Sunteți pe pagina 1din 10

e Logger and online criminal justice system Offence Logger and online criminal justice system introduction :The

Criminal Justice System envisages information sharing within the organization and across the States in the country in the area of Crime & Criminals for effective working of Police. Effective coordination among different departments / entities in criminal justice system i.e. Forensic Science Laboratories and Prosecution Department is being ensured by interfacing for access and transfer of information between departments thus making it easier to collect inputs needed for proper and quicker investigation of a case

Integration of Sound Signature in Graphical Password Authentication System.pdf (Size: 268.47 KB / Downloads: 56) ABSTRACT Here a graphical password system with a supportive sound signature to increase the remembrance of the password is discussed. In proposed work a click-based graphical password scheme called Cued Click Points (CCP) is presented. In this system a password consists of sequence of some images in which user can select one click-point per image. In addition user is asked to select a sound signature corresponding to each click point this sound signature will be used to help the user in recalling the click point on an image. System showed very good Performance in terms of speed, accuracy, and ease of use. Users preferred CCP to Pass Points, saying that selecting and remembering only one point per image was easier and sound signature helps considerably in recalling the click points. Keywords: Sound signature, Authentication 1. Introduction Passwords are used for (a) Authentication (Establishes that the user is who they say they are). (b) Authorization (The process used to decide if the authenticated person is allowed to access specific information or functions) and Access Control (Restriction of access-includes authentication & authorization). Mostly user select password that is predictable. This happens with both graphical and text based passwords. Users tend to choose memorable password, unfortunately it means that the passwords tend to follow predictable patterns that are easier for attackers to guess. While the predictability problem can be solved by disallowing user choice and assigning passwords to users, this usually leads to usability issues since users cannot easily remember such random passwords. Number of graphical password systems have been developed, Study shows that text-based passwords suffers with both security and usability problems[1][8]. According to a recent news article, a security team at a company ran a network password cracker and within 30 seconds and they identified about 80% of the passwords [2]. It is well know that the human brain is better at recognizing and recalling images than text[3][7], graphical passwords exploit this human characteristic. 2. PREVIOUS WORK Considerable work has been done in this area,The best known of these systems are Passfaces [4][7]. Brostoff and Sasse (2000) carried out an empirical study of Passfaces, which illustrates well how a graphical password recognition system typically operates. Blonder-style passwords are based on cued recall. A user clicks on several previously chosen locations in a single image to log in. As implemented by Passlogix Corporation (Boroditsky, 2002), the user chooses several predefined regions in an image as his or her password. To log in the user has to click on the same regions. The problem with this scheme is that the number of predefined regions is small, perhaps a few dozens in a picture. The password may have to be up to 12 clicks for adequate security, again tedious for the user. Another problem of this system is the need for the predefined regions to be readily identifiable. In effect, this requires artificial, cartoon-like images rather than complex, real-world scenes[5][6]. Cued Click Points (CCP) is a proposed alternative to PassPoints. In CCP, users click one point on each of 5 images rather than on five points on one image. It offers cued-recall and introduces visual cues that instantly alert valid users if they have made a mistake when entering their latest click-point (at which point they can cancel their attempt and retry from the beginning). It also makes attacks based on hotspot analysis more challenging. As shown in Figure 1, each click results in showing a next-image, in effect leading

users down a path as they click on their sequence of points. A wrong click leads down an incorrect path, with an explicit indication of authentication failure only after the final click. Users can choose their images only to the extent that their click-point dictates the next image. If they dislike the resulting images, they could create a new password involving different click-points to get different images. 3. PROPOSED WORK In the proposed work we have integrated sound signature to help in recalling the password. No system has been devolved so far which uses sound signature in graphical password authentication. Study says that sound signature or tone can be used to recall facts like images, text etc[6]. In daily life we see various examples of recalling an object by the sound related to that object [6]. Our idea is inspired by this novel human ability.

E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM Synopsis: The goal of the E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM System is to improve the efficiency of the healthcare system by reducing the overall time and cost used to create documents and retrieve information. FEATURES: The main feature of E-Knowledge in Health Care system is to provide the browser to get appointments from a doctor through internet instead of going there and fixing an appointment. In Doctors side they can view their appointments and prescribe medicine for their patients. E-Knowledge in Health Care System maintains patients prescriptions so that their medical details are always available in Internet, which will be more convenient for the patients. This will be more comfortable for the patient.

