Professional Documents
Culture Documents
3D Point Plotting Robot For Evacuation
3D Point Plotting Robot For Evacuation
FOR EVACUATION
A PROJECT REPORT
BACHELOR OF ENGINEERING
In
COMPUTER ENGINEERING
Submitted By
Prof.VINOD N ALONE
UNIVERSITY OF MUMBAI
2018-2019
3D POINT PLOTTING ROBOT
FOR EVACUATION
A PROJECT REPORT
BACHELOR OF ENGINEERING
In
COMPUTER ENGINEERING
Submitted By
KELSKAR RAJAN
GHATMALE PRERANA RAVINDRA
KHOPADE NIKITA BHIMRAO
JADHAV RAHUL ASHOK
Under the guidance of
Prof.VINOD N ALONE
UNIVERSITY OF MUMBAI
2018-2019
PADMABHUSHAN VASANTDATA PATIL PRATISHTHAN’S COLLEGE OF
ENGINEERING SION,MUMBAI-400022
CERTIFICATE
This is to certify that the project work, entitled 3D POINT CLOUD POINTING ROBOT FOR
EVACUATION has completed successfully for the award of the Bach-elor of Engineering in
Computer Engineering by
Project Guide
COLLEGE OF ENGINEERING
SION,MUMBAI-400022
This is to certify that the project work, entitled 3D POINT CLOUD POINTING ROBOT FOR
EVACUATION is approved for the award of the Bachelor of Engineering in Computer
Engineering completed by
Name Name
Date Date
Principal
ABSTRACT
Most developing countries in the world have pothole- lled roads mainly because they are unable
to allocate adequate funds for road maintenance. Absence of e ective systems to monitor road
surfaces also contributes to this otherwise preventable situation. A road - surface- monitoring
system, which helps to detect the damages to the surface before it gets worse, can bring down the
cost of road maintenance signi cantly. However, most government-funded road authorities in the
developing countries are unable to a ord such expensive systems. We have come up with a low-
cost, road-surface-monitoring method, named as Pot Holes and Pit Falls Spotter, which employs
a small device mounted on public transport buses, as a viable solution to this problem. The
information would be conveyed in the manner which can be understood and used by the o cial.
We in this project try to design and build such a system. In this system the access point collects
the information about the potholes in the vicinity of a wireless access point and captures images
and nds the location using GPS module in terms latitude and longitude and sent back to
authorized person.
ACKNOWLEGEMENT
The project report on Performance tracking System is the outcome of the guidance, moral
support and devotion bestowed on our group throughout our work. For this we ac-knowledge and
express our profound sense of gratitude to everybody who has been the source of inspiration
throughout project preparation. First and foremost we o er our sincere phrases of thanks and
We also would like to express our deepest gratitude to Dr.M.A.Devmane, HOD, Computer
Department, PVPPCOE for providing the valuable inputs. The consistent guidance and support
provided by Dr.Alam Shaikh, Principal, PVPPCOE is very thankfully acknowledged for key role
played by him in providing us with precious ideas and suggestions and help that enabled in
shaping the project work.
We can say in words that we must at outset tender our intimacy for receipt of a ec-tionate
care to PVPPCOE for providing such a stimulating atmosphere and conducive work environment
SPONSORSHIP LETTER(if any)
Contents
List of Tables iv
1 Introduction 1
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Aim and Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2 Literature Survey 5
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Existing System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.3 Need of New System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.4 Problem De nition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
i
3.2.2 Software Requirement . . . . . . . . . . . . . . . . . . . . . . . . . . 12
3.3 Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.3.1 All UML Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.4 Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.5 Timeline Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.6 Cost Estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5 Conclusion 40
5.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
5.2 Future Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
References 42
PUBLICATIONS 43
ii
List of Figures
iii
List of Tables
iv
Chapter 1
Introduction
1.1 Introduction
Most developing countries in the world have pothole- lled roads mainly because they are un-able
to allocate adequate funds for road maintenance. Absence of e ective systems to mon-itor road
surfaces also contributes to this otherwise preventable situation. A road surface-monitoring
system, which helps to detect the damages to the surface before it gets worse, can bring down the
cost of road maintenance signi cantly. However, most government-funded road authorities in the
developing countries are unable to a ord such expensive systems. We have come up with a low-
cost, road-surface-monitoring method, named as Pot Holes and Pit Falls Spotter, which employs
a small device mounted on public transport buses, as a viable solution to this problem.
A developing country undoubtedly needs a network of healthy and travelable roads to meet the
demand of ever increasing tra c. However, many countries, such as Sri Lanka, have roads dotted
with potholes, but no road monitoring system to watch the road condition before the damage to
the surface due to wear and tear becomes very expensive to repair.
1
There are several advantages of having an e ective road surface monitoring system, though
they are very expensive. Such a system can identify problem areas early and the relevant
authorities can be alerted in time to take preventive measures. Preventive measures always save
money. Besides, the studying of the data collected through a monitoring system leads to a better
understanding of the road deterioration process, which will come in handy when new road
networks are being planned. Although, in the long-run, a monitoring system helps the cost of
road maintenance outweigh its initial investment cost, developing countries always look for a
low cost apparatus to solve their problem. We stumbled upon a low cost solution for road surface
condition monitoring while designing the Pot Holes and Pit Falls Spotter. We are developing a
hardware which could be attached over the public transport vehicles and the functionality of the
hardware is to detect any pot holes or pit falls on the road, take the picture of the scene, nd the
exact location of it using GPS navigation in terms of latitude and longitude and nally send the
data to the respected authority. Similarly all the data related to the location of the potholes would
be sent to the authority. A server side technology will be used by the authorities, which would be
useful to get the statistical data view to the user. The collected data can be then processed to
locate potholes along the path traversed earlier by the vehicle. Herein we present a technique to
analyse and process the acceleration data obtained from the sensors to achieve the
aforementioned objective with a reasonable accuracy.
With the increase in worlds population, there has been increasing load on the infrastructure.
Roads have been ooded with the vehicular tra c. It has become increasingly di cult to manage this
tra c. This is the prime motivation behind making a vehicle intelligent enough to aid driver in
various aspects. One of the increasing problems the roads are facing is worsened road conditions.
Because of many reasons like rains, oil spills, road accidents or inevitable wear and tear make
the road di cult to drive upon. Unexpected hurdles on road may cause more accidents. Also
because of the bad road conditions, fuel consumption of the vehicle increases; causing wastage
of precious fuel. Because of these reasons it is very important to get the information of such bad
road Conditions.
