Technology demonstration of digital stamping of electronic communication/message to know its origin, date, time and spread

 A new method is discussed to enhance the security of communications over Internet. The method is based on utilization of electronic graphic images being sent as part of messages that require secure communication and certification. At the core of the proposed method are Electronic Virtual Stamps implemented as familiar and easily recognizable electr...

Speech to Text App customized for police functioning in different languages

 This paper reviewed literature from 1999 to 2014 inclusively on how Speech-to-Text Recognition (STR) technology has been applied to enhance learning. The first aim of this review is to understand how STR technology has been used to support learning over the past fifteen years, and the second is to analyze all research evidence to understand how Spe...

Portable Stabilized Buoyancy Platform for aerial surveillance of large public arrangements

 Aerial security means performing security-aimed monitoring and surveillance operations with the help of airborne vehicles. This kind of activities suggest that human officers (security organizations, law enforcement, police etc.) would be able to remotely monitor and view video and data acquired from Drones while planning and evaluating their opera...

SECURED DATA PROTECTION USING SIGNATURE PROTOCOL AND BLOCK CHAIN

 During the last decade, distributed ledger solutions such as blockchain have gained significant attention due to their decentralized, immutable, and verifiable features. However, the public availability of data stored on the blockchain and its link to users may raise privacy and security issues. In some cases, addressing these issues requires block...

Require Crime Predictive model/tool for hotspot mapping

 Hotspot mapping is a popular analytical technique that is used to help identify where to target police and crime reduction resources. In essence, hotspot mapping is used as a basic form of crime prediction, relying on retrospective data to identify the areas of high concentrations of crime and where policing and other crime reduction resources shou...

Develop an System to identity transgression though sensors & electronics devices, Camera etc

 Typical approaches to visual vehicle tracking across large area require several cameras and complex algorithms to detect, identify and track the vehicle route. Due to memory requirements, computational complexity and hardware constrains, the video images are transmitted to a dedicated workstation equipped with powerful graphic processing units. How...

Develop an IT enabled framework mechanism through which a person can give tip-off about any suspicious activity crime to the authorities

 Although information systems and technology (IS/IT) investments have always caused varying degrees of business change, the main purpose of many of today's IS/IT implementations is to change the business and/or organization in some significant way. However, most organizations' approaches to managing IS/IT developments have changed little in the last...

Creating Application for Mobile Phones

 Currently, the development of mobile applications heavily relies on using conventional computers as development platform. MobiDev enables people in emerging countries without access to a computer but to a cell phone to develop their own locally relevant applications. The goal of the MobiDev project is to simplify development and deployment of appli...

Transfer of Multimedia data through Police Radio Sets

 This article deals with multimedia data, which combines basic functions with high quality graphics, sound, video and animation and definitions of multimedia. Also deals with multimedia characteristics, network technology – Ethernet, Provisioning and ATM, bandwidth needs and multimedia networking along with data transfers protocols. Right issues for...

System would Identification of System Generated, Spoof Calls landing at Dial 100 Control Room

 Caller ID (caller identification) is a service provided by telephone carriers to transmit the phone number and/or the name of a caller to a callee. Today, most people trust the caller ID information, and it is increasingly used to authenticate customers (e.g., by banks or credit card companies). However, with the proliferation of smartphones and Vo...

Speech to text conversion for local ethnic languages of MP like Malavi, Bagheli etc

 In present industry, communication is the key element to progress. Passing on information, to the right person, and in the right manner is very important, not just on a corporate level, but also on a personal level. The world is moving towards digitization, so are the means of communication. Phone calls, emails, text messages etc. have become an in...

Speech Emotion Recognition (SER) on live calls while creating events

 This paper investigates the applicability of machine-driven Speech Emotion Recognition (SER) towards the augmentation of theatrical performances and interactions (e.g. controlling stage color /light, stimulating active audience engagement, actors’ interactive training, etc.). For the needs of the classification experiments, the Acted Emotional Spee...

Detection of Criminal Activities/Criminal through CCTV by analysing live footage for melee, mob formation, body language of suspect etc

 In this paper, we describe a surveillance program which is to be designed that can automatically detect the gestures or signs of aggression and brutality on real time. A single CCTV human operator can handle very limited set of operations, so as the number of CCTV camera increases the need of the human intervention also increases which can also cau...

Predictive analytic solutions using AI

 This conceptual paper exclusively focused on how artificial intelligence (AI) serves as a means to identify a target audience. Focusing on the marketing context, a structured discussion of how AI can identify the target customers precisely despite their different behaviors was presented in this paper. The applications of AI in customer targeting an...

Creation of G.I.S. Layers through GPS Data of Dial 100 Vehicles

 Recently, automatic vehicle location (AVL) has become more widely used, affordable and popular than ever before. AVL is used for different tracking purposes, especially for those related to tracking one vehicle or a fleet of vehicles. Tracking system technology was made possible by the integration of three new technologies: navigational technologie...

Vehicle number recognition by using existing general surveillance cameras

 Traffic control and vehicle owner identification has become major problem in every country. Sometimes it becomes difficult to identify vehicle owner who violates traffic rules and drives too fast. Therefore, it is not possible to catch and punish those kinds of people because the traffic personal might not be able to retrieve vehicle number from th...

Tracing IP Address behind VPN/Proxy Servers

 Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such t...

