Android Based Remote System Security and Monitoring
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Face recognition presents a challenging problem in the field of image analysis and computer vision, and as such has received a great deal of attention over the last few years because of its many applications in various domains. This paper refers to principal component analysis algorithm (PCA) for face recognition. This face recognition system detects the faces as an image captured by the web cam and these images are checked with images dataset based on database server and in any case captured image not found in the database then further decision or action is taken the administrators remote system. In this paper we present the implementation of access to system and identity management for endpoint protection and data security from USB devices to maintain information security and data theft prevention. Key logger programs attempt to retrieve confidential information by covertly capturing user input via Keystroke monitoring and then relaying this information to others.
Authors and Affiliations
Archana Gupta, Pankaj Meel, Ashwini Salvi, Sourabh Shetty, Lakshmi Madhuri
The Survey of Data Mining Applications and Feature Scope
In this paper we have focused a variety of techniques, approaches and different areas of the research which are helpful and marked as the important field of data mining Technologies. Each place of operation may generate...
Feasibility of Pipe Distribution Network (PDN) over Canal Distribution Network (CDN) For Irrigation
Water, which is a valuable, finite, renewable and shared resource required by various sectors, must be managed optimally. Stress due to scarcity of water is growing at an alarming rate. To reduce this stresses and to me...
A Review on Coir Fiber Treated with natural rubber Latex as Concrete Reinforcement Material in cement Based Composites
Concrete is acknowledged to be a relatively brittle material and when subjected to normal stresses and impact loads, the tensile strength is one tenth of its compressive strength. Because of this characteristics, concre...
Cloud Computing Service and Deployment Models
Cloud computing is a new era it started after the development of parallel computing, grid computing and distributed computing. Many organizations have been started to use cloud computing store their data and provide sec...
slugOptimal Sensor State Planning for CMIMO in Multi-Hop Wireless Sensor Networks
Minimizing energy consumption and increase the network lifetime are important issues in the field of Wireless Sensor Networks (WSN). Energy efficient sensor state planning consists in finding...