This document summarizes a research paper on enhancing RFID security and privacy through location sensing. It discusses how location awareness can be used by RFID tags and backend servers to defend against unauthorized reading and relay attacks. On tags, a location-aware selective unlocking mechanism is designed to allow tags to selectively respond based on location rather than always responding. On servers, a location-aware secure transaction verification scheme is proposed to allow servers to approve or deny transactions based on comparing the reported locations of the tag and reader. The goal is to detect relay attacks involving malicious readers. Unlike prior work, the defenses do not rely on auxiliary devices and require no explicit user involvement.
This document summarizes a research paper on using near field communication (NFC) tags to enable mobile commerce (m-commerce). It discusses how an Android application could read NFC tags on products to add them to a virtual shopping cart. Payment could then be made via the app using existing online payment methods. The document provides background on m-commerce, mobile payments, and how NFC tags work. It also discusses security protocols for NFC-based communications between a user's mobile device and a merchant's terminal for contactless payments. The proposed system aims to make shopping more convenient and efficient for consumers compared to traditional retail models.
Near field communication (NFC) allows data exchange between devices within 4 cm using 13.56 MHz radio frequency identification. NFC enables contactless transactions and data sharing between devices. Common uses of NFC include contactless payments, sharing contacts and files between devices, and accessing information from NFC tags embedded in posters, cards, or other items. Emerging applications of NFC include mobile ticketing, electronic keys, identity documents, mobile commerce, social networking, and health monitoring using NFC-enabled phones.
The document discusses Project LUCID at Birmingham City University, which explores applications of location-aware, user-aware, and context-aware technologies. It outlines enabling technologies like RFID, smartcards, and NFC. It also discusses how the project fits the university's research strategy and could support regional development through novel applications and content delivery. The project aims to develop proof-of-concept solutions to evaluate technical capabilities and user benefits.
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesKamal Spring
As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive applications including payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. In this paper, we propose SBVLC - a secure system for barcode-based visible light communication (VLC) between smart phones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop two secure data exchange schemes. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and mobile payment. SBVLC is evaluated through extensive experiments on both Android and I OS smart phones.
In our application we have implemented the idea of QR code as password verification to overcome all the hacking issues. We have two modules as banker and the user. In the user module there will be two categories they are shopping and paying bill. In the shopping section user will shop the product and enter the card and bank details and send request to the banker regarding the transaction purpose. And in turn the banker module there are two categories they are the create OTP and the send OTP details. The banker will check the details of the user request regarding the purchase and all the card and balance details and prepare a password in the form of QR code. The password will be I the form of QR code and will be sent to the user through the mail service to the user personal mail id. In turn the user will pay the bill by loading the QR from the mail and scanning. On scanning the password will generate if the password matches with the banker details the transaction will become successful. Thus password hacking, key logging and eavesdropping issues will be overcome.
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
This document discusses near field communication (NFC) technology and its use for secure mobile transactions. NFC allows contactless communication between devices within 10 cm of each other. It can be used for applications like mobile payments, data transfers, and access control. The document explores NFC architecture, communication modes, security considerations, and potential future applications like unlocking vehicles and doors with a tap. It concludes that NFC is widely used in mobile devices today and enables contactless payment models through technologies like mobile wallets.
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET Journal
This document discusses techniques for smart shopping using QR codes. It provides an overview of how QR codes can be generated and embedded with product information like name, number, location, and details. By scanning these QR codes using a smartphone camera and app, users can get product information on their phone. The document then reviews different techniques used for QR code generation and recognition, including REST protocols, multiplexing/demultiplexing algorithms, and QR filtering methods. It discusses how these techniques can enable features like adding items to a shopping cart, checking product offers, and digital payment. The techniques aim to make the shopping experience more convenient and efficient compared to traditional physical shopping.
This document summarizes a research paper on using near field communication (NFC) tags to enable mobile commerce (m-commerce). It discusses how an Android application could read NFC tags on products to add them to a virtual shopping cart. Payment could then be made via the app using existing online payment methods. The document provides background on m-commerce, mobile payments, and how NFC tags work. It also discusses security protocols for NFC-based communications between a user's mobile device and a merchant's terminal for contactless payments. The proposed system aims to make shopping more convenient and efficient for consumers compared to traditional retail models.
Near field communication (NFC) allows data exchange between devices within 4 cm using 13.56 MHz radio frequency identification. NFC enables contactless transactions and data sharing between devices. Common uses of NFC include contactless payments, sharing contacts and files between devices, and accessing information from NFC tags embedded in posters, cards, or other items. Emerging applications of NFC include mobile ticketing, electronic keys, identity documents, mobile commerce, social networking, and health monitoring using NFC-enabled phones.
The document discusses Project LUCID at Birmingham City University, which explores applications of location-aware, user-aware, and context-aware technologies. It outlines enabling technologies like RFID, smartcards, and NFC. It also discusses how the project fits the university's research strategy and could support regional development through novel applications and content delivery. The project aims to develop proof-of-concept solutions to evaluate technical capabilities and user benefits.
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesKamal Spring
As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive applications including payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. In this paper, we propose SBVLC - a secure system for barcode-based visible light communication (VLC) between smart phones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop two secure data exchange schemes. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and mobile payment. SBVLC is evaluated through extensive experiments on both Android and I OS smart phones.
In our application we have implemented the idea of QR code as password verification to overcome all the hacking issues. We have two modules as banker and the user. In the user module there will be two categories they are shopping and paying bill. In the shopping section user will shop the product and enter the card and bank details and send request to the banker regarding the transaction purpose. And in turn the banker module there are two categories they are the create OTP and the send OTP details. The banker will check the details of the user request regarding the purchase and all the card and balance details and prepare a password in the form of QR code. The password will be I the form of QR code and will be sent to the user through the mail service to the user personal mail id. In turn the user will pay the bill by loading the QR from the mail and scanning. On scanning the password will generate if the password matches with the banker details the transaction will become successful. Thus password hacking, key logging and eavesdropping issues will be overcome.
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
This document discusses near field communication (NFC) technology and its use for secure mobile transactions. NFC allows contactless communication between devices within 10 cm of each other. It can be used for applications like mobile payments, data transfers, and access control. The document explores NFC architecture, communication modes, security considerations, and potential future applications like unlocking vehicles and doors with a tap. It concludes that NFC is widely used in mobile devices today and enables contactless payment models through technologies like mobile wallets.
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET Journal
This document discusses techniques for smart shopping using QR codes. It provides an overview of how QR codes can be generated and embedded with product information like name, number, location, and details. By scanning these QR codes using a smartphone camera and app, users can get product information on their phone. The document then reviews different techniques used for QR code generation and recognition, including REST protocols, multiplexing/demultiplexing algorithms, and QR filtering methods. It discusses how these techniques can enable features like adding items to a shopping cart, checking product offers, and digital payment. The techniques aim to make the shopping experience more convenient and efficient compared to traditional physical shopping.
