SlideShare una empresa de Scribd logo
1 de 17
LOGO
Secure Visual Algorithm
Simulator
Company Logo
Visualization gains more attention than theoretical study and it is an easy wayVisualization gains more attention than theoretical study and it is an easy way
of learning process. VISUALIZATION of algorithms’ sequence is anof learning process. VISUALIZATION of algorithms’ sequence is an
important process to learn various hidden steps, which are involvedimportant process to learn various hidden steps, which are involved
dynamically. The advantages of visualizing algorithms are: Easy to learn withdynamically. The advantages of visualizing algorithms are: Easy to learn with
different set data,different set data,
Understand hidden steps of algorithms, Memory usages and Time managementUnderstand hidden steps of algorithms, Memory usages and Time management
strategy.The secure login can be made by using various hashing algorithmsstrategy.The secure login can be made by using various hashing algorithms
which will providing security and intergrity of user thus login module useswhich will providing security and intergrity of user thus login module uses
hashing alogorithm Web applications, needing user authentication, typicallyhashing alogorithm Web applications, needing user authentication, typically
validate the input passwords by comparing them to the real passwords, whichvalidate the input passwords by comparing them to the real passwords, which
are commonly stored in the company’s private databases. If the database andare commonly stored in the company’s private databases. If the database and
hence these passwords were to become compromised, the attackers would havehence these passwords were to become compromised, the attackers would have
unlimited access to these users’personal. Nowadays, databases use a hashunlimited access to these users’personal. Nowadays, databases use a hash
algorithm to secure the stored passwords but there are still security breaches.algorithm to secure the stored passwords but there are still security breaches.
Literature SurveyLiterature Survey
Problem Statement
The way the human brain processes information, it is faster for
people to grasp the meaning of many data points when they are
displayed in charts and graphs rather than poring over piles of
spreadsheets or reading pages and pages of reports. Many of the
algorithms are hard to understand thus visualization of such algorithm
makes easier to understand. The purpose of data visualization is to
simplify data values, promote the understanding of them, and
communicate important concepts and ideas. Thus we tried to
Implement of such algorithm for the better understanding .
Solution ApproachSolution Approach
This web based project on visualization can be seen in the light of being littleThis web based project on visualization can be seen in the light of being little
like a secure web portal which will illustrate visual simulation for some of thelike a secure web portal which will illustrate visual simulation for some of the
algorithms. The website uses an innovative authentication mechanism i.ealgorithms. The website uses an innovative authentication mechanism i.e
using cryptography using a file and embedding for the login process henceusing cryptography using a file and embedding for the login process hence
making the environment of operation a very secure one. The increasedmaking the environment of operation a very secure one. The increased
security will make the user portal less prone to attacks and hacking.security will make the user portal less prone to attacks and hacking.
The main aim is implement the new Authentication mechanism in anThe main aim is implement the new Authentication mechanism in an
efficient way so as to increase the security of the web portalefficient way so as to increase the security of the web portal
To develop an interactive Algorithm simulator so that working of algorithmTo develop an interactive Algorithm simulator so that working of algorithm
can be understood in an easier waycan be understood in an easier way
Implementation Of AlgorithmImplementation Of Algorithm
The secure login module makes use of encryption and embedding. The pass- phraseThe secure login module makes use of encryption and embedding. The pass- phrase
which is submitted by the user at the time of registration is used to generate a hashwhich is submitted by the user at the time of registration is used to generate a hash
code using MD5 cryptographic hash algorithm. This 128 bit code embedded in filecode using MD5 cryptographic hash algorithm. This 128 bit code embedded in file
and the position of embedding is different for different users.and the position of embedding is different for different users.
The md5() function uses the RSA Data Security, Inc. MD5 Message-DigestThe md5() function uses the RSA Data Security, Inc. MD5 Message-Digest
Algorithm. The MD5 Message-Digest algorithm takes as iput a message ofAlgorithm. The MD5 Message-Digest algorithm takes as iput a message of
arbitrary length and produces an output of a 128-bit “fingerprint” or “ messagearbitrary length and produces an output of a 128-bit “fingerprint” or “ message
digest” of the input. The MD5 algorithm is intended for digital signaturedigest” of the input. The MD5 algorithm is intended for digital signature
applications, where a large file must be “compressed” in a secure manner beforeapplications, where a large file must be “compressed” in a secure manner before
being encrypted with a private (secret) key under a public- key cryptosystem suchbeing encrypted with a private (secret) key under a public- key cryptosystem such
as RSA.as RSA.
This function returns the calculated MD5 hash on success, or FALSE on failure.This function returns the calculated MD5 hash on success, or FALSE on failure.
The Algorithm simulator module uses JQuery which is a javascript library. QueryThe Algorithm simulator module uses JQuery which is a javascript library. Query
