ieee topics

2
C-inSoftwares C-inSoftwares Page 1 Cellular Client Controller: This software is used to control the working of a computer using mobiles. It contains mainly mobile phones and computers. A GSM modem, which is connected to an admin system and a mobile, will be handled by the user. This system is implemented in many organizations to control computers using mobiles Content Based Image Retrieval Content-based image retrieval (CBIR), also known as query by image content (QBIC) and content-based visual information retrieval (CBVIR) is the application of computer vision techniques to the image retrieval problem, that is, the problem of searching for digital images in large databases. Modeling and Detection of Camouflaging Worm Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation, and thus, pose great challenges to defend against them. In this paper, we investigate a new class of active worms, referred to as Camouflaging Worm (C-Worm in short). The C-Worm is different from traditional worms because of its ability to intelligently manipulate its scan traffic volume over time. Thereby, the C-Worm camouflages its propagation from existing worm detection systems based on analyzing the propagation traffic generated by worms. We analyze characteristics of the C-Worm and conduct a comprehensive comparison between its traffic and no worm traffic (background traffic). We observe that these two types of traffic are barely distinguishable in the time domain. However, their distinction is clear in the frequency domain, due to the recurring manipulative nature of the C-Worm. Motivated by our observations, we design a novel spectrum-based scheme to detect the C-Worm. Our scheme uses the Power Spectral Density (PSD) distribution of the scan traffic volume and its corresponding Spectral Flatness Measure (SFM) to distinguish the C-Worm traffic from background traffic. Using a comprehensive set of detection metrics and real-world traces as background traffic, we conduct extensive performance evaluations on our proposed spectrum-based detection scheme. The performance data clearly demonstrates that our scheme can effectively detect the C-Worm propagation. Furthermore, we show the generality of our spectrum-based scheme in effectively detecting not only the C-Worm, but traditional worms as well.

Upload: richin-varghese

Post on 28-Nov-2015

3 views

Category:

Documents


0 download

DESCRIPTION

C-in Softwares

TRANSCRIPT

Page 1: Ieee Topics

C-inSoftwares

C-inSoftwares Page 1

Cellular Client Controller:

This software is used to control the working of a computer using mobiles. It contains mainly mobile

phones and computers. A GSM modem, which is connected to an admin system and a mobile, will be

handled by the user. This system is implemented in many organizations to control computers using

mobiles

Content Based Image Retrieval

Content-based image retrieval (CBIR), also known as query by image content (QBIC) and content-based

visual information retrieval (CBVIR) is the application of computer vision techniques to the image

retrieval problem, that is, the problem of searching for digital images in large databases.

Modeling and Detection of Camouflaging Worm

Active worms pose major security threats to the Internet. This is due to the ability of active worms to

propagate in an automated fashion as they continuously compromise computers on the Internet. Active

worms evolve during their propagation, and thus, pose great challenges to defend against them. In this

paper, we investigate a new class of active worms, referred to as Camouflaging Worm (C-Worm in short).

The C-Worm is different from traditional worms because of its ability to intelligently manipulate its scan

traffic volume over time. Thereby, the C-Worm camouflages its propagation from existing worm

detection systems based on analyzing the propagation traffic generated by worms. We analyze

characteristics of the C-Worm and conduct a comprehensive comparison between its traffic and no worm

traffic (background traffic). We observe that these two types of traffic are barely distinguishable in the

time domain. However, their distinction is clear in the frequency domain, due to the recurring

manipulative nature of the C-Worm. Motivated by our observations, we design a novel spectrum-based

scheme to detect the C-Worm. Our scheme uses the Power Spectral Density (PSD) distribution of the

scan traffic volume and its corresponding Spectral Flatness Measure (SFM) to distinguish the C-Worm

traffic from background traffic. Using a comprehensive set of detection metrics and real-world traces as

background traffic, we conduct extensive performance evaluations on our proposed spectrum-based

detection scheme. The performance data clearly demonstrates that our scheme can effectively detect the

C-Worm propagation. Furthermore, we show the generality of our spectrum-based scheme in effectively

detecting not only the C-Worm, but traditional worms as well.

Page 2: Ieee Topics

C-inSoftwares

C-inSoftwares Page 2

Safe Driving Using Mobile Phones

As vehicle manufacturers continue to increase their emphasis on safety with advanced driver-assistance

systems (ADASs), we propose a device that is not only already in abundance but portable enough as well

to be one of the most effective multipurpose devices that are able to analyze and advise on safety

conditions. Mobile smart phones today are equipped with numerous sensors that can help to aid in safety

enhancements for drivers on the road. In this paper, we use the three-axis accelerometer of an Android-

based smart phone to record and analyze various driver behaviors and external road conditions that could

potentially be hazardous to the health of the driver, the neighboring public, and the automobile. Effective

use of these data can educate a potentially dangerous driver on how to safely and efficiently operate a

vehicle. With real-time analysis and auditory alerts of these factors, we can increase a driver’s overall

awareness to maximize safety.

Location Based Services using Android Mobile Operating System

The motivation for every location based information system is: “To assist with the exact information, at

right place in real time with personalized setup and location sensitiveness”. In this era we are dealing with

palmtops and iPhones, which are going to replace the bulky desktops even for computational purposes.

We have vast number of applications and usage where a person sitting in a roadside café needs to get

relevant data and information. Such needs can only be catered with the help of LBS. These applications

include security related jobs, general survey regarding traffic patterns, decision based on vehicular

information for validity of registration and license numbers etc. A very appealing application includes

surveillance where instant information is needed to decide if the people being monitored are any real

threat or an erroneous target. We have been able to create a number of different applications where we

provide the user with information regarding a place he or she wants to visit. But these applications are

limited to desktops only. We need to import them on mobile devices. We must ensure that a person when

visiting places need not carry the travel guides with him. All the information must be available in his

mobile device and also in user customized format.