This document discusses the changing payment world and the rise of mobile wallets and near field communication (NFC) technology. It notes that major newspapers regularly publish articles on NFC and mobile payments, and that banks are establishing departments focused on these areas. Market leaders see NFC as the next big development. The document outlines the value chain for NFC mobile wallets and some of the ecosystem challenges. It also discusses issues like the importance of the secure element, virtual vs physical wallets, getting relevant content to mobile wallets, and the need for common interface standards. Finally, it suggests the shopping experience is changing and notes examples of this, like a store replacing cashiers with mobile checkout.
This document discusses how QR (Quick Response) codes can be used by academic libraries to reach mobile users and enhance library services. It provides an overview of a case study of the PUMBA Library at the University of Pune, which implemented QR codes to provide mobile access to online journals, a university song video, and other resources. The document also defines what a QR code is, the different types of information they can contain, examples of their use, and how QR codes can help increase the physical use of libraries and engage users on mobile devices.
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesKamal Spring
As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive applications including payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. In this paper, we propose SBVLC - a secure system for barcode-based visible light communication (VLC) between smart phones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop two secure data exchange schemes. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and mobile payment. SBVLC is evaluated through extensive experiments on both Android and I OS smart phones.
In our application we have implemented the idea of QR code as password verification to overcome all the hacking issues. We have two modules as banker and the user. In the user module there will be two categories they are shopping and paying bill. In the shopping section user will shop the product and enter the card and bank details and send request to the banker regarding the transaction purpose. And in turn the banker module there are two categories they are the create OTP and the send OTP details. The banker will check the details of the user request regarding the purchase and all the card and balance details and prepare a password in the form of QR code. The password will be I the form of QR code and will be sent to the user through the mail service to the user personal mail id. In turn the user will pay the bill by loading the QR from the mail and scanning. On scanning the password will generate if the password matches with the banker details the transaction will become successful. Thus password hacking, key logging and eavesdropping issues will be overcome.
Near Field Communication (NFC) is a wireless technology that allows data transfer over short distances and can be used for contactless payments and other applications. NFC works at 13.56 MHz and has a range of less than 4 cm. It uses encryption algorithms like AES for secure data transfer. NFC-enabled smartphones are increasing and can be used to make mobile payments, share contacts, photos and files between devices using NFC's reader, writer, and peer-to-peer modes.
Mobile payment systems allow consumers to make purchases using a mobile device instead of cash, checks, or credit cards. There are various mobile payment models including mobile wallets, card-based payments, carrier billing, and contactless payments using near-field communication (NFC). Both secure elements and host-based card emulation can securely store payment credentials, though secure elements provide stronger isolation of sensitive data. Early mobile payment systems were vulnerable to relay attacks and weaknesses in PIN storage, but providers have implemented encryption, tokenization, and other techniques to enhance security over time.
The document discusses new authentication technologies including biometric identification using fingerprints, iris patterns, etc. It describes various hardware and software token options for two-factor authentication such as smart cards, magnetic stripe cards, mobile phones, and smartphones. It also discusses ensuring the security of passwords and authentication systems.
Navigation for Indoor Location Based On QR Codes and Google Maps – A SurveyAM Publications,India
QR codes is simple and efficient tool used in smartphones to obtain accurate indoor user location. As an increasing number of geo-location services are exploiting the capabilities of smartphones, most of which incorporate GPS location. The smartphones compasses to direct the user to the destination. With the help of accelerometers, it will be possible to estimate the walking distances as an auxiliary information. An, idea in order to calculate the user position inside a building by using QR codes and Google maps. Navigation is the process or activity of accurately ascertaining one’s position, planning and following the route to goal location. Mobile phones are devices merely used to communicate. Based on new techniques like GPS and sensors, compass and accelerometers that can determine the orientation of devices, location based applications coupled with augmented reality views are possible.
Cracking the Code: How To Think About QRLeo Burnett
QR codes were created in 1994 as a two-dimensional barcode that can be scanned by smartphones to retrieve text, URLs, or other data. While initially used for inventory tracking, QR codes saw early adoption in Asia and Europe as a way to access web content or information without typing on phones lacking full keyboards. Over time, proprietary codes also emerged that store data in the cloud rather than within the code itself. When considering using QR or other two-dimensional codes, marketers should evaluate whether the codes simplify or complicate the user experience and whether the intended audience is likely able and willing to use them. Emerging technologies like near-field communication may one day make codes like QR obsolete as ways to easily share contact and web information with
Contactless TAGs for Near Field Communication (NFC). Its here and this is a primer for understanding mobile contactless tags how they can be used for mobile loyalty and couponing with point of sale integration!
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET Journal
This document summarizes a survey on a secret sharing approach using QR codes that prevents cheating. It discusses how QR codes can store large amounts of data but lack security. The proposed approach uses the characteristics of QR codes to achieve secret sharing and distribute private data securely among participants using QR tags. Each participant receives a marked QR tag, and the original data can only be retrieved when an authorized number of participants come together. This approach provides security, detectability of cheaters, and adjustable payload for the QR codes.
A Posteriori Perusal of Mobile ComputingEditor IJCATR
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote
portable
devices have
access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital du
e to the
increase in the number of portable computers and the aspiration to have continuous network connectivity to the Internet i
rrespective of the physical
location of the node.
Mobile computing systems
are computing systems that may be readily moved physically and whose computing ability may be
used while they are being moved. Mobile computing has rapidly become a vital new examp
le in today's real world of networked computing systems. It
includes software, hardware and mobile communication. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth
-
enabled PDA‟s to
wireless sensor networks; mobile computing has become ub
iquitous in its influence on our quotidian lives. In this paper various types of mobile
devices are talking and they are inquiring into in details and existing operation systems that are most famed for mentioned d
evices are talking. Another
aim of this pa
per is to point out some of the characteristics, applications, limitations, and issues of mobile computing
A Survey on Communication for SmartphoneEditor IJMTER
Nowadays security and privacy issues are getting more and more important for people using state of the art communication tools like mobile smartphones or internet.As the power and feature of smartphones increases,so has their vulnerability.By using short range wireless
communication smartphones communicates each other.But the data confidentiality is not guaranteed.In bar code and Near Field Communication enabled devices the smartphones exchange information by simple touch.The main drawback of Near Field Communication and bar code systems is the vulnerable nature to attack since they are using key exchange then encrypt techniques.In the smartphones with android platform,it is possible to provide security against all the
attacks by securely exchanging message or data with-out using key exchange protocol. PriWhisper is an technique that enables key less secure acoustic communication for smartphones and provides better security as well as data confidentiality.
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...Pierre Metivier
20, 40, 80 billions connected objects in the smart cities of the future by 2020 as foreseen by many large IT companies and consulting firms. But is our planet ready for as many billions Ion-lithium battery equiped objects ? What about the impact on our environment ? Hopefully, there are solutions to reduce the need of batteries in connected objets and energy harvesting is one important field of study. NFC, better known for contactless payment and transportation cards, is one technology that can be used to reduce the needs of batteries in connected objects, allowing a cleaner and greener environment, as this track will present.
