SlideShare a Scribd company logo
LOGO
Secure Visual Algorithm
Simulator
Company Logo
Visualization gains more attention than theoretical study and it is an easy wayVisualization gains more attention than theoretical study and it is an easy way
of learning process. VISUALIZATION of algorithms’ sequence is anof learning process. VISUALIZATION of algorithms’ sequence is an
important process to learn various hidden steps, which are involvedimportant process to learn various hidden steps, which are involved
dynamically. The advantages of visualizing algorithms are: Easy to learn withdynamically. The advantages of visualizing algorithms are: Easy to learn with
different set data,different set data,
Understand hidden steps of algorithms, Memory usages and Time managementUnderstand hidden steps of algorithms, Memory usages and Time management
strategy.The secure login can be made by using various hashing algorithmsstrategy.The secure login can be made by using various hashing algorithms
which will providing security and intergrity of user thus login module useswhich will providing security and intergrity of user thus login module uses
hashing alogorithm Web applications, needing user authentication, typicallyhashing alogorithm Web applications, needing user authentication, typically
validate the input passwords by comparing them to the real passwords, whichvalidate the input passwords by comparing them to the real passwords, which
are commonly stored in the company’s private databases. If the database andare commonly stored in the company’s private databases. If the database and
hence these passwords were to become compromised, the attackers would havehence these passwords were to become compromised, the attackers would have
unlimited access to these users’personal. Nowadays, databases use a hashunlimited access to these users’personal. Nowadays, databases use a hash
algorithm to secure the stored passwords but there are still security breaches.algorithm to secure the stored passwords but there are still security breaches.
Literature SurveyLiterature Survey
Problem Statement
The way the human brain processes information, it is faster for
people to grasp the meaning of many data points when they are
displayed in charts and graphs rather than poring over piles of
spreadsheets or reading pages and pages of reports. Many of the
algorithms are hard to understand thus visualization of such algorithm
makes easier to understand. The purpose of data visualization is to
simplify data values, promote the understanding of them, and
communicate important concepts and ideas. Thus we tried to
Implement of such algorithm for the better understanding .
Solution ApproachSolution Approach
This web based project on visualization can be seen in the light of being littleThis web based project on visualization can be seen in the light of being little
like a secure web portal which will illustrate visual simulation for some of thelike a secure web portal which will illustrate visual simulation for some of the
algorithms. The website uses an innovative authentication mechanism i.ealgorithms. The website uses an innovative authentication mechanism i.e
using cryptography using a file and embedding for the login process henceusing cryptography using a file and embedding for the login process hence
making the environment of operation a very secure one. The increasedmaking the environment of operation a very secure one. The increased
security will make the user portal less prone to attacks and hacking.security will make the user portal less prone to attacks and hacking.
The main aim is implement the new Authentication mechanism in anThe main aim is implement the new Authentication mechanism in an
efficient way so as to increase the security of the web portalefficient way so as to increase the security of the web portal
To develop an interactive Algorithm simulator so that working of algorithmTo develop an interactive Algorithm simulator so that working of algorithm
can be understood in an easier waycan be understood in an easier way
Implementation Of AlgorithmImplementation Of Algorithm
The secure login module makes use of encryption and embedding. The pass- phraseThe secure login module makes use of encryption and embedding. The pass- phrase
which is submitted by the user at the time of registration is used to generate a hashwhich is submitted by the user at the time of registration is used to generate a hash
code using MD5 cryptographic hash algorithm. This 128 bit code embedded in filecode using MD5 cryptographic hash algorithm. This 128 bit code embedded in file
and the position of embedding is different for different users.and the position of embedding is different for different users.
The md5() function uses the RSA Data Security, Inc. MD5 Message-DigestThe md5() function uses the RSA Data Security, Inc. MD5 Message-Digest
Algorithm. The MD5 Message-Digest algorithm takes as iput a message ofAlgorithm. The MD5 Message-Digest algorithm takes as iput a message of
arbitrary length and produces an output of a 128-bit “fingerprint” or “ messagearbitrary length and produces an output of a 128-bit “fingerprint” or “ message
digest” of the input. The MD5 algorithm is intended for digital signaturedigest” of the input. The MD5 algorithm is intended for digital signature
applications, where a large file must be “compressed” in a secure manner beforeapplications, where a large file must be “compressed” in a secure manner before
being encrypted with a private (secret) key under a public- key cryptosystem suchbeing encrypted with a private (secret) key under a public- key cryptosystem such
as RSA.as RSA.
This function returns the calculated MD5 hash on success, or FALSE on failure.This function returns the calculated MD5 hash on success, or FALSE on failure.
The Algorithm simulator module uses JQuery which is a javascript library. QueryThe Algorithm simulator module uses JQuery which is a javascript library. Query
