ieee topics
DESCRIPTION
C-in SoftwaresTRANSCRIPT
C-inSoftwares
C-inSoftwares Page 1
Cellular Client Controller:
This software is used to control the working of a computer using mobiles. It contains mainly mobile
phones and computers. A GSM modem, which is connected to an admin system and a mobile, will be
handled by the user. This system is implemented in many organizations to control computers using
mobiles
Content Based Image Retrieval
Content-based image retrieval (CBIR), also known as query by image content (QBIC) and content-based
visual information retrieval (CBVIR) is the application of computer vision techniques to the image
retrieval problem, that is, the problem of searching for digital images in large databases.
Modeling and Detection of Camouflaging Worm
Active worms pose major security threats to the Internet. This is due to the ability of active worms to
propagate in an automated fashion as they continuously compromise computers on the Internet. Active
worms evolve during their propagation, and thus, pose great challenges to defend against them. In this
paper, we investigate a new class of active worms, referred to as Camouflaging Worm (C-Worm in short).
The C-Worm is different from traditional worms because of its ability to intelligently manipulate its scan
traffic volume over time. Thereby, the C-Worm camouflages its propagation from existing worm
detection systems based on analyzing the propagation traffic generated by worms. We analyze
characteristics of the C-Worm and conduct a comprehensive comparison between its traffic and no worm
traffic (background traffic). We observe that these two types of traffic are barely distinguishable in the
time domain. However, their distinction is clear in the frequency domain, due to the recurring
manipulative nature of the C-Worm. Motivated by our observations, we design a novel spectrum-based
scheme to detect the C-Worm. Our scheme uses the Power Spectral Density (PSD) distribution of the
scan traffic volume and its corresponding Spectral Flatness Measure (SFM) to distinguish the C-Worm
traffic from background traffic. Using a comprehensive set of detection metrics and real-world traces as
background traffic, we conduct extensive performance evaluations on our proposed spectrum-based
detection scheme. The performance data clearly demonstrates that our scheme can effectively detect the
C-Worm propagation. Furthermore, we show the generality of our spectrum-based scheme in effectively
detecting not only the C-Worm, but traditional worms as well.
C-inSoftwares
C-inSoftwares Page 2
Safe Driving Using Mobile Phones
As vehicle manufacturers continue to increase their emphasis on safety with advanced driver-assistance
systems (ADASs), we propose a device that is not only already in abundance but portable enough as well
to be one of the most effective multipurpose devices that are able to analyze and advise on safety
conditions. Mobile smart phones today are equipped with numerous sensors that can help to aid in safety
enhancements for drivers on the road. In this paper, we use the three-axis accelerometer of an Android-
based smart phone to record and analyze various driver behaviors and external road conditions that could
potentially be hazardous to the health of the driver, the neighboring public, and the automobile. Effective
use of these data can educate a potentially dangerous driver on how to safely and efficiently operate a
vehicle. With real-time analysis and auditory alerts of these factors, we can increase a driver’s overall
awareness to maximize safety.
Location Based Services using Android Mobile Operating System
The motivation for every location based information system is: “To assist with the exact information, at
right place in real time with personalized setup and location sensitiveness”. In this era we are dealing with
palmtops and iPhones, which are going to replace the bulky desktops even for computational purposes.
We have vast number of applications and usage where a person sitting in a roadside café needs to get
relevant data and information. Such needs can only be catered with the help of LBS. These applications
include security related jobs, general survey regarding traffic patterns, decision based on vehicular
information for validity of registration and license numbers etc. A very appealing application includes
surveillance where instant information is needed to decide if the people being monitored are any real
threat or an erroneous target. We have been able to create a number of different applications where we
provide the user with information regarding a place he or she wants to visit. But these applications are
limited to desktops only. We need to import them on mobile devices. We must ensure that a person when
visiting places need not carry the travel guides with him. All the information must be available in his
mobile device and also in user customized format.