Android Based Remote System Security and Monitoring
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Face recognition presents a challenging problem in the field of image analysis and computer vision, and as such has received a great deal of attention over the last few years because of its many applications in various domains. This paper refers to principal component analysis algorithm (PCA) for face recognition. This face recognition system detects the faces as an image captured by the web cam and these images are checked with images dataset based on database server and in any case captured image not found in the database then further decision or action is taken the administrators remote system. In this paper we present the implementation of access to system and identity management for endpoint protection and data security from USB devices to maintain information security and data theft prevention. Key logger programs attempt to retrieve confidential information by covertly capturing user input via Keystroke monitoring and then relaying this information to others.
Authors and Affiliations
Archana Gupta, Pankaj Meel, Ashwini Salvi, Sourabh Shetty, Lakshmi Madhuri
Design of Embedded Label Reading System by OCR Technique
We proposes a camera-based label reader to help blind persons to read names of labels on the products. Camera acts as main vision in detecting the label image of the product or board then image is processed internally a...
Processing Weather Sensor Data Using Iterative MapReduce Approach
Big Data is the most promising research area in the field of Cloud Computing. In areas like social networking applications, e- commerce, finance, health care, education, etc, huge amount of data is being accumulated. As...
Tensile Free Tripper’s Guide
People who are new to a city or a place find it difficult to search for a suitable mode of transport. Also they need someone’s help to find the route to particular place, name of the bus, and the stops in-between. This...
Smart Locker System to Crack Shoulder Surfing Techniques
Authentication based on passwords is used largely in applications for computer security and privacy. The password is generated for each and every time a new color code is generated for the user. The user can open the lo...
VLSI Implementation of Separating Fetal ECG Using Adaptive Line Enhancer
fetal electrocardiogram (fecg) signal recording is the popular technique for heart signal monitoring of fetus. It is also used to monitor health condition of fetus in pregnancy period continuously. Fetal electrocardiogr...