book of abstracts - giapjournals.orgbook of abstracts [information technology related projects &...

49

Upload: others

Post on 04-Apr-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Book of Abstracts[Information Technology Related Projects & Help]

Edited by

Vijay T Raisinghani, PhD

Ketan D Shah, PhD

Pintu R Shah

Pratidnya S Hegdepatil

Department of Information Technology

Mukesh Patel School of Technology, Management and Engineering

NMIMS (Deemed to be University), Mumbai

GYANDHARA INTERNATIONAL

ACADEMIC PUBLICATIONS,

THANE, INDIA

Book of Abstracts Edited by Vijay T Raisinghani, Ketan D Shah, Pintu R Shah, Pratidnya S Hegdepatil

© Copyright lies with Editors and Compilers of this book

All rights reserved. No part of this publication may be reproduced or transmitted, in any form or by any means, without permission. Any person who does any unauthorized act in relation to this publication shall be liable to criminal prosecution and civil claims for damages

First Edition, November 2013

Gyandhara International Academic Publications (GIAP)

Thane, Maharashtra California

New Delhi Oman

Allahabad

ISBN: 9788192578187

Publisher: Gyandhara International Academic Publications (GIAP)

www.giapjournals.com

Email: [email protected]

Contact: +968 9712 4850

Disclaimer

The views and contents of this book are solely of authors only. This book is being sold on the condition and understanding that its contents are merely for information and reference.

The author and publisher specifically disclaim all and any liability for any loss, damage, risk, injury, distress etc. suffered by any person, whether or not a purchaser of this book, as a consequence whether direct or indirect, of any action taken or not taken on the basis of the contents of this book.

The publisher believes that the contents of this book do not violate any existing copyright / intellectual property of others in any manner what so ever. However, in the event the author has been unable to track any source and if any copyright has been inadvertently infringed, please notify the publisher in writing for corrective action.

This Work has been compiled by following faculties of Department of Information Technology, Mukesh Patel School of Technology, Management and Engineering, NMIMS (Deemed to be University), Mumbai, India:

Anuja Ajay

Ashwini Rao

Nikita Bhandari

Pallavi Rao

Rejo Mathew

Sanjay Sange

Shubhra Goyal Jindal

Sulalah Mirkar

Surabhi Thatte

CONTENT LIST

Name of Compilers

Chapter 1: Two factor authentication using Mobile phone1.1 Abstract 1

1.2 Details / Working 1

1.3 Advantages of Two Factor Authentication 2

1.4 Limitations of Two Factor Authentication 2

1.5 Conclusion and Future Work 2

Chapter 2: Human Ear Identification using vector quantization algorithms2.1 Abstract 4

2.2 Details 4

2.3 Advantages of Ear Biometrics 5

2.4 Conclusion 6

Chapter 3: Audio Fingerprinting3.1 Abstract 7

3.2 Details / Working 7

3.3 Haitsma and Kalker’s Algorithm 8

3.4 Avery Wang Shazam Algorithm 8

3.5 Philips Robust Hashing Algorithm 8

3.6 Proposed algorithm 9

3.7 Conclusion 10

3.8 Future Work 10

Chapter 4: Authentication using graphical password and sound signature4.1 Abstract 11

4.2 Details / Working 11

4.3 Major Design and Implementation Issues 13

4.4 Conclusion 13

4.5 Future Work 14

Chapter 5: Information Hiding5.1 Abstract 15

5.2 Details / Working 15

5.3 Key generation algorithm 16

5.4 Conclusion 17

5.5 Future Scope 17

Chapter 6: HCI for Semi-Literate and Illiterate6.1 Abstract 19

6.2 Details 19

6.3 Design Principle 19

6.4 Conclusion 20

Chapter 7: Sequential pattern mining using intelligent tutoring agent7.1 Abstract 22

7.2 Details / Working 22

7.3 Conclusions 24

Chapter 8: Importance of social Networking in mobile Application understood by developing a student planner8.1 Abstract 25

8.2 Details / Working 25

8.3 Major Features 27

8.4 Conclusion 28

8.5 Future Works 28

Chapter 9: Real Time Server Monitoring9.1 Abstract 30

9.2 Details / Working 30

9.3 Conclusion 31

9.4 Future scope 32

Chapter 10: Mac Protocol Tutor 10.1 Abstract 33

10.2 Details / Working 33

10.3 Conclusion and Future scope 35

Chapter 11: Cross Platform mobile Dashboard11.1 Abstract 36

11.2 Details / Working 37

11.3 Conclusion and Future Work 38

Chapter 12: Programmable Industrial Robotic Arm12.1 Abstract 40

12.2 Details / Working 40

12.3 Advantages 41

12.4 Conclusion 41

12.5 Future enhancement 42

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 1

1. Two factor authentication using Mobile phoneDomain: Network Security

Keywords: Credential Theft attacks, two factor authentications, SMS gateway.

Technologies used: Visual Basic 2008, MySQL.

1.1 Abstract: Two factor authentications is an approach to authentication which requires the

presentation of two or more of three authentication factors.

Three factors are:

1) something the user knows

2) something the user has

3) something user is

Traditional authentication schemes use username and password to authenticate users which

provides minimal security. In two factor authentication something user has component is

provided by small token card. Two factor authentication seeks to decrease the probability that the

requestor is presenting false evidence of its identity.

1.2 Details / Working:1. The Signup: The user shall first have to enroll himself into the application. The

registration form will require three important basic fields – username, password and

mobile number. There are some other secondary fields as well, including address, email

id, name, image, etc. On successful registration, the user shall receive a one-time

password on his registered mobile phone. This serves the purpose of authenticating the

mobile phone as claimed by the user. Once, phone number is authenticated, the user is

successfully enrolled.

2. The application in action: The process starts when the client accesses the application

and logs in to his account. The first factor of authentication is proved by the client when

the client inserts his password. The server checks if the password entered is correct by

matching the entered password with the password in the database. If the two passwords

match, then the server initiates the one-time password generator, for the second factor of

authentication.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 2

The password is sent to the GSM modem connected to the server. Here, the work of

modem comes into action. The modem converts the one-time password into a SMS and

sends to the user’s mobile phone.

3. The final result: The user then enters the one-time password on the application, the

server matches with the one-time password that it had generated and transferred. If the

passwords match, then the user successfully qualifies the second factor of authentication

as well and it becomes sure that the user is genuine.

1.3 Advantages of Two Factor Authentication:1. Enhances security of private data and information by requiring two factors for

authentication.

2. Reduces the risk of weak passwords.

3. The use of mobile phones eliminates the requirement of several tokens for authentication

over different accounts.

4. It eliminates several passive and active attacks which only username-password

combination was vulnerable to.

1.4 Limitations of Two Factor Authentication:1. The system implementation can be slightly costly.

2. The users may not be willing to go through the process.

3. Two factor authentication, although, protects from several usual attacks, it cannot protect

from attacks such as man-in-the middle. Fake websites by fraudsters could deceive users

from entering their credit card numbers and such details.

4. If the attacker has access to the computer itself, then if the user tries to access some

website, then the attacker can piggybank the details. Such cases cannot be eliminated by

two factor authentication either.

