This document lists various IEEE titles from 2014 related to Android. It is organized by topic area and lists over 50 titles within areas such as communications, information forensics and security, parallel and distributed systems, dependable and secure computing, biomedical and health informatics, internet computing, mobile computing, software engineering, wireless multimedia communications, image processing, data mining, and networking. The document provides contact information for the organization listing the titles.
An Improved Explicit Profile Matching In Mobile Social NetworksIJERA Editor
“Fully Anonymous Profile Matching In Mobile Social Networks" is a project Privacy preservation is a
significant research issue in social networking. Here user profile matching with their interest of privacypreservation
in mobile social networks (MSNs) so most of the family profiles matching with Two different
protocols are used.i.e ; Icpm & Ecpm. An explicit Comparison-based Profile Matching protocol (eCPM) which
runs between two parties, an initiator and a responder is proposed which enables the initiator to obtain the
comparison-based matching result about a specified attribute in their profiles, while preventing their attribute
values from disclosure. An implicit Comparison-based Profile matching protocol (iCPM) is then proposed
which allows the initiator to directly obtain some messages instead of the comparison result from the responder
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
The user authentication is the important factor which allows the user to use a particular software. The user authentication is also performed in various kinds of social media such as Gmail, Facebook, etc. The traditional password system is used for user authentication. But this technique has a lot of demerits in it. Some hackers also cracks the password and perform some unwanted actions in the user authentication. In order to remove the difficulties in this traditional password technique and to provide additional security in user authentication, the keystroke with data leakage detection for secure email authentication is designed. This system uses Keystroke Dynamics. This system consists of five different types of modules such as Email Framework Construction, User Enrolment, Keystroke Authentication, Data Sharing and Data Leakage Detection. This system gets the details of the user such as name and email. Then it allows to enter the password. This password is stored along with the keystroke dynamics data such as the typing speed of the password and the threshold value. Both the Keystroke dynamics data and the original password are stored in the database. When the user wants to log into the system, the user has to give the password according to the keystroke dynamics data. Then only, the user can log into the system. Hence this system can also be used in Cyber security and provide security and privacy for the user data. Mrs. V. Hemalatha | V. Boominathan | K. Harithas | P. Raj Kumar | S. Vijaya Bharathi "Keystroke with Data Leakage Detection for Secure Email Authentication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39969.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/39969/keystroke-with-data-leakage-detection-for-secure-email-authentication/mrs-v-hemalatha
Context based access control systems for mobile devicesLeMeniz Infotech
Context based access control systems for mobile devices
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...IJECEIAES
Development of prototype at data security through secret messages is needed for disguising the messages sent in smartphone chatting application, WhatsApp (WA) Chat. We propose a model to disguise a plaintext message which is first encrypted by cryptosystem to change the plaintext message to ciphertext. Plaintext or plainimage entering the smartphone system is changed into encrypted text; receiver then can read the message by using similar key with the sender. The weakness of this proposal is the message random system is not planted directly in the chatting application; therefore message removing process from cryptosystem to WA application is still needed. The strength of using this model is the messages sent will not be easily re-encrypted by hacker and can be used at client computing section.
Web Connectivity and Integration in Embedded SystemsMuhammad Usman
n this course, we explored several technologies that brought modern devices together, facilitating a network of connected things and making devices internet enabled. We discussed rules, protocols, and standards for these devices to communicate with each other in the network. We also went through security and privacy issues and challenges in cyber physical systems (CPS). We explored measures and techniques for securing systems from different perspectives. Possible attack models are introduced and solutions to tackle such attacks are discussed. Moreover, some basic concepts related to privacy in cyber physical systems are presented.
