Enviar búsqueda
Cargar
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Module
•
0 recomendaciones
•
22 vistas
IRJET Journal
Seguir
https://www.irjet.net/archives/V5/i3/IRJET-V5I3917.pdf
Leer menos
Leer más
Ingeniería
Denunciar
Compartir
Denunciar
Compartir
1 de 3
Descargar ahora
Descargar para leer sin conexión
Recomendados
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
Barcoding, Inc.
IRJET - Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
IRJET Journal
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
SecPod Technologies
76 s201917
76 s201917
IJRAT
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
IRJET Journal
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET Journal
IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...
International Journal of Power Electronics and Drive Systems
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET Journal
Recomendados
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
Barcoding, Inc.
IRJET - Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
IRJET Journal
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
SecPod Technologies
76 s201917
76 s201917
IJRAT
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
IRJET Journal
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET Journal
IoT based facial recognition door access control home security system using r...
IoT based facial recognition door access control home security system using r...
International Journal of Power Electronics and Drive Systems
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET Journal
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
sandhibhide
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
Presentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET Journal
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET Journal
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
Lillie Coney
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET Journal
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET Journal
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of Things
IRJET Journal
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
IRJET Journal
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
IRJET Journal
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
IRJET Journal
Major-Project2Individual (FINAL VERSION) (3)
Major-Project2Individual (FINAL VERSION) (3)
Joshua Alexander Panggabean
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET Journal
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
IJSRED
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
Dr. Amarjeet Singh
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
Dr. Michael Agbaje
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internet
TELKOMNIKA JOURNAL
Introduction to IOT security
Introduction to IOT security
Priyab Satoshi
IRJET - Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
IRJET Journal
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IRJET Journal
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
IRJET Journal
Más contenido relacionado
La actualidad más candente
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
sandhibhide
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
Presentation on IOT SECURITY
Presentation on IOT SECURITY
The Avi Sharma
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET Journal
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET Journal
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
Lillie Coney
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET Journal
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET Journal
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of Things
IRJET Journal
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
IRJET Journal
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
IRJET Journal
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
IRJET Journal
Major-Project2Individual (FINAL VERSION) (3)
Major-Project2Individual (FINAL VERSION) (3)
Joshua Alexander Panggabean
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET Journal
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
IJSRED
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
Dr. Amarjeet Singh
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
Dr. Michael Agbaje
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internet
TELKOMNIKA JOURNAL
Introduction to IOT security
Introduction to IOT security
Priyab Satoshi
IRJET - Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
IRJET Journal
La actualidad más candente
(20)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
Presentation on IOT SECURITY
Presentation on IOT SECURITY
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
LConey-Journal_of_Physical_Security-Article_The-Ability-to-Defend-Against-the...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET- Design and Development Modish Smart Key Box using RFID based on Ard...
IRJET - Cyber Security Threats and Vulnerabilities in IoT
IRJET - Cyber Security Threats and Vulnerabilities in IoT
Fundamental Concept of Internet of Things
Fundamental Concept of Internet of Things
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
Major-Project2Individual (FINAL VERSION) (3)
Major-Project2Individual (FINAL VERSION) (3)
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
Wearable Technology for Enhanced Security.
Wearable Technology for Enhanced Security.
Integrated smart door system in apartment room based on internet
Integrated smart door system in apartment room based on internet
Introduction to IOT security
Introduction to IOT security
IRJET - Smart Classroom Automation based on IoT
IRJET - Smart Classroom Automation based on IoT
Similar a IRJET- Identification of Location of Laptop Devices using Raspberry Pi Module
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IRJET Journal
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
IRJET Journal
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
Moon Technolabs Pvt. Ltd.
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET Journal
IRJET- Smart, Secured and Solace Luggage Bag using Internet of Things and Com...
IRJET- Smart, Secured and Solace Luggage Bag using Internet of Things and Com...
IRJET Journal
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
IRJET Journal
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET Journal
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET Journal
IRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security System
IRJET Journal
IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
IRJET Journal
IRJET - Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security System
IRJET Journal
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
IRJET Journal
IRJET- Survey on Face-Recognition and Emotion Detection
IRJET- Survey on Face-Recognition and Emotion Detection
IRJET Journal
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
mariuse18nolet
Wearable Technology for Personal Security
Wearable Technology for Personal Security
rahulmonikasharma
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET Journal
Topic 7
Topic 7
MLG College of Learning, Inc
RAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AI
IRJET Journal
IRJET - Smart Door System
IRJET - Smart Door System
IRJET Journal
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
Similar a IRJET- Identification of Location of Laptop Devices using Raspberry Pi Module
(20)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET- Smart, Secured and Solace Luggage Bag using Internet of Things and Com...
IRJET- Smart, Secured and Solace Luggage Bag using Internet of Things and Com...