1.5 Conclusion and Future Work:The project successfully enrolled new users and authenticated their registered mobile numbers

for genuine enrollments. The project even implemented the concept of two factor authentication

successfully. Authentication of the user on the basis of generated one time password was done.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 3

The project has a vast scope for strengthening in the future. The security can be made stronger by

using newly developed random number generators. The security can be strengthened by adding

some hardware functionality, such as Radio Frequency ID and NFC technology. The project can

also be made more authenticate by adding more factors for authentication.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 4

2. Human Ear Identification using vector quantization algorithmsDomain: Biometrics

Keywords: Ear biometric, edge detection, image processing, vector quantization

Technologies used: MATLAB

2.1 Abstract: Biometrics refers to the identification of humans by their characteristics or traits.

It has become popular as a means of personal identification. A major challenge of personal

identification system is to provide secure access to authorized users. Biometric provides an

efficient solution to this problem.

Ear is relatively new class of biometrics. Researchers have found that the features and shape of

the ear are unique for each individual and remain unchanged with age, which has made ear a

biometric trait. Several approaches have been proposed for ear recognition.

Vector quantization has been used in a number of applications such as speech recognition, face

detection, pattern recognition, speech data compression, image segmentation and content based

image retrieval. In this project, several VQ algorithms such as:

Linde-Buzo-Gray(LBG),

Kekre’s proportionate Error (KPE)

Kekre’s Fast codebook Generation (KFCG)

Kekre’s Error Vector Rotation (KEVR) and

Kekre’s Median Codebook Generation (KMCG)

are used to classify human ears and their performance will be compared.

The algorithms will be implemented using varying number of clusters and based on the results

generated their accuracy will be compared.

2.2 Details:Biometrics refers to identification of human by their characteristics and behaviour. There are

different human traits that can be used by a biometric system such as face, fingerprint, iris, voice,

speech, hand geometry and retina. The selection of a particular biometric trait for use in a

specific application involves the following factors.

Universality means that trait should be possessed by every person using a system.

Uniqueness means how well the trait distinguishes an individual from another.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 5

Permanence means how the trait changes with time.

Measurability (collectability) means how easy it is to acquire the trait.

Performance indicates the accuracy, speed, and robustness of technology used.

Acceptability means the degree of public’s approval to the technology.

Circumvention means how easily a trait might be imitated using a substitute.

Biometric verification is the methodology by which a person can be identified uniquely by

evaluating one or more distinguishing biological traits. Whatever be the biometric methodology,

the identification verification process remains the same. A record of a person's unique

characteristic is captured and kept in a database. When identification verification is required, a

new record is captured and then it is matched with the previous record in the database. If the data

in the new record matches the data that is maintained in the database then the person’s identityis

confirmed.

A benefit of using biometrics is that people are relieved from the burden of remembering

passwords or changing passwords frequently. Also it safeguards against intruders and password

cracking softwares on the internet. Thus it provides an efficient and reliable security solution to

the password-based security systems.

Ear Biometrics:

Ear biometric system is a recognition system where the input image is condensed to a set of

features which are used for comparison with the feature sets of other image to determine the

identity.

2.3 Advantages of Ear Biometrics: Ear does not vary with age and thus is a stable biometric.

It has unique shape and geometry.

It has all the factors that are required to be a biometric trait.

The features of the ears are fixed and unchangeable as it is unaffected by emotions and

expressions of a person.

The distribution of colour is uniform in the ear and thus not much information is lost

while working with the grey scale image or binary image.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 6

As ears are small in size it becomes faster to work with greater efficiency even with the

low resolution images.

Also ear images cannot be changed by makeup, nor glasses.

Ear biometric system has two possible modes of operation:

Verification Mode: In this mode, the subject claims an identity. The input ear image is

then compared against the subject’s claimed identity in order to validate the claim.

Identification Mode: In this mode, the subject does not claim an identity. The input image

is compared to a set of labeled images in the database so as to determine the best match

(its identity).

2.4 Conclusion:The highest accuracy is observed for KFCG algorithm. In LBG, the clusters are elongated at

1350 with the horizontal axis resulting in inefficient clustering. The problem is solved to some

extent by KPE but the variation is limited to only + and - 450. In KEVR, error vector is rotated in

k-dimensional space thereby increasing clustering efficiency. In KMCG, median of the sorted

matrix is computed and all training vectors above the median are grouped into the first cluster

and training vectors below the median in the second cluster. This results in imbalanced

clustering. This problem is solved using KFCG. The centroid of the training set is computed. The

first element of training vector is compared with first element of centroid and based on the

comparison two clusters are formed in the first iteration. As a result, clustering is more balanced

than KMCG. KFCG takes lesser time to generate codebook compared to the above algorithms. In

LBG, KPE and KEVR, Euclidean distance needs to be computed every time. KMCG also

involves certain degree of complexity to implement sorting technique.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 7

3. Audio FingerprintingDomain: Biometrics

Keywords: Content Based Audio Identification

Technologies used: MATLAB

3.1 Abstract: The objective of the work is to build an audio fingerprinting system which can

be used to identify songs efficiently from large database with limited computing. Audio

fingerprinting is the technique in which each song after being processed can be identified by a

sequence of bits which can be uniquely used to determine a particular song. An audio fingerprint

thus essentially plays the role of a hash function that maps an audio object of a large number of

bits to a ‘fingerprint’ of only limited number of bits.

By matching the fingerprint of the audio input with the existing database, audio fingerprinting

technique can be used to identify unlabeled audio in wave (.wav) format. The ability to do so has

various applications like:

1. In the field of broadcast monitoring for detection of copyright infringement.

2. Building smart plug-in to identify and fetch the meta data of unlabeled audio content.

3. P2p filtering by identifying and preventing transfer of copyrighted material from being

transferred between a pair of peers.

4. Identifying foreign language content which cannot be identified via the normal textual

search engines

We aim to successfully implement a fingerprinting technique which can be used to identify a

particular song via fingerprint matching against a given database by providing an audio input of

the song in the wave format, using MATLAB.

3.2 Details / Working:Audio Fingerprinting is a technique which can be used to identify audio from the signal directly,

instead of the tags or the file names or other metadata. Such a technology can not only be used

for tagging unlabeled audio or for identifying tracks but also for more serious applications like

broadcast monitoring.

Existing Audio Fingerprinting Schemes and Algorithms:

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 8

3.3 Haitsma and Kalker’s Algorithm:The process followed in this algorithm is briefly explained below:

This algorithm has fingerprint extraction scheme that is based on a general streaming

approach.

An audio signal is framed into windows of 370ms length for every 11.6ms.

Then the FFT is computed and this is stored into 32- bit sub Fingerprints.

The unidentified audio sample should be of 3-30 seconds in length doe the algorithm to

provide a match.

3.4 Avery Wang Shazam Algorithm:The process followed in this algorithm is briefly explained below:

This algorithm makes use of a spectrogram.

The spectrogram is the squared magnitude of the STFT(Short-Time Fourier Transform)

The spectrogram is divided into small sizes called windows or frames.

This algorithm uses the peaks in the frame ad form spectral pair landmarks.

The local maxima within a defined section are grouped into pairs.

Then the hash values are computed.

It is then compared with the entry.

The one with the most hits is returned as a match.

Generally more than 9 spectral peaks is considered as a match.

3.5 Philips Robust Hashing AlgorithmThere are two steps in the PRH algorithm:

Fingerprint extraction

Database searching

Steps followed:

The audio signal is divided into overlapping frames with length of about 370 ms,

and the frame shift is 1/32 of the frame length.

