Android Based Remote System Security and Monitoring
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Face recognition presents a challenging problem in the field of image analysis and computer vision, and as such has received a great deal of attention over the last few years because of its many applications in various domains. This paper refers to principal component analysis algorithm (PCA) for face recognition. This face recognition system detects the faces as an image captured by the web cam and these images are checked with images dataset based on database server and in any case captured image not found in the database then further decision or action is taken the administrators remote system. In this paper we present the implementation of access to system and identity management for endpoint protection and data security from USB devices to maintain information security and data theft prevention. Key logger programs attempt to retrieve confidential information by covertly capturing user input via Keystroke monitoring and then relaying this information to others.
Authors and Affiliations
Archana Gupta, Pankaj Meel, Ashwini Salvi, Sourabh Shetty, Lakshmi Madhuri
Artificial Bee Colony algorithm using Structured Swarm
Swarm Intelligence is a meta-heuristic approach in the field of nature inspired techniques that is used to solve optimization problems. It is based on the collective behaviour of social creatures. Social creatures utili...
Spatial Aware Query Processing For Social Networks
With the rapid advances in positioning and smartphone technologies, a number of social networks namely Facebook and twitter are gaining the dimension of location. Most of the location-based social networks released chec...
VAS AC Refigeration System by Exhaust of Automotive Engine
Air conditioning cabin of a transport truck is a new concept in India and has not been addressed. But in summer, the temperature in some parts of India is very high and results in unbearable cabin temperatures. In such...
DSP Based Vedic Multiplier
Digital signal processors (DSPs) are very imperative in various methodological field in the at hand scenario. In today’s world Fast burgeoning is one of the very important methods in DSPs. Fast multiplication is used fo...
An Algorithm for Creating Malicious Free Absolute Trust Peers in P2P Networks
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. The peers evaluate other peers based on their past interactions and then aggregate t...