Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Abstract: Android based E-home is an application of embedded system which integrates Android operating system, Arduino controller and GSM for the implementation of Smart Home. Any Android device can act as a transmitting device. The user can control any appliance through an user friendly mobile application built in Android platform. A unique code for controlling each appliance installed with the system is assigned in the program and it is transmitted from the Android phone to the CPU installed in receiver, through the application, as Text messages. The GSM receiver in the CPU receives the text messages from the transmitting device and transfers it to the controller. The Controller decodes the message based on the decoding algorithm stated in the program and based on the command from the user; the controller sends signals to the switching circuitry. The Switching circuitry is the device which is in direct contact with the home appliances through wires and it controls the devices connected to it. Thus, by controlling the Switching circuitry, it is possible to control the various devices. Backward communication is also enabled when an event occurs in the mechanical switch. In this case, the GSM shield acts as a transmitter and sends a message to the user. Thus, ‘Android based E-Home’ provides a cost efficient, long range solution for the implementation of a smart home using less complex circuits and also provides an user friendly environment through the android app. There is no need for an extra hardware as the Android smart phone itself acts as a transmitter which in turn contributes to the cost efficiency, ease of access and efficient operation of the system.
Communication Methods to build Smart Home Monitoring System: A Surveydbpublications
The inability to access and control the appliances from remote locations is one of the major reasons for energy loss. An android application or any input method is used by the users to give instructions to home automation systems. This system can make use of a host of communication methods such as Wi-Fi, GSM, Bluetooth and ZigBee etc.. Different controlling devices and configurations can be found in existing systems. Such systems have been found already in many places for a wide variety of applications. This paper presents a survey of such systems. Keywords: I
Abstract: Android based E-home is an application of embedded system which integrates Android operating system, Arduino controller and GSM for the implementation of Smart Home. Any Android device can act as a transmitting device. The user can control any appliance through an user friendly mobile application built in Android platform. A unique code for controlling each appliance installed with the system is assigned in the program and it is transmitted from the Android phone to the CPU installed in receiver, through the application, as Text messages. The GSM receiver in the CPU receives the text messages from the transmitting device and transfers it to the controller. The Controller decodes the message based on the decoding algorithm stated in the program and based on the command from the user; the controller sends signals to the switching circuitry. The Switching circuitry is the device which is in direct contact with the home appliances through wires and it controls the devices connected to it. Thus, by controlling the Switching circuitry, it is possible to control the various devices. Backward communication is also enabled when an event occurs in the mechanical switch. In this case, the GSM shield acts as a transmitter and sends a message to the user. Thus, ‘Android based E-Home’ provides a cost efficient, long range solution for the implementation of a smart home using less complex circuits and also provides an user friendly environment through the android app. There is no need for an extra hardware as the Android smart phone itself acts as a transmitter which in turn contributes to the cost efficiency, ease of access and efficient operation of the system.
Communication Methods to build Smart Home Monitoring System: A Surveydbpublications
The inability to access and control the appliances from remote locations is one of the major reasons for energy loss. An android application or any input method is used by the users to give instructions to home automation systems. This system can make use of a host of communication methods such as Wi-Fi, GSM, Bluetooth and ZigBee etc.. Different controlling devices and configurations can be found in existing systems. Such systems have been found already in many places for a wide variety of applications. This paper presents a survey of such systems. Keywords: I
Nowadays Internet of Things (IoT) is part of the internet that all objects around us. IoT has a very wide and includes variety of objects like electronics product appliances and sensors [4] This research paper aims to design a smart home system by utilizing
The idea is to create a social network of sensors in which various sensors integrated to intel Galileo will send the data to the user.
Nowadays using various social networking sites like Facebook, twitter, google+ has become too main stream.
Now the idea is to integrate our home status to these social networking sites that is, creating a “Galileo link”.
Home status will be comprised of various readings taken by the sensors like IR sensor, LDR, temperature sensor.
Sensors send data to intel Galileo then Galileo acts as a client and sends that data to the social networking site.
For example in Facebook an account is created and that account is registered on Facebook developer. As soon as the account is registered on Facebook developer it creates an access token.
Access token is then included in python script running in the Galileo device.
Hence our data can be seen in our news feed and we just have to add the registered account as our friend
CONTROLLING HOME APPLIANCES WITH IOT,BLYNK APP & NODE MCUVINAY KUMAR GUDELA
With this IoT project, you can control home appliances from the smartphone and manual switches. If there is no WiFi available then you can control the relay module from manual push buttons. With this smart home project, you can also monitor the real-time status of the relay module in the Blynk app.
