{"title":"Mitigating denial of service attack using CAPTCHA mechanism","authors":"Mahendra Mehra, Mayank Agarwal, R. Pawar, D. Shah","doi":"10.1145/1980022.1980086","DOIUrl":"https://doi.org/10.1145/1980022.1980086","url":null,"abstract":"Denial of Service (DoS henceforth) attack is performed solely with the intention to deny the legitimate users to access services. Since DoS attack is usually performed by means of bots, automated software. These bots send a large number of fake requests to the server which exceeds server buffer capacity which results in DoS attack. In this paper we propose an idea to prevent DoS attack on web-sites which ask for user credentials before it allows them to access resources. Our approach is based on CAPTCHA verification. We verify CAPTCHA submitted by user before allowing the access to credentials page. The CAPTCHA would consist of variety of patterns that would be distinct in nature and are randomly generated during each visit to the webpage. Most of the current web sites use a common methodology to generate all its CAPTCHAs. The bots usually take advantage of this approach since bots are able to decipher those CAPTCHAs. A set of distinct CAPTCHA patterns prevents bots to decipher it and consequently helps to reduce the generation of illicit traffic. This preserves the server bandwidth to allow the legitimate users to access the site.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"122 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131913258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of handwritten document pre-processing techniques and customizing for Indic script","authors":"V. Hole, L. Ragha","doi":"10.1145/1980022.1980065","DOIUrl":"https://doi.org/10.1145/1980022.1980065","url":null,"abstract":"Preprocessing of document image is a very important step to handle the deformations namely noise, different handwriting complexities that may result in base line skew, word skew, character skew, accents may be cited either above or below the text line and parts of neighboring text lines may be connected, etc. The paper proposes a novel preprocessing technique for handwritten document to handle some of the deformations usually present in the document like touching components, overlapping components, skewed lines, words with individual skews etc. and build a proper text image with all these deformations removed.\u0000 Based on the analysis of Indian script character shapes and literature survey, it proposes a new sequence of preprocessing methods. A binarized image is sub-sampled and connected components are extracted. These components are dilated and thinned and is given to Hough transform for both global skew and local skew detection for line extraction. The word segmentation is done with the computation of the distances of adjacent components in the text line image and classification of the previously computed distances as either inter-word gaps or inter-character gaps. The extracted words can be used for producing properly aligned text image or for text conversion using OCR.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132248603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Precise positioning using gps for category-III aircraft operations using smoothed pseudorange measurements","authors":"S. Agarwal, H. Hablani","doi":"10.1145/1980022.1980205","DOIUrl":"https://doi.org/10.1145/1980022.1980205","url":null,"abstract":"Currently, standard single frequency Global Positioning System (GPS) receivers provide a positioning accuracy of approximately 4--20 m. This precision can be further enhanced with dual frequency receivers which are able to provide accuracy around 1--12 m. However, these errors are quite large when it comes to safety of life applications such as aircraft landings. Differential GPS (D-GPS) allows for precise positioning using information from reference stations on the ground. Carrier phase tracking is one such D-GPS approach which allows range determination with centimeter level accuracy. However, carrier phase measurements require estimation of unknown fixed integer ambiguities before the receiver can start determining its position. Using single difference smoothed pseudorange measurements the integer ambiguities can be estimated with reasonable accuracy. This methodology brings the position error down to centimeter level which can meet the Federal Aviation Authority (FAA) regulations for Category-III (CAT-III) precision approaches. This paper examines single differenced smoothed pseudorange measurements for integer ambiguity resolution for precise positioning using carrier phase tracking. Simulation of GPS receiver performance using this methodology has been carried out and demonstrates positioning with centimeter level accuracy for the approach phase of flight. Positioning errors are also compared for dual frequency and carrier phase tracking modes.