Ubiquitous Computing uses mobile phones or tiny devices for application development with sensors
embedded in mobile phones. The information generated by these devices is a big task in collection and
storage. For further, the data transmission to the intended destination is delay tolerant. In this paper, we
made an attempt to propose a new security algorithm for providing security to Pervasive Computing
Environment (PCE) system using Public-key Encryption (PKE) algorithm, Biometric Security (BS)
algorithm and Visual Cryptography Scheme (VCS) algorithm. In the proposed PCE monitoring system it
automates various home appliances using VCS and also provides security against intrusion using Zigbee
IEEE 802.15.4 based Sensor Network, GSM and Wi-Fi networks are embedded through a standard Home
gateway.
Energy Management with Disaster Intimation and Control using IoTIJEACS
In the area of digitization and automation, the life of
human being is getting simpler as almost everything is
automated. Nowadays humans have made internet an integral
part of their everyday life without which they are helpless.
Internet of things (IoT) gives a platform which allows different
devices to inter-connect, sense and control the things remotely
across a network infrastructure without any limitation to the
coverage area. In our proposed work, we stress on Wireless-
Home-Automation-System (WHAS) using IoT, it is a system uses
computers or smart phone to control basic home functions and
features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home.
The proposed system is able to monitor the entire things
connected to the internet and also to be maintaining the status of
individual devices for further action. We have built the home
automation with several devices and sensors, here sensor help to
monitor the device status and intimate the authorized person to
take particular action.
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMijistjournal
As technology becomes more advanced and modernized; more features are added to the existing system for the purpose of satisfying the increasing security needs of the people. Deploying wireless technologies for security and control in home offers attractive benefits along with user friendly interface. In this paper we present a smart security system comprises of Zigbee, GSM, Sensors and Smartphone for Security monitoring and control, when the user is at remote premises. Three sensors namely PIR, vibration and door sensor are installed at windows and doors. Whenever there is a security breach the sensors sends the signal to the Pic microcontroller. The Max 232 converter provides serial interface between the microcontroller and the zigbee. The Zigbee end device then transmits the signal to the Zigbee coordinator. The ZC at the control console communicates with MCU using max 232 converters. MCU would in turn access and control the GSM module via AT commands and automatically sends SMS to the owner's mobile phone informing him about the security breach. On receiving the SMS, user can make a video call using Skype account; Smartphone installed at home will feed us with a live video. On viewing the video the user can know whether an intruder has entered or not. Then accordingly faint gas valve and door lock can be controlled by the user. Thus whenever there is an intrusion, our system lets the user to monitor and control his premises from any part of the world.
Energy Management with Disaster Intimation and Control using IoTIJEACS
In the area of digitization and automation, the life of
human being is getting simpler as almost everything is
automated. Nowadays humans have made internet an integral
part of their everyday life without which they are helpless.
Internet of things (IoT) gives a platform which allows different
devices to inter-connect, sense and control the things remotely
across a network infrastructure without any limitation to the
coverage area. In our proposed work, we stress on Wireless-
Home-Automation-System (WHAS) using IoT, it is a system uses
computers or smart phone to control basic home functions and
features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home.
The proposed system is able to monitor the entire things
connected to the internet and also to be maintaining the status of
individual devices for further action. We have built the home
automation with several devices and sensors, here sensor help to
monitor the device status and intimate the authorized person to
take particular action.
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
Wireless Sensor Network (WSN) is a promising field for research. As the use of this field increases, it is
required to give proper security to this field. So to ensure the security of communication of data or messages and to
control the use of data in WSN is of great importance. As sensor networks interact with responsive data and operate
in unfriendly unattended area, from the time of system design these security concerns should be addressed. The paper,
presents a modified Motesec security protocol which is a security mechanism for Wireless sensor network. In this
protocol a hash function based approach is used to detect replay attacks. For data access control key lock matching
method i.e. memory data access control policy is used to prevent unauthorized data access. Encoding and
reconstruction scheme is used to find out attacker. Flooding attack detection by comparing data rate. There is currently
massive research is present in the area of wireless sensor network security..Keywords: GPS,GCM,LBS Android.
Keywords: secure communication architecture, wireless Sensor network security.
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMijistjournal
As technology becomes more advanced and modernized; more features are added to the existing system for the purpose of satisfying the increasing security needs of the people. Deploying wireless technologies for security and control in home offers attractive benefits along with user friendly interface. In this paper we present a smart security system comprises of Zigbee, GSM, Sensors and Smartphone for Security monitoring and control, when the user is at remote premises. Three sensors namely PIR, vibration and door sensor are installed at windows and doors. Whenever there is a security breach the sensors sends the signal to the Pic microcontroller. The Max 232 converter provides serial interface between the microcontroller and the zigbee. The Zigbee end device then transmits the signal to the Zigbee coordinator. The ZC at the control console communicates with MCU using max 232 converters. MCU would in turn access and control the GSM module via AT commands and automatically sends SMS to the owner's mobile phone informing him about the security breach. On receiving the SMS, user can make a video call using Skype account; Smartphone installed at home will feed us with a live video. On viewing the video the user can know whether an intruder has entered or not. Then accordingly faint gas valve and door lock can be controlled by the user. Thus whenever there is an intrusion, our system lets the user to monitor and control his premises from any part of the world.