Power spectrum is obtained by performing FFT; then the energies for 33 nonoverlapping

logarithmically spaced subbands covering the frequency range from

300 Hz to 2000 Hz are calculated.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 9

Hash strings (referred to as subfingerprints) are computed from the sub and energies in each

frame as follows:

ED(n,m)=E(n,m)-E(n,m+1)-(E(n-1,m)-E(n-1,m+1) ………………..(1)

F(n)=[F(n,0)……F(n,31)] …………………………………………..(2)

F(n,m)=1, ED(n,m)>0

F(n,m)=0, ED(n,m)<=0 .…………………………………………...(3)

Where:

E(n,m)= mth subband energy in the nth frame

ED(n,m)= output difference

F(n)= 32-bit subfingerprint of a frame n

F(n,m)= mth bit of subfingerprint of frame n

For Database:

For the audio files stored in the database, all the subfingerprints computed are registered in a

hash table with the subfingerprints being treated as the keys.

Each entry of the hash table stors a list of pointers to the positions in the audio files where the

sub fingerprint occurs.

3.6 Proposed algorithm:The first three parts, i.e., framing, FFT and band energy calculation are the same as those in the

PRH algorithm.

Before computing the hash strings, DCT is performed on the L consecutive sub and energies.

DCT is applied to the temporal sequence of energies in each subband, and a subfingerprint is

constructed for each DCT coefficient stream.

Among the L DCT coefficients, only the lower-ordered K values are retained for the

computation of subfingerprints.

The subfingerprints extracted from the database are registered in hash tables to enable an

efficient searching algorithm. Since K subfingerprints are computed for each frame, K hash

tables are constructed.

For example- the subfingerprints obtained from the second DCT coefficients in each frame are

registered in the second hash table.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 10

3.7 Conclusion:The algorithm was successfully tested on a small dataset for returning a match. The results were

encouraging and we are motivated to test the system with a much larger dataset.

3.8 Future Work: As mentioned previously, the algorithm should be tested on a larger dataset and with several

levels of signal degradation before making a conclusive comment on its efficacy.

Thus far, the work which we did was mainly concentrated on audio fingerprinting for song

recognition. The concept of fingerprinting of files can be further extended to include non-audio

files as well. Audio Fingerprinting has extensive research potential and we have only scratched

its surface.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 11

4. Authentication using graphical password and sound signatureDomain: Information security

Keywords: Cued Click Points, graphical password, Pass face technique, pass point system.

Technologies used: Java, J2SE, MySQL

4.1 Abstract: Here a graphical password system with a supportive sound signature to increase

the remembrance of password is discussed. Here a click-based graphical password scheme called

Cued Click Points (CCP) is presented. In this system password consists of sequence of some

images in which user can select one click-point per image. In addition user is asked to select a

sound signature corresponding to each click point on an image. Research says that CCP is more

preferred to pass Points, because selecting and remembering only one point per image was easier

and sound signature helps considerably in recalling the click points.

4.2 Details / Working: In the proposed work we have integrated sound signature to help in recalling the password. No

system has been developed so far which uses sound signature in graphical password

authentication. Study says that sound signature or tone can be used to recall facts like images,

text etc. In daily life we see various examples of recalling an object by the sound related to that

object. Our idea is inspired by this novel human ability.

Profile of Vectors:

The proposed system creates user profile as follows- Master vector - (User ID, Sound Signature

frequency, Tolerance) Detailed Vector - (Image, Click Points) As an example of vectors - Master

vector (Smith, 2689, 50) Detailed Vector enters User ID and select one sound frequency which

he want to be played at login time, a tolerance value is also selected with will decide that the user

is legitimate or an imposter. To create detailed vector user has to select sequence of images and

clicks on each image at click points of his choice. Profile vector is created. After creation of the

login vector, system calculates the Euclidian distance between login vector and profile vectors

stored. Euclidian distance between two vectors p and q is given by- Above distance is calculated

for each image if this distance comes out less than a tolerance value D. The value of D is decided

according to the application. In our system this value is selected by the user.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 12

Cued Click Points:

Cued Click Points (CCP) is a proposed alternative to Pass Points. In CCP, users click one point

on each of c = 5 images rather than on five points on one image. It offers cued-recall and

introduces visual cues that instantly alert valid users if they have made a mistake when entering

their latest click-point (at which point they can cancel their attempt and retry from the

beginning). It also makes attacks based on hotspot analysis more challenging. Each click results

in showing a next-image, in effect leading users down a path as they click on their sequence of

points. A wrong click leads down an incorrect path, with an explicit indication of authentication

failure only after the final click. Users can choose their images only to the extent that their click-

point 4 Cued Click Points dictates the next image. If they dislike the resulting images, they could

create a new password involving different clickpoints to get different images. We envision that

CCP fits into an authentication model where a user has a client device (which displays the

images) to access an online server (which authenticates the user). We assume that the images are

stored server-side with client communication through SSL/TLS. For implementation, CCP

initially functions like Pass Points. During pass-word creation, a discretization method is used to

determine a click-points tolerance square and corresponding grid. For each click-point in a

subsequent login attempt, this grid is retrieved and used to determine whether the click-point

falls within tolerance of the original point. With CCP, we further need to determine which next-

image to display. Similar to the Pass Points studies, our example system had images of size

451x331 pixels and tolerance squares of 19x19 pixels. If we used robust discretization, we would

have 3 overlapping candidate grids each containing approximately 400 squares and in the

simplest design, 1200 tolerance squares per image (although only 400 are used in a given grid).

We use a function f(username, current Image, current Tolerance Square) that uniquely maps each

tolerance square to a next-image. This suggests a minimum set of 1200 images required at each

stage. One argument against using fewer images, and having multiple tolerance squares map to

the same next-image, is that this could potentially result in misleading implicit feed-back in

(albeit rare) situations where users click on an incorrect point yet still see the correct next-image.

Each of the 1200 next-images would have 1200 tolerance squares and thus require 1200 next-

images of their own. The number of images would quickly become quite large.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 13

4.3 Major Design and Implementation Issues:Security In the above section, we have briefly examined the security issues with graphical

passwords. One of the main arguments for graphical passwords is that pictures are easier to

remember than text strings. Preliminary user studies presented in some research papers seem to

support this. However, current user studies are still very limited, involving only a small number

of users. We still do not have convincing evidence demonstrating that graphical passwords are

easier to remember than text based passwords. A major complaint among the users of graphical

passwords is that the password registration and login process take too long, especially in

recognition-based approaches. For example, during the registration stage, a user has to pick

images from a large set of selections. During authentication stage, a user has to scan many

images to identify a few pass images. Users may find this process long and tedious. Because of

this and also because most users are not familiar with the graphical passwords, they often find

graphical passwords less convenient than text based passwords. Reliability is the major design

issue for recall-based methods is the reliability and accuracy of user input recognition. In this

type of method, the error tolerances have to be set carefully overly high tolerances may lead to

many false positives while overly low tolerances may lead to many false negatives. In addition,

the more error tolerant the program, the more vulnerable it is to attacks. Storage and

communication Graphical passwords require much more storage space than text based

passwords. Tens of thousands of pictures may have to be maintained in a centralized database.

Network transfer delay is also a concern for graphical passwords, especially for recognition-

based techniques in which a large number of pictures may need to be displayed for each round of

verification.

4.4 ConclusionPasswords are used for Authentication (Establishes that the user is who they say they are).

Authorization (The process used to decide if the authenticated person is allowed to access

specific information or functions) and Access Control (Restriction of access-includes

authentication authorization). Mostly user select password that is predictable. This happens with

both graphical and text based passwords. Users tend to choose memorable password which

becomes easier for attackers to guess. Thus we have tried and implemented a novel approach

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 14

which uses sound signature to recall graphical password click points. This system is helpful

when user is logging after a long time.

