Smart Home concept is to connect several devices to perform control and the device to be controlled to help any human needs. So it should have one device being Host and several devices being Client. The environment in this case is a home that there is too much technology that planted technologies that has much influence at human activities is called pervasive computing. The device communication should be has a protocol, at the research used UDP protocol because it doesn't need to negotiate before performing communication like a TCP. With UDP behavior did not use to validate at every send or deliver data because at Smart Home environment doesn't need a large or big data being processed. LabView used at this research based on previous research, but MyRIO has used this research to perform Client and Host performed by PC. So it can measure how usable the design that created. This research proves that LabView and MyRIO successfully implemented with the design that created to perform Pervasive Computing for Smart Home environment. Functional testing scenario conducted by every condition that on system environment, based on design all testing scenario successfully and working as well as expected.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract: Android based E-home is an application of embedded system which integrates Android operating system, Arduino controller and GSM for the implementation of Smart Home. Any Android device can act as a transmitting device. The user can control any appliance through an user friendly mobile application built in Android platform. A unique code for controlling each appliance installed with the system is assigned in the program and it is transmitted from the Android phone to the CPU installed in receiver, through the application, as Text messages. The GSM receiver in the CPU receives the text messages from the transmitting device and transfers it to the controller. The Controller decodes the message based on the decoding algorithm stated in the program and based on the command from the user; the controller sends signals to the switching circuitry. The Switching circuitry is the device which is in direct contact with the home appliances through wires and it controls the devices connected to it. Thus, by controlling the Switching circuitry, it is possible to control the various devices. Backward communication is also enabled when an event occurs in the mechanical switch. In this case, the GSM shield acts as a transmitter and sends a message to the user. Thus, ‘Android based E-Home’ provides a cost efficient, long range solution for the implementation of a smart home using less complex circuits and also provides an user friendly environment through the android app. There is no need for an extra hardware as the Android smart phone itself acts as a transmitter which in turn contributes to the cost efficiency, ease of access and efficient operation of the system.
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSijwmn
With the surging of mobile applications, mobile security draws more and more attentions from researchers
in various areas. Due to the lack of quality assurance approaches in mobile computing, many mobile
applications suffer the vulnerabilities and security flaws. In this paper, we proposed a model based unit
testing approach on the android security properties using JUnit. Both behavior and structure model of the
android application were developed on the Unified Modeling Language (UML) – behavior is described in
state diagram, while structure is described in class diagram. Our approach focus on two common security
groups – the access control and authentication properties. Both groups are represented in the operations
defined in the class diagrams and dynamic behaviors are captured (partially) in the state diagram. A set of
well defined test cases is developed to validate the desired properties based on the class diagram. All
properties on the class diagram and state diagram are described in Object Constraint Language (OCL) – a
formal specification language on the first order logic and set theory.The results of this research will
provide a sound foundation towards the specification based unit testing on mobile security.
Smart home technology is emerging rapidly as an exciting new paradigm. A wide range of aspects that
includes security, energy saving, ventilation, smart kitchen is covered in this paper. All of the above is executed with
the help of smart devices such as remote control, security alarms, sensors etc. In this paper we present the above
mentioned technologies and tools that can be integrated in smart home systems which can provide security energy
saving and other such smart systems.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Abstract: Android based E-home is an application of embedded system which integrates Android operating system, Arduino controller and GSM for the implementation of Smart Home. Any Android device can act as a transmitting device. The user can control any appliance through an user friendly mobile application built in Android platform. A unique code for controlling each appliance installed with the system is assigned in the program and it is transmitted from the Android phone to the CPU installed in receiver, through the application, as Text messages. The GSM receiver in the CPU receives the text messages from the transmitting device and transfers it to the controller. The Controller decodes the message based on the decoding algorithm stated in the program and based on the command from the user; the controller sends signals to the switching circuitry. The Switching circuitry is the device which is in direct contact with the home appliances through wires and it controls the devices connected to it. Thus, by controlling the Switching circuitry, it is possible to control the various devices. Backward communication is also enabled when an event occurs in the mechanical switch. In this case, the GSM shield acts as a transmitter and sends a message to the user. Thus, ‘Android based E-Home’ provides a cost efficient, long range solution for the implementation of a smart home using less complex circuits and also provides an user friendly environment through the android app. There is no need for an extra hardware as the Android smart phone itself acts as a transmitter which in turn contributes to the cost efficiency, ease of access and efficient operation of the system.
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSijwmn
With the surging of mobile applications, mobile security draws more and more attentions from researchers
in various areas. Due to the lack of quality assurance approaches in mobile computing, many mobile
applications suffer the vulnerabilities and security flaws. In this paper, we proposed a model based unit
testing approach on the android security properties using JUnit. Both behavior and structure model of the
android application were developed on the Unified Modeling Language (UML) – behavior is described in
state diagram, while structure is described in class diagram. Our approach focus on two common security
groups – the access control and authentication properties. Both groups are represented in the operations
defined in the class diagrams and dynamic behaviors are captured (partially) in the state diagram. A set of
well defined test cases is developed to validate the desired properties based on the class diagram. All
properties on the class diagram and state diagram are described in Object Constraint Language (OCL) – a
formal specification language on the first order logic and set theory.The results of this research will
provide a sound foundation towards the specification based unit testing on mobile security.
Smart home technology is emerging rapidly as an exciting new paradigm. A wide range of aspects that
includes security, energy saving, ventilation, smart kitchen is covered in this paper. All of the above is executed with
the help of smart devices such as remote control, security alarms, sensors etc. In this paper we present the above
mentioned technologies and tools that can be integrated in smart home systems which can provide security energy
saving and other such smart systems.
Nowadays Internet of Things (IoT) is part of the internet that all objects around us. IoT has a very wide and includes variety of objects like electronics product appliances and sensors [4] This research paper aims to design a smart home system by utilizing
The design of a smart home controller based on ADALINETELKOMNIKA JOURNAL
This paper proposes a prototype of an improved smart home controller that implements a neural network-based algorithm for enabling the controller to make decisions and act based on the current condition. Unlike previous approaches, this design also utilizes the use of IoT (internet of thing) technology and neural network based-algorithm for developing the controller. Since a smart home is equipped with various sensors, actuators, smart appliances, and mobile terminals, all of these devices need to be connected to the Internet to be able to communicate and provide services for its occupants. The construction of the proposed controller is carried out through several procedures, i.e. the implementation of the ADALINE (adaptive liniear) as the neural network method, the design of the smart home controller prototype, and the validation process using mean average percentage error (MAPE) calculation. This prototype integrates functionalities of several household appliances into one application controlled by a smartphone. ADALINE is applied as an algorithm to predict output when the controller is in automatic mode. Although the obtained accuracy value is still not satisfactory, the value is bound to change when testing on more data. The work published in this paper may encourage the implementation of smart technology in more households in Indonesia.
