Pervasive computing is an environment which is used and integrated into every object and activities to meet human needs and its existence isn’t perceived as something specific. The concept of Smart Home is to assist human needs in an everyday object that performs controls or being controlled. Based on previous research the used communication protocol is UDP (User Datagram Protocol) and the programming language is LabVIEW. UDP is used because it does not require handshaking in the broadcast process, as well as on the use of memory more efficient than other protocols. Devices which perform controls called Host and which is controlled called Client. Both of them (Things) have an ability to send data to the Internet without any human interaction. So this research wants to conduct pervasive protocol between Host and Client which each device is integrated with the Internet of Things (IoT). Data are posted at dweet.io that is a cloud server website that contains a simple online data submission which has free services. This research is conducted to measure the communication performance between host to client, host to cloud server and client to cloud server that represents household equipment.
A Survey: DDOS Attack on Internet of ThingsIJERD Editor
Internet of Things refer as interconnection of smart object, included from small coffee machine to
big car, communicate with each other without human interactions also called as Device to Device
communications. In current emerging world, all of the devices become smarter and can communicate with other
devices as well. With this rapid development of Internet of Things in different area like smart home, smart
hospital etc. it also have to face some difficulty to securing overall privacy due to heterogeneity nature. There
are so many types of vulnerability but here in this paper we put concentration on Distributed Denial of Service
attack (DDoS). DoS is attack which can block the usage for authentic user and make network resource
unavailable, consume bandwidth; if similar attack is penetrated from different sources its call DDoS. To prevent
from such attack it need mechanism that can detect and prevent it from attack, but due to small devices it has
limited power capacity. So that mechanism must be implemented at network entrance. In this paper we discuss
different DDoS attack and its effect on IoT.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
KANSA: high interoperability e-KTP decentralised database network using distr...TELKOMNIKA JOURNAL
e-KTP is an Indonesian Identity Card based on Near Field Communicator technology. This technology was embedded in every e-KTP card for every Indonesian citizen. Until this research, e-KTP technology never to be utilized by any stack-holder neither government agencies nor nongovernment organization or company. e-KTP Technology inside the card never been used and go with conventional with manual copy it with photocopy machine or take a photograph with it. This research was proposing an open standard to utilized e-KTP Technology. The open standard will bring e-KTP technology used as is and used broadly in many government agencies or much commercial company. This research was proposing decentralized network model especially for storing e-KTP data without breaking privacy law. Besides providing high specs of the server, a decentralized model can reduce the cost of server infrastructure. The model was proposing using Distributed Hast Table which was used for peer-to-peer networks. The decentralized model promised high availability and the more secure way to save and access the data. The result of this model can be implemented in many network topology or infrastructure also applicable to implement on Small Medium Enterprise Company.
Automated hierarchical classification of scanned documents using convolutiona...IJECEIAES
This research proposed automated hierarchical classification of scanned documents with characteristics content that have unstructured text and special patterns (specific and short strings) using convolutional neural network (CNN) and regular expression method (REM). The research data using digital correspondence documents with format PDF images from Pusat Data Teknologi dan Informasi (Technology and Information Data Center). The document hierarchy covers type of letter, type of manuscript letter, origin of letter and subject of letter. The research method consists of preprocessing, classification, and storage to database. Preprocessing covers extraction using Tesseract optical character recognition (OCR) and formation of word document vector with Word2Vec. Hierarchical classification uses CNN to classify 5 types of letters and regular expression to classify 4 types of manuscript letter, 15 origins of letter and 25 subjects of letter. The classified documents are stored in the Hive database in Hadoop big data architecture. The amount of data used is 5200 documents, consisting of 4000 for training, 1000 for testing and 200 for classification prediction documents. The trial result of 200 new documents is 188 documents correctly classified and 12 documents incorrectly classified. The accuracy of automated hierarchical classification is 94%. Next, the search of classified scanned documents based on content can be developed.