As technology becomes more advanced and modernized; more features are added to the existing system
for the purpose of satisfying the increasing security needs of the people. Deploying wireless technologies
for security and control in home offers attractive benefits along with user friendly interface. In this paper
we present a smart security system comprises of Zigbee, GSM, Sensors and Smartphone for Security
monitoring and control, when the user is at remote premises. Three sensors namely P
IR, vibration and door sensor are installed at windows and doors. Whenever there is a security breach the
sensors sends the signal to the Pic microcontroller. The Max 232 converter provides serial interface
between the microcontroller and the zigbee. The Zigbee end device then transmits the signal to the Zigbee
coordinator. The ZC at the control console communicates with MCU using max 232 converters. MCU
would in turn access and control the GSM module via AT commands and automatically sends SMS to the
owner's mobile phone informing him about the security breach. On receiving the SMS, user can make a
video call using Skype account; Smartphone installed at home will feed us with a live video. On viewing
the video the user can know whether an intruder has entered or not. Then accordingly faint gas valve and
door lock can be controlled by the user. Thus whenever there is an intrusion, our system lets the user to
monitor and control his premises from any part of the world.
Smart home system is very popular in current days that give many kind of application that make all simple and easy to control. In modern day, home machines are using wireless equipment and can be retrieved by internet that will make populations life easier and organized. It based Home Computerization System is designed to assist the people with physical debilities and elderly to provide support as well as to control the electrical usages and monitor the room infection using mobile application. The design is using surrounded controller board and the home appliances are physically associated to output ports of this board via relays. The Home Automation is a wireless home computerization system that is supposed to be executed in existing home environments, without any variations in the infrastructure. Arun Kumar. N | Sathiyabama. T "Smart Security System (IOT)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29337.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29337/smart-security-system-iot/arun-kumar-n
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
IOT Based Smart Home System TechnologiesIJERDJOURNAL
ABSTRACT:- The IoT allows objects to be sensed and/or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems. It results improved efficiency, accuracy and economic benefit in addition to reduced human intervention. On the other hand, IoT systems could also be responsible for performing actions, not just sensing the things. Intelligent Shopping systems, for example could monitor specific users purchasing habits in a store by tracking their specific mobile phones. Other applications that the Internet of Things can provide enabling extended home security features and home automation. This paper relates smart home or home automation which induce technology for home atmosphere which is usage to provide ease and protection to its occupants.
Our day-to-day lives are filled with situations
where we need to prove who we are; may it be for personal
reasons or as part of your profession. Locks are to be opened,
e-mail accounts are to be accessed and purchases are to be
made – but only by the person correctly authorized to do so.
Secure Dual-mode Robotic Intrusion Detection System for Remote SurveillanceCSCJournals
Remote video surveillance has become an integral part of premise monitoring in urban society, due to the menace of intruders. There have been various surveillance system implementations, but there is no one that fits all applications. Poor stream rate, security, and propriety issues are the major limitations of these systems. To this extent, a low complexity surveillance system that blends the three factors in a good mix is being presented in this work. A non-propriety, medium-rate MJPEG compression format was employed by the pi-camera to provide a good transmission rate and low storage requirement. The robot controller was linked to the monitoring web page through the Common Gateway Interface (CGI) protocol to provide a dynamic update of the page for real-time monitoring and analysis. The robotic movement of the system was achieved using two dc motors and a caster arranged as a differential wheel system. A combination of obstacle detection and avoidance system makes autonomous robot movement possible. The system test results show good robot navigation with obstacle avoidance and low-latency video streaming. The implemented secure shell protocol ensures secure video transmission.
The Internet of Things (IoT) is a network of interconnected physical devices that can communicate and share data without the need for human involvement.
It has been explicitly defined as a “Information Society Infrastructure” because IoT enables us to collect data from various mediums such as humans, animals, vehicles, and kitchen equipment Thus, any physical object that can be assigned an IP address to permit data transfer over a network can be integrated into an IoT system by integrating it with electronic hardware such as sensors, software, and networking gear.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
Smart surveillance systems play an important role in security today. The goal of security systems is to protect users against fires, car accidents, and
other forms of violence. The primary function of these systems is to offer security in residential areas. In today’s culture, protecting our homes is
critical. Surveillance, which ranges from private houses to large corporations, is critical in making us feel safe. There are numerous machine learning algorithms for home security systems; however, the deep learning convolutional neural network (CNN) technique outperforms the others. The
Keras, Tensorflow, Cv2, Glob, Imutils, and PIL libraries are used to train and assess the detection method. A web application is used to provide a
user-friendly environment. The flask web framework is used to construct it. The flash-mail, requests, and telegram application programming interface (API) apps are used in the alerting approach. The surveillance system tracks
abnormal activities and uses machine learning to determine if the scenario is normal or not based on the acquired image. After capturing the image, it is
compared with the existing dataset, and the model is trained using normal events. When there is an anomalous event, the model produces an output from which the mean distance for each frame is calculated.
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of user's approach to providing feedback for smart home devices. We will conduct an online survey for a sample of three to five students selected by simple random sampling to study the user's motto for giving feedback on smart home devices and their expectations. We have observed that most users are ready to actively share their input on smart home devices to improve the product's service and quality to fulfill the user’s needs and make their lives easier.
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more
straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame
works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of
user's approach to providing feedback for smart home devices. We will conduct an online survey for a
sample of three to five students selected by simple random sampling to study the user's motto for giving
feedback on smart home devices and their expectations. We have observed that most users are ready to
actively share their input on smart home devices to improve the product's service and quality to fulfill the
user’s needs and make their lives easier.
