help users to
understand and compare working of various nodes over the timeline. The user will also be able
to tweak CSMA/CA parameters and compare the changes .The CSMA/CA simulator will be
helping the user to create and compare different scenarios by choosing random parameter values.
This simulator will also be allowing the users to experiment with the CSMA/CA protocol and
observe the changes.
Parameters like DIFS, Back-off, SIFS, Number of nodes, and Speed of the animation would be
changed according to the type of scenario and the level of user. The scope of the MAC protocol
will be limited to the CSMA/CA protocols.
The most important aspect of the tutor developed is that it is open source. Idea behind this is to
make the tutorial available to all users. Any of the users would also be able to access the source
code of the tutor. Since the source code is made available to the user, they can use it further
modify the tutor or improve it. The tutor aims to impart the concepts of CSMA/CA at different
levels to the users with varying levels of intellect; it caters to the needs of all users with varying
levels of knowledge i.e. beginner level user who have little or no idea about the concepts of the
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 35
subject and high level user who is aware of the basic concepts and wants to learn about the topic
in depth. The tutor has different modules which are specifically aimed at delivering to the
various user levels as mentioned above. The modules designed for the beginner level user who
has less or no knowledge about the CSMA/CA, has simple animations which explains the basic
concepts about the protocols and its various terminologies. These animations have less
interactivity and the required level of understanding of the user is basic. This module helps in
creating a base for learning and understanding the concepts from the higher level modules.
10.3 Conclusion and Future scope: CSMA/CA protocol is the most widely used protocol in wireless communication. There are very
few tutors which effectively delivers the concepts of CSMA/CA. During the development of the
project the concepts related to educational interactive animations, human psychology related to
animations and concepts, mechanisms of CSMA/CA were studied in depth.In this project we
have developed a web browser based MAC protocol tutor which runs on any major web browser
with the help of a flash plugin. We have also developed a desktop based MAC protocol tutor
which runs on any operating system which has Java installed in it. The tutor implements a
modular design which enables easy addition of extra modules in the future.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 36
11. Cross Platform mobile DashboardDomain: Networking
Keyword: Content selection based on priority, wireless environment for m-services, architecture
of mobile host.
Technologies used: Visual Studio 2010, Keynote, SQL server.
11.1 Abstract: The WSR (weekly status report) dashboard keeps a track of all the reports of
different projects in transition, this WSR dashboard needs to be accessed via mobile devices for
higher authorities and the employees of the company. The challenges are cross platform
compatibility, connectivity with database, retrieval of information, architecture and framework
development, authentication of user, performance, and networking.
Techniques for retrieval of information once the database is connected in a highly efficient
manner need to be conceptualized and implemented. The different architectures of mobile
phones as well as various electronic devices like tablets have to be studied and a framework
needs to be developed for implementing the given problem statement. The application is based
on two- tier architecture. The first one is for the higher senior managers who can read the WSR
dashboard data. The second is for transition managers who read, update and edit the data.
The performance of the system is the main concern, retrieving the data fast and memory
management in mobile cache. The connectivity issues related to networking needs to be
researched and resolved, dealing with bandwidth requirement.
The web application will run on device which has wireless internet connection and a browser
that supports TCP/IP. The heterogeneity not only lies in hardware characteristics like display
size, resolution, or network connection, but differences in software like operating system and
web browsers needs to be considered as well.
This project has many parameters to be taken care off, first of all the existing issues in mobile
compatible web applications need to be studied. The wide range of mobile devices like
notebooks, tablets, handhelds, smartphones and mobile phones provides heterogeneity in these
product types.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 37
One more issue of connectivity between server and client side plays a major role in development
of web applications for mobile devices. Authentication of clients and managers is also one
challenge in this project.
11.2 Details / Working:The WSR (weekly status report) dashboard keeps a track of all the reports of different projects in
transition, this WSR dashboard needs to be accessed via mobile devices for higher authorities
and the employees of the company. The challenges are cross platform compatibility, connectivity
with database, retrieval of information, architecture and framework development, authentication
of user, performance, and networking.
The flow of the project is as follows, for implementing the project we have used the following
softwares,
1. Microsoft Visual Studio 2010
Used Microsoft Visual Studio 2010 for implementing the project, website application was
created with it.
Pages were made in simple Aspx and CSS format whereas all the events were created
using C#.Net.
Some client side server scripting was done in Javascript, and Jquery was used as well for
obtaining particular data from the database.
The database is stored in SQL 2008, and data is retrieved from there using web services.
“Web Services” is used as a middle ware between client side and the database, this
includes certain stored procedures and functions which when called retrieve the data.
2. KeyNote
Keynote Mobile Internet Testing Environment (MITE) is a tool for improving theperformance of
mobile website. MITE helps in optimizing website on over 2,100 emulated devices and 12,000
device profiles providing specific recommendations for better content compatibility.
MITE helps operations teams create advanced scripts that capture how real user interacts within
the browser of today’s latest smartphones.
The front end is made using ASP.net and the back end connected through SQL 2008; these two
are connected through a middleware called web services implemented in .NET C#.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 38
Authentication of the employee or client is done using JavaScript and a few events created in c#
programming. This thus, helps the company in providing multiple users with the same service
with no load on the server as web services handles all the transactions.
On the projects page, there are various types of colours used to display percentage completion of
the tasks and projects. This is created for the higher authorities to analyse the project better as to
which project is in transition and which is not. The green colour states that the project is in
transition and is abiding by the time allotted to it.
The amber colour signifies that project is running a bit late behind its time. The red colour
signifies that the project is running very late with respect to the time given to it.
