Abstract: device-oriented control system is based on the devices to be controlled and the location they use devices, providing a control service system with dynamic operation interface: when detecting the approaching users, the system would automatically notify users the available devices and provide users with the control options for the devices.

Call Now 9972364704 Download Abstract

Abstract: Key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a password. Most of these protocols are often limited to simple network systems, and they may have security risks. We propose a general construction for key exchange protocols using smart card and password to avoid these flaws. The constructed protocol from the general construction has only one additional communication round than the original public encryption scheme. This construction is proven secure under random oracle model, so it can resist several common types of attacks. It is also adapted well to various networks. Compared with related protocols, the proposed key exchange protocol generated from the general construction has better secure properties and good computational efficiency in storage cost and operation time.

Call Now 9972364704 Download Abstract

Abstract: The flexible use of credit and debit card transactions has become increasingly ubiquitous and so have the associated vulnerabilities that make them a common target for cyber criminals. Furthermore, a prevalent complication associated with blocking of ATM cards involves tedious interactive processes and even possibly long waiting times during interaction with customer care services. Using a three factor authentication scheme employing NFC (Near Field Communication: an emerging technology evolved from a combination of contact-less identification and inter connection providing data exchange), Dash Matrix Algorithm and One-time password, we describe and quantify the potential to overcome common transaction liabilities (brute force attack, Shoulder surfing, skimming of ATM cards, etc.).

Call Now 9972364704 Download Abstract

Abstract: Smartphones and tablets have become ubiquitous in our daily lives. Smartphones, in particular, have become more than personal assistants. These devices have provided new avenues for consumers to play, work and socialize whenever and wherever they want. Smartphones are small in size; so they are easy to handle and to stow and carry in users’ pockets or purses. However, mobile devices are also susceptible to various problems. Oneofthegreatestconcernsisthepossibilityofbreachinsecurity and privacy if the device is seized by an outside party. It is possible that threats can come from friends as well as strangers. Due to the size of smart devices, they can be easily lost and may expose details of users’ private lives. In addition, this might enable pervasive observation or imitation of one’s movements and activities, such as sending messages to contacts, accessing privatecommunication,shoppingwithacreditcard,andrelaying information about where one has been. This paper highlights the po

Call Now 9972364704 Download Abstract

Abstract: Evolution of technology has always been endeavored with making daily life simple. With a fast paced life everybody today is harnessing the benefits of technology except some parts of the society .One of them is the visually impaired who have to rely on others for travelling and other activities. This paper aims at providing one such theoretical model which incorporates the latest technologies to provide efficient and smart electronic aid to the blind. We have used IR sensors along with ultrasonic range finder circuit for hurdle detection. Bluetooth module which along with GPS technology and an Android application for blind, will provide voice assistance to desired location and in panic situations will send SMS alert to registered mobile numbers The basic objective of the system is to provide a convenient and easy navigation aid for unsighted which helps in artificial vision by providing information about the environmental scenario of static and dynamic objects around them.

Call Now 9972364704 Download Abstract

Abstract: The requirements for new web applications supporting different types of devices and purposes are continuously growing. The main advantages of web application development as well as popular development features covering integration with different technologies are considered initially in this paper. Integration and possibilities of application of cloud based web applications in real scenarios with different embedded Internet of Things (IoT) devices are considered and described in this paper. The design and implementation of a cloud based web application supporting vehicle toll payment system using IoT device is presented and described. The development framework as well as featured and popular technologies used to realize a vehicle toll payment by IoT device are described. The concept of vehicle toll payment over an online payment system is also described. Processing, monitoring and control in the cloud based web application of such payments using IoT devices are descr

Call Now 9972364704 Download Abstract

Abstract: M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments, students can easily exchange information over the network during exam time. This paper aims to identify various vulnerabilities that may violate exam security in mlearning environments and to design the appropriate security services and countermeasures that can be put in place to ensure exam security. It also aims to integrate the resulting secure exam system with an existing, open-source, and widely accepted Learning Management System (LMS) and its service extension to the m-learning environment, namely “the Moodbile Project”.

Call Now 9972364704 Download Abstract

Abstract: This paper gives an outline for automatic system to control and secure the home, based on digital image processing with the help of Internet of Things (IoT). The system consists of a sensor, digital camera, database in the fog and the mobile phone. Sensors are placed in the frame of the door which alerts camera, to capture an image who intends to enter the house, then sends the image to the database or dataset that is stored in the fog. Image analysis is performed to detect and recognize and match the image with the stored dataset of the authenticated people or pets. If the image captured does not match with the dataset then an alert message is send to the owner of the house. The image processing algorithms are considered for the processing spatial and time complexity of the image captured to cross check with the dataset stored in the fog.

Call Now 9972364704 Download Abstract

Abstract: School kids monitoring is of great importance for parents who send their kids to school via school transport vehicle. There are many applications that exist for monitoring the vehicle as the kids go to school and come back from school. The existing system gives the tracking report of vehicle and its exact location. Even some applications give vehicle position update information to the parents. This system helps the parents only with the information of the vehicle but they don’t tell whether their kid is in the bus or not. Assume that some kid has participated in cultural program. They are not able to take the vehicle allotted to them or suppose the kid has missed the vehicle to reach his/her house. In that case parents are not able to monitor the kid after school time. This was the problem of existing approaches.

Call Now 9972364704 Download Abstract

Abstract: Many people already carry multiple mobile devices such as mobile phones, tablets, and smart watches. Other wearable computing gadgets (e.g. activity or fitness trackers) are on the rise as well. Most of these devices have access to, process and/or store sensitive information [2]. Well-known examples include, but are not limited to, communications (email, SMS, instant messaging), context information (location), access to non-public networks (WiFi, VPN), access to payment or identity management applications, photos, documents, and even health related information (e.g. heart rate). In addition, with the “Bring your own device” trend, employees start to store and process company data on private devices (cf. [3], [4]). To prevent attackers from gaining access to data stored on these devices, locking and unlocking mechanisms have been developed. Those lock devices while not being used (e.g. after a short idle timeout) and users have to unlock them before usage. While authentication conc

Call Now 9972364704 Download Abstract