Android Based Remote System Security and Monitoring

Abstract

Face recognition presents a challenging problem in the field of image analysis and computer vision, and as such has received a great deal of attention over the last few years because of its many applications in various domains. This paper refers to principal component analysis algorithm (PCA) for face recognition. This face recognition system detects the faces as an image captured by the web cam and these images are checked with images dataset based on database server and in any case captured image not found in the database then further decision or action is taken the administrators remote system. In this paper we present the implementation of access to system and identity management for endpoint protection and data security from USB devices to maintain information security and data theft prevention. Key logger programs attempt to retrieve confidential information by covertly capturing user input via Keystroke monitoring and then relaying this information to others.

Authors and Affiliations

Archana Gupta, Pankaj Meel, Ashwini Salvi, Sourabh Shetty, Lakshmi Madhuri

Keywords

Related Articles

The Survey of Data Mining Applications and Feature Scope

In this paper we have focused a variety of techniques, approaches and different areas of the research which are helpful and marked as the important field of data mining Technologies. Each place of operation may generate...

Feasibility of Pipe Distribution Network (PDN) over Canal Distribution Network (CDN) For Irrigation

Water, which is a valuable, finite, renewable and shared resource required by various sectors, must be managed optimally. Stress due to scarcity of water is growing at an alarming rate. To reduce this stresses and to me...

A Review on Coir Fiber Treated with natural rubber Latex as Concrete Reinforcement Material in cement Based Composites

Concrete is acknowledged to be a relatively brittle material and when subjected to normal stresses and impact loads, the tensile strength is one tenth of its compressive strength. Because of this characteristics, concre...

Cloud Computing Service and Deployment Models

Cloud computing is a new era it started after the development of parallel computing, grid computing and distributed computing. Many organizations have been started to use cloud computing store their data and provide sec...

slugOptimal Sensor State Planning for CMIMO in Multi-Hop Wireless Sensor Networks

Minimizing energy consumption and increase the network lifetime are important issues in the field of Wireless Sensor Networks (WSN). Energy efficient sensor state planning consists in finding...

Download PDF file
  • EP ID EP20145
  • DOI -
  • Views 243
  • Downloads 4

How To Cite

Archana Gupta, Pankaj Meel, Ashwini Salvi, Sourabh Shetty, Lakshmi Madhuri (2015). Android Based Remote System Security and Monitoring. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(4), -. https://europub.co.uk/articles/-A-20145