4.5 Future Work The future work of our project is improving the efficiency of the system. This can be done by

further analyzing the Profile vectors generated. Also efforts have to be made to reduce the

system tolerance up to such a level that it improves system efficiency and does not increase user

difficulty. Based on the security analysis done measure can be taken so as to improve the

security of the system. Also such a system can be built for mobile phones, tablet PC’s etc. Cross

platform independence can be worked upon which can form a major part of future scope. Also

the developed system can be further improved by add features like sense of touch.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 15

5. Information HidingDomain: Information security

Keywords: Cryptography, Steganography.

Technologies used: .NET, MS-SQL server 2008

5.1 Abstract: The project derives its life from the basic need of users to keep their message

secret.

Objective of this project is:

To produce security tool based on stenography technique.

To explore techniques of hiding data using encryption and stenography module

To extract techniques of getting secret data using decryption and de-stego module

5.2 Details / Working:Since the rise of the Internet one of the most important factors of information technology and

communication has been the security of information. Everyday tons of data are transferred

through the Internet through e-mail, file sharing sites, social networking sites etc to name a few.

As the number of Internet users rises, the concept of Internet security has also gain importance.

Hence, to protect or secure the confidential data we have to use some sort of security. We came

with the idea of creating a project that could hide text into normal images.

The major use of steganography is basically when secret data needs to be sent over internet. It

also helps Military, industrial organizations to hiding the data from the becoming known to the

people out of the organization or an unwanted user.

Steganography in civilian engineering applications can help add new functionality to legacy

protocols while maintaining compatibility (the security aspect is subordinated in this case). Some

steganography techniques are also applicable in digital rights management systems to protect

intellectual property rights of media data. However, this is mainly the domain of digital

watermarking, which is related to but adequately distinct from pure steganography to fall beyond

the scope of this book.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 16

Both areas are usually subsumed under the term ‘information hiding’ Progress in steganography

is beneficial from a broader academic perspective because it is closely connected to an ever

better understanding of the stochastic processes behind cover data, i.e., digital representations of

natural images and sound. Refined models, for whatever purpose, can serve as building blocks

for better compression and recognition algorithms.

Steganography is interdisciplinary and touches fields of computer security, particularly

cryptography, signal processing, coding theory, and machine learning (pattern matching).

Steganography is also closely connected (both methodologically but also by an overlapping

academic community) to the emerging field of multimedia forensics. This branch develops and

challenges methods to detect forgeries in digital media.

The application uses the RSA algorithm for two reasons. First, by using a public key algorithm

the need for a private shared key between the sender and recipient of the data is eliminated.

Shared keys are impractical because they require a secure way of distributing the key to every

person who you may want to communicate with. A public key for a person can be distributed

fairly easily by publishing it on a website, or by emailing it to people you expect would need to

send you secret information. Second, the RSA algorithm is also widely known and demonstrably

secure if large enough prime numbers are used to generate the keys.

5.3 Key generation algorithm: 1. Generate two large random primes p and q, of approximately equal size such that their product

n= pq is of their required bit length, e.g. 1024 bits

2. Compute n= pq

3. Choose an integer e,relatively prime to (p-1)(q-1)

4. Denote e by d

5. ed=1 mod (p-1)(q-1)

6. Compute the secret exponent d,a<d<phi, such that ed=1(mod phi)

7. The public key is (n, e) and the private key is (n, d). Keep all the values d, p, q.

n is known as modulus

e is the encryption exponent

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 17

d is the decryption exponent

Now, RSA key pair consists of Public key :( n, e) and Private Key: d

Encryption

1. Obtain recipients public key (n, e)

2. Cipher text C=M^e mod N where M is message

Decryption

1. Use private key(n, d) to compute M=C^d mod N

2. Extract the plaintext from message M

5.4 Conclusion: The proposed approach in this project uses a new steganography approach called image

steganography. The application creates a stego image in which the personal data is

embedded and is protected with a password which is highly secured.

The main intention of the project is to analyze the various steganography algorithms and

develop a steganography application using those algorithms such that it provides good

security. The proposed approach provides higher security and can protect the message

from stego attacks. The image resolution doesn’t change much and is negligible when we

embed the message into the image and the image is protected with the personal password.

So, it is not possible to damage the data by unauthorized personnel.

5.5 Future Scope: In this application, we are using 24- bit bitmap images as carrier image. Since LSB embedding

technique has been used in our steganography tool we have to use the image formats which fall

under image domain. Thus, we can add .GIF type images as carrier image to hide the secret

message.

Furthermore, we can also use JPEG images which fall under the transform domain of an image

type. But to do so, we need to use different technique for hiding secret message behind an image

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 18

because .jpeg image is compressed form of an image and thus we cannot use LSB embedding

technique.

We can also add the feature which will embed the message behind an audio file or video file.

Furthermore, we can optimize the code so that more images will be added in the database and

application will run efficiently.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 19

6. HCI for Semi-Literate and IlliterateDomain: Human Computer Interaction

Keyword: Interface Design, Mobile Interface

Technologies used:

6.1 Abstract: The purpose of the Human computer interface project is to create a set of

guidelines and applications that would be useful for the semi-literate and illiterate. The

applications are made on android platform, and much of the design considerations in this project

focus on building accessible interfaces for the android device.

6.2 Details:Interaction Design and Principle:

The application that has good interface creates good impact, understanding and consciousness

among the users for guiding them in different dimensional modes for achieving their goals.

The effective design presents the organization of objects which communicate information to a

target user. According to, the primary focus of designing goals decrease the intellectual visual

memory, and motor work and also reduce the technological instruction that put burden on the

user.

The design mainly concerns the end users to interact with the system in the organization. The

following profile factors of end user plays an important role in user interface development:

1. Age—and the indirect cultural influences and education levels

3. Life experiences—and family background

3. Language—words, tone and usage

4. Visual literacy—understanding level of symbols and metaphors.

6.3 Design Principle1. Learnability

An interface should be easy to use for the user. The amount of functionality on the interface

should be limited to exactly what the user will need.

2. Efficiency

Key tasks on your interface should be as efficient as possible.

3. Memorability

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 20

The interface should become easier and easier to use each time the user interacts with it.

4. Simplicity

Usual tasks should be easy and less common tasks should be possible in a good UI. Unnecessary

functionality is avoided and the visual design and layout is uncluttered so even the clumsiest of

thumbs can maneuver easily.

5. Visibility

Understanding the user's end goal is critical for good visibility on a interface. Important

information should be the most visible and less important information should be less visible.

Generally most common design principle such as Visibility, Consistency, Familiarity,

Affordance, Navigation, Control, Feedback, Recovery, Constraints, and Flexibility, are normally

concerned to the development process.

The main focus of visibility is to ensure the things that are clearly seen to users in the provided

interface for better understanding. Familiarity is concern the language, to make system more

memorable with user. Affordable means display in a way that makes clear understanding such as

links and buttons presents their meaningful message to user. Through Navigation, the users allow

to move everywhere in the system. Control gives access permission to the users.

User received quick feedback from the system through Feedback method. Through Recovery, the

user recover the system from error or mistake when occur while the Constraints prevent them

from improper actions. Flexibility permits different approaches to do things for learning reasons.

The style of interface should be attractive and smart that makes a friendly association between

users and system.