is free,open source software , dual-licensed under the MIT License or the GNUis free,open source software , dual-licensed under the MIT License or the GNU
General Public License. Jquery’s syntax is designed to make it easier to navigateGeneral Public License. Jquery’s syntax is designed to make it easier to navigate
a document , select DOM elements, create animations, handle events, anda document , select DOM elements, create animations, handle events, and
develop Ajax applications . Jquery also provides capabilities for developers todevelop Ajax applications . Jquery also provides capabilities for developers to
create plug-ins on top of javascript library. This enables developers to createcreate plug-ins on top of javascript library. This enables developers to create
abstractions for low-level interaction and animation, advanced effects and high-abstractions for low-level interaction and animation, advanced effects and high-
level, theme-able widgets. The module approach to the jQuery library allows thelevel, theme-able widgets. The module approach to the jQuery library allows the
creation of powerful dynamic web pages and web applications.creation of powerful dynamic web pages and web applications.
.animate().animate()
.animate(properties [, duration] [, easing] [,complete]).animate(properties [, duration] [, easing] [,complete])
Properties :Properties : A map of CSS properties that the animation will move toward.A map of CSS properties that the animation will move toward.
Duration:Duration: A string or number determining how long the animation will run.A string or number determining how long the animation will run.
Easing:Easing: A string indicating which easing function to use for the transition.A string indicating which easing function to use for the transition.
Complete:Complete: A function to call once the animation is complete.A function to call once the animation is complete.
The web project is developed using the three tier architecture. The layers are:The web project is developed using the three tier architecture. The layers are:
Front EndFront End: In this the layer, the use of Client Side scripting language like HTML: In this the layer, the use of Client Side scripting language like HTML
and javascript is used to display the web pages.and javascript is used to display the web pages.
Business LogicBusiness Logic: The technology used to program the business logic is PHP. PHP: The technology used to program the business logic is PHP. PHP
is an open source programming language.is an open source programming language.
Database Layer:Database Layer: The database used for the web project is MYSQL. This layerThe database used for the web project is MYSQL. This layer
acts as an interface between the business logic and the database.acts as an interface between the business logic and the database.
System HandlingSystem Handling
Data Flow DiagramData Flow Diagram
ScreenshotsScreenshots
Module1 : Login Module
This module consists of two operations, Registration and Login. In this
project the authentication mechanism has been innovated by using an
ENCRYPTED FILE to login by the user. The File is created by and
provided to user on the time of registration. The main concepts used are
Cryptography and embedding File Handling.
INPUT/OUTPUT
In case of the registration process the USER DETAIL is the Input and
the Encrypted login File will get downloaded on your computer. For the
Login process the LOGIN FILE and the emailed will be the input and
output will be redirection to the User Portal on successful
authentication, otherwise an error message.
Project ModulesProject Modules
Module2 : User Portal
User portal provides the user with an interface so that the user can browse
the web portal. These modules functions are redirection to various pages
on user requests, uploading of profile picture , feedback and Logout
operation.
INPUT/OUTPUT
The input/ output to this module are:
•Request for a particular page, the user is directed to that page if the user
session is valid else the user is directed to the home page.
•Request for changing profile picture, the picture is uploaded or the error
is displayed if the image is invalid or the size is too large.
•Request for Logout, the user session is destroyed and the user is directed
to the home page.
Module3: Algorithm Simulator
Simulation is the imitation of some real thing available, state of affairs
or process. The act of simulating something generally entails
representing certain key characteristics or behavious of a selected
physical or abstract system.
Algorithm Simulator will be able an interactive tool which will visually
explain the working of some of the already known algorithms. The task
is accomplished by converting the simulation into a set of animating
patterns. The animation will be performed using JAVASCRIPT on the
web page.
INPUT/OUTPUT
•The inputs will be input to the algorithm which is to be simulated. The
output will be an interactive simulation of algorithm using Javascript
Animation.
Module 4: Online examination portal
Online examination is a level examination portal. It can also serve the
purpose of conducting online examination on a large scale as the web
portal is highly secure.
INPUT/OUTPUT
The input to the module will be the REQUEST to take an exam. The level
is checked in the database and the output is START EXAM or NOT
ELIGIBLE and need to clear previous level
The project Secure Visual Algorithm simulator will fulfill a wide
range of aims and objectives.
This web based project on visualization can be seen in the light of
being little like a secure web portal which will illustrate visual
simulation for some of the algorithms. The website uses an
innovative authentication mechanism i.e using cryptography using
a file and embedding for the login process hence making the
environment of operation a very secure one. The increased
security will make the user portal less prone to attacks and
hacking.
ConclusionConclusion