More Related Content
Similar to SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
As technology becomes more advanced and modernized; more features are added to the existing system
for the purpose of satisfying the increasing security needs of the people. Deploying wireless technologies
for security and control in home offers attractive benefits along with user friendly interface. In this paper
we present a smart security system comprises of Zigbee, GSM, Sensors and Smartphone for Security
monitoring and control, when the user is at remote premises. Three sensors namely P
IR, vibration and door sensor are installed at windows and doors. Whenever there is a security breach the
sensors sends the signal to the Pic microcontroller. The Max 232 converter provides serial interface
between the microcontroller and the zigbee. The Zigbee end device then transmits the signal to the Zigbee
coordinator. The ZC at the control console communicates with MCU using max 232 converters. MCU
would in turn access and control the GSM module via AT commands and automatically sends SMS to the
owner's mobile phone informing him about the security breach. On receiving the SMS, user can make a
video call using Skype account; Smartphone installed at home will feed us with a live video. On viewing
the video the user can know whether an intruder has entered or not. Then accordingly faint gas valve and
door lock can be controlled by the user. Thus whenever there is an intrusion, our system lets the user to
monitor and control his premises from any part of the world.
Smart home system is very popular in current days that give many kind of application that make all simple and easy to control. In modern day, home machines are using wireless equipment and can be retrieved by internet that will make populations life easier and organized. It based Home Computerization System is designed to assist the people with physical debilities and elderly to provide support as well as to control the electrical usages and monitor the room infection using mobile application. The design is using surrounded controller board and the home appliances are physically associated to output ports of this board via relays. The Home Automation is a wireless home computerization system that is supposed to be executed in existing home environments, without any variations in the infrastructure. Arun Kumar. N | Sathiyabama. T "Smart Security System (IOT)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29337.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29337/smart-security-system-iot/arun-kumar-n
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
Cloud computing provides great benefits for applications hosted on the Web that also have special
computational and storage requirements. This paper proposes an extensible and flexible architecture for
integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an
interoperable application layer that can be directly integrated into other application domains for remote
monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN). For proof
of concept, we have implemented a REST based Web services on an IP based low power WSN test bed,
which enables data access from anywhere. The alert feature has also been implemented to notify users via
email or tweets for monitoring data when they exceed values and events of interest.
IOT Based Smart Home System TechnologiesIJERDJOURNAL
ABSTRACT:- The IoT allows objects to be sensed and/or controlled remotely across existing network infrastructure, creating opportunities for more direct integration of the physical world into computer-based systems. It results improved efficiency, accuracy and economic benefit in addition to reduced human intervention. On the other hand, IoT systems could also be responsible for performing actions, not just sensing the things. Intelligent Shopping systems, for example could monitor specific users purchasing habits in a store by tracking their specific mobile phones. Other applications that the Internet of Things can provide enabling extended home security features and home automation. This paper relates smart home or home automation which induce technology for home atmosphere which is usage to provide ease and protection to its occupants.
Our day-to-day lives are filled with situations
where we need to prove who we are; may it be for personal
reasons or as part of your profession. Locks are to be opened,
e-mail accounts are to be accessed and purchases are to be
made – but only by the person correctly authorized to do so.
Secure Dual-mode Robotic Intrusion Detection System for Remote SurveillanceCSCJournals
Remote video surveillance has become an integral part of premise monitoring in urban society, due to the menace of intruders. There have been various surveillance system implementations, but there is no one that fits all applications. Poor stream rate, security, and propriety issues are the major limitations of these systems. To this extent, a low complexity surveillance system that blends the three factors in a good mix is being presented in this work. A non-propriety, medium-rate MJPEG compression format was employed by the pi-camera to provide a good transmission rate and low storage requirement. The robot controller was linked to the monitoring web page through the Common Gateway Interface (CGI) protocol to provide a dynamic update of the page for real-time monitoring and analysis. The robotic movement of the system was achieved using two dc motors and a caster arranged as a differential wheel system. A combination of obstacle detection and avoidance system makes autonomous robot movement possible. The system test results show good robot navigation with obstacle avoidance and low-latency video streaming. The implemented secure shell protocol ensures secure video transmission.
The Internet of Things (IoT) is a network of interconnected physical devices that can communicate and share data without the need for human involvement.
It has been explicitly defined as a “Information Society Infrastructure” because IoT enables us to collect data from various mediums such as humans, animals, vehicles, and kitchen equipment Thus, any physical object that can be assigned an IP address to permit data transfer over a network can be integrated into an IoT system by integrating it with electronic hardware such as sensors, software, and networking gear.
Wireless ad hoc networks are autonomous nodes that communicate with each other in a
decentralized manner through multi hop radio network. Wireless nodes form a dynamic network
topology and communicate with each other directly without wireless access point. Wireless networks
are particularly vulnerable to intrusions, as they operate in open medium, and use cooperative
strategies for network communication.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
Smart surveillance systems play an important role in security today. The goal of security systems is to protect users against fires, car accidents, and
other forms of violence. The primary function of these systems is to offer security in residential areas. In today’s culture, protecting our homes is
critical. Surveillance, which ranges from private houses to large corporations, is critical in making us feel safe. There are numerous machine learning algorithms for home security systems; however, the deep learning convolutional neural network (CNN) technique outperforms the others. The
Keras, Tensorflow, Cv2, Glob, Imutils, and PIL libraries are used to train and assess the detection method. A web application is used to provide a
user-friendly environment. The flask web framework is used to construct it. The flash-mail, requests, and telegram application programming interface (API) apps are used in the alerting approach. The surveillance system tracks
abnormal activities and uses machine learning to determine if the scenario is normal or not based on the acquired image. After capturing the image, it is
compared with the existing dataset, and the model is trained using normal events. When there is an anomalous event, the model produces an output from which the mean distance for each frame is calculated.
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of user's approach to providing feedback for smart home devices. We will conduct an online survey for a sample of three to five students selected by simple random sampling to study the user's motto for giving feedback on smart home devices and their expectations. We have observed that most users are ready to actively share their input on smart home devices to improve the product's service and quality to fulfill the user’s needs and make their lives easier.
