Amfas Tech | Technology, Blogging & Internet Marketing: Abstracts

A Seminar On Ethical Hacking | Abstract Download


"Hacking" is the word that shakes everyone whenever it is said or heard by someone. Everyone born in this world with attitude wants to be a Hacker. But it is not a job of a new born baby or an old grown lady. A Hacker needs a brilliant mind to hack anything. His skills should be so powerful that no other hacker can hack him. A Hacker doesn't need a software to hack. There are many rules that he should learn to become an Ethical Hacker. These rules include knowledge of HTML, JavaScripts, Computer Tricks, Cracking & Breaking etc.etc.

Kevin Mitnick, often incorrectly called by many God of hackers, broke into the computer systems of the World's top technology and telecommunications companies Nokia, Fujitsu, Motorola, and Sun Micro systems. He was arrested by the FBI in 1995, but later released on parole in 2000. He never termed his activity hacking, instead he called it social engineering. November 2002 Englishman Gary McKinnon was arrested in November 2002 following an accusation that he hacked into more than 90 US military computer systems in the UK. He is currently undergoing trial in a British court for a fast-track extradition to the US where he is a Wanted man. The next hearing in the case is slated for today.

Download Abstract
Continue Reading

Artificial Intelligence in Computer Games | Abstract Download

In computer games, Artificial Intelligence generally means creating computer players that can think rationally and also can act humanly. First problems of game AI were solved by making challenging computer players that play the best move. But as the games involved more imagination, new problems emerged such as designing humanly behaving and responding characters.

Games are traditionally played by a group of players. Few examples are chess, hide-and-seek, football. In contrast, many computer games are single-player. So, there is a problem of interactivity in computer games. If the player perceives the game to be a deterministic machine, giving predictable outcomes, it probably will no longer feel like a game. To solve this problem, AI programmers create rational agents in the game to give the illusion of human players. If the player is faced by the challenge to win against intelligent rational opponents, the game feels more like a game.


First computer games were digitized versions of regular board games in which intelligent opponents were adequate for the simulation of the real game. But the development of computer graphics, sounds and input technologies opened the way to new possibilities. Games began to have stories, plots, scenes and characters. Unlike board games, which were relatively simple abstractions, computer games began to create a constantly complexifying realm of fantasy worlds. But of course the deepness of these worlds not only depended on the imaginations of game and art designers, but also the artificial hearts and minds of the characters in the game. Since then, game AI has been required to model more and more intelligent and realistic behaviour.

Continue Reading

A Seminar Report on Bar Codes | Abstract & PPT Download

Abstract:

Example take a seller, before inventing barcodes, he uses a price list for knowing the details of item. But it is very consuming for both searching and preparing the price list. Later this retail outlet is computerized .In these details of items were already kept in database. Using the code number of the item the seller access the details of the item. But here also some problems arise. We must remember the code number of each item and whenever the price changes, we must update the entire database. If new product comes into existence, then we have to give new code to that product. It is risky process.

If we use barcodes, there is no such problem. We get online information without giving any data to the computer. If the manufacturing company produces large quantity of products, then these barcodes are very useful.


The idea was come in 1932.But it implement take many years. The actual usage of barcodes was started in 1970.From last 15 years usage of barcodes increases rapidly.

First barcode product is Wrengly’s checking sum and it is scanned at marsh’s super market around 25 years ago. Then the little barcode has increased and multitude and today one can see barcodes printed on every item in retail’s stores throughout the world.

Now we are observing these barcodes in every item that we come across. This is useful for both manufacturer and seller.

What is barcode? It consists of parallel and adjacent bars. It also consists of some narrow bars and some wide bars. The width and height of bars are specified according to the numbers or characters given to it. But the actual data kept on the bars. These numbers are only for references.

Structure of barcodes? The basic structure of barcodes consists of a start and stop characters. And one or more data characters and a check sum character.