Today Home Automation is one of the growing requirement in the society. This paper presents the implementation of Home Automation using Raspberry Pi. The Raspberry Pi is a basic embedded system and being a low cost single-board computer used to reduce the complexity of systems in real time applications. This application mainly serves as an efficient base to control various home appliance like Fan, Tube light, Refrigerator through mobile based application. The application is designed to provide a facility to user to access control of many appliances used in homes.
Design of Pervasive Discovery, Service and Control for Smart Home Appliances:...IJECEIAES
Pervasive technology is an important feature in smart home appliances control. With pervasive technology, the user is able to discover and control every device and each service without initialization configuration and setup. Since single-board computer often used in smart home appliances, combining pervasive technology and microcomputer/single-board computer will be important to be applied and make a possibility to create a smart home system based on the requirement of it users that will be beneficial for the smart home users and the developers. This paper proposed a design of pervasive discovery, service, and control system for smart home appliances by integrating Raspberry Pi, UPnP protocols, and Xbee that able to control an RGB LED services such as switching, dimming, change color and read a temperature sensor as an example in smart home appliances. This paper enriched the raspberry Pi GPIO function to be able to control via TCP/IP network with UPnP protocol and receive information from a temperature sensor node via Xbee communication. Service control time is measured with UPnP round trip time by subtracting HTTP response arrival with HTTP request time. GPIO processing time measured at the application level by counting a timer that starts before GPIO process and ended after GPIO successfully executed.
Design and implementation home security system and monitoring by using wirele...IJECEIAES
The dramatic advancments on communication and networking technologies have led to the emergence of Internet-of-Things (IoT). IoT technology has opened the door for various applications. In particular, the home automation was one of the common applications that took the advantage of IoT. Several research efforts have addressed the home automation system using IoT covering wide range of functionalities. One of the concerning tasks is providing a secure system that can give alarms for suspicious activities within the house. This paper presents a secure house system based on IoT where several activities are being sensed and detected. Specifically, gas, humidity, body temperature and motion have been considered within the sensing based on two main types of micro-controller including Arduino and Raspberry Pi. Consequentially, an Android prototype has bene developed in order to give an interactive interface for warning the house owner regarding any suscpicious activities. Results of simulation demonstrated the efficancy of the proposed system.
Learning objective: The goal of this signature seminar is to examine the current trends that are driving the rapid growth in the use of Embedded Systems; what employers and solutions providers are looking for in talent, and how Aerotek and EASi can help to connect buyers and sellers in this vast marketplace.
As more and more mechanical and electrical devices rely heavily on embedded hardware and software to function effectively, the future of the already expansive embedded systems marketplace continues to look bright.
At the end of this seminar, participants will gain a greater awareness of:
a. The major trends that are driving the growth of Embedded Systems; specifically, Connectivity and the Internet of Things (IOT).
b. The types of Embedded Systems related solutions and skillsets that will be in demand in the future, and how Aerotek and EASi can help to connect buyers and sellers.
Chaired a Technical Session in NATIONAL CONFERENCE ON EMBEDDED SYSTEMS & SIGNAL PROCESSING (NESP-2014) (Jain University)
My Lead talk title of the presentation: Trends and Implications in Embedded Systems Development
UDP Pervasive Protocol Integration with IoT for Smart Home Environment using ...IJECEIAES
Pervasive computing is an environment which is used and integrated into every object and activities to meet human needs and its existence isn’t perceived as something specific. The concept of Smart Home is to assist human needs in an everyday object that performs controls or being controlled. Based on previous research the used communication protocol is UDP (User Datagram Protocol) and the programming language is LabVIEW. UDP is used because it does not require handshaking in the broadcast process, as well as on the use of memory more efficient than other protocols. Devices which perform controls called Host and which is controlled called Client. Both of them (Things) have an ability to send data to the Internet without any human interaction. So this research wants to conduct pervasive protocol between Host and Client which each device is integrated with the Internet of Things (IoT). Data are posted at dweet.io that is a cloud server website that contains a simple online data submission which has free services. This research is conducted to measure the communication performance between host to client, host to cloud server and client to cloud server that represents household equipment.
UBIQUITOUS SMART HOME SYSTEM USING ANDROID APPLICATIONIJCNCJournal
This paper presents a flexible standalone, low cost smart home system, which is based on the Android app communicating with the micro-web server providing more than the switching functionalities. The Arduino Ethernet is used to eliminate the use of a personal computer (PC) keeping the cost of the overall system to a inimum while voice activation is incorporated for switching functionalities. Devices such as light switches, power plugs, temperature sensors, humidity sensors, current sensors, intrusion detection sensors, smoke/gas sensors and sirens have been integrated in the system to demonstrate the feasibility and effectiveness of the proposed smart home system. The smart home app is tested and it is able successfully perform the smart home operations such as switching functionalities, automatic environmental control and intrusion detection, in the later case where an email is generated and the siren goes on.
Energy Management with Disaster Intimation and Control using IoTIJEACS
In the area of digitization and automation, the life of
human being is getting simpler as almost everything is
automated. Nowadays humans have made internet an integral
part of their everyday life without which they are helpless.
Internet of things (IoT) gives a platform which allows different
devices to inter-connect, sense and control the things remotely
across a network infrastructure without any limitation to the
coverage area. In our proposed work, we stress on Wireless-
Home-Automation-System (WHAS) using IoT, it is a system uses
computers or smart phone to control basic home functions and
features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home.
The proposed system is able to monitor the entire things
connected to the internet and also to be maintaining the status of
individual devices for further action. We have built the home
automation with several devices and sensors, here sensor help to
monitor the device status and intimate the authorized person to
take particular action.
An Event-based Middleware for Syntactical Interoperability in Internet of Th...IJECEIAES
Internet of Things (IoT) connecting sensors or devices that record physical observations of the environment and a variety of applications or other Internet services. Along with the increasing number and diversity of devices connected, there arises a problem called interoperability. One type of interoperability is syntactical interoperability, where the IoT should be able to connect all devices through various data protocols. Based on this problem, we proposed a middleware that capable of supporting interoperability by providing a multi-protocol gateway between COAP, MQTT, and WebSocket. This middleware is developed using event-based architecture by implementing publish-subscribe pattern. We also developed a system to test the performance of middleware in terms of success rate and delay delivery of data. The system consists of temperature and humidity sensors using COAP and MQTT as a publisher and web application using WebSocket as a subscriber. The results for data transmission, either from sensors or MQTT COAP has a success rate above 90%, the average delay delivery of data from sensors COAP and MQTT below 1 second, for packet loss rate varied between 0% - 25%. The interoperability testing has been done using Interoperability assessment methodology and found out that ours is qualified.