2
But there are various challenges involved in this. First of all there are various methods to get the
information about the road conditions. Then this information must be collected and distributed
over a database with sessional arrangements.Lastly the information must be conveyed in the
manner which can be understood and used by the o cial. We in this project try to design and
build such a system. In this system the access point collects the information about the potholes in
the vicinity of a wireless access point and captures images and nds the location using GPS
module in terms latitude and longitude and sent back to authorised person
Many of the key imaging functions break down into highly repetitive tasks that are well suited to
microcontroller used, especially those with built-in hardware multipliers and onchip RAM. The
remaining tasks require hardware more suited to control ows and decision making such as
camera pod and Sharp IR range sensor. To gain the full bene t of both approaches, systems are
required that can e ectively combine both Camera and sensor within itself and use a single
transmission channel. With the addition of standard imaging functions written MATLAB of the
key building blocks are available for making an image processing system. Using the MATLAB
functions provided with the camera we can implement the hardware for the project. This project
could be an excellent learning experience in various engineering disciplines. The Digital Signal
Processing algorithms are now to be implemented in MATLAB so that the results can be
compared as well as simulations can be done for optimum performance.
3
1.5 Contribution
The major contributions are,The development of the pot holes and pitfalls nding system. In this
system the access point collects the information about the potholes in the vicinity of a wireless
access point and captures images and nds the location using GPS module in terms latitude and
longitude and sent back to authorized person.
The organization of the report is as follows: Chapter 2 presents the Literature Survey and a brief
insight into related work. Chapter 3 is a technical chapter in which we have briey discussed
about the Design and Implementation. chapter 4 is the Result and Discussions chapter Finally in
chapter 5 we present the conclusions.
4
Chapter 2
Literature Survey
2.1 Introduction
Interest in Pot Holes and Pit Falls Spotter comes from the problems caused by tra c con-gestion
worldwide and a synergy of new information technologies for simulation, real-time control and
communications networks. Tra c congestion has been increasing world-wide as a result of
increased motorization, urbanization, population growth and changes in population density.
Congestion reduces utilization of the transportation infrastructure and increases travel time, air
pollution, fuel consumption and most importantly tra c accidents. The core reason for this
increase in congestion is the untreated pot holes or may be pit falls. The government are unable
to allocate adequate funds for road maintenance. Absence of e ective systems to monitor road
surfaces also contributes to this otherwise preventable situation. A road-surface-monitoring
system, which helps to detect the damages to the surface before it gets worse, can bring down the
cost of road maintenance signi cantly. However, most government-funded road authorities in the
developing countries are unable to a ord such expensive systems.
5
2.2 Existing System
Presently in the Concrete Jungle as we say, have the solution to ll the potholes but there is no
solution to detect the pothole. That is there is no mechanism which could be helpful in
monitoring the presence of pothole or pit falls on the road and send the details with the location
and how serious matter the particular part is to the authority. This has motivated us to come up
with this project and provide the same to the government. Our hardware could be precisely
attached to the base of the government vehicles or propriorily to BEST buses in the country. This
hardware could be placed adjacent to the stroke absorber of the vehicle. The functionality of the
hardware is to detect the pot hole as such it is encountered and capture the image using the
camera installed in it, nd its location using the GPS module and navigation chip in terms of
Latitude, Longitude and Altitude to be more precise. The server side will maintain a database
send by the hardware and will have a ne proper categorization of the location based pothole and
One of the increasing problems the roads are facing is worsened road conditions. Because of
many reasons like rains, oil spills, road accidents or inevitable wear and tear make the road di
cult to drive upon. Unexpected hurdles on road may cause more accidents. Also because of the
bad road conditions, fuel consumption of the vehicle increases; causing wastage of precious fuel.
Because of these reasons it is very important to get the information of such bad road Conditions
to the respective o cials because they have devices to automatically full the pot holes but nothing
to collect this information and distribute it to o cials. But there are various challenges involved in
this. First of all there are various methods to get the information about the road conditions. Then
this information must be collected and distributed over a database with sessional arrangements.
6
A road-surface-monitoring system, which helps to detect the damages to the surface before it
gets worse, can bring down the cost of road maintenance signi cantly. However, most
government-funded road authorities in the developing countries are unable to a ord such
expensive systems. We have come up with a low-cost, road-surface-monitoring method, named
as Pot Holes and Pit Falls Spotter, which employs a small device mounted on public transport
buses, as a viable solution to this problem.
We are developing a hardware which could be attached over the public transport vehicles and
the functionality of the hardware is to detect any pot holes or pit falls on the road, take the
picture of the scene, nd the exact location of it using GPS navigation in terms of latitude and
longitude and nally send the data to the respected authority. Similarly all the data related to the
location of the potholes would be sent to the authority. A server side technology will be used by
the authorities, which would be useful to get the statistical data view to the user. The collected
data can be then processed to locate potholes along the path traversed earlier by the vehicle.
Herein we present a technique to analyse and process the acceleration data obtained from the
sensors to achieve the aforementioned objective with a reasonable accuracy.
Pot hole detection system is a system that aims at warning the respected authority about the
uneven roads and potholes in its path, giving them a clear idea of the priority based problem
solving. We study the di erent ways in which goal of the system can be achieved. We justify the
methods we have chosen in this project. And then we give details about the working of the di
erent subsystems.
The problem statement can be given as follows. This system consists of three main components one is
the IR sharp range sensor, second is the camera pod and other is the GPS module. Access points
7
taking the feedback from vehicles, updating the information in repository and broadcasting the
information to the authority over the server side. Whereas this project hardware which is the small
device placed in vehicle is responsible for sensing those potholes which it did not have previous
information about, locating and warning the driver about the potholes which it has information about,
and giving the data about newly sensed pothole to access point.
The whole scenario works as follows. The IR sharp sensor will constantly check for the
patches of pothole using distance calculation. When the distance is exceeded beyond the prede
ned value, it means the pothole is spotted at the area and the camera will be positioned at the
pothole capturing image of the pothole, at this time the GPS module will trigger and will use the
tracking satellites and will trigger the transmitter to transmit the data based on the location the
module. This data, image and the location, will be send to the server side using the Zigbee
module installed over the robot, to the authority holding the receiver. The receiver will have a
clear map APIs to get the location of the Pothole with marker and layer facility.