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more
straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame
works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of
user's approach to providing feedback for smart home devices. We will conduct an online survey for a
sample of three to five students selected by simple random sampling to study the user's motto for giving
feedback on smart home devices and their expectations. We have observed that most users are ready to
actively share their input on smart home devices to improve the product's service and quality to fulfill the
user’s needs and make their lives easier.
October 2023-Top Cited Articles in IJU.pdfijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSijujournal
In order to avoid unnecessary applications of Miller-Rabin algorithm to the number in question, we resort
to trial division by a few initial prime numbers, since such a division take less time. How far we should go
with such a division is the that we are trying to answer in this paper?For the theory of the matter is fully
resolved. However, that in practice we do not have much use.Therefore, we present a solution that is
probably irrelevant to theorists, but it is very useful to people who have spent many nights to produce
large (probably) prime numbers using its own software.
A novel integrated approach for handling anomalies in RFID dataijujournal
Radio Frequency Identification (RFID) is a convenient technology employed in various applications. The
success of these RFID applications depends heavily on the quality of the data stream generated by RFID
readers. Due to various anomalies found predominantly in RFID data it limits the widespread adoption of
this technology. Our work is to eliminate the anomalies present in RFID data in an effective manner so that
it can be applied for high end applications. Our approach is a hybrid approach of middleware and
deferred because it is not always possible to remove all anomalies and redundancies in middleware. The
processing of other anomalies is deferred until the query time and cleaned by business rules. Experimental
results show that the proposed approach performs the cleaning in an effective manner compared to the
existing approaches.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESijujournal
The population of elderly folks is ballooning worldwide as people live longer. But getting older often
means declining health and trouble living solo. Smart home tech could keep an eye on old folks and get
help quickly when needed so they can stay independent. This paper looks at a system combining wireless
sensors, video watches, automation, resident monitoring, emergency detection, and remote access. Sensors
track health signs, activities, appliance use. Video analytics spot odd stuff like falls. Sensor fusion and
machine learning find normal patterns so wonks can see unhealthy changes and send alerts. Multi-channel
alerts reach caregivers and emergency folks. A LabVIEW can integrate devices and enables local and
remote oversight and can control and handle emergency responses. Benefits seem to be early illness clues,
quick help, less burden on caregivers, and optimized home settings. But will old folks use all this tech? Can
we prove it really helps folks live longer and better? More research on maximizing reliability and
evaluating real-world impacts is needed. But designed thoughtfully, smart homes could may profoundly
improve the aging experience.
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEijujournal
In today’s Internet world, log file analysis is becoming a necessary task for analyzing the customer’s
behavior in order to improve advertising and sales as well as for datasets like environment, medical,
banking system it is important to analyze the log data to get required knowledge from it. Web mining is the
process of discovering the knowledge from the web data. Log files are getting generated very fast at the
rate of 1-10 Mb/s per machine, a single data center can generate tens of terabytes of log data in a day.
These datasets are huge. In order to analyze such large datasets we need parallel processing system and
reliable data storage mechanism. Virtual database system is an effective solution for integrating the data
but it becomes inefficient for large datasets. The Hadoop framework provides reliable data storage by
Hadoop Distributed File System and MapReduce programming model which is a parallel processing
system for large datasets. Hadoop distributed file system breaks up input data and sends fractions of the
original data to several machines in hadoop cluster to hold blocks of data. This mechanism helps to
process log data in parallel using all the machines in the hadoop cluster and computes result efficiently.
The dominant approach provided by hadoop to “Store first query later”, loads the data to the Hadoop
Distributed File System and then executes queries written in Pig Latin. This approach reduces the response
time as well as the load on to the end system. This paper proposes a log analysis system using Hadoop
MapReduce which will provide accurate results in minimum response time.
SERVICE DISCOVERY – A SURVEY AND COMPARISONijujournal
With the increasing number of services in the internet, companies’ intranets, and home networks: service
discovery becomes an integral part of modern networked system. This paper provides a comprehensive
survey of major solutions for service discovery. We cover techniques and features used in existing systems.
Although a few survey articles have been published on this object, our contribution focuses on comparing
and analyzing surveyed solutions according eight prime criteria, which we have defined before. This
comparison will be helpful to determine limits of existing discovery protocols and identify future research
opportunities in service discovery.
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSijujournal
Opportunistic Networks are able to exploit social behavior to create connectivity opportunities. This
paradigm uses pair-wise contacts for routing messages between nodes. In this context we investigated if the
“six degrees of separation” conjecture of small-world networks can be used as a basis to route messages in
Opportunistic Networks. We propose a simple approach for routing that outperforms some popular
protocols in simulations that are carried out with real world traces using ONE simulator. We conclude that
static graph models are not suitable for underlay routing approaches in highly dynamic networks like
Opportunistic Networks without taking account of temporal factors such as time, duration and frequency of
previous encounters.
International Journal of Ubiquitous Computing (IJU)ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...ijujournal
The aging population and the consequent increase in the incidence of dementias is causing many
challenges to health systems, mainly related to infrastructure, low services quality and high costs. One
solution is to provide the care at house of the patient, through of home care services. However, it is not a
trivial task, since a patient with dementia requires constant care and monitoring from a caregiver, who
suffers physical and emotional overload. In this context, this work presents an modelling for development of
pervasive systems aimed at helping the care of these patients in order to lessen the burden of the caregiver
while the patient continue to receive the necessary care.
