Research Papers

Abstract

Graphical password has been used as an alternative technique to alphanumeric password that supports graphics applications. Common technique that is used for security is alphanumeric technique that can be easily guessed by an unauthorized person. This technique has some drawbacks also. As if the password is hard to guess then it is very hard to remember also, so to solve the problem, graphical password authentication is used. In this method we use pictures as our password because pictures can be remembered easily. In graphical password techniques user can select images

Author

Aishwarya saxena, Divya trivedi, Soumya sharma, Toshi agarwal

Journal

I3CMTS-2014 Organised by SEMS Lucknow, 05-06 APRIL 2014

Abstract

The concept of informational retrieval systems is to only receive the input from user as keywords, process it, then compared with the database and the information is provided to the user if the information exist in the database. Several steps are performed before we get the result from any information retrieval system. These steps are searching, linking web pages, and then we get the matching results and finally optimizing the results.So, in this paper we are trying to analyze and compare various optimizing techniques and strategies of optimization used in the information retrieval system. Search Engine Optimization(seo) is the technique which is used to increase the importance of the pages which are most frequently visited and which the user come upon regularly. In search engine optimization there are mainly two basic algorithms used page rank and Hypertext Induced Topic Search(HITS). In page rank algorithm, links connected to various web pages and websites are given more importance and weightage while in the HITS algorithm query based search is performed.

Author

Anie Sheikh , Pratibha, Shivani

Journal

National Conference on AEICT-2014 Organised by PSIT Kanpur,12-13 April 2014

Abstract

Android is an operating system for smartphones, tablets and now will be used for Personal Computers also. It includes a touch screen user interface, widgets, camera, network data monitoring and all the other features that enable a cell phone to be called a smartphone. Basically, Multi-Purpose chat application allows users to send asynchronous messages, and enable sharing image files with other peers on the JXTA world using JXME. Instant messaging has become so ubiquitous, an entire generation of internet users is probably unaware there was ever life without it. The use of instant messaging nowadays is more than the calling function itself. The main objective of this paper is to introduce a methodology to provide instant Messaging Service over the intranet which is addressed to android based smartphone and tablet users connected over intranet via Wi-Fi. The proposed method is based on sending/receiving messages in intranet through intranet server via Wi- Fi connection without the need of taking any service from mobile service provider and without the use of internet connection. In this paper, we shall be discussing the pros and cons of BlueStacks App Player which has been designed to enable Android applications to run on Windows PC. We will show or discuss this by using Bluestacks software which will provide an efficient and fast way to perform instant messaging which will further increase the performance. With IM, you can keep a list of people you interact with. You can IM with anyone on your buddy list or contact list as long as that person is online. You type messages to each other into a small window that shows up on both of your screens.

Author

Priya Mehrotra, Tanshi Pradhan and Payal Jain

Journal

2nd International Conference on ACSITEET – 2014 Organised by Krishi Sanskriti at JNU New Delhi, 22-23 Feb-2014

Abstract

Multi User Chat System is an application through which the user can communicate with other users connected in the same network area (LAN). This works under any operating system and is programmed in java. To establish a communication between the systems, we need simple socket connections in order to connect them in a network. Multiuser multi-purpose chat application for mobile distributed systems supports both instant messaging and file sharing. The chat application is based on peer-to-peer network, which means there is no need for central server for peers to meet and talk. Besides supporting real-time messaging and file sharing, multi-purpose chat application also supports downloading files from the remote web server, and saving the image in the local secure digital card (SD card).

Author

Payal Jain, Priya Mehrotra, Tanshi Pradhan,Rohit Saxena

Journal

IJCET – 2014

Abstract

The current work focus on the development of software for detecting the areas which are prone with traffic. This software is developed for the small area for analysis of traffic. Using map for distance of each node is calculated. The present paper detects its shortest path from its source node to the destination node which are prone with traffic. It also depicts how the alternative path is selected when the traffic is detected during the travelling. If directed path is not available software sends a message to the user path doesn’t exist.

Author

Archana Sonali, Shivam Prasad, Arpita Gangwar, Poonam Gangwar and Manvi Mishra

Journal

International Conference on ETGMPIA-2014 Organised by Symbiosis Centre Noida, 07-08 MARCH 2014

Abstract

This contribution focuses on the question why e-appointment has not (yet) become a “killer application”. It reports on two strategic efforts to introduce e-appointment applications in a given environment: (1) the state administration seeking to improve its e-government services through allowing citizens to makes appointments with administrative staff, and (2) the medical association seeking e-appointment solutions for doctors’ practices to relate with their patients. In both cases it turned out that the main challenges on the road to successful e-appointment are a detailed understanding of the appointment making process, a technical infrastructure which enables communication between distributed software components, and organizational circumstances which support the e-appointment application. The summary indicates lessons learned from the web engineering as well as from the information management point of view.