Nowadays Internet of Things (IoT) is part of the internet that all objects around us. IoT has a very wide and includes variety of objects like electronics product appliances and sensors [4] This research paper aims to design a smart home system by utilizing
The design of a smart home controller based on ADALINETELKOMNIKA JOURNAL
This paper proposes a prototype of an improved smart home controller that implements a neural network-based algorithm for enabling the controller to make decisions and act based on the current condition. Unlike previous approaches, this design also utilizes the use of IoT (internet of thing) technology and neural network based-algorithm for developing the controller. Since a smart home is equipped with various sensors, actuators, smart appliances, and mobile terminals, all of these devices need to be connected to the Internet to be able to communicate and provide services for its occupants. The construction of the proposed controller is carried out through several procedures, i.e. the implementation of the ADALINE (adaptive liniear) as the neural network method, the design of the smart home controller prototype, and the validation process using mean average percentage error (MAPE) calculation. This prototype integrates functionalities of several household appliances into one application controlled by a smartphone. ADALINE is applied as an algorithm to predict output when the controller is in automatic mode. Although the obtained accuracy value is still not satisfactory, the value is bound to change when testing on more data. The work published in this paper may encourage the implementation of smart technology in more households in Indonesia.
Today Home Automation is one of the growing requirement in the society. This paper presents the implementation of Home Automation using Raspberry Pi. The Raspberry Pi is a basic embedded system and being a low cost single-board computer used to reduce the complexity of systems in real time applications. This application mainly serves as an efficient base to control various home appliance like Fan, Tube light, Refrigerator through mobile based application. The application is designed to provide a facility to user to access control of many appliances used in homes.
Design of Pervasive Discovery, Service and Control for Smart Home Appliances:...IJECEIAES
Pervasive technology is an important feature in smart home appliances control. With pervasive technology, the user is able to discover and control every device and each service without initialization configuration and setup. Since single-board computer often used in smart home appliances, combining pervasive technology and microcomputer/single-board computer will be important to be applied and make a possibility to create a smart home system based on the requirement of it users that will be beneficial for the smart home users and the developers. This paper proposed a design of pervasive discovery, service, and control system for smart home appliances by integrating Raspberry Pi, UPnP protocols, and Xbee that able to control an RGB LED services such as switching, dimming, change color and read a temperature sensor as an example in smart home appliances. This paper enriched the raspberry Pi GPIO function to be able to control via TCP/IP network with UPnP protocol and receive information from a temperature sensor node via Xbee communication. Service control time is measured with UPnP round trip time by subtracting HTTP response arrival with HTTP request time. GPIO processing time measured at the application level by counting a timer that starts before GPIO process and ended after GPIO successfully executed.
Design and implementation home security system and monitoring by using wirele...IJECEIAES
The dramatic advancments on communication and networking technologies have led to the emergence of Internet-of-Things (IoT). IoT technology has opened the door for various applications. In particular, the home automation was one of the common applications that took the advantage of IoT. Several research efforts have addressed the home automation system using IoT covering wide range of functionalities. One of the concerning tasks is providing a secure system that can give alarms for suspicious activities within the house. This paper presents a secure house system based on IoT where several activities are being sensed and detected. Specifically, gas, humidity, body temperature and motion have been considered within the sensing based on two main types of micro-controller including Arduino and Raspberry Pi. Consequentially, an Android prototype has bene developed in order to give an interactive interface for warning the house owner regarding any suscpicious activities. Results of simulation demonstrated the efficancy of the proposed system.
Learning objective: The goal of this signature seminar is to examine the current trends that are driving the rapid growth in the use of Embedded Systems; what employers and solutions providers are looking for in talent, and how Aerotek and EASi can help to connect buyers and sellers in this vast marketplace.
As more and more mechanical and electrical devices rely heavily on embedded hardware and software to function effectively, the future of the already expansive embedded systems marketplace continues to look bright.
At the end of this seminar, participants will gain a greater awareness of:
a. The major trends that are driving the growth of Embedded Systems; specifically, Connectivity and the Internet of Things (IOT).
b. The types of Embedded Systems related solutions and skillsets that will be in demand in the future, and how Aerotek and EASi can help to connect buyers and sellers.
Chaired a Technical Session in NATIONAL CONFERENCE ON EMBEDDED SYSTEMS & SIGNAL PROCESSING (NESP-2014) (Jain University)
My Lead talk title of the presentation: Trends and Implications in Embedded Systems Development
UDP Pervasive Protocol Integration with IoT for Smart Home Environment using ...IJECEIAES
Pervasive computing is an environment which is used and integrated into every object and activities to meet human needs and its existence isn’t perceived as something specific. The concept of Smart Home is to assist human needs in an everyday object that performs controls or being controlled. Based on previous research the used communication protocol is UDP (User Datagram Protocol) and the programming language is LabVIEW. UDP is used because it does not require handshaking in the broadcast process, as well as on the use of memory more efficient than other protocols. Devices which perform controls called Host and which is controlled called Client. Both of them (Things) have an ability to send data to the Internet without any human interaction. So this research wants to conduct pervasive protocol between Host and Client which each device is integrated with the Internet of Things (IoT). Data are posted at dweet.io that is a cloud server website that contains a simple online data submission which has free services. This research is conducted to measure the communication performance between host to client, host to cloud server and client to cloud server that represents household equipment.
UBIQUITOUS SMART HOME SYSTEM USING ANDROID APPLICATIONIJCNCJournal
This paper presents a flexible standalone, low cost smart home system, which is based on the Android app communicating with the micro-web server providing more than the switching functionalities. The Arduino Ethernet is used to eliminate the use of a personal computer (PC) keeping the cost of the overall system to a inimum while voice activation is incorporated for switching functionalities. Devices such as light switches, power plugs, temperature sensors, humidity sensors, current sensors, intrusion detection sensors, smoke/gas sensors and sirens have been integrated in the system to demonstrate the feasibility and effectiveness of the proposed smart home system. The smart home app is tested and it is able successfully perform the smart home operations such as switching functionalities, automatic environmental control and intrusion detection, in the later case where an email is generated and the siren goes on.
