Sie sind auf Seite 1von 2

C-inSoftwares

Cellular Client Controller:


This software is used to control the working of a computer using mobiles. It contains mainly mobile phones and computers. A GSM modem, which is connected to an admin system and a mobile, will be handled by the user. This system is implemented in many organizations to control computers using mobiles

Content Based Image Retrieval


Content-based image retrieval (CBIR), also known as query by image content (QBIC) and content-based visual information retrieval (CBVIR) is the application of computer vision techniques to the image retrieval problem, that is, the problem of searching for digital images in large databases.

Modeling and Detection of Camouflaging Worm


Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation, and thus, pose great challenges to defend against them. In this paper, we investigate a new class of active worms, referred to as Camouflaging Worm (C-Worm in short). The C-Worm is different from traditional worms because of its ability to intelligently manipulate its scan traffic volume over time. Thereby, the C-Worm camouflages its propagation from existing worm detection systems based on analyzing the propagation traffic generated by worms. We analyze characteristics of the C-Worm and conduct a comprehensive comparison between its traffic and no worm traffic (background traffic). We observe that these two types of traffic are barely distinguishable in the time domain. However, their distinction is clear in the frequency domain, due to the recurring manipulative nature of the C-Worm. Motivated by our observations, we design a novel spectrum-based scheme to detect the C-Worm. Our scheme uses the Power Spectral Density (PSD) distribution of the scan traffic volume and its corresponding Spectral Flatness Measure (SFM) to distinguish the C-Worm traffic from background traffic. Using a comprehensive set of detection metrics and real-world traces as background traffic, we conduct extensive performance evaluations on our proposed spectrum-based detection scheme. The performance data clearly demonstrates that our scheme can effectively detect the C-Worm propagation. Furthermore, we show the generality of our spectrum-based scheme in effectively detecting not only the C-Worm, but traditional worms as well.

C-inSoftwares

Page 1

C-inSoftwares

Safe Driving Using Mobile Phones


As vehicle manufacturers continue to increase their emphasis on safety with advanced driver-assistance systems (ADASs), we propose a device that is not only already in abundance but portable enough as well to be one of the most effective multipurpose devices that are able to analyze and advise on safety conditions. Mobile smart phones today are equipped with numerous sensors that can help to aid in safety enhancements for drivers on the road. In this paper, we use the three-axis accelerometer of an Androidbased smart phone to record and analyze various driver behaviors and external road conditions that could potentially be hazardous to the health of the driver, the neighboring public, and the automobile. Effective use of these data can educate a potentially dangerous driver on how to safely and efficiently operate a vehicle. With real-time analysis and auditory alerts of these factors, we can increase a drivers overall awareness to maximize safety.

Location Based Services using Android Mobile Operating System


The motivation for every location based information system is: To assist with the exact information, at right place in real time with personalized setup and location sensitiveness. In this era we are dealing with palmtops and iPhones, which are going to replace the bulky desktops even for computational purposes. We have vast number of applications and usage where a person sitting in a roadside caf needs to get relevant data and information. Such needs can only be catered with the help of LBS. These applications include security related jobs, general survey regarding traffic patterns, decision based on vehicular information for validity of registration and license numbers etc. A very appealing application includes surveillance where instant information is needed to decide if the people being monitored are any real threat or an erroneous target. We have been able to create a number of different applications where we provide the user with information regarding a place he or she wants to visit. But these applications are limited to desktops only. We need to import them on mobile devices. We must ensure that a person when visiting places need not carry the travel guides with him. All the information must be available in his mobile device and also in user customized format.

C-inSoftwares

Page 2

Das könnte Ihnen auch gefallen