An Improved Explicit Profile Matching In Mobile Social NetworksIJERA Editor
“Fully Anonymous Profile Matching In Mobile Social Networks" is a project Privacy preservation is a
significant research issue in social networking. Here user profile matching with their interest of privacypreservation
in mobile social networks (MSNs) so most of the family profiles matching with Two different
protocols are used.i.e ; Icpm & Ecpm. An explicit Comparison-based Profile Matching protocol (eCPM) which
runs between two parties, an initiator and a responder is proposed which enables the initiator to obtain the
comparison-based matching result about a specified attribute in their profiles, while preventing their attribute
values from disclosure. An implicit Comparison-based Profile matching protocol (iCPM) is then proposed
which allows the initiator to directly obtain some messages instead of the comparison result from the responder
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
The user authentication is the important factor which allows the user to use a particular software. The user authentication is also performed in various kinds of social media such as Gmail, Facebook, etc. The traditional password system is used for user authentication. But this technique has a lot of demerits in it. Some hackers also cracks the password and perform some unwanted actions in the user authentication. In order to remove the difficulties in this traditional password technique and to provide additional security in user authentication, the keystroke with data leakage detection for secure email authentication is designed. This system uses Keystroke Dynamics. This system consists of five different types of modules such as Email Framework Construction, User Enrolment, Keystroke Authentication, Data Sharing and Data Leakage Detection. This system gets the details of the user such as name and email. Then it allows to enter the password. This password is stored along with the keystroke dynamics data such as the typing speed of the password and the threshold value. Both the Keystroke dynamics data and the original password are stored in the database. When the user wants to log into the system, the user has to give the password according to the keystroke dynamics data. Then only, the user can log into the system. Hence this system can also be used in Cyber security and provide security and privacy for the user data. Mrs. V. Hemalatha | V. Boominathan | K. Harithas | P. Raj Kumar | S. Vijaya Bharathi "Keystroke with Data Leakage Detection for Secure Email Authentication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39969.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/39969/keystroke-with-data-leakage-detection-for-secure-email-authentication/mrs-v-hemalatha
Context based access control systems for mobile devicesLeMeniz Infotech
Context based access control systems for mobile devices
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...IJECEIAES
Development of prototype at data security through secret messages is needed for disguising the messages sent in smartphone chatting application, WhatsApp (WA) Chat. We propose a model to disguise a plaintext message which is first encrypted by cryptosystem to change the plaintext message to ciphertext. Plaintext or plainimage entering the smartphone system is changed into encrypted text; receiver then can read the message by using similar key with the sender. The weakness of this proposal is the message random system is not planted directly in the chatting application; therefore message removing process from cryptosystem to WA application is still needed. The strength of using this model is the messages sent will not be easily re-encrypted by hacker and can be used at client computing section.
Web Connectivity and Integration in Embedded SystemsMuhammad Usman
n this course, we explored several technologies that brought modern devices together, facilitating a network of connected things and making devices internet enabled. We discussed rules, protocols, and standards for these devices to communicate with each other in the network. We also went through security and privacy issues and challenges in cyber physical systems (CPS). We explored measures and techniques for securing systems from different perspectives. Possible attack models are introduced and solutions to tackle such attacks are discussed. Moreover, some basic concepts related to privacy in cyber physical systems are presented.
Multi-Biometric Authentication through Hybrid Cryptographic Systemijcoa
In most of the real time scenario, authentication is required very much so as to enable the person to access a private database of any type. Researchers have started using biometric traits for the authenticity of a person. The various biometrics traits available are face, iris, palm print, hand geometry, fingerprint, ear etc., But the application that uses a single biometric trait often have to challenge with noisy data, restricted degrees of autonomy, non-universality of the biometric trait and intolerable error rates. Multi biometric systems seem to lighten these drawbacks by providing multiple verification of the same personality. Biometric fusion is the use of multiple biometric inputs or methods of processing to improve performance. In this paper, a novel combination of Multi biometric fusion, Symmetric Cryptography and Asymmetric Cryptography is proposed. A fused biometric image is encrypted using Advanced Encryption Standard whose secret key is in turn encrypted using elliptic curve cryptography which is considered as one of the efficient Asymmetric cryptographic algorithms. As the symmetric cryptographic algorithms involve in key exchange mechanism, the secret key is proposed to be secured by using ECC. Hence, the system proposed is expected to be more secured to store the biometric traits of an individual.