A proposed Novel Approach for Sentiment Analysis and Opinion Miningijujournal
as the people are being dependent on internet the requirement of user view analysis is increasing
exponentially. Customer posts their experience and opinion about the product policy and services. But,
because of the massive volume of reviews, customers can’t read all reviews. In order to solve this problem,
a lot of research is being carried out in Opinion Mining. In order to solve this problem, a lot of research is
being carried out in Opinion Mining. Through the Opinion Mining, we can know about contents of whole
product reviews, Blogs are websites that allow one or more individuals to write about things they want to
share with other The valuable data contained in posts from a large number of users across geographic,
demographic and cultural boundaries provide a rich data source not only for commercial exploitation but
also for psychological & sociopolitical research. This paper tries to demonstrate the plausibility of the idea
through our clustering and classifying opinion mining experiment on analysis of blog posts on recent
product policy and services reviews. We are proposing a Nobel approach for analyzing the Review for the
customer opinion
International Journal of Ubiquitous Computing (IJU)ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...ijujournal
Usability engineering and usability testing are concepts that continue to evolve. Interesting research studies
and new ideas come up every now and then. This paper tests the hypothesis of using an EDA-based
physiological measurements as a usability testing tool by considering three measures; which are observers‟
opinions, self-reported data and EDA-based physiological sensor data. These data were analyzed
comparatively and statistically. It concludes by discussing the findings that has been obtained from those
subjective and objective measures, which partially supports the hypothesis.
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
Optical Character Recognition (OCR) is a technique, used to convert scanned image into editable text
format. Many different types of Optical Character Recognition (OCR) tools are commercially available
today; it is a useful and popular method for different types of applications. OCR can predict the accurate
result depends on text pre-processing and segmentation algorithms. Image quality is one of the most
important factors that improve quality of recognition in performing OCR tools. Images can be processed
independently (.png, .jpg, and .gif files) or in multi-page PDF documents (.pdf). The primary objective of
this work is to provide the overview of various Optical Character Recognition (OCR) tools and analyses of
their performance by applying the two factors of OCR tool performance i.e. accuracy and error rate.
Optical Character Recognition (OCR) is a technique, used to convert scanned image into editable text
format. Many different types of Optical Character Recognition (OCR) tools are commercially available
today; it is a useful and popular method for different types of applications. OCR can predict the accurate
result depends on text pre-processing and segmentation algorithms. Image quality is one of the most
important factors that improve quality of recognition in performing OCR tools. Images can be processed
independently (.png, .jpg, and .gif files) or in multi-page PDF documents (.pdf). The primary objective of
this work is to provide the overview of various Optical Character Recognition (OCR) tools and analyses of
their performance by applying the two factors of OCR tool performance i.e. accuracy and error rate.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to
different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high
throughput for the network and increase the chance for multi path routing. This is because the multiple
channel availability for transmission decreases the probability of the most elegant problem called as
interference problem which is either of interflow and intraflow type. For avoiding the problem like
interference and maintaining the constant network performance or increasing the performance the WMN
need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting
several packets ready for transmission and sending them to the intended recipient through the channel,
while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different
available multiple paths is most the important factor in the both case for a routing algorithm. Hence the
most challenging factor is to determine a forwarding strategy which will provide the schedule for each
node for transmission within the channel. In this research work we have tried to implement two forwarding
strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We
have implemented Global State Routing (GSR) which will consider the packet forwarding concept and
Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding
and packet aggregation. After the successful implementation the network performance has been measured
by means of simulation study.
A SURVEY: TO HARNESS AN EFFICIENT ENERGY IN CLOUD COMPUTINGijujournal
Cloud computing affords huge potential for dynamism, flexibility and cost-effective IT operations. Cloud
computing requires many tasks to be executed by the provided resources to achieve good performance,
shortest response time and high utilization of resources. To achieve these challenges there is a need to
develop a new energy aware scheduling algorithm that outperform appropriate allocation map of task to
optimize energy consumption. This study accomplished with all the existing techniques mainly focus on
reducing energy consumption
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...pchutichetpong
M Capital Group (“MCG”) expects to see demand and the changing evolution of supply, facilitated through institutional investment rotation out of offices and into work from home (“WFH”), while the ever-expanding need for data storage as global internet usage expands, with experts predicting 5.3 billion users by 2023. These market factors will be underpinned by technological changes, such as progressing cloud services and edge sites, allowing the industry to see strong expected annual growth of 13% over the next 4 years.
Whilst competitive headwinds remain, represented through the recent second bankruptcy filing of Sungard, which blames “COVID-19 and other macroeconomic trends including delayed customer spending decisions, insourcing and reductions in IT spending, energy inflation and reduction in demand for certain services”, the industry has seen key adjustments, where MCG believes that engineering cost management and technological innovation will be paramount to success.
MCG reports that the more favorable market conditions expected over the next few years, helped by the winding down of pandemic restrictions and a hybrid working environment will be driving market momentum forward. The continuous injection of capital by alternative investment firms, as well as the growing infrastructural investment from cloud service providers and social media companies, whose revenues are expected to grow over 3.6x larger by value in 2026, will likely help propel center provision and innovation. These factors paint a promising picture for the industry players that offset rising input costs and adapt to new technologies.
According to M Capital Group: “Specifically, the long-term cost-saving opportunities available from the rise of remote managing will likely aid value growth for the industry. Through margin optimization and further availability of capital for reinvestment, strong players will maintain their competitive foothold, while weaker players exit the market to balance supply and demand.”
