With the ever-changing technical aspects and shifts in the IT scapes, it is vital to keep ourselves on toes. Keeping this in mind, our latest projects dealt with leading technologies like AI, Python, IoT, PHP, Software Testing, etc.
Wasting food is a common problem in our society. Food waste management is crucial since it can improve our environmental and economic sustainability. We have identified the use of mobile technology to reduce food waste management and built an android mobile application that allows restaurants to donate and share their foods and leftovers with people in need. This app will enable users to register, login, view items, add items, add items to cart, remove an item from the cart, and log out. This app is using the firebase storage and real-time database. Any user in need can see all the food images donated by different users and add it to his or her cart.
Rail accidents are a major safety concern worldwide, with the U.S. witnessing over 40,000 incidents from 2001 to 2012, costing $45 million. About 5,200 accidents exceeded $141,500 in damages. The Federal Railroad Administration mandated reports with fixed fields and narratives to analyze these accidents. It utilizes text mining techniques to uncover accident characteristics, improving predictive accuracy for extreme accident costs. Results demonstrate significant enhancement in predictive accuracy, especially when using ensemble methods. Text mining provides unique insights,complementing fixed field analysis in understanding accident contributors.
The App eases the entry process into the Campus/ IT hub or an organisation ensuring a higher level of security. The whole long queue in front of the Visitors area can be reduced to an extent. Since the authorised officials are approving the entry status, the system becomes more secure. The visitors can request for a pass to attend interviews and Walk-ins. Meetings can also be scheduled. You can also view the passes already requested and the status of approval. The walk-ins published can be viewed on a single click. The invitations from various companies can also be viewed.
We introduce CaRP, a novel security approach using hard AI problems, merging Captcha and graphical passwords. CaRP combats various attacks, including online guessing, relay, and shoulder-surfing. It also addresses image hotspot issues in graphical passwords. Additionally, we employ Rabin's Cryptosystem for robust password authentication in real-time systems.
Computers facilitate various crimes, including hacking, drug trafficking, and child pornography. Over 75% of criminals store plans on their PCs or laptops. Investigative officers extract evidence from suspects' machines, but the rise in computer-related crimes necessitates specialized forensic tools. These tools streamline the process, making it more efficient than manual searches. Inspired by the Sûreté du Québec (SQ) forensic process, we introduce a unique subject-based semantic document clustering model. It helps investigators group documents on a suspect's computer into overlapping clusters, each corresponding to an investigator-defined subject of interest. Our system stands out in the crowded field of forensic tools.
Security stats reveal a surge in data leaks, often due to human errors. To combat this, a privacy-preserving data-leak detection method is proposed. It allows secure delegation of detection operations without disclosing sensitive data, offering a privacy-focused add-on service for Internet providers, with effective results in real-world scenarios.
In a two-server PAKE protocol, a client divides its password into two shares, enabling secure authentication without revealing the password. This paper introduces compilers that transform two-party PAKE protocols into two-server ID2S PAKE protocols with implicit authentication. These ID2S PAKE protocols maintain security without random oracles, offering a computational efficiency advantage over Katz et al.'s two-server PAKE protocol with similar security guarantees.
Cloud computing offers new ways to access and store personal and business data via the internet but faces trust issues due to third-party involvement. Fog computing is a solution for data security. Despite cloud storage's widespread use, security remains a major concern. Evolving communication and computing paradigms introduce new data security challenges. Existing cloud data protection methods fail to prevent data theft attacks. Fog computing utilizes User Behavior Profiling and Decoy Technology. The proposed CUSUM algorithm improves data theft detection by tracking user access pattern changes. User Behavior Profiling includes identifying users based on typing delays and using a simplified picture password.
The "Electronic Tollbooth Monitoring System" modernizes toll collection. Traditional manual tolls slow vehicles, increasing costs. Electronic Toll Collection technology enables normal-speed passage through toll gates, reducing congestion, and automating fee collection via RFID technology. Drivers' accounts are debited automatically, and low balances are managed during account updates. This efficient system benefits both drivers and traffic management.