Android security a survey of issues, malware penetration, and defensesLeMeniz Infotech
Android security a survey of issues, malware penetration, and defenses
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
Several large-scale parole leakages exposed users to associate unprecedented risk of speech act and abuse of their data. associate inadequacy of password-based authentication mechanisms is turning into a serious concern for the complete data society. carries with it 3 major modules: (1) Mouse–Behavior dynamics Capture, (2) Feature Construction, and (3) coaching or Classification. the primary module serves to make a taking mouse behavior user signs. The second module is employed to extract holistic and procedural options to characterize mouse behavior and to map the raw options into distance-based options by exploitation numerous distance metrics. The third module, within the coaching section, applies neural network on the distance-based feature vectors to reckon the predominant feature elements, then builds the user’s profile employing a one-class classifier. within the classification section, it determines the user’s identity exploitation the trained classifier within the distance-based feature exploitation NN. A four Digit OTP is generated to the user’s email ID. The user are going to be giving the ‘2’ digit OTP and therefore the server are going to be giving balance ‘2’ digit OTP. Users ‘2’ digit OTP is verified by the server and contrariwise.
With the advent of mobile network communication system, users have been offered lots of services
such as ability to send multimedia messages like SMS, Video, Data files, Images e.t.c. This paper describes the
design and implementation of a system (Result Alert System) that conveniently provides examination results to
students with the use of Email and SMS technology via their Mobile phones and devices.
Mobile phones and devices are necessary assets, most especially to students as it makes communication and the
spread of information a lot easier. Result Alert System takes advantage of some of the technologies that Mobile
devices provide, technologies such as the Email and Short Message Service (SMS). The implemented system
allows registered students to access their results, including past results, provided they are available in the system’s database.
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
Enhanced Privacy in Mobile Online Social Networks to providing the location information to the User /server in the
online location server. MOSNs, more and more users‘ location information will be collected by the service providers
in mOSN. The users‘ privacy, including location privacy and social network privacy can be improved using the User
Registration & encryption of the data stored into the server. It should aiming at achieving enhanced privacy against
the insider attack launched by the service providers in mOSNs, we introduce a new architecture with multiple location
servers for the first time and propose a secure solution supporting location sharing among friends and strangers in
location-based applications. In our construction, the user‘s friend set in each friend‘s query submitted to the location
servers is divided into multiple subsets by the social network server randomly. Location-based services (LBSs) are
one of the most important components in mOSNs, which provides information and entertainment service based on the
geographical position of the mobile device. The entity of users, with mobile devices, is able to communicate with
other users and share their locations. Online social network Server manages users‘ identity-related information such as
users‘ profiles and friend lists. Location server stores users‘ location information and provides LBSs according to the
requests sent from users. Here we are going to improve the user location privacy, social network privacy.
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have preinstalled security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunityfor malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data. Results of this review provide methods to address security related issues in mobile devices.
Context based access control systems for mobile devicesshanofa sanu
We provide project guidance for final year MTech, BTech, MSc, MCA, ME, BE, BSc, BCA & Diploma students in Electronics, Computer Science, Information Technology, Instrumentation, Electrical & Electronics, Power electronics, Mechanical, Automobile etc. We provide live project assistance and will make the students involve throughout the project. We specialize in Matlab, VLSI, CST, JAVA, .NET, ANDROID, PHP, NS2, EMBEDDED, ARDUINO, ARM, DSP, etc based areas. We research in Image processing, Signal Processing, Wireless communication, Cloud computing, Data mining, Networking, Artificial Intelligence and several other areas. We provide complete support in project completion, documentation and other works related to project.Success is a lousy teacher. It seduces smart people into thinking they can't lose.we have better knowledge in this field and updated with new innovative technologies.