is free,open source software , dual-licensed under the MIT License or the GNUis free,open source software , dual-licensed under the MIT License or the GNU
General Public License. Jquery’s syntax is designed to make it easier to navigateGeneral Public License. Jquery’s syntax is designed to make it easier to navigate
a document , select DOM elements, create animations, handle events, anda document , select DOM elements, create animations, handle events, and
develop Ajax applications . Jquery also provides capabilities for developers todevelop Ajax applications . Jquery also provides capabilities for developers to
create plug-ins on top of javascript library. This enables developers to createcreate plug-ins on top of javascript library. This enables developers to create
abstractions for low-level interaction and animation, advanced effects and high-abstractions for low-level interaction and animation, advanced effects and high-
level, theme-able widgets. The module approach to the jQuery library allows thelevel, theme-able widgets. The module approach to the jQuery library allows the
creation of powerful dynamic web pages and web applications.creation of powerful dynamic web pages and web applications.
.animate().animate()
.animate(properties [, duration] [, easing] [,complete]).animate(properties [, duration] [, easing] [,complete])
Properties :Properties : A map of CSS properties that the animation will move toward.A map of CSS properties that the animation will move toward.
Duration:Duration: A string or number determining how long the animation will run.A string or number determining how long the animation will run.
Easing:Easing: A string indicating which easing function to use for the transition.A string indicating which easing function to use for the transition.
Complete:Complete: A function to call once the animation is complete.A function to call once the animation is complete.
The web project is developed using the three tier architecture. The layers are:The web project is developed using the three tier architecture. The layers are:
Front EndFront End: In this the layer, the use of Client Side scripting language like HTML: In this the layer, the use of Client Side scripting language like HTML
and javascript is used to display the web pages.and javascript is used to display the web pages.
Business LogicBusiness Logic: The technology used to program the business logic is PHP. PHP: The technology used to program the business logic is PHP. PHP
is an open source programming language.is an open source programming language.
Database Layer:Database Layer: The database used for the web project is MYSQL. This layerThe database used for the web project is MYSQL. This layer
acts as an interface between the business logic and the database.acts as an interface between the business logic and the database.
System HandlingSystem Handling
Data Flow DiagramData Flow Diagram
ScreenshotsScreenshots
Secure visual algorithm simulator
Secure visual algorithm simulator
Module1 : Login Module
This module consists of two operations, Registration and Login. In this
project the authentication mechanism has been innovated by using an
ENCRYPTED FILE to login by the user. The File is created by and
provided to user on the time of registration. The main concepts used are
Cryptography and embedding File Handling.
INPUT/OUTPUT
In case of the registration process the USER DETAIL is the Input and
the Encrypted login File will get downloaded on your computer. For the
Login process the LOGIN FILE and the emailed will be the input and
output will be redirection to the User Portal on successful
authentication, otherwise an error message.
Project ModulesProject Modules
Module2 : User Portal
User portal provides the user with an interface so that the user can browse
the web portal. These modules functions are redirection to various pages
on user requests, uploading of profile picture , feedback and Logout
operation.
INPUT/OUTPUT
The input/ output to this module are:
•Request for a particular page, the user is directed to that page if the user
session is valid else the user is directed to the home page.
•Request for changing profile picture, the picture is uploaded or the error
is displayed if the image is invalid or the size is too large.
•Request for Logout, the user session is destroyed and the user is directed
to the home page.
Module3: Algorithm Simulator
Simulation is the imitation of some real thing available, state of affairs
or process. The act of simulating something generally entails
representing certain key characteristics or behavious of a selected
physical or abstract system.
Algorithm Simulator will be able an interactive tool which will visually
explain the working of some of the already known algorithms. The task
is accomplished by converting the simulation into a set of animating
patterns. The animation will be performed using JAVASCRIPT on the
web page.
INPUT/OUTPUT
•The inputs will be input to the algorithm which is to be simulated. The
output will be an interactive simulation of algorithm using Javascript
Animation.
Module 4: Online examination portal
Online examination is a level examination portal. It can also serve the
purpose of conducting online examination on a large scale as the web
portal is highly secure.
INPUT/OUTPUT
The input to the module will be the REQUEST to take an exam. The level
is checked in the database and the output is START EXAM or NOT
ELIGIBLE and need to clear previous level
The project Secure Visual Algorithm simulator will fulfill a wide
range of aims and objectives.
This web based project on visualization can be seen in the light of
being little like a secure web portal which will illustrate visual
simulation for some of the algorithms. The website uses an
innovative authentication mechanism i.e using cryptography using
a file and embedding for the login process hence making the
environment of operation a very secure one. The increased
security will make the user portal less prone to attacks and
hacking.
ConclusionConclusion
Ad