Drone Neutralisation Technique in city crowded areas to neutralise drones without hampering other radio signals or other equipment in a certain range

 Recently, the world witnessed a significant increase in the number of used drones, with a global and continuous rise in the demand for their multi-purpose applications. The pervasive aspect of these drones is due to their ability to answer people’s needs. Drones are providing users with a bird’s eye that can be activated and used almost anywhere an...

Develop a Smart Attendance Capturing Mobile App

 Student’s attendance tracking is a vital issue in order to monitor students’ performance in the classroom as well as in their studies. It becomes a key concern because the university authority maintains a rule that one student can only attend in the exam if his/her attendance is higher or equal to several percentages (60%,70% or 80% etc.) otherwise...

Big Data Searching

 Due to Increase in the amount of data in the field of genomics, meteorology, biology, environmental research and many others, it has become difficult to find, analyse patterns, associations within such large data. Interesting association is to be found in the large data sets to draw the pattern and for knowledge purpose. The benefit of analysing th...

Tracing IP address and details of unidentified participants while academic sessions

 Distance Learning has been steadily gaining popularity. More and more universities and colleges are offering online course to increase enrollments. However, one question remains for those who teach online courses: who is doing the real course work? In this paper we will survey the commonly used methods to prevent e-Cheating, look at a few e-Proctor...

Software toolset for storage browsing and permission based access to geospatial data using blockchain

 Blockchain’s foundations of decentralisation, cryptographic security and immutability make it a strong contender in reshaping the healthcare landscape worldwide. Blockchain solutions are currently being explored for: (1) securing patient and provider identities; (2) managing pharmaceutical and medical device supply chains; (3) clinical research and...

Network Traffic Analyzer

 Networking, which is one of the most significant aspects of information technology revolution, is developing increasingly day after day. This is because it offers a huge amount of knowledge, resources and human experiences. On the one hand, it contains a considerable amount of harmful content, because of misusing. On the other hand, sitting for a l...

Graphical Password Authentication

 A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is called graphical user authentication (GUA). The most common computer authentication method is to use alphanumerical usernames and p...

Design of Chaotic Block Cipher Operation Mode for Intelligent Transportation Systems

 Information security is a vital aspect of Intelligent Transportation Systems (ITS) involving public data collection. Road images captured for use as a basis of traffic manipulation in ITS should take all precautions for encrypting the wirelessly transferred image. This paper presents an Enhanced Cipher Block Chaining (ECBC) operation mode to ensu...

Privacy and Security analysis of crypto currency mobile applications

 Subsequent to the introduction of Bit coin, the field of cryptocurrency has seen unprecedented growth. Mobile applications known as wallets often facilitate user interaction to these crypto currencies. With a perceived real world value these wallets are a target for attackers. Unlike mainstream financial services applications, cryptocurrency wallet...

Detecting Phishing Scams on Ethereum based on Transaction Records

  With the increasing popularity of blockchain technology, it has also become a hotbed of various cybercrimes. As a traditional way of scam, the phishing scam has new means of scam in the blockchain scenario and swindles a lot of money from users. In order to create a safe environment for investors, an ecient method for phishing detection is urge...

SILedger A Block chain and ABE-based Access Control for Applications in SDN-IoT Networks

 The Software Defined Network in Internet of Things (SDN-IoT) is enjoying growing popularity due to its flexibility, automaticity and programmability. However, there still lack proper permission management on SDN-IoT applications (SIApps), especially when the SIApp’s required northbound interfaces are located in multiple heterogeneous controllers wi...

A Block chain-Based Multi-Cloud Storage Data Auditing Scheme to Locate Faults

 Network storage services have benefited countless users worldwide due to the notable features of convenience, economy and high availability. Since a single service provider is not always reliable enough, more complex multi-cloud storage systems are developed for mitigating the data corruption risk. While a data auditing scheme is still needed in mu...

Efficient Mining Cluster Selection for Block chain-Based Cellular V2X Communications

 Cellular vehicle-to-everything (V2X) communication is expected to herald the age of autonomous vehicles in the coming years.With the integration of block chain in such networks, information of all granularity levels, from complete blocks to individual transactions, would be accessible to vehicle sat any time.Specifically, the block chain technology...

A Block chain-based Framework for Lightweight Data Sharing and Energy Trading in V2G Network

 The Vehicle-to-Grid (V2G) network is, where the battery-powered vehicles provide energy to the power grid, is highly emerging. A robust, scalable, and cost-optimal mechanism that can support the increasing number of transactions in a V2Gnetwork is required. Existing studies use traditional block chain as to achieve this requirement. Block chain-en...

An Efficient Data Security in Medical Report using Block Chain Technology

 ? The health care services industry is always showing signs of change and supporting new advancements and advances. One of the predominant requirements in today's health care systems is to protect the patient's medical report against potential attackers. Hence, it is basic to have secure information that can just approve people can get to the patie...

LayerChain: A Hierarchical Edge-Cloud Block chain for Large-Scale Low-Delay IIoT Applications

 The combination of pervasive edge computing and block chain technologies opens up significant possibilities for Industrial Internet of Things (IIoT) applications, but there are several critical limitations regarding efficient storage and rapid response for large-scale low-delay IIoT scenarios. To address these limitations, we propose a hierarchical...

Edgence: A Block chain-Enabled Edge Computing Platform for Intelligent IoT-Based dApps

 Nowadays scalable IoT management is a bottleneck of IoT development due to the geographically dispersed distribution, fragmented ownerships, and ever growing population of IoT devices. To intelligently manage massive decentralized applications (dApps) in IoT use cases, Edgence (EDGe + intelligence) is proposed to use edge clouds to access IoT devic...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com