Call me at: 9037291113.
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...Prachi Jain
There is a great concern about the potential for people to leak private information on social networks. There are many anecdotal examples of this, but few quantitative studies. This research explores the activity of sharing mobile numbers on OSNs, in particular via public posts. In this work, we understand the characteristics and risks of mobile numbers sharing behaviour on OSNs either via profile or public posts and focus on Indian mobile numbers. We collected 76,347 unique mobile numbers posted by 85,905 users on Twitter and Facebook and analyzed 2,997 numbers, prefixed with +91. We observed that most users shared their own mobile numbers to spread urgent information; and to market products, IT facilities and escort business. Fewer females users shared mobile numbers on Online Social Networks. Users utilized other social networking platforms and third party applications like Twitterfeed and TweetDeck, to post mobile numbers on multiple OSNs. In contradiction to the user's perception of numbers spreading quickly on OSN, we observed that except for emergency, most numbers did not diffuse deep.
To assess risks associated with mobile numbers exposed on OSNs, we used numbers to gain sensitive information about their owners (e.g. name, Voter ID) by collating publicly available data from OSNs, Truecaller, Open government data repository (OCEAN). On using the numbers on WhatApp, we obtained a myriad of sensitive details (relationship status, BBM pins, travel plans) of the mobile number owner. We communicated the observed risks to the owners by calling them on their mobile number. Few users were surprised to know about the online presence of their number, while few users intentionally posted it online for business purposes [http://precog.iiitd.edu.in/Publications_files/cosn039s-jain.pdf]. We observed that 38.3% of users who were unaware of the online presence of their number have posted their number themselves on the social network. With these observations, we highlight that there is a need to monitor leakage of mobile numbers via profile and public posts. To the best of our knowledge, this is the first exploratory study to critically investigate the exposure of Indian mobile numbers on OSNs.
Full report: http://arxiv.org/abs/1312.3441
Multi-Biometric Authentication through Hybrid Cryptographic Systemijcoa
In most of the real time scenario, authentication is required very much so as to enable the person to access a private database of any type. Researchers have started using biometric traits for the authenticity of a person. The various biometrics traits available are face, iris, palm print, hand geometry, fingerprint, ear etc., But the application that uses a single biometric trait often have to challenge with noisy data, restricted degrees of autonomy, non-universality of the biometric trait and intolerable error rates. Multi biometric systems seem to lighten these drawbacks by providing multiple verification of the same personality. Biometric fusion is the use of multiple biometric inputs or methods of processing to improve performance. In this paper, a novel combination of Multi biometric fusion, Symmetric Cryptography and Asymmetric Cryptography is proposed. A fused biometric image is encrypted using Advanced Encryption Standard whose secret key is in turn encrypted using elliptic curve cryptography which is considered as one of the efficient Asymmetric cryptographic algorithms. As the symmetric cryptographic algorithms involve in key exchange mechanism, the secret key is proposed to be secured by using ECC. Hence, the system proposed is expected to be more secured to store the biometric traits of an individual.
Android security a survey of issues, malware penetration, and defensesLeMeniz Infotech
Android security a survey of issues, malware penetration, and defenses
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
The Internet of Things (IoT) alludes to the continually developing system of physical articles that component an
IP address for web availability, and the correspondence that happens between these items and other Web
empowered gadgets and frameworks. The security issues of the Internet of Things (IoT) are straight forwardly
identified with the wide utilization of its framework. IoT securities and enhancing the design and several
elements of this work showcases various security issues with respect to IoT and thinks of solutions for the issues
under the advancements included. Here we are going to do a study of all the security issues existing in the
Internet of Things (IoT) alongside an examination of the protection issues that an end-client might confront as
an outcome of the spread of IoT. Most of the overview is centred around the security emerging out of the data
trade innovations utilized as a part of Internet of Things. As a piece of IoTs, genuine concerns are raised over
access of individual data relating to gadget and individual protection. This review tells about the security and
protection issues of IoT.