Recommended

Efficient Securing System Using Graphical Captcha
Efficient Securing System Using Graphical Captcha
Sankar Anand
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
IGEEKS TECHNOLOGIES
 
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Kenneth Peeples
 
Captcha as Graphical Password- CaRP
Captcha as Graphical Password- CaRP
jadhav.vrushali90
 
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET- Carp a Graphical Password: Enhancing Security using AI
IRJET Journal
 
Securing RESTful API
Securing RESTful API
Muhammad Zbeedat
 
Deciphering 'Claims-based Identity'
Deciphering 'Claims-based Identity'
Oliver Pfaff
 
Bh europe-01-grossman
Bh europe-01-grossman
aniba2000
 
J2EE Security with Apache SHIRO
J2EE Security with Apache SHIRO
Cygnet Infotech
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
CODE BLUE
 
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
VMware Tanzu
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
Susmitha Reddy
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
IRJET Journal
 
Spring security jwt tutorial toptal
Spring security jwt tutorial toptal
jbsysatm
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET Journal
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?
Anil Saldanha
 
Security in Java
Security in Java
Siddharth Coontoor
 
Microsoft identity platform community call-May 2020
Microsoft identity platform community call-May 2020
Microsoft 365 Developer
 
10 An Approximation Simulator for Designing and Developing Accessible Java Sw...
10 An Approximation Simulator for Designing and Developing Accessible Java Sw...
AEGIS-ACCESSIBLE Projects
 
Major ppt
Major ppt
Amit Baghel
 
Traffic signal 32&35:DCE:FET:IIUI
Traffic signal 32&35:DCE:FET:IIUI
civilengineerf14
 
Traffic control using signals and signs
Traffic control using signals and signs
SACHIN NAGAYACH
 
Four way traffic light conrol using Verilog
Four way traffic light conrol using Verilog
Utkarsh De
 
Simulation & Modelling
Simulation & Modelling
Saneem Nazim
 
Traffic signal-project-
Traffic signal-project-
Rajeev Verma
 
State of the information security nation
State of the information security nation
SensePost
 
Top Ten Web Defenses - DefCamp 2012
Top Ten Web Defenses - DefCamp 2012
DefCamp
 
Session4-Authentication
Session4-Authentication
zakieh alizadeh
 
Creating Secure Social Applications
Creating Secure Social Applications
Tyler Browning
 
Hijacking a Pizza Delivery Robot (using SQL injection)
Hijacking a Pizza Delivery Robot (using SQL injection)
Priyanka Aash
 

More Related Content

What's hot (10)

J2EE Security with Apache SHIRO
J2EE Security with Apache SHIRO
Cygnet Infotech
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
CODE BLUE
 
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
VMware Tanzu
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
Susmitha Reddy
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
IRJET Journal
 