Start and stop characters are useful for barcode readers for knowing where the barcode is started and where it is ended. The data character consists of batch number, price of the item, country name, item code etc. The check sum character is used for knowing whether the barcode reader scan the barcode correctly or not.

Continue Reading

A Seminar on Power Line Communications | Abstract Download

Abstract: 

Broadband power line (BPL) is the term coined by the FCC for new modems (BPL modems) used to deliver IP-based broadband services on electric power lines. On April 23, 2003, the FCC adopted a Notice of Inquiry (NOI), expressing enthusiasm about the potential of the BPL technology to enable electric power lines to function as a third wire into the home, and create competition with the copper telephone line and cable television coaxial cable line. The FCC said that BPL service can be offered now using BPL modems that comply with existing FCC Rules. However, the FCC also asked whether changes to its rules are needed, either to remove unnecessary barriers to BPL service or to protect other devices from interference from BPL modems. BPL modems use silicon chips designed to send signals over electric power lines, much like cable and DSL modems use silicon chips designed to send signals over cable and telephone lines. Advances in processing power enable new BPL modem chips to overcome difficulties in sending communications signals over the electric power lines that could not be overcome with less computing power. BPL modem speed, like cable and DSL modem speeds, is changing rapidly with each advance in new technology, so it would be difficult to make any generalization here that would be accurate or timely. The FCC NOI discusses two types of BPL, In-house BPL and Access BPL.

Continue Reading

An IEEE PHP Project: Efficient Anonymous Message Submission

ABSTRACT

In online surveys, many people are not willing to provide true answers due to privacy concerns. Thus, anonymity is important for online message collection. Existing solutions let each member blindly shuffle the submitted messages by using the IND-CCA2 secure cryptosystem. In the end, all messages are randomly shuffled and no one knows the message order. However, the heavy computational overhead and linear communication rounds make it only useful for small groups. In this paper, we propose an efficient anonymous message submission protocol aimed at a practical group size. Our protocol is based on a simplified secret sharing scheme and a symmetric key cryptosystem. We propose a novel method to let all members secretly aggregate their messages into a message vector such that a member knows nothing about other members’ message positions. We provide a theoretical proof showing that our protocol is anonymous under malicious attacks. We then conduct a thorough analysis of our protocol, showing that our protocol is computationally more efficient than existing solutions and results in a constant communication rounds with a high probability.

EXISTING SYSTEM
Existing solutions let each member blindly shuffle the submitted messages by using the IND-CCA2 secure cryptosystem. In the end, all messages are randomly shuffled and no one knows the message order. However, the heavy computational overhead and linear communication rounds make it only useful for small groups.

PROPOSED SYSTEM
We propose an efficient anonymous message submission protocol aimed at a practical group size. Our protocol is based on a simplified secret sharing scheme and a symmetric key cryptosystem. We propose a novel method to let all members secretly aggregate their messages into a message vector such that a member knows nothing about other members’ message positions. We provide a theoretical proof showing that our protocol is anonymous under malicious attacks. We then conduct a thorough analysis of our protocol, showing that our protocol is computationally more efficient than existing solutions and results in a constant communication rounds with a high probability. We propose security sharing scheme using some protocol.

Continue Reading

An IEEE PHP Project: Question Answering System for an Effective Collaborative Learning

ABSTRACT:


The increasing advances of Internet Technologies in all application domains have changed life styles and interactions. With the rapid development of E-Learning, collaborative learning is an important for teaching, learning methods and strategies. Interaction between the students also student with the teacher is important for student to gain knowledge. In this paper, we introduce an effective question answering Q&A system for collaborative learning, which can act not just like a virtual teacher, but also virtual discussion for student. With the proposed system, brings a new Q&A system, student can attach their question when they want collaborate using collaborative learning capitalize on one another’s resources and skills. Students can ask their questions to the group when they want to collaborate with others, asking one another for information, evaluating one another’s ideas, then each of the answer will compare with encyclopedia data base.