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
Several large-scale parole leakages exposed users to associate unprecedented risk of speech act and abuse of their data. associate inadequacy of password-based authentication mechanisms is turning into a serious concern for the complete data society. carries with it 3 major modules: (1) Mouse–Behavior dynamics Capture, (2) Feature Construction, and (3) coaching or Classification. the primary module serves to make a taking mouse behavior user signs. The second module is employed to extract holistic and procedural options to characterize mouse behavior and to map the raw options into distance-based options by exploitation numerous distance metrics. The third module, within the coaching section, applies neural network on the distance-based feature vectors to reckon the predominant feature elements, then builds the user’s profile employing a one-class classifier. within the classification section, it determines the user’s identity exploitation the trained classifier within the distance-based feature exploitation NN. A four Digit OTP is generated to the user’s email ID. The user are going to be giving the ‘2’ digit OTP and therefore the server are going to be giving balance ‘2’ digit OTP. Users ‘2’ digit OTP is verified by the server and contrariwise.
With the advent of mobile network communication system, users have been offered lots of services
such as ability to send multimedia messages like SMS, Video, Data files, Images e.t.c. This paper describes the
design and implementation of a system (Result Alert System) that conveniently provides examination results to
students with the use of Email and SMS technology via their Mobile phones and devices.
Mobile phones and devices are necessary assets, most especially to students as it makes communication and the
spread of information a lot easier. Result Alert System takes advantage of some of the technologies that Mobile
devices provide, technologies such as the Email and Short Message Service (SMS). The implemented system
allows registered students to access their results, including past results, provided they are available in the system’s database.
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
Enhanced Privacy in Mobile Online Social Networks to providing the location information to the User /server in the
online location server. MOSNs, more and more users‘ location information will be collected by the service providers
in mOSN. The users‘ privacy, including location privacy and social network privacy can be improved using the User
Registration & encryption of the data stored into the server. It should aiming at achieving enhanced privacy against
the insider attack launched by the service providers in mOSNs, we introduce a new architecture with multiple location
servers for the first time and propose a secure solution supporting location sharing among friends and strangers in
location-based applications. In our construction, the user‘s friend set in each friend‘s query submitted to the location
servers is divided into multiple subsets by the social network server randomly. Location-based services (LBSs) are
one of the most important components in mOSNs, which provides information and entertainment service based on the
geographical position of the mobile device. The entity of users, with mobile devices, is able to communicate with
other users and share their locations. Online social network Server manages users‘ identity-related information such as
users‘ profiles and friend lists. Location server stores users‘ location information and provides LBSs according to the
requests sent from users. Here we are going to improve the user location privacy, social network privacy.
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have preinstalled security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunityfor malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data. Results of this review provide methods to address security related issues in mobile devices.
Context based access control systems for mobile devicesshanofa sanu
We provide project guidance for final year MTech, BTech, MSc, MCA, ME, BE, BSc, BCA & Diploma students in Electronics, Computer Science, Information Technology, Instrumentation, Electrical & Electronics, Power electronics, Mechanical, Automobile etc. We provide live project assistance and will make the students involve throughout the project. We specialize in Matlab, VLSI, CST, JAVA, .NET, ANDROID, PHP, NS2, EMBEDDED, ARDUINO, ARM, DSP, etc based areas. We research in Image processing, Signal Processing, Wireless communication, Cloud computing, Data mining, Networking, Artificial Intelligence and several other areas. We provide complete support in project completion, documentation and other works related to project.Success is a lousy teacher. It seduces smart people into thinking they can't lose.we have better knowledge in this field and updated with new innovative technologies.
Call me at: 9037291113.