8
Chapter 3
Most developing countries in the world have pothole- lled roads mainly because they are unable
to allocate adequate funds for road maintenance[1]. Absence of e ective systems to monitor road
surfaces also contributes to this otherwise preventable situation. A road-surface-monitoring
system, which helps to detect the damages to the surface before it gets worse, can bring down the
cost of road maintenance signi cantly. However, most government-funded road authorities in the
developing countries are unable to a ord such expensive systems. We have come up with a low-
cost, road-surface-monitoring method[2], named as Pot Holes and Pit Falls Spotter, which
employs a small device mounted on public transport buses, as a viable solution to this problem.
We are developing a hardware which could be attached over the public transport vehicles[2] and
the functionality of the hardware is to detect any pot holes or pit falls on the road, take the picture of
the scene, nd the exact location of it using GPS navigation in terms of lat-itude and longitude and
nally send the data to the respected authority. Similarly all the data related to the location of the
potholes would be sent to the authority. A server side technology will be used by the authorities,
9
view to the user. The collected data can be then processed to locate potholes along the path
traversed earlier by the vehicle. Herein we present a technique to analyse and process[3] the
acceleration data obtained from the sensors to achieve the aforementioned objective with a
reasonable accuracy
We have come up with a low-cost, road-surface-monitoring method, named as Pot Holes and Pit
Falls Spotter which requires the following hardware and software gathering
Firebird 5
The Fire Bird V robot is the 5th in the Fire Bird series of robots. First two versions of the robots
were designed for the Embedded Real-Time Systems Lab, Department of Computer Science and
Engineering, IIT Bombay. Theses platforms were made commercially available from the version
3 onwards. All the Fire Bird V series robots share the same main board and other accessories. Di
erent family of microcontrollers can be added by simply changing top microcontroller adapter
board. Fire Bird V supports ATMEGA2560 (AVR), P89V51RD2 (8051) and LPC2148 (ARM7)
microcontroller adapter boards. This modularity in changing the microcontroller adapter boards
For accurate distance measurement, robot uses Sharp IR range sensors. Robot can be tted with ve
IR range sensors as shown in gure 3.29. Sharp IR range sensors consists of IR LED and linear
CCD array, both encapsulated in the housing with precision lens assembly
10
Figure 3.1: Fire Bird V ATMEGA2560 robot block diagram
mounted in front of them. IR LED with the help of the leans transmits a narrow IR beam. When
light hits the obstacle and reects back to the linear CCD array, depending on the distance from
the obstacle, angle of the reected light varies. This angle is measured using the CCD array to
estimate distance from the obstacle. It gives same response to di erent coloured objects as
measured distance is function of the angle of reection and not on the reected light intensity.
Sensor gives out analog voltage corresponding to angle of reection.
Figure 3.2: Infrared Range nder sensor and its inside view
Relationship between the angle of reection and output voltage is not linear because of
trigonometry involved. These sensors have blind spot in the range of 0mm to some speci c
distance depending on the type of the sensor. In the blind spot region sensor gives incorrect
readings. Table 3.9 gives information about sensing range and the blind spot distance for the
particular sensor.
11
Table 3.1: Sharp IR Range sensors coverage
Sensor Range Blind Spot
GP2D120X 30cm to 20cm 4cm to 0cm
GP2Y0A02YK 80cm to 10cm 10cm to 0cm
Atmel Studio
AVR studio is an Integrated Development Environment (IDE) for writing and debugging AVR
applications. As a code writing environment, it supports includes AVR Assembler and any
external AVR GCC compiler in a complete IDE environment. AVR Studio gives two main
advantages:
1. Edit and debug in the same application window. Faster error tracking.
2. Breakpoints are saved and restored between sessions, even if codes are edited.
Middle window shows current code under development. Window on the left side shows view of
source les, header les, External dependencies, and other les. Right side window shows all the ports
and other peripherals status. Bottom window is known as Build window. It shows results of the
All AVR microcontrollers can be programmed using In System Programming (ISP), external
programmer or using boot loader. Advantage with the boot loader is that you dont need any external
hardware to load .hex le on the microcontroller. It also protects robots hardware from possible
damage due to static electricity and prevents any accidental changes in the fuse settings of the
12
Figure 3.3: Atmel Studio
it allows in system programming directly via serial port without any need for the external ISP
programmer. Code responsible for In System Programming via serial port (boot loader) resides
in the con gurable boot memory section of the microcontroller. When signaled using external
switch while resetting the microcontroller it gets active and waits for communication from the
PC for copying .hex le on the microcontrollers ash memory. PC sends the .hex le to the
microcontroller. Code residing in the boot section loads the .hex le on the microcontrollers ash
memory. After the boot loading process is complete, newly loaded code can be executed by
pressing reset. Once the code is loaded on the microcontroller UART is free and can be used for
other applications. Bootloader get invoked only if boot switch is kept pressed while
microcontroller is reset using reset switch. 2.6.2 Programming the robot via Bootloader from
NEX Robotic.
13
Figure 3.4: AVR Loader
3.3 Design
14
Figure 3.6: Sequence Diagram
3.4 Algorithm
4. Rotate the servo motor mounted with the IR Sharp Sensor within a range of 0-180 degrees.
15
Figure 3.8: Data Flow Diagram
6. If the value is constant or is less than or equal to threshold value, then go to step 4,
7. Else a pothole is detected, hence stop the servo motor and move camera pod to the
direction of pothole.
8. Capture image, camera(); and locate the pothole using GPS module, locate(latitude,
longitude);
10. Go to step 4.
Write here about the cost estimation techniques such as COCOMO Model
16
Figure 3.9: Timeline Chart
The practical application of the project goes like by providing the hardware to the govern-ment
for instance the BMC. Now the client will be provided with the hardware and the website
wherein the hardware will be attached to the vehicles and the software will con-stantly keep
updating the o cials with the required details and updates on the same i.e. the location of the
pothole will be provided along with the prioritized categorization of the place to be treated
formerly and e ciently. The authority must install the package provided by us. The package will
have the required settings to be done over the server side. After that, the client just needs to start
with the website and click on the view map link. This will be redirecting them to Google Maps
API with marker and layer system to get the location of the map. By moving the cursor on the
marker, he can view the location address and by clicking on the advance view, he could set
priority based deduction to view the result. Thus the o cial can think on lling mechanism of the
pothole. Once done, the software will rescan the place to see whether the place is normalised and
the appropriate updates will be provided.