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130335922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Receiver based capacity enhancement with cross-layer design approach for IEEE 802.11 ad-hoc networks","authors":"Satish Y. Ket, R. Awale","doi":"10.1145/1980022.1980197","DOIUrl":"https://doi.org/10.1145/1980022.1980197","url":null,"abstract":"The performance of IEEE 802.11 with different network densities and protocol configurations is of interest, particularly in distributed coordination function (DCF) mode. A mathematical model for one hop network IEEE 802.11 protocol was introduced by Bianchi [2] to analytically derive the saturated throughput. Our ultimate goal is to enhance the capacity of Ad-hoc network closer to the analytical values of this model. As an attempt, we propose the Receiver Based Capacity Enhancement Algorithm using Cross-Layer Design Approach (RCECLD) by dynamically adapting the data rate. It uses Signal-to-Noise Ratio (SNR) values calculated by Physical layer and exported to Medium Access Control (MAC) layer via the cross-layer interface to estimate the prevailing channel state. In RCECLD the receiver decides the transmission data rate by calculating the SNR value of received RTS (Ready-to-Send), which is in turn an estimate of the prevailing channel state, and piggybacking it through CTS (Clear-to-Send) to the transmitter. Accordingly transmitter transmits the data frame with adopted data rate.\u0000 The capacity of the Ad-hoc network is enhanced with RCECLD. It is investigated through an extensive set of simulations. The results indicate that the enhancement is very close to analytical values for smaller network size and it is about 2.5 times more than Auto-Rate Fallback (ARF) [8], in spite of fading and mobility effects.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"232 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113999780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An intelligent traffic control for MPEG video over Bluetooth using fuzzy controllers","authors":"P. Thakare, S. Sawarkar","doi":"10.1145/1980022.1980180","DOIUrl":"https://doi.org/10.1145/1980022.1980180","url":null,"abstract":"In a Bluetooth network, transmission rate is unpredictable due to interferences by other wireless devices or general Bluetooth channel noises and presents long delay and excessive data loss, due to variations in bit rate. It is therefore almost impossible to transmit MPEG VBR video over a Bluetooth channel, without data loss, excessive time delay or image quality degradation. This paper presents an integrated Neuro-Fuzzy scheme and a Rule-Based-Fuzzy scheme applications to Moving Picture Expert Group video transmission in Bluetooth. In this work, a traffic-shaping buffer is introduced before the Host Controller Interface (HCI) of the Bluetooth protocol stack. The computer simulation results show that the application of the proposed scheme reduces excessive time delay and data loss at the HCI, as compared with a conventional video transmission in Bluetooth.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114425192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Vinay, Abhinav Prakash, D. Kumar, K. Nagabhushan, T. Anitha
{"title":"A novel and optimal video replication technique for video-on-demand systems","authors":"A. Vinay, Abhinav Prakash, D. Kumar, K. Nagabhushan, T. Anitha","doi":"10.1145/1980022.1980098","DOIUrl":"https://doi.org/10.1145/1980022.1980098","url":null,"abstract":"With the advances in Information, Networking and Communication technologies, the Multimedia services are gaining high popularity. Especially applications like Video-On-Demand (VoD) systems are becoming inherently popular. VoD is a data-intensive application because clients frequently retrieve data stored on high end servers. As the numbers of users are exponentially growing from thousands to millions severing such large request is a great challenge to the multimedia companies. Hence VoD service providers are intensely interested in high QoS services to users by using efficient algorithms or strategies or architectures. Numerous solutions in terms of algorithms or architectures are available to reduce response times. Among these an efficient techniques for replication, storage and retrieval/streaming has attracted much attention from researchers due to its effectiveness and low cost. This paper focuses on proposing an optimal video replication, storage and retrieval strategies for VoD systems.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123284894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Bansode, V. Kaul, P. Nemade, M. Yadav, Swati Singh, Ashutosh Singh