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on ...Prachi Jain
There is a great concern about the potential for people to leak private information on social networks. There are many anecdotal examples of this, but few quantitative studies. This research explores the activity of sharing mobile numbers on OSNs, in particular via public posts. In this work, we understand the characteristics and risks of mobile numbers sharing behaviour on OSNs either via profile or public posts and focus on Indian mobile numbers. We collected 76,347 unique mobile numbers posted by 85,905 users on Twitter and Facebook and analyzed 2,997 numbers, prefixed with +91. We observed that most users shared their own mobile numbers to spread urgent information; and to market products, IT facilities and escort business. Fewer females users shared mobile numbers on Online Social Networks. Users utilized other social networking platforms and third party applications like Twitterfeed and TweetDeck, to post mobile numbers on multiple OSNs. In contradiction to the user's perception of numbers spreading quickly on OSN, we observed that except for emergency, most numbers did not diffuse deep.
To assess risks associated with mobile numbers exposed on OSNs, we used numbers to gain sensitive information about their owners (e.g. name, Voter ID) by collating publicly available data from OSNs, Truecaller, Open government data repository (OCEAN). On using the numbers on WhatApp, we obtained a myriad of sensitive details (relationship status, BBM pins, travel plans) of the mobile number owner. We communicated the observed risks to the owners by calling them on their mobile number. Few users were surprised to know about the online presence of their number, while few users intentionally posted it online for business purposes [http://precog.iiitd.edu.in/Publications_files/cosn039s-jain.pdf]. We observed that 38.3% of users who were unaware of the online presence of their number have posted their number themselves on the social network. With these observations, we highlight that there is a need to monitor leakage of mobile numbers via profile and public posts. To the best of our knowledge, this is the first exploratory study to critically investigate the exposure of Indian mobile numbers on OSNs.
Full report: http://arxiv.org/abs/1312.3441
Final year project in trichy,Final project Titles vsanthosh05
SIDDHI SOFT SOLUTIONS focus on developing the tech oriented concepts that turn graduates into employable assets. Handled only by professionals from MNC companies, we know how to equip you with strong technologies fundamentals. We promise you to achieve your goals and dreams in your future. We have 24/7 call support so students can reach us any time. We deliver projects with the most economical and improved solutions in shortest time.
We Guide and provide platform for the Projects in the following specializations under
various domain but not limited to the following..
IEEE Projects on Networking
IEEE Projects on Network Security
IEEE Projects on Mobile Computing
IEEE Projects on Data Mining
IEEE Projects on Cloud Computing
IEEE Projects on Information Forensics & Security
IEEE Projects on Image Processing
IEEE Projects on Software Engineering
IEEE Projects on Cybernetics
IEEE Projects on Wireless Communication
IEEE Projects on Internet Computing
IEEE Projects on Embbedded Systems
IEEE Projects on Artifical Intelligence
IEEE Projects on Audio and Video Processing
IEEE Projects on Multimedia
Contact US:
SIDDHI SOFT SOLUTIONS
#3, 4th FLOOR, LAKSHMI ARCADE,
11TH CROSS, THILLAI NAGAR,
TRICY-620018.
Phone NO : +91 9994113344
Email : info@siddhisoftsolutions.in
Website : www.siddhisoftsolutions.in
Siddhi Soft Solutions is a leading Web development firm in Trichy. The aims of the company are help trainee to keep enlightens you technical wise. This company provides real time experience and software knowledge to the young generation engineers. Our motive towards intake technology into the students and developers world for developing class products. Our Technical staffs explain project description repeatedly until students understand the concept. We can assist the students through online.
Provides real time trainig on information technology and provide projects on the following.
» M.E and M.TECH
» M B A
» M.Phil
» B.E and B.TECH
» M.C.A and M.SC
» B.C.A and B.SC
» DIPLOMA AND ALL DISCIPLINE PROJECTS
Contact US:
SIDDHI SOFT SOLUTIONS
#3, 4th FLOOR, LAKSHMI ARCADE,
11TH CROSS, THILLAI NAGAR,
TRICY-620018.