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
1. International Journal of UbiComp (IJU), Vol.6, No.2, April 2015
DOI:10.5121/iju.2015.6202 13
SECURED SMART SYSTEM DESING IN PERVASIVE
COMPUTING ENVIRONMENT USING VCS
M Varaprasad Rao1
and Prof N Ch Bharta Chryulu2
1
Dept of CSE, Anurag Group of Institutions, Hyderabad,India - 88
2
Dept of Statistics, Collegeof Science, Osmania University-7
ABSTRACT
Ubiquitous Computing uses mobile phones or tiny devices for application development with sensors
embedded in mobile phones. The information generated by these devices is a big task in collection and
storage. For further, the data transmission to the intended destination is delay tolerant. In this paper, we
made an attempt to propose a new security algorithm for providing security to Pervasive Computing
Environment (PCE) system using Public-key Encryption (PKE) algorithm, Biometric Security (BS)
algorithm and Visual Cryptography Scheme (VCS) algorithm. In the proposed PCE monitoring system it
automates various home appliances using VCS and also provides security against intrusion using Zigbee
IEEE 802.15.4 based Sensor Network, GSM and Wi-Fi networks are embedded through a standard Home
gateway.
KEYWORDS
GSM, WI-Fi, Zigbee, Context-aware, Smart Sensor, and Pervasive Computing Environment, Public-Key
Encryption, Visual Cryptography Scheme and MMS.
1. INTRODUCTION
Many approaches to design the user interfaces such as Interaction Design, User Experience
Design (UX), Interactive Systems Design, Cognitive Ergonomics, Man-Machine Interface
(MMI), User Interface Design (UI), Human Factors, Cognitive Task Design, Information
Architecture (IA), Software Product Design, Usability Engineering, User-Centered Design (UCD)
and Computer Supported Collaborative Work (CSCW). The PCE are getting saturated with
computing and communication capability, and integrated with human users. The researchers
proposed number of security systems based on new technologies such as GSM (Global System
for Mobile Communication)[1], GPRS (General Packet Radio Service), Internet, Ubiquitous
sensor networks and Microcontroller unit and ZigBee sensor network[5]. The PCE created by the
smart Sensors [3], wireless networks and context-aware routing protocol for wireless sensor
networks. Each smart Sensor node should have multipath routing protocol to automatically
establish the wireless networks between Smart Nodes. This paper introduces the pervasive
computing based smart home monitoring system‟s using VCS design; that provides secure smart
services to users and demonstrates its implementation using a real time environment.
The general Biometric system [3-5] is described in figure 1. As its foresights are Authentication
has to be transparent, Trusted third party may not be available, Traditional key based systems will
not scale well, Trust based models work well with devices and agents, and Trust is not well
defined for human user. The advantages of biometrics are Uniqueness, No need to remember
passwords or carry tokens, Biometrics cannot be lost, stolen or forgotten, More secure than a long
2. International Journal of UbiComp (IJU), Vol.6, No.2, April 2015
14
password, Solves repudiation problem, and Not susceptible to traditional attacks. The issues are
Biometrics is secure but not secret, permanently associated with user, used across multiple
applications, and can be covertly captured. Examples for Biometrics are 1. Physical Biometrics –
Fingerprint, Hand Geometry Iris patterns. 2. Behavioral Biometrics – Handwriting, Signature,
Speech, Gait. 3. Chemical/Biological Biometrics – Perspiration, Skin composition
(spectroscopy). The Hashing technique is implemented using Biometric as shown in figure2.
Now a days mobile computing with tiny devices has been explored very much rapidly [10–15].
The pollution monitoring application using Cell-Phone-based Sensor Network (CPSN) developed
3. International Journal of UbiComp (IJU), Vol.6, No.2, April 2015
15
in [16] uses short-range communication outlets such as Wi-Fi or Bluetooth. In this paper, we
consider the same CPSN architecture as of [16] shown in following Figure 3.
Figure 3: Cell-phone-based sensor network.
VCS is a method for distributing a secret among a group of participants. Each Participant is given
a share of the secret. The secret can only be reconstructed when the shares are combined together.
Any individual participant cannot recover the secret on his/her own. In secret sharing scheme, let
there are „n‟ participants. Each participant gets a share in such a way that any group of „t‟ or more
participants can together reconstruct the secret but no group of less than „t‟ participants can
recover the secret. Such a system is called a (t, n) – threshold scheme, where „t‟ is the threshold.
In (t, n) visual cryptographic schemes, a secret image (text or picture) is encrypted into „n‟ shares,
which are distributed among „n‟ participants. The image cannot be decoded from any (t–1) or
fewer shares but any„t‟ or more participants can together decode it visually, without using any
complex decoding mechanism shown in following figure 4. Naor and Shamir [22] first proposed
the concept of visual cryptography in the open literature in 1994.
In this proposal, an image consisting of text, drawings etc. are encrypted and the resultant into
two images. These images are given to two different parties as shares. Decryption is possible only
when having both of them together. These shares are stored on transparencies and the process of
decryption begins with stacking these two transparencies together on the overhead projector. In
1995, Blakely introduced the concept of Visual Cryptography Schemes (VCS) by considering
each share is a plane and the secret is the point at which three shares intersect. Two shares out of
three are insufficient to determine the secret. This scheme is less efficient than Shamir‟s scheme
because the shares are „t‟ times larger where „t‟ is threshold.
Figure 4: VCS image
4. International Journal of UbiComp (IJU), Vol.6, No.2, April 2015
16
The Existing System
There are many definitions available in the literature.
1. Describes a system using Internet, GSM and Speech Recognition. In this system the
home gateway is connected via Internet and it needs a Personal Computer (PC). To work
with PC for longer time is very hard and it consumes power.
2. Describes a Java enabled mobile system. The research proposes an embedded home
server but it is required an Internet connectivity for GPRS. The mobile systems are
directly connected to processors via cables; this causes increasing the cost and also
required typical installation process. Once this system is installed successfully then it
becomes permanent network, and it is not easy to change the geographical location from
one to other place.