An Event-based Middleware for Syntactical Interoperability in Internet of Th...IJECEIAES
Internet of Things (IoT) connecting sensors or devices that record physical observations of the environment and a variety of applications or other Internet services. Along with the increasing number and diversity of devices connected, there arises a problem called interoperability. One type of interoperability is syntactical interoperability, where the IoT should be able to connect all devices through various data protocols. Based on this problem, we proposed a middleware that capable of supporting interoperability by providing a multi-protocol gateway between COAP, MQTT, and WebSocket. This middleware is developed using event-based architecture by implementing publish-subscribe pattern. We also developed a system to test the performance of middleware in terms of success rate and delay delivery of data. The system consists of temperature and humidity sensors using COAP and MQTT as a publisher and web application using WebSocket as a subscriber. The results for data transmission, either from sensors or MQTT COAP has a success rate above 90%, the average delay delivery of data from sensors COAP and MQTT below 1 second, for packet loss rate varied between 0% - 25%. The interoperability testing has been done using Interoperability assessment methodology and found out that ours is qualified.
A Survey: DDOS Attack on Internet of ThingsIJERD Editor
Internet of Things refer as interconnection of smart object, included from small coffee machine to
big car, communicate with each other without human interactions also called as Device to Device
communications. In current emerging world, all of the devices become smarter and can communicate with other
devices as well. With this rapid development of Internet of Things in different area like smart home, smart
hospital etc. it also have to face some difficulty to securing overall privacy due to heterogeneity nature. There
are so many types of vulnerability but here in this paper we put concentration on Distributed Denial of Service
attack (DDoS). DoS is attack which can block the usage for authentic user and make network resource
unavailable, consume bandwidth; if similar attack is penetrated from different sources its call DDoS. To prevent
from such attack it need mechanism that can detect and prevent it from attack, but due to small devices it has
limited power capacity. So that mechanism must be implemented at network entrance. In this paper we discuss
different DDoS attack and its effect on IoT.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
KANSA: high interoperability e-KTP decentralised database network using distr...TELKOMNIKA JOURNAL
e-KTP is an Indonesian Identity Card based on Near Field Communicator technology. This technology was embedded in every e-KTP card for every Indonesian citizen. Until this research, e-KTP technology never to be utilized by any stack-holder neither government agencies nor nongovernment organization or company. e-KTP Technology inside the card never been used and go with conventional with manual copy it with photocopy machine or take a photograph with it. This research was proposing an open standard to utilized e-KTP Technology. The open standard will bring e-KTP technology used as is and used broadly in many government agencies or much commercial company. This research was proposing decentralized network model especially for storing e-KTP data without breaking privacy law. Besides providing high specs of the server, a decentralized model can reduce the cost of server infrastructure. The model was proposing using Distributed Hast Table which was used for peer-to-peer networks. The decentralized model promised high availability and the more secure way to save and access the data. The result of this model can be implemented in many network topology or infrastructure also applicable to implement on Small Medium Enterprise Company.
Automated hierarchical classification of scanned documents using convolutiona...IJECEIAES
This research proposed automated hierarchical classification of scanned documents with characteristics content that have unstructured text and special patterns (specific and short strings) using convolutional neural network (CNN) and regular expression method (REM). The research data using digital correspondence documents with format PDF images from Pusat Data Teknologi dan Informasi (Technology and Information Data Center). The document hierarchy covers type of letter, type of manuscript letter, origin of letter and subject of letter. The research method consists of preprocessing, classification, and storage to database. Preprocessing covers extraction using Tesseract optical character recognition (OCR) and formation of word document vector with Word2Vec. Hierarchical classification uses CNN to classify 5 types of letters and regular expression to classify 4 types of manuscript letter, 15 origins of letter and 25 subjects of letter. The classified documents are stored in the Hive database in Hadoop big data architecture. The amount of data used is 5200 documents, consisting of 4000 for training, 1000 for testing and 200 for classification prediction documents. The trial result of 200 new documents is 188 documents correctly classified and 12 documents incorrectly classified. The accuracy of automated hierarchical classification is 94%. Next, the search of classified scanned documents based on content can be developed.
