Mayank Agarwal, Mahendra Mehra, Renuka Pawar, D. Shah
Virtual Keyboard authentication has helped users to protect their username and passwords from being captured by key loggers, spyware and malicious bots. However Virtual Keyboard still suffers from numerous other fallacies that an attacker can take advantage of. These include click based screenshot capturing, over the shoulder spoofing and co-ordinate position noting. To overcome these drawbacks, we have designed a virtual keyboard that is generated dynamically each time the user access the web site. Also after each click event of the user the arrangement of the keys of the virtual keyboard are shuffled. The position of the keys is hidden so that a user standing behind may not be able to see the pressed key. Our proposed approach makes the usage of virtual keyboard even more secure for users and makes it tougher for malware programs to capture authentication details.
{"title":"Secure authentication using dynamic virtual keyboard layout","authors":"Mayank Agarwal, Mahendra Mehra, Renuka Pawar, D. Shah","doi":"10.1145/1980022.1980087","DOIUrl":"https://doi.org/10.1145/1980022.1980087","url":null,"abstract":"Virtual Keyboard authentication has helped users to protect their username and passwords from being captured by key loggers, spyware and malicious bots. However Virtual Keyboard still suffers from numerous other fallacies that an attacker can take advantage of. These include click based screenshot capturing, over the shoulder spoofing and co-ordinate position noting. To overcome these drawbacks, we have designed a virtual keyboard that is generated dynamically each time the user access the web site. Also after each click event of the user the arrangement of the keys of the virtual keyboard are shuffled. The position of the keys is hidden so that a user standing behind may not be able to see the pressed key. Our proposed approach makes the usage of virtual keyboard even more secure for users and makes it tougher for malware programs to capture authentication details.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116047473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Evaluating educator's effectiveness is important in nearly every institution of higher education. Assessing the effectiveness with which various functions are performed is essential to a variety of important administration recommendations and decisions. Assessing a faculty member's teaching capabilities constitutes a serious challenge. A facial expression results from one or more motions or positions of the muscles of the face. These movements convey the emotional state of the individual to observers. Facial expression analysis refers to computer systems that attempt to automatically analyze and recognize facial motions from visual information. We are exploring the potential of technology enabled feedback system to provide authentic feedback of the teacher while teaching. Images are captured in the class and feedback is generated by studying the expressions of the students in the class in non intrusive technique. This paper proposes a framework for evaluating the faculty member's feedback through facial expression analysis of the students. It reports on the progress made in the development of a facial expression analysis component for assessing the feedback of teacher in a classroom. Digital camera is used to grab the image of the learner and signal processing techniques such as Wavelet and ANN are employed to extract facial expressions. We have suggested a framework for detecting learner's face and locating permanent facial features such as eyebrow, eyes, and mouth. Facial expression analysis is performed based on both permanent and transient facial features in a nearly frontal-view face image sequence.
{"title":"Educator's feedback through expression recognition","authors":"Aprajita Singh","doi":"10.1145/1980022.1980407","DOIUrl":"https://doi.org/10.1145/1980022.1980407","url":null,"abstract":"Evaluating educator's effectiveness is important in nearly every institution of higher education. Assessing the effectiveness with which various functions are performed is essential to a variety of important administration recommendations and decisions. Assessing a faculty member's teaching capabilities constitutes a serious challenge. A facial expression results from one or more motions or positions of the muscles of the face. These movements convey the emotional state of the individual to observers. Facial expression analysis refers to computer systems that attempt to automatically analyze and recognize facial motions from visual information. We are exploring the potential of technology enabled feedback system to provide authentic feedback of the teacher while teaching. Images are captured in the class and feedback is generated by studying the expressions of the students in the class in non intrusive technique. This paper proposes a framework for evaluating the faculty member's feedback through facial expression analysis of the students. It reports on the progress made in the development of a facial expression analysis component for assessing the feedback of teacher in a classroom. Digital camera is used to grab the image of the learner and signal processing techniques such as Wavelet and ANN are employed to extract facial expressions. We have suggested a framework for detecting learner's face and locating permanent facial features such as eyebrow, eyes, and mouth. Facial expression analysis is performed based on both permanent and transient facial features in a nearly frontal-view face image sequence.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116580227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bayesian Networks (BN) have been considered to be one of the most widely used probabilistic data modelling and propositional uncertainty processing paradigms. They exploit the underlying conditional independences in the domain by providing compact graphical representations for high-dimensional joint distributions. A BN consists of two components - a directed acyclic graph whose nodes correspond to a pre-specified set of attributes or random variables; and a set of conditional probability distributions (CPDs) over the attributes. The techniques that have been developed for learning BNs from data have been shown to be remarkably effective for some data mining problems, especially probabilistic descriptive data mining.
