ENHANCING REMEMBRANCE OF PASSWORD AS AN IMAGE

 This paper centers around changing the process for having 'text' as secret word as individuals will generally frequently fail to remember their passwords and need to recuperate it. Proposing the procedure for having picture as a secret word which is kept encoded in a data set and unscrambled and matched to check for approval of client. It has been ...

Technology demonstration of digital stamping of electronic communication/message to know its origin, date, time and spread

 A new method is discussed to enhance the security of communications over Internet. The method is based on utilization of electronic graphic images being sent as part of messages that require secure communication and certification. At the core of the proposed method are Electronic Virtual Stamps implemented as familiar and easily recognizable electr...

Speech to Text App customized for police functioning in different languages

 This paper reviewed literature from 1999 to 2014 inclusively on how Speech-to-Text Recognition (STR) technology has been applied to enhance learning. The first aim of this review is to understand how STR technology has been used to support learning over the past fifteen years, and the second is to analyze all research evidence to understand how Spe...

Portable Stabilized Buoyancy Platform for aerial surveillance of large public arrangements

 Aerial security means performing security-aimed monitoring and surveillance operations with the help of airborne vehicles. This kind of activities suggest that human officers (security organizations, law enforcement, police etc.) would be able to remotely monitor and view video and data acquired from Drones while planning and evaluating their opera...

Require Crime Predictive model/tool for hotspot mapping

 Hotspot mapping is a popular analytical technique that is used to help identify where to target police and crime reduction resources. In essence, hotspot mapping is used as a basic form of crime prediction, relying on retrospective data to identify the areas of high concentrations of crime and where policing and other crime reduction resources shou...

Develop an System to identity transgression though sensors & electronics devices, Camera etc

 Typical approaches to visual vehicle tracking across large area require several cameras and complex algorithms to detect, identify and track the vehicle route. Due to memory requirements, computational complexity and hardware constrains, the video images are transmitted to a dedicated workstation equipped with powerful graphic processing units. How...

Develop an IT enabled framework mechanism through which a person can give tip-off about any suspicious activity crime to the authorities

 Although information systems and technology (IS/IT) investments have always caused varying degrees of business change, the main purpose of many of today's IS/IT implementations is to change the business and/or organization in some significant way. However, most organizations' approaches to managing IS/IT developments have changed little in the last...

Creating Application for Mobile Phones

 Currently, the development of mobile applications heavily relies on using conventional computers as development platform. MobiDev enables people in emerging countries without access to a computer but to a cell phone to develop their own locally relevant applications. The goal of the MobiDev project is to simplify development and deployment of appli...

Transfer of Multimedia data through Police Radio Sets

 This article deals with multimedia data, which combines basic functions with high quality graphics, sound, video and animation and definitions of multimedia. Also deals with multimedia characteristics, network technology – Ethernet, Provisioning and ATM, bandwidth needs and multimedia networking along with data transfers protocols. Right issues for...

System would Identification of System Generated, Spoof Calls landing at Dial 100 Control Room

 Caller ID (caller identification) is a service provided by telephone carriers to transmit the phone number and/or the name of a caller to a callee. Today, most people trust the caller ID information, and it is increasingly used to authenticate customers (e.g., by banks or credit card companies). However, with the proliferation of smartphones and Vo...

Speech to text conversion for local ethnic languages of MP like Malavi, Bagheli etc

 In present industry, communication is the key element to progress. Passing on information, to the right person, and in the right manner is very important, not just on a corporate level, but also on a personal level. The world is moving towards digitization, so are the means of communication. Phone calls, emails, text messages etc. have become an in...

Speech Emotion Recognition (SER) on live calls while creating events

 This paper investigates the applicability of machine-driven Speech Emotion Recognition (SER) towards the augmentation of theatrical performances and interactions (e.g. controlling stage color /light, stimulating active audience engagement, actors’ interactive training, etc.). For the needs of the classification experiments, the Acted Emotional Spee...

Detection of Criminal Activities/Criminal through CCTV by analysing live footage for melee, mob formation, body language of suspect etc

 In this paper, we describe a surveillance program which is to be designed that can automatically detect the gestures or signs of aggression and brutality on real time. A single CCTV human operator can handle very limited set of operations, so as the number of CCTV camera increases the need of the human intervention also increases which can also cau...

Predictive analytic solutions using AI

 This conceptual paper exclusively focused on how artificial intelligence (AI) serves as a means to identify a target audience. Focusing on the marketing context, a structured discussion of how AI can identify the target customers precisely despite their different behaviors was presented in this paper. The applications of AI in customer targeting an...

Creation of G.I.S. Layers through GPS Data of Dial 100 Vehicles

 Recently, automatic vehicle location (AVL) has become more widely used, affordable and popular than ever before. AVL is used for different tracking purposes, especially for those related to tracking one vehicle or a fleet of vehicles. Tracking system technology was made possible by the integration of three new technologies: navigational technologie...

Vehicle number recognition by using existing general surveillance cameras

 Traffic control and vehicle owner identification has become major problem in every country. Sometimes it becomes difficult to identify vehicle owner who violates traffic rules and drives too fast. Therefore, it is not possible to catch and punish those kinds of people because the traffic personal might not be able to retrieve vehicle number from th...

Tracing IP Address behind VPN/Proxy Servers

 Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such t...

Drone Neutralisation Technique in city crowded areas to neutralise drones without hampering other radio signals or other equipment in a certain range

 Recently, the world witnessed a significant increase in the number of used drones, with a global and continuous rise in the demand for their multi-purpose applications. The pervasive aspect of these drones is due to their ability to answer people’s needs. Drones are providing users with a bird’s eye that can be activated and used almost anywhere an...

Develop a Smart Attendance Capturing Mobile App

 Student’s attendance tracking is a vital issue in order to monitor students’ performance in the classroom as well as in their studies. It becomes a key concern because the university authority maintains a rule that one student can only attend in the exam if his/her attendance is higher or equal to several percentages (60%,70% or 80% etc.) otherwise...

Big Data Searching

 Due to Increase in the amount of data in the field of genomics, meteorology, biology, environmental research and many others, it has become difficult to find, analyse patterns, associations within such large data. Interesting association is to be found in the large data sets to draw the pattern and for knowledge purpose. The benefit of analysing th...

Tracing IP address and details of unidentified participants while academic sessions

 Distance Learning has been steadily gaining popularity. More and more universities and colleges are offering online course to increase enrollments. However, one question remains for those who teach online courses: who is doing the real course work? In this paper we will survey the commonly used methods to prevent e-Cheating, look at a few e-Proctor...

Software toolset for storage browsing and permission based access to geospatial data using blockchain

 Blockchain’s foundations of decentralisation, cryptographic security and immutability make it a strong contender in reshaping the healthcare landscape worldwide. Blockchain solutions are currently being explored for: (1) securing patient and provider identities; (2) managing pharmaceutical and medical device supply chains; (3) clinical research and...

Network Traffic Analyzer

 Networking, which is one of the most significant aspects of information technology revolution, is developing increasingly day after day. This is because it offers a huge amount of knowledge, resources and human experiences. On the one hand, it contains a considerable amount of harmful content, because of misusing. On the other hand, sitting for a l...

Graphical Password Authentication

 A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). For this reason, the graphical-password approach is called graphical user authentication (GUA). The most common computer authentication method is to use alphanumerical usernames and p...

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us : info@nibode.com