3. Describes a Bluetooth system, it consists of a primary controller and sub-controllers,
these sub-controller are enabled by Bluetooth. Every home applicance is directly
connected to a local sub-controller. The home devices communicate with their
corresponding sub-controller using wired communications. The communication is done
sub-controller to primary controller via wireless communications. It is mandatory that
evry home appliance is directly connected to a Bluetooth module.
4. The Biometric describes as; it is secure but not secret, permanently associated with user,
used across multiple applications, and can be covertly captured. The types of
circumventions may be Denial of service attacks, Fake biometrics attack, Replay and
Spoof attacks, Trojan horse attacks, Back end attacks and Collusion & Coercion.
Features of the Proposed System
The proposed system is a combination of Internet, GSM, BAN and Zigbee. The connection and
communication of sensors is done by Zigbee and to cover these sensors of a large space is done
through GSM. The proposed system provides reliable, secure, and anywhere access. To
transmitting the information to control panel the sensors uses wireless Zigbee. The control panel
controls the operation of this system and it acts like a gateway of home. This model uses the
wireless controlling methods such as, GSM Networks, Internet, Zigbee Sensor Network. It also
provides confidential and authentication credentials through VCS to maintain secure and secrecy
by a three step procedure explained in the proposed algorithm.
2. SYSTEM ARCHITECTURE
The following figure 5 explains about conceptual design of pervasive computing high secured
home system. The network has low speed data and high speed data rate; ZigBee is used for low
speed data and Wi-Fi is used for high speed data rate. A home gateway is used to provide
interoperability between the heterogeneous Zigbee and Wi-Fi networks. It also provides local and
remote control, and monitoring over the home‟s devices. Remote users can access the system
using the Internet. The remote user‟s can do communicates the data in the form of cryptographic
secret sharing scheme via MMS over an Internet until they reach the home network. Then the
PCE uses wireless transmission using the homes Wi-Fi network to the Home Gateway.
5. International Journal of UbiComp (IJU), Vol.6, No.2, April 2015
17
3. SYSTEM IMPLEMENTATION
As depicted above the PCE based smart home system is implemented for the perceiving and
control of household devices. To facilitate high data rate a Wi-Fi network is implemented in
connect with PCE devices. The interoperability is provided via home gateway. The gateway
provides an interface to user to access local and remote networks. The existing system PCE
provided security and safety of the smart home environment. To demonstrate the feasibility and
effectiveness of the proposed system for smart devices, a light switch, smart fan, smart sensors,
GSM networks and ZigBee remote control system have been developed and integrated with the
smart home automation system.
Security
The privacy is very less in the existing home automation system. So we proposed an algorithm
Smart Secure Hash Algorithm (SSHA) for Smart Home System using by pervasive computing
technologies.
Smart Secure Hash Algorithm
Security is considered as a major issue when it comes to a smart home system with the pervasive
computing environment. The proposed algorithm Smart Secure Hash Algorithm (SSHA) used in
smart home system and it works as follows:
1. Start the Digital Door Lock System.
2. Use the physical biometric measurement (Fingerprint or Iris pattern or Hand
Geometry) to read the data/image of a secured person through Smart Sensor.
3. The captured Biometric image will now check and match the image which is already
stored in the database engine.
4. If the image matches with the database image then
a. Obtain SMS based one time password/random number to mobile phone from
an authorized person. (Confidentiality)
6. International Journal of UbiComp (IJU), Vol.6, No.2, April 2015
18
b. The database engine now will combine that captured biometric image and the
one time password and construct a (2, n) VCS data by using SHA,
Biometrics security algorithm and Visual Cryptography Secret Sharing
Scheme. (Authentication)
c. The constructed (2, n) VCS code is now sent to the database and compared
with the image of database. (Authentication)
d. If it matches then
The door will be opened
else
The error message will be displayed.
Else
The error message will be displayed.
5. If the Digital Door opens then all Smart Sensors and GSM module will be activated;
and will be allowed to control the home appliances of Pervasive Computing
Environment. Otherwise the defect sensor determines that who is not an authorized
person.
6. Once GSM system is activated a customized message will be sent to all the
connected users of the database. For example, “Mark Weiser is opened the door at
6.30 pm”
7. If the person entered inside home is not secured then a hidden camera is activated by
human defect sensors, it captures a MMS image and sent the same to the connected
database users. Immediately the secured user will have to lock the door remotely by
availing the SMS service.
4. CONCLUSION
In this paper, we made an attempt to propose a new security algorithm for providing
confidentiality and authentication credentials in Pervasive Computing Environment (PCE) system
using Public-key Encryption (PKE) algorithm, Biometric Security (BS) algorithm and Visual
Cryptography Scheme (VCS) algorithm. In the proposed PCE monitoring system it automates
various home appliances using VCS and also provides security against intrusion using Zigbee
IEEE 802.15.4 based Sensor Network, GSM and Wi-Fi networks are embedded through a
standard Home gateway.
5. REFERENCES
1. Bares Yuksekkaya, M. Bilgehan Tosun, M. Kaan Ozcan and Ali Ziya Alkar. "A GSM, Internet
and Speech Controlled Wireless Interactive Home Automation System" IEEE Transactions on
Consumer Electronics, Vol.52 No. 3, pp: 837-843, 2006.
2. M. Van Der Werff, X. GUI and W.L. Xu. "A Mobile-Based Home Automation System" 2nd
International conference on mobile technology, Applications and systems. Pp 1-5,2005.
3. N. Sriskanthan, F. Tan and A. Karande, "Bluetooth based home automation system",
Microprocessors and Microsystems, Vol. 26, no. 6, pp. 281-289, 2002.