Energy Management with Disaster Intimation and Control using IoTIJEACS
In the area of digitization and automation, the life of
human being is getting simpler as almost everything is
automated. Nowadays humans have made internet an integral
part of their everyday life without which they are helpless.
Internet of things (IoT) gives a platform which allows different
devices to inter-connect, sense and control the things remotely
across a network infrastructure without any limitation to the
coverage area. In our proposed work, we stress on Wireless-
Home-Automation-System (WHAS) using IoT, it is a system uses
computers or smart phone to control basic home functions and
features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home.
The proposed system is able to monitor the entire things
connected to the internet and also to be maintaining the status of
individual devices for further action. We have built the home
automation with several devices and sensors, here sensor help to
monitor the device status and intimate the authorized person to
take particular action.
An Event-based Middleware for Syntactical Interoperability in Internet of Th...IJECEIAES
Internet of Things (IoT) connecting sensors or devices that record physical observations of the environment and a variety of applications or other Internet services. Along with the increasing number and diversity of devices connected, there arises a problem called interoperability. One type of interoperability is syntactical interoperability, where the IoT should be able to connect all devices through various data protocols. Based on this problem, we proposed a middleware that capable of supporting interoperability by providing a multi-protocol gateway between COAP, MQTT, and WebSocket. This middleware is developed using event-based architecture by implementing publish-subscribe pattern. We also developed a system to test the performance of middleware in terms of success rate and delay delivery of data. The system consists of temperature and humidity sensors using COAP and MQTT as a publisher and web application using WebSocket as a subscriber. The results for data transmission, either from sensors or MQTT COAP has a success rate above 90%, the average delay delivery of data from sensors COAP and MQTT below 1 second, for packet loss rate varied between 0% - 25%. The interoperability testing has been done using Interoperability assessment methodology and found out that ours is qualified.
HOME AUTOMATION SYSTEM VIA INTERNET USING ANDROID PHONE IJRISE Journal
This paper presents a low cost, flexible and standalone home devices control and monitoring system using an embedded arduino micro-web server, with real IP connectivity for accessing and controlling devices and appliances remotely using Android based Smart phone app running on android platform. The proposed system does not require a dedicated server PC with respect to similar systems and offers a novel communication protocol to monitor and control the home environment. Devices such as light switches, temperature sensors, humidity sensors, current sensors, smoke/gas sensors and sirens have been integrated in the system to demonstrate the feasibility and effectiveness of the proposed smart home system.
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
Design and Implementation of a Contactless Smart House Network System IJECEIAES
The Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two main parts: the main station part and the wireless house nodes part. The local wireless communication between the house nodes and the main station is done through ZigBee technology with low power and low data rate. The mode of operation of these house nodes can be configured dynamically by the end user and determined multicast or broadcast operation according to the user requirements. The implementation and upgrading of SHNS are costless, flexible and required less power comparing with other reviewed systems.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
LOW COST DESIGN AND IMPLEMENTATION FOR HAS USING MULTIFUNCTIONAL WI-FIIJCNCJournal
Smart home technology nowadays became more popular and wide spread world around. The
communication network's appropriate coverage, flexibility and low cost made the Wi-Fi technology one of
the strongest choices in this field. The main purpose of this paper is to propose a simple, flexible and low
cost design of controlling home appliances and connecting other hardware using Wi-Fi network. The
ability of exploiting this design and implementation in different environment and possibility of integration
with other modern technology are considered the main benefit of the proposed design. The proposed
system provides connecting and controlling all available devices inside home using many sensors and
actuators. The monitoring process achieved by appropriate installed software on regular user computer or
handheld device.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 113 – 123
114
there are devices that are used daily, but their operation still has many limitations [8]. Some examples
suppose the television and air conditioner (AC), both have a device like a remote control. However remote
possessed both have different functions, in terms of functions and usefulness. And the existence of remote
proficiency level is not always the human's grasp. So pervasive technology very suitable for a ubiquitous
environment and the implementation on smart home where all devices have four models of which include
device connectivity to the cloud, the device to the gateway, device to device and the back end of the data
sharing [9]. In this study focused only on the model of device connectivity to the gateway only, so this study
will show the relationship between the Host / Gateway with Device / Client owned by smart home devices.
On connectivity to the gateway device required a communication protocol, a communication
protocol in the Application Layer are TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol). The use of TCP is the Client will perform data transmission to the host, then the client will ensure
full data on the Host of the data sent or not [10]. On UDP, the client sends the data to the host, but the Client
and Host will negotiate when before performing communication. TCP will be very efficient when the data is
sent in large amounts, but in smart home environment is not required large amounts of data [11]. With UDP
behavior that did not validate whether the data sent by the client has come to host and vice versa will make
the process faster data transfers. UDP provides a feature broadcast packets to a local network or multicast to
all subscribers [12].
LabVIEW is a graphical programming language that uses icons instead of text to create
applications [13]. In contrast to text-based programming languages, where instructions determine program
execution, Labview uses dataflow programming, where the flow of data determines execution [14]. LabView
can easily connect other devices such as microcontroller, Arduino, IP camera and even computer networks
[15]. Additionally, National Instruments has also developed highly compatible with the hardware such as NI
LabVIEW MyRIO, NI CompactRIO and NI ELVIS is easier to develop a system [16]. NI myRIO is an
embedded hardware that can be used for technology proven industry researchers and enable them to design
systems with real, complex engineering systems faster and more affordable than ever before [18]. So in this
research the implementation of Pervasive Protocol UDP will be used LabVIEW as a programming language
by utilizing MyRIO as client devices with the PC as a Gateway.
Another study conducted using Salutation Discovery Protocol and Service Location Protocol [18],
and implementing HTTP-CoAP at LabVIEW [19]. At our previous research, it is introduced how UDP work
in two PC, one as Client and one else as Gateway [20]. UDP and Pervasive protocol were designed by the
state machine and work well implemented with LabVIEW. In this research we will implement the Gateway
in a PC and Client modeling with MyRIO. So the design of the system can be tested functionally to obtain
correspondence between the designs of a system that was developed with the results obtained.
2. RESEARCH METHOD
In this section explained design of host and server network, Gateway – Client Design and Test
design. The domain in this research is how Gateway / Host can communicate with Client at Local Area
Network. So that it can be made the design for system testing and the results obtained on the availability of
the system between a Host and Client. Tests will be performed to test the functionality of the system, not
only to do with the fruit Client but the test will be performed up to three clients.
2.1. Host and Server Network
This research design conducted by ETSI standard [21] which systems have Machine to Machine
(M2M) area network domain and implemented in Local Area Network. So design at pervasive using UDP
shown in Figure 1 which has a Host and Client. Host / Gateway will be implemented on PC with LabVIEW
interfaces, and Client will be implemented on MyRIO which has many features like analog input/output, wifi,
led, push button, accelerometer etc.