Más contenido relacionado

La actualidad más candente

J2EE Security with Apache SHIRO
J2EE Security with Apache SHIROJ2EE Security with Apache SHIRO
J2EE Security with Apache SHIROCygnet Infotech
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...CODE BLUE
 
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...VMware Tanzu
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaSusmitha Reddy
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...IRJET Journal
 
Spring security jwt tutorial toptal
Spring security jwt tutorial   toptalSpring security jwt tutorial   toptal
Spring security jwt tutorial toptaljbsysatm
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET Journal
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Anil Saldanha
 
Microsoft identity platform community call-May 2020
Microsoft identity platform community call-May 2020Microsoft identity platform community call-May 2020
Microsoft identity platform community call-May 2020Microsoft 365 Developer
 

La actualidad más candente (10)

J2EE Security with Apache SHIRO
J2EE Security with Apache SHIROJ2EE Security with Apache SHIRO
J2EE Security with Apache SHIRO
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
 
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
 
Spring security jwt tutorial toptal
Spring security jwt tutorial   toptalSpring security jwt tutorial   toptal
Spring security jwt tutorial toptal
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-EncryptionIRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?
 
Security in Java
Security in JavaSecurity in Java
Security in Java
 
Microsoft identity platform community call-May 2020
Microsoft identity platform community call-May 2020Microsoft identity platform community call-May 2020
Microsoft identity platform community call-May 2020
 

Destacado

10 An Approximation Simulator for Designing and Developing Accessible Java Sw...
10 An Approximation Simulator for Designing and Developing Accessible Java Sw...10 An Approximation Simulator for Designing and Developing Accessible Java Sw...
10 An Approximation Simulator for Designing and Developing Accessible Java Sw...AEGIS-ACCESSIBLE Projects
 
Traffic signal 32&35:DCE:FET:IIUI
Traffic signal 32&35:DCE:FET:IIUITraffic signal 32&35:DCE:FET:IIUI
Traffic signal 32&35:DCE:FET:IIUIcivilengineerf14
 
Traffic control using signals and signs
Traffic control using signals and signsTraffic control using signals and signs
Traffic control using signals and signsSACHIN NAGAYACH
 
Four way traffic light conrol using Verilog
Four way traffic light conrol using VerilogFour way traffic light conrol using Verilog
Four way traffic light conrol using VerilogUtkarsh De
 