17
Chapter 4
4.1 Codes
#d e f i n e F CPU 14745600
#d e f i n e RS 0
#d e f i n e RW 1
#d e f i n e EN 2
#d e f i n e l c d p o r t PORTC
#d e f i n e s b i t ( reg , b i t ) r e g j= (1<<b i t )
#d e f i n e c b i t ( reg , b i t ) r e g &= ~(1<< b i t )
#i n c l u d e <avr / i o . h>
#i n c l u d e <avr / i n t e r r u p t . h>
#i n c l u d e <u t i l / d e l a y . h>
#i n c l u d e <math . h> // i n c l u d e d t o s u p p o r t power f u n c t i o n
void timer5 init();
18
void lcd reset();
void lcd init();
v o i d lcd wr command ( u n s i g n e d c h a r ) ;
void lcdwrchar(char);
void lcd line1();
void lcd line2();
unsigned i n t temp ;
unsigned int unit;
f
DDRC = DDRC j 0 x08 ;
PORTC = PORTC & 0xF7
g
void lcd port config (void)
19
void adc pin config (void)
f
DDRF = 0 x00 ; // s e t PORTF d i r e c t i o n a s i n p u t
PORTF = 0 x00 ; // s e t PORTF p i n s f l o a t i n g
DDRK = 0 x00 ; // s e t PORTK d i r e c t i o n a s i n p u t
PORTK = 0 x00 ; // s e t PORTK p i n s f l o a t i n g
g
void servo1 pin config (void)
f
DDRB = DDRB j 0 x20 ; // making PORTB 5 p i n output
PORTB = PORTB j 0 x20 ; // s e t t i n g PORTB 5 p i n t o l o g i c 1
DDRB = DDRB j 0 x40 ; // making PORTB 5 p i n output
f
motionpinconfig();
buzzerpinconfig();
20
lcd port config();
g
void timer5 init()
f
TCCR5B = 0 x00 ; // Stop
TCNT5H = 0xFF ;
TCNT5L = 0 x01 ;
OCR5AH = 0 x00 ;
// Output compare re gis ter high value f o r L e f t Motor
OCR5AL = 0xFF ;
g
voidvelocity(unsignedcharleftmotor,unsignedcharrightmotor)
21
OCR5AL = ( u n s i g n e d char)left motor;
g
void motionset (unsigned char Direction)
f
u n s i g n e d c h a r PortARestore = 0 ;
D i r e c t i o n &= 0x0F ;
// removing upper n i b b e l f o r the protection
PortARestore = PORTA;
// r e a d i n g t h e PORTA o r i g i n a l status
PortARestore j= Direction;
PORTA = PortARestore ;
// e x e c u t i n g t h e command
g
void forward (void)
f
m o t i o n s e t ( 0 x06 ) ;
g
void stop (void)
f
m o t i o n s e t ( 0 x00 ) ;
g
void buzzeron (void)
f
unsigned char portrestore=0;
22
port restore = PINC ;
g
void buzzer off (void)
f
unsigned char port restore=0;
p o r t r e s t o r e = PINC ;
port restore =port r e s t o r e & 0xF7 ;
PORTC = p o r t r e s t o r e ;
g
void adc init()
f
ADCSRA = 0 x00 ;
ADCSRB = 0 x00 ;
//MUX5 = 0
ADMUX = 0 x20 ;
// V r e f=5V e x t e r n a l ADLAR=1 MUX4: 0 = 0000
ACSR = 0 x80 ;
ADCSRA = 0 x86 ;
//ADEN=1 ADIE=1 ADPS2: 0 = 1 1 0
g
void timer1init(void)
f
TCCR1B = 0 x00 ; // s t o p
23
// Counter low v a l u e t o which OCR1xH v a l u e i s t o be compared with
OCR1AH = 0 x03 ; // Output compare R e g i s t e r h i g h value for servo 1
OCR1AL = 0xFF ; // Output Compare R e g i s t e r low Value For servo 1
OCR1BH = 0 x03 ; // Output compare R e g i s t e r h i g h v a l u e for servo 2
OCR1BL = 0xFF ; // Output Compare R e g i s t e r low Value For servo 2
OCR1CH = 0 x03 ; // Output compare R e g i s t e r h i g h v a l u e for servo 3
g
void init devices (void)
c l i ( ) ; // C l e a r s t h e g l o b a l i n t e r r u p t s p
ortinit();
timer1init();
timer5init();
adcinit();
s e i ( ) ; // Enables t h e g l o b a l i n t e r r u p t s g
void lcd set 4bit()
f
delayms(1);
c b i t ( l c d p o r t , RS ) ;
c b i t ( l c d p o r t ,RW) ;
24
l c d p o r t = 0 x30 ;
s b i t ( l c d p o r t ,EN ) ;
delay m s ( 5 );
c b i t ( l c d p o r t ,EN ) ;
delay m s ( 1 );
c b i t ( l c d p o r t , RS ) ;
c b i t ( l c d p o r t ,RW) ;
l c d p o r t = 0 x30 ;
s b i t ( l c d p o r t ,EN ) ;
delay m s ( 5 );
c b i t ( l c d p o r t ,EN ) ;
delayms(1);
c b i t ( l c d p o r t , RS ) ;
c b i t ( l c d p o r t ,RW) ;
l c d p o r t = 0 x30 ;
s b i t ( l c d p o r t ,EN ) ;
delay m s ( 5 );
c b i t ( l c d p o r t ,EN ) ;
delay m s ( 1 );
c b i t ( l c d p o r t , RS ) ;
c b i t ( l c d p o r t ,RW) ;
l c d p o r t = 0 x20 ;
s b i t ( l c d p o r t ,EN ) ;
delay m s ( 1 );
c b i t ( l c d p o r t ,EN ) ;
g
v o i d lcd wr command ( u n s i g n e d c h a r cmd)
25
f
u n s i g n e d c h a r temp ;
temp = cmd ;
temp = temp & 0xF0 ;
lcd port &= 0x0F ;
c b i t ( l c d p o r t ,EN ) ;
cmd = cmd & 0x0F ;
cmd = cmd<<4;
l c d p o r t &= 0x0F ;
l c d p o r t j= cmd ;
c b i t ( l c d p o r t , RS ) ;
c b i t ( l c d p o r t ,RW) ;
s b i t ( l c d p o r t ,EN ) ;
delay m s ( 5 );
c b i t ( l c d p o r t ,EN ) ;
g
v o i d lcd home ( )
f
lcd wr command ( 0 x80 ) ;
g
v o i d l c d c u r s o r ( c h a r row , c h a r column )
26
s w i t c h ( row )
f
case 1 : lcd wr command ( 0 x80 + column 1 ) ; break ;