Phone NO : +91 9994113344, +91 9944433103
Email : info@siddhisoftsolutions.in
Website : www.siddhisoftsolutions.in
SIDDHI SOFT SOLUTIONS focus on developing the tech oriented concepts that turn graduates into employable assets. Handled only by professionals from MNC companies, we know how to equip you with strong technologies fundamentals. We promise you to achieve your goals and dreams in your future. We have 24/7 call support so students can reach us any time. We deliver projects with the most economical and improved solutions in shortest time.
We Guide and provide platform for the Projects in the following specializations under
various domain but not limited to the following..
IEEE Projects on Networking
IEEE Projects on Network Security
IEEE Projects on Mobile Computing
IEEE Projects on Data Mining
IEEE Projects on Cloud Computing
IEEE Projects on Information Forensics & Security
IEEE Projects on Image Processing
IEEE Projects on Software Engineering
IEEE Projects on Cybernetics
IEEE Projects on Wireless Communication
IEEE Projects on Internet Computing
IEEE Projects on Embbedded Systems
IEEE Projects on Artifical Intelligence
IEEE Projects on Audio and Video Processing
IEEE Projects on Multimedia
Contact US:
SIDDHI SOFT SOLUTIONS
#3, 4th FLOOR, LAKSHMI ARCADE,
11TH CROSS, THILLAI NAGAR,
TRICY-620018.
Phone NO : +91 9994113344
Email : info@siddhisoftsolutions.in
Website : www.siddhisoftsolutions.in
ieee projects 2014-15 for cse with abstract and base paper vsanthosh05
Siddhi Soft Solutions is a leading Web development firm in Trichy. The aims of the company are help trainee to keep enlightens you technical wise. This company provides real time experience and software knowledge to the young generation engineers. Our motive towards intake technology into the students and developers world for developing class products. Our Technical staffs explain project description repeatedly until students understand the concept. We can assist the students through online.
Provides real time trainig on information technology and provide projects on the following.
» M.E and M.TECH
» M B A
» M.Phil
» B.E and B.TECH
» M.C.A and M.SC
» B.C.A and B.SC
» DIPLOMA AND ALL DISCIPLINE PROJECTS
Contact US:
SIDDHI SOFT SOLUTIONS
#3, 4th FLOOR, LAKSHMI ARCADE,
11TH CROSS, THILLAI NAGAR,
TRICY-620018.
Phone NO : +91 9994113344, +91 9944433103
Email : info@siddhisoftsolutions.in
Website : www.siddhisoftsolutions.in
Final Year 2014 and 2015 IEEE projects Tmks Infotech
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
contact number :: 9535866270
Bulk 2014 and 2015 ieee Projects @ TMKS InfotechTmks Infotech
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
1. 2014-2015 [LATEST 2014 ANDROID IEEE TITLES ]
1 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
Android IEEE Titles
S No Title Name Year
COMMUNICATIONS
1
A Real-Time Adaptive Algorithm for Video Streaming over
Multiple Wireless Access Networks
INFORMATION FORENSICS AND SECURITY
1
Catch Me If You Can: Evaluating Android Anti-Malware against
Transformation Attacks
2
Faved! Biometrics: Tell Me Which Image You Like And I’ll Tell You
Who You Are
PARALLEL AND DISTRIBUTED SYSTEMS
1
Collaborative Policy Administration
2
Cooperative Positioning and Tracking in Disruption Tolerant
Networks
DEPENDABLE AND SECURE COMPUTING
1
Context-based Access Control Systems for Mobile Devices
2
Effective Risk Communication for Android Apps
3
Generating Summary Risk Scores for Mobile Applications
4
Hiding in the Mobile Crowd: Location Privacy through
Collaboration
5
MOSES: Supporting and Enforcing Security Profiles on Smart