Spring security jwt tutorial toptal
Spring security jwt tutorial toptal
jbsysatm
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET Journal
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?
Anil Saldanha
 
Security in Java
Security in Java
Siddharth Coontoor
 
Microsoft identity platform community call-May 2020
Microsoft identity platform community call-May 2020
Microsoft 365 Developer
 
J2EE Security with Apache SHIRO
J2EE Security with Apache SHIRO
Cygnet Infotech
 
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
[CB16] BLE authentication design challenges on smartphone controlled IoT devi...
CODE BLUE
 
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
Chassis and AppFactory: Accelerate Development of Cloud-Native Microservices ...
VMware Tanzu
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
Susmitha Reddy
 
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
A Survey on “Pass sequence acting as OTP using Login Indicator preventing Sho...
IRJET Journal
 
Spring security jwt tutorial toptal
Spring security jwt tutorial toptal
jbsysatm
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET Journal
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?
Anil Saldanha
 
Microsoft identity platform community call-May 2020
Microsoft identity platform community call-May 2020
Microsoft 365 Developer
 

Viewers also liked (7)

10 An Approximation Simulator for Designing and Developing Accessible Java Sw...
10 An Approximation Simulator for Designing and Developing Accessible Java Sw...
AEGIS-ACCESSIBLE Projects
 
Major ppt
Major ppt
Amit Baghel
 
Traffic signal 32&35:DCE:FET:IIUI
Traffic signal 32&35:DCE:FET:IIUI
civilengineerf14
 
Traffic control using signals and signs
Traffic control using signals and signs
SACHIN NAGAYACH
 
Four way traffic light conrol using Verilog
Four way traffic light conrol using Verilog
Utkarsh De
 
Simulation & Modelling
Simulation & Modelling
Saneem Nazim
 
Traffic signal-project-
Traffic signal-project-
Rajeev Verma
 
10 An Approximation Simulator for Designing and Developing Accessible Java Sw...
10 An Approximation Simulator for Designing and Developing Accessible Java Sw...
AEGIS-ACCESSIBLE Projects
 
Traffic signal 32&35:DCE:FET:IIUI
Traffic signal 32&35:DCE:FET:IIUI
civilengineerf14
 
Traffic control using signals and signs
Traffic control using signals and signs
SACHIN NAGAYACH
 
Four way traffic light conrol using Verilog
Four way traffic light conrol using Verilog
Utkarsh De
 
Simulation & Modelling
Simulation & Modelling
Saneem Nazim
 
Traffic signal-project-
Traffic signal-project-
Rajeev Verma
 
Ad

Similar to Secure visual algorithm simulator (20)

State of the information security nation
State of the information security nation
SensePost
 
Top Ten Web Defenses - DefCamp 2012
Top Ten Web Defenses - DefCamp 2012
DefCamp
 
Session4-Authentication
Session4-Authentication
zakieh alizadeh
 
Creating Secure Social Applications
Creating Secure Social Applications
Tyler Browning
 
Hijacking a Pizza Delivery Robot (using SQL injection)
Hijacking a Pizza Delivery Robot (using SQL injection)
Priyanka Aash
 
Data Security String Manipulation by Random Value in Hypertext Preprocessor
Data Security String Manipulation by Random Value in Hypertext Preprocessor
ijtsrd
 
Password Storage Sucks!
Password Storage Sucks!
nerdybeardo
 
Access Control authentication and authorization .pptx
Access Control authentication and authorization .pptx
birhanugirmay559
 
CISSP Week 13
CISSP Week 13
jemtallon
 
Crash Course In Brain Surgery
Crash Course In Brain Surgery
morisson
 
Hackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web Programming
Akash Mahajan
 
Open source security
Open source security
lrigknat
 
Md5
Md5
annamalai
 
Developing Better Software
Developing Better Software
Hean Hong Leong
 
NoSQL, no security?
NoSQL, no security?
wurbanski
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
Vinay Sirivara
 
Hacknbeers sqli and cryptography
Hacknbeers sqli and cryptography
Miguel Ibarra
 
Image Based Authentication System
Image Based Authentication System
PRINCE PRANAV
 
online examination portal project presentation
online examination portal project presentation
Shobhit Jain
 