Where the initial conditions, Host are in condition to wait Client listen to broadcast. Next after the
Client to broadcast and broadcast packets are received by Host Client to introduce himself to the host to
provide such review client name recognition, IP and services on the host. In Check Duplication Host Client is
not directly accept the client, but to review the duplication check, whether the client already exists or not,
even if the client already on other hosts. When there is no duplication Client, Host then sends ack, hostname,
IP and host header will be stored by the Client.
Once the Client recognizes the host and the process are completed, Host will be back on the
broadcast Client Listen to wait for another, but for the Client that have been identified previously will be
done the next process is to communicate. As for the service that can be provided is a Client Services (Sensor,
Input / Output etc) or the host can take control of all the features possessed by the Client. Design the way
work is designed in this study Host and Client will be described in section Host and Client Design
3. Int J Elec & Comp Eng ISSN: 2088-8708
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO …. (Wijaya Kurniawan)
115
Figure 1. Pervasive Algorithm Machine to Machine Area Network [21]
2.2. Gateway / Host and Client Design
Based on previous research [20], the Gateway / Host and Client has designed but at implementation,
they're implemented on PC and the Client will be implemented in MyRIO. The Host and Client process was
designed in state machine diagram, as seen in Figure 2 and Figure 3 the design was conducted by Figure 1,
where Host and Client don’t have a connection until they well communicate.
Figure 2. Host State Machine Diagram [20]
Each condition that designed on state machine diagram in Figure 2 for Host will explain as follows:
a. Initialize: in this condition shown by Idle. At this state, the host performs open UDP Port that given
6300 for Listener ID as a broadcast receiver. The second port is 6400 that given for Client ID, Client ID
default is set by “0” it will increase by “1” increment if Host receives broadcast from Client. That id is
used to communicate with Client to perform Send ACK and do Check Appliance Data Status to perform
checking Client connection. Open UDP Port 6500, 6600 and 6700 for accelerometer each for x, y and z.
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 113 – 123
116
This state has an error handler to stop the process and show that Host doesn’t have Client or otherwise.
If Hostname created it will move to Listen to State.
b. Listen: in this condition perform Listen and Wait For Broadcast, this state has Stop and Go HW button,
if that not press then UDP Port Listener ID always listen loop every 250ms then perform checking are
there a client perform broadcast or not. If Host receives broadcast then move to Check HW State, if not
Host still at Listen Condition. If Go HW pressed, then state move to Send Req State.
c. Check HW: is represented by Check Device Duplication, this state performs if Client recognized by
Host. List of Client ID saved as an array which is their element known as Index identity. This state for
checking is there any data duplication which has Client Service, IP HW and Service Number. If
detected any duplication data then old data deleted then new data inserted into an array with a new
index number. Else there is no duplication then directly insert with new Client ID.
d. Send ACK: perform ACK Sent and Check Appliance Data Status. This state which host would send
ACK to Client that perform HW Check. ACK Send through UDP Port which has Client ID who has
identity Host Name and IP Host. After this state moves to Listen State otherwise Host move to Send
Req State to do Controlling device to Client.
e. Send Req: in this state represent by Control Process at state diagram. The host can receive and send data
to Client. The host can Controlling Client by choosing which client will be controlled in an array which
described at Check HW state. The host can control using opened UDP Port, 6500, 6600 and 6700 for
accelerometer x, y, z and other. At this state, Host has performed checking Client connection. If
connection lost then Host move to Listen State and show a message that Client is lost. If Client still has
a connection, communication still continue.
f. Stop State: This state was not designed in the state machine, because an assumption Host never shutting
down. But its uses to perform closing port which opens at Initialize State and clear array which has
Client ID, because Client communicates with IP address after receiving ACK.
Figure 3. Client State Machine Diagram [20]
Each condition that designed on state machine diagram in Figure 3for Host will explain as follows:
a. Initialize: represent the Idle state, this state open four unused UDP port as a Broadcast ID. Broadcast ID
used to communicate broadcast and check did Client communication with Host still exist or not. It has
three Service ID at Broadcast ID, 1st
Service ID used to send identity Client Service and receive a
request from Host. 2nd
Service ID used to send Boolean or any other data, and 3rd
Service ID used to
send sensor data. It has been made too error handler to handling error program and show which service
name that has not been filled. If Service ID filled up then it moves to Broadcast State.
b. Broadcast: at this state, Client sends broadcast data to move through UDP Port Broadcast ID for 250ms
that contain Identity Client (Service name, IP Client and Service Number). After broadcast message
5. Int J Elec & Comp Eng ISSN: 2088-8708
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO …. (Wijaya Kurniawan)
117
receives by Host, then Host send ACK to Client and Client move to ACK state after receiving ACK
from Host.
c. ACK: this state represented Wait For ACK.
d. Req: two state at Figure 3 at this state Wait for Control Message and Check Control Device. Wait
Control Message is client waiting is that any request from host received by UDP Port through Service
ID 1. If there is a request, then Client will send data through UDP Port Service ID 3. At the moment
Service ID 2 will send Boolean data or other data to host. While Service ID 1 used to receive data from
Host that contain data to turn on led Client. Check Control Device used to check any Client that
disconnect or not. If there is no disconnect device, Client will continue to communicate with the host.
But if Client disconnects with Host, then Client going back to broadcast state.
2.3. Functional Testing Scenario
To perform the test on whether the system is working properly or not, will be conducted a test of
what has been done. In this system, the design of the system has to offer is made by a state machine, so the
testing is done with state transition testing. State transition testing is used when the system designed and
states defined by a finite number [22]. The state transition testing test is the valid testing to test system
transition from one state to another and also test the valid transition based on system design [23]. Every state
has an event and action that perform different condition. Every states and action based on a design from fig
and fig will be conducted on functional testing result and analysis.