Smart Cities and Countries Congress, Sept. 3, Paris
This document discusses NFC operating modes and security. It describes the key NFC modes including card emulation, reader/writer, and peer-to-peer. It outlines security concerns for each mode like eavesdropping, data corruption, relay attacks, and lost devices. The document also covers future applications of NFC like mobile transactions and wireless charging. It recommends using secure channels, digital signatures, and authentication to enhance NFC security.
NFC wallet is 'white label' mobile payment application. It provides contactless payment and is based on Mastercard Digital Enablement Services (MDES) and Visa Token Services (VTS).
e-wallet , The future of Cards and MoneyVikram Dahiya
The document discusses e-wallets and near field communication (NFC) technology. E-wallets store digital payment information and have advantages over traditional cards like unlimited lifetime and storage of current balance. NFC allows contactless payment and data transfer between devices in close proximity by using magnetic field induction. NFC is supported on many mobile platforms and enables mobile payment apps like Google Wallet.
- Ganesh is seeking an opportunity to utilize his 3+ years of experience in mobile development and testing, particularly with Android applications and NFC technologies.
- He has a Bachelor's degree in Electronics and Communications and has expertise in languages like C and Python.
- Some of his key projects involved designing and developing Android applications for testing NFC controllers and automating test cases using Python.
A Posteriori Perusal of Mobile ComputingEditor IJCATR
This document discusses mobile computing, including its history and characteristics. It describes how mobile computing has evolved from devices with large antennas to communicate simple messages to today's personal computers that can perform most functions wirelessly. The document outlines the key components of mobile computing including hardware, system/application software, and communication mediums. It also describes various mobile computing devices such as personal digital assistants, smartphones, tablet PCs, ultra-mobile PCs, wearable computers, and e-readers.
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
This document discusses the history and characteristics of mobile computing. It describes how mobile computing has evolved from devices with large antennas to transmit simple messages to today's smartphones and laptops with wireless connectivity. The key characteristics of mobile computing include portable hardware like laptops and smartphones, mobile operating systems like Android and Windows, and software applications. Mobile computing allows users access to data from anywhere through wireless communication networks.
This document discusses mobile computing. It begins by defining mobile computing as human-computer interaction that allows transmission of data, voice and video via wireless devices without a fixed connection. It then discusses mobile communication, hardware, and software. For mobile hardware, it describes devices like smartphones, tablets, and PDAs. For mobile software, it discusses how software deals with the characteristics and requirements of mobile applications. It also covers advantages of mobile computing like location flexibility and enhanced productivity, as well as limitations like range/bandwidth and security standards. Overall, the document provides an overview of the key concepts and components of mobile computing.
Mobile Agents: An Intelligent Multi-Agent System for Mobile PhonesIOSR Journals
This document summarizes a research paper on developing an intelligent multi-agent system for hotel reservations on mobile phones. The system would allow users to enter search criteria and have an agent automatically search for and book the most suitable hotel. The agent would move between hotels on the user's mobile device to collect details on facilities, prices, reviews and more. The goal is to make the hotel booking process more efficient and less time-consuming for users. The document outlines the proposed system design and architecture, which incorporates mobile agent technologies to enable the agent to perform tasks remotely on behalf of the user.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
This document discusses the changing payment world and the rise of mobile wallets and near field communication (NFC) technology. It notes that major newspapers regularly publish articles on NFC and mobile payments, and that banks are establishing departments focused on these areas. Market leaders see NFC as the next big development. The document outlines the value chain for NFC mobile wallets and some of the ecosystem challenges. It also discusses issues like the importance of the secure element, virtual vs physical wallets, getting relevant content to mobile wallets, and the need for common interface standards. Finally, it suggests the shopping experience is changing and notes examples of this, like a store replacing cashiers with mobile checkout.
This document discusses how QR (Quick Response) codes can be used by academic libraries to reach mobile users and enhance library services. It provides an overview of a case study of the PUMBA Library at the University of Pune, which implemented QR codes to provide mobile access to online journals, a university song video, and other resources. The document also defines what a QR code is, the different types of information they can contain, examples of their use, and how QR codes can help increase the physical use of libraries and engage users on mobile devices.
SBVLC: Secure Barcode-based Visible Light Communication for Smart phonesKamal Spring
As an alternative to NFC technology, 2D barcodes have been increasingly used for security-sensitive applications including payments and personal identification. However, the security of barcode-based communication in mobile applications has not been systematically studied. In this paper, we propose SBVLC - a secure system for barcode-based visible light communication (VLC) between smart phones. We formally analyze the security of SBVLC based on geometric models and propose physical security enhancement mechanisms for barcode communication by manipulating screen view angles and leveraging user-induced motions. We then develop two secure data exchange schemes. These schemes are useful in many security-sensitive mobile applications including private information sharing, secure device pairing, and mobile payment. SBVLC is evaluated through extensive experiments on both Android and I OS smart phones.
In our application we have implemented the idea of QR code as password verification to overcome all the hacking issues. We have two modules as banker and the user. In the user module there will be two categories they are shopping and paying bill. In the shopping section user will shop the product and enter the card and bank details and send request to the banker regarding the transaction purpose. And in turn the banker module there are two categories they are the create OTP and the send OTP details. The banker will check the details of the user request regarding the purchase and all the card and balance details and prepare a password in the form of QR code. The password will be I the form of QR code and will be sent to the user through the mail service to the user personal mail id. In turn the user will pay the bill by loading the QR from the mail and scanning. On scanning the password will generate if the password matches with the banker details the transaction will become successful. Thus password hacking, key logging and eavesdropping issues will be overcome.
Near Field Communication (NFC) is a wireless technology that allows data transfer over short distances and can be used for contactless payments and other applications. NFC works at 13.56 MHz and has a range of less than 4 cm. It uses encryption algorithms like AES for secure data transfer. NFC-enabled smartphones are increasing and can be used to make mobile payments, share contacts, photos and files between devices using NFC's reader, writer, and peer-to-peer modes.
Mobile payment systems allow consumers to make purchases using a mobile device instead of cash, checks, or credit cards. There are various mobile payment models including mobile wallets, card-based payments, carrier billing, and contactless payments using near-field communication (NFC). Both secure elements and host-based card emulation can securely store payment credentials, though secure elements provide stronger isolation of sensitive data. Early mobile payment systems were vulnerable to relay attacks and weaknesses in PIN storage, but providers have implemented encryption, tokenization, and other techniques to enhance security over time.
The document discusses new authentication technologies including biometric identification using fingerprints, iris patterns, etc. It describes various hardware and software token options for two-factor authentication such as smart cards, magnetic stripe cards, mobile phones, and smartphones. It also discusses ensuring the security of passwords and authentication systems.