Database security for PHP
Database security for PHP
Rohan Faye
 
State of the information security nation
State of the information security nation
SensePost
 
Top Ten Web Defenses - DefCamp 2012
Top Ten Web Defenses - DefCamp 2012
DefCamp
 
Creating Secure Social Applications
Creating Secure Social Applications
Tyler Browning
 
Hijacking a Pizza Delivery Robot (using SQL injection)
Hijacking a Pizza Delivery Robot (using SQL injection)
Priyanka Aash
 
Data Security String Manipulation by Random Value in Hypertext Preprocessor
Data Security String Manipulation by Random Value in Hypertext Preprocessor
ijtsrd
 
Password Storage Sucks!
Password Storage Sucks!
nerdybeardo
 
Access Control authentication and authorization .pptx
Access Control authentication and authorization .pptx
birhanugirmay559
 
CISSP Week 13
CISSP Week 13
jemtallon
 
Crash Course In Brain Surgery
Crash Course In Brain Surgery
morisson
 
Hackers versus Developers and Secure Web Programming
Hackers versus Developers and Secure Web Programming
Akash Mahajan
 
Open source security
Open source security
lrigknat
 
Developing Better Software
Developing Better Software
Hean Hong Leong
 
NoSQL, no security?
NoSQL, no security?
wurbanski
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
Vinay Sirivara
 
Hacknbeers sqli and cryptography
Hacknbeers sqli and cryptography
Miguel Ibarra
 
Image Based Authentication System
Image Based Authentication System
PRINCE PRANAV
 
online examination portal project presentation
online examination portal project presentation
Shobhit Jain
 
Database security for PHP
Database security for PHP
Rohan Faye
 
Ad

Recently uploaded (20)

IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
How to use search fetch method in Odoo 18
How to use search fetch method in Odoo 18
Celine George
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
Q1_TLE 8_Week 1- Day 1 tools and equipment
Q1_TLE 8_Week 1- Day 1 tools and equipment
clairenotado3
 
How to Manage Different Customer Addresses in Odoo 18 Accounting
How to Manage Different Customer Addresses in Odoo 18 Accounting
Celine George
 
How payment terms are configured in Odoo 18
How payment terms are configured in Odoo 18
Celine George
 
Hurricane Helene Application Documents Checklists
Hurricane Helene Application Documents Checklists
Mebane Rash
 
Photo chemistry Power Point Presentation
Photo chemistry Power Point Presentation
mprpgcwa2024
 
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
List View Components in Odoo 18 - Odoo Slides
List View Components in Odoo 18 - Odoo Slides
Celine George
 
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Rajdeep Bavaliya
 
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
Q1_ENGLISH_PPT_WEEK 1 power point grade 3 Quarter 1 week 1
Q1_ENGLISH_PPT_WEEK 1 power point grade 3 Quarter 1 week 1
jutaydeonne
 
Code Profiling in Odoo 18 - Odoo 18 Slides
Code Profiling in Odoo 18 - Odoo 18 Slides
Celine George
 
INDUCTIVE EFFECT slide for first prof pharamacy students
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
 
Pests of Maize: An comprehensive overview.pptx
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
 
June 2025 Progress Update With Board Call_In process.pptx
June 2025 Progress Update With Board Call_In process.pptx
International Society of Service Innovation Professionals
 
LAZY SUNDAY QUIZ "A GENERAL QUIZ" JUNE 2025 SMC QUIZ CLUB, SILCHAR MEDICAL CO...
LAZY SUNDAY QUIZ "A GENERAL QUIZ" JUNE 2025 SMC QUIZ CLUB, SILCHAR MEDICAL CO...
Ultimatewinner0342
 
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
jutaydeonne
 
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT KGP Quiz Week 2024 Sports Quiz (Prelims + Finals)
IIT Kharagpur Quiz Club
 
How to use search fetch method in Odoo 18
How to use search fetch method in Odoo 18
Celine George
 
English 3 Quarter 1_LEwithLAS_Week 1.pdf
English 3 Quarter 1_LEwithLAS_Week 1.pdf
DeAsisAlyanajaneH
 