Mobile Phone Interface Design:User Interface defined as aggregate means through which a user communicates with a system.

The user interface is an important component of any program because it determines how easily

you can interact with the system. Software interface focus on the designing of the menus such as

color, font size, navigation logic and application.

6.4 Conclusion:Helping illiterate users operate a computing device is a difficult problem that unravels more

layers of complexity as it is explored. During the design process, it was discovered how

profoundly the various types of literacy challenges complicate a user’s ability to interact with a

traditional interface. Aside from the most obvious problem that users would have reading pages

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 21

of textual information for themselves, users would encounter difficulties interacting with

interface buttons and menus, recognizing and understanding numerical information, browsing

lists of options to make a selection, determining the status of the device from inspecting the

screen, taking information away from the device, and interacting with labeled graphical elements

like maps, diagrams, and charts. While the initial issue of users not being able to read paragraphs

of text can be addressed via the addition of speech project screen reading software, the other

challenges mentioned above require more profound modifications to the user-interface. The fact

that these users would also have little or no familiarity with computer systems places an even

larger burden on the interface designer.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 22

7. Sequential pattern mining using intelligent tutoring agentDomain: Database mining

Keyword: Sequential pattern mining

Technologies used: ASP.net, C#, SQL

7.1 Abstract: The intelligent agents fundamentally work with respect to pre-obtained domain

knowledge. The basic need of intelligent tutoring agents is to guide or provide feedback in

problem solving situations based on the procedural domain knowledge. Our ITA needs as

appropriate method for considering factors associated with specific operating conditions. So, we

propose integrating a data-mining process called sequential pattern – mining into an ITA to

exploit the huge amount of data that human users produce.

Our approach involves collection of user data like user interest, habits, priorities etc; as an input

to the Agent. The agent uses this information in helping the user in finding the desired

information by analyzing the user’s interest and priorities along with user’s requirements and

based on it, provides the best possible answer. It also guides the user to attain the suggested

result by providing a detailed description to attain it.

7.2 Details / Working:The Intelligent Agents fundamentally work with respect to the pre-obtained domain knowledge.

The basic need of Intelligent Tutoring Agents is to guide or provide feed back in Problem-

Solving situations based on the procedural domain knowledge. There is considerably number of

methods for providing the ITAs with the Domain Knowledge like expert systems, cognitive task

analyses, and constraint-based modeling approaches. However, these methods are complicated

and difficult to use or don‘t work in ill-defined domains. Our ITA needs an appropriate method

for considering factors associated with specific operating conditions. So, we propose integrating

a data-mining process into an ITA to exploit the huge amount of data that human users produce

during problem solving. This approach allows the ITA to gain useful problem-solving

knowledge automatically. These include dynamic data production, given that new data is

constantly gathered, the temporal dimension of events, actions with parameters, and so on. These

factors suggest that we need a temporal pattern-mining technique that operates in dynamic

environments. Because no existing temporal pattern-mining algorithms consider all these factors,

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 23

we propose a new sequential pattern-mining algorithm. For this work, we developed a custom

sequential pattern mining algorithm that combines several features from other algorithms,

including accepting time constraints, processing databases with dimensional information, and

eliminating redundancy.

The proposed system include dynamic data production the temporal dimension of events, actions

with parameters, the user‘s profile, the rationality of actions, and so on. These factors suggest

that we need a temporal pattern-mining technique that operates in dynamic environments.

Because no existing temporal pattern-mining algorithms consider all these factors, we propose a

new sequential pattern-mining algorithm. we developed a custom sequential pattern mining

algorithm that combines several features from other algorithms, including accepting time

constraints, processing databases with dimensional information, and eliminating redundancy.

The algorithm takes as input a database D of event sequences and parameters and finds all event

sequences that occur frequently in the database.

An intelligent tutoring system (ITS) is a computer system that aims to provide immediate and

customized instruction or feedback to learners, usually without intervention from a human

teacher. ITSs have the common goal of enabling learning in a meaningful and effective manner

by using a variety of computing technologies. There are many examples of ITSs being used in

both formal education and professional settings in which they have demonstrated their

capabilities and limitations. There is a close relationship between intelligent tutoring, cognitive

learning theories and design; and there is ongoing research to improve the effectiveness of ITS.

Intelligent tutoring systems (ITSs) are complex, integrated systems that apply Artificial

Intelligence (AI) techniques to problems of education and training. In their role as knowledge

communication systems ITSs strive to optimize learning of domain concepts and problem

solving skills by means of adaptive, individualized coached practice on domain tasks.

The system can ask the student questions and it must be able to understand the student's answers,

as well as determine the student's knowledge based on what answers were given. This should

then affect what is presented and what other questions are asked of the student. The student can

ask questions of the system, and so the system should be able to solve problems in the physics

domain.

In terms of the black box definition of an agent in the figure below, an intelligent tutoring system

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 24

has the following as inputs: prior knowledge, provided by the agent designer, about the subject

matter being taught, teaching strategies, possible errors, and misconceptions of the students.

past experience, which the tutoring system has acquired by interacting with students, about

what errors students make, how many examples it takes to learn something, and what students

forget. This can be information about students in general or about a particular

student.

preferences about the importance of each topic, the level of achievement of the student

that is desired, and costs associated with usability. There are often complex trade-offs

among these observations of a student's test results and observations of the student's

interaction (or noninteraction) with the system. Students can also ask questions or

provide new examples with which they want help.

The output of the tutoring system is the information presented to the student, tests the students

should take, answers to questions, and reports to parents and teachers.

7.3 Conclusions:A simple genetic algorithm is developed to find the shortest path routing in a dynamic network.

The developed algorithm uses an efficient coding scheme. The chromosome length depends on

the number of nodes in the network. The coding environment searches the shortest path using

Dijkstra's algorithm as the default one. The algorithm is simulated to solve the network of 10

nodes for the first one as the source node. Also, the developed GA is simulated to find the

solution for the same problem. The obtained results affirmed the potential of the proposed

algorithm that gave the same results as Dijkstra'a algorithm. In the future, the developed GA will

be more investigated to decrease the chromosome length especially for network with a large

number of nodes. Dijkstra‘s is quiet efficient in various routing problems to find the optimal

paths but its limited to small problems consisting of few nodes and shorter routes and is less

efficient when it comes to a large number of nodes and large route as the process becomes slow

and complex. Whereas genetic algorithm is applicable to any kind of routing problem and is

more efficient than compared to Dijkstra‘s algorithm consisting a large number of nodes and

routes.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 25

8. Importance of social Networking in mobile Application understood by developing a student planner.

Domain: Networking

Technologies used: Android SDK, JAVA, XML.

Keyword: Social Networking, android architecture, Google’s cloud Messing Service.

8.1 Abstract: The purpose of this project was to study the importance of social network

accessible from smart phones, which would increase collaboration and dissemination of

information about classroom events on a day to day basis. In order to do so, we strived on

making an Andriod application which serves our purpose. We performed a pre-survey to better

understand social networking needs of students and use this information while developing our

application. In end we discovered some interesting social and some interesting opinion amongst

student body. The current work done in developing the application also laid a stable foundation

for future projects to build upon.

8.2 Details / Working:The introduction of internet just a few decades ago has brought about drastic changes in the way

people live their everyday lives. Over the years, the internet has changed dramatically, going

from a simple source of information, to a search-power juggernaut, and from a single person

experience, to one of the most socially interactive ways to meet and share experiences with

others. In recent years, online social networks have started to thrive, and today the largest social

networks host hundreds of millions of people, allowing new ideas that were never thought

possible to come to fruition.