{"title":"Bayesian networks in probabilistic relational data mining","authors":"Thakur Village","doi":"10.1145/1980022.1980136","DOIUrl":"https://doi.org/10.1145/1980022.1980136","url":null,"abstract":"Bayesian Networks (BN) have been considered to be one of the most widely used probabilistic data modelling and propositional uncertainty processing paradigms. They exploit the underlying conditional independences in the domain by providing compact graphical representations for high-dimensional joint distributions. A BN consists of two components - a directed acyclic graph whose nodes correspond to a pre-specified set of attributes or random variables; and a set of conditional probability distributions (CPDs) over the attributes. The techniques that have been developed for learning BNs from data have been shown to be remarkably effective for some data mining problems, especially probabilistic descriptive data mining.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"32 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116931616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Road extraction in urban areas from high resolution satellite images helps in creating a database of a city and in cartography. The extraction results are intended to be used for updating a road database. The high dimensionality of aerial and satellite imagery presents a challenge to the human analysis based on the traditional classification algorithms using statistical assumptions. Artificial Neural Networks (ANNs) on the other hand may represent a valuable alternative approach for land cover mapping for such highly dimensional imagery. The urban areas contain roads of different shapes, sizes and lengths. In this paper, the extraction algorithm performs edge detection, morphological reconstruction, feature extraction and classification. The road features are classified using ANNs.
{"title":"Extraction of road network from high resolution satellite images using ANN","authors":"R. Mangala, S. Bhirud","doi":"10.1145/1980022.1980215","DOIUrl":"https://doi.org/10.1145/1980022.1980215","url":null,"abstract":"Road extraction in urban areas from high resolution satellite images helps in creating a database of a city and in cartography. The extraction results are intended to be used for updating a road database. The high dimensionality of aerial and satellite imagery presents a challenge to the human analysis based on the traditional classification algorithms using statistical assumptions. Artificial Neural Networks (ANNs) on the other hand may represent a valuable alternative approach for land cover mapping for such highly dimensional imagery. The urban areas contain roads of different shapes, sizes and lengths. In this paper, the extraction algorithm performs edge detection, morphological reconstruction, feature extraction and classification. The road features are classified using ANNs.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121325021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Bansode, V. Kaul, P. Nemade, M. Yadav, Swati Singh, Ashutosh Singh
Communication networks are all about providing means to communicate that is for (exchanging the user information). The user information can be viewed as user traffic akin to the traffic on the road that moves across the road network. The fastest growth of data communication Networks over the past decades has resulted in the development of sophisticated tools to diagnose, debug and analyze such networks. We have developed a toolkit called MENeT (Monitor for Ethernet Network Traffic). The toolkit is an extension to the earlier developed utility for Traffic Monitoring. The toolkit is operational on the platform of windows NT/2000 and is developed by programming in Microsoft Visual C++ environment. The MENeT captures and dissembles the packets flowing through a system and extracts TCP/IP (Transmission Control Protocol/Internet Protocol) packets only. MENeT monitors network traffic by partitioning it into a set of classes. The set of classes are defined as Network Traffic, Broadcast Traffic and Workstation Traffic. It measures traffic at a time scale ranging from a few seconds to several minutes. Using the fine-grained information that MENeT exports, proves its effectiveness for monitoring and protocol analysis. The work on presenting the statistics to portray the Network Traffic from every angle is in place.