Q1_TLE 8_Week 1- Day 1 tools and equipment
Q1_TLE 8_Week 1- Day 1 tools and equipment
clairenotado3
 
How to Manage Different Customer Addresses in Odoo 18 Accounting
How to Manage Different Customer Addresses in Odoo 18 Accounting
Celine George
 
How payment terms are configured in Odoo 18
How payment terms are configured in Odoo 18
Celine George
 
Hurricane Helene Application Documents Checklists
Hurricane Helene Application Documents Checklists
Mebane Rash
 
Photo chemistry Power Point Presentation
Photo chemistry Power Point Presentation
mprpgcwa2024
 
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
F-BLOCK ELEMENTS POWER POINT PRESENTATIONS
mprpgcwa2024
 
List View Components in Odoo 18 - Odoo Slides
List View Components in Odoo 18 - Odoo Slides
Celine George
 
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Paper 107 | From Watchdog to Lapdog: Ishiguro’s Fiction and the Rise of “Godi...
Rajdeep Bavaliya
 
HistoPathology Ppt. Arshita Gupta for Diploma
HistoPathology Ppt. Arshita Gupta for Diploma
arshitagupta674
 
Q1_ENGLISH_PPT_WEEK 1 power point grade 3 Quarter 1 week 1
Q1_ENGLISH_PPT_WEEK 1 power point grade 3 Quarter 1 week 1
jutaydeonne
 
Code Profiling in Odoo 18 - Odoo 18 Slides
Code Profiling in Odoo 18 - Odoo 18 Slides
Celine George
 
INDUCTIVE EFFECT slide for first prof pharamacy students
INDUCTIVE EFFECT slide for first prof pharamacy students
SHABNAM FAIZ
 
Pests of Maize: An comprehensive overview.pptx
Pests of Maize: An comprehensive overview.pptx
Arshad Shaikh
 
LAZY SUNDAY QUIZ "A GENERAL QUIZ" JUNE 2025 SMC QUIZ CLUB, SILCHAR MEDICAL CO...
LAZY SUNDAY QUIZ "A GENERAL QUIZ" JUNE 2025 SMC QUIZ CLUB, SILCHAR MEDICAL CO...
Ultimatewinner0342
 
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
ENGLISH_Q1_W1 PowerPoint grade 3 quarter 1 week 1
jutaydeonne
 
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
M&A5 Q1 1 differentiate evolving early Philippine conventional and contempora...
ErlizaRosete
 