Navigation for Indoor Location Based On QR Codes and Google Maps – A SurveyAM Publications,India
QR codes is simple and efficient tool used in smartphones to obtain accurate indoor user location. As an increasing number of geo-location services are exploiting the capabilities of smartphones, most of which incorporate GPS location. The smartphones compasses to direct the user to the destination. With the help of accelerometers, it will be possible to estimate the walking distances as an auxiliary information. An, idea in order to calculate the user position inside a building by using QR codes and Google maps. Navigation is the process or activity of accurately ascertaining one’s position, planning and following the route to goal location. Mobile phones are devices merely used to communicate. Based on new techniques like GPS and sensors, compass and accelerometers that can determine the orientation of devices, location based applications coupled with augmented reality views are possible.
Cracking the Code: How To Think About QRLeo Burnett
QR codes were created in 1994 as a two-dimensional barcode that can be scanned by smartphones to retrieve text, URLs, or other data. While initially used for inventory tracking, QR codes saw early adoption in Asia and Europe as a way to access web content or information without typing on phones lacking full keyboards. Over time, proprietary codes also emerged that store data in the cloud rather than within the code itself. When considering using QR or other two-dimensional codes, marketers should evaluate whether the codes simplify or complicate the user experience and whether the intended audience is likely able and willing to use them. Emerging technologies like near-field communication may one day make codes like QR obsolete as ways to easily share contact and web information with
Contactless TAGs for Near Field Communication (NFC). Its here and this is a primer for understanding mobile contactless tags how they can be used for mobile loyalty and couponing with point of sale integration!
IRJET- A Survey: Secret Sharing Approach with Cheater Prevention on QR CodeIRJET Journal
This document summarizes a survey on a secret sharing approach using QR codes that prevents cheating. It discusses how QR codes can store large amounts of data but lack security. The proposed approach uses the characteristics of QR codes to achieve secret sharing and distribute private data securely among participants using QR tags. Each participant receives a marked QR tag, and the original data can only be retrieved when an authorized number of participants come together. This approach provides security, detectability of cheaters, and adjustable payload for the QR codes.
A Posteriori Perusal of Mobile ComputingEditor IJCATR
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote
portable
devices have
access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital du
e to the
increase in the number of portable computers and the aspiration to have continuous network connectivity to the Internet i
rrespective of the physical
location of the node.
Mobile computing systems
are computing systems that may be readily moved physically and whose computing ability may be
used while they are being moved. Mobile computing has rapidly become a vital new examp
le in today's real world of networked computing systems. It
includes software, hardware and mobile communication. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth
-
enabled PDA‟s to
wireless sensor networks; mobile computing has become ub
iquitous in its influence on our quotidian lives. In this paper various types of mobile
devices are talking and they are inquiring into in details and existing operation systems that are most famed for mentioned d
evices are talking. Another
aim of this pa
per is to point out some of the characteristics, applications, limitations, and issues of mobile computing
A Survey on Communication for SmartphoneEditor IJMTER
Nowadays security and privacy issues are getting more and more important for people using state of the art communication tools like mobile smartphones or internet.As the power and feature of smartphones increases,so has their vulnerability.By using short range wireless
communication smartphones communicates each other.But the data confidentiality is not guaranteed.In bar code and Near Field Communication enabled devices the smartphones exchange information by simple touch.The main drawback of Near Field Communication and bar code systems is the vulnerable nature to attack since they are using key exchange then encrypt techniques.In the smartphones with android platform,it is possible to provide security against all the
attacks by securely exchanging message or data with-out using key exchange protocol. PriWhisper is an technique that enables key less secure acoustic communication for smartphones and provides better security as well as data confidentiality.
CONNECTED OBJECTS - how NFC technology enables a more environmentally-friendl...Pierre Metivier
20, 40, 80 billions connected objects in the smart cities of the future by 2020 as foreseen by many large IT companies and consulting firms. But is our planet ready for as many billions Ion-lithium battery equiped objects ? What about the impact on our environment ? Hopefully, there are solutions to reduce the need of batteries in connected objets and energy harvesting is one important field of study. NFC, better known for contactless payment and transportation cards, is one technology that can be used to reduce the needs of batteries in connected objects, allowing a cleaner and greener environment, as this track will present.
Smart Cities and Countries Congress, Sept. 3, Paris
This document discusses NFC operating modes and security. It describes the key NFC modes including card emulation, reader/writer, and peer-to-peer. It outlines security concerns for each mode like eavesdropping, data corruption, relay attacks, and lost devices. The document also covers future applications of NFC like mobile transactions and wireless charging. It recommends using secure channels, digital signatures, and authentication to enhance NFC security.
NFC wallet is 'white label' mobile payment application. It provides contactless payment and is based on Mastercard Digital Enablement Services (MDES) and Visa Token Services (VTS).
e-wallet , The future of Cards and MoneyVikram Dahiya
The document discusses e-wallets and near field communication (NFC) technology. E-wallets store digital payment information and have advantages over traditional cards like unlimited lifetime and storage of current balance. NFC allows contactless payment and data transfer between devices in close proximity by using magnetic field induction. NFC is supported on many mobile platforms and enables mobile payment apps like Google Wallet.
- Ganesh is seeking an opportunity to utilize his 3+ years of experience in mobile development and testing, particularly with Android applications and NFC technologies.
- He has a Bachelor's degree in Electronics and Communications and has expertise in languages like C and Python.
- Some of his key projects involved designing and developing Android applications for testing NFC controllers and automating test cases using Python.
A Posteriori Perusal of Mobile ComputingEditor IJCATR
This document discusses mobile computing, including its history and characteristics. It describes how mobile computing has evolved from devices with large antennas to communicate simple messages to today's personal computers that can perform most functions wirelessly. The document outlines the key components of mobile computing including hardware, system/application software, and communication mediums. It also describes various mobile computing devices such as personal digital assistants, smartphones, tablet PCs, ultra-mobile PCs, wearable computers, and e-readers.
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
This document discusses the history and characteristics of mobile computing. It describes how mobile computing has evolved from devices with large antennas to transmit simple messages to today's smartphones and laptops with wireless connectivity. The key characteristics of mobile computing include portable hardware like laptops and smartphones, mobile operating systems like Android and Windows, and software applications. Mobile computing allows users access to data from anywhere through wireless communication networks.
This document discusses mobile computing. It begins by defining mobile computing as human-computer interaction that allows transmission of data, voice and video via wireless devices without a fixed connection. It then discusses mobile communication, hardware, and software. For mobile hardware, it describes devices like smartphones, tablets, and PDAs. For mobile software, it discusses how software deals with the characteristics and requirements of mobile applications. It also covers advantages of mobile computing like location flexibility and enhanced productivity, as well as limitations like range/bandwidth and security standards. Overall, the document provides an overview of the key concepts and components of mobile computing.
Mobile Agents: An Intelligent Multi-Agent System for Mobile PhonesIOSR Journals
This document summarizes a research paper on developing an intelligent multi-agent system for hotel reservations on mobile phones. The system would allow users to enter search criteria and have an agent automatically search for and book the most suitable hotel. The agent would move between hotels on the user's mobile device to collect details on facilities, prices, reviews and more. The goal is to make the hotel booking process more efficient and less time-consuming for users. The document outlines the proposed system design and architecture, which incorporates mobile agent technologies to enable the agent to perform tasks remotely on behalf of the user.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
We are providing training on IEEE 2016-17 projects for Ph.D Scalars, M.Tech, B.E, MCA, BCA and Diploma students for
all branches for their academic projects.