Author

Anjali Yadav, Akanksha Gangwar, Divya Singh, Sonal Katiyar

Journal

IJARCET Vol 2, Issue 4,APRIL 2013, pp 1-6

Abstract

—Image enhancement is the task of applying certain alterations to an input image like as to obtain a more visually pleasing image. Image enhancement is to improve the image quality so that resultant image is better than the original image for a specific application or set of objectives. Extensive research has been done on image enhancement and hence it has become essential to categorize the research outcomes and provide an overview of the available enhancement techniques like histogram, histogram equalization, RGB to grayscale conversion, spatial and frequency domain, image negative and log transformation. Thus finally it is concluded that histogram is the best technique for image quality assessment.

Author

Aditi Garg, Astha Jain, Nandita Agrahari, Shivani Goyal

Journal

International Conference on APCMET Organised by Krishi Sanskriti at JNU New Delhi, 19-20 April, 2014

Abstract

Vehicular networking has significant potential to enable diverse applications with traffic safety, traffic efficiency and infotainment. In this research paper we introduce the basics of vehicular network. We provide an overview of VANET and its associated, components along with challenges and their proposed solutions using CIA model. Here we have considered security as the major issue to be researched. To solve security challenge we introduce the trust security model that we provide the optimal solution to the problem. Thus, the work in perspective is put is put and that will provide the scope for the further improvement.

Author

Aditi Garg, Shivani Goyal

Journal

International Conference on APCMET Organised by Krishi Sanskriti at JNU New Delhi, 19-20 April, 2015

Abstract

The design of information presentation on the web is predominately visual oriented. This presentation approach requires most, if not all, of the user’s attention and imposes considerable cognitive load on a user. This approach is not always practical, especially for the visually impaired persons. The focus of this project is to develop a prototype which supports web browsing using a speech-based interface. The command input and the delivery of web contents are entirely in voice. Audio icons are built into the prototype so that users can have better understanding of the original structure/intent of a web page. Navigation and control commands are available to enhance the web browsing experience. In this paper we introduce use of JAVA SPEECH API for the interaction with the browser.

Author

Richa Varshney, Dollma Kalsi, Shubhi Agarwal, Sarabjeet Kaur

Journal

3rd National Conference on NCETCE-2013 Organised by SKITMG Jaipur,

Abstract

Browsers are the need of today life. They are the surfing essence to every human. In this research paper we have the browser providing the effectiveness of the speech facility. By selecting the certain text the text will be provided to the user in the sound format. This has taken technology a one notch higher by providing the text to speech in the browser which is a boon as even the physically challenged people can take the advantage of the technology in a better way. Here we use the speech synthesis technology with .NET framework which helps the synthesis of text into the speech output. This technique is effective in making the digital and human world more interactive.

Author

Shubhi Agarwal, Dollma Kalsi, Richa Varshney, Sarabjeet Kaur

Journal

IJARCET-2014 30 Nov 2013

Abstract

Phishing is a type of internet fraud that seeks to acquire a users credit details by deception. It includes theft of passwords, credit card numbers, bank account details and other confidential information for own benefit. This causes a lot of theft to the society. So in answer to phishing there are anti-phishing techniques. In this paper we have studied phishing in detail and have compared various anti-phishing techniques and their advantages and disadvantages.

Author

Yashi Agarwal, Radhika Tondon, Ankita Singh, Bishwajeet Kumar

Journal

IJARCET -2014 Vol 3, Issue 4, April 2014

Abstract

Web applications are important, common distributed systems whose current security relies primarily on Server –side mechanisms. As they are increasingly used for critical services, web applications become a popular and valuable target for security attacks. Although a large body of techniques have been developed to fortify web applications and mitigate the attacks toward web applications, there is little effort devoted to drawing connections among these techniques and building a big picture of web application security research. Web applications provide end users with client access to server functionality through a set of web pages. Web applications are important, ubiquitous distributed systems whose current security relies primarily on server-side mechanisms. This paper makes the end-to-end argument that the client and server must collaborate to achieve security goals, to eliminate common security exploits. These pages often contain script code to be executed dynamically within the client Web browser. Most web applications aim to enforce simple, intuitive security policies such as, for Web-based email , disallowing any scripts in untrusted email messages. Even so, web applications are currently subject to a plethora of successful attacks, susch as cross-site scripts, cookie theft, session riding, browser hijacking, and the recent self-propagating worms in web- based email and social networking sites.