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- An Alert System for Home Security based on Internet of Thing
IRJET- IoT based Home Automation and Smart Security System
IRJET- IoT based Home Automation and Smart Security System
IRJET - Smart Doorbell System
IRJET - Smart Doorbell System
IRJET - Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security System
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
IRJET- Survey on Face-Recognition and Emotion Detection
IRJET- Survey on Face-Recognition and Emotion Detection
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
Wearable Technology for Personal Security
Wearable Technology for Personal Security
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with Telegram
Topic 7
Topic 7
RAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AI
IRJET - Smart Door System
IRJET - Smart Door System
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
Más de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Más de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Último
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
DineshKumar4165
School management system project Report.pdf
School management system project Report.pdf
Kamal Acharya
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
anil_gaur
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
KOUSTAV SARKAR
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
RishantSharmaFr
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
nuruddin69
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
smsksolar
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
Air Compressor reciprocating single stage
Air Compressor reciprocating single stage
Abc194748
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
BhangaleSonal
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
JuliansyahHarahap1
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
DineshKumar4165
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
smsksolar
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
JiananWang21
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
maisarahman1
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
soginsider
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
SCMS School of Architecture
Último
(20)
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
School management system project Report.pdf
School management system project Report.pdf
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Air Compressor reciprocating single stage
Air Compressor reciprocating single stage
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
IRJET- Identification of Location of Laptop Devices using Raspberry Pi Module
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3916 Identification of Location of Laptop Devices using Raspberry Pi Module Jibin John1, Anson Mathew Thomas1, Abey Varghese1, Arya Vijayan1, John T Thomas1, Dr. Jubilant J Kizhakkethottam2 1Dept. of Computer Science and Engineering, Saintgits College of Engineering, Kottukulam Hills, Pathamuttom, Kottayam, Kerala 686532, India 2Professor, Dept. of Computer Science and Engineering, Saintgits College of Engineering, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Theft of mobile devices, such as laptops, are the third most frequent computer crime after virus and hacking. While mobiles devices can be located using the built-in GPS module and accompanying software, devices such as laptops are much more difficult to locate. This paper suggests a better method to identify the location by using a Raspberry Pi that identifies the exact coordinates of the laptop and transmits it over to the owner. The coding is done in Python as it is the easiest to implement, though any programming language can be used. The proposed system consists of four different phases. This includes auto run terminal, which is the first phase and it turns on along with the CPU. It can be either from charging or just switching on the system. Once the port for communication is successfully established from GPS module, the coordinates are obtained and stored in a second file. This is the second phase. The third phase focuses on establishing connection using Wi-Fi/Internet. Since the CPU runs automatically, the geolocation details will have to be sent to the owner. It will search for some open Wi-Fi networks or any other internet connections, before using the built-in GSM module. Whenever the connection is established, the last phase is executed, sending of the E-mail containing the geolocation. From the coordinates received via this email, the owner can use any map application to identify the location of the device. Key Words: Raspberry Pi, Python, GPS, Geolocation, Wi-Fi 1. INTRODUCTION The work focus on a novel method for finding a lost laptop. In the present scenario when a laptop has been stolen it cannot be retrieved so easily unless and until it is informed to the police. The main objective of the device is to locate the whereabouts of the stolen laptop. Laptop Security is a broad term which includes the various products and techniques used to prevent the theft of laptop computers. Laptop security solutions can involve physical lock-and-key systems, locator devices, or other kinds of devices and technologies that make it difficult for an unauthorised person to access the device. This work provides security features to the Laptop. In this paper, we have suggested a better method to increase the security of the laptop devices that lacks features of a mobile device such as smartphone. 2. EXPERIMENTAL SECTION The number of personal mobile devices like laptops, mobile phones etc... have increased exponentially over the last decade. Many mobile devices that lack a proper location service are stolen because they are harder to track or identify. Once a laptop is lost or stolen, it is almost impossible to physically locate it. There has been no development or very little progress for the identification and location of the misplaced or stolen laptops. Not only in companies but also in universities and colleges, social places it became a major problem for students, staff and people. Even though the laptops are password protected, that type of security is not providing any kind of use in finding the laptops once they are stolen. 2.1 Problem Description Laptops have become a valuable part of the computing scenario. They allow users powerful mobile computers with the same capacity and software of many desktops. They also allow connectivity, even outside the office, thus freeing people to take their workplace with them. This is extremely valuable for employees who must travel frequently while remaining in continual communication with their offices. Unfortunately, the mobility, technology and information that make laptops so useful to employees and organizations also makes them valuable prizes for thieves. In 2006, a laptop containing personal and health data of 26,500,000 veterans was stolen from a data analyst working for the US Department of Veterans Affairs. The data contained the names, dates of birth, and some disability ratings of the veterans. It was estimated that the process of preventing and covering possible losses from the theft would cost between USD 100 million and USD 500 million. One year later, a laptop used by an employee of the UK’s largest building society was stolen during a domestic