For more details call us or watsapp us @ 7676768124 0r 9545252155
Email your base papers to "adritsolutions@gmail.co.in"
We are providing IEEE projects on
1) Cloud Computing, Data Mining, BigData Projects Using JAva
2) Image Processing and Video Procesing (MATLAB) , Signal Processing
3) NS2 (Wireless Sensor, MANET, VANET)
4) ANDRIOD APPS
5) JAVA, JEE, J2EE, J2ME
6) Mechanical Design projects
7) Embedded Systems and IoT Projects
8) VLSI- Verilog Projects (ModelSim and Xilinx using FPGA)
For More details Please Visit us at
Adrit Solutions
Near Maruthi Mandir
#42/5, 18th Cross, 21st Main
Vijaynagar
Bangalore.
A Survey on Mobile Commerce Security Issues and Applicationstheijes
Electronic saving money and Mobile managing an account are seen as one of the best business-to-buyer applications in electronic trade and versatile business. The utilization of e-saving money and m- managing an account particularly in created nations has become quickly. Low charges, time investment funds and opportunity from time and spot have been observed to be generally imperative components of e-managing an account and m-saving money. These administrations are simple to utilize helpful and good with way of life , pace of administration conveyance is quick. There are two sorts of administrations offered in e-keeping money and m-keeping money, i.e. A) Notifications and alarms and B) Data, in which the bank sends messages containing data or notice required by the client. In this paper shows another system for using so as to enhance security of these messages steganography and cryptography system together.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
Ambient intelligence (AmI) refers to electronic environments that are sensitive and responsive to human presence. AmI aims to support users by having devices work together to automatically meet users' needs through context awareness and personalized interactions. Key technologies that enable AmI include ubiquitous computing, ubiquitous communication, and intelligent user interfaces to create a seamless experience between users and their digitally augmented surroundings. While AmI offers benefits like increased convenience, control, and efficiency, open challenges remain regarding privacy, security, complexity of modeling multiple users, and ensuring reliability of networked devices.
The document proposes an instant search engine for museums using mobile devices. It would allow users to get information about museums, including audio guides about art objects, locations of museums and places within them. The system would use mobile learning platforms and positioning techniques like infrared signals, RFID, GPS and Bluetooth to provide interactive guides and interfaces for users to access information about specific art objects in a given museum on their mobile devices anywhere and anytime. It discusses how artificial intelligence concepts could be applied, including expert systems and information retrieval, to improve personal knowledge management using the mobile museum guide.
The document discusses ubiquitous and mobile computing. It describes how ubiquitous computing aims to integrate technology seamlessly into everyday life so that it is invisible to users. It also discusses how mobile computing provides access to information anywhere through devices like smartphones and tablets. Finally, it suggests that as technology becomes more integrated into our lives and environments, new paradigms of interaction will continue to emerge that are inspired by constant access to information through ubiquitous and mobile devices.
mobile computing - Unit 1 Material.pdfdeepapriya28
The document discusses mobile computing, which allows transmission of data, voice, and video via wireless devices. It describes mobile computing as consisting of mobile communication, hardware, and software. Mobile communication provides the infrastructure for reliable communication between wireless devices using protocols, services, bandwidth, and portals. Mobile hardware includes devices like smartphones and laptops that support mobility. Mobile software is the operating system that operates mobile devices and deals with their characteristics and requirements. Some examples of mobile applications discussed are web access, GPS, entertainment, education, and managing personal records through social media. The document also covers characteristics of mobile computing like portability, social interactivity, context sensitivity, and connectivity.
1. The document discusses the concept of developing a mobile application for an educational portal to enable e-learning through wireless devices. It aims to allow students to access study materials, take tests, and view evaluation results on their mobile devices.
2. The proposed system would generate analysis of student performance both individually and in groups to help assess learning and share knowledge among peers.
3. The model could be implemented as a massive open online course (MOOC) across multiple institutions to provide interactive study forums and networking opportunities for students.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
Sourav Roy is a 7th semester student studying Computer Technology at Rashtrasant Tukadoji Maharaj Nagpur University. The document discusses the Internet of Things (IoT), which connects electronic devices and software to enable networking and communication between devices. IoT goes beyond machine-to-machine communication and allows interconnection and automation across many fields through applications like smart grids and devices that can identify people and objects. The document predicts that vertical market applications will have a big impact in the next five years by improving areas like healthcare, transport, and food safety. Applications are key to providing people access to the benefits of IoT.
Mobile commerce refers to transactions initiated and completed using mobile devices. It allows consumers to purchase goods and services from sellers using their mobile phones. Key technologies that enable mobile commerce include wireless networks, GPS, and mobile payment systems. While still growing, mobile commerce provides consumers with ubiquity, as they can access information anywhere at any time from their mobile devices.
The document discusses the Internet of Things (IoT). It defines IoT as connecting physical objects to exchange data over a network without human involvement. The document outlines key IoT trends like growing connected devices and applications in various industries. It describes the typical IoT architecture involving sensor and network layers to collect data, management services for analytics/security, and applications. The document also discusses technology enablers and challenges to IoT adoption.
This document discusses a research paper on home automation systems using the Internet of Things (IoT). It begins with an introduction to IoT, defining it as a network of everyday objects that can share information and complete tasks. It then discusses how IoT is enabling home automation through technologies like smart lights, door sensors, and webcams. The paper also outlines the key components of an IoT system, including hardware, middleware, and interfaces. It describes several enabling technologies used in IoT, such as RFID, wireless sensor networks, and addressing schemes. Finally, it discusses reference architectures for IoT from standards bodies like ITU and WSO2.
This document provides an overview of mobile computing. It discusses the distinction between wireless and mobile technologies, different mobile devices, challenges of mobile computing including bandwidth limitations and security issues, applications of mobile computing in various industries, and the future of wireless internet access. The document contains content on introduction, definitions, challenges, merits and applications of mobile computing over 16 pages.
Design and implementation a network mobile application for plants shopping ce...IJECEIAES
During the revolution of developing mobile phone applications, they can be used in different fields like business, health, transportation, communications and tourism, and other uses. This paper presents QR based information management system for plants shopping centers. This system includes two main sides: mobile and server. The proposed application is used as a substitute for the human guide that each visitor needs in the plants shopping center. The complete information can be provided on any seedling displayed in the shop depending on the QR code technology. Each branch of the same enterprise includes sub-server that is linked to the main server using a private computer network. The server side contains information of all plants and all branches for such enterprise in the form of text and image in different languages. The proposed application facilitates the movement of the customer inside the place, the ease in preparing bills electronically that helps the visitor to save the time of queue to preparing the bill and paying. The proposed system is tested over different case studies to prove the efficiency in terms of information and selling management.