{"title":"Network traffic monitoring using protocol analysis tool to achieve QoS","authors":"S. Bansode, V. Kaul, P. Nemade, M. Yadav, Swati Singh, Ashutosh Singh","doi":"10.1145/1980022.1980374","DOIUrl":"https://doi.org/10.1145/1980022.1980374","url":null,"abstract":"Communication networks are all about providing means to communicate that is for (exchanging the user information). The user information can be viewed as user traffic akin to the traffic on the road that moves across the road network. The fastest growth of data communication Networks over the past decades has resulted in the development of sophisticated tools to diagnose, debug and analyze such networks. We have developed a toolkit called MENeT (Monitor for Ethernet Network Traffic). The toolkit is an extension to the earlier developed utility for Traffic Monitoring. The toolkit is operational on the platform of windows NT/2000 and is developed by programming in Microsoft Visual C++ environment. The MENeT captures and dissembles the packets flowing through a system and extracts TCP/IP (Transmission Control Protocol/Internet Protocol) packets only. MENeT monitors network traffic by partitioning it into a set of classes. The set of classes are defined as Network Traffic, Broadcast Traffic and Workstation Traffic. It measures traffic at a time scale ranging from a few seconds to several minutes. Using the fine-grained information that MENeT exports, proves its effectiveness for monitoring and protocol analysis. The work on presenting the statistics to portray the Network Traffic from every angle is in place.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123500884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The scaling of CMOS technology has progressed rapidly for three decades. But CMOS is bound to reach its limits due to certain constraints such as minimum dimensions that can be fabricated, degradation in switching performance, power-dissipation etc. Thus, the technologies that may replace CMOS when the limit is reached need to be investigated. Some of the potential solutions can be use of new materials such as graphene or new structures such as Dual gate and back gate. In this paper we investigate the structural and electronic properties of graphene nano-ribbons when devised into dual gate and back-gate structures. Simulation results have been used to support the paper.
{"title":"High performance dual gate GNR fet","authors":"N. G. Bheniye, P. Panchal, A. Gajarushi","doi":"10.1145/1980022.1980391","DOIUrl":"https://doi.org/10.1145/1980022.1980391","url":null,"abstract":"The scaling of CMOS technology has progressed rapidly for three decades. But CMOS is bound to reach its limits due to certain constraints such as minimum dimensions that can be fabricated, degradation in switching performance, power-dissipation etc. Thus, the technologies that may replace CMOS when the limit is reached need to be investigated. Some of the potential solutions can be use of new materials such as graphene or new structures such as Dual gate and back gate. In this paper we investigate the structural and electronic properties of graphene nano-ribbons when devised into dual gate and back-gate structures. Simulation results have been used to support the paper.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122669658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sudhir N. Dhage, B. Meshram, R. Rawat, S. Padawe, M. Paingaokar, A. Misra
In recent years, with the growing popularity of cloud computing, security in cloud has become an important issue. As "Prevention is better than cure", detecting and blocking an attack is better than responding to an attack after a system has been compromised. This paper proposes architecture capable of detecting intrusions in a distributed cloud computing environment, and safeguarding it from possible security breaches. It deploys a separate instance of IDS for each user and uses a single controller to manage the instances. IDS in this architecture can use signature based as well as learning based method.
{"title":"Intrusion detection system in cloud computing environment","authors":"Sudhir N. Dhage, B. Meshram, R. Rawat, S. Padawe, M. Paingaokar, A. Misra","doi":"10.1145/1980022.1980076","DOIUrl":"https://doi.org/10.1145/1980022.1980076","url":null,"abstract":"In recent years, with the growing popularity of cloud computing, security in cloud has become an important issue. As \"Prevention is better than cure\", detecting and blocking an attack is better than responding to an attack after a system has been compromised. This paper proposes architecture capable of detecting intrusions in a distributed cloud computing environment, and safeguarding it from possible security breaches. It deploys a separate instance of IDS for each user and uses a single controller to manage the instances. IDS in this architecture can use signature based as well as learning based method.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128586424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The objective of segmentation of medical image is to extract and characterize anatomical structures from the images. Segmentation of medical is quiet difficult task because most images contain large noise. Canny operator has decent anti-noise ability. However Edge based canny operator is not consecutive and applying the canny operator on total image make reduces the performance of the system. In this paper, a new method of segmentation by the integration of 2D Otsu method with Canny edge detector and Region Growing is proposed. Here the first the low pass filter to reduce the noise and then Otsu thresholding method is used to extract the region of interest. In this system, Region Growing and Edge detection algorithm are executed parallel. This parallel executing system is used to get the edge map of image. This system is used to identify the Brain tumor. It is also used for Bone Fracture identification and Classification of Blood Cells. Experiments have shown that this system gives best segmentation results for brain tumor identification.