 Question Answering System for an Effective Collaborative Learning
Download Full Abstract
Download Full Base Paper
Continue Reading

An IEEE Project on Secure Computing: Detecting Anomalous Insiders in Collaborative Information Systems

ABSTRACT

Collaborative information systems (CISs) are deployed within a diverse array of environments that manage sensitive information. Current security mechanisms detect insider threats, but they are ill-suited to monitor systems in which users function in dynamic teams. In this paper, we introduce the community anomaly detection system (CADS), an unsupervised learning framework to detect insider threats based on the access logs of collaborative environments. The framework is based on the observation that typical CIS users tend to form community structures based on the subjects accessed CADS consists of two components: relational pattern extraction, which derives community structures and anomaly prediction, which leverages a statistical model to determine when users have sufficiently deviated from communities.

To empirically evaluate the framework, we perform an assessment with three months of access logs from a real electronic health record (EHR) system in a large medical center. The results illustrate our models exhibit significant performance gains over state-of-the-art competitors. When the number of illicit users is low, Meta CADS is the best model, but as the number grows, commonly accessed semantics lead to hiding in a crowd, such that CADS is more prudent.

EXISTING SYSTEM

In the existing experiment, the performance of the supervised classification models is significantly worse than the unsupervised models. The supervised models consistently have a lower true positive rate at all operating points. In the existing model is not correctly characterizing the intruders which access a larger number of records. Third, with respect to AUC, we observe the same trend as earlier regarding the dominance of the unsupervised models as a function of the mix rate.

PROPOSED SYSTEM

In this project, we introduce a framework to detect anomalous insiders from the access logs of a CIS by leveraging the relational nature of system users as well as the meta information of the subjects accessed. The framework is called the community anomaly detection system, or CADS, and builds upon the work. To detect anomalous insiders in a CIS, we proposed CADS, a community anomaly detection system that utilizes a relational framework. To predict which users are anomalous, CADS calculates the deviation of users based on their nearest neighbor networks.

Our model is based on the observation that “normal” users tend to form communities, unlike illicit insiders. To evaluate the performance of our model, we conducted a series of experiments that compared our framework with the state-of-the-art anomaly detection methods for CIS systems. In the experiments, we mixed simulated users with the real users of a real electronic health record system. Our results illustrated that the community-based models exhibited better performance at detecting simulated insider threats.

Continue Reading

An IEEE Java Project: FADE- Secure Overlay Cloud Storage with File Assured Deletion

ABSTRACT:

We address the problem of resource management for a large-scale cloud environment that hosts sites. Our contribution centers around outlining a distributed middleware architecture and presenting one of its key elements, a gossip protocol that meets our design goals: fairness of resource allocation with respect to hosted sites, efficient adaptation to load changes and scalability in terms of both the number of machines and sites. We formalize the resource allocation problem as that of dynamically maximizing the cloud utility under CPU and memory constraints. While we can show that an optimal solution without considering memory constraints is straightforward (but not useful), we provide an efficient heuristic solution for the complete problem instead. We evaluate the protocol through simulation and find its performance to be well aligned with our design goals.

EXISTING SYSTEM:

In Existing system the outsource data backup to third-party cloud storage services will cost more for data management and security concerns arise in terms of ensuring the privacy and integrity of outsourced data.

Vanish:

Divide the data key into many key shares.

Weakness:

Time based no fine-grained control.


PROPOSED SYSTEM:

In proposed system we present FADE, a secure overlay cloud storage system that ensures file assured deletion and works seamlessly atop today’s cloud storage services. FADE decouples the management of encrypted data and encryption keys, such that encrypted data remains on third-party (untrusted) cloud storage providers, while encryption keys are independently maintained by a key manager service, whose trustworthiness can be enforced using a quorum scheme. FADE generalizes time-based file assured deletion (i.e., files are assuredly deleted upon time expiration) into a more fine-grained approach called policy based file assured deletion, in which files are associated with more flexible file access policies (e.g., time expiration, read/write permissions of authorized users) and are assuredly deleted when the associated file access policies are revoked and become obsolete.

