t—CAPTCHA, Completely Automated Public
Turning Test to tell Computers and Humans Apart, it is a one
type of test. CAPTCHA is standard internet security they
protect online emails and services from being abused by
malicious computer program or BOT. CAPTCHA is a one type
of test program that protects websites from BOTs on web by
generating tests that computer cannot pass but human can
easily pass. For web security we are using different type of
CAPTCHA. In this paper describe different type of
CAPTCHA technique based on drag and drop mouse action
because drag and drop mouse action is performed by human
not by BOT. This paper is deal with survey and comparison of
different technique of CAPTCHA.
Enhancing Web-Security with Stronger CaptchasEditor IJCATR
Captcha are used widely over the World Wide Web to prevent automated programs in order to scrape a data from
websites. Captcha is a challenge response test used to ensure that the response is generated by a person not by a computer. Users
are asked to read and type a string of distorted characters in order to ensure that the user is human or not. Automation is real
problem for web application. Automated attacks can exploit many services:
1. Blogs 2. Forums 3. Phishing 4. Theft of data
Registration Websites use CAPTCHA (completely automated public turing test to tell computers and human apart) systems to
prevent the bot programs from wasting their resources. Today is the Era of where technologies are changes very rapidly. So
spammers are hackers are also trying something new to cracking captcha. That’s why it is necessary to developing an advanced
technology to generating a captcha. Just like simply generating a Captcha Images from text, or rotating an object within images.
Captcha a security measure against spam attackseSAT Journals
Abstract A CAPTCHA is challenge response test used to ensure that the response is generated by humans. CAPTCHA test are administrator by machines to differentiate between humans and machine. Because of this reason CAPTCHAs are also known as the Reverse Turing Test as contrast to Turing Test which is administrated by humans. CAPCHA is used as a simple puzzle, which restricts various automated programs (also known as internet-bots) to sign-up e-mail accounts, cracking passwords, spam sending etc. A common type of CAPTCHA requires user to recognize the letters from a distorted image, since normal human can easily recognize the CAPTCHA, while that particular text cannot be recognized by bot. In short CAPTCHA program challenges the automated program, which trying to access private data. So, CAPTCHA helps in preventing the access of personal mail accounts by some unauthorized automated spamming programs. Index Terms: CAPTCHA, Security, Spam Attacks, Reverse Turing Test.
A CAPTCHA is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.
It is used, commonly, to protect your sites.
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA ijait
Human Interactive Proofs (HIPs) are automatic reverse Turing tests designed to distinguish between various groups of users. Completely Automatic Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a HIP system that distinguish between humans and malicious computer programs. Many
CAPTCHAs have been proposed in the literature that text-graphical based, audio-based, puzzle-based and mathematical questions-based. The design and implementation of CAPTCHAs fall in the realm of Artificial Intelligence. We aim to utilize CAPTCHAs as a tool to improve the security of Internet based applications. In this paper we present a framework for a text-based CAPTCHA based on Devanagari script which can exploit the difference in the reading proficiency between humans and computer programs. Our selection of Devanagari script-based CAPTCHA is based on the fact that it is used by a
large number of Indian languages including Hindi which is the third most spoken language. There is potential for an exponential rise in the applications that are likely to be developed in that script thereby making it easy to secure Indian language based applications.
in this captcha report, you get everything those you need in a seminar. hope you like this report..
please check it out. and use it
for more report contect me. my email id is rkrakeshkumar99@gmail.com
Enhancing Web-Security with Stronger CaptchasEditor IJCATR
Captcha are used widely over the World Wide Web to prevent automated programs in order to scrape a data from
websites. Captcha is a challenge response test used to ensure that the response is generated by a person not by a computer. Users
are asked to read and type a string of distorted characters in order to ensure that the user is human or not. Automation is real
problem for web application. Automated attacks can exploit many services:
1. Blogs 2. Forums 3. Phishing 4. Theft of data
Registration Websites use CAPTCHA (completely automated public turing test to tell computers and human apart) systems to
prevent the bot programs from wasting their resources. Today is the Era of where technologies are changes very rapidly. So
spammers are hackers are also trying something new to cracking captcha. That’s why it is necessary to developing an advanced
technology to generating a captcha. Just like simply generating a Captcha Images from text, or rotating an object within images.
Captcha a security measure against spam attackseSAT Journals
Abstract A CAPTCHA is challenge response test used to ensure that the response is generated by humans. CAPTCHA test are administrator by machines to differentiate between humans and machine. Because of this reason CAPTCHAs are also known as the Reverse Turing Test as contrast to Turing Test which is administrated by humans. CAPCHA is used as a simple puzzle, which restricts various automated programs (also known as internet-bots) to sign-up e-mail accounts, cracking passwords, spam sending etc. A common type of CAPTCHA requires user to recognize the letters from a distorted image, since normal human can easily recognize the CAPTCHA, while that particular text cannot be recognized by bot. In short CAPTCHA program challenges the automated program, which trying to access private data. So, CAPTCHA helps in preventing the access of personal mail accounts by some unauthorized automated spamming programs. Index Terms: CAPTCHA, Security, Spam Attacks, Reverse Turing Test.
A CAPTCHA is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.
It is used, commonly, to protect your sites.