{"title":"Medical image segmentation for brain tumor detection","authors":"D. Gaikwad, P. Abhang, P. Bedekar","doi":"10.1145/1980022.1980035","DOIUrl":"https://doi.org/10.1145/1980022.1980035","url":null,"abstract":"The objective of segmentation of medical image is to extract and characterize anatomical structures from the images. Segmentation of medical is quiet difficult task because most images contain large noise. Canny operator has decent anti-noise ability. However Edge based canny operator is not consecutive and applying the canny operator on total image make reduces the performance of the system. In this paper, a new method of segmentation by the integration of 2D Otsu method with Canny edge detector and Region Growing is proposed. Here the first the low pass filter to reduce the noise and then Otsu thresholding method is used to extract the region of interest. In this system, Region Growing and Edge detection algorithm are executed parallel. This parallel executing system is used to get the edge map of image. This system is used to identify the Brain tumor. It is also used for Bone Fracture identification and Classification of Blood Cells. Experiments have shown that this system gives best segmentation results for brain tumor identification.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128966314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hyperspectral imagery provides richer information about materials than multispectral imagery. The new larger data volumes from hyperspectral sensors present a challenge for traditional processing techniques. Principal component analysis (PCA) has been the technique of choice for dimension reduction. Spectral data reduction and estimation using wavelet filter bank with perfect reconstruction can be considered for better results.
{"title":"Reduction and estimation of hyperspectral imagery using dual tree wavelet filter bank analysis with an orthogonal subspace projection approach","authors":"S. Swamy, B. Patel","doi":"10.1145/1980022.1980228","DOIUrl":"https://doi.org/10.1145/1980022.1980228","url":null,"abstract":"Hyperspectral imagery provides richer information about materials than multispectral imagery. The new larger data volumes from hyperspectral sensors present a challenge for traditional processing techniques. Principal component analysis (PCA) has been the technique of choice for dimension reduction. Spectral data reduction and estimation using wavelet filter bank with perfect reconstruction can be considered for better results.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129023750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Agile methods generally promote a disciplined project management process that encourages frequent inspection and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability, a set of engineering best practices that allow for rapid delivery of high-quality software, and a business approach that aligns development with customer needs and company goals. When it is considered Agile Principles as a leadership value System in the Software Development then the question arise that are one is ready to be unleashed? As criticisms include several issues regarding the same like Agile Principles often used as a means to bleed money from customers through lack of defining a deliverable, Lack of structure and necessary documentation, Only works with senior-level developers Incorporates insufficient software design, Requires meetings at frequent intervals at enormous expense to customers, Requires too much cultural change to adopt, Can lead to more difficult contractual negotiations?, Can be very inefficient---if the requirements for one area of code change through various iterations, the same programming may need to be done several times over. Impossible to develop realistic estimates of work effort needed to provide a quote, because at the beginning of the project no one knows the entire scope/requirements and can increase the risk of scope due to the lack of detailed requirements documentation? Here it is observed and surveyed the various categories of Projects for different kind of group members to adopt and follow the agile principles. It proposes the strength and weaknesses of all 12 Agile Principles based on Indian scenario.
{"title":"Agile principles as a leadership value system in the software development: are we ready to be unleashed?","authors":"S. Patil, Srikantha Rao, Preeti S. Patil","doi":"10.1145/1980022.1980188","DOIUrl":"https://doi.org/10.1145/1980022.1980188","url":null,"abstract":"Agile methods generally promote a disciplined project management process that encourages frequent inspection and adaptation, a leadership philosophy that encourages teamwork, self-organization and accountability, a set of engineering best practices that allow for rapid delivery of high-quality software, and a business approach that aligns development with customer needs and company goals. When it is considered Agile Principles as a leadership value System in the Software Development then the question arise that are one is ready to be unleashed? As criticisms include several issues regarding the same like Agile Principles often used as a means to bleed money from customers through lack of defining a deliverable, Lack of structure and necessary documentation, Only works with senior-level developers Incorporates insufficient software design, Requires meetings at frequent intervals at enormous expense to customers, Requires too much cultural change to adopt, Can lead to more difficult contractual negotiations?, Can be very inefficient---if the requirements for one area of code change through various iterations, the same programming may need to be done several times over. Impossible to develop realistic estimates of work effort needed to provide a quote, because at the beginning of the project no one knows the entire scope/requirements and can increase the risk of scope due to the lack of detailed requirements documentation?\u0000 Here it is observed and surveyed the various categories of Projects for different kind of group members to adopt and follow the agile principles. It proposes the strength and weaknesses of all 12 Agile Principles based on Indian scenario.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129422904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}