30 research outputs found
Review on Methods used in Remote Mobile Access
Use of mobile phone is increasing in our day to day life tremendously. Hence the continuous use of a mobile has proven to be the helping hand. In certain cases, if a user is not in regular intact with it or unable to access it, then providing a remote access service would be beneficial and of great importance. The use of remote access is necessary when the mobile phone is left at someplace or lost and we want to retrieve some information from that mobile phone. In this paper, we have reviewed various several techniques which are used for remote mobile access
Database Tampering Monitoring System to Enhance Security
Nowadays, usage of internet has increased for various purposes like online shopping, online transaction, internet banking, etc. Almost everything is done online. With this increased usage of internet, websites are prone to attacks. Security system is nothing but an intrusion detection system (IDS) that models the network behavior of user sessions. It protects both the front-end web server as well as back-end database. It monitors both web and subsequent database requests. So, it is possible to identify attacks that independent IDS would not be able to identify. Our contribution is to find leaked data which is done by hacker. Next steps to detect the different attacks for preventing unauthorized access users
Dissipative and Non-dissipative Single-Qubit Channels: Dynamics and Geometry
Single-qubit channels are studied under two broad classes: amplitude damping
channels and generalized depolarizing channels. A canonical derivation of the
Kraus representation of the former, via the Choi isomorphism is presented for
the general case of a system's interaction with a squeezed thermal bath. This
isomorphism is also used to characterize the difference in the geometry and
rank of these channel classes. Under the isomorphism, the degree of decoherence
is quantified according to the mixedness or separability of the Choi matrix.
Whereas the latter channels form a 3-simplex, the former channels do not form a
convex set as seen from an ab initio perspective. Further, where the rank of
generalized depolarizing channels can be any positive integer upto 4, that of
amplitude damping ones is either 2 or 4. Various channel performance parameters
are used to bring out the different influences of temperature and squeezing in
dissipative channels. In particular, a noise range is identified where the
distinguishability of states improves inspite of increasing decoherence due to
environmental squeezing.Comment: 12 pages, 4 figure
E-Voting System using Blockchain Technology and Fingerprint Authentication
Increasing digital technology has revolutionized the life of people. Unlike the electoral system, there are many conventional uses of paper in its implementation. The aspect of security and transparency is a threat from still widespread election with the conventional system (offline). General elections still use a centralized system, where in one organization manages it. Some of the problems that can occur in traditional electoral systems is with the organization that has full control over the database and system. It is possible to tamper with the database of considerable opportunities. Block chain technology is one of solutions, because it embraces a decentralized system and the entire database are owned by many users. Block chain itself has been used in the Bitcoin system known as the decentralized Bank system. By adopting block chain in the distribution of databases on evoting systems one can reduce the cheating sources of database manipulation. This project aims to implement voting result using block chain algorithm from every place of election. Unlike Bitcoin with its Proof of Work, this will be a method based on a predetermined turn on the system for each node in the built of block chain.</jats:p
AUTOMATIC FOOD DRYING SYSTEM
Fruit drying system project mainly based on the drying of the dry-fruits. In today world due to increases of population demand of dry-fruits are increased. So that point of view we need to dry fruit in the short duration. In conventional sun drying process more time is required for the drying of the fruit. So we can use fruit drying system. In this system consist one metal chamber to drying fruit. The air is blown inside the chamber and exhaust fan are placed to air in and out. The nickel chrome coil is used for the heating purpose of the chamber. By using microprocessor we can control all the process like the heating of the coil, sensing of the metal body temperature and the humidity control. The automatic fruit drying system is very applicable for the drying fruit in the short duration of the time. Fruit drying system project is mainly based on the agriculture field
Methylparathion induced alterations in the tissue carbohydrate catabolism of marine prawn,Metapenaeus monoceros
Review Paper on Marine Pollution and its Removal
The oil pollution caused by ship transport mainly includes two categories the first is the pollution caused by normal navigation, eg: cabin bilge water, oil tanker ballast water, washing water and so on. The second category is due to shipping accidents, eg: oil spill. Among all types of marine pollution, oil pollution should be said that the most serious. Because oil is difficult to volatile, making the oil on the sea to form a terrible oil film, resulting in a series of serious consequences. Oil as the basis of industry, it can’t be replaced for industry, the oil bring us a lot of convenience in production and life, but also brought the significant pollution to the environment, especially the marine environment, and now, oil Pollution has become one of the most important causes of marine pollution</jats:p