A FRAMEWORK FOR DEVANAGARI SCRIPT-BASED CAPTCHA ijait
Human Interactive Proofs (HIPs) are automatic reverse Turing tests designed to distinguish between various groups of users. Completely Automatic Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a HIP system that distinguish between humans and malicious computer programs. Many
CAPTCHAs have been proposed in the literature that text-graphical based, audio-based, puzzle-based and mathematical questions-based. The design and implementation of CAPTCHAs fall in the realm of Artificial Intelligence. We aim to utilize CAPTCHAs as a tool to improve the security of Internet based applications. In this paper we present a framework for a text-based CAPTCHA based on Devanagari script which can exploit the difference in the reading proficiency between humans and computer programs. Our selection of Devanagari script-based CAPTCHA is based on the fact that it is used by a
large number of Indian languages including Hindi which is the third most spoken language. There is potential for an exponential rise in the applications that are likely to be developed in that script thereby making it easy to secure Indian language based applications.
in this captcha report, you get everything those you need in a seminar. hope you like this report..
please check it out. and use it
for more report contect me. my email id is rkrakeshkumar99@gmail.com
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKScscpconf
Human Interactive Proofs (HIPs) are automatic reverse Turing tests designed to distinguish
between various groups of users. Completely Automatic Public Turing test to tell Computers
and Humans Apart (CAPTCHA) is a HIP system that distinguish between humans and malicious
computer programs. Many CAPTCHAs have been proposed in the literature that text-graphical
based, audio-based, puzzle-based and mathematical questions-based. The design and
implementation of CAPTCHAs fall in the realm of Artificial Intelligence. We aim to utilize
CAPTCHAs as a tool to improve the security of Internet based applications. In this paper we
present a framework for a text-based CAPTCHA based on Devanagari script which can exploit
the difference in the reading proficiency between humans and computer programs. Our
selection of Devanagari script-based CAPTCHA is based on the fact that it is used by a large
number of Indian languages including Hindi which is the third most spoken language. There is
potential for an exponential rise in the applications that are likely to be developed in that script
thereby making it easy to secure Indian language based applications.
Research trends on CAPTCHA: A systematic literature IJECEIAES
The advent of technology has crept into virtually all sectors and this has culminated in automated processes making use of the Internet in executing various tasks and actions. Web services have now become the trend when it comes to providing solutions to mundane tasks. However, this development comes with the bottleneck of authenticity and intent of users. Providers of these Web services, whether as a platform, as a software or as an Infrastructure use various human interaction proof’s (HIPs) to validate authenticity and intent of its users. Completely automated public turing test to tell computer and human apart (CAPTCHA), a form of IDS in web services is advantageous. Research into CAPTCHA can be grouped into two -CAPTCHA development and CAPTCH recognition. Selective learning and convolutionary neural networks (CNN) as well as deep convolutionary neural network (DCNN) have become emerging trends in both the development and recognition of CAPTCHAs. This paper reviews critically over fifty article publications that shows the current trends in the area of the CAPTCHA scheme, its development and recognition mechanisms and the way forward in helping to ensure a robust and yet secure CAPTCHA development in guiding future research endeavor in the subject domain.
CAPTCHA- Newly Attractive Presentation for YouthWebCrazyLabs
A CAPTCHA is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.
It is used, commonly, to protect your sites.
A CAPTCHA (a backronym for "Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge-response test used in computing to determine whether or not the user is human.
CAPTCHAs are, by definition, fully automated, requiring little human maintenance or intervention to administer, producing benefits in cost and reliability.
By definition, the algorithm used to create the CAPTCHA must be made public, though it may be covered by a patent. This is done to demonstrate that breaking it requires the solution to a difficult problem in the field of artificial intelligence (AI) rather than just the discovery of the (secret) algorithm, which could be obtained through reverse engineering or other means.
RESULTADOS ISCX 1T-2016. Compañías líderes sectoriales en España en Satisfacc...STIGA CX
Con el ánimo de mantener un pulso constante de los niveles de satisfacción y experiencia de cliente de los consumidores en España y a la vez, enriquecer el valor que ofrecemos a nuestros clientes en sus estudios ad hoc, desde enero de 2005, a través del ISCX (Índice STIGA de Experiencia de Cliente), evaluamos de forma continua niveles de Calidad Percibida (imagen, precio y servicio) y sus efectos en Fidelidad (tentativa de abandono o intención de recompra) y Prescripción (intención de recomendar).
En España, a través de un muestreo aleatorio que asegura la representatividad por provincia, sexo y edad, obtenemos al año más de 16.000 opiniones que evalúan 8 sectores económicos, que se desagregan a su vez en 21 subsectores de actividad.
DEVACAPTCHA - A FRAMEWORK TO PREVENT BOT ATTACKScscpconf
Human Interactive Proofs (HIPs) are automatic reverse Turing tests designed to distinguish
between various groups of users. Completely Automatic Public Turing test to tell Computers
and Humans Apart (CAPTCHA) is a HIP system that distinguish between humans and malicious
computer programs. Many CAPTCHAs have been proposed in the literature that text-graphical
based, audio-based, puzzle-based and mathematical questions-based. The design and
implementation of CAPTCHAs fall in the realm of Artificial Intelligence. We aim to utilize
CAPTCHAs as a tool to improve the security of Internet based applications. In this paper we
present a framework for a text-based CAPTCHA based on Devanagari script which can exploit
the difference in the reading proficiency between humans and computer programs. Our
selection of Devanagari script-based CAPTCHA is based on the fact that it is used by a large
number of Indian languages including Hindi which is the third most spoken language. There is
potential for an exponential rise in the applications that are likely to be developed in that script
thereby making it easy to secure Indian language based applications.