case 2 : lcd wr command ( 0 xc0 + column 1 ) ; break ;
case 3 : lcd wr command ( 0 x94 + column 1 ) ; break ;
case 4 : lcd wr command ( 0 xd4 + column 1 ) ; break ;
d e f a u l t : break ;
g
g
void lcd wr char(char letter)
f
c h a r temp ;
temp = l e t t e r ;
temp = ( temp & 0xF0 ) ;
l c d p o r t &= 0x0F ;
l c d p o r t j= temp ;
s b i t ( l c d p o r t , RS ) ;
c b i t ( l c d p o r t ,RW) ;
s b i t ( l c d p o r t ,EN ) ;
delay m s ( 5 );
c b i t ( l c d p o r t ,EN ) ;
27
s b i t ( l c d p o r t ,EN ) ;
delayms(5);
c b i t ( l c d p o r t ,EN ) ;
g
void lcdstring(char str)
f
w h i l e ( s t r != ’ n0 ’ )
f
lcdwrchar( str);
s t r ++;
g
g
v o i d l c d p r i n t ( c h a r row , c h a r coloumn , u n s i g n e d i n t value , i n t d i g i t s )
f
unsigned char f l a g =0;
i f ( row ==0jjcoloumn==0)
f
lcd home ( ) ;
g
else
f
lcd c u r s o r ( row , coloumn ) ;
g
i f ( d i g i t s ==5 j j f l a g ==1)
f
m i l l i o n=v a l u e /10000+48;
lcdwrchar(million);
28
f l a g =1;
g
i f ( d i g i t s ==4 j j f l a g ==1)
f
temp = v a l u e / 1 0 0 0 ;
thousand = temp%10 + 4 8 ;
l c d w r c h a r ( thousand ) ;
f l a g =1;
g
i f ( d i g i t s ==3 j j f l a g ==1)
f
temp = value/100;
hundred = temp%10 + 4 8 ;
l c d w r c h a r ( hundred ) ;
f l a g =1;
g
i f ( d i g i t s ==2 j j f l a g ==1)
f
temp = value/10;
t e n s = temp%10 + 48;
lcd wr char(tens);
f l a g =1;
i f ( d i g i t s ==1 j j f l a g ==1)
f
unit= v a l u e %10 + 4 8 ;
lcdwrchar(unit);
29
g
i f ( d i g i t s >5)
f
lcdwrchar(’E’);
g
unsigned i n t Sharp GP2D12 estimation ( u n s i g n e d char adc reading)
f
float distance;
unsigned int distanceInt;
d i s t a n c e = ( i n t ) ( 1 0 . 0 0 ( 2 7 9 9 . 6 ( 1 . 0 0 / ( pow ( a d c reading,1.1546)))));
distanceInt=(int)distance;
i f ( d i s t a n c e I n t >800)
f
d i s t a n c e I n t =800;
g
return distanceInt;
g
u n s i g n e d c h a r ADC Conversion ( u n s i g n e d c h a r Ch)
f
unsigned char a;
i f (Ch>7)
f
ADCSRB = 0 x08 ;
g
Ch = Ch & 0 x07 ;
ADMUX= 0 x20 j Ch ;
30
ADCSRA = ADCSRA j 0 x40 ;
// S e t s t a r t c o n v e r s i o n b i t
w h i l e ( (ADCSRA&0x10 )==0);
// Wait f o r ADC c o n v e r s i o n t o complete
a=ADCH;
g
unsigned int sharp s e n s o r ( c h a r row , char column , u n s i g n e d char channel)
f
s h ar p = ADC Conversion ( c h a n n e l ) ;
g
void servo1(unsigned char degrees)
f
float PositionPanServo=0;
PositionPanServo=((float)degrees / 1.86)+35.0;
OCR1AH = 0 x00 ;
OCR1AL = ( u n s i g n e d c h a r ) P o s i t i o n P a n S e r
vo;g
void servo2(unsigned char degrees)
f
float PositionTiltServo=0;
PositionTiltServo=((float)degrees / 1.86)+35.0;
31
OCR1BH = 0 x00 ;
OCR1BL = ( u n s i g n e d c h a r ) P o s i t i o n T i l t S e r v
o;g
f
float PositionServo=0;
PositionServo=((float)degrees / 1.86)+35.0;
OCR1CH = 0 x00 ;
OCR1CL = ( u n s i g n e d ch a r ) PositionServo;
g
void servo 1 free ( v o i d ) // makes servo 1 free rotating
f
OCR1AH = 0 x03 ;
OCR1AL = 0xFF ; // Servo 1 o f f
g
void servo 2 free ( v o i d ) // makes servo 2 free rotating
f
OCR1BH = 0 x03 ;
OCR1BL = 0xFF ; // Servo 2 o f f
g
void servo 3 free ( v o i d ) // makes servo 3 free rotating
f
OCR1CH = 0 x03 ;
OCR1CL = 0xFF ; // Servo 3 o f f
g
void lcd init()
32
delayms(1);
lcd wr command ( 0 x28 ) ;
lcd wr command ( 0 x01 ) ;
lcd wr command ( 0 x06 ) ;
lcd wr command ( 0 x0E ) ;
lcd wr command ( 0 x80 ) ;
g
i n t main ( v o i d )
f
unsigned int value;
u n s i g n e d c h a r deg = 9 0 ;
i n t check =0;
init devices();
lcd set 4bit();
lcd init();
servo1(90);
s e r v o 2 ( deg ) ;
s e r v o 3 ( deg ) ;
while(1)
f
i f ( deg >=180)
f
check = 0 ;
g
e l s e i f ( deg <=0)
f
check =1;
33
g
i f ( check )
f
deg +=10;
g
else
f
deg =10;
g
s e r v o 3 ( deg ) ;
lcdcursor(2,3);
forward();
velocity(150,150);
v a l u e=s h a r p s e n s o r ( 1 , 5 , 1 1 ) ;
i f ( value >600)
f
buzzeron();
s e r v o 2 (180 deg ) ;
delayms(500);
buzzeroff();
delayms(2000);
servo1free();
servo2free();
g
g
34
4.2 Software Results
The hardware developed sends the following data to the receiver system, connected to the
database administrator provided to the client. The receiver will create the respective database and
will insert the data to the map marker on the screen. The image of the pothole
could be viewed by just clicking on the view image button provided on the priority screen. This
tag provides the image of the pothole detected by the camera pod while detection. As shown in
the gure, the image is captured by the camera pod and detected by the software TV Home Media.