IP BASED COHERENT FILE SYSTEM (IPCFS) IP BASED COHERENT FILE SYSTEM (IPCFS) In the case of a larger computer system inter connected through lan, wan or internet the data/storage manipulation is a major issue. The IPCFS is a flexible filesystem that can be used for creating a larger space which is mountable as a formal filesystem like ext3/NTFS to the linux machine and can perform all the properties of a filesytem. The IPCFS gets bigger than a normal filesystem that can be build on a hard disk, cdrom or flash memmory, IPCFS is a virtual filesystem using all the storage area allocated to it in the network. The storage area that can be given to the IPCFS can be controlled by using all the memmory area allocated to IPCFS in the network. Over all storage capacity of the IPCFS is high probably in the range of terrabytes. A central server machine handles the virtual file system. The memmory can be used by any system who got the permission to mount the IPCFS. After monuting this user level file system will perform all the operations similar to a normal filesystem in the full form. A fixed area can be used for sharing in a system due to security resons. This fixed area to be shared is specified by the administrator since he is the only person responsible for security issues occured in the shared area. The different modules of the IPCFS are: 1.Client Module 2.Master Server Module 3.Data Server Module 4.Network Module

1.Client Module The is module is used to mount the IPCFS. FUSE-'the user level file system' is used for mounting. The FUSE module performs the file system operations that actualy makes the IPCFS a file system. Filesystem in Userspace (FUSE) is a loadable kernel module for Unix-like computer operating systems that lets nonprivileged users create their own file systems. This is achieved by running file system code in user space while the FUSE module provides only a "bridge" to the actual kernel interfaces. 2.Master Server Module This module creates a virtual view of the mounted IPCFS. All client systems initially interact with the Master Server. All the data servers are connected with Master Server. It decides the routing of the

requests from client systems to data servers. Every client systems which mounts the IPCFS feels a large file system has been mounted to it but its actually a virtual collection of data from data servers. 3.Data Server Module The Data Servers holds the actual/physical data collection. Fixed areas in the data servers are shared with this module. The actual file system operations are happening in this module. Overall output is visible only in the mounted systems. The normal file systems like EXT3, EXT2 etc are used in data servers. This file system is used to mount as the IPCFS in client systems. 4.Network Module TCP sockets are the data carriers in IPCFS. Since it is distributed over network data trasfer between the systems must be reliable and fast. Only TCP sockets can provide these features perfectly. Each client systems are inter connected with the master server initialy for routing and then with data servers for data transfer. Data servers are also con

Software Requirement FUSE 2.6 Linux kernel 2.6 Tools C GCC compiler GDB Debugger Hardware Intel p4 processor, 128 RAM, LAN with 100mbps

Development of a Product Master Maintenance system. Development of a Product Master Maintenance system. This project is aimed at developing an online product master maintenance system used in a manufacturing industry. The Product Master Maintenance (PMM) is a client server based application that can be accessed by a selected group of users. This system can be used for maintaining all the details related to a product like Product hierarchy, product/sub-components attributes(cost/size/weight etc.) and supplier details. There are additional features like user access control, report generators etc in this system.

Biometric Secured Global Medi-File & Data Retrievals Using Web Services. Biometric Secured global medi-file is a unique system where both Multi organizational and BioMetric utilities are made full use. In this project, multi specialist hospitals can store, retrieve their patient details. Patient details contain a global identification number and a thumb impression. If a patient admitted in a hospital with seriously injury , using his thumb impression or GIN doctors can find out about his previous case history like his allergy towards certain drugs , heart Conditions, Hematology detailed , previous surgery details if any etc.. So treatment will be more efficient and precious. This globalized technology also is localized hence the true potentials of Multi tier programming is fully utilized. A unique Data mining technique is utilized for Data retrieval across WAN so as to retrieve the data quicky and correctly Modules Of The Project 1. Admin Module Hospital Registration Database Maintenance Module 2. Hospital Module Change Password Enter Patient Details Update Patient Details Updated Bio Metric Finger Prints and Detailed Data Storage of Patients Search Module & Data Mining Application 3. Browser Module 1. Search Module

Bio globalized crime file & Multi Database Spammer Abstract :The Bio globalize crime file Management System is a website that help police authorities to find a criminal and his/her full details by giving his Facial details or any other information. It applies to Police Stations all across the world and specifically looks into the subject Crime Prevention, Detection conviction of criminals depend on a highly responsive backbone of Information Management. The efficiency of the Police and the effectiveness with which it tackles crime depend on what quality of information it can derive from its existing records and how fast it can have access to it. Modules 1 Admin Module Authority Registration Module Categorize authority File Sending & receiving Message Transaction & SMS Sending 2 Authority Module Criminal Entry Module Edit criminal details Crime Entry Module Search Module Publish list of wanted and most dangerous criminal File Sending & receiving Message Transaction & SMS Sending

Fast Essentially Maximum Likelihood Decoding of the Golden Code

Abstract
The Golden code is a full-rate full-diversity space-time code which has been incorporated in the IEEE 802.16 (WiMAX) standard. The worst case complexity of a tree-based sphere decoder for a square QAM constellation is O(N3), where N is the size of the underlying QAM constellation; the worst case will dominate average decoding complexity on any channel with a significant line of sight component. In this paper, we present a simple algorithm with quadratic complexity for decoding the Golden code that can be employed by mobile terminals with either one or two receive antennas, that is resilient to near singularity of the channel matrix, and that gives essentially maximum likelihood (ML) performance. Dual use is an advantage, since there will likely be some IEEE 802.16 mobile terminals with one receive antenna and some with two antennas. The key to the quadratic algorithm is a maximization of the likelihood function with respect to one of the pair of signal points conditioned on the other. This choice is made by comparing the determinants of two covariance matrices, and the underlying geometry of the Golden code guarantees that one of these choices is good with high probability.

S-ar putea să vă placă și