Research trends on CAPTCHA: A systematic literature IJECEIAES
The advent of technology has crept into virtually all sectors and this has culminated in automated processes making use of the Internet in executing various tasks and actions. Web services have now become the trend when it comes to providing solutions to mundane tasks. However, this development comes with the bottleneck of authenticity and intent of users. Providers of these Web services, whether as a platform, as a software or as an Infrastructure use various human interaction proof’s (HIPs) to validate authenticity and intent of its users. Completely automated public turing test to tell computer and human apart (CAPTCHA), a form of IDS in web services is advantageous. Research into CAPTCHA can be grouped into two -CAPTCHA development and CAPTCH recognition. Selective learning and convolutionary neural networks (CNN) as well as deep convolutionary neural network (DCNN) have become emerging trends in both the development and recognition of CAPTCHAs. This paper reviews critically over fifty article publications that shows the current trends in the area of the CAPTCHA scheme, its development and recognition mechanisms and the way forward in helping to ensure a robust and yet secure CAPTCHA development in guiding future research endeavor in the subject domain.
CAPTCHA- Newly Attractive Presentation for YouthWebCrazyLabs
A CAPTCHA is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.
It is used, commonly, to protect your sites.
A CAPTCHA (a backronym for "Completely Automated Public Turing test to tell Computers and Humans Apart") is a type of challenge-response test used in computing to determine whether or not the user is human.
CAPTCHAs are, by definition, fully automated, requiring little human maintenance or intervention to administer, producing benefits in cost and reliability.
By definition, the algorithm used to create the CAPTCHA must be made public, though it may be covered by a patent. This is done to demonstrate that breaking it requires the solution to a difficult problem in the field of artificial intelligence (AI) rather than just the discovery of the (secret) algorithm, which could be obtained through reverse engineering or other means.
RESULTADOS ISCX 1T-2016. Compañías líderes sectoriales en España en Satisfacc...STIGA CX
Con el ánimo de mantener un pulso constante de los niveles de satisfacción y experiencia de cliente de los consumidores en España y a la vez, enriquecer el valor que ofrecemos a nuestros clientes en sus estudios ad hoc, desde enero de 2005, a través del ISCX (Índice STIGA de Experiencia de Cliente), evaluamos de forma continua niveles de Calidad Percibida (imagen, precio y servicio) y sus efectos en Fidelidad (tentativa de abandono o intención de recompra) y Prescripción (intención de recomendar).
En España, a través de un muestreo aleatorio que asegura la representatividad por provincia, sexo y edad, obtenemos al año más de 16.000 opiniones que evalúan 8 sectores económicos, que se desagregan a su vez en 21 subsectores de actividad.
The internet has been playing an increasingly important role in our daily life, with the availability of many web services such as email and search engines. However, these are often threatened by attacks from computer programs such as bots. To address this problem, CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) was developed to distinguish between computer programs and human users. Although this mechanism offers good security and limits automatic registration to web services, some CAPTCHAs have several weaknesses which allow hackers to infiltrate the mechanism of the CAPTCHA. This paper examines recent research on various CAPTCHA methods and their categories. Moreover it discusses the weakness and strength of these types.
Enhancing The Human Perceivable Image Content In CAPTCHA Based BF Algorithmtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
How effective are CAPTCHAs as a security mechanism against malicious automation? We report and analyze four case studies and draw conclusions as to the best ways to implement CAPTCHAs as an integrated part of a security strategy. Specifically, security teams should use novel CAPTCHA methods that make the CAPTCHA into something enjoyable, like a mini-game. Also, we help identify how to present a CAPTCHA only when users exhibit suspicious behavior by implementing various automation detection mechanisms.
Optimizing Security in Smartphones using Interactive CAPTCHA (iCAPTCHA)IJERA Editor
Websites such as email providers use Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA) which is a simple test easily solved by humans but not by computers and hence provides a way of distinguishing a legitimate human user from an attacker. Methods have been developed like the Optical Character Recognition (OCR) and the third party human attack which have made CAPTCHAs vulnerable. The third party human attack poses a real threat to the use of CAPTCHA which can be easily shown using the Instant Messenger CAPTCHA Attack (IMCA). A new defense system, the interactive CAPTCHA (iCAPTCHA) was developed to defend against third party human solver attacks. The iCAPTCHA is solved via user interactions and the back-and-forth traffic between the client and server amplifies the statistical timing difference between a third party human attacker and a legitimate human user. The aim of this research is to use iCAPTCHA in Smartphones which will be solved after a certain number of password trials. However iCAPTCHA alone cannot provide sufficient security, therefore to further provide security, the iCAPTCHA will be encrypted using RSA and Elliptic Curve Cryptography.
The most notable primitive invented is Captcha, which distinguishes human users from computers by presenting a challenge, i.e., a puzzle, beyond the capability of computers but easy for humans. Captcha is now a standard Internet security technique to protect online email and other services from being abused by bots.
AN OPTIMIZED SYSTEM TO SOLVE TEXT-BASED CAPTCHAijaia
CAPTCHA(Completely Automated Public Turing test to Tell Computers and Humans Apart) can be used to
protect data from auto bots. Countless kinds of CAPTCHAs are thus designed, while we most frequently
utilize text-based scheme because of most convenience and user-friendly way [1]. Currently, various types
of CAPTCHAs need corresponding segmentation to identify single character due to the numerous different
segmentation ways. Our goal is to defeat the CAPTCHA,thus rstly the CAPTCHAs need to be split into
character by character. There isn't a regular segmentation algorithm to obtain the divided characters in all
kinds of examples, which means that we have to treat the segmentation individually. In this paper, we build
a whole system todefeat the CAPTCHAs as well as achieve state-of-the-art performance.In detail, we
present our self-adaptive algorithm to segment different kinds of characters optimally, and then utilize both
the existing methods and our own constructed convolutional neural network as an extra classfier. Results
are provided showing how our system work well towards defeating these CAPTCHAs.
