Sie sind auf Seite 1von 7

SWAMI KESHVANAND INSTITUTE OF TECHNOLOGY,

MANAGEMENT & GRAMOTHAN, JAIPUR

CERTIFICATE

I hereby declare that the work, which is being presented in the Seminar Report, entitled
“Seminar” in partial fulfillment for the award of Degree of “Bachelor of Technology” in Department
of Computer Science & Engineering with Specialization in Computer Engineering, and submitted to
the Department of Computer Science & Engineering, Swami Keshvanand Institute of
Technology, Management & Gramothan, Jaipur, Rajasthan Technical University is a record of my
own investigations carried under the Guidance of Mr. Pankaj Dadheech, Associate Professor,
Department of Computer Science & Engineering, Swami Keshvanand Institute of Technology,
Management & Gramothan, Jaipur.

..................................
(Kanak Giri)
B.Tech. (Computer Science & Engineering)
Roll No: 14ESKCS014
Swami Keshvanand Institute of Technology, Management & Gramothan, Jaipur

Counter Signed by
Name of Supervisor

..................................
Mr. Pankaj Dadheech
Associate Professor, Department of Computer Science & Engineering
Swami Keshvanand Institute of Technology, Management & Gramothan, Jaipur

i
ACKNOWLEDGMENT

I feel immense pleasure in expressing my regards to the Chairman Mr. Surja Ram Meel,
Director Mr. Jaipal Meel, Registrar Mrs. Rachana Meel, Director (Academics) Prof. (Dr.) S. L.
Surana, Principal & Director (D&W) Prof. (Dr.) S. K. Calla Swami Keshvanand Institute of
Technology, Management & Gramothan, Jaipur for providing me necessary facilities during the various
stages of this work.

I would like to thank Dr. C. M. Choudhary, Professor & Head, Department of Computer
Science & Engineering and Dr. Anil Chaudhary, Professor & Head, Department of Information
Technology for provide me opportunity to work in consistent direction and providing their valuable
suggestions to improve Seminar Report.

I would like to thank my esteemed guide Associate Professor Mr. Pankaj Dadheech,
Department of Computer Science & Engineering, Swami Keshvanand Institute of Technology,
Management & Gramothan, Jaipur for his valuable guidance, keen interest, constant encouragement,
incessant inspiration and continuous help throughout this work. Specially I acknowledge his support
when I was stuck and he is suggesting me new ideas to solve the problems. His vast experience and
realistic approach have been of great help to me. I am honored having Mr. Pankaj Dadheech as my
seminar report supervisor. His excellent guidance has been instrumental in making this work a success.

I would like to thank Associate Professor & M.Tech. Coordinator Mr. Mukesh Kumar Gupta,
Department of Computer Science & Engineering for his mailing support to me and my guide whenever
needed. I would like to thank Associate Professor Mr. M. K. Beniwal & Mr. Sunil Dhankhar, Swami
Keshvanand Institute of Technology, Management & Gramothan, Jaipur for their support during my
work and valuable suggestions to improve this work.

I would also like to express my thanks to my parents for their support and blessings. In addition,
a very special thanks to all my colleagues and friends for their support in the completion of this work.

Kanak Giri
B. Tech. (Computer Science & Engineering)
Roll No: 14ESKCS014

ii
CONTENTS

Candidate’s Declaration i
Acknowledgment ii
Contents iii
Abbreviations and Acronyms v
List of Tables vii
List of Figures viii
Abstract 1

1. INTRODUCTION 2-4
1.1 Cyber Crime.......................................................................................................2
1.2 Intellectual Property Right Acts.........................................................................2
1.3 Copyright Acts...................................................................................................3
1.4 Outline of the Chapters......................................................................................4

2. CYBER CRIME 5-13


2.1 Cyber Crime in India.........................................................................................5
2.2 Cyber Crime in USA..........................................................................................7
2.2.1 Color ….................................................................................................7
2.2.2 Texture …..............................................................................................8
2.3 Cyber Crime in European Union.....................................................................13
3. INTELLECTUAL PROPERTY RIGHT ACTS 14-35
3.1 Introduction to IPR Act....................................................................................14
3.1.1 Algorithm …........................................................................................29
3.1.2 Color Extraction ……..........................................................................30
3.2 Edge Histogram...............................................................................................33
4. COPYRIGHT ACTS 36-38
4.1 Copyright Acts.................................................................................................36
4.2 Publishing the Material on the Web.................................................................36
5. CONCLUSION 49
5.1 Conclusion.......................................................................................................49