Similar to A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVACY VIA LOCATION SENSING (20)
Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...pharmaindexing
Background
The objective of this study was to investigate the degree of compliance among cardiac patients who attend the health facilities in Kuala Lumpur and Perak, Malaysia. The reasons for non-compliance and recommendations from healthcare professionals were also evaluated.
Method
A cross-sectional study of 400 patients and 100 healthcare professionals was carried out. This study utilizes variables on external factors and internal factors as the measurement tools. The questionnaire which consists of Morisky self-reported medication adherence questions was administered to patients and causes for non-compliance sought. Questionnaire for healthcare professionals was used to determine strategies that can improve compliance rate.
Results
The study revealed a 15.8% of high adherence rate, 54.3% of moderate adherence rate and 30% of poor adherence to cardiovascular disease medications. The chi-square tests showed the strong association between dependent and independent variables. The model chosen for testing the patient compliance through external and internal factors gives an R2 value of 85.0% with an adjusted R2 of 84.7%. The F value (317.187) was also significant (p=0.000) which means that the variables have better fit in the multivariate model. The major reasons determined for non-adherence were attitudes and beliefs, lifestyle, side effects and cost of medications. The study recommends that pharmacists and dispensing technicians should be adequately qualified to provide proper counselling to cardiac patients on their medicines and disease conditions.
Conclusion
The result of this study is of value to health care providers. Compliance to cardiovascular medications will avoid treatment failures encountered in therapy.
Overview on Recurrence Pregnancy Loss etiology and risk factorspharmaindexing
Recurrent pregnancy loss (RPL) can be defined as more than two to three consecutive miscarriages before 20 weeks’ gestation; it affects approximately 1% to 2% of women. RPL is a multifactorial disease. It is very important to study the etiology and risk factors of RPL to find the best diagnostic tests and suitable therapeutic intervention. This article will discuss the current understanding etiologies and risk factors of RPL.
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.pharmaindexing
Asthma management is a challenge due to the prevalence of disease in the world. Based on the immunological and inflammatory mechanisms of asthma, corticosteroids and anti-inflammatory participate greatly in the treatment plan. Due to different reasons, there is still an unmet need to develop new agents in this field. A lot of compounds with anti-inflammatory effect are investigated in both pre-clinical and clinical studies.
A review on liver disorders and screening models of hepatoprotective agentspharmaindexing
The liver is a vital organ present in vertebrates and some other animals. It has a wide range of functions, including detoxification, protein synthesis, and production of bio chemicals necessary for digestion. The liver is necessary for survival; there is currently no way to compensate for the absence of liver function long term, although liver dialysis can be used short term.
Carbamazepine induced Steven Johnson syndrome: A case reportpharmaindexing
Drugs are the most common cause that induces Steven Johnson syndrome (SJS) and includes antiepileptic drugs, antiretroviral drugs, anti-tuberculosis drugs, Sulphonamides, fluoroquinolones, penicillins, non-Steroidal anti-inflammatory drugs, Multivitamins. The genetic markers are also the cause for carbamazepine induced Steven Johnson Syndrome. In our study, the antiepileptic drug (Carbamazepine) is the cause for Steven Johnson Syndrome. A female patient aged 25 years came to the hospital with the complaints of bubbling over the skin and all over the body with papillary vesicles associated with pain and irritation, fever, myalgia, and nausea. The patient is known case of Phenytoin induced Steven Johnson Syndrome. In this case the patient developed the Steven Johnson Syndrome approximately after one month after starting the carbamazepine.By the withdrawal of the drug, the condition of the patient was improved.
Monoherbal formulation development for laxative activitypharmaindexing
The Ayurvedic Pharmacopoeia specifically approves flaxseed as a poultice for boils externally and demulcent or laxative internally. In this study monoherbal formulation development for laxative activity of flaxseed was undertaken. The plantLinumusitatissimumhasshowed higher percentage of total ash as well as alcohol soluble extractive values. The aqueous extract of Linumusitatissimumwas prepared by using pilot scale extraction plant and spray drying unit. The qualitative phytochemical studies reveal the presence of amino acids, carbohydrates, vitamins and proteins. From the available literatures it was found that Linumusitatissimum contains more number of amino acids. The formulated tablets showed acceptable pharmacopoeial limits and complies with specifications for thickness, hardness, friability and weight variation. The formulation has showed better laxative activity indicating additive property of the combined phytoconstituents of the plant.
Monoherbal formulation development for laxative activitypharmaindexing
The Ayurvedic Pharmacopoeia specifically approves flaxseed as a poultice for boils externally and demulcent or laxative internally. In this study monoherbal formulation development for laxative activity of flaxseed was undertaken. The plantLinumusitatissimumhasshowed higher percentage of total ash as well as alcohol soluble extractive values. The aqueous extract of Linumusitatissimumwas prepared by using pilot scale extraction plant and spray drying unit. The qualitative phytochemical studies reveal the presence of amino acids, carbohydrates, vitamins and proteins. From the available literatures it was found that Linumusitatissimum contains more number of amino acids. The formulated tablets showed acceptable pharmacopoeial limits and complies with specifications for thickness, hardness, friability and weight variation. The formulation has showed better laxative activity indicating additive property of the combined phytoconstituents of the plant.
Pneumonia and respiratory failure from swine origin influenza H1n1pharmaindexing
Swine influenza (swine flu) became alarming health concern when World Health Organization declared as “public health emergency of international concern” on April 25, 2009. After documentation of human-to-human transmission of the virus in at least three countries of two WHO regions, the WHO raised the pandemic level to 6.1 During the 1918, flu pandemic infected one-third of the world's population (an estimated 500 million people) and caused approximately 50 million deaths.2 In 1976, an outbreak of swine influenza occurred in New Jersey, USA, which involved more than 200 cases, some of them severe, resulting in one death.3 In 1988, another fatality was reported as a complication of swine influenza.