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3917 burglary. The laptop contained details of 11 million customers, including but not limited to, names and account numbers. The information was unencrypted. Subsequently, the UK’s largest building society was fined with GBP 980,000 by the Financial Services Authority (FSA). The reason for the fine was failing to have effective systems and controls to manage its information security risks. From above mentioned incidents it can be inferred that laptop theft is a serious problem that concerns both businesses and individuals. Victims of laptop theft can lose not only their software and hardware, but also sensitive data and personal information that have not been backed up. The current methods to protect the data and to prevent theft include alarms, anti-theft technologies utilized in the PC BIOS, laptop locks, and visual deterrents. 2.2 Existing Systems vs. Proposed System 1. Locating devices: The first intention of the concerned person will be to obtain the location of the laptop or mobile device in question. Most antitheft products use Wi-Fi lookup to determine the laptop's geolocation. They check nearby Wi-Fi hotspots against a database to find out where the laptop is. It's also possible to roughly determine the device's location based on the IP address of the network to which it's connected. However, IP-based geolocation doesn't have nearly the accuracy of the Wi-Fi-based technologies. The problem with such technologies are that they rely on an externally available connection to perform a lookup and also require expensive monthly or yearly subscriptions. Our proposed system is different because it contains built-in GPS & GSM modules and can connect to externally available Wi-Fi. It also does not require any subscription as it does not rely on any specific company provided database or service. 2. Stealth Tactics: Applications working in stealth, install in stealth mode, deliberately hiding their processes and leaving no visible evidence of their presence. Their aim is to covertly gather information about the unauthorized person without letting the person know that he’s under observation. Scare tactics take quite the opposite approach. Some services sound a loud alarm if a locked, but running laptop, is disconnected from its power cord while others sound a loud, whooping alarm when the owner remotely sends it a lockdown command. They need not work always if the unauthorized person is ready to deal with loud alarms and plan on getting away using force. They also may not provide locating service if the laptop is taken away in such a scenario. Our proposed system incorporates both stealth and scare tactics. Even if the person does manage to get away with the device, he can be tracked whenever he attempts to switch on the device or inputs an incorrect password repeatedly. The locating device is activated in stealth mode so that the person never knows it’s working in the background. 2.3 Advantages of Proposed System 1. Security: GPS technology also acts as a guard against auto and mobile thefts and if GPS chips are installed then it can be easily traced even if these are stolen and being sent to some other region. It is easy to trace lost or stolen laptops using GPS technology. Hence, our project is a perfect answer for our security concerns against mobile and laptop thefts. 2. No operating system vulnerabilities: In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. A security risk may be classified as a vulnerability. 3. Modifiable to manufacture: A good manufacturing change process feeds information back into the design process so engineers are informed about problems on the manufacturing line and can apply that information to their current and future design iterations. Manufacturing changes should be documented so that problems can be addressed efficiently. There are many modifications which can be applied to our system. Therefore, this can be designed and manufactured as per modifications. 3. MODULE DESIGN 1. Auto run: A product is being developed in raspberry pi using Wi-Fi module and it turns on whenever it gets a power supply from CPU. 2. Accessing geolocation: Once the port for communication is successfully established from GPS module the latitude and longitude is located and is stored in a file. 3. Establishing connection with Wi-Fi/Internet: To send data to the destination internet is important. Since the CPU is run automatically, after collecting geolocation details we have to send it to the destination. Initially it will search for some open Wi-Fi networks or any other internet connections. Whenever the connection is established, next module will get started.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 3918 4. Sending E-mail: Once successfully established connection with internet the next step is to send the current location of the laptop. From the link send to the destination E-mail, the owner will be directed to google map and he/she can view the exact location. 4. RESULTS AND DISCUSSIONS This paper discusses the possibility of a device that can be developed using Raspberry Pi and programmed in Python programming language. Locating is made possible by the GPS module that is built into the Raspberry Pi. In the scenario when the Laptop is lost, the Raspberry Pi is automatically activated by the Operating System and the current location is obtained by the GPS module. These coordinates are mailed to the owner using a network connection. The further discussions on the topic Laptop Locator suggests developing the said device so that it is deeply integrated into the Operating System environment and into the hardware. This makes it impossible for the anyone to remove the Raspberry Pi. Also the current size of the implementation is too big to fit inside the laptop. It can be scaled down to fit inside the laptop. 5. FUTURE ENHANCEMENTS The proposed device is made as simple as possible so that we can further tune it according to user requirements. Some of the features that we can add as future enhancements include: 1. Investigate how to protect the data inside the system which belongs to its owner. 2. Developing a means to show track record of where the laptop has been rather than just the position located. 3. To develop a mobile application for the above proposed system. 6. CONCLUSIONS The system has been successfully implemented and has been found to be working efficiently. It is very much user friendly and comparatively comfortable to operate. Our project is implemented to give out response to laptop theft and to handle certain situations. The foremost objective of our project is to develop a Laptop Locater that would be used in a real world. The GPS modem will give the data that is, the latitude and longitude indicating position of laptop. This is converted and located on map. And the corresponding link is send to the linked mail. The expected results were obtained as it can be evident as analysed. This project is simple to implement and cost effective and easy to use. REFERENCES [1] Graham Glass, King Ables, “Unix for programmers and users”, 3rd edition, Pearson Education [2] http://opensourceforu.com/2016/10/programming- raspberry-pi-with-python/
Descargar ahora