11.3 Conclusion and Future Work: The Cross platform mobile dashboard website is made in such a way that it manages the cache of
the mobile device it is accessed in. Instead of individually fetching data one after another when
user makes a request it fetches the complete data of all the projects when the user enters his
credentials that is when user signs in.
The resolutions of different phones are considered and different style sheets are made for every
mobile type, so that the site fits and looks like a mobile website.
The architecture is kept 3 tier keeping in mind that multiple user must be accessing the site at the
same time. Web services thus take the load off the server and instead of database and server
handling interactions all the interactions are handled by web services.
Web services can now be accessed over internet and company can utilise those services again if
needed in any other project, thus generalizing the concept of fetching data from the source.
Web services supports loose coupling, thus breaking of components is possible into many logical
service components.
Cross platform mobile dashboard now is under the testing phase in the company as the website
will be used by higher authorities thus cannot have errors.
Adding a comment block for the transition managers and the higher authorities so that
they can make suggestion if any.
Keeping a feedback page for the client as well so that if they have any changes in few
subtasks of their respective project they can.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 39
There are 3 types of mobile based applications, which are native, web based and hybrid:
though we have developed a web based app which is better than a native application but
we have suggested them to convert it into a hybrid app.
Creating a hybrid application will enable it to work offline as well, as and when they
open it. Few changes on the UI are necessary to improve the loading of the page and
performance of the page.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 40
12. Programmable Industrial Robotic ArmDomain: Artificial Intelligence
Technologies Used: WinAVR Board Atmega 16a (hardware chip), WinAVR suit of executable,
open source software development for Atmel Avr series of RISC microprocessors.
Keywords: Embedded systems, Programmable industrial robotic arm, Pulse width modulation
12.1 Abstract: Industrial automation today is an immense requirement for every sector,
whatever the domain maybe, the efficiency and quality in rate of production is very high. Speed
is required for manufacturing, to cope up with the customer’s requirements. Every industrialist
cannot afford to transform his unit from manual to semi automatic or fully automatic as
automation is not that cheap in India. The basic objective of our project is to develop a versatile
and low cost robotic arm, which can be utilized in any industry to eliminate this problem.
Programmable Industrial Robotic Arm (PIRA) can be used in number of application by changing
the program of controller and structure is designed in such a way that it is capable of lifting light
loads and can also perform various tasks like Metal welding, Gas cutting etc. Our robotic arm
would be used mainly in Industrial manufacturing sector.
PIRA is industrial purpose robotic arm which enables multiple tasks with high accuracy and
efficiency, it is mainly applicable in industries for heavy duty work.
12.2 Details / Working:This project is an Industrial application, implemented to attain high quality, quantity & reduce
the requirement of manpower. Now a days in this fast growing industrial age every company
needs speed in manufacturing to cope up with the customer’s requirements. Every industrialist
cannot afford to transform his unit from manual to semi automatic or fully automatic as
automation is not that cheap in India. The basic objective of our project is to develop a versatile
and low cost robotic arm, which can be utilized in any industry to eliminate this problem. Our
robotic arm can be used in number of application by changing the program of controller and the
structure is designed in such a way that it is capable of lifting light loads and can also perform
various tasks like Metal Welding, Gas Cutting etc. Our robotic arm would be used mainly in the
Industrial manufacturing sector.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 41
Industrial Robotic can be an all to-gather a different engineering sector, because it is so vast and
there’s so much to do. There is ‘N’ number of possibilities to implement your idea. The same
way “Programmable Industrial Robotic Arm” PIRA also belong to the same family, it has an
enlightened scope in the commercial industrial sector. We can have number of such robots in an
assembly & can boost the production rate. We can also talk future in several ways, let say we can
have a technology where in we just have to Imagine & the Work is done. This can be
implemented with the help of Neural Networks.
12.3 Advantages That the software can be customized easily with the use of simple IC burner.
It can be applicable in much industrial application other than drilling, welding & cutting.
It is simple to operate & maintain.
For now, the implementation is being done with the miniature prototype, working model.
However in terms of scalability, the arm has to be customized & rebuilt as per the requirements
& dimensions. The integration of the unit is also very simple & easy to maintain.
12.4 Conclusion: Automation has dramatically altered factories across the globe. Modern industrial robots offer
multiple advantages. They have single-handedly transformed products, facilities, and companies.
Recent developments have made industrial robots more user-friendly, affordable, and intelligent
than ever before.
In today’s developing industrial sector Robotics Plays an important role, outside of the
mainstream Artificial Intelligence. Robotic Arm’s can be used for Industrial application. We
have explored the limits of Robotic & Robotic Arm theory and practice. The Development of
this arm helps to overcome many doubts regarding the combination of Software & Hardware
syncing together. There has been a great demand in Industrial sector as well & we feel that the
future is Robotics.
Book of Abstracts (Information Technology Projects)
http://www.giapjournals.com/reference-books/engineering/ Page 42
The main advantages of this Project are as follows,
• Quality: Robots have the capacity to dramatically improve product quality. Applications
are performed with precision and high repeatability every time. This level of consistency
can be hard to achieve any other way.
• Production: With robots, throughput speeds increase, which directly impacts production.
ecause robots have the ability to work at a constant speed without pausing for breaks,
sleep, vacations, they have the potential to produce more than a human worker.
• Safety: Robots increase workplace safety. Workers are moved to supervisory roles, so
they no longer have to perform dangerous applications in hazardous settings.
• Savings: Greater worker safety leads to financial savings. There are fewer healthcare and
insurance concerns for employers. Robots also offer untiring performance, which saves
valuable time. Their movements are always exact, so less material is wasted.
12.5 Future enhancement • We can get into a system like Apple’s ‘Siri’ where in we can talk with the arm and direct
the process.
• Such ARM’s can also be made used for domestic purposes by customizing it.