This project focused on social networking in the context of a college environment using smart

phones. It brought together the social experiences of social networks, the mobility and advanced

capabilities of today’s modern smart phones, and the learning based environment of colleges.

The mobile nature of smart phones allows users to access social networks anywhere they desire

and post about events while attending them. The main objective of this project, was to test the

viability of social networks in a college environment and to see what uses were facilitated by the

introduction of the mobile platform. An overarching objective was to find all student related

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 26

information in one interactive application which would provide an easier way for the students to

stay updated and connected.

The project integrated two core social networking ideas:

Exchange of on-campus event information to allow students to see what events were

happening on campus.

Having multiple users all work together to solve academic problems. Students were able

to ask questions and receive feedback from other students.

By integrating these two core social networking ideas, this project intended to keep students

involved and interested in the mobile social network and allowed new interactions for all

students involved.

The idea was to make an application that acted exactly like any other social networking website

on the computer and featured all of the same functions like finding friends and posting new

content to the network all from the Android application.

The application retrieves all of its information from the back end web service. To do so, it has to

open an HTTP connection between the endpoints through the devices current Wi-Fi or mobile

network connection.

The application primarily uses code already available in Java. All of the HTTP connections and

image downloading is done with standard Java libraries. External libraries include XML and

Json parsers to parse the information retrieved from the API calls. All API calls return a Json or

XML string which then needs to be parsed and the relevant information retrieved.

Student-O is a student friendly application we intended to build to manage a student�s day to

day activities during the busy times of the year. It keeps up-to date with the student�s college

work, grades, to-do�s, teacher�s information, and almost everything else one needs during the

year.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 27

8.3 Major Features Local Notifier: Student-O allows the student to set alarms for Assignments and Reminders. Be

notified of an upcoming test or paper even when the student doesn�t have Student-O open. User

can even set how far in advance they want to be notified.

Assignments: Keep track of all the upcoming work for a period of time. Records the

student�s grades for every assignment and Email assignments to friends. Organize

one�s information however they like it. Keep track of their work on Student-O�s built-

in coded calendar.

Reading and Books repository: Keep track of any reading assignments students have

during the week. Link the reading with a course and any assignments that are related.

Bookmark definitions or important paragraphs so one can go back to them anytime. The

user�s list of books is a great place to keep notes about your text books (like how

expensive they are) and the author.

Reminders: Reminders are available so the user does not forget those daily to-do's that

you need to get done

Courses: Keep track of the course information and teacher contact info. Student-O can

calculate ones grade using a simple point-based grading system or a very highly

customizable weighted system.

Schedule: Student-O lets one record class times no matter what kind of schedule.

Whether weekly or block schedule, Student-O lets the students enter their schedule and

keep track of all their courses.

Teachers: Keep track of the teacher's contact information.Quick access to teacher's office

hours and email.

Live News feed: This is the page the application opens to. This contains all the dynamic

information flow from any user group which is available publicly to that group. The live

feed page helps notify urgent messages to the users and the users become aware of the

events on the campus.

Discussion forum: This functionality essentially allows the users of the group to discuss

issues faced by them or solve academic problems. It allows the user to select a sub group

within the group and form selective private forums as well.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 28

8.4 Conclusion: This project studied interactions of MPSTME students in an academic social network focused on

collaboration and user-submitted content. We studied both the marketing aspect of social

networks and the technical aspect of it. The interest shown in the application, and the data we

were able to gather, has helped us reach some interesting conclusions regarding small social

networks and academically based networks.

There is still a lot of potential in the project, and a lot of future projects will have the opportunity

to expand the application to fit the needs of the students even more; however, the core features of

the student planner and integrating the third party chat application are enough to get things going

for the students.

8.5 Future Works Today’s social networks have endless possibilities and countless features. They allow users to

upload pictures and videos, are location aware, and they even have advanced facial recognition

technologies built in. Due to the incredible scope of creating a social network from scratch there

wasn�t enough time to add all the features we wanted and because of that there are many ideas

still out there that can be implemented.

Seamless Integration with the Planner

We had planned to make a fully functioning social network with the planner we have

made that would automatically update and broadcast common appointments,

assignments, test and exam dates to everyone on the network and automatically give them

reminders too.

Location Aware Check-Ins

Social networks like foursquare and Facebook allow users to check in at locations to let

other users know they were actually at an event or a restaurant. This could be easily

adapted to the application by adding GPS coordinates to each location and using Googles

Maps APIs.

Global Calendar Interface

We had planned on making a global calendar interface, where one person on the network

would add a test date on a particular day, and that information would be broadcasted to

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 29

all the users in the same class and hence, students would not go through the hassle of

setting up their own appointments.

Direct Photo and Video Uploads

We had intended to allow users to upload direct photos or videos of say, the exam

timetable. Just uploading a picture of the timetable is much better than manually setting

up a reminder for it.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 30

9. Real Time Server Monitoring. Domain: Networking

Keyword: Client Server architecture, Linux, GID

Technologies used: Red Hat version 6.2, VMware Workstation 4.04, MySQL Server 5.5.24

9.1 Abstract: The real time monitoring software is software that is supposed to check security

parameters of a server in real time. Whenever the tool comes across any changes in a parameter

from its’ desired setting, the software should be able to prompt it to the concerned person. It will

cover Windows and Linux OS security parameters.

The software will have client-server architecture. The client agent will be installed on the target

server. The client will monitor the server with the help of centralized administration application

that will be installed on both, the client and the server. The client will fire command to check

each parameter, periodically. The result of this check will be sent to the central application which

in return will compare this result with its desired value which is stored in a database. If any

mismatch occurs, the central application will notify concerned person of that server.

9.2 Details / Working:The real time monitoring software is software which checks security parameters of a server in

real time like checking for any deviation in services from actual settings of the services,

password settings, duplicate GIDs if present, file and group permissions and many more.

The main objective is to develop software which can perform real time monitoring of the

security parameters of the server. Whenever the tool comes across any changes in a parameter

from its desired setting, the software will prompt it to the concerned person by email or alert

message. The project is based on Red Hat Linux 6.2(Santiago) and windows. The software is

based on client-server architecture. A database will be used to store default parameters. Along

with that, an agent will be developed to enable communication between the administrator and the

servers. A GUI will be developed for monitoring purpose. Real time monitoring data includes

statistics that represent the current activity on the system that can helps determine usage patterns

and resource allocation and identify problem areas.

This software system will perform real time monitoring of the security parameters of the server

for the administrator. The server is monitored by the administrator with some security

parameters. Along with the security parameters, database is maintained wherein default

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 31

parameters are stored. Whenever there are any changes taken place in the parameter, the software

is designed such that the parameter is checked with the default parameter in the database and any

change will automatically prompt to the administrator via email or alert message. Further the

GUI is built to monitor the purpose.

Thus the scope of the project is:

Monitor the security parameter in real time.

Manage the database and check the security parameters with the default parameter.

The proposed system is real time server monitoring system which is used to monitor the server in

real-time.

The system works on Red Hat Linux 6.2.

The system generates client-server communication.

The system consists of an agent who enables communication between admin and the

server.

The system will ease the work by checking the parameters with the default ones stored in

the database.

The system provides alert message to the administrator via email for any changes applied

to the parameters.