Simulation & Modelling
Simulation & ModellingSimulation & Modelling
Simulation & ModellingSaneem Nazim
 
Traffic signal-project-
Traffic signal-project-Traffic signal-project-
Traffic signal-project-Rajeev Verma
 

Destacado (7)

10 An Approximation Simulator for Designing and Developing Accessible Java Sw...
10 An Approximation Simulator for Designing and Developing Accessible Java Sw...10 An Approximation Simulator for Designing and Developing Accessible Java Sw...
10 An Approximation Simulator for Designing and Developing Accessible Java Sw...
 
Major ppt
Major pptMajor ppt
Major ppt
 
Traffic signal 32&35:DCE:FET:IIUI
Traffic signal 32&35:DCE:FET:IIUITraffic signal 32&35:DCE:FET:IIUI
Traffic signal 32&35:DCE:FET:IIUI
 
Traffic control using signals and signs
Traffic control using signals and signsTraffic control using signals and signs
Traffic control using signals and signs
 
Four way traffic light conrol using Verilog
Four way traffic light conrol using VerilogFour way traffic light conrol using Verilog
Four way traffic light conrol using Verilog
 
Simulation & Modelling
Simulation & ModellingSimulation & Modelling
Simulation & Modelling
 
Traffic signal-project-
Traffic signal-project-Traffic signal-project-
Traffic signal-project-
 

Similar a Secure visual algorithm simulator

IRJET- Conversational Commerce (ESTILO)
IRJET- Conversational Commerce (ESTILO)IRJET- Conversational Commerce (ESTILO)
IRJET- Conversational Commerce (ESTILO)IRJET Journal
 
IRJET- Design of Closed Loop PI Controller Based Hybrid Z-Source DC-DC Conver...
IRJET- Design of Closed Loop PI Controller Based Hybrid Z-Source DC-DC Conver...IRJET- Design of Closed Loop PI Controller Based Hybrid Z-Source DC-DC Conver...
IRJET- Design of Closed Loop PI Controller Based Hybrid Z-Source DC-DC Conver...IRJET Journal
 
face_detection_att.pptx
face_detection_att.pptxface_detection_att.pptx
face_detection_att.pptxDeeJeeV
 
How to Use OWASP Security Logging
How to Use OWASP Security LoggingHow to Use OWASP Security Logging
How to Use OWASP Security LoggingMilton Smith
 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET Journal
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Yashwanth Reddy
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Securityguest2a5a03
 
IRJET- Login System for Web: Session Management using BCRYPTJS
IRJET- Login System for Web: Session Management using BCRYPTJSIRJET- Login System for Web: Session Management using BCRYPTJS
IRJET- Login System for Web: Session Management using BCRYPTJSIRJET Journal
 
System Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxSystem Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxdeanmtaylor1545
 
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentAzure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentRoy Kim
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Jim Manico
 
KinomaJS on Microcontroller
KinomaJS on MicrocontrollerKinomaJS on Microcontroller
KinomaJS on MicrocontrollerRyuji Ishiguro
 
Design Decisions For Understanding Software Architecture
Design Decisions For Understanding Software ArchitectureDesign Decisions For Understanding Software Architecture
Design Decisions For Understanding Software ArchitectureTiffany Graham
 
Making Security Agile
Making Security AgileMaking Security Agile
Making Security AgileOleg Gryb
 

Similar a Secure visual algorithm simulator (20)

IRJET- Conversational Commerce (ESTILO)
IRJET- Conversational Commerce (ESTILO)IRJET- Conversational Commerce (ESTILO)
IRJET- Conversational Commerce (ESTILO)
 
IRJET- Design of Closed Loop PI Controller Based Hybrid Z-Source DC-DC Conver...
IRJET- Design of Closed Loop PI Controller Based Hybrid Z-Source DC-DC Conver...IRJET- Design of Closed Loop PI Controller Based Hybrid Z-Source DC-DC Conver...
IRJET- Design of Closed Loop PI Controller Based Hybrid Z-Source DC-DC Conver...
 