An Event-based Middleware for Syntactical Interoperability in Internet of Th...IJECEIAES
Internet of Things (IoT) connecting sensors or devices that record physical observations of the environment and a variety of applications or other Internet services. Along with the increasing number and diversity of devices connected, there arises a problem called interoperability. One type of interoperability is syntactical interoperability, where the IoT should be able to connect all devices through various data protocols. Based on this problem, we proposed a middleware that capable of supporting interoperability by providing a multi-protocol gateway between COAP, MQTT, and WebSocket. This middleware is developed using event-based architecture by implementing publish-subscribe pattern. We also developed a system to test the performance of middleware in terms of success rate and delay delivery of data. The system consists of temperature and humidity sensors using COAP and MQTT as a publisher and web application using WebSocket as a subscriber. The results for data transmission, either from sensors or MQTT COAP has a success rate above 90%, the average delay delivery of data from sensors COAP and MQTT below 1 second, for packet loss rate varied between 0% - 25%. The interoperability testing has been done using Interoperability assessment methodology and found out that ours is qualified.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Privacy-Preserving Updates to Anonymous and Confidential Databaseijdmtaiir
The current trend in the application space towards
systems of loosely coupled and dynamically bound
components that enables just-in-time integration jeopardizes
the security of information that is shared between the broker,
the requester, and the provider at runtime. In particular, new
advances in data mining and knowledge discovery that allow
for the extraction of hidden knowledge in an enormous amount
of data impose new threats on the seamless integration of
information. We consider the problem of building privacy
preserving algorithms for one category of data mining
techniques, association rule mining.Suppose Alice owns a kanonymous database and needs to determine whether her
database, when inserted with a tuple owned by Bob, is still kanonymous. Also, suppose that access to the database is strictly
controlled, because for example data are used for certain
experiments that need to be maintained confidential. Clearly,
allowing Alice to directly read the contents of the tuple breaks
the privacy of Bob (e.g., a patient’s medical record); on the
other hand, the confidentiality of the database managed by
Alice is violated once Bob has access to the contents of the
database. Thus, the problem is to check whether the database
inserted with the tuple is still k-anonymous, without letting
Alice and Bob know the contents of the tuple and the database,
respectively. In this paper, we propose two protocols solving
this problem on suppression-based and generalization-based kanonymous and confidential databases. The protocols rely on
well-known cryptographic assumptions, and we provide
theoretical analyses to proof their soundness and experimental
results to illustrate their efficiency.We have presented two
secure protocols for privately checking whether a kanonymous database retains its anonymity once a new tuple is
being inserted to it. Since the proposed protocols ensure the
updated database remains K-anonymous, the results returned
from a user’s (or a medical researcher’s) query are also kanonymous. Thus, the patient or the data provider’s privacy
cannot be violated from any query. As long as the database is
updated properly using the proposed protocols, the user queries
under our application domain are always privacy-preserving
Group chain is a scalable public blockchain of two-chain structure. Built on the principle of reducing consensus size to achieve high transaction efficiency. Employs the leader group with a small size to collectively commit blocks. Group chain reduce transaction confirmation latency. Achieves a throughput of over 800 TPS with a small leader group size. Performance is close to 600 TPS even in a ledger group size is 100.