{"title":"Network traffic monitoring using protocol analysis tool to achieve QoS","authors":"S. Bansode, V. Kaul, P. Nemade, M. Yadav, Swati Singh, Ashutosh Singh","doi":"10.1145/1980022.1980374","DOIUrl":"https://doi.org/10.1145/1980022.1980374","url":null,"abstract":"Communication networks are all about providing means to communicate that is for (exchanging the user information). The user information can be viewed as user traffic akin to the traffic on the road that moves across the road network. The fastest growth of data communication Networks over the past decades has resulted in the development of sophisticated tools to diagnose, debug and analyze such networks. We have developed a toolkit called MENeT (Monitor for Ethernet Network Traffic). The toolkit is an extension to the earlier developed utility for Traffic Monitoring. The toolkit is operational on the platform of windows NT/2000 and is developed by programming in Microsoft Visual C++ environment. The MENeT captures and dissembles the packets flowing through a system and extracts TCP/IP (Transmission Control Protocol/Internet Protocol) packets only. MENeT monitors network traffic by partitioning it into a set of classes. The set of classes are defined as Network Traffic, Broadcast Traffic and Workstation Traffic. It measures traffic at a time scale ranging from a few seconds to several minutes. Using the fine-grained information that MENeT exports, proves its effectiveness for monitoring and protocol analysis. The work on presenting the statistics to portray the Network Traffic from every angle is in place.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123500884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless data assistance in real time environment using DSP processor","authors":"D. C. Shah, U. Dalal","doi":"10.1145/1980022.1980207","DOIUrl":"https://doi.org/10.1145/1980022.1980207","url":null,"abstract":"This paper presents a wireless solution for data acquisition working in real time environment using DSP processor TMS320F2812. The design presented gives multi edge benefits of signal processing besides employing wireless medium for remote transmission of acquired data in highly secured medium. Cypress made Radio Frequency transceiver CYWUSB6935 using Direct Sequence Spread Spectrum (DSSS) modulation interfaced with DSP processor using Serial Peripheral Interface (SPI). The design represents extended External Interface (XINTF) of the DSP processor by means of programming CPLD XCR3256. It is a solution for process industries where continuous monitoring of diverse process parameters fritter away many man power hours. The data is available to the monitoring computer on one press of button without laying long cables in maladroit industry environment. This leads towards automation and cost saving solution for industries. It can be modified to handle very low sampling rate creating database of long time as well as to the real time alarm generation system. The design can be enhanced for various applications like remote security system, RF counting of inventory, traffic monitoring system, weather control system and many more.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123064688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Characterization of optically controlled ion implanted in1-gaxas MESFET with buried gate","authors":"B. K. Mishra, Lochan Jolly, S. C. Patil","doi":"10.1145/1980022.1980264","DOIUrl":"https://doi.org/10.1145/1980022.1980264","url":null,"abstract":"Optoelectronic is one of the thrust areas for the recent research activity. One of the key components of the optoelectronic family is photo detector to be widely used in broadband communication, optical computing, optical transformer, optical control etc. Present paper includes the investigation carried on the basis of the mathematical modeling of InGaAs-MESFET with buried gate dark and the illuminated condition. Device is assumed to have the Gaussian doping profile. Investigation shows d. c. I-V characteristic can be influenced greatly in presence of illumination. It also shows that the drain conduction and the transconductance are also the function of optical power. Result shows that the device has better performance than the front gate. Present device is expected to emerge for the potential application such as optical demodulators for optical communication, optical switch, optical transducer, etc. with enhance performance with respect to the top gate MESFET.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123507795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vector quantization using global codebook technique","authors":"H. B. Kekre, T. Sarode, K. Raut, R. Tahiliani","doi":"10.1145/1980022.1980032","DOIUrl":"https://doi.org/10.1145/1980022.1980032","url":null,"abstract":"Vector Quantization is a technique of compressing data based on grouping blocks having similar data. These blocks are called Code Vectors and all the code vectors grouped together is called a Codebook. The key to VQ data compression is a good codebook. In order to reduce bandwidth overhead it is necessary to generate Global Codebook for a particular class of images. Otherwise local codebook has to be transferred every time before the transmission of image. In this paper various global codebook generation algorithms for vector quantization for color images are presented.","PeriodicalId":197580,"journal":{"name":"International Conference & Workshop on Emerging Trends in Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121559611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}