4. H. Ardam and I. Coskun, "A remote control for home and office appliances by telephone", IEEE
Transactions on Consumer Electronics, Vol. 44, no. 4, pp. 1291-1297, 1998.
5. Khusvinder Gill, Shuang-Hua Yang, Fang Yao, and Xin Lu,”A ZigBee Based Home Automation
System”, IEEE Transactions on Consumer Electronics, Vol. 55, No. 2, MAY 2009
6. Minal S.Khandare,Anjali Mahajan " Mobile Monitoring System For Smart Home",3rd
International conference on Emerging Trends in Engineering and Technology.IEEE 2010
7. International Journal of UbiComp (IJU), Vol.6, No.2, April 2015
19
7. Ventylees Raj.S / International Journal of Engineering Science and Technology (IJEST) ISSN :
0975-5462 Vol. 4 No.11 November 2012 4668
8. Joseph. B. Kruskal,”On the Shortest Spanning Subtree of a Graph and the Traveling Salesman
Problem,” In Proceeding of the American Mathematical Society, Vol. 7, no. 1, pp. 48–50,
Feb.1956.
9. Naeem Jan, Chankil Lee, Saeed Iqbal, "Implementation of Zigbee-GSM based Home Security
Monitoring and Remote Control", 2011 IEEE.
10. T. Abdelzaher, Y. Anokwa, P. Boda et al., “Mobiscopes for human spaces,” IEEE Pervasive
Computing, vol. 6, no. 2, pp. 20–29, 2007. View at Publisher · View at Google Scholar · View at
Scopus
11. S. Eisenman, N. Lane, E. Miluzzo, R. Peterson, G. Ahn, and A. Campbell, “Metrosense project:
people-centric sensing at scale,” in Proceedings of the 1st Workshop on World-Sensor-Web
(WSW'06), Citeseer, Boulder, Colo, USA, 2006.
12. S. C. Hu, Y. C. Wang, C. Y. Huang, and Y. C. Tseng, “A vehicular wireless sensor network for
CO2 monitoring,” in Proceedings of the IEEE Sensors Conference (SENSORS'09), pp. 1498–
1501, Christchurch, New Zealand, October 2009. View at Publisher · View at Google Scholar ·
View at Scopus
13. B. Hull, V. Bychkovsky, Y. Zhang et al., “CarTel: a distributed mobile sensor computing system,”
in Proceedings of the 4th International Conference on Embedded Networked Sensor Systems
(SenSys'06:), pp. 125–138, November 2006. View at Publisher · View at Google Scholar · View
at Scopus
14. U. Lee, B. Zhou, M. Gerla, E. Magistretti, P. Bellavista, and A. Corradi, “Mobeyes: smart mobs
for urban monitoring with a vehicular sensor network,” IEEE Wireless Communications, vol. 13,
no. 5, pp. 52–57, 2006. View at Publisher · View at Google Scholar · View at Scopus
15. P. Mohan, V. Padmanabhan, and R. Ramjee, “Nericell: rich monitoring of road and traffic
conditions using mobile smartphones,” in Proceedings of the 6th ACM Conference on Embedded
Network Sensor Systems, pp. 323–336, 2008.
16. D. Chander, B. Jagyasi, U. B. Desai, and S. N. Merchant, “Spatio-temporally adaptive waiting
time for cell phone sensor networks,” International Journal of Distributed Sensor Networks, vol.
2011, Article ID 962476, 21 pages, 2011. View at Publisher · View at Google Scholar · View at
Scopus
17. M. B. Shah, S. N. Merchant, and U. B. Desai “Human-Mobility-Based Sensor Context-Aware
Routing Protocol for Delay-Tolerant Data Gathering in Multi-Sink Cell-Phone-Based Sensor”,
International Journal of Distributed Sensor Networks, Volume 2012 (2012), Article ID 785984, 19
pages, doi:10.1155/2012/785984
18. Adhikari A, Bose M, 2004, “A new visual cryptographic scheme using Latin squares”, IEICE
Trans Fund E, Vol.87, pp.1998-2002.
19. Adhikari A, Bose M, Kumar D, Roy B, 2005, “Applications of PBIBD‟s in developing visual
cryptographic schemes”, ISI Technical report No: ASD/2005/11.
20. Atenson G, Blundo C, de Santis, Stinson D, 1996, “Visual cryptography for general access
structures”, Information and Computation, Vol.129 (2), pp.86-106
21. Atenson G, Blundo C, de Santis, Stinson D, 1999, “Construction and bounds for Visual
cryptography”, Theoretical Computer science, Vol.250, pp.143-161
22. Noar M, Shamir A, 1994, “Visual cryptography”, Eurocrypt‟94, Springer-Verlog, Berlin, pp.1-12.
23. M Varaprasd Rao, A Damodaram, N Ch Bhrta Chryulu “Algorithm for clustering with Intrusion
Detection using Modified & Hashed K-means algorithms”; CSIA12.
24. INKA research group. INKA research group "Information and Communication Systems".
[Online]. http://inka.htw-berlin.de/
25. http://oracle.com/Java APIs (2012).
26. MIT Project Oxygen. http://oxygen.lcs.mit.edu/videometaglue.html
27. CMU Project Aura. http://www-2.cs.cmu.edu/ aura/.
28. IBM Planet Blue, http://researchweb.watson.ibm.com/compsci/planetblue.html
29. http://www.google.co.in/search?q=pervasive+computing+devices&hl=en&tbo=u&tbm=isch&sour
ce=univ&sa=X&ei=LwUUbrJLYK0rAeV5oHIBw&sqi=2&ved=0CCwQsAQ&biw=1024&bih=6
29