Design and Implementation of Bluetooth Based Industrial Automationijtsrd
The paper Design and Implementation of Bluetooth Based Industrial Automation is used to control the circuit from a short distance during fire accidents .In this project we are using microcontroller, LDR ,flame sensor, Bluetooth sensor. Microcontroller is used to control the entire device by giving the commands. The project presents the design and implementation of low cost but a flexible and secure Bluetooth based industrial automation system. The communication between the cell phone and Arduino Bluetooth board is wireless. B. Shiva Kuamar | B. Satya Satwik | N. Anil Kumar | A. V. Tarun Kumar ""Design and Implementation of Bluetooth Based Industrial Automation"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23180.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/23180/design-and-implementation-of-bluetooth-based-industrial-automation/b-shiva-kuamar
Nowadays Internet of Things (IoT) is part of the internet that all objects around us. IoT has a very wide and includes variety of objects like electronics product appliances and sensors [4] This research paper aims to design a smart home system by utilizing
The idea is to create a social network of sensors in which various sensors integrated to intel Galileo will send the data to the user.
Nowadays using various social networking sites like Facebook, twitter, google+ has become too main stream.
Now the idea is to integrate our home status to these social networking sites that is, creating a “Galileo link”.
Home status will be comprised of various readings taken by the sensors like IR sensor, LDR, temperature sensor.
Sensors send data to intel Galileo then Galileo acts as a client and sends that data to the social networking site.
For example in Facebook an account is created and that account is registered on Facebook developer. As soon as the account is registered on Facebook developer it creates an access token.
Access token is then included in python script running in the Galileo device.
Hence our data can be seen in our news feed and we just have to add the registered account as our friend
CONTROLLING HOME APPLIANCES WITH IOT,BLYNK APP & NODE MCUVINAY KUMAR GUDELA
With this IoT project, you can control home appliances from the smartphone and manual switches. If there is no WiFi available then you can control the relay module from manual push buttons. With this smart home project, you can also monitor the real-time status of the relay module in the Blynk app.
Design and Implementation of Bluetooth Based Industrial Automationijtsrd
The paper Design and Implementation of Bluetooth Based Industrial Automation is used to control the circuit from a short distance during fire accidents .In this project we are using microcontroller, LDR ,flame sensor, Bluetooth sensor. Microcontroller is used to control the entire device by giving the commands. The project presents the design and implementation of low cost but a flexible and secure Bluetooth based industrial automation system. The communication between the cell phone and Arduino Bluetooth board is wireless. B. Shiva Kuamar | B. Satya Satwik | N. Anil Kumar | A. V. Tarun Kumar ""Design and Implementation of Bluetooth Based Industrial Automation"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23180.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/23180/design-and-implementation-of-bluetooth-based-industrial-automation/b-shiva-kuamar
This project aims at achieving automation using the widely used mobile operating system ANDROID i.e. android operating system. The electrical and office appliances can be controlled using the android mobile phones and Internet of things (IoT) even if you are out of your house and you forgot to switch off the appliances. Many electrical and office appliances like light, fan, air conditioner etc., can be controlled using the android operating system. This proposed system is implemented in order to overcome the drawbacks of the previous methodologies. This can also be implemented at homes also. Office automation is the residential extension of building automation. Office automation may include centralized control of lighting, HVAC (heating, ventilation and air conditioning), appliances, to provide improved convenience, comfort, energy efficiency and security. Office automation for the elderly and disabled can provide increased quality of life for persons who might otherwise require caregivers or institutional care.
Android Operated Application Based Smart Eye for Home Automation System Using...IJMTST Journal
` In recent years, the number of network enabled digital devices and services at homes has been increasing
fast. With the rapid increase of the Internet, the owners have been requesting remote control and monitoring
of these in-home appliances. This application leads to networking these appliances to form a kind of home
automation system. In this paper, an Android based home automation system that allows multiple users to
control the appliances by an Android application developed as well as using a web server is created. The
system used has three hardware components: raspberry pi a local connected device to transfer signals to
home appliances, a Web server to store customer records and support services to the other components, and
a smart mobile phone smart device running Android application developed. Distributed cloud platforms
systems and services of Google are used to support messaging between the components. The prototype
implementation of the proposed system is evaluated based on the criteria considered after the requirement
analysis for an adequate home automation system. The aim of this paper is to define the research of home
automation systems using android application, to provide home automation system using android
application operation also by creating a web server connected to ARM 7 board and Raspberry Pi 2.