Security and User Experience: A Holistic Model for CAPTCHA Usability IssuesKarthikeyan Umapathy
CAPTCHA is a widely adopted security measure on the Web and is designed to effectively distinguish humans and bots by exploiting human’s ability to recognize patterns that an automated bot is incapable of. To counter this, bots are being designed to recognize patterns in CAPTCHAs. As a result, CAPTCHAs are now being designed to maximize the difficulty for bots to pass human interaction proof tests, while making it quite an arduous task even for humans as well. The approachability of CAPTCHA is increasingly being questioned because of the inconvenience it causes to legitimate users. Irrespective of the popularity, CAPTCHA is indispensable if one wants to avoid potential security threats. We investigated the usability issues associated with CAPTCHA. We built a holistic model by identifying the important concepts associated with CAPTCHAs and its usability. This model can be used as a guide for the design and evaluation of CAPTCHAs.
Performance evaluation of botnet detection using machine learning techniquesIJECEIAES
Cybersecurity is seriously threatened by Botnets, which are controlled networks of compromised computers. The evolving techniques used by botnet operators make it difficult for traditional methods of botnet identification to stay up. Machine learning has become increasingly effective in recent years as a means of identifying and reducing these hazards. The CTU-13 dataset, a frequently used dataset in the field of cybersecurity, is used in this study to offer a machine learning-based method for botnet detection. The suggested methodology makes use of the CTU-13, which is made up of actual network traffic data that was recorded in a network environment that had been attacked by a botnet. The dataset is used to train a variety of machine learning algorithms to categorize network traffic as botnet-related/benign, including decision tree, regression model, naïve Bayes, and neural network model. We employ a number of criteria, such as accuracy, precision, and sensitivity, to measure how well each model performs in categorizing both known and unidentified botnet traffic patterns. Results from experiments show how well the machine learning based approach detects botnet with accuracy. It is potential for use in actual world is demonstrated by the suggested system’s high detection rates and low false positive rates.
Similar to A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION (20)
Recent joint surgery studies reveal increased
revisions and resurfacing of the metal on metal hip joints. Metal
on metal hip implants were developed more than thirty years ago
and their application has been refined because of availability of
advanced manufacturing techniques and partly by advancements
in material science and engineering. Development of composite
materials may provide greater durability to metal-on-metal hip
implants .This review article is a study of the latest literature of
metal-on-metal hip implants and its various modeling techniques.
Numbers of methods are used for convergence and numerical
solution to investigate the performance of metal-on-metal hip
implant for accurate stable solution. This paper presents analysis
done by various researchers on metal-on-metal hip implants for
wear, lubrication, fatigue, bio-tribo-corrosion, design, toxicity
and resurfacing. After in vivo and in vitro studies, it is found that
all these methods have limitations. There is a need of more
insight for lubrication analysis, geometry of bearings, materials
and input parameters. The information provided in this work is
intended as an aid in the assessment of metal-on-metal hip joints.
Background Hospital contributes significantly tangible and intangible resources on a concurred plan by the scheduling of surgery on the OT list. Postponement decreases efficiency by declining throughput leads to wastage of resources hence burden to the nation. Patients and their family face economic and emotional implication due to the postponement. Postponement rate being a quality indicator controls check mechanism could be developed from the results. Postponement of elective scheduled operations results in inefficient use of the operating room (OR) time on the day of surgery. Inconvenience to patients and families are also caused by postponements. Moreover, the day of surgery (DOS) postponement creates logistic and financial burden associated with extended hospital stay and repetitions of pre-operative preparations to an extent of repetition of investigations in some cases causing escalated costs, wastage of time and reduced income. Methodology A cross-sectional study was done in the operation theaters of a tertiary care hospital in which total ten operation theaters of General Surgery Data of scheduled, performed and postponed surgeries was collected from all the operation theater with effect from March 1st to September 30th, 2018. A questionnaire was developed to find out the reasons for the postponement for all hospital’s stakeholders (surgeons, Anesthetist, Nursing Officer) and they were further evaluated time series analysis of scheduling of Operation Theater for moving average technique. Results Total 958 surgeries were scheduled and 772 surgeries performed were and 186 surgeries were postponed with a postponement rate of 19.42% in the cardiac surgery department during the study period. Month-wise postponement Rate exponential smoothing of time series data shows the dynamic of operating suits. To test throughput Postponement rate was plotted the postponed surgeries and on regression analysis is in a perfect linear relationship.
Introduction: Postponement of elective scheduled operations results in inefficient use of operating room (OR) time on the day of surgery. Inconvenience to patients and families also caused by postponements. Moreover, day of surgery (DOS) postponement creates logistic and financial burden associated with extended hospital stay and repetitions of pre-operative preparations to an extend of repetition of investigations in some cases causing escalated costs, wastage of time and reduced income. Methodology: A cross sectional study was done in the operation theaters of a tertiary care hospital in which total ten operation theaters of General Surgery Data of scheduled, performed and postponed surgeries was collected from all the operation theater with effect from march 1st to September 30th 2018. A questionnaire was developed to find out the reasons for the postponement for all hospital’s stakeholders (Surgeons, Anesthetist, Nursing officer) and they were further evaluated Time series analysis of scheduling of Operation Theater for Moving average Technique. Results: total 2,466 surgeries were scheduled and 1,980 surgeries were performed and 486 surgeries were postponed in the general surgery department during the study period. Month wise postponement forecast was in accordance with the performed surgeries and on regression analysis postponed surgeries were in perfect linear relationship with the postponement Rate.