9.3 Conclusion:The main focus of the project is to monitor the security parameters of the server in real time. For

this purpose, we implemented a client-server model where Red hat Linux 6.2 act as client and

windows operating system act as a server. We have implemented security parameters related user

accounts, permissions of system files and folders, services of Linux, network services, kernel

services and performance. Any deviation in the default parameters will be notified to the admin

via email.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 32

9.4 Future scope:The system is Linux based project which helps in monitoring the Linux server though Windows.

The architecture designed for the system can be implemented for Windows and other operating

systems in the future. More security parameters will be studied and implemented. The system

will provide reliable information about the performance of the critical elements of the server like

CPU load, available memory, used memory, disk usage, process, services and network

utilization.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 33

10. Mac Protocol Tutor Domain: Networking

Year: 2013

Technologies Used: Eclipse Indigo IDE, Ubuntu based operating systems

Keywords: Medium Access Control,CSMA/CA Carrier Sense Multiple Access/Collision

Avoidance, Short Inter frame Space, Model View Controller

10.1 Abstract: The project’s aim was to develop a web based tutor for MAC (Medium Access

Control) Carrier Sense Multiple Access/ Collision Avoidance (CSMA/CA). MAC protocol IEEE

802.11 is taken into consideration. IEEE 802.11 is a set of standards for Wireless Local Area

Network (WLAN) computer communication. CSMA/CA is one of the most prominent and

widely used protocols for Wireless communication. CSMA/CA is one of the mechanisms that

come under MAC protocols. The main aim of the project was to provide students with a web

based tutor on CSMA/CA which delivers the concepts, mechanism, and working with by means

of animations. The tutor aims at deliver the concepts in such a manner that any individual can

learn from it in an efficient and simple manner. In this report we have discussed and analysed

various aspects of computer and human interaction and study of existing tutoring systems. Based

on the concepts analysed an efficient design for the tutor was formulated which is also

documented in this reports. Further this design was implemented to develop a web-browser and a

desktop based MAC protocol tutor. The developmental and testing process and the features of

the tutors have been discussed in this report.

10.2 Details / Working:This project aims to develop a web based tutor for MAC (Medium Access Control) Carrier Sense

Multiple Access (CSMA), for Wireless Local Area Networks (WLANs). MAC protocol IEEE

802.11[5] is taken into consideration. IEEE 802.11 is a set of standards for Wireless Local Area

Network (WLAN) computer communication. We select this protocol as we found it as the most

prominent specification for Wireless LANs.

It also aims to develop a tutor to help students understand the concepts of CSMA/CA. The tutor

will give details about the mechanism behind CSMA/CA and also show animations about the

concepts. It will be made such that any individual can learn it in an efficient and simple manner.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 34

It will be designed to cater the needs of a student/learner who has no idea about CSMA/CA and

would also be beneficial to students and learners who are aware of the basic concepts and are

looking forward to an in depth and details study of CSMA/CA. The web based tutor is made

such that it would be platform independent. It would be further made to run on tablets, mobiles

along with any Operating System.

The scope of the CSMA/CA tutor will provide the users with the CSMA/CA theory, CSMA/CA

animation, Hidden node animation, CSMA/CA timeline animation and CSMA/CA Simulator.

Depending on the level of the user (Beginner, Acquainted or Experimental) the respective

animations will be enabled. The theory tab will describe all the concepts of the CSMA/CA

protocol along with its features and its working mechanisms. It will be a non-interactive pictorial

representation. The tutor will include a CSMA/CA animation which would describe the basic

concepts of CSMA/CA and its mechanism in the depth by means of animated motion of packets.

The tutor will include another simple CSMA/CA animation which would describe the hidden

node problem and the ways to overcome it. The CSMA/CA timeline would help users to

understand and compare working of various nodes over the timeline. The user will also be able

to tweak CSMA/CA parameters and compare the changes .The CSMA/CA simulator will be

helping the user to create and compare different scenarios by choosing random parameter values.

This simulator will also be allowing the users to experiment with the CSMA/CA protocol and

observe the changes.

Parameters like DIFS, Back-off, SIFS, Number of nodes, and Speed of the animation would be

changed according to the type of scenario and the level of user. The scope of the MAC protocol

will be limited to the CSMA/CA protocols.

The most important aspect of the tutor developed is that it is open source. Idea behind this is to

make the tutorial available to all users. Any of the users would also be able to access the source

code of the tutor. Since the source code is made available to the user, they can use it further

modify the tutor or improve it. The tutor aims to impart the concepts of CSMA/CA at different

levels to the users with varying levels of intellect; it caters to the needs of all users with varying

levels of knowledge i.e. beginner level user who have little or no idea about the concepts of the

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 35

subject and high level user who is aware of the basic concepts and wants to learn about the topic

in depth. The tutor has different modules which are specifically aimed at delivering to the

various user levels as mentioned above. The modules designed for the beginner level user who

has less or no knowledge about the CSMA/CA, has simple animations which explains the basic

concepts about the protocols and its various terminologies. These animations have less

interactivity and the required level of understanding of the user is basic. This module helps in

creating a base for learning and understanding the concepts from the higher level modules.

10.3 Conclusion and Future scope: CSMA/CA protocol is the most widely used protocol in wireless communication. There are very

few tutors which effectively delivers the concepts of CSMA/CA. During the development of the

project the concepts related to educational interactive animations, human psychology related to

animations and concepts, mechanisms of CSMA/CA were studied in depth.In this project we

have developed a web browser based MAC protocol tutor which runs on any major web browser

with the help of a flash plugin. We have also developed a desktop based MAC protocol tutor

which runs on any operating system which has Java installed in it. The tutor implements a

modular design which enables easy addition of extra modules in the future.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 36

11. Cross Platform mobile DashboardDomain: Networking

Keyword: Content selection based on priority, wireless environment for m-services, architecture

of mobile host.

Technologies used: Visual Studio 2010, Keynote, SQL server.

11.1 Abstract: The WSR (weekly status report) dashboard keeps a track of all the reports of

different projects in transition, this WSR dashboard needs to be accessed via mobile devices for

higher authorities and the employees of the company. The challenges are cross platform

compatibility, connectivity with database, retrieval of information, architecture and framework

development, authentication of user, performance, and networking.

Techniques for retrieval of information once the database is connected in a highly efficient

manner need to be conceptualized and implemented. The different architectures of mobile

phones as well as various electronic devices like tablets have to be studied and a framework

needs to be developed for implementing the given problem statement. The application is based

on two- tier architecture. The first one is for the higher senior managers who can read the WSR

dashboard data. The second is for transition managers who read, update and edit the data.

The performance of the system is the main concern, retrieving the data fast and memory

management in mobile cache. The connectivity issues related to networking needs to be

researched and resolved, dealing with bandwidth requirement.

The web application will run on device which has wireless internet connection and a browser

that supports TCP/IP. The heterogeneity not only lies in hardware characteristics like display

size, resolution, or network connection, but differences in software like operating system and

web browsers needs to be considered as well.

This project has many parameters to be taken care off, first of all the existing issues in mobile

compatible web applications need to be studied. The wide range of mobile devices like

notebooks, tablets, handhelds, smartphones and mobile phones provides heterogeneity in these

product types.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 37

One more issue of connectivity between server and client side plays a major role in development

of web applications for mobile devices. Authentication of clients and managers is also one

challenge in this project.

11.2 Details / Working:The WSR (weekly status report) dashboard keeps a track of all the reports of different projects in

transition, this WSR dashboard needs to be accessed via mobile devices for higher authorities

and the employees of the company. The challenges are cross platform compatibility, connectivity

with database, retrieval of information, architecture and framework development, authentication

of user, performance, and networking.