face_detection_att.pptx
face_detection_att.pptxface_detection_att.pptx
face_detection_att.pptx
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
How to Use OWASP Security Logging
How to Use OWASP Security LoggingHow to Use OWASP Security Logging
How to Use OWASP Security Logging
 
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...IRJET-  	  Security Enhancements by Achieving Flatness in Honeyword for Web u...
IRJET- Security Enhancements by Achieving Flatness in Honeyword for Web u...
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Security
 
Php
PhpPhp
Php
 
IRJET- Login System for Web: Session Management using BCRYPTJS
IRJET- Login System for Web: Session Management using BCRYPTJSIRJET- Login System for Web: Session Management using BCRYPTJS
IRJET- Login System for Web: Session Management using BCRYPTJS
 
System Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docxSystem Design SpecificationsThere are various methods of pro.docx
System Design SpecificationsThere are various methods of pro.docx
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
icv
icvicv
icv
 
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template DeploymentAzure Key Vault with a PaaS Architecture and ARM Template Deployment
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
 
Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5Top Ten Proactive Web Security Controls v5
Top Ten Proactive Web Security Controls v5
 
KinomaJS on Microcontroller
KinomaJS on MicrocontrollerKinomaJS on Microcontroller
KinomaJS on Microcontroller
 
Design Decisions For Understanding Software Architecture
Design Decisions For Understanding Software ArchitectureDesign Decisions For Understanding Software Architecture
Design Decisions For Understanding Software Architecture
 
website phishing by NR
website phishing by NRwebsite phishing by NR
website phishing by NR
 
Making Security Agile
Making Security AgileMaking Security Agile
Making Security Agile
 

Último

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Último (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Secure visual algorithm simulator

