Android Based Remote System Security and Monitoring

Abstract

Face recognition presents a challenging problem in the field of image analysis and computer vision, and as such has received a great deal of attention over the last few years because of its many applications in various domains. This paper refers to principal component analysis algorithm (PCA) for face recognition. This face recognition system detects the faces as an image captured by the web cam and these images are checked with images dataset based on database server and in any case captured image not found in the database then further decision or action is taken the administrators remote system. In this paper we present the implementation of access to system and identity management for endpoint protection and data security from USB devices to maintain information security and data theft prevention. Key logger programs attempt to retrieve confidential information by covertly capturing user input via Keystroke monitoring and then relaying this information to others.

Authors and Affiliations

Archana Gupta, Pankaj Meel, Ashwini Salvi, Sourabh Shetty, Lakshmi Madhuri

Keywords

Related Articles

Implementation of Optimized 64 Bit MAC using Vedic Multiplier and Reverse Logic Gate

In advanced digital signal processing the MAC (multiply and accumulate unit) unit acquires the predominant role. The optimized MAC unit deals with improvising the speed, area power consumption. The high speed processors...

Big Data Analytics on Unemployment & Health Records

Now a day’s huge amount of data is produced from the social web sites, government industries, public sectors etc., Storing and Maintaining the data is big challenge which is solved by special databases and programming l...

Electrical Conductivity Instrument Construction and Application for Detecting Subsurface Wood and Metal

The pattern of electrical conductivity of the soil with wood and metal buried in a granite gneiss pegmatite environment using Wenner array configuration was investigated with locally made instrument. The 2kW electrical...

Behavior of Software Reliability Based On Game Theory

Software Management includes the study and analysis of the software development in an organize way so that the transparency of the whole system will be improved. Some of the common software management approaches like CM...

Computer networks Considerations When Choosing a Topology

Instantly sending messages across the world has represented something new and extraordinary in the world of computer networks. Instant messaging saw the increase in usage of 'text language' and emoticons which served as...

Download PDF file
  • EP ID EP20145
  • DOI -
  • Views 246
  • Downloads 4

How To Cite

Archana Gupta, Pankaj Meel, Ashwini Salvi, Sourabh Shetty, Lakshmi Madhuri (2015). Android Based Remote System Security and Monitoring. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(4), -. https://europub.co.uk/articles/-A-20145