Android Based Remote System Security and Monitoring
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Face recognition presents a challenging problem in the field of image analysis and computer vision, and as such has received a great deal of attention over the last few years because of its many applications in various domains. This paper refers to principal component analysis algorithm (PCA) for face recognition. This face recognition system detects the faces as an image captured by the web cam and these images are checked with images dataset based on database server and in any case captured image not found in the database then further decision or action is taken the administrators remote system. In this paper we present the implementation of access to system and identity management for endpoint protection and data security from USB devices to maintain information security and data theft prevention. Key logger programs attempt to retrieve confidential information by covertly capturing user input via Keystroke monitoring and then relaying this information to others.
Authors and Affiliations
Archana Gupta, Pankaj Meel, Ashwini Salvi, Sourabh Shetty, Lakshmi Madhuri
A Secure and Adaptable Cloud Data Encryption System using cryptography: A Review
Security of data in cloud is one of the major issues which acts as an obstacle in the implementation of cloud computing. Cloud storage is an important part of cloud computing, which is used to achieve the target of stor...
Training Free Skin Detection Using Luminance Based Approach
Confront discovery is perceiving human faces in pictures caught by the cameras in the manmade brainpower frameworks. Various methodologies have been adopted for face detection. Face recognition techniques are working on...
Warning Tweet: A Detection System for Suspicious URLs in Twitter Stream
Twitter is a social networking site where users can exchange messages to other users particularly their followers. Usually the messages sent over twitter are known as tweets. Users can sent messages or tweets to users w...
Scheduler for Minimum Energy Consumption and Better Job Management in Data Center
In reality, basically Service providers makes a high quality use of IaaS and PaaS to developing their services without consideration of physical components, while users also can access on-demand and pay-peruse services...
A Review on Manufacturing Cycle Time Reduction by Applying Lean Tools and Technique in Small Scale Industries
Cycle time should be painstaking a viable option when an organization is demanding to perk up efficiency, productivity and cost base and customer reaction. Tools of lean manufacturing are used to diminish to the cycle t...