In the present paper the experimental study of
Nanotechnology involves high cost for Lab set-up and the
experimentation processes were also slow. Attempt has also
been made to discuss the contributions towards the societal
change in the present convergence of Nano-systems and
information technologies. one cannot rely on experimental
nanotechnology alone. As such, the Computer- simulations and
modeling are one of the foundations of computational
nanotechnology. The computer modeling and simulations
were also referred as computational experimentations. The
accuracy of such Computational nano-technology based
experiment generally depends on the accuracy of the following
things: Intermolecular interaction, Numerical models and
Simulation schemes used. The essence of nanotechnology is
therefore size and control because of the diversity of
applications the plural term nanotechnology is preferred by
some nevertheless they all share the common feature of control
at the nanometer scale the latter focusing on the observation
and study of phenomena at the nanometer scale. In this paper,
a brief study of Computer-Simulation techniques as well as
some Experimental result
Solar cell absorber Kesterite- type Cu2ZnSnS4 (CZTS) thin films have been prepared by Chemical Bath Deposition (CBD). UV–vis absorption spectra measurement indicated that the band gap of as-synthesized CZTS was about1.68 eV, which was near the optimum value for photovoltaic solar conversion in a single-band-gap device. The polycrystalline CZTS thin films with kieserite crystal structure have been obtained by XRD. The average of crystalline size of CZTS is 27 nm
Multilevel inverters play a crucial part in the
areas of high and medium voltage applications. Among the three
main multilevel inverters used, the capacitor clamped multilevel
inverter(CCMLI) has advantage with respect to voltage
redundancies. This work proposes a switching pattern to improve
the performance of chosen H-bridge type CCMLI over
conventional CCMLI. The PWM technique used in this work is
Phase Opposition Disposition PWM(PODPWM). The
performance of proposed H-bridge type CCMLI is verified
through MATLAB-Simulink based simulation. It has been
observed that the THD is low in chosen CCMLI compared to
conventional CCMLI.
- In this paper, we introduce a practical mechanism of
compressing a binary phase code modulation (BPCM) signal
according to Barker code with 13 chips in presence of additive
white Gaussian noise (AWGN) by using a digital matched filter
(DMF) corresponding to time domain convolution algorithm of
input and reference signals using Cyclone II EP2C70F896C6
FPGA from ALTERA placed on education and development
board DE2-70 with the following parameters: frequency of
BPCM signal fIF=2 MHz, sampling frequency
f MHz SAM 50
,pulse period
T 200s
, pulse width
S 13sc
, chip width
CH 1sc
, compressing factor
KCOM 13
, SNRinp=1/1, 1/2, 1/3, 1/4, 1/5 and processing
gain factor SNRout/SNRinp=11.14 dB.
The results of filter operation are evaluated using a digital
oscilloscope GDS-1052U to display the input and output signals
for different SNRinp.
Flooding is one of the most devastating natural
disasters in Nigeria. The impact of flooding on human activities
cannot be overemphasized. It can threaten human lives, their
property, environment and the economy. Different techniques
exist to manage and analyze the impact of flooding. Some of these
techniques have not been effective in management of flood
disaster. Remote sensing technique presents itself as an effective
and efficient means of managing flood disaster. In this study,
SPOT-10 image was used to perform land cover/ land use
classification of the study area. Advanced Space borne Thermal
Emission and Reflection Radiometer (ASTER) image of 2010 was
used to generate the Digital Elevation Model (DEM). The image
focal statistics were generated using the Spatial Analyst/
Neighborhood/Focal Statistics Tool in ArcMap. The contour map
was produced using the Spatial Analyst/ Surface/ Contour Tools.
The DEM generated from the focal statistics was reclassified into
different risk levels based on variation of elevation values. The
depression in the DEM was filled and used to create the flow
direction map. The flow accumulation map was produced using
the flow direction data as input image. The stream network and
watershed were equally generated and the stream vectorized. The
reclassified DEM, stream network and vectorized land cover
classes were integrated and used to analyze the impact of flood on
the classes. The result shows that 27.86% of the area studied will
be affected at very high risk flood level, 35.63% at high risk,
17.90% at moderate risk, 10.72% at low risk, and 7.89% at no
risk flood level. Built up area class will be mostly affected at very
high risk flood level while farmland will be affected at high risk
flood level. Oshoro, Imhekpeme, and Weppa communities will be
affected at very high risk flood inundation while Ivighe, Uneme,
Igoide and Iviari communities will be at risk at high risk flood
inundation level. It is recommended among others that buildings
that fall within the “Very High Risk” area should be identified
and occupants possibly relocated to other areas such as the “No
Risk” area.
Without water, humans cannot live. Since time began,
we have lived by the water and vast tracts of waterless land have
been abandoned as it is too difficult to inhabit. At any given
moment, the earth’s atmosphere contains 4,000 cubic miles of
water, which is just 0.000012% of the 344 million cubic miles of
water on earth. Nature maintains this ratio via evaporation and
condensation, irrespective of the activities of man.
There is a certain need for an alternative to solve the water
scarcity. Obtaining water from the atmosphere is nothing new -
since the beginning of time, nature’s continuous hydrologic cycle
of evaporation and condensation in the form of rain or snow has
been the sole source and means of regenerating wholesome water
for all forms of life on earth.
