You are on page 1of 33

ZEROTH REVIEW

PROJECT COORDINATOR: GROUP MEMBERS:


Mrs.GEETHA MAM 1.AISWARYA.R
2.ROSHIA.R
PROJECT GUIDE: 3.SINDHU.S
4.SUKANYA.S
TOPICS:
1.EYE BASED HUMAN COMPUTER
INTERACTIONS

2.DETECTING MALICIOUS FACEBOOK


APPLICATIONS

3.FAULT ANALYSIS OF OBFUSCATED


SMART PHONE MALWARE
1.EYE
BASED
HUMAN
COMPUTER
INTERACTIONS.
INTRODUCTION
The eye has a lot of communicative power.Eye
contact and direction are central keys in the human
communication.

 Eye based human computer interaction is mentioned


by here, ”A EYE TRACKING TECHNOLOGY”.

Eye tracking tool is mainly for recording and studying


human visual behavior.
This can also be a powerful means of
communications make in physically challenged
peoples.

We communicate with computer by concentrating


our mind in both Hand(for typing) and Eye(for
evaluating).

But here we want to focus only for our eye


movement.
This project is search the new thought of human
computer interaction by using eye movement.

It is acheived by particular directional movement of


eye is refer specific symbol in keyboard.

So without using keyboard easily communication is


possible.
EXISTING SYSTEM
In existing system, communication with computer
by provoke an ‘INPUT DEVICES’.

The devices such as keyboard and mouse are used


to provide the communications.

By inserting something into display screen ,


we concentrate our mind in deeply. But sometime
it make the difficulties.
DISADVANTAGE
Increases the mental frustrations

So many corrections are made in


document

Low speed access to computer

Hard interaction with human and


computer
PROPOSED SYSTEM
In proposed system , Eye tracking is used as an
interface with the communication among user
and system.

 Eye tracking is the friendly communication


between two parties.

Here “EYE” is used as the input device of the


computer system and provide smooth
communication.
The particular directional eye movement is
refered the symbols in the keyboard.

So it is makes simple communication


environment with two communicating
parties.

It contribute the meaningful approaches in


physically challenged peoples.
ADVANTAGE
Soft environment of interaction

Less chances for corrections

It is beneficial to physically challenged peoples

Easy to operates

Friendly environment
SYSTEM SPECIFICATION
CONCLUSION
Eye tracking is very interesting and important
technology. It is mainly act as an input to the computer
devices.

We prefered symbols are displayed on screen


according to the movement of our eyes .

Actually it operates cost effective manner as the


reduction of input devices such as keyboard and
mouse.

It treat more beneficial to physically challenged peoples


2.DETECTING MALICIOUS
FACEBOOK
APPLICATION
INTRODUCTION
•Facebook is the application is to facilitate the
communication between two authenticated parties.

•Today most of the peoples are communicated


through the new technology such as facebook and
whatsapp.

•But this communication is falls to some problem


such as theft or intruder possibilities.
•The possibility and availability of facebook
application is increases sharply. So
20 millions of people installs this app day by day.

•The addictiveness of Facebook is increases thereby


the number of hackers are also increases.

•In this project deals about that the Facebook


application is malicious or not.

•So it is helpful for good relationship between


peoples, it is actually reduces the teenagers suicide
attempt.
EXISTING SYSTEM
•The usage of facebook app is increases day by
day.Parallely the hackers which spreading the
malware and spam.

•The unwanted malware which create the


malicious facebook application,it is dangerous
to proper communications.

•As we find that at least 13% of apps in our


dataset are malicious.
DISADVANTAGE
•The malicious facebook app is not good for
communication.

•It is make dangerous situation among two parties.

• Wrong relation is made from this malicious app.

•It increases suicide attempt also.


PROPOSED SYSTEM
•In our proposed system the secure communication is
provided by detect the malicious facebook app.

•In this paper we address the problem by automatic


real time detection of malicious content.

•It is mainly focus on the detection of theft post or


news. And also it evaluates by the fake news etc.
ADVANTAGE
•It is simple to operate.

•Automatic detection is possible.

•Make good relationship.

•Confident about communications.


SYSTEM
SPECIFICATION
CONCLUSION
•The possibility of attacks on the facebook app is
increases .

•It is restricted by provide the services of


automatic detection of malicious attempt.

•The identification of malicious content are


evaluated here.

•This is become good platform for better


communications.
3.FAULT ANALYSIS OF
OBFUSCATED SMART
PHONE MALWARE
INTRODUCTION
The invention of mobile phones generates great deals
in communication.

The interface in communication may allow by the


operating system.It is successively Provide the smooth
communication layer between user and system.

Recent days, the malware is highly spread over the


Android operating system.
The existence of malware which decreases the
mobile phone functionality and finally it reaches
the destruction phase.

The viruses and malware can spread from computer


network to mobile network .

This spread is after effect of the rapid growth of


smart phone users through Bluetooth and SMS.
EXISTING SYSTEM
Smartphone present a number of security and privacy
concerns.

But in a mobile network , viruses and malware can


cause privacy leakage, extra charges and power
reduction etc.

 The existence of spam and viruses which cause the


unbeneficial approaches in the communication.

It is appear totally dangerous mark in our


communication.
DISADVANTAGE
1.Low speed access.

2.Leakage in mobile phone functionality.

3.Battery life reduction.

4.Leakage in privacy of data.


PROPOSED SYSTEM
In our proposed system the major key idea behind
the detection of malware by the chances in creation
of malware.

That is the sharing of information through SMS or


Bluetooth which creates the malware chances.

The viruses which creates nuisance in our proper


arrangement of smartphone.
The existences of viruses is detected and
automatically it is remove from our mobile
phones.

The viruses range is reaches at particular point


then it is messaged to a authorized people.

After this message alarm, automatically viruses


detected and destructed.
ADVANTAGE
1.No chances of malware attack.

2.Smooth communication environment.

3.Better battery power.

4.Fully authorized attempt.

5.No data leakage.


SYSTEM SPECIFICATION
CONCLUSION
It is totally Android based malware propagation ,detection and
destructions.

 The virus content of data’s enter into the smartphone through


Bluetooth and SMS.

It automatically filters the virus and data seperately.

Finally delete the virus from data and keeps the data in proper
storage medium.

This can provide protection for all application in mobile


phones.
THANK YOU

You might also like