KAFA: A novel interoperability open framework to utilize Indonesian electroni...TELKOMNIKA JOURNAL
Indonesian people have electronic citizen card called e-KTP. e-KTP is NFC based technology embedded inside Indonesian citizenship identity card. e-KTP technology has never been used until now since it was launch officially by the government. This research proposes an independent framework for bridging the gap between Indonesia regulation for e-KTP and commercial use in the many commercial or organization sector. The Framework proposes interoperability framework using novel combination component, there are e-KTP reader, Middleware and Web Service. KAFA (e-KTP Middleware and Framework) implementing Internet of Things (IoT) concept to make it as open standard and independent. The framework use federation mode or decentralized data for interoperability, to make sure not breaking the law of privacy. Extended development of AES-CBC cipher algorithm was used to encrypt the data on the transport between middleware and web service.
The soap based mechanism for home environment using web services ecij
Recent advancements in smart home systems have increased the utilization of consumer devices and appliances in home environment. However, many of these devices and appliances exhibit certain degree of heterogeneity and do not adapt towards joint execution of operation. Hence, it is rather difficult to perform interoperation especially to realize desired services preferred by home users. In this paper, we propose a new intelligent interoperability framework for smart home systems execution as well as coordinating them in a federated manner. The framework core is based on Simple Object Access Protocol (SOAP) technology that provides platform independent interoperation among heterogeneous
systems. We have implemented the interoperability framework with several home devices to demonstrate
their effectiveness for interoperation. The performance of the framework was tested in Local Area Network(LAN) environment and proves to be reliable in smart home setting1.
Security Issues related with cloud computingIJERA Editor
The term CLOUD means Common Location Independent Online Utility on Demand. It‟s an emerging technology in IT industries. Cloud technologies are improving day by day and now it become a need for all small and large scale industries. Companies like Google, Amazon, Microsoft etc. is providing virtualized environment for user by which it omits the need for physical storage and others. But as the advantage of cloud computing is increasing day by day the issues are also threatening the IT industries. These issues related with the security of the data. The basic idea of this review paper is to elaborate the security issues related with cloud computing and what methods are implemented to improve these security. Certain algorithms like RSA, DES, and Ceaser Cipher etc. implemented to improve the security issues. In this paper we have implemented Identity based mRSA algorithm in this paper for improving security of data.
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Cloud computing is an emerging computing technology that enables users to distantly store their data into a cloud so as to enjoy scalable services when required. And user can outsource their resources to server (also called cloud) using Internet. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Attribute-based encryption (ABE) can be used for log encryption. This survey is more specific to the different security issues on data access in cloud environment.
The Internet of Things has changed the dimensions of traditional Business IT. To tap the potential need for a highly scalable and reliable IT Infrastructure, they should be on standardized components and open protocols and include the three layer Devices, Controllers and Data Center or the Cloud solutions.
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
Cloud computing is computing in which large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources. The strives of environment is dynamic, customizable and reliable with the quality of services. Security issues in the cloud as it is anywhere else. Lots of people share different point of views in cloud computing. Some of the people believe that it is unsafe to use Cloud Computing .Clouds can be classified as public, private or hybrid. This paper handle security issue in cloud using blowfish algorithm.
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...IJECEIAES
Smart Home concept is to connect several devices to perform control and the device to be controlled to help any human needs. So it should have one device being Host and several devices being Client. The environment in this case is a home that there is too much technology that planted technologies that has much influence at human activities is called pervasive computing. The device communication should be has a protocol, at the research used UDP protocol because it doesn't need to negotiate before performing communication like a TCP. With UDP behavior did not use to validate at every send or deliver data because at Smart Home environment doesn't need a large or big data being processed. LabView used at this research based on previous research, but MyRIO has used this research to perform Client and Host performed by PC. So it can measure how usable the design that created. This research proves that LabView and MyRIO successfully implemented with the design that created to perform Pervasive Computing for Smart Home environment. Functional testing scenario conducted by every condition that on system environment, based on design all testing scenario successfully and working as well as expected.