35
4.3 Screen Shots
Software testing methods are traditionally divided into black box testing and white box testing.
These two approaches are used to describe the point of view that a test engineer
36
takes when designing test cases.
37
4.5 Test Case Report
38
4.6 Cost of the Project
39
Chapter 5
Conclusion
5.1 Summary
To gain the full bene t of both approaches, systems are required that can e ectively com-bine both
FPGAs and DSPs. With the addition of standard imaging functions written in either VHDL or C
all of the key building blocks are available for making an image processing system.Using the
DSP functions provided with the camera we can implement the hardware for the project.This
research has been an excellent learning experience in various engineering disciplines. The
Digital Signal Processing algorithms are now to be implemented in MAT-LAB so that the results
can be compared as well as simulations can be done for optimum performance. Various choices
for implementing the System have been studied. These choices were also compared to each other
on various criterions. We have speci ed the High level design choices of the Subsystems and justi
ed the corresponding selections. We did exper-iments on the platform called Firebird. We were
also able to characterize road condition into categories like smooth, moderately uneven and
highly uneven from the results of the experiments.
40
5.2 Future Scope
In future we propose to do more experiments with variety of the scenario. Our next and
immediate step is to use the Accelerometer on real vehicles and measure their response. Apply di
erent scenarios like potholes on the slopes, turns and see how the accelerome-ter readings can
characterize such condition. Along with that in remaining January and February we want to
come up with and formalize the alternate solution for the Localization subsystem. In next months
of March and April we perform simulations for given scenarios in Communication subsystem.
And we plan to come up with values for the related parameters. For example Loss in throughput
because of increase in number of vehicle, Loss in vehicle throughput because of the increase in
spee d. In the month of May and June we perform the more experiments regarding the
Localization system. If we are not able to come up with alternate solution; then we will perform
the experiments regarding integration of the rest of the system with GPS.
41
References
[1] John Crank. The mathematics of di usion. Oxford university press, 1979.
[2] Atul H Shintre and Shanta Sondur. Improved blocking expanding ring search (i-bers)
protocol for energy e cient routing in manet. In Recent Advances and Innovations in
Engineering (ICRAIE), 2014, pages 1{6. IEEE, 2014.
[3] CR Wylie and LC Barrett. Advanced engineering mathematics 6th edition. 1995.
42
Publications
Paper Published
43
Content Based Publisher/Subscriber Cloud Computing System
using Event Matching.
Mr. Vinod N. Alone , Prof. Sanjay B. Waykar,
Department of Computer Engineering, Department of Computer Engineering,
Sinhgad Institute,Lonavala , Sinhgad Institute,Lonavala , Pune.
Pune. sbwaykar@gmail.com
vinodalone4774@gmail.com
1
helpful to optimize the design of subscription state, which is done System Design
by Meghdoot. Scribe is channel/topic based publish/subscribe
system. The different mechanism of Pastry like fault-resilience,
locality, and scalability are used in scribe. The Pastry works on a SREM Design
mechanism which builds an efficient multicast tree. The groups
had been created by Scribe so that it can multicast them for To support large-scale users, we consider a cloud computing
balancing the load among the nodes who had participated. environment with a set of geographically distributed data
Pastry's properties enable Scribe to expressively use locality to centers through the Internet. Each datacenter contains a large
build an efficient multicast tree and to handle the decentralized number of servers (brokers), which are managed by a
order the group & join operations. As Scribe is channel based it datacenter management service such as Amazon EC2 or Open
has limited filtering capabilities. Hermes is a pub/sub system that Stack. All brokers in SREM as the front-end are low routing
is built over the Pastry DHT. Hermes uses special nodes which latency; these brokers are connected through a distributed
can be called as rendezvous nodes, which are set up through event overlay, called Skip Cloud. The entire content space is
type messages submitted prior to publishing. Herms use two types partitioned into disjoint subspaces, each of which is managed
of components event brokers and event clients. The broker‟s by a number of brokers. Subscriptions and events are
event implements all the functionality of the Herms and event dispatched to the subspaces that are overlapping with them
clients can be either publishers or subscribers in pub/sub model. through Skip Cloud. Subscriptions and events falling into the
Event brokers uses any type of services and event clients are same subspace are matched on the same broker. After the
always light weight. Herms supports two types of content-based matching process completes, events are broadcasted to the
routing: In type-based routing subscribers receives all the events. corresponding interested subscribers. The subscriptions
In type and attribute based routing allows subscribers to further generated by subscribers S1 and S2 are dispatched to broker
filter to the event type's attributes. In content based publish- B2 and B5, respectively. Upon receiving events from
subscribe system, Terpstra is built over the Chord DHT. Instead publishers, B2 and B5 will send matched events to S1 and S2,
of creating a single multicast tree from a root, it creates separate respectively.
multicast trees rooted at each broker and because of this it is able
to distribute node equally. This uses flooding of subscriptions to
create a multicast tree. Terpstra is built on top of a dynamic peer-
to-peer overlay network. Separate components in Terpstra ensure
that the network self-organises itself to maintain the topology and
can survive the simultaneous failure of up to half of its nodes.
The main disadvantage of Terpstra is its flooding mechanism
which may be drastic. Network coding, in which the intermediary
relay stations are allowed to perform encoding/decoding
operations on the information they receive. To perform the
multicast communication we prefer the Network coding
mechanism. If the intermediary nodes are allowed to perform
coding on the information they receive such as taking the EX-OR
Figure 2: An example of Skip Cloud with eight brokers and three
of two packets or other operations within the appropriate finite levels.
field, then we have a coding strategy. Network coding may
impact on the design of new networking and information Every broker is acknowledged by a binary string. All
dissemination protocols. datacenters due to the various skewed distributions of users‟
interests. The node failure may lead to unreliable and
inefficient routing among servers. To this end, it is organized
servers into Skip Cloud to reduce the routing latency in a
scalable and reliable manner. Such a framework offers a
System Architecture & Overview number of advantages for real-time and reliable data
dissemination. First, it allows the system to timely group
similar subscriptions into the same broker due to the high
bandwidth among brokers in the cloud computing
environment, such that the local searching Time can be
greatly reduced. Second, since each subspace is managed by
multiple brokers, this framework is fault-tolerant even if a
large number of brokers crash straightaway. Third, because
the data center management service provides scalable and
elastic servers, the system can be easily expanded to Internet-
scale.