Table 1. Gateway Testing Scenario
T.ID Gateway Initial State Test Scenario and Description Destination State
1 Idle Turn on the device Listening
2 Listening Open Port Wait For Broadcast
3.1
Wait For Broadcast
Host turn on first then turn on Client
conducted by 1 Client
Check Device Duplication
3.2
Host turn on first then turn on Client
conducted by n-Client
Check Device Duplication
3.3
Turn on Client then turn on Host
Conducted by 1-Client
Check Device Duplication
3.4
Turn on Client then turn on Host
Conducted by n-Client
Check Device Duplication
4.1
Check Device Duplication
Checking device duplication conducted by
1 Client with duplication occur
Wait for Broadcast
4.2
Checking device duplication conducted by
more than 1 client (n-client) with
duplication occur
Wait for Broadcast
4.3
Checking device duplication conducted by
1 Client without duplication
ACK Sent
4.4
Checking device duplication conducted by
more than 1 client (n-client) without
duplication occur
ACK Sent
5.1
ACK Sent
Sending ACK to 1-Client then connection
lost
Check Appliance Data Status
5.2
Sending ACK to n-Client then connection
lost
Check Appliance Data Status
5.3
Sending ACK to 1-Client without lost
connection
Control Process
5.4
Sending ACK to n-Client without lost
connection
Control Process
6.1
Check Appliance Data Status
Checking appliance data status to 1 Client Wait for Broadcast
6.2 Checking appliance data status to n-Client Wait for Broadcast
7.1
Control Process
Control all data by 1 client Control Process
7.2 Control all data by n-client Control Process
7.3 Turn off then turn on Host with 1 Client Idle
7.4 Turn off then turn on Host with n-Client Idle
7.5 Turn off then turn on 1 Client Check Appliance Data Status
7.6 Turn off then turn on n-Client Check Appliance Data Status
Every Host state machine diagram at Figure 2 test conducted by Table 1, every state representing by
a header number at the table and every sub number representing any possibilities that could happen at that
state. For example “1” it representing first state that namely Idle, then another example “3.1”,”3.2”,etc
“x.1,”x.2”; “x” or “3” is representing the name of the state then “3.y”; “y” represent possibilities that happen
in “x” state. By that definition, is used to give another state in Client from [20] Figure 3 to conduct Table 2.
N-Client test scenario would carried out with 2 and 3 clients.
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 113 – 123
118
Client Initial State defining a starting testing state, then Test Scenario and Description given in order
how to test that state, which gives an overview of how testing will be done. When we did the tests specified,
we also determine the state of interest represented by Destination State. So in the functional testing scenario
it will determine an expected result and actual result that generated by the system. So from this test can be
measured as the level of conformity with the system design objectives.
Table 2. Client Testing Scenario
T.ID Client Initial State Test Scenario and Description Destination State
8 Idle Turn on client, opening Port for broadcast Broadcast
9 Broadcast
Broadcast data until Host receive
broadcast data then send ACK
Wait for ACK
10.1
Wait for ACK
Received ACK that delivered by Host Wait for Control Message
10.2 ACK didn’t receive until timeout Broadcast
10.3 ACK Received but no control from Host Check Control Device
11 Check Control Device
Check own service, that service still
available or not, any possibilities go to
broadcast state
Broadcast
12 Wait for Control Message
Device controlled by Host, downtime and
controlling data conducted by the
gateway.
Wait for Control Message
3. RESULTS AND ANALYSIS
In this section will be presented on how the system has been built. The initial Chapter 3.1. section
will be used to indicate that the system has been made according to the design that was created earlier. Then
in the second part Chapter 3.2. will be tested in accordance with the functional testing with the points that
have been formulated previously at Table 2 and Table 3.
3.1. Gateway / Host and Client Implementation Result
After doing the design for the system along with its testing, the system implemented on LabVIEW.
The system design for the host to be run on a PC while the Client can be run on a PC which can be uploaded
and executed on MyRIO. Features provided on a customized system with a design created in the previous
design, so it can be tested with scenarios designed to accommodate all the possibilities that occur in the
system environment.
Figure 4. Gateway / Host Front Panel
Features created on the host represent at Figure 4, provided a place to accommodate the Client along
with its services on the Array List is represented by HW UDP. No HW Client is provided to select a number
which will be given control. Led 0, 1, 2 and 3 are used to display and provide control of service owned by the
Client, in Fig mentioned only LED 0 and 2 only that describe a service owned by the client only 0 and 2. The
Host Name is used to provide/initialize Hostname.
State UDP Host was used to identify which Host State at a time. Go and Finish HW used to initiate
or carry out control on the client, in this case is MyRIO. While Halo Host and Message is a function assigned
7. Int J Elec & Comp Eng ISSN: 2088-8708
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO …. (Wijaya Kurniawan)
119
to if the client wants to do communications and to check the host, whether the host is connected or not. In
this case applied to the State Check Control Device which is owned by the Client. The stop is used to stop the
whole series of programs.
In Figure 5, provided one example of creating a state that represents the design that was created
earlier. In the picture shown one example of a State that is Send Req. On State Send Req made a lot of
possibilities to accommodate the problems that will occur in the system environment. It is represented by the
Sub-State by conditioning the Error / No Error and False / True that as in the conventional coding using the If
/ Else or Switch Case.
Figure 5. Gateway / Host Block Diagram
Figure 6. Client Front Panel (Will Be Uploaded into MyRIO)
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 113 – 123
120
Figure 7. Client Block Diagram (Will Be Uploaded into MyRIO)
After creating code for Host / Gateway also made the front panel for the client. A front panel like on
Figure 6 and block diagram in Figure 7. MyRIO does not have a front panel, but for coding the front panel
must still be made to perform initial testing prior to deployment on MyRIO, Input and Output owned by
MyRIO is physical not a form of software. At Figure 6 Front Panel of MyRIO, has been given several
functions such as IP Broadcast to show the range of IP broadcast how he was carrying out. Then the Service
Name is the name of the Client itself, for this name can be changed in accordance with the desired name or
device is what is desired. Host Name function is to detect MyRIO which has been connected with Host and
IP Host shows the IP owned by Host / Gateway. Broadcast Time is to indicate the length of time from Client
/ MyRIO to do a broadcast to find hosts and ACK Time indicates how long the exchange of ACK conducted
between Client and Host.
Service 0-3 is a service that is owned by the client as indicated by LED owned, when service is
turned on it will be indicated by the LED. Actually, there are four LED LED starting 0-3, but the Service is
activated only 1 and 3 so that the LED that serves only 1 and 3. This can be done as desired or service that is
owned by the Client. At Figure 7 shows one state from several that have been created on the block diagram,
the figure shows one of the states owned by the client, namely Broadcast State.
3.2. Functional Testing Result and Analysis
After implementation and deployment system, system testing will be done according to the design in
Table 1 and Table 2. In the examination table, Table 3 given multiple columns. The first column is T.ID, this
column shows the same column in Table 1 and Table 2, which describes the testing of each side and state-
owned. Expected Result show about the expected performance of the system, while the Actual Result is the
actual results obtained from tests performed.
