Android Based Remote System Security and Monitoring

Abstract

Face recognition presents a challenging problem in the field of image analysis and computer vision, and as such has received a great deal of attention over the last few years because of its many applications in various domains. This paper refers to principal component analysis algorithm (PCA) for face recognition. This face recognition system detects the faces as an image captured by the web cam and these images are checked with images dataset based on database server and in any case captured image not found in the database then further decision or action is taken the administrators remote system. In this paper we present the implementation of access to system and identity management for endpoint protection and data security from USB devices to maintain information security and data theft prevention. Key logger programs attempt to retrieve confidential information by covertly capturing user input via Keystroke monitoring and then relaying this information to others.

Authors and Affiliations

Archana Gupta, Pankaj Meel, Ashwini Salvi, Sourabh Shetty, Lakshmi Madhuri

Keywords

Related Articles

Artificial Bee Colony algorithm using Structured Swarm

Swarm Intelligence is a meta-heuristic approach in the field of nature inspired techniques that is used to solve optimization problems. It is based on the collective behaviour of social creatures. Social creatures utili...

Spatial Aware Query Processing For Social Networks

With the rapid advances in positioning and smartphone technologies, a number of social networks namely Facebook and twitter are gaining the dimension of location. Most of the location-based social networks released chec...

VAS AC Refigeration System by Exhaust of Automotive Engine

Air conditioning cabin of a transport truck is a new concept in India and has not been addressed. But in summer, the temperature in some parts of India is very high and results in unbearable cabin temperatures. In such...

DSP Based Vedic Multiplier

Digital signal processors (DSPs) are very imperative in various methodological field in the at hand scenario. In today’s world Fast burgeoning is one of the very important methods in DSPs. Fast multiplication is used fo...

An Algorithm for Creating Malicious Free Absolute Trust Peers in P2P Networks

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. The peers evaluate other peers based on their past interactions and then aggregate t...

Download PDF file
  • EP ID EP20145
  • DOI -
  • Views 267
  • Downloads 4

How To Cite

Archana Gupta, Pankaj Meel, Ashwini Salvi, Sourabh Shetty, Lakshmi Madhuri (2015). Android Based Remote System Security and Monitoring. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(4), -. https://europub.co.uk/articles/-A-20145