Author

Neha Gupta, Neha Singh, Sonali Gupta, Priya Mehrotra

Journal

International Conference on CCMTS-2014 Organised by SEMS Lucknow 05-06 April 2014

Abstract

In this present work we have given a concise and systematic study of evolution of cloud computing from shared web hosting to public cloud computing along with multi clouds based on a wide spectrum of factors which include scalability, availability and performance. The proposed work studies hosting types and aims to promote the use of single and multi-clouds to reduce the risks. Clouds computing is a multi-paradigm technology which has evolved as a cost effective, flexible, performance oriented infrastructure for agile development of business operations. Cloud Computing changes the way we think about computing by decoupling data processing, data retention and data presentation – in effect, divorcing components from location. Today due to the need of hour and security constraints, single cloud computing is transforming to multi cloud computing. Focus has been done on multi cloud which is also known as “inter cloud “ or “cloud of clouds” which reduces the security risks like failure of service availability, data loss and confidentiality breaches that are drawbacks with single cloud.

Author

Manvi Mishra,Isha Arora, pooja Singh, Sugandha Prabhakar

Journal

IJRET, Vol 3, Issue 3,

Abstract

This paper describes the new vertical handoff technique for integration of Wifi (IEEE802.11) and WiMAX (IEEE802.1M6) wireless network based on fuzzy comprehensive. The fuzzy comprehensive theory considers various factors like signal to noise ratio, signal strength and terminal moving speed. Simulations of these factors are performed in Network Simulator (NS2, NS3). The result of the experiment will increase the connectivity strength and reduce the ping pong effect. ACSITEET Organised by Krishi Sanskriti

Author

Yashi Agarwal, Anshika Agarwal, Priya Mehrotra, Tanshi Pradhan

Journal

2nd International Conference on

Abstract

Smartphone usage has been continuously increasing in recent years. Moreover, smart phones are often used for privacy sensitive tasks, becoming highly valuable targets for attackers. They are also quite different from PCs, so that PC oriented solutions are not always applicable, or do not offer comprehensive security. Smart phones enable a new, rich user experience in pervasive computing, but their hardware is still very limited in terms of computation, memory, and energy reserves, thus limit ing potential applications .In this paper we outline the concept of grid computing to minimize inconsistency, delay, and short term requirement of resources which can occurred in the clone cloud execution of smart phones.

Author

Dolly Sharma, Arti Saubhari & Archana Sonali

Journal

International Conference on EECS held at Nainital, 7 April 2014

Abstract

The most commonly used password authentication used from earlier times is textual password. But textual password were more susceptible to dictionary attacks, eaves dropping and shoulder surfing. Thus a more secure authentication scheme was developed known as graphical passwords. It was resistive to other attacks but still faces problem of shoulder surfing. So in order to enhance the security concept session passwords were developed. This paper discusses problem with password security and provide better security mechanism by using session passwords as well as graphical passwords. Here we discuss both methods, the advantages, problems and future work will be anticipated.

Author

Aprajita, Komal Gupta, Smrati Gupta, Somya

Journal

IJAICT Vol 1, Issue 1, May 2014

Abstract

Grid is serving as a mainstream High Performance Computing (HPC) platform to provide massive computational power to execute large- scale -intensive scientific and technological applications .Enlarging the existing global grid infrastructure to meet the increasing demand from grid users can progressively speed up the advancement of science and technology. But the growing environmental and economic impact due to high energy consumption of HPC platforms has become a major bottleneck in expansion of grid like platforms. The problem can be addressed by replacing with more energy efficient infrastructures, but the process of switching to new infrastructure is not only costly but also time consuming. We presented the application of cloud and green and virtualization technologies which exploits the heterogeneous nature of Grid to achieve reduction in energy demands and security issues of grid infrastructure. Simulation results show that these applications and technologies can significantly improve the energy efficiency of global grids by a factor of typically 33% and as much as a factor of 50%.

Author

Darsha Agarwal, Tanya Agarwal, Suhani Varshney

Journal

Abstract

In this paper, we present a survey of some of the reliable, efficient and scalable techniques for computer network security. As, Computer network security is gaining popularity among network practitioners, with organizations investing more time and money to protect their valuable information. Security has also recently attracted considerable attention from network researchers. There’s no doubt about its importance and the growing need to understand methods to operate networks securely. Back propagation is a systematic method of training multilayer artificial neural networks. It is built on high mathematical foundation and has very good application potential.

Author

Priya Mehrotra, Anjali Yadav, Pooja Singh, Yashi Agarwal

Journal