Bridging IoT infrastructure and cloud application using cellular-based intern...TELKOMNIKA JOURNAL
An Internet of Things (IoT) middleware can solve interoperability problem among “things” in IoT infrastructure by collecting data. However, the sensor nodes’ data that is collected by the middleware cannot be directly delivered to cloud applications since the sensor nodes and the middleware are located in intranet. A solution to this problem is an Internet Gateway Device (IGD) that retrieves data from the middleware in intranet then forwards them to cloud applications in the internet. In this study, an IGD based on cellular network is proposed to provide wide-coverage internet connectivity. Two test scenarios were conducted to measure delay and throughput between the IGD and the cloud application; using data from DHT22 sensor and image sensor respectively. The results of the first test scenario using DHT22 sensor show that the average delay is under 5 seconds and the maximum throughput is 120 bps, while the second one using image sensor concludes that the average delay is 595 seconds and the maximum throughput is 909 bps.
30 9137 e implementation of cloud connected smart plug (edit lafi)IAESIJEECS
Internet of Things (IoT) is the expansion of web administrations. Employments of new advancements in IoT condition are expanding quickly. A Smart Home is additionally one of the uses of IoT. A Smart Switchboard constrains customer’s execution in watching home settings and controlling home machines. This paper shows an approach to manage the progression of Smart Home applications by consolidating IoT with Web server and Cloud organize. The approach concentrates on: (1) implanting insight into sensors utilizing Energia stage [7]; (2) Creating collaborations with brilliant things utilizing Blynk-Cloud stage; (3) expanding information trade proficiency. At the point when these family unit gadgets in brilliant homes interface with the web utilizing legitimate design, then entire framework can be called as Smart Home in IoT condition or IoT based Smart Homes. Keen Homes contains family unit gadgets/home apparatuses could screen and control remotely. In addition, we execute three cases to show the approach's possibility and productivity, i.e., measuring home conditions, observing electrical machines, and controlling home robotization.
Secure Data Sharing In an Untrusted CloudIJERA Editor
Cloud computing is a huge area which basically provides many services on the basis of pay as you go. One of the fundamental services provided by cloud is data storage. Cloud provides cost efficiency and an efficient solution for sharing resource among cloud users. A secure and efficient data sharing scheme for groups in cloud is not an easy task. On one hand customers are not ready to share their identity but on other hand want to enjoy the cost efficiency provided by the cloud. It needs to provide identity privacy, multiple owner and dynamic data sharing without getting effected by the number of cloud users revoked. In this paper, any member of a group can completely enjoy the data storing and sharing services by the cloud. A secure data sharing scheme for dynamic cloud users is proposed in this paper. For which it uses group signature and dynamic broadcast encryption techniques such that any user in a group can share the information in a secured manner. Additionally the permission option is proposed for the security reasons. This means the file access permissions are generated by the admin and given to the user using Role Based Access Control (RBA) algorithm. The file access permissions are read, write and delete. In this, owner can provide files with options and accepts the users using that option. The revocation of cloud user is a function generated by the Admin for security purpose. The encryption computational cost and storage overhead is not dependent on the number of users revoked. We analyze the security by proofs and produce the cloud efficiency report using cloudsim.
