Mohammad Mirza | COMSATS Institute of Information Technology Wah Cantt (original) (raw)
Uploads
Papers by Mohammad Mirza
—System that relay on face recognition biometrics have gained great impact on security system sin... more —System that relay on face recognition biometrics have gained great impact on security system since security threats are imposed weakness among the implemented security system. Other biometrics which used for security like fingerprints have some issues and they are not trust worthy. In this survey paper we discussed different types of existing face recognition techniques along with their pros and cons. Face recognition is not a simple thing its very complex system because in face recognition if the user hide their face with sunglasses or hide the face with hijab then its difficult task to recognize the face for that purpose in face recognition used different types of techniques which can recognize the faces in this survey paper we discussed these techniques.
—The menace of malicious software is currently causing immense damage in the field of information... more —The menace of malicious software is currently causing immense damage in the field of information technology. Although the birth of malicious software cannot be exactly pinpointed but it became a substantial nuisance in mid-90's in IT department. These harmful software normally enter into the system unknowingly and the user does not know when and how they entered. It is all because of lack of any perfect solution for detection and removal of such threats; but if the malicious software is in the system there must be a mechanism which possesses ability to stop their attacks and prevent their growth so as to protect the precious data. The absence of these antivirus programs allows the malicious software to infect the computer and if there are no suitable or reliable software installed on the system, the user will be at a grave risk of losing precious data. So therefore, in this survey paper, the important factors for handling and stabilizing the computer have been discussed that will help in adapting suitable and appropriate software or tools for early detection of malicious software and their attacks, resulting in preventing the suspicious activities and assuring system protection.
System that relay on face recognition biometrics have gained great impact on security system sin... more System that relay on face recognition biometrics have gained great impact on security system since security threats
are imposed weakness among the implemented security system. Other biometrics which used for security like fingerprints have
some issues and they are not trust worthy. In this survey paper we discussed different types of existing face recognition
techniques along with their pros and cons. Face recognition is not a simple thing its very complex system because in face
recognition if the user hide their face with sunglasses or hide the face with hijab then its difficult task to recognize the face for
that purpose in face recognition used different types of techniques which can recognize the faces in this survey paper we
discussed these techniques.
The menace of malicious software is currently causing immense damage in the field of information ... more The menace of malicious software is currently causing immense damage in the field of information technology.
Although the birth of malicious software cannot be exactly pinpointed but it became a substantial nuisance in mid -90’s in IT
department. These harmful software normally enter into the system unknowingly and the user does not know when and how they
entered. It is all because of lack of any perfect solution for detection and removal of such threats; but if the malicious so ftware is
in the system there must be a mechanism which possesses ability to stop their attacks and prevent their growth so as to prote ct
the precious data. The absence of these antivirus programs allows the malicious software to infect the computer and if there are
no suitable or reliable software installed on the system, the user will be at a grave risk of losing precious data. So theref ore, in
this survey paper, the important factors for handling and stabilizing the computer have been discussed that will help in adapting
suitable and appropriate software or tools for early detection of malicious software and their attacks, resulting in preventi ng the
suspicious activities and assuring system protection.
—System that relay on face recognition biometrics have gained great impact on security system sin... more —System that relay on face recognition biometrics have gained great impact on security system since security threats are imposed weakness among the implemented security system. Other biometrics which used for security like fingerprints have some issues and they are not trust worthy. In this survey paper we discussed different types of existing face recognition techniques along with their pros and cons. Face recognition is not a simple thing its very complex system because in face recognition if the user hide their face with sunglasses or hide the face with hijab then its difficult task to recognize the face for that purpose in face recognition used different types of techniques which can recognize the faces in this survey paper we discussed these techniques.
—The menace of malicious software is currently causing immense damage in the field of information... more —The menace of malicious software is currently causing immense damage in the field of information technology. Although the birth of malicious software cannot be exactly pinpointed but it became a substantial nuisance in mid-90's in IT department. These harmful software normally enter into the system unknowingly and the user does not know when and how they entered. It is all because of lack of any perfect solution for detection and removal of such threats; but if the malicious software is in the system there must be a mechanism which possesses ability to stop their attacks and prevent their growth so as to protect the precious data. The absence of these antivirus programs allows the malicious software to infect the computer and if there are no suitable or reliable software installed on the system, the user will be at a grave risk of losing precious data. So therefore, in this survey paper, the important factors for handling and stabilizing the computer have been discussed that will help in adapting suitable and appropriate software or tools for early detection of malicious software and their attacks, resulting in preventing the suspicious activities and assuring system protection.
System that relay on face recognition biometrics have gained great impact on security system sin... more System that relay on face recognition biometrics have gained great impact on security system since security threats
are imposed weakness among the implemented security system. Other biometrics which used for security like fingerprints have
some issues and they are not trust worthy. In this survey paper we discussed different types of existing face recognition
techniques along with their pros and cons. Face recognition is not a simple thing its very complex system because in face
recognition if the user hide their face with sunglasses or hide the face with hijab then its difficult task to recognize the face for
that purpose in face recognition used different types of techniques which can recognize the faces in this survey paper we
discussed these techniques.
The menace of malicious software is currently causing immense damage in the field of information ... more The menace of malicious software is currently causing immense damage in the field of information technology.
Although the birth of malicious software cannot be exactly pinpointed but it became a substantial nuisance in mid -90’s in IT
department. These harmful software normally enter into the system unknowingly and the user does not know when and how they
entered. It is all because of lack of any perfect solution for detection and removal of such threats; but if the malicious so ftware is
in the system there must be a mechanism which possesses ability to stop their attacks and prevent their growth so as to prote ct
the precious data. The absence of these antivirus programs allows the malicious software to infect the computer and if there are
no suitable or reliable software installed on the system, the user will be at a grave risk of losing precious data. So theref ore, in
this survey paper, the important factors for handling and stabilizing the computer have been discussed that will help in adapting
suitable and appropriate software or tools for early detection of malicious software and their attacks, resulting in preventi ng the
suspicious activities and assuring system protection.