Design Of Fade:

1.Work atop todays cloud as an overlay.
2.Achieve protection from cloud clients perspective,no changes on the cloud provider
side.

Security Of Fade:

1.Fine-grained file assured deletion:Files are permanently inaccessible based on
policies.

Continue Reading

A Paper Presentation on Capsule Endoscopy - A novel approach for complete gastrointestinal diagnosis and BIOTELEMETRY

Abstract:

Endoscopy is a test that help physicians to diagnose diseased organs inside the human body .To examine the inside lining of the digestive tract, physicians usually employ Gastrointestinal (GI) endoscopy. The terminology CAPSULE ENDOSCOPY refers to the use of Mouth to Anus (M2A) capsule to image and diagnose conditions associated with GI tract. The most reason for doing Capsule Endoscopy is to search for a cause of bleeding from deeper levels of GI tract like Small Intestine where traditional endoscopy is not possible to be carried out, since patients cannot ingest the whole Endoscope to the levels where examination is required. It may also be useful for detecting polyps, inflammatory bowel disease, ulcers, and abnormal growths, gastrointestinal bleeding, Crohn’s disease and tumors of small intestine.

In short Capsule Endoscopy helps to completely evaluate the small intestine. In capsule endoscopy, the ingests the capsule endoscope and continues with their normal work, mean while the capsule transmits video signals to the sensors attached to the frontal part of the patient’s body which are further processed by the diagnostic system. The entire transmission events involved in the whole diagnostic process is governed by none other than the process named Biotelemetry, which literally means the measurement of biological parameters over a distance, where the means of transmitting data from the point of generation to the point of reception can take many forms. It plays an important role in instances in which it is necessary to monitor physiological events from distance like, radio transmission for monitoring astronauts in space and also in diagnostic processes like capsule endoscopy.

The present paper focuses on the mechanism of working of capsule endoscopy, its advantages over Traditional GI endoscopy and adds a note on process of biotelemetry, which is the principle behind the technology.
Keywords: capsule endoscopy, imaging, biotelemetry, transmission, evaluation, diagnosis, and intestine
clip_image002

Continue Reading

A Seminar on Artificial Vision

Abstract:

Blindness is more feared by the public than any other ailment. Artificial vision for the blind was once the stuff of science fiction. But now, a limited form of artificial vision is a reality .Now we are at the beginning of the end of blindness with this type of technology. In an effort to illuminate the perpetually dark world of the blind, researchers are turning to technology. They are investigating several electronic-based strategies designed to bypass various defects or missing links along the brain's image processing pathway and provide some form of artificial sight.

This paper is about curing blindness. Linking electronics and biotechnology, the scientists has made the commitment to the development of technology that will provide or restore vision for the visually impaired around the world. This paper describes the development of artificial vision system, which cures blindness to some extent. This paper explains the process involved in it and explains the concepts of artificial silicon retina, cortical implants etc. The roadblocks that are created are also elucidated clearly. Finally the advancements made in this system and scope of this in the future is also presented clearly.

clip_image002    clip_image002

Continue Reading

A Paper Presentation on Zigbee Wireless Communication

Abstract:

The concept of zigbee is associated with controlling all electronic devices and communicating with themselves with the surrounding by using simple our mobile or pc by using this latest technology.The serious problem in this world is cables tremendous growth in science which is solved by this.