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Privacy-Preserving Updates to Anonymous and Confidential Databaseijdmtaiir
The current trend in the application space towards
systems of loosely coupled and dynamically bound
components that enables just-in-time integration jeopardizes
the security of information that is shared between the broker,
the requester, and the provider at runtime. In particular, new
advances in data mining and knowledge discovery that allow
for the extraction of hidden knowledge in an enormous amount
of data impose new threats on the seamless integration of
information. We consider the problem of building privacy
preserving algorithms for one category of data mining
techniques, association rule mining.Suppose Alice owns a kanonymous database and needs to determine whether her
database, when inserted with a tuple owned by Bob, is still kanonymous. Also, suppose that access to the database is strictly
controlled, because for example data are used for certain
experiments that need to be maintained confidential. Clearly,
allowing Alice to directly read the contents of the tuple breaks
the privacy of Bob (e.g., a patient’s medical record); on the
other hand, the confidentiality of the database managed by
Alice is violated once Bob has access to the contents of the
database. Thus, the problem is to check whether the database
inserted with the tuple is still k-anonymous, without letting
Alice and Bob know the contents of the tuple and the database,
respectively. In this paper, we propose two protocols solving
this problem on suppression-based and generalization-based kanonymous and confidential databases. The protocols rely on
well-known cryptographic assumptions, and we provide
theoretical analyses to proof their soundness and experimental
results to illustrate their efficiency.We have presented two
secure protocols for privately checking whether a kanonymous database retains its anonymity once a new tuple is
being inserted to it. Since the proposed protocols ensure the
updated database remains K-anonymous, the results returned
from a user’s (or a medical researcher’s) query are also kanonymous. Thus, the patient or the data provider’s privacy
cannot be violated from any query. As long as the database is
updated properly using the proposed protocols, the user queries
under our application domain are always privacy-preserving
Group chain is a scalable public blockchain of two-chain structure. Built on the principle of reducing consensus size to achieve high transaction efficiency. Employs the leader group with a small size to collectively commit blocks. Group chain reduce transaction confirmation latency. Achieves a throughput of over 800 TPS with a small leader group size. Performance is close to 600 TPS even in a ledger group size is 100.
KAFA: A novel interoperability open framework to utilize Indonesian electroni...TELKOMNIKA JOURNAL
Indonesian people have electronic citizen card called e-KTP. e-KTP is NFC based technology embedded inside Indonesian citizenship identity card. e-KTP technology has never been used until now since it was launch officially by the government. This research proposes an independent framework for bridging the gap between Indonesia regulation for e-KTP and commercial use in the many commercial or organization sector. The Framework proposes interoperability framework using novel combination component, there are e-KTP reader, Middleware and Web Service. KAFA (e-KTP Middleware and Framework) implementing Internet of Things (IoT) concept to make it as open standard and independent. The framework use federation mode or decentralized data for interoperability, to make sure not breaking the law of privacy. Extended development of AES-CBC cipher algorithm was used to encrypt the data on the transport between middleware and web service.
The soap based mechanism for home environment using web services ecij
Recent advancements in smart home systems have increased the utilization of consumer devices and appliances in home environment. However, many of these devices and appliances exhibit certain degree of heterogeneity and do not adapt towards joint execution of operation. Hence, it is rather difficult to perform interoperation especially to realize desired services preferred by home users. In this paper, we propose a new intelligent interoperability framework for smart home systems execution as well as coordinating them in a federated manner. The framework core is based on Simple Object Access Protocol (SOAP) technology that provides platform independent interoperation among heterogeneous
systems. We have implemented the interoperability framework with several home devices to demonstrate
their effectiveness for interoperation. The performance of the framework was tested in Local Area Network(LAN) environment and proves to be reliable in smart home setting1.
Security Issues related with cloud computingIJERA Editor
The term CLOUD means Common Location Independent Online Utility on Demand. It‟s an emerging technology in IT industries. Cloud technologies are improving day by day and now it become a need for all small and large scale industries. Companies like Google, Amazon, Microsoft etc. is providing virtualized environment for user by which it omits the need for physical storage and others. But as the advantage of cloud computing is increasing day by day the issues are also threatening the IT industries. These issues related with the security of the data. The basic idea of this review paper is to elaborate the security issues related with cloud computing and what methods are implemented to improve these security. Certain algorithms like RSA, DES, and Ceaser Cipher etc. implemented to improve the security issues. In this paper we have implemented Identity based mRSA algorithm in this paper for improving security of data.
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
Cloud computing is an emerging computing technology that enables users to distantly store their data into a cloud so as to enjoy scalable services when required. And user can outsource their resources to server (also called cloud) using Internet. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Attribute-based encryption (ABE) can be used for log encryption. This survey is more specific to the different security issues on data access in cloud environment.