An effective method to generate water is by the separation of
moisture present in air by condensation. In this study, the water
present in air is condensed on the surface of a container and then
collected in an external jacket provided on the container.
Insulations are provided to optimize the inner temperature of the
container.
The method is although uncommon but has certain advantages
which make it a success. The process is economical and does not
require a lot of utilities. It also helps in further reducing the
carbon footprint.
In every moment of functioning the Li-Ion
battery must provide the power required by the user, to have a
long operating life and to and to provide high reliability in
operation. The methods for analysis and testing batteries are
ensuring that all these conditions imposed to the batteries are
met by being tested depending on their intended use.
The success rate of real estate project is
decreasing as there is large scale of project and participation of
entities. It is necessary to study the risk factors involved in the
project. This paper focused on types of risks involved in the
project, risk factors, risk management tools & techniques.
Identification of risk of the project in terms of the total cost of the
project has been divided under Technical, Financial, Sociopolitical
and Statutory cost centers. Large real estate projects
have to tackle the following issues: land acquisition, skilledlabour
shortage, non-availability of skilled project managers, and
mechanization of the construction process to cater to the growing
demands. Non- availability of supporting infrastructure, political
issues like instability of the government leading to regulatory
issues, social issues, marketing forms an important part in these
projects as this is a onetime investment and the purchase cycle is
long , long development period makes the same project be at
different points in the real estate value cycle.
- In the present scenario carbon emission and sand
mining are major concern due to its hazardous effect to
environment and making serious imbalance to the ecosystem.
Various studies have been conducted to reduce severe effect on
environment, using byproducts like copper slag as partial
replacement of fine aggregate. Different researchers have also
revealed numerous uses of copper slag as a replacing agent in
determining the strength of concrete. A comprehensive review of
studies has been presented in this paper for scope of replacement
of fine aggregate from copper slag in concrete
- Security is a concept similar to being cautious
or alert against any danger. Network security is the condition of
being protected against any danger or loss. Thus safety plays a
important role in bank transactions where disclosure of any data
results in big loss. We can define networking as the combination
of two or more computers for the purpose of resource sharing.
Resources here include files, database, emails etc. It is the
protection of these resources from unauthorized users that
brought the development of network security. It is a measure
incorporated to protect data during their transmission and also
to ensure the transmitted is protected and authentic.
Security of online bank transactions here has been
improved by increasing the number of bits while establishing the
SSL connection as well as in RSA asymmetric key encryption
along with SHA1 used for digital signature to authenticate the
user
Background: Septoplasty is a common surgical
procedure performed by otolaryngologists for the correction of
deviated nasal septum. This surgery may be associated with
numerous complications. To minimize these complications,
otolaryngologists frequently pack both nasal cavities with
different types of nasal packing. Despite all its advantages,
nasal packing is also associated with some disadvantages. To
avoid these issues, many surgeons use suturing techniques to
obviate the need for packing after surgery.
Objective: To determine the efficacy and safety of trans-septal
suture technique in preventing complications and decreasing
morbidity after septoplasty in comparison with nasal packing.
Patients and methods: Prospective comparative study. This
study was conducted in the department of Otolaryngology -
Head and Neck Surgery, Rizgary Teaching Hospital - Erbil,
from the 6th of May 2014 to the 30th of November 2014.
A total of 60 patients aged 18-45 years, undergoing septoplasty,
were included in the study. Before surgery, patients were
randomly divided into two equal groups. Group (A) with transseptal
suture technique was compared with group (B) in which
nasal packing with Merocel was done. Postoperative morbidity
in terms of pain, bleeding, postnasal drip, sleep disturbance,
dysphagia, headache and epiphora along with postoperative
complications including septal hematoma, septal perforation,
crustation and synechiae formation were assessed over a follow
up period of four weeks.
Results: Out of 60 patients, 37 patients were males (61.7%)
and 23 patients were females (38.3%). Patients with nasal
packing had significantly more postoperative pain (P<0.05)><0.05). There was no significant difference between
the two groups with respect to nasal bleeding, septal
hematoma, septal perforation, crustation and synechiae
formation.
Conclusion: Septoplasty can be safely performed using transseptal
suturing technique without nasal packing.
The basic reason behind the need to
monitor water quality is to verify whether the examined
water quality is suitable for intended usage or not. This
study is conducted on Al -Shamiya al- sharqi drain in
Diwaniya city in Iraq to make valid assessment for the
level of parameters measured and to realize their effects
on irrigation. In order to assess the drainage water
quality for irrigation purposes with a high accuracy, the
Irrigation Water Quality Index (IWQI) will be examined
and upgraded (integrated with GIS) to make a
classification for drainage water. For this purpose, ten
samples of drainage water were taken from different ten
location of the stuay area. The collected samples were
analyzed chemically for different elements which affect
water quality for irrigation.These elements are :
Calcium(Ca+2), Sodium(Na+
), Magnesium(Mg+2),
Chloride( ), Potassium(K+
), Bicarbonate(HCO3),
Nitrate(NO3), Sulfate( , Phosphate( , Electrical
Conductivity(EC), Total Dissolved Solids (TDS), Total
Suspended Solids (TSS) and pH-values (PH). Sodium
Adsorption Ratio (SAR) and Sodium Content (Na%)
have been also calculated. Results suggest that, the use of
GIS and Water Quality Index (WQI) methods could
provide an extremely interesting as well as efficient tool
to water resource management. The results analysis of
(IWQI) maps confirms that: 52% of the drainage water
in study area falls within the "Low restriction" (LR) and
47%of study area has water with (Moderate
restriction)(MR),While 1% of drainage water in the
study area classified as (Sever restriction) (SR). So, the
drainage water should be used with the soil having high
permeability with some constraints imposed on types of
plant for specified tolerance of salts
The cable-hoisting method and rail cable-lifting
method are widely used in the construction of suspension bridge.