Having obtained the Actual Result will do the comparison given in the Status column. In the column
will be given two conditions to declare the success of the system. The first condition is "Pass" indicates
compatibility between Expected Result with Actual Result. The second condition is "Fail" which shows the
discrepancy between the two. But in Actual result although not in accordance with Expected Result will be
given the actual conditions occur although there is the possibility of a program error.
Table 3. System Testing Result
T.ID Expected Result Actual Result Status
1
Gateway program compiles and runs without
error.
Successfully compiling and running. Pass
2
Port 6300, 6400, 6500, 6600, and 6700 Opened.
Default Client ID is 0.
Port 6300, 6400, 6500, 6600, and 6700 Opened. And
default Client ID is given by 0.
Pass
3.1 Host turn on first, listening and find 1 client. Host successfully turned on and found 1 client. Pass
9. Int J Elec & Comp Eng ISSN: 2088-8708
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO …. (Wijaya Kurniawan)
121
T.ID Expected Result Actual Result Status
3.2
Host turn on first, listening then find 2 and 3
clients.
Host successfully turned on and found 2 and 3 clients. Pass
3.3 Host turn on last, listening and find 1 client.
1 client turned on first and discovered by Host that
turned on last.
Pass
3.4
Host turn on last, listening then find 2 and 3
client.
2 and 3 clients turned on first and discovered by Host
that turned on last.
Pass
4.1
Check and find duplication Client ID at the same
client conducted by 1 client with duplication
occur.
Host checking and did not find duplication, deleting
old ID then given new ID for 1 client.
Pass
4.2
Check and find duplication Client ID at the same
client conducted by 2 and 3 clients with
duplication occur.
Host checking and did not find any duplication,
deleting old ID then given new ID for 2 and 3 clients.
Pass
4.3
Check and find duplication Client ID at the same
client conducted by 1 client without duplication
occur.
Host found duplication, deleting old ID then given new
ID for 1 client.
Pass
4.4
Check and find duplication Client ID at the same
client conducted by 2 and 3 clients without
duplication occur.
Host found duplication, deleting old ID then given new
ID for 2 and 3 clients.
Pass
5.1
Host sends ACK to 1 client, after that disconnect
network, then Host goes to Check Appliance Data
Status.
Host sending ACK then delivered by 1 Client, whether
it has a disconnect connection, Host went to Check
Appliance Data Status State.
Pass
5.2
Host sends ACK to 2 clients, after that disconnect
network, then Host goes to Check Appliance Data
Status.
Host sending ACK then delivered by 2 and 3 Client,
whether it has a disconnect connection, Host went to
Check Appliance Data Status State.
Pass
5.3
Host sends ACK to 1 client without disconnect
network, then Host goes to Control Process State.
Host sending ACK then delivered by 1 Client without
disconnect connection then Host went to Control
Process State.
Pass
5.4
Host sends ACK to 2 and 3 clients without
disconnect network, then Host goes to Control
Process State.
Host sending ACK then delivered by 1 Client without
disconnect connection then Host went to Control
Process State.
Pass
6.1
Checking appliance 1 Client disconnect status
then Host goes to Wait For Broadcast State.
When 1 Client disconnected, Host goes back to Wait
for Broadcast State.
Pass
6.2
Checking appliance 1 and 2 Client disconnect
status then Host go to Wait For Broadcast State.
When 1 Client from 2 and 3 Client disconnected, Host
goes back to Wait for Broadcast State.
Pass
7.1 Controlling all service that defined by 1 Client.
All services that own by 1 Client can be controlled by
Host well, but after 10 until 15 seconds, error
conducted by Host having error code 56.
Pass
7.2
Controlling all service that defined by 2 and 3
Client.
All services that own by 2 and 3 Client can be
controlled by Host well, but after 10 until 15 seconds,
error conducted by Host having error code 56.
Pass
7.3
Host turn off then turn on again and Host started
again in Idle State conducted by 1 Client.
Host turned off then host went back to Idle State, 1
Client that connected before back to Broadcast State
Pass
7.4
Host turn off then turn on again and Host started
again in Idle State conducted by 2 and 3 Client.
Host turned off then host went back to Idle State, 2 and
3 Client that connected before back to Broadcast State
Pass
7.5
Turn off 1 Client then turn on again, Host move to
Check Appliance Data Status State.
1 The client turned off, Host back to Check Appliance
Data Status State.
Pass
7.6
Turn off 2 and 3 Client then turn on again, Host
move to Check Appliance Data Status State.
2 and 3 Client turned off, Host back to Check
Appliance Data Status State. But the Client that did not
turn off, still can be controlled by Host.
Pass
8
The client turns on, compiling and running
without any error.
Successfully compiling and running. Pass
9
Broadcasting data until finding a Host that
sending ACK.
The client did a broadcast until found Host, then Host
sends ACK and Client Finish broadcast.
Pass
10.1
Receive ACK then move to Wait Control
Message State.
ACK Received, then move to Wait Control Message
State.
Pass
10.2 The host never sending ACK until timeout.
Client stop waiting for ACK, then go back to broadcast
state.
Pass
10.3
Receive ACK but Host never controls service that
own by Client then move to Check Control
Device State.
Client received ACK but no control message from
Host, then Client move to Check Control Device state.
Pass
11
Checking all of the services that own by Client
still available or not, then go to Broadcast state
again to do broadcast again.
All services that own by Client checked by itself, after
checked all Client back to broadcast state.
Pass
12
All service that owns by the client can be
controlled by Host.
All of the services that own by Client can be controlled
well by Host.
Pass
This test aims to obtain correspondence between the design was done, the implementation of the
design of the system and to demonstrate the suitability of the design of the behavior and performance of
LabVIEW and MyRIO. So it can be given any conclusions about the suitability of whether the system works
or not. The design successfully implemented on LabView and successfully deploy on MyRIO, both can
communicate well.
10. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 1, February 2018 : 113 – 123
122
4. CONCLUSION
This research successfully compiling running, the design is working well as expected. The client can
communicate well with host pervasively. Service discovery in this research performed by Client which can
identify and start communicate with Host. After send and deliver the ACK, both can communicate well. The
host can control any of service that owned and provided by Client. Host conducted by a PC and Client
conducted by 3 MyRIO. System testing conducted by Design that created, the functional testing scenario was
conducted by any possibilities that could happen in system environment seen from both sides between Host
and Client. All functional testing scenario is Pass. But there are after several minutes communicate it
performed error 56. That error conducted by random access memory buffer that owned by PC or MyRIO, but
that error not conducted by design that created. For future work it can be performed again with various
approaches to reduce memory running and implementing this system at any household environment.