  • 3. Visualization gains more attention than theoretical study and it is an easy wayVisualization gains more attention than theoretical study and it is an easy way of learning process. VISUALIZATION of algorithms’ sequence is anof learning process. VISUALIZATION of algorithms’ sequence is an important process to learn various hidden steps, which are involvedimportant process to learn various hidden steps, which are involved dynamically. The advantages of visualizing algorithms are: Easy to learn withdynamically. The advantages of visualizing algorithms are: Easy to learn with different set data,different set data, Understand hidden steps of algorithms, Memory usages and Time managementUnderstand hidden steps of algorithms, Memory usages and Time management strategy.The secure login can be made by using various hashing algorithmsstrategy.The secure login can be made by using various hashing algorithms which will providing security and intergrity of user thus login module useswhich will providing security and intergrity of user thus login module uses hashing alogorithm Web applications, needing user authentication, typicallyhashing alogorithm Web applications, needing user authentication, typically validate the input passwords by comparing them to the real passwords, whichvalidate the input passwords by comparing them to the real passwords, which are commonly stored in the company’s private databases. If the database andare commonly stored in the company’s private databases. If the database and hence these passwords were to become compromised, the attackers would havehence these passwords were to become compromised, the attackers would have unlimited access to these users’personal. Nowadays, databases use a hashunlimited access to these users’personal. Nowadays, databases use a hash algorithm to secure the stored passwords but there are still security breaches.algorithm to secure the stored passwords but there are still security breaches. Literature SurveyLiterature Survey
  • 4. Problem Statement The way the human brain processes information, it is faster for people to grasp the meaning of many data points when they are displayed in charts and graphs rather than poring over piles of spreadsheets or reading pages and pages of reports. Many of the algorithms are hard to understand thus visualization of such algorithm makes easier to understand. The purpose of data visualization is to simplify data values, promote the understanding of them, and communicate important concepts and ideas. Thus we tried to Implement of such algorithm for the better understanding .
  • 5. Solution ApproachSolution Approach This web based project on visualization can be seen in the light of being littleThis web based project on visualization can be seen in the light of being little like a secure web portal which will illustrate visual simulation for some of thelike a secure web portal which will illustrate visual simulation for some of the algorithms. The website uses an innovative authentication mechanism i.ealgorithms. The website uses an innovative authentication mechanism i.e using cryptography using a file and embedding for the login process henceusing cryptography using a file and embedding for the login process hence making the environment of operation a very secure one. The increasedmaking the environment of operation a very secure one. The increased security will make the user portal less prone to attacks and hacking.security will make the user portal less prone to attacks and hacking. The main aim is implement the new Authentication mechanism in anThe main aim is implement the new Authentication mechanism in an efficient way so as to increase the security of the web portalefficient way so as to increase the security of the web portal To develop an interactive Algorithm simulator so that working of algorithmTo develop an interactive Algorithm simulator so that working of algorithm can be understood in an easier waycan be understood in an easier way
  • 6. Implementation Of AlgorithmImplementation Of Algorithm The secure login module makes use of encryption and embedding. The pass- phraseThe secure login module makes use of encryption and embedding. The pass- phrase which is submitted by the user at the time of registration is used to generate a hashwhich is submitted by the user at the time of registration is used to generate a hash code using MD5 cryptographic hash algorithm. This 128 bit code embedded in filecode using MD5 cryptographic hash algorithm. This 128 bit code embedded in file and the position of embedding is different for different users.and the position of embedding is different for different users. The md5() function uses the RSA Data Security, Inc. MD5 Message-DigestThe md5() function uses the RSA Data Security, Inc. MD5 Message-Digest Algorithm. The MD5 Message-Digest algorithm takes as iput a message ofAlgorithm. The MD5 Message-Digest algorithm takes as iput a message of arbitrary length and produces an output of a 128-bit “fingerprint” or “ messagearbitrary length and produces an output of a 128-bit “fingerprint” or “ message digest” of the input. The MD5 algorithm is intended for digital signaturedigest” of the input. The MD5 algorithm is intended for digital signature applications, where a large file must be “compressed” in a secure manner beforeapplications, where a large file must be “compressed” in a secure manner before being encrypted with a private (secret) key under a public- key cryptosystem suchbeing encrypted with a private (secret) key under a public- key cryptosystem such as RSA.as RSA. This function returns the calculated MD5 hash on success, or FALSE on failure.This function returns the calculated MD5 hash on success, or FALSE on failure.