Secure visual algorithm simulator

  • 3. Visualization gains more attention than theoretical study and it is an easy wayVisualization gains more attention than theoretical study and it is an easy way of learning process. VISUALIZATION of algorithms’ sequence is anof learning process. VISUALIZATION of algorithms’ sequence is an important process to learn various hidden steps, which are involvedimportant process to learn various hidden steps, which are involved dynamically. The advantages of visualizing algorithms are: Easy to learn withdynamically. The advantages of visualizing algorithms are: Easy to learn with different set data,different set data, Understand hidden steps of algorithms, Memory usages and Time managementUnderstand hidden steps of algorithms, Memory usages and Time management strategy.The secure login can be made by using various hashing algorithmsstrategy.The secure login can be made by using various hashing algorithms which will providing security and intergrity of user thus login module useswhich will providing security and intergrity of user thus login module uses hashing alogorithm Web applications, needing user authentication, typicallyhashing alogorithm Web applications, needing user authentication, typically validate the input passwords by comparing them to the real passwords, whichvalidate the input passwords by comparing them to the real passwords, which are commonly stored in the company’s private databases. If the database andare commonly stored in the company’s private databases. If the database and hence these passwords were to become compromised, the attackers would havehence these passwords were to become compromised, the attackers would have unlimited access to these users’personal. Nowadays, databases use a hashunlimited access to these users’personal. Nowadays, databases use a hash algorithm to secure the stored passwords but there are still security breaches.algorithm to secure the stored passwords but there are still security breaches. Literature SurveyLiterature Survey
  • 4. Problem Statement The way the human brain processes information, it is faster for people to grasp the meaning of many data points when they are displayed in charts and graphs rather than poring over piles of spreadsheets or reading pages and pages of reports. Many of the algorithms are hard to understand thus visualization of such algorithm makes easier to understand. The purpose of data visualization is to simplify data values, promote the understanding of them, and communicate important concepts and ideas. Thus we tried to Implement of such algorithm for the better understanding .
  • 5. Solution ApproachSolution Approach This web based project on visualization can be seen in the light of being littleThis web based project on visualization can be seen in the light of being little like a secure web portal which will illustrate visual simulation for some of thelike a secure web portal which will illustrate visual simulation for some of the algorithms. The website uses an innovative authentication mechanism i.ealgorithms. The website uses an innovative authentication mechanism i.e using cryptography using a file and embedding for the login process henceusing cryptography using a file and embedding for the login process hence making the environment of operation a very secure one. The increasedmaking the environment of operation a very secure one. The increased security will make the user portal less prone to attacks and hacking.security will make the user portal less prone to attacks and hacking. The main aim is implement the new Authentication mechanism in anThe main aim is implement the new Authentication mechanism in an efficient way so as to increase the security of the web portalefficient way so as to increase the security of the web portal To develop an interactive Algorithm simulator so that working of algorithmTo develop an interactive Algorithm simulator so that working of algorithm can be understood in an easier waycan be understood in an easier way
  • 6. Implementation Of AlgorithmImplementation Of Algorithm The secure login module makes use of encryption and embedding. The pass- phraseThe secure login module makes use of encryption and embedding. The pass- phrase which is submitted by the user at the time of registration is used to generate a hashwhich is submitted by the user at the time of registration is used to generate a hash code using MD5 cryptographic hash algorithm. This 128 bit code embedded in filecode using MD5 cryptographic hash algorithm. This 128 bit code embedded in file and the position of embedding is different for different users.and the position of embedding is different for different users. The md5() function uses the RSA Data Security, Inc. MD5 Message-DigestThe md5() function uses the RSA Data Security, Inc. MD5 Message-Digest Algorithm. The MD5 Message-Digest algorithm takes as iput a message ofAlgorithm. The MD5 Message-Digest algorithm takes as iput a message of arbitrary length and produces an output of a 128-bit “fingerprint” or “ messagearbitrary length and produces an output of a 128-bit “fingerprint” or “ message digest” of the input. The MD5 algorithm is intended for digital signaturedigest” of the input. The MD5 algorithm is intended for digital signature applications, where a large file must be “compressed” in a secure manner beforeapplications, where a large file must be “compressed” in a secure manner before being encrypted with a private (secret) key under a public- key cryptosystem suchbeing encrypted with a private (secret) key under a public- key cryptosystem such as RSA.as RSA. This function returns the calculated MD5 hash on success, or FALSE on failure.This function returns the calculated MD5 hash on success, or FALSE on failure.