This paper takes a suspension bridge in Hunan as an example,
and expounds the two construction methods, and analyzes their
respective merits and disadvantages.
Baylis-Hillman reaction has been achieved on
different organic motifs but with completion times of three to
six days. Micellar medium of CTAB in water along with the
organic base DABCO has been used to effect the BaylisHillman
reaction on a steroidal nucleus of Withaferin-A for the
first time with different aromatic aldehydes within a day to
synthesize a library of BH adducts (W1a –W14a) and (W1bW14b)
as a mixture of two isomers and W15 as a single
compound. The isomers were separated on column and the
major components were chosen for bio-evaluation. Cytotoxic
activity of the synthesized compounds was screened against a
panel of four cancer cell lines Lung A-549, Breast MCF-7,
Colon HCT-116 and Leukemia THP-1 along with 5-florouracil
and Mitomycin-C as references. All the compounds exhibited
promising activity against screened cell lines and were found to
possess enhaunced activity than parent compound. BH adducts
with aromatic systems having methoxy and nitro groups were
found to be more active.
This paper presents the details on the
experimental investigation carried out to get the desired fresh
properties of the SCC. Tests were performed on various mixtures
to obtain the required SCC. In the present research work we
have replaced 15% of cement with class F fly ash. By varying the
quantity of water and sand the mortar mix was prepared. Later
varying percentage of coarse aggregate was added to the mortar
to obtain the desired SCC.
The batteries used in electric and hybrid vehicles
consists of several cells with voltages between 3.6V battery and
4.2 V in series or parallel combinations of configurations for
obtaining the necessary available voltages in the operation of a
hybrid electric vehicle. How malfunction of a single cell affects
the behavior of the entire battery pack, BMS main function is to
protect individual cells against over-discharge, overload or
overheating. This is done by correct balancing of the cells. In
addition BMS estimates the battery charge status
This project aims at using (PD-MCPWM) Phase
disposition multi carrier pulse width modulation technique to
reduce leakage current in a transformerless cascaded multilevel
inverter for PV systems. Advantages of transformerless PV
inverter topology is as follows, simple structure, low weight and
provides higher efficiency , but however this topology provides a
path for the leakage current to flow through the parasitic
capacitance formed between the PV module and the ground.
Modulation technique reduces leakage current with an added
advantage without adding any extra components.
More from International Journal of Technical Research & Application (20)
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4
A SURVEY ON CAPTCHA TECHNIQUE BASED ON DRAG AND DROP MOUSE ACTION
1. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 188-189
188 | P a g e
A SURVEY ON CAPTCHA TECHNIQUE BASED
ON DRAG AND DROP MOUSE ACTION
Samruddhi D. Bhalani, Shailendra Mishra
Computer Science & Engineering Department
Parul Institute of Technology(PIT)
Limda, India
samruddhibhalani21@gmail.com, shailendrabemtech@gmail.com
Abstract—CAPTCHA, Completely Automated Public
Turning Test to tell Computers and Humans Apart, it is a one
type of test. CAPTCHA is standard internet security they
protect online emails and services from being abused by
malicious computer program or BOT. CAPTCHA is a one type
of test program that protects websites from BOTs on web by
generating tests that computer cannot pass but human can
easily pass. For web security we are using different type of
CAPTCHA. In this paper describe different type of
CAPTCHA technique based on drag and drop mouse action
because drag and drop mouse action is performed by human
not by BOT. This paper is deal with survey and comparison of
different technique of CAPTCHA.
Keywords— BOT, CAPTCHA, DDIM CAPTCHA, DnD
CAPTCHA, Drag and Drop, Human, Third-party human
attack.
I. INTRODUCTION
CAPTCHA stands for Completely Automated Public
Turning Test to tell Computers and Humans Apart [5]. It is
a one type test that describes which is human or BOT. Now
a day’s CAPTHCA is internet standard security to secure
and protect online emails and services. A CAPTCHA is a
test but form of Turing Test that distinguishes human users
and computer BOTs automatically. The test is develop
according to that human users can answer any questions or
challenges easily, but computer-program based imitators
face considerably greater difficulty. The quality or
correctness of a response from considering, a judge
computer can decide whether the tested user is a human or a
current computer program. There are so many type of
CAPTCHA technique based on drag and drop mouse action.
This paper is organized as follow. In section II, we
describe different technique of image based CAPTCHA. In
section III, we describe comparative analysis of different
technique of CAPTCHA. In section IV, represents
conclusion and future work.
II. DIFFERENT TECHNIQUE OF IMAGE BASED
CAPTCHA
A. DnD CAPTCHA [3]
‘DnD CAPTCHA’ or ‘Drag and Drop CAPTCHA’ is
comprehensive explanation against optical character
recognize (OCR) and laundry attacks [3]. Presents the DnD
CAPTCHA technique to differentiate between human and
computers whether uses mouse actions. Here Dragging and
Dropping familiar action of mouse is uses for items drag and
drop in to their specific region according to given CPTCHA.
User can not any type of typing on text box for CAPTCHA
test but in reverse user has to just simple drag and drop
character blocks in to their various blank blocks [3]. Follow
in the figure 1 the DnD CAPTCHA image.
