Volume-4 Issue-5
- Version
- Download 17
- File Size 4.00 KB
- File Count 1
- Create Date August 27, 2017
- Last Updated September 4, 2017
Volume-4 Issue-5
S. No |
Volume-4 Issue-5, November 2015, ISSN: 2277-3878 (Online)
|
Page No. |
|
1. |
Authors: |
P. Dayaker, Chandrakant K. Daf |
|
Paper Title: |
Defending Against Password Guessing Attacks on Web Applications |
||
Abstract: Brute force and dictionary attacks on password protected remote login services are increasing rapidly. Letting legitimate user’s login conveniently while preventing such attacks is difficult. Automated Turing Tests (ATTs) are effective and easy to implement but cause reasonable amount of inconvenience to the user. We discuss the existing and proposed login protocols designed to prevent large scale online dictionary attacks. We propose Password Guessing Resistant Protocol (PGRP), which is derived upon revisiting prior proposals designed to restrict such attacks. PGRP reduces the total number of login attempts from an unknown remote host while trusted or legitimate users can make several failed login attempts before being challenged by ATT.
|
|||
2. |
Authors: |
E. Nagabhooshanam, Y. Gayathri, G.Praveen, K. Deepak, D. Sireesha |
|
Paper Title: |
Monitoring of Health @ Home using Sensing Devices |
||
Abstract: The current healthcare model is mostly in-hospital based and consists of periodic visits. Nowadays, chronic heart failure (CHF) affects an ever-growing segment of population, and it is among the major causes of hospitalization for elderly citizens. The actual out-of hospital treatment model, based on periodic visits, has a low capability to detect signs of destabilization and leads to a high re-hospitalization rate. To this aim, in this paper, a complete and integrated Information and Communication Technology system is described enabling the CHF patients to daily collect vital signs at home and automatically send them to the Hospital Information System, allowing the physicians to monitor their patients at distance and take timely actions in case of necessity. A minimum set of vital parameters has been identified, consisting of electrocardiogram, SpO2, blood pressure, and weight, measured through a pool of wireless, non-invasive biomedical sensors. A multi-channel front-end IC for cardiac sensor interfacing has been also developed. Sensor data acquisition and signal processing are in charge of an additional device, the home gateway. All signals are processed upon acquisition in order to assert if both punctual values and extracted trends lay in a safety zone established by thresholds. Per-patient personalized thresholds, required measurements and transmission policy are allowed. As proved by first medical tests, the proposed telemedicine platform represents a valid support to early detect the alterations in vital signs that precede the acute syndromes, allowing early home interventions thus reducing the number of subsequent hospitalizations.
|
|||
3. |
Authors: |
Santosh L Bidve, Bhushan S Deshmukh, Abhilash G Chamwad, V K Pachghare, Rahul B Adhao |
|
Paper Title: |
Wireless Intrusion Detection System using Reputation |
||
Abstract: Development in the field of Information Technology has led to increase in speed of Internet. With the increase in internet users there is a tremendous increase in network traffic. Increase in network traffic has also increased the threat of intrusion over the network. For the ever growing internet speed there is a necessity to modify the intrusion detection system in order to detect the intrusion threats across the network. In order to meet these needs of Intrusion detection system we can use the combination of packet based and flow based systems. Reduction of false alarm is also a matter of concern in intrusion detection.
|
|||
4. |
Authors: |
Mohammed Jassim Mohammed Jassim |
|
Paper Title: |
Printed Text and Handwriting Identification in Noisy Document Images |
||
Abstract: In this project, we address the problem of segmenting and identifying text in noisy document images. The identification of machine printed text and handwriting is important because: (1) recognition techniques available for machine printed text and handwriting are significantly different (2) Handwriting in a document indicates corrections, additions that should be treated differently from the main content. Instead of using simple noise filtering techniques, our approach treat noise itself is treated as a class. Thus our approach becomes a three-class identification problem (Machine Printed Text, Handwriting and Noise). After performing text identification, post processing is performed to refine classification accuracy.