ACKNOWLEDGEMENTS
The team thanks to the Laboratory of Computer System and Robotics, Computer Engineering
Department, Faculty of Computer Science. This paper is an extension of work originally published and
reported in “IAES 2016: International Conference on Electrical Engineering, Computer Science and
Informatics (EECSI 2016)” at Semarang, East Java, Indonesia 22-25 November 2016, with the title
“Lightweight UDP Pervasive Protocol in Smart Home Environment based on LabView”.
REFERENCES
[1] Atzori, L., Iera, A. and Morabito, G., "The Internet of Things: A survey"," Elsevier Computer Networks,
pp. 2787-2805, 2010.
[2] Vermesan, O. and Friess, P, “Internet of Things - Global Technological and Societal Trends,” Aalborg, Denmark:
River Publisher, 2011.
[3] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "Wireless sensor networks: a survey," Elsevier
Science, vol. 38, no. 4, p. 393–422, 2002.
[4] Munir, S.A., Ren, B., Jiao, W., Wang, B., Xie, D. and Jian, M., "Mobile Wireless Sensor Network: Architecture and
Enabling Technologies for Ubiquitous Computing," in 21st International Conference on International Conference
on, Advanced Information Networking and Applications Workshops, AINAW '07, 2007.
[5] Froehlich, J., Findlater, L. and Landay, J., "The Design of Eco-Feedback Technology," in Proceedings of the
SIGCHI Conference on Human Factors in Computing Systems, Atlanta, Georgia, USA, 2010.
[6] Dourish, P. and Bell, G., “Divining A Digital Future - Mess and Mythology in Ubiquitous Computing,” London,
England: The MIT Press, 2011.
[7] Ma, J., Yang, T.L., Apduhan, B.O., Huang, R., Barolli, L. and Takizawa, M., "Towards a Smart World and
Ubiquitous Intelligence: A Walkthrough from Smart Things to Smart Hyperspaces and UbicKids," International
Journal of Pervasive Computing and Communications, vol. 1, no. 1, pp. 53-68, 2005.
[8] Cook, D.J. and Das, S.K., "How smart are our environments? An updated look at the state of the art," Pervasive
and Mobile Computing, vol. 3, no. 2, pp. 53-73, 2007.
[9] Rose, K., Eldridge, S. and Chapin, L., "The Internet of Things: An Overview Understanding the Issues and
Challenges of a More Connected World," The Internet Society (ISOC), 2015.
[10] Ford, A., Raiciu, C., Handley, M. and Bonaventure, O., “TCP Extensions for Multipath Operation with Multiple
Addresses”, RFC 6824, 2013.
[11] Andrea Zanella; Nicola Bui; Angelo Castellani; Lorenzo Vangelista; Michele Zorzi, "Internet of Things for Smart
Cities," IEEE Internet of Things Journal, vol. 1, no. 1, pp. 22-32, 2014.
[12] Jack L. Burbank; Julia Andrusenko; Jared S. Everett; William T.M. Kasch, “Wireless Networking : Understanding
Internetworking Challenges”, IEEE PRESS, 2013.
[13] M.Kalyan Chakravarthi; Nithya Venkatesan, "Experimental Validation of a Multi-Model PI Controller for a Non-
Linear Hybrid System in LabVIEW," TELKOMNIKA (Telecommunication Computing Electronics and Control),
vol. 13, no. 2, pp. 547-555, 2015.
[14] Jimenez, F.J. and Frutos, D.J., "Virtual Instrument for Measurement, Processing Data, and Visualization of
Vibration Patterns of Piezoelectric Devices," Elsevier, vol. 27, no. 6, pp. 653-663, 2005.
[15] L. Vanfretti, V. H. Aarstrand, M. S. Almas, V. S. Perić and J. O. Gjerde, "A software development toolkit for real-
time synchrophasor applications," in IEEE Grenoble Conference, Grenoble, 2013.
[16] Samual Ashcroft; Lindsay Watt; Jordan Laurie, "Proteus and Pixel Art - Accurate Object Placement Using an
Independent Autonomous Vehicle," Queensland University of Technology, Queensland, 2015.
[17] Bhatti, N., Dhomeja, L.D. and Malkani, Y.A., "Service Discovery Protocols in Pervasive Computing: A Review," in
Multi-Topic Conference (INMIC), IEEE 17th International, 2014.
[18] Serna, M.A., Sreenan, J.C. and Fedor, S., "A Visual Programming Framework for Wireless Sensor Networks in
Smart Home Application Singapore," in Sensor Networks and Information Processing (ISSNIP), Singapore, 2015.
11. Int J Elec & Comp Eng ISSN: 2088-8708
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO …. (Wijaya Kurniawan)
123
[19] Kurniawan, W., Ichsan, M.H.H., Akbar, S.R., and Arwani, I., "Lightweight UDP Pervasive Protocol in Smart
Home Environment Based on Labview," in IAES International Conference on Electrical Engineering, Computer
Science and Informatics (EECSI 2016), Semarang, Indonesia, 2016.
[20] J. e. a. Holler, "From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence," in
Elsevier, Waltham, MA, 2014.
[21] D. Lee and M. Yannakakis, "Principles and methods of testing finite state machines-a survey," in Proceedings of
the IEEE, vol. 84, no. 8, pp. 1090-1123, 1996.
[22] C. d. S. Carvalho and T. Tsuchiya, "Coverage Criteria for State Transition Testing and Model Checker-Based Test
Case Generation," in 2014 Second International Symposium on Computing and Networking, pp. 596-598,
Shizuoka, 2014.
BIOGRAPHIES OF AUTHORS
Wijaya Kurniawan received Bachelor Degree at Electrical Engineering - Brawijaya University,
completed a master degree at Electrical Engineering - Brawijaya University. Presently lecturer at
Computer Engineering, Faculty of Computer Science – Brawijaya University. Research interest
Control System, Robotics and Embedded System.
Mochammad Hannats Hanafi Ichsan received Bachelor Degree at Informatics – Electronics
Engineering Polytechnic Institute of Surabaya (EEPIS), completed a master degree at Electrical
Engineering - Brawijaya University. Presently lecturer at Computer Engineering, Faculty of Computer
Science – Brawijaya University. Research interest Artificial Intelligence, Human-Computer
Interaction, Intelligence System And Optimization.
Sabriansyah Rizqika Akbar received Bachelor Degree at Electrical Engineering - Brawijaya
University, completed master degree at Information Technology – Gajah Mada University. Presently
lecturer at Computer Engineering, Faculty of Computer Science – Brawijaya University. Research
interest Networking, Wireless Sensor Network, Internet of Things and Pervasive and Ubiquitous
Computing.