The Internet of Things has changed the dimensions of traditional Business IT. To tap the potential need for a highly scalable and reliable IT Infrastructure, they should be on standardized components and open protocols and include the three layer Devices, Controllers and Data Center or the Cloud solutions.
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
Cloud computing is computing in which large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources. The strives of environment is dynamic, customizable and reliable with the quality of services. Security issues in the cloud as it is anywhere else. Lots of people share different point of views in cloud computing. Some of the people believe that it is unsafe to use Cloud Computing .Clouds can be classified as public, private or hybrid. This paper handle security issue in cloud using blowfish algorithm.
UDP Pervasive Protocol Implementation for Smart Home Environment on MyRIO usi...IJECEIAES
Smart Home concept is to connect several devices to perform control and the device to be controlled to help any human needs. So it should have one device being Host and several devices being Client. The environment in this case is a home that there is too much technology that planted technologies that has much influence at human activities is called pervasive computing. The device communication should be has a protocol, at the research used UDP protocol because it doesn't need to negotiate before performing communication like a TCP. With UDP behavior did not use to validate at every send or deliver data because at Smart Home environment doesn't need a large or big data being processed. LabView used at this research based on previous research, but MyRIO has used this research to perform Client and Host performed by PC. So it can measure how usable the design that created. This research proves that LabView and MyRIO successfully implemented with the design that created to perform Pervasive Computing for Smart Home environment. Functional testing scenario conducted by every condition that on system environment, based on design all testing scenario successfully and working as well as expected.
Bridging IoT infrastructure and cloud application using cellular-based intern...TELKOMNIKA JOURNAL
An Internet of Things (IoT) middleware can solve interoperability problem among “things” in IoT infrastructure by collecting data. However, the sensor nodes’ data that is collected by the middleware cannot be directly delivered to cloud applications since the sensor nodes and the middleware are located in intranet. A solution to this problem is an Internet Gateway Device (IGD) that retrieves data from the middleware in intranet then forwards them to cloud applications in the internet. In this study, an IGD based on cellular network is proposed to provide wide-coverage internet connectivity. Two test scenarios were conducted to measure delay and throughput between the IGD and the cloud application; using data from DHT22 sensor and image sensor respectively. The results of the first test scenario using DHT22 sensor show that the average delay is under 5 seconds and the maximum throughput is 120 bps, while the second one using image sensor concludes that the average delay is 595 seconds and the maximum throughput is 909 bps.
30 9137 e implementation of cloud connected smart plug (edit lafi)IAESIJEECS
Internet of Things (IoT) is the expansion of web administrations. Employments of new advancements in IoT condition are expanding quickly. A Smart Home is additionally one of the uses of IoT. A Smart Switchboard constrains customer’s execution in watching home settings and controlling home machines. This paper shows an approach to manage the progression of Smart Home applications by consolidating IoT with Web server and Cloud organize. The approach concentrates on: (1) implanting insight into sensors utilizing Energia stage [7]; (2) Creating collaborations with brilliant things utilizing Blynk-Cloud stage; (3) expanding information trade proficiency. At the point when these family unit gadgets in brilliant homes interface with the web utilizing legitimate design, then entire framework can be called as Smart Home in IoT condition or IoT based Smart Homes. Keen Homes contains family unit gadgets/home apparatuses could screen and control remotely. In addition, we execute three cases to show the approach's possibility and productivity, i.e., measuring home conditions, observing electrical machines, and controlling home robotization.