|
|||
5. |
Authors: |
Abdullah .M.Y. AL-Hersh, Mahmoud .M.M. AL-Zyood |
|
Paper Title: |
The Effect of CRM on Customer Satisfaction Field Study on Jordanian & Saudi Bank Services |
||
Abstract: Due to the rapid expansion in banks and the severe competition for customers’ retention, banks have started using various marketing strategies to achieve their objectives. Customer Relationship Marketing is one of the marketing strategies that may be used in this respect. The study aims to investigate the impact of Customer Relationship Marketing on Customer Satisfaction in Banking Industry in KSA and Jordan. An e-mail questionnaire was designed and sent to 500 hundred customers of Arab Bank in KSA and Jordan, creating two sample pools of respondents. A total of 151 of the collected questionnaires were valid. The study findings show medium to high degrees of positive attributes of the two samples toward Customer Relationship Marketing dimensions (trust, commitment, communication, empathy, social bonding and fulfilling promises) on customer satisfaction. The findings also indicate different attitudes regarding the importance of Customer Relationship Marketing dimension between the two samples. The findings also indicate different results regarding the impact of Customer Relationship Marketing on customer’s satisfaction due to gender, age and educational level. Ultimately, the study suggested that Arab bank, whether in the study’s two selected countries, or in other countries where it has branches and operates from, should apply Customer Relationship Marketing in order to maintain its market share in the market..
|
|||
6. |
Authors: |
Sachin G. Gaikwad, P.S. Swami, A. G.Thosar |
|
Paper Title: |
Comparison of Conventional and Fuzzy Logic Approach for DGA of EHV Transformer |
||
Abstract: this paper deals with Dissolved gas analysis (DGA) of Extra High Voltage (EHV) transformers. Dissolved gas analysis (DGA) is a commonly used diagnostic testing tool which gives valuable information about fault developed inside the transformer. Development of incipient fault inside the transformer causes decomposition of oil and generation of combustible hydrocarbon gases. Amount and type of gas generated depends upon nature of fault in transformer.IEC and IEEE standards specify various techniques for interpretation of DGA test results. These conventional techniques include various ratio analysis methods. Many times these techniques fail to detect fault in transformer. This paper describes Fuzzy logic approach for interpretation of DGA test results. In this paper conventional and fuzzy logic method of DGA interpretation are implemented in MATLAB. DGA test data available for various EHV transformers is applied to fuzzy logic and conventional methods of DGA interpretation. Results obtained are compared with actual condition of transformer. Based on results obtained accuracy of fault detection for fuzzy logic method is calculated and compared with conventional interpretation methods. |
|||
7. |
Authors: |
Maya Stefanova, Rozalina Chuturkova, Evgeni Sokolovski, Nina Ilieva, Tsenislav Vlaknenski |
|
Paper Title: |
Prognosis Modeling of Nitrous Oxide Emissions after Catalytic Reduction |
||
Abstract: The present research aims to assess the effect of increasing the thickness of a secondary catalyst layer for N2O emission reduction at a nitric acid plant in Devnya, Bulgaria upon the ambient air quality. A mathematical modeling is done for simulating the dispersion of N2O emissions from the plant into the ground atmospheric layer taking into account the specific topographic and meteorological conditions of the region. Separate graphic models are done illustrating the dispersion of N2O emissions at two main scenarios – at current thickness of the secondary catalyst layer of 60 mm and at future increase of the catalyst layer thickness to 90 mm. Modeling results indicate that under equivalent meteorological conditions the planned increase of the secondary catalyst layer thickness leads to 69 % reduction of the annual average N2O concentration in the atmosphere. Maximum N2O concentrations over specific periods of time (1 hour, 8 hours and 24 hours) are also reduced over 3 times within the outlines of the exposed areas. Research results provide prognosis on the impact of the increased thickness of the secondary catalyst layer as a measure for N2O emission reduction upon the ambient air quality of the source region. Prognosis modeling provides a tool for assessing the contribution of N2O emissions from nitric acid production to the overall greenhouse gas emissions in long-term future periods regarding the implementation of quantitative commitments under the Kyoto Protocol.
|
|||
8. |
Authors: |
Aparna Raut, Kiran Sukal, Anushree Khedekar, Monika Mohimkar |
|
Paper Title: |
Secured Password Verification Captcha Using Visual Cryptography |
||
Abstract: With the advent of internet, various online attacks has been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. We are using visual cryptography algorithm for separating privileges. The use of visual cryptography is explored to preserve the privacy of an image CAPTCHA by decomposing the original image CAPTCHA into two shares (known as sheets) that are stored in separate database servers(one with user and one with server such that the original image CAPTCHA can be revealed only when both are simultaneously available; the individual sheet images do not reveal the identity of the original image CAPTCHA. Once the original image CAPTCHA is revealed to the user it can be used as the password. of attacks.
|