UBIQUITOUS SMART HOME SYSTEM USING ANDROID APPLICATIONIJCNCJournal
This paper presents a flexible standalone, low cost smart home system, which is based on the Android app communicating with the micro-web server providing more than the switching functionalities. The Arduino Ethernet is used to eliminate the use of a personal computer (PC) keeping the cost of the overall system to a inimum while voice activation is incorporated for switching functionalities. Devices such as light switches, power plugs, temperature sensors, humidity sensors, current sensors, intrusion detection sensors, smoke/gas sensors and sirens have been integrated in the system to demonstrate the feasibility and effectiveness of the proposed smart home system. The smart home app is tested and it is able successfully perform the smart home operations such as switching functionalities, automatic environmental control and intrusion detection, in the later case where an email is generated and the siren goes on.
Design and implementation of a smart home system with two levels of security ...nooriasukmaningtyas
Besides the development of technology in recent years, there has been an
effective tendency to construct smart cities and homes. Whereas the smart
home control system components can be incorporated with the existing home
appliances to eliminate the need for human intervention, save electricity,
protect homes from accidents as well as the theft, and provide home residents
with comfort. This work comprises the utilising of the internet of things (IoT)
technology to build the proposed design for the smart home. The proposed
design includes many subsystems as well as several types of sensors, such as
the passive infrared (PIR) sensor, the gas sensor, the soil moisture sensor, the
water level sensor, the temperature sensor, the light dependent resistance
(LDR), and the flame sensor. Each sensor will be connected to the Arduino
Nano for the data processing purpose, after which the Arduino Nano will be
connected to the NodeMCU module via the digital pins to implement the IoT
subsystem. The proposed system also includes a smart garage gate based on
Bluetooth HC-05 module with a specially programmed android app.
Technology is always evolves. To be able to design a product using the current technology that will be
beneficial to the lives of others is a huge contribution to the human community. This paper presents the design and
implementation of a low cost but yet flexible mechanism using a smartphone based home automation system. With
the rapid expansion of the Internet, the owners have been requesting remote control and monitoring of these inhome
appliances. This leads to networking these appliances to form a kind of home automation system. An
Android based home automation system allows users to control the appliances by an Android application or
through a website is presented.
Keywords: - Home automation; android; arduino; automation; smart phone.
Energy Management with Disaster Intimation and Control using IoTIJEACS
In the area of digitization and automation, the life of
human being is getting simpler as almost everything is
automated. Nowadays humans have made internet an integral
part of their everyday life without which they are helpless.
Internet of things (IoT) gives a platform which allows different
devices to inter-connect, sense and control the things remotely
across a network infrastructure without any limitation to the
coverage area. In our proposed work, we stress on Wireless-
Home-Automation-System (WHAS) using IoT, it is a system uses
computers or smart phone to control basic home functions and
features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home.
The proposed system is able to monitor the entire things
connected to the internet and also to be maintaining the status of
individual devices for further action. We have built the home
automation with several devices and sensors, here sensor help to
monitor the device status and intimate the authorized person to
take particular action.
Similar to Android Based Home-Automation using Microcontroller (20)
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Bandwidth Estimation Techniques for Relative ‘Fair’ Sharing in DASHEswar Publications
In the adaptive video streaming (AVS) literature the term fair sharing has been used to describe equal amounts of bandwidth allocated to adaptive client players. However, we argue that even though bandwidth sharing is an important aspect in some problems the same does not apply to AVS. Here the term relative ‘fair’ sharing is more applicable. The reason is that videos have different quality levels and will require differing amounts of the bandwidth to satisfy their needs. A 90% to 10% sharing may be sufficient for two players, one with high demands and the other with low demands. A 50% sharing may lead the player with the high bandwidth demand to get too little of the needed bandwidth resource. In addition, channel conditions may lead to players requiring different amount of bandwidth. Again, the concept of fair sharing has to be extended to relative ‘fair’ sharing for such scenarios. Hence, bandwidth estimation techniques players use to estimate the network bandwidth is very important in segment selection. A player utilizes one of the many techniques to determine what share of the bandwidth it can utilize among competing players. In this paper we explore some of the techniques used in state of-the-art players in their attempt to obtain a ‘fair’ share of the network bandwidth.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Android Based Home-Automation using Microcontroller
1. Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3724-3727 (2018) ISSN: 0975-0290
3724
Android Based Home-Automation using
Microcontroller
Dr. Harsh Dev
Dean, Pranveer Singh Institute of Technology, kanpur
Email: drharshdev@gmail.com
Anjani Gupta
Department of Computer Science and Engineering, Pranveer Singh Institute of Technology, kanpur
Email: anjani050296@gmail.com
Himanshi Jain
Department of Computer Science and Engineering, Pranveer Singh Institute of Technology, kanpur
Email: himanshijain95hj@gmail.com
Aditya Agarwal
Department of Computer Science and Engineering, Pranveer Singh Institute of Technology, kanpur
Email: agarwaladitya0502@gmail.com
Raghvendra Gupta
Department of Computer Science and Engineering, Pranveer Singh Institute of Technology, kanpur
Email: raghu1996gupta@gmail.com
Kavleen Kaur
Department of Computer Science and Engineering, Pranveer Singh Institute of Technology, kanpur
Email: kavleenbehr@gmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are
developed. Home Automation systems have been developed by several researchers. The limitations of home
automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper
as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that
leads to the development of efficient home automation systems. The system is operational to control various home
appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all
components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Keywords - Android Application, BC547 Transistor, PIC Microcontroller, Relays.