A descriptive study on newborn care among postnatal mothers in selected mater...pharmaindexing
The newborn health challenge faced by India is more formidable than that experienced by any other country in the world. The newborn health is inevitably affected by the traditional care practices of the mothers causing high infant morbidity and mortality.The aim of the study were determine the knowledge, attitude and practice of postnatal mothers regarding new born care and find out the association between knowledge, attitude and practice of postnatal mothers regarding new born care and to determine the association between these as well as with the selected demographic variables. A descriptive study was conducted to assess the knowledge, attitude and practice of postnatal mothers regarding new born care in selected maternity centres in Madurai. Survey approach was employed to select sample and it consisted of 100 postnatal mothers. Data was collected using structured interview schedule. Findings of the study showed that 65% of postnatal mothers had moderate knowledge; 61% had favourable attitude and 57% of them had high practice of new born care. There was a significant association between knowledge and attitude (r=+0.567), knowledge and practice (r=+0.388), attitude and practice (r=+0.321) .There was a significant association between knowledge and education, monthly family income and obstetrical score at p<0.05. Findings of the study indicated the need to conduct frequent assessment of knowledge, attitude and practice of postnatal mothers regarding new born care. Awareness and attitude of the mothers towards new born care still has lots of lacunae especially in those who belong to the lower socio economic statusand poorly educated postnatal mothers. So it is imperative to provide comprehensive training in the field of new born care for mothers during pregnancy
Late 19th century was evident of intelligent biomaterial; which has changed researcher’s perspective towards science and technology. This intelligent biomaterial are envisioned to have huge impact on Healthcare from sequential signalling of biomedical molecule, mimicking natural gene, an effective drug carrier, to high resolution diagnostic tool.From drug discovery aspect many of NCE fail to reach therapeutic potential due to PK/ PD profile. Nanotechnology has changed the face of drug discovery form chemical evaluation to structure of proteins in signalling pathways and development of chemical antibody. Nanotechnology from lab to market approval is long process due to regulatory evaluation. Though it seems to be bright future market it has to go through a long process from being innovation to complete market product. This makes whole process expensive making investor reluctant to invest in big projects.Western world is aware of dramatic potential of nano-projects; which has its limitation in financial investments; with major challenge of transforming nano science to commercial pharmaceutical product.
The Flaws in health practice in post-operative management of a patient in ter...pharmaindexing
This case study summarizes the treatment of a 4-year old child with congenital urinary tract obstruction who presented with constipation, fever, and cough. Laboratory tests found low electrolyte levels, high blood acids, and kidney damage. The child's treatment included surgery, dialysis to correct electrolyte imbalances, and antibiotics for chest infection. However, the case study notes discrepancies in the post-operative treatment, including questionable antibiotic selection and prescribing of calcium channel blockers not recommended for children. The study concludes there is a need for clinical pharmacists on the healthcare team to improve rational medication use.
Corticosteroid induced disorders – An overviewpharmaindexing
Glucocorticoids are important in the treatment of many inflammatory, allergic, immunologic, and malignant disorders, and the toxicity of glucocorticoids is one of the commonest causes of iatrogenic illness associated with chronic inflammatory disease.Glucocorticoid-induced muscle atrophy is characterized by fast-twitch or type II muscle fiber atrophy. Corticosteroid (CS) therapy is widely used in the treatment of rheumatic diseases.Osteoporosis remains one of its major complications.Steroid induced glaucoma is a form of open angle glaucoma occurring as an adverse effect of corticosteroid therapy. Glucocorticoids induce hepatic and extrahepatic insulin resistance.Glucocorticoid treatment impairs both glucose transport in fat and muscle cells. Corticosteroid-induced psychosis represents a spectrum of psychological changes that can occur at any time during treatment. Cushing’s syndrome describes the signs and symptoms associated with prolonged exposure to inappropriately high levels of the hormone cortisol. Physicians must be aware of these adverse effects and be equipped to manage them.
Anti-inflammatory activity of pupalia lappacea L. Jusspharmaindexing
Pupalia lappacea (L) Juss is an erect shrub used in folklore medicine to treat bone fractures and in inflammatory conditions. Methanolic extract of aerial parts shown is claimed in traditional medicine that the leaves of the plant are used in the treatment of inflammation. In the present study, the methanolic extract of Pupalia lappacea was screened for its anti-inflammatory activity using carageenan induced rat paw edema egg white induced paw oedema models. The methanolic extract at the dose of 200 mg/kg p.o exhibited significant anti-inflammatory activity in carrageenan induced paw edema model (p<0.01). In egg white induced model, methanolic extract at the dose of 200 mg/kg inhibited paw oedema significantly (p<0.01) indicating that both test samples inhibit the increase in number of fibroblasts and synthesis of collagen and mucopolysaccharides during prostaglandin formation during the inflammation. These experimental results have established a pharmacological evidence for the folklore claim of the drug to be used as an anti inflammatory agent. HPTLC analysis of the extract shows the presence of gallic acid 1.24mg/ml, ferulic acid 2.00mg/ml, chlorogenic acid 46.25mg/ml and rutin 7.02mg/ml of the extract which were responsible for the claimed anti-inflammatory action in the animal models studied.
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...pharmaindexing
This document summarizes research on Lucinactant, a novel synthetic surfactant approved by the FDA in 2012 for treatment of neonatal respiratory distress syndrome (RDS). It contains a peptide called sinapultide that mimics the function of human surfactant protein B. Studies found Lucinactant was as effective as or more effective than previous animal-derived surfactants in reducing mortality from RDS, but its pharmacokinetics are not fully understood. The document reviews clinical trials and mechanisms of Lucinactant and discusses its efficacy, safety profile, and potential cost benefits compared to other surfactants.
Bioactivity screening of Soil bacteria against human pathogenspharmaindexing
This study aimed to isolate soil bacteria with potential bioactive properties against human pathogens. 36 bacterial strains were isolated from 3 soil samples and screened against common pathogens. 14 isolates showed antibacterial activity, including against Staphylococcus aureus, Streptococcus faecalis, E. coli, Klebsiella aerogenes, Proteus vulgaris, Pseudomonas aureginosa and Salmonella typhi. The 3 most active bacterial isolates were selected for further production and isolation of their bioactive metabolites. Testing found the metabolites had prominent antibacterial effects against the clinical pathogens studied, indicating their potential as a source of new antimicrobials given the rise in drug resistance.
A study on sigmoid Volvulus presentation and managementpharmaindexing
A study on sigmoid volvulus presentation and management was a 2yr retrospective study done at RMMCH.The diagnosis of sigmoid volvulus was made from a history of large bowel obstruction (constipation, abdominal distension, and abdominal pain), which were often recurrent and plain abdominal radiographs.The morbidity associated isSuperficial wound infection occurred in four patients. All the infected wounds eventually healed with conservative measures. Clinical anastomotic dehiscence was noted in 1 patient for which during relaparotomy proximal colostomy and mucous fistula was done. The mortality associated is shown is there were 9 deaths of which 7 were due to sepsis and 2 were due to comorbid illness. Two out of eight patients for whom a colopexy was done had a recurrent attack of sigmoid volvulus. The duration of hospital stay ranged between 10 and 21 days. Use of sigmoidoscopic detorsion for viable colon should be encouraged. Sigmoidopexy, which is associated with a recurrence rate of 20% in our series of patients, should be used selectively.Hartmann’s procedure is a safe option in sigmoid volvulus with gangrenous bowel. Primary anastomosis in emergency situation can be carried out with morbidity and mortality in patients with viable colon
Evaluation of Preliminary phytochemical on various some medicinal plantspharmaindexing
The present study was carried out to evaluate the physical status and percentage yield of methanolic extract and its fractions of whole plant of Leucas cephalotes, leaves of Hiptage benghalensis and leaves of Kydia calycina were recorded for future references and Preliminary phytochemical screening of MLC, MHB and MKC revealed the presence of carbohydrates, glycosides, saponins, flavonoids, steroidal and phenolic compounds. MLC revealed the presence of all the above mentioned phytoconstituents except saponins and also MKC steroidal compounds. The fractions of MLC, MHB and MKC revealed the presence of glycosides, phenolic compounds, steroids and flavonoids.