2
broker‟s identifier is a unique string and shares common Prefix Routing: Prefix routing in Skip Cloud is mainly used
prefix of length m with its Cluster ID. At this level, brokers in to efficiently route subscriptions and events to the top clusters.
the same cluster are accountable for the same content Note that the cluster identifiers at level i + 1 are generated by
subspaces, which provide numerous identical candidates for appending one b-ary to the corresponding clusters at level i. The
each event. relation of identifiers between clusters is the foundation of
routing to target clusters. Briefly, when receiving a routing
Since brokers in the same top cluster generate frequent
request to a specific cluster, a broker examines its neighbor lists
communication among themselves, such as updating of all levels and chooses the neighbor which shares the longest
subscriptions and dispatching events, they are organized into common prefix with the target Cluster ID as the next hop.
a complete graph to reach each other in one hop. After the top
clusters have been well organized, the clusters at the rest
The routing operation repeats until a broker can not find a
levels can be generated level by level. Precisely, each broker neighbor whose identifier is more closer than itself.
decides to join which cluster at every level.
Table 1: Skip Cloud Notations Algorithm 2 describes the prefix routing algorithm
in Pseudo-code.
Skip Cloud Notations ---------------------------------------------------------------------------
Algorithm 2. Prefix Routing
Nb The number of brokers in ---------------------------------------------------------------------------
Skip Cloud
1: l =commonPrefixLength(self.ID, event.ClusterID);
m The number of levels in 2: if (l== m) then
skip cloud 3: process (event);
4: else
Dc The average degree in 5.destB the broker whose identifier matches
each cluster of skip cloud event.ClusterID with the longest common prefix
from self.views.
Nc The number of top 6: lmax=commonPrefixLength(destB.
clusters in skip cloud identifier,event.ClusterID);
7: if (lmax <=l) then
8: destB the broker whose identifier is
Closest to event.ClusterID from view[l].
PROPOSED SYSTEM: 9: if (destB and myself is in the same cluster of Level
l) then
INNOVATIVE STRATEGIES 10: process (event);
11: forwardTo(destB, event);
HPARTITION: In order to take benefit of multiple
distributed brokers, SREM distributes the entire content space Use Case Diagram
among the top clusters of Skip Cloud, so that each top cluster
only switches a subset of the entire space and searches a small
number of candidate subscriptions. SREM employs a hybrid
multidimensional space partitioning technique, called HP
partition, to realize scalable and reliable event matching.
Generally speaking, HP partition divides the entire content space
into disjoint subspaces. Subscriptions and events with
overlapping subspaces are dispatched and matched on the same
top cluster of Skip Cloud .To keep workload balance among
servers; HP partition divides the hot spots into various cold spots
in an adaptive manner
-----------------------------------------------------------------------
3
MODULES DESCRIPTION: tables, which are held in the router's memory. Most of the
We will be implementing following modules in the algorithms on routing uses only one network path at a time.
system through the methodology. Multi-path routing techniques enable the use of multiple
alternative paths to the user. Prefix routing in Skip Cloud is
mainly used to efficiently route subscriptions and events to
the top clusters. Note that the cluster identifiers at a level are
Datacenter / Broker creation: generated by appending one bare to the corresponding
clusters at level i. The relation of identifiers between clusters
In the first module, we develop the Datacenter creation and is the foundation of routing to target clusters. Briefly, when
Broker Creation. To support large-scale users, we consider a receiving a routing request to a specific cluster, a broker
cloud computing environment with a set of geographically examines its neighbor lists of all levels and chooses the
distributed data centers. Each datacenter contains a large neighbor which shares the longest common prefix with the
number of servers (brokers), which are managed by a data target Cluster ID as the next hop. The routing operation
center management service. Our approach is suitable for large repeats until a broker cannot find a neighbor whose identifier
and reasonably stable environments such as that of an is closer than itself.
enterprise or a data center, where reliable publication delivery
is desired in spite of failures. As future work, we would like
to exploit our scheme to allow for multipath load balancing Conclusion & Future Work
and support some of P/S optimization techniques such as In this paper, we have presented broker-less approach in the
subscription covering. It provides an abstract and high-level content-based publish-subscribe system for providing
interface for data producers (publishers) to publish messages authentication and confidentiality. The approach is extremely
and consumers (subscribers) to receive messages that match good for a number of subscribers and publishers in the system
their interest. and the number of keys maintained by them. The keys will be
in cipher-text format which is labeled with credentials
Clustering Method: assigned to publishers and subscribers.
This project introduces SREM, a scalable and reliable event
A cluster is a group of objects that belongs to the same class. matching service for content-based pub/sub systems in cloud
In other words, there are two cluster groups, one for similar computing environment. Scalable Routing and event
objects and other for dissimilar objects groups. Suppose we matching system connects the brokers through a distributed
are given a database of „n' objects and 'k' will be the partition overlay Skip- Cloud, which ensures reliable connectivity
of data in partition method. Each partition will represent a among brokers through its multi-level clusters and brings a
cluster and k ≤ n. It means that it will classify the data into k low routing latency through a prefix routing algorithm.
groups, which satisfy the following requirements: Through a hybrid multi-dimensional space partitioning
technique, SREM reaches scalable and balanced clustering of
Each group contains at least one object. high dimensional skewed subscriptions, and each & every
Each object must belong to exactly one group. event is allowed to be matched on any of its matching
candidate servers. Extensive experiments with real
deployment based on a Cloud-stack test bed are conducted,
producing results which demonstrate that Scalable Routing
Content Space Partitioning: and Event Matching is effective and practical, and also
presents good workload balance, scalability, and reliability
The content space is partitioned into disjoint subspaces, each
under various parameter settings.
of which is managed by a number of brokers. Then each top
cluster only handles a subset of the entire space and searches
a small number of candidate subscriptions. The whole content REFERENCES
space into non-overlapping zones based on the number of its
brokers. After that, the brokers in different cliques who are 1. Muhammad Adnan Tariq, Boris Koldehofe, and Kurt
Rothermel "Securing broker-less publish/subscribe systems
Responsible for similar zones are connected by a multicast using identity-based encryption"IEEE Transactions On
tree. Parallel And Distributed Systems, Vol. 25, No. 2, February
2015
Event Matching: 2. M. Ion, G. Russello, and B. Crispo, “Supporting
Publication and Subscription Confidentiality in Pub/Sub-
The data replication schemes are employed to ensure reliable Networks," Proc. Sixth Int'l ICST Conf. Security and Privacy
event matching. For instance, it advertises subscriptions to the in Comm. Networks (SecureComm), 2010
whole network. When receiving an event, each broker 3. L.I.W. Pesonen, D.M. Eyers, and J. Bacon, "Encryption-
determines to forward the event to the corresponding broker Enforced Access control in Dynamic Multidomain
according to its routing table. These approaches are publish/subscribe network", Proc. ACM Int'l Conf.
inadequate to achieve scalable event matching. Distributed Event-Based Systems (DEBS), 2007.