REFERENCES 50-54

iii
ABBREVIATIONS AND ACRONYMS

ARP Address Resolution Protocol


ASP Application Service Providers
CMP Chip Multiprocessor
CONDOR A general-purposed distributed computing platform
CORBA Common Object Request Broker Architecture
DDD Data Display Debugger
DHCP Dynamic Host Configuration Protocol
FCAP Fault management, Configuration, Accounting, Performance, and Security
HA High Availability
HA-OSCAR High Availability OSCAR
HPC High Performance Computing
ITU International Telecommunication Union
LAM Local Area Multicomputer
LINDA A Date-driven Coordination Language
LUI Resource-Based Cluster Installation Tool
MOSIX Multicomputer Operating System for Unix
MPE Multi Processing Environment
MPI Message Passing Interface
MPICH Message Passing Interface Chameleon
NFS Network File System
NQS Network Queuing System
NTP Network Time Protocol
NUMA Non Uniform Memory Access
OCG Open Cluster Group
OSCAR Open Source Clustering and Application Resources
PBS Portable Batch System
PVFS Parallel Virtual File System
PVM Parallel Virtual Machine
RSH Remote Shell
SGE Sun Grid Engine

iv
SIS System Installation Suite
SNMP Simple Network Management Protocol
SOAP Simple Object Access Protocol, an XML-based protocol for the exchange
of information
SPRNG Scalable Parallel Random Number Generators
SSH Secure Shell
SSI Single System Image
TFTP Trivial File Transfer Protocol
Thin-OSCAR A diskless OSCAR version
UMA Uniform Memory Access
VLAN Virtual LAN
VMI Virtual Machine Interface
VoIP Voice over IP

v
LIST OF TABLES

S. No. Table No. Description Page No.


1. Table 1.1 An overview of image signature formulation.....................5
2. Table 1.2 CBIR Process.....................................................................6
3. Table 1.3 IMAGINGMSE..................................................................8
4. Table 3.1 Algorithm to convert RGB to HSV color space.................8
5. Table 3.2 Color Space Descriptors ……………………….……...…44
6. Table 3.3 Computing the Edge Histogram descriptor..................... 45
7. Table 3.4 Filter for Edge Detection.........................……………….45
8. Table 3.5 First level decomposition of image through DWT..…….45
9. Table 3.6 Flowchart for Feature Calculation...........……………….45
10. Table 3.7 Flowchart for Meta Search based on contents.....……….45
11. Table 4.1 The image dataset....................................……………….45
12. Table 4.2 MATLAB Data Files storing the feature values.................8
13. Table 4.3 Browse window for query image.......................................8
14. Table 4.4 Sample Query Image 1 for simulation performance analysis 8
15. Table 4.5 Search Result only for Color Histogram for Query Image 1 8

vi
LIST OF FIGURES

S. No. Fig No. Description Page No.


1. Fig 1.1 An overview of image signature formulation.....................5
2. Fig 1.2 CBIR Process.....................................................................6
3. Fig 1.3 IMAGINGMSE..................................................................8
4. Fig 3.1 Algorithm to convert RGB to HSV color space.................8
5. Fig 3.2 Color Space Descriptors ……………………….……...…44
6. Fig 3.3 Computing the Edge Histogram descriptor..................... 45
7. Fig 3.4 Filter for Edge Detection.........................……………….45
8. Fig 3.5 First level decomposition of image through DWT..…….45
9. Fig 3.6 Flowchart for Feature Calculation...........……………….45
10. Fig 3.7 Flowchart for Meta Search based on contents.....……….45
11. Fig 4.1 The image dataset....................................……………….45
12. Fig 4.2 MATLAB Data Files storing the feature values.................8
13. Fig 4.3 Browse window for query image.......................................8
14. Fig 4.4 Sample Query Image 1 for simulation performance analysis 8
15. Fig 4.5 Search Result only for Color Histogram for Query Image 1 8
16. Fig 4.6 Image versus parametric distance plot for color histogram8
17. Fig 4.7 Search Result only for Edge Histogram for Query Image 18
18. Fig 4.8 Image versus parametric distance plot for edge histogram 8
19. Fig 4.9 Search Result for Relative Smoothness for Query Image 18
20. Fig 4.10 Image versus parametric distance plot for relative smoothness
21. Fig 4.11 Search Result only for Dominant Color for Query Image 18
22. Fig 4.12 Image versus parametric distance plot for dominant color 8
23. Fig 4.13 Search Result only for Combined Features for Query Image 18
24. Fig 4.14 Image versus parametric distance plot for combined features 8
25. Fig 4.15 Search Result only for Combined Features for Query Image 18
26. Fig 4.16 Image versus parametric distance.......................................8

vii

Das könnte Ihnen auch gefallen