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...pharmaindexing
This study compared the in vitro antibacterial activity of cefoperazone and levofloxacin against various clinical isolates. 120 bacterial isolates from patient samples were tested for susceptibility to cefoperazone and levofloxacin using disc diffusion. Results showed levofloxacin had lower resistance than cefoperazone for E. coli and P. aeruginosa, while cefoperazone was more effective against S. aureus. However, resistance to both antibiotics was gradually increasing, highlighting the need for regular surveillance of antibiotic susceptibility.
Concept of srotas from ayurvedic perspective with special reference to neurologypharmaindexing
Ayurveda is a life science. The researchers of ayurveda could rule out the presence of srotas (channels) spreading throughout the human body. These srotas (channels) are governed by vayu which is using all the srotas (channels) of the body to carry out the functional and physiological activities of the human body without which the human society will not exist. Several synonymous words have been described by the ayurvedicacharyas for srotas. Some are micro and some are macro in structures and they adopt the same colour of the particular dhatus of the body to which it belongs. The aim of the study is to justify that srotas are nothing but innurmerable channels or pathways of the nervous system governed by electric current without which no functional and physiological activities of the human body will develope.
Health promotion survey in overweight and obese students of universities in n...pharmaindexing
Introduction
Overweight and obesity is one of the major health problems in the UK and worldwide. Approximately two-thirds of the population in the UK is either overweight or obese. Overweight and obesity is an important issue that causes distress to most women. Health promotion is the best method to educate overweight and obese women. It is defined as the process enabling people to increase control over and to improve their health by Ottawa Charter for Health Promotion. It is aimed to enhance the well-being of the individuals and their positive attitudes towards prevention of various diseases. In order to make any improvement to the health promotion for overweight and obesity, the risk factors and the opinions from the public should first be identified and addressed.
Methods
Cross-sectional survey design was selected with a questionnaire that consisted of 20 open and close ended questions. A sample size of 196 was determined. The data thus gathered was analyzed using SPSS V20 (Statistical Package for Social Science version 20). Descriptive statistics (fx) and (SD) were used and Chi-square X2 test for association was employed.
Results
Out of the total 196 responses, only (40%) of the students had normal weight (SD 1.1), (25%) students had a good understanding of health promotion (SD 1.6), half (50%) appeared concerned about their weight (SD 0.5), (60%) had an obese family member (0.5). The BMI of students was associated with the presence of an obese member in their family and their weight as a concern for them. (P-value <0.05).
Conclusion
The health promotion service is beneficial as it was found to have raised concerns in the mind of the students regarding over weight and obesity. However it was observed that the understanding of health promotion service was different among students and this is the root of the problem.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Mechatronics is a multidisciplinary field that refers to the skill sets needed in the contemporary, advanced automated manufacturing industry. At the intersection of mechanics, electronics, and computing, mechatronics specialists create simpler, smarter systems. Mechatronics is an essential foundation for the expected growth in automation and manufacturing.
Mechatronics deals with robotics, control systems, and electro-mechanical systems.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Gas agency management system project report.pdfKamal Acharya
The project entitled "Gas Agency" is done to make the manual process easier by making it a computerized system for billing and maintaining stock. The Gas Agencies get the order request through phone calls or by personal from their customers and deliver the gas cylinders to their address based on their demand and previous delivery date. This process is made computerized and the customer's name, address and stock details are stored in a database. Based on this the billing for a customer is made simple and easier, since a customer order for gas can be accepted only after completing a certain period from the previous delivery. This can be calculated and billed easily through this. There are two types of delivery like domestic purpose use delivery and commercial purpose use delivery. The bill rate and capacity differs for both. This can be easily maintained and charged accordingly.
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVACY VIA LOCATION SENSING
1. www.ijiarec.com
Author for Correspondence:
*1
Mr.V.Thamizharasu, PG Scholar, Department of CSE, Sasurie College of Engineering, Vijayamangalam, Tamilnadu, India.
E-mail: tamil_cse74@yahoo.com
2
Mr. M.Santhosh, M.E., Asst.Professor Department of CSE, Sasurie College of Engineering, Vijayamangalam, Tamilnadu, India.
JAN 2014
International Journal of Intellectual Advancements
and Research in Engineering Computations
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID
SECURITY AND PRIVACY VIA LOCATION SENSING
*1
Mr. V.Tamizharasu, 2
Mr. M.Santhosh,M.E.,
ABSTRACT
In this paper, we report on a new approach for enhancing security and privacy in certain RFID applications
whereby location or location-related information (such as speed) can serve as a legitimate access context. Examples
of these applications include access cards, toll cards, credit cards, and other payment tokens. We show that location
awareness can be used by both tags and back-end servers for defending against unauthorized reading and relay
attacks on RFID systems. On the tag side, we design a location-aware selective unlocking mechanism using which
tags can selectively respond to reader interrogations rather than doing so promiscuously. On the server side, we
design a location-aware secure transaction verification scheme that allows a bank server to decide whether to
approve or deny a payment transaction and detect a specific type of relay attack involving malicious readers. The
premise of our work is a current technological advancement that can enable RFID tags with low-cost location (GPS)
sensing capabilities. Unlike prior research on this subject, our defenses do not rely on auxiliary devices or require
any explicit user involvement
Index terms: RFID, GPS, Location aware selective unlocking, malicious readers.
I INTRODUCTION
The premise of the proposed work is based on
a current technological advancement that enables many
RFID tags with low-cost sensing capabilities.We report
on a new approach for enhancing security and privacy
in certain RFID applications where by location or
location-related information (such as speed) can serve
as a legitimate access context. Examples of these
applications include access cards, toll cards, credit
cards, and other payment tokens. We show that location
awareness can be used by both tags and back-end
servers for defending against unauthorized reading and
relay attacks on RFID systems. On the tag side, we
design a location-aware selective unlocking mechanism
using which tags can selectively respond to reader
interrogations rather than doing so promiscuously. On
the server side, we design a location-aware secure
transaction verification scheme that allows a bank
server to decide whether to approve or deny a payment
transaction and detect a specific type of relay attack
involving malicious readers. We show that location
information can be used as a basis for secure
transaction verification to defend against the reader-
and-ghost attacks, a devastating relay attack against
mobile payment systems involving malicious readers.
This is based on a straightforward observation that,
under normal scenarios, both the legitimate tag and
legitimate reader are in close physical proximity, at
roughly the same location. Thus, if the two devices
indicate different physically disparate locations, a bank
server could detect the presence of a reader-and-ghost
attack. In Vibrate-to-Unlock, a user unlocks his/her
RFID tags by authenticating to these tags through a
vibrating phone. However, such an auxiliary device
(required by above schemes) may not be available at
the time of accessing RFID tags, and users may not be
willing to always carry these devices. The payment card
stores card details such as the credit card number, name
of the owner, and expiration date. It also stores a
symmetric key shared with its issuer bank.