TRACING REAL TIME LOCATION OF A FRIEND IN MOBILE SYSTEM
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 3
Abstract
The application of this project is to track a number of people even in crowded natural environments. A system of this sort would be useful in a number of applications, such as human-computer interaction, surveillance, and mobile robots that work among people. The robustness of the system will be able to operate even with partial occlusions of the subjects, and recover from tracking errors where a subject is temporarily lost. Finally, the techniques will be implemented on standard available hardware, and run fast enough to track in real time mobile system. It can be used to assist users in tracking colleagues and friends within a campus environment.
Authors and Affiliations
SUNIL L. BANGARE , ABHISHEK JAJU , RAHUL LONARI , PALLAVI S. BANGARE
Recognizing faces with single sample per subject using fusion of transforms
Face recognition has attracted attention of the researchers. Face recognition becomes challenging if various factors are considered such as varying illumination, pose, facial expression and somewhat occlusion. The face r...
USE OF OPEN SOURCE TECHNOLOGIES FOR ENTERPRISE SERVER MONITORING USING SNMP
This paper focuses on the evolving trend of Data Center Monitoring in enterprise using SNMP protocol & open source platforms for proactive server monitoring and data center management. It also focuses on the need of...
A NOVEL APPROACH FOR PATTERN ANALYSIS FROM HUGE DATAWAREHOUSE
Due to the tremendous growth of data and large databases, efficient extraction of required data has become a challenging task. This paper propose a novel approach for knowledge discovery from huge unlabeled temporal data...
Cryptography for Resource Constrained Devices: A Survey
Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight c...
Multimodal Authentication For High End Security
In earlier days Traditional authentication method in computer systems are based on knowledge and token based. Unfortunately lot of drawbacks are in these systems. Passwords often be forgotten, disclosed or changed. A rel...