  • 7. The Algorithm simulator module uses JQuery which is a javascript library. QueryThe Algorithm simulator module uses JQuery which is a javascript library. Query is free,open source software , dual-licensed under the MIT License or the GNUis free,open source software , dual-licensed under the MIT License or the GNU General Public License. Jquery’s syntax is designed to make it easier to navigateGeneral Public License. Jquery’s syntax is designed to make it easier to navigate a document , select DOM elements, create animations, handle events, anda document , select DOM elements, create animations, handle events, and develop Ajax applications . Jquery also provides capabilities for developers todevelop Ajax applications . Jquery also provides capabilities for developers to create plug-ins on top of javascript library. This enables developers to createcreate plug-ins on top of javascript library. This enables developers to create abstractions for low-level interaction and animation, advanced effects and high-abstractions for low-level interaction and animation, advanced effects and high- level, theme-able widgets. The module approach to the jQuery library allows thelevel, theme-able widgets. The module approach to the jQuery library allows the creation of powerful dynamic web pages and web applications.creation of powerful dynamic web pages and web applications. .animate().animate() .animate(properties [, duration] [, easing] [,complete]).animate(properties [, duration] [, easing] [,complete]) Properties :Properties : A map of CSS properties that the animation will move toward.A map of CSS properties that the animation will move toward. Duration:Duration: A string or number determining how long the animation will run.A string or number determining how long the animation will run. Easing:Easing: A string indicating which easing function to use for the transition.A string indicating which easing function to use for the transition. Complete:Complete: A function to call once the animation is complete.A function to call once the animation is complete.
  • 8. The web project is developed using the three tier architecture. The layers are:The web project is developed using the three tier architecture. The layers are: Front EndFront End: In this the layer, the use of Client Side scripting language like HTML: In this the layer, the use of Client Side scripting language like HTML and javascript is used to display the web pages.and javascript is used to display the web pages. Business LogicBusiness Logic: The technology used to program the business logic is PHP. PHP: The technology used to program the business logic is PHP. PHP is an open source programming language.is an open source programming language. Database Layer:Database Layer: The database used for the web project is MYSQL. This layerThe database used for the web project is MYSQL. This layer acts as an interface between the business logic and the database.acts as an interface between the business logic and the database. System HandlingSystem Handling
  • 9. Data Flow DiagramData Flow Diagram
  • 11.
  • 12.
  • 13. Module1 : Login Module This module consists of two operations, Registration and Login. In this project the authentication mechanism has been innovated by using an ENCRYPTED FILE to login by the user. The File is created by and provided to user on the time of registration. The main concepts used are Cryptography and embedding File Handling. INPUT/OUTPUT In case of the registration process the USER DETAIL is the Input and the Encrypted login File will get downloaded on your computer. For the Login process the LOGIN FILE and the emailed will be the input and output will be redirection to the User Portal on successful authentication, otherwise an error message. Project ModulesProject Modules
  • 14. Module2 : User Portal User portal provides the user with an interface so that the user can browse the web portal. These modules functions are redirection to various pages on user requests, uploading of profile picture , feedback and Logout operation. INPUT/OUTPUT The input/ output to this module are: •Request for a particular page, the user is directed to that page if the user session is valid else the user is directed to the home page. •Request for changing profile picture, the picture is uploaded or the error is displayed if the image is invalid or the size is too large. •Request for Logout, the user session is destroyed and the user is directed to the home page.
  • 15. Module3: Algorithm Simulator Simulation is the imitation of some real thing available, state of affairs or process. The act of simulating something generally entails representing certain key characteristics or behavious of a selected physical or abstract system. Algorithm Simulator will be able an interactive tool which will visually explain the working of some of the already known algorithms. The task is accomplished by converting the simulation into a set of animating patterns. The animation will be performed using JAVASCRIPT on the web page. INPUT/OUTPUT •The inputs will be input to the algorithm which is to be simulated. The output will be an interactive simulation of algorithm using Javascript Animation.
  • 16. Module 4: Online examination portal Online examination is a level examination portal. It can also serve the purpose of conducting online examination on a large scale as the web portal is highly secure. INPUT/OUTPUT The input to the module will be the REQUEST to take an exam. The level is checked in the database and the output is START EXAM or NOT ELIGIBLE and need to clear previous level
  • 17. The project Secure Visual Algorithm simulator will fulfill a wide range of aims and objectives. This web based project on visualization can be seen in the light of being little like a secure web portal which will illustrate visual simulation for some of the algorithms. The website uses an innovative authentication mechanism i.e using cryptography using a file and embedding for the login process hence making the environment of operation a very secure one. The increased security will make the user portal less prone to attacks and hacking. ConclusionConclusion

Notas del editor

  1. 本模板来源于网络,由第一课件网整理发布,免费分享给大家使用。 第一课件网是国内最专业的PPT模板分享网站,所有模板均经严格测试,保证100%下载,100%精彩! 更多精彩PPT模板,敬请访问http://www.1kejian.com 使用时删除此备注即可。 配色方案修改: 配色方案在【格式】-->【幻灯片设计】-->【配色方案】-->【编辑配色方案】下调整。 LOGO的添加: Logo添加修改在【视图】-->【母版】-->【幻灯片母版】下调整。直接选择logo图片删除或修改。 字体格式的设置: 括标题和文本格式的设置在【视图】-->【母版】-->【幻灯片母版】下调整。