24 research outputs found

    Review on Methods used in Remote Mobile Access

    Get PDF
    Use of mobile phone is increasing in our day to day life tremendously. Hence the continuous use of a mobile has proven to be the helping hand. In certain cases, if a user is not in regular intact with it or unable to access it, then providing a remote access service would be beneficial and of great importance. The use of remote access is necessary when the mobile phone is left at someplace or lost and we want to retrieve some information from that mobile phone. In this paper, we have reviewed various several techniques which are used for remote mobile access

    Database Tampering Monitoring System to Enhance Security

    Get PDF
    Nowadays, usage of internet has increased for various purposes like online shopping, online transaction, internet banking, etc. Almost everything is done online. With this increased usage of internet, websites are prone to attacks. Security system is nothing but an intrusion detection system (IDS) that models the network behavior of user sessions. It protects both the front-end web server as well as back-end database. It monitors both web and subsequent database requests. So, it is possible to identify attacks that independent IDS would not be able to identify. Our contribution is to find leaked data which is done by hacker. Next steps to detect the different attacks for preventing unauthorized access users

    Dissipative and Non-dissipative Single-Qubit Channels: Dynamics and Geometry

    Full text link
    Single-qubit channels are studied under two broad classes: amplitude damping channels and generalized depolarizing channels. A canonical derivation of the Kraus representation of the former, via the Choi isomorphism is presented for the general case of a system's interaction with a squeezed thermal bath. This isomorphism is also used to characterize the difference in the geometry and rank of these channel classes. Under the isomorphism, the degree of decoherence is quantified according to the mixedness or separability of the Choi matrix. Whereas the latter channels form a 3-simplex, the former channels do not form a convex set as seen from an ab initio perspective. Further, where the rank of generalized depolarizing channels can be any positive integer upto 4, that of amplitude damping ones is either 2 or 4. Various channel performance parameters are used to bring out the different influences of temperature and squeezing in dissipative channels. In particular, a noise range is identified where the distinguishability of states improves inspite of increasing decoherence due to environmental squeezing.Comment: 12 pages, 4 figure

    Gene selection for cancer classification with the help of bees

    Full text link

    AUTOMATIC FOOD DRYING SYSTEM

    No full text
    Fruit drying system project mainly based on the drying of the dry-fruits. In today world due to increases of population demand of dry-fruits are increased. So that point of view we need to dry fruit in the short duration. In conventional sun drying process more time is required for the drying of the fruit. So we can use fruit drying system. In this system consist one metal chamber to drying fruit. The air is blown inside the chamber and exhaust fan are placed to air in and out. The nickel chrome coil is used for the heating purpose of the chamber. By using microprocessor we can control all the process like the heating of the coil, sensing of the metal body temperature and the humidity control. The automatic fruit drying system is very applicable for the drying fruit in the short duration of the time. Fruit drying system project is mainly based on the agriculture field
    corecore