Architectural design of IoT-cloud computing integration platformTELKOMNIKA JOURNAL
An integration between the Internet of Things (IoT) and cloud computing can potentially leverage the
utilization of both sides. As the IoT based system is mostly composed by the interconnection of pervasive
and constrained devices, it can take a benefit of virtually unlimited resources of cloud entity i.e storage
and computation services to store and process its sensed data. On the other hand, the cloud computing
system may get benefit from IoT by broadening its reach to real world environment applications. In order
to incarnate this idea, a cloud software platform is needed to provide an integration layer between the IoT
and cloud computing taking into account the heterogenity of network communication protocols as well as the
security and data management issues. In this study, an architectural design of IoT-cloud platform for IoT and
cloud computing integration is presented. The proposed software platform can be decomposed into five main
components namely cloud-to-device interface, authentication, data management, and cloud-to-user interface
component. In general, the cloud-to-device interface acts as a data transmission endpoint between the whole
cloud platform system and its IoT devices counterpart. Before a session of data transmission established,
the communication interface contact the authentication component to make sure that the corresponding IoT
device is legitimate before it allowed for sending the sensor data to cloud environment. Notice that a valid IoT
device can be registered to the cloud system through web console component. The received sensor data
are then collected in data storage component. Any stored data can be further analyzed by data processing
component. User or any developed applications can then retrieve collected data, either raw or processed
data, through API data access and web console.
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Istabraq M. Al-Joboury
The Internet of Things (IoT) becomes the future of a global data field in which the embedded devices communicate with each other, exchange data and making decisions through the Internet. IoT could improves the qualityoflife in smart cities, but a massive amount of data from different smart devices could slow down or crash database systems. In addition, IoT data transfer to Cloud for monitoring information and generating feedback thus will lead to highdelay in infrastructure level. Fog Computing can help by offering services closer to edge devices. In this paper, we propose an efficient system architecture to mitigate the problem of delay. We provide performance analysis like responsetime, throughput and packet loss for MQTT (Message Queue Telemetry Transport) and HTTP (Hyper Text Transfer Protocol) protocols based on Cloud or Fog serverswith large volume of data form emulated traffic generator working alongsidewith one real sensor. We implement both protocols in the same architecture, with low cost embedded devices to local and Cloud servers with different platforms. The results show that HTTP response time is 12.1 and 4.76 times higher than MQTT Fog and cloud based located in the same geographical area of the sensors respectively. The worst case in performance is observed when the Cloud is public and outside the country region. The results obtained for throughput shows that MQTT has the capability to carry the data with available bandwidth and lowest percentage of packet loss. We also prove that the proposed Fog architecture is an efficient way to reduce latency and enhance performance in Cloud based IoT.
Internet Of Things(IoT) is emerging technology in future world.The term IoT comprises of Cloud computing, Data mining,
Big data analytics, hardware board. The Security and Interoperability is a main factor that influences the IoT Enegy
consumption is also main fator for IoT application designing.The various protocols such as MQTT,AMQP,XMPP are used in
IoT.This paper analysis the various protocols used in Internet of Things.
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...Istabraq M. Al-Joboury
Internet of Things (IoT) evolves very rapidly over time, since everything such as sensors/actuators linked together from around the world with use of evolution of ubiquitous computing through the Internet. These devices have a unique IP address in order to communicate with each other and transmit data with features of wireless technologies. Fog computing or so called edge computing brings all Cloud features to embedded devices at edge network and adds more features to servers like pre-store data of Cloud, fast response, and generate overhasty users reporting. Fog mediates between Cloud and IoT devices and thus enables new types of computing and services. The future applications take the advantage of combing the two concepts Fog and Cloud in order to provide low delay Fog-based and high capacity of storage Cloud-based. This paper proposes an IoT architecture for healthcare network based on Fog to Cloud and Data in Motion (F2CDM). The proposed architecture is designed and implemented over three sites: Site 1 contains the embedded devices layer, Site 2 consists of the Fog network layer, while Site 3 consists of the Cloud network. The Fog layer is represented by a middleware server in Al-Nahrain University with temporary storage such that the data lives inside for 30 min. During this time, the selection of up-normality in behavior is send to the Cloud while the rest of the data is wiped out. On the other hand, the Cloud stores all the incoming data from Fog permanently. The F2CDM works using Message Queue Telemetry Transport (MQTT) for fast response. The results show that all data can be monitored from the Fog