24 research outputs found
Review on Methods used in Remote Mobile Access
Use of mobile phone is increasing in our day to day life tremendously. Hence the continuous use of a mobile has proven to be the helping hand. In certain cases, if a user is not in regular intact with it or unable to access it, then providing a remote access service would be beneficial and of great importance. The use of remote access is necessary when the mobile phone is left at someplace or lost and we want to retrieve some information from that mobile phone. In this paper, we have reviewed various several techniques which are used for remote mobile access
Database Tampering Monitoring System to Enhance Security
Nowadays, usage of internet has increased for various purposes like online shopping, online transaction, internet banking, etc. Almost everything is done online. With this increased usage of internet, websites are prone to attacks. Security system is nothing but an intrusion detection system (IDS) that models the network behavior of user sessions. It protects both the front-end web server as well as back-end database. It monitors both web and subsequent database requests. So, it is possible to identify attacks that independent IDS would not be able to identify. Our contribution is to find leaked data which is done by hacker. Next steps to detect the different attacks for preventing unauthorized access users
Dissipative and Non-dissipative Single-Qubit Channels: Dynamics and Geometry
Single-qubit channels are studied under two broad classes: amplitude damping
channels and generalized depolarizing channels. A canonical derivation of the
Kraus representation of the former, via the Choi isomorphism is presented for
the general case of a system's interaction with a squeezed thermal bath. This
isomorphism is also used to characterize the difference in the geometry and
rank of these channel classes. Under the isomorphism, the degree of decoherence
is quantified according to the mixedness or separability of the Choi matrix.
Whereas the latter channels form a 3-simplex, the former channels do not form a
convex set as seen from an ab initio perspective. Further, where the rank of
generalized depolarizing channels can be any positive integer upto 4, that of
amplitude damping ones is either 2 or 4. Various channel performance parameters
are used to bring out the different influences of temperature and squeezing in
dissipative channels. In particular, a noise range is identified where the
distinguishability of states improves inspite of increasing decoherence due to
environmental squeezing.Comment: 12 pages, 4 figure
AUTOMATIC FOOD DRYING SYSTEM
Fruit drying system project mainly based on the drying of the dry-fruits. In today world due to increases of population demand of dry-fruits are increased. So that point of view we need to dry fruit in the short duration. In conventional sun drying process more time is required for the drying of the fruit. So we can use fruit drying system. In this system consist one metal chamber to drying fruit. The air is blown inside the chamber and exhaust fan are placed to air in and out. The nickel chrome coil is used for the heating purpose of the chamber. By using microprocessor we can control all the process like the heating of the coil, sensing of the metal body temperature and the humidity control. The automatic fruit drying system is very applicable for the drying fruit in the short duration of the time. Fruit drying system project is mainly based on the agriculture field