The flow of the project is as follows, for implementing the project we have used the following

softwares,

1. Microsoft Visual Studio 2010

Used Microsoft Visual Studio 2010 for implementing the project, website application was

created with it.

Pages were made in simple Aspx and CSS format whereas all the events were created

using C#.Net.

Some client side server scripting was done in Javascript, and Jquery was used as well for

obtaining particular data from the database.

The database is stored in SQL 2008, and data is retrieved from there using web services.

“Web Services” is used as a middle ware between client side and the database, this

includes certain stored procedures and functions which when called retrieve the data.

2. KeyNote

Keynote Mobile Internet Testing Environment (MITE) is a tool for improving theperformance of

mobile website. MITE helps in optimizing website on over 2,100 emulated devices and 12,000

device profiles providing specific recommendations for better content compatibility.

MITE helps operations teams create advanced scripts that capture how real user interacts within

the browser of today’s latest smartphones.

The front end is made using ASP.net and the back end connected through SQL 2008; these two

are connected through a middleware called web services implemented in .NET C#.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 38

Authentication of the employee or client is done using JavaScript and a few events created in c#

programming. This thus, helps the company in providing multiple users with the same service

with no load on the server as web services handles all the transactions.

On the projects page, there are various types of colours used to display percentage completion of

the tasks and projects. This is created for the higher authorities to analyse the project better as to

which project is in transition and which is not. The green colour states that the project is in

transition and is abiding by the time allotted to it.

The amber colour signifies that project is running a bit late behind its time. The red colour

signifies that the project is running very late with respect to the time given to it.

11.3 Conclusion and Future Work: The Cross platform mobile dashboard website is made in such a way that it manages the cache of

the mobile device it is accessed in. Instead of individually fetching data one after another when

user makes a request it fetches the complete data of all the projects when the user enters his

credentials that is when user signs in.

The resolutions of different phones are considered and different style sheets are made for every

mobile type, so that the site fits and looks like a mobile website.

The architecture is kept 3 tier keeping in mind that multiple user must be accessing the site at the

same time. Web services thus take the load off the server and instead of database and server

handling interactions all the interactions are handled by web services.

Web services can now be accessed over internet and company can utilise those services again if

needed in any other project, thus generalizing the concept of fetching data from the source.

Web services supports loose coupling, thus breaking of components is possible into many logical

service components.

Cross platform mobile dashboard now is under the testing phase in the company as the website

will be used by higher authorities thus cannot have errors.

Adding a comment block for the transition managers and the higher authorities so that

they can make suggestion if any.

Keeping a feedback page for the client as well so that if they have any changes in few

subtasks of their respective project they can.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 39

There are 3 types of mobile based applications, which are native, web based and hybrid:

though we have developed a web based app which is better than a native application but

we have suggested them to convert it into a hybrid app.

Creating a hybrid application will enable it to work offline as well, as and when they

open it. Few changes on the UI are necessary to improve the loading of the page and

performance of the page.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 40

12. Programmable Industrial Robotic ArmDomain: Artificial Intelligence

Technologies Used: WinAVR Board Atmega 16a (hardware chip), WinAVR suit of executable,

open source software development for Atmel Avr series of RISC microprocessors.

Keywords: Embedded systems, Programmable industrial robotic arm, Pulse width modulation

12.1 Abstract: Industrial automation today is an immense requirement for every sector,

whatever the domain maybe, the efficiency and quality in rate of production is very high. Speed

is required for manufacturing, to cope up with the customer’s requirements. Every industrialist

cannot afford to transform his unit from manual to semi automatic or fully automatic as

automation is not that cheap in India. The basic objective of our project is to develop a versatile

and low cost robotic arm, which can be utilized in any industry to eliminate this problem.

Programmable Industrial Robotic Arm (PIRA) can be used in number of application by changing

the program of controller and structure is designed in such a way that it is capable of lifting light

loads and can also perform various tasks like Metal welding, Gas cutting etc. Our robotic arm

would be used mainly in Industrial manufacturing sector.

PIRA is industrial purpose robotic arm which enables multiple tasks with high accuracy and

efficiency, it is mainly applicable in industries for heavy duty work.

12.2 Details / Working:This project is an Industrial application, implemented to attain high quality, quantity & reduce

the requirement of manpower. Now a days in this fast growing industrial age every company

needs speed in manufacturing to cope up with the customer’s requirements. Every industrialist

cannot afford to transform his unit from manual to semi automatic or fully automatic as

automation is not that cheap in India. The basic objective of our project is to develop a versatile

and low cost robotic arm, which can be utilized in any industry to eliminate this problem. Our

robotic arm can be used in number of application by changing the program of controller and the

structure is designed in such a way that it is capable of lifting light loads and can also perform

various tasks like Metal Welding, Gas Cutting etc. Our robotic arm would be used mainly in the

Industrial manufacturing sector.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 41

Industrial Robotic can be an all to-gather a different engineering sector, because it is so vast and

there’s so much to do. There is ‘N’ number of possibilities to implement your idea. The same

way “Programmable Industrial Robotic Arm” PIRA also belong to the same family, it has an

enlightened scope in the commercial industrial sector. We can have number of such robots in an

assembly & can boost the production rate. We can also talk future in several ways, let say we can

have a technology where in we just have to Imagine & the Work is done. This can be

implemented with the help of Neural Networks.

12.3 Advantages That the software can be customized easily with the use of simple IC burner.

It can be applicable in much industrial application other than drilling, welding & cutting.

It is simple to operate & maintain.

For now, the implementation is being done with the miniature prototype, working model.

However in terms of scalability, the arm has to be customized & rebuilt as per the requirements

& dimensions. The integration of the unit is also very simple & easy to maintain.

12.4 Conclusion: Automation has dramatically altered factories across the globe. Modern industrial robots offer

multiple advantages. They have single-handedly transformed products, facilities, and companies.

Recent developments have made industrial robots more user-friendly, affordable, and intelligent

than ever before.

In today’s developing industrial sector Robotics Plays an important role, outside of the

mainstream Artificial Intelligence. Robotic Arm’s can be used for Industrial application. We

have explored the limits of Robotic & Robotic Arm theory and practice. The Development of

this arm helps to overcome many doubts regarding the combination of Software & Hardware

syncing together. There has been a great demand in Industrial sector as well & we feel that the

future is Robotics.

Book of Abstracts (Information Technology Projects)

http://www.giapjournals.com/reference-books/engineering/ Page 42

The main advantages of this Project are as follows,

• Quality: Robots have the capacity to dramatically improve product quality. Applications

are performed with precision and high repeatability every time. This level of consistency

can be hard to achieve any other way.

• Production: With robots, throughput speeds increase, which directly impacts production.

ecause robots have the ability to work at a constant speed without pausing for breaks,

sleep, vacations, they have the potential to produce more than a human worker.

• Safety: Robots increase workplace safety. Workers are moved to supervisory roles, so

they no longer have to perform dangerous applications in hazardous settings.

• Savings: Greater worker safety leads to financial savings. There are fewer healthcare and

insurance concerns for employers. Robots also offer untiring performance, which saves

valuable time. Their movements are always exact, so less material is wasted.

12.5 Future enhancement • We can get into a system like Apple’s ‘Siri’ where in we can talk with the arm and direct

the process.

• Such ARM’s can also be made used for domestic purposes by customizing it.