phones
6
Effective Risk Communication For Android Apps
2. 2014-2015 [LATEST 2014 ANDROID IEEE TITLES ]
2 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
7 Moses Supporting And Enforcing Security Profiles On Smartphones
8
Hiding Mobile Crowd Location Privacy Through Collaboration
BIOMEDICAL AND HEALTH INFORMATICS
1
Context-driven, Prescription-Based Personal Activity
Classification: Methodology, Architecture, and End-to-End
Implementation
INTERNET COMPUTING
1
DELTA++: Reducing the Size of Android Application Updates
MOBILE COMPUTING
1
Face-to-Face Proximity Estimation Using Bluetooth on Smart
phones
2
How Long to Wait? Predicting Bus Arrival Time with Mobile
Phone Based Participatory Sensing
3
The Places of Our Lives: Visiting Patterns and Automatic Labeling
from Longitudinal Smartphone Data
4
How Long To Wait Predicting Bus Arrival Time With Mobile Phone
Based Participatory Sensing
5
Smartdc: Mobility Prediction-Based Adaptive Duty Cycling For
Everyday Location Monitoring
SOFTWARE ENGINEERING
1
GreenDroid: Automated Diagnosis of Energy Inefficiency for
Smartphone Applications
WIRELESS MULTIMEDIA COMMUNICATIONS
1
Security Threats to Mobile Multimedia Applications: Camera
Based Attacks on Mobile Phones
3. 2014-2015 [LATEST 2014 ANDROID IEEE TITLES ]
3 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
IMAGE PROCESSING
1
Lions Club Of Pondicherry Excellence Was Started In The Year
2008 And Was Chartered On 18.09.2008. We Have Inaugurated A
Leo Campus Club In Bharathidasan Women's College In The Same
Year
2
Lions Club of Pondicherry Excellence was started in the year 2008
and was chartered on 18.09.2008. We have inaugurated a Leo
campus club in Bharathidasan Women's college in the same year
3
Lions Club of Pondicherry
4
Reversible Data Hiding In Encrypted Images By Reserving Room
Before Encryption
DATA MINING
1
A Fast Clustering-Based Feature Subset Selection Algorithm for
High-Dimensional Data
2
A Survey of XML Tree Patterns
3
Distributed Web Systems Performance Forecasting Using Turning
Bands Method
4
Evaluating Data Reliability An Evidential Answer with Application
to a Web-Enabled Data Warehouse
5
Ranking on Data Manifold with Sink Points
4. 2014-2015 [LATEST 2014 ANDROID IEEE TITLES ]
4 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
6
Region-Based Foldings in Process Discovery
7
Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption
8
A Generalized Flow-Based Method for Analysis of Implicit
Relationships on Wikipedia
9
AML Efficient Approximate Membership Localization within a
Web-Based Join Framework
10
Toward Privacy Preserving and Collusion Resistance in a Location
Proof Updating System
11
Finding Rare Classes Active Learning with Generative and
Discriminative Models
NETWORKING
1
Security Analysis of a Single Sign-On Mechanism for Distributed
Computer Networks
2
Target Tracking and Mobile Sensor Navigation in Wireless Sensor
Networks
3
T-Drive Enhancing Driving Directions with Taxi Drivers’
Intelligence
4
Analysis of Distance-Based Location Management in Wireless
Communication Networks
5 A Scalable Server Architecture for Mobile Presence Services in
5. 2014-2015 [LATEST 2014 ANDROID IEEE TITLES ]
5 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
Social Network Applications
6
Anonymization of Centralized and Distributed Social Networks by
Sequential Clustering
7
SSD A Robust RF Location Fingerprint Addressing Mobile Devices’
Heterogeneity
8
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc
Networks
9
Exploiting Ubiquitous Data Collection for Mobile Users in Wireless
Sensor Networks