  • 7. The Algorithm simulator module uses JQuery which is a javascript library. QueryThe Algorithm simulator module uses JQuery which is a javascript library. Query is free,open source software , dual-licensed under the MIT License or the GNUis free,open source software , dual-licensed under the MIT License or the GNU General Public License. Jquery’s syntax is designed to make it easier to navigateGeneral Public License. Jquery’s syntax is designed to make it easier to navigate a document , select DOM elements, create animations, handle events, anda document , select DOM elements, create animations, handle events, and develop Ajax applications . Jquery also provides capabilities for developers todevelop Ajax applications . Jquery also provides capabilities for developers to create plug-ins on top of javascript library. This enables developers to createcreate plug-ins on top of javascript library. This enables developers to create abstractions for low-level interaction and animation, advanced effects and high-abstractions for low-level interaction and animation, advanced effects and high- level, theme-able widgets. The module approach to the jQuery library allows thelevel, theme-able widgets. The module approach to the jQuery library allows the creation of powerful dynamic web pages and web applications.creation of powerful dynamic web pages and web applications. .animate().animate() .animate(properties [, duration] [, easing] [,complete]).animate(properties [, duration] [, easing] [,complete]) Properties :Properties : A map of CSS properties that the animation will move toward.A map of CSS properties that the animation will move toward. Duration:Duration: A string or number determining how long the animation will run.A string or number determining how long the animation will run. Easing:Easing: A string indicating which easing function to use for the transition.A string indicating which easing function to use for the transition. Complete:Complete: A function to call once the animation is complete.A function to call once the animation is complete.
  • 8. The web project is developed using the three tier architecture. The layers are:The web project is developed using the three tier architecture. The layers are: Front EndFront End: In this the layer, the use of Client Side scripting language like HTML: In this the layer, the use of Client Side scripting language like HTML and javascript is used to display the web pages.and javascript is used to display the web pages. Business LogicBusiness Logic: The technology used to program the business logic is PHP. PHP: The technology used to program the business logic is PHP. PHP is an open source programming language.is an open source programming language. Database Layer:Database Layer: The database used for the web project is MYSQL. This layerThe database used for the web project is MYSQL. This layer acts as an interface between the business logic and the database.acts as an interface between the business logic and the database. System HandlingSystem Handling
  • 9. Data Flow DiagramData Flow Diagram
  • 13. Module1 : Login Module This module consists of two operations, Registration and Login. In this project the authentication mechanism has been innovated by using an ENCRYPTED FILE to login by the user. The File is created by and provided to user on the time of registration. The main concepts used are Cryptography and embedding File Handling. INPUT/OUTPUT In case of the registration process the USER DETAIL is the Input and the Encrypted login File will get downloaded on your computer. For the Login process the LOGIN FILE and the emailed will be the input and output will be redirection to the User Portal on successful authentication, otherwise an error message. Project ModulesProject Modules
  • 14. Module2 : User Portal User portal provides the user with an interface so that the user can browse the web portal. These modules functions are redirection to various pages on user requests, uploading of profile picture , feedback and Logout operation. INPUT/OUTPUT The input/ output to this module are: •Request for a particular page, the user is directed to that page if the user session is valid else the user is directed to the home page. •Request for changing profile picture, the picture is uploaded or the error is displayed if the image is invalid or the size is too large. •Request for Logout, the user session is destroyed and the user is directed to the home page.
  • 15. Module3: Algorithm Simulator Simulation is the imitation of some real thing available, state of affairs or process. The act of simulating something generally entails representing certain key characteristics or behavious of a selected physical or abstract system. Algorithm Simulator will be able an interactive tool which will visually explain the working of some of the already known algorithms. The task is accomplished by converting the simulation into a set of animating patterns. The animation will be performed using JAVASCRIPT on the web page. INPUT/OUTPUT •The inputs will be input to the algorithm which is to be simulated. The output will be an interactive simulation of algorithm using Javascript Animation.
  • 16. Module 4: Online examination portal Online examination is a level examination portal. It can also serve the purpose of conducting online examination on a large scale as the web portal is highly secure. INPUT/OUTPUT The input to the module will be the REQUEST to take an exam. The level is checked in the database and the output is START EXAM or NOT ELIGIBLE and need to clear previous level
  • 17. The project Secure Visual Algorithm simulator will fulfill a wide range of aims and objectives. This web based project on visualization can be seen in the light of being little like a secure web portal which will illustrate visual simulation for some of the algorithms. The website uses an innovative authentication mechanism i.e using cryptography using a file and embedding for the login process hence making the environment of operation a very secure one. The increased security will make the user portal less prone to attacks and hacking. ConclusionConclusion

Editor's Notes

  • #2: 本模板来源于网络,由第一课件网整理发布,免费分享给大家使用。 第一课件网是国内最专业的PPT模板分享网站,所有模板均经严格测试,保证100%下载,100%精彩! 更多精彩PPT模板,敬请访问http://www.1kejian.com 使用时删除此备注即可。 配色方案修改: 配色方案在【格式】-->【幻灯片设计】-->【配色方案】-->【编辑配色方案】下调整。 LOGO的添加: Logo添加修改在【视图】-->【母版】-->【幻灯片母版】下调整。直接选择logo图片删除或修改。 字体格式的设置: 括标题和文本格式的设置在【视图】-->【母版】-->【幻灯片母版】下调整。