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: April 26, 2018 Date of Acceptance: June 23, 2018
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
IOT is Internet of Things which basically denotes the
intercommunication among devices by using embedded
system [1]. The backbone of the Smart Homes is Home
Automation which means controlling all the appliances
without going close to the switches to control them. Home
Automation has become cost effective using embedded
systems. User comfort, security and flexibility along with
maintaining living standard is provided by embedded
system. The Home Automation comprises of controllers
viz. server of the system.
II. METHODOLOGY
There are two sections in which the model is divided i.e.
security and automation.
For security all the vigorous attempts are made to make
the system secured. For the automation of the system all
the procedure and methods of operating is handled [2].
The owner of the house has the authority over all the home
appliances. The user has the default password. As the user
login the app, an OTP is send to the registered number.
This OTP is then valid for only ten seconds.
For the user login module, we have introduced user id as
well as password for the security purpose in the android
application. The mobile is connected via hotspot to the
laptop.
The android application “Home App” sends request to the
server database and database passes on the request to the
hardware connected to the laptop through UART driver of
PIC 16F72 microcontroller. The “Home App” and server
as well as server and laptop is a two-way communication
whereas the communication between hardware and laptop
is one way or serial communication. HTTP and RS232 are
following protocols which we are using for
communication
2. Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3724-3727 (2018) ISSN: 0975-0290
3725
1.1 Software Requirements
1.1.1 Android
The android application developed “Home App” is
certainly based on Linux operating system which uses
Java and XML- languages for running applications and
this provides flexible control of devices. The main purpose
of this project is using Wi-Fi Hotspot to send control
signals from mobile to hardware [11].
1.1.2 XAMPP
In “Home App” Xampp is used to connect SQL server for
database for turning on / off the statuses of the appliances
connected.
1.1.3 Embedded C
It is a language which is not only used in microcontrollers
but also to define common issues prevailing among C
extensions.
1.2 Hardware Requirements
1.2.1 PIC Microcontroller
The PIC 16F72 microcontroller contains UART driver
which is used to connect the hardware with the laptop. To
offload the I/O tasks from CPU, PIC 16F72 is used.
1.2.2 Relay
Relay is used for switching ON/OFF the device or to vary
the light brightness. Relays are associated with every
appliance used in the system. Other part or the end of the
relay is connected to PIC16F72 microcontroller board [1].
1.2.3 USB Keyboard and mouse
1.2.4 HDMI monitor and cable
1.2.5 Micro USB power adapter (smart phone charger)
III. DESIGN OVERVIEW
The design of the proposed model is shown through Use
case Diagram and Entity Relationship diagram [11].
3. Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3724-3727 (2018) ISSN: 0975-0290
3726
IV. IMPLEMENTATION AND EXPERIMENTATION
The implementation here depicts the status of the
hardware in ON/OFF state [4]. Firstly we login into the
app “Home App” fig 5(a). This username and password
gets saved in admin database. Now the user has control
over all their home appliance and he can switch ON/OFF
as per his needs.
In the “Home App”, the user has to login everytime he
opens it because due to security reasons.
V. RESULTS AND DISCUSSIONS
The paper offers frugal, safe, frequently accessible results
for home automation which consists of more features and
it is very cost effective as compared to others. The
proposal discussed in this paper is new and it has attained
the objective of controlling home appliances through
hotspot without going near to the switches. The program
4. Int. J. Advanced Networking and Applications
Volume: 10 Issue: 01 Pages: 3724-3727 (2018) ISSN: 0975-0290
3727
coded in embedded C in the PIC microcontroller has been
used for switching ON and OFF the following four
appliances. When the user switches ON in the android app
appliance1, then that appliance1 switches ON through the
microcontroller. Likewise, other appliances also work
same. The project is working efficiently in all tests.