4. P. Pietzuch, "Hermes: A Scalable Event-Based
Routing Method: Middleware," Ph.D. dissertation, Univ. of Cambridge, Feb.
2004.
The routing process usually forwards the record on the basis 5. M. Srivatsa, L. Liu, and A. Iyengar, EventGuard: A System
of routing tables, where these tables maintain a record of the Architecture for Securing Publish-Subscribe Networks,”
routes to various destination of network. Hence, it is ACM Trans. Computer Systems, vol. 29, article 10,2011.
important for efficient routing; we need to construct routing
4
48
International Journal of Computer Applications (0975 – 8887)
Volume *– No.*, ___________ 2013
1
International Journal of Computer Applications (0975 – 8887)
Volume *– No.*, ___________ 2013
treatment given to applications by android systems. Offensive with suitable installation over millions of android devices
Protection in Android from RIG will also be sensibly across globe.
designed to select the true moments to start and end the
protection process, and efficiently defense itself against rogue Thus there is immense need to develop a security system
apps. The experimental studies show that this new Offensive capable to offensively defend known RIG attacks and provide
Protection in Android from RIG system is independent of OS secured environment for execution of target app and defend
version and works well with small influences on the efficacy user sensitive data from leaking through side & shared
of legitimate apps and also the performance of the OS is communication channels on the application level, without
affected marginally less. touching the OS or the target apps under protection, this
system will be called Offensive Protection in Android from
2. EXISTING SYSTEM RIG, that can be accessed from Google Play store and
Existing solutions for defying Runtime Information Gathering installed on any Android device to acquire immediate
attack needs a revision of either the Android Operating protection of user’s target apps by taking advantage of side
System or the unprotected applications which are at risk. channel information and detection of malicious apps with
Refining the access control mechanism in android system is suspending these malicious apps and avoid permission
also possible to dodge the risk of Runtime information exploitation granted at the time of install.
gathering but all of these approaches unenviably disturb the
system’s efficiency and usability and at the same stage are 4. CONTRIBUTION
time as well as resource consuming. Android provides In the aggressive world of information security, one must
security to each application by sandboxing its space which believe offence Is the best defence and applying the
delights each app exclusively and thus providing process philosophy “to catch a thief think like a thief” so in this
identification and file system access control. Each app is scenario of Runtime information gathering where side
treated as a user thus assigned a user ID (UID), in order to channels are exploited by misusing the permissions granted,
isolate them from each other. This keeps public and shared proposing here an offensive defense system called Offensive
resources out of the scope of this security mechanism causing Protection in Android from RIG where this system will detect
easy resource sharing such as Bluetooth, Internet connection, malicious apps by reading their shared channel data and other
audio, camera captures, etc. among multiple apps and users. logs representing their behaviour which is then stored and
Each app at the time of its installation must be granted a used for detection of these malicious apps. That means trying
permission to access these shared resources. There are Runtime information gathering (RIG Attack) on malicious
different protection levels [7] assigned to each permission, apps to see if they are involved in Runtime information
such as some permission are automatically granted to the apps gathering.
when prompted, some risky permissions need user’s consent,
and critical system permissions for system apps. Apps can Our system works in two different modes as workflow
access these shared resources only with a proper permission described and shown in Fig.1 & Fig.2 below. Our system can
granted. be started from any mode thus providing detection and
protection against unnecessary message reads by third party
There are some serious flaws in this security mechanism. apps or malicious apps.
Such as once a permission is granted then there is no control
of user or OS over how and when that permission grant is
utilized, For example, a non-messaging app with
MESSAGE_READ permission can access all messages as per
its will and wish, an app with CONTACT_READ and
INTERNET_CONNECT permission can transmit sensitive
contacts from phonebook, an app with AUDIO_RECORD
permission can catch all phone conversations and all of this
takes place without discrete knowledge of the user. Added to
this no protection provided to runtime information flow
between apps which can lead to a RIG attack. Rogue apps
running in the background can cause severe damage to
confidentiality of user and integrity of the system. When any
such specific RIG attack happens and identified then Google
& sometimes manufacturer of mobile handset come up with a
security patch which again does not possesses a huge scope of
success against the rest of the other types of RIG attacks.
Scope of application developers or android programmers
revisiting to develop patch for vulnerable app is too much
time consuming and technically impossible because no app
can override the permission grants given to any other app.
Fig 1: Detection Mode
3. PROBLEM DEFINITION
Android is ingenuous to endure the RIG menace. The
operational restrictions, such as public channels and shared
resources, expose it to abundant practices of runtime
information gathering, which resulting into the disclosure of
intense user information. This vulnerability is genuine,
persistent and severe, thus only new methodologies or
techniques can possibly tackle and provide actual solution
2
International Journal of Computer Applications (0975 – 8887)
Volume *– No.*, ___________ 2013
3
International Journal of Computer Applications (0975 – 8887)
Volume *– No.*, ___________ 2013
7. REFERENCES
[1] Nan Zhang, Kan Yuan, Muhammad Naveed, Xiaoyong
Zhou and XiaoFeng Wang, “Leave Me Alone: App-level
Protection Against Runtime Information Gathering on
Fig 4: Performance Measure for Phonebook service Android” in IEEE Symposium on Security and Privacy,
2015. [Online]. Available:
http://ieeexplore.ieee.org/document/7163068/
5. EXPERIMENTAL RESULTS [2] X. Zhou, S. Demetriou, D. He, M. Naveed, X. Pan, X.
Wang, C. A. Gunter, and K. Nahrstedt, “Identity,
location, disease and more: Inferring your secrets from
android public resources,” in Proceedings of 20th ACM
Conference on Computer and Communications Security
(CCS), Nov. 2013. [Online]. Available:
http://www.cs.indiana.edu/∼zhou/files/fp045-zhou.pdf