Fig. 1. DnD CAPTCHA[3]
DnD CAPTCHA challenge uses ordinary mouse events
to see human interference proof. In this DnD CAPTCHA
BOT or malicious computer program knows the key of test
but it can not fully pass this DnD CAPTCHA test without
human interference.
B. DDIM CAPTCHA[1]
DDIM stands for Drag-n-Drop Interactive Masking
CAPTCHA [1]. This DDIM CAPTCHA deal with both the
traditional attacks and the third-party human attack.
In DDIM CAPTCHA user collaborate with the system to
find the confirmed answers. The main purpose to design this
CAPTCHA technique is protection against the third-party
human attacks and forces the users do some interactions
with real CAPTCHA system, because computer can not
performed interaction automatically. They can give principle
like Hiding mechanism and interaction and other principles
for designing a CAPTCHA to resist the third-party human
attacks. Candidate region have many layer like two or three.
Candidate region is dividing into several invisible blocks
and each block will accommodate a range of numbers of
candidates [1].
The DDIM CAPTCHA maintains the basic prerequisites
of CAPTCHA and with added interaction and masking
properties to the traditional text-based scheme. Following
figure 2 is DDIM CAPTCHA.
Fig. 2. DDIM CAPTCHA[1]
2. International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 3, Issue 2 (Mar-Apr 2015), PP. 188-189
189 | P a g e
C. Internet poll MosaHIP[2]
In internet polls are deploy in many websites for
collecting information about several topics. So, in this type
of websites to stopping automatic voting, cookie-based, and
securing internet polls they develop Internet poll MosaHIP
CAPTCHA [2].
For internet polls, they have proposed two-phase
technique, and it is base on image based CAPTCHA. In this
CAPTCHA, users must only drag and drop his or her
desired choice on the area of mosaic picture containing the
images of footballs [2]. In added on this CAPTCHA have
TTS (text-To-Speech) system and that TTS system is
optional. Main advantages of TTS system is for children
who may unable to read CAPTCHA question. It called is
Visual CAPTCHA.
Fig. 3. Internet polls MosaHIP [2]
This CAPTCHA is protecting to automatic voting,
securing internet poll.
D. Drag and Drop Image CAPTCHA [4]
In this Drag and Drop Image CAPTCHA technique
developing aims to find legitimate users and at the same
time does not alienate them [4].
In this CAPTCHA user see CAPTCHA image of a
reasonable dimension and resolution. The user has to find to
small and simple embedded images (source image and target
image) from the shown composite image as asked in the
message appearing in the composite image itself [4].
Fig. 4. Drag and Drop Image CAPTCHA [4]
Drag source image and drop it over the target image that
work has been prove by user for proof of human
interference. Drag and Drop Image CAPTCHA is show in
figure 4.
III. COMPARATIVA ANAYSIS OF DIFFERENT TECHNIQUE
OF CAPTCHA
In this section describe comparison of different drag and
drop mouse action CAPTCHA techniques which we discuss
in section II.
TABLE I. COMPARISION OF DIFFERENT TECHNIQUE
Technique Advantages Limitation
DnD
CAPTCHA
Human can pass this
test easily and BOT or
computer program
can’t pass this test.
Third party
human attacks
can’t protect DnD
CAPTCHA.
DDIM
CAPTCHA
Addition of
interaction and
masking properties to
the traditional text-
based scheme on
DDIM CAPTCHA.
And high scalability.
Test is confusing
and hard to solve.
Internet polls
MosaHIP
It can be used by all
ages and Also visual
impaired people using
visual CAPTCHA
option. The method
can considered
resistant and robust
due to having high
level security and
strong CAPTCHA
properties.
Using dynamic IP
address people
connect to the
Internet.
Drag and Drop
Image
CAPTCHA
In database each
images are store in
different places with
encoded key within a
single database.
It takes more
time.
IV. CONCLUSION AND FUTURE WORK
In this paper, we have carried out drag and drop mouse
action’s different technique of CAPTCHA with their
advantage and limitation. Comparative analysis of different
CAPTCHA technique is also discus. In future we will carry
out new CAPTCHA that test is very easy for human but
impossible to pass for BOT.
ACKNOWLEDGMENT
Thanking to Dr. Shital Shah, principal of Parul Institute
of Technology, for this valuable knowledge and support and
guiding us to the right path. And at last but not least, grateful
towards my parents and friends who had supported a lot and
provided inspiration and motivate to go ahead.
REFERENCES
[1] Quan-bin Ye, Te-En Wei, Albert B. Jeng, Hahn-Ming Lee,
and Kuo-Ping Wu, “DDIM-CAPTCH: A Novel Drag-n-Drop
Interactive Masking CAPTCHA Against the Third Party
Human Attacks,” IEEE-2013.
[2] Shahriar Mohammadi and Hossein Abbasimehr, “A High
Level Security Mechanism for Internet Polls,” IEEE-2010.
[3] Arpan Desai, Pragnesh Patadia, “Drag and Drop: A Better
Approach to CAPTCHA,” IEEE, 2009.
[4] Prof. N. A. Shah and M. Tariq Banday, “Drag and Drop
Image CAPTCHA,” Sprouts-2008.
[5] Wei-Bin Lee, Che-Wei Fan ,Kevin Ho, Chyi-Ren Dow , and
"A CAPTCHA with Tips Related to Alphabets Upper or
Lower Case," in Seventh International Conference on
broadband,Communication, Wireless Computing and
Applications, 2012.