Zigbee is a set of specs built around the IEEE 802.15.4 wireless protocol. Zigbee devices are actively limited to a through-rate of 250kbps,operating on the 2.4GHZ ISM band,which is available throughout most of the world .This acts as co-ordinate and slave.This gives commands and receives commands from other electronic devices. This can connect upto 65,553 devices per unit.The important feature of Zigbee is provide with memory and logical unit for the first time.This helps in taking independent decisions by itself with need of coordinator,which help in sensor devices.There are technologies which already available in the market line BloothTooth.Their some ensured suides in that which lead to develop Zigbee.It has major advantage that it has low power consumption (30ma). Other advantages that it provide high security to all electronic devices.Another important thing is that it is of low cost.This can serve all purposes in industries and home appliancies ….It is very simple to operate by everyone . By all my statements I can conclude that in future we are going to a new world with cables,everything is done by single controls without using multi switches multi purposes.


Continue Reading

A Paper Presentation on CYBORG

Abstract:

Neural interfacing is a powerful means, which can develop a robust bridge between humans and machines. In this paper we emphasize on neural interfacing as an evolving trend in wireless communications by taking into account one of its important application i.e. cyborgs. In the next half of the paper we discuss the operational features of cyborgs.In an attempt to promote greater interaction between humans and computers, companies that develop cybernetic technologies participate in a variety of seductive strategies that embody the cyborg discourse. Some of these strategies persuade individuals to concede to particular philosophies, such as the argument that technical artifacts and instrumental reasoning are necessary for effective social development. With the experiments conducted and  proposed  to  be  conducted  in  future , and  in  the process given a brief description of the advantages and  disadvantages of this  technology.

clip_image002

Continue Reading

A Seminar on Mobile Communications through Stratosphere

Abstract

Today we are in danger due to health hazards caused by mobile radiation. Recent surveys and experts confirmed that continuous exposure to mobile radiation causes brain tumors, cancers, headache and stress feeling. Not only human beings but also birds, animals are facing lot of problems due to mobile radiation exposure ,but many Mobile Network operators establishing Antennas in and around us without meeting the guidelines of Government. Then how to reduce the effect of the radiation caused by the antennas, where to construct these antennas ? The answer is somewhat crazy i.e., in SKY. Recent research and experiments by NASA and JAPAN suggested that we can establish these antennas in the SKY i.e., in stratosphere where the velocity of wind is 10-15 miles/hr. These antennas in sky are termed as HAPS (High Altitude Platform stations). These platforms are established above the region of air-traffic control in stratosphere and are used not only for mobile communication purpose but also in Broadband services, monitoring volcanic eruptions, flood effected regions with less investment compared to Satellites sent to outer space.

Continue Reading

A Paper Presentation on Heart Failure Alert System

Abstract:

Now-a-days the deaths caused due to the heart failure have been of major concern .The majority of the deaths caused by heart failures are due to the lack of medical assistance in time. This paper gives an insight of a new technology that relates directly to the exploding wireless marketplace. This technology is a whole new wireless and RFID (Radio Frequency Identification) enabled frontier in which a victim’s actual location is integral for providing valuable medical services.

The paper will be demonstrating for the first time  ever the usage of wireless telecommunications systems and miniature sensor devices like RFID passive Tags , that are smaller than a grain of rice and equipped with a tiny antenna which will capture and wirelessly transmit a person's vital body-function data, such as pulse or body temperature , to an integrated ground station. In addition, the antenna will also receive information regarding the location of the individual from the GPS (Global Positioning Satellite) System. Both sets of data medical information and location will then be wirelessly transmitted to the ground station and made available to save lives by remotely monitoring the medical conditions of at-risk patients and providing emergency rescue units with the person's exact location.

This paper gives a predicted general model for Heart Failure Alert System. It also discusses the Algorithm for converting the Analog pulse to Binary data in the tag and the Algorithm for alerting the Location & Tracking Station. It discusses in detail the various stages involved in tracking the exact location of the Victim using this technology.

clip_image002

Continue Reading

A Presentation on Network Security Features In TCPA Platform

Abstract:

Imagine the world of computing, which is free of hacking, no security breaches, no Spam mails, no worms, no viruses, no crashing of systems any more. This was the distant dream of the application developers and true lovers of computers. But this is going to be possible in the nearby future and making it possible is TCPA.

TCPA (Trusted Computing Platform Alliance) is a joint effort by the most important computer and telecommunications companies in the world to radically change the idea of secure computing and the architecture of PC. TCPA is an union of some of the most important big players like INTEL, IBM, MICROSOFT, HP, SONY, another 150 more big companies, aimed to create a common platform dedicated to the "growing of user's trust" on information security. By looking at this huge quantity of companies - some of them, which are the main semiconductor manufacturers in the world, it is something really very serious.
All the security systems up to now run as just application programs. But the new concept is making security hardwired into the computer. That is, it is not possible to break the security of the system unless you are physically present. The TCPA’s platform provides many features like secure  bootstrapping, platform identification, hardware-protected memory etc. To make such a platform TCPA specification has made changes to the basic architecture of the PC. Several new features have been introduced such as TPM chip, CRTM (trusted bios), protected memory etc.

This paper presents a technical analysis of the TCPA platform and the changes it made to the PC architecture. It also presents a detailed report on the much-discussed TPM chip and its important features. Finally an analysis of what could be the effect on TCPA on computer and entertainment industry is given.
clip_image002

Continue Reading

A Seminar on Plasmonics | Abstract Download

Abstract:

With the increasing quest for transporting large amounts of data at a fast speed along with miniaturization both electronics and photonics are facing limitations. Thus plasmonics is an upcoming technology that has the capacity of photonics and smallness of electronics which is to overcome the limitations of photonics and electronics. Before all plasmonic chips are developed plasmonics will probably be integrated with conventional silicon devices.Plasmonic wires will act as high band width free ways across the busiest areas of the chip. Plasmonics is useful in many areas for example it can useful in industry, optical, electronics, defense, medical systems. The emphasis is laid on basic definition of plasmonics, the need for idea of plasmonics, plasmonics as a researcher’s interest, some of the basic applications of plasmonics. Much focus is laid on the explanation of some of the applications which include Funneling of light, faster chips, Treatment of cancer and even invisibility.'


Continue Reading

A Seminar on Ubiquitous Technology | PPT Download

Abstract:

The word "ubiquitous" comes from a Latin word meaning "omnipresence." In this not only mobile phones, PCs, PDAs and other communications terminals, but also intelligent appliances like home robots, and many other home electronics will be linked together, resulting in an extensive communications environment. The ubiquitous network is positioned as a goal of the development of the next-generation information and communication technology (ICT) infrastructure.
image

Continue Reading

A Paper Presentation on IMAGE PROCESSING-STEGANOGRAPHY

Abstract:

Steganography is the art and science of encoding hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. It is a form of security through obscurity. Generally, the hidden messages will appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter.

The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—will arouse interest, and may in themselves be incriminating in countries where encryption is illegal. Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message.
image

Continue Reading

CLASSIFICATION AND PATTERN BASED APPOROACH FOR INTELLIGENT TUTORING SYSTEMS

Abstract:

It is an automated learning and skills training system for a database programming environment. The system provides meaningful knowledge level feed back such as correction of student answer. For this purpose we use the underlying data structure and analysis techniques for correction. A Pattern based error correction component analyzes student input in order to provide immediate feed back.
image
image

Continue Reading

A Paper Presentation on ‘Concealed Weapon Detection through Wireless Sensor Networks’

Abstract:

Bombs went off in different place in many ways and killed many and left many injured. People think bomb blasts can’t be predicted before handled. Here we show you the technology which predicts the suicide bombers and explosion of weapons through IMAGING for CONCEALED WEAPON DETECTION. Till now the detection of concealed weapons is done by manual screening procedures. But these manual screening procedures are not giving satisfactory results. The goal is the eventual deployment of automatic detection and recognition of concealed weapons.
image
   image


Continue Reading