A conclusion section must be included and should indicate
clearly the advantages, limitations, and possible
applications of the paper. Although a conclusion may
review the main points of the paper, do not replicate the
abstract as the conclusion. A conclusion might elaborate
on the importance of the work or suggest applications and
extensions.
VI. CONCLUSION
In this paper as we have proposed, the working protocol of
PIC 16F72 technology which is secure, cost efficient,
flexible and Wi-Fi based, providing solution to home
automation by using android smart “Home App”. The
system will expedite users to pair with any sort of android
devices through Wi-Fi and control the electrical appliances
of the room.
The “Home App” developed is easy to operate providing
flexibility and rich GUI interface to the users.
VII. FUTURE SCOPE
We have introduced the recommended system which is
being reinforced via aid of Arduino/AVR/ARM based
microcontroller technology. The same work can be
extended by using advanced wireless communication such
as ZigBee to increase the range of communication. By the
use of Smart IR sensor technology, we can save electricity
as well as the environment. The application can also be
extended for platforms other than Android like IOS and
Windows Phones. The application would then be more
eco-friendly.
ACKNOWLEDGEMENTS
Authors are gratitude to Head and dept. of CSE, staff
members and college management for their sincere and
financial support for carrying out this research work on
Internet of Things (IOT).
REFERENCES
Journal Papers:
[1] Vimal Nakrani, Internet of things (IOT) based smart
home automation, International Journal of Recent
Trends in Engineering & Research (IJRTER), vol. 3,
pp. 231-236, March – 2017.
[2] Viraj Mali, Home automation and security using
arduino microcontroller, International Journal of
Research in Advent Technology Special Issue
National Conference, pp. 214-217, 19 March 2016.
[3] A. Mathi, Home automation based on IOT,
International Journal of Advance Research, Ideas and
Innovations in Technology, vol. 3, pp. 1556-1559,
2017.
[4] Waiz Khan, Smart home (home automation),
International Journal of Latest Transactions in
Engineering and Science, vol. 2, pp. 22-27, April
2017.
[5] Mohamed Abd El-Latif Mowad, Smart home
automated control system using android application
and microcontroller, International Journal of
Scientific & Engineering Research, vol. 5, pp. 935-
939, May-2014.
[6] Abhishek Bhat, Home automation using internet of
things , International Research Journal of
Engineering and Technology (IRJET), vol. 4, pp. 917-
920, July -2017.
[7] Abhishek Saxena, Smart home automation using
android application, International Journal of
Scientific Research and Management Studies
(IJSRMS), vol. 3, pp. 326-329.
[8] M.Abivandhana, Smart home automation based on
IOT and android technology, International Journal of
Engineering Science and Computing, vol. 7, pp. 5943-
5946, March 2017.
[9] https://hacktronics.co.in/microcontrollers/pic16f72-
iso-microchip-8-bit-pic-microcontroller
Proceedings Papers:
[10]Kim Baraka, Low cost arduino/android-based energy-
efficient home automation system with smart task
scheduling, Fifth International Conference on
Computational Intelligence, Communication Systems
and Networks, pp. 296, 2013.
[11]Er. Vikram Puri, Real time smart home automation
based on PIC microcontroller, bluetooth and android
technology, International Conference on Computing
for Sustainable Global Development (INDIACom),
pp. 1478-1484, 2016.
Biographies and Photographs
Dr. Harsh Dev is a Professor in Dept. of
Computer Science and Engineering, he is
also holding a position of Dean Research at
Pranveer Singh Institute of technology,
Kanpur, India. He got his M.Sc. Degree in
1995 from Lucknow University, India & Ph.D. degree in
Computer Science in 2005 from Babasaheb Bhimrao
Ambedkar University, Lucknow, India.
He has 23 years of teaching experience and 16 years of
research experience in the field of Computer Graphics,
Software Engineering and Data Mining. He has published
more than 40 International and National publications. He
is a member of Computer Society of India, Indian Science
Congress and International Association of Engineers
(IAENG).
Anjani Gupta is a Student pursuing
B.Tech (2014-2018) in Dept. of Computer
Science and Engineering, Pranveer Singh
Institute of Technology.
Himanshi Jain is a Student pursuing
B.Tech (2014-2018) in Dept. of
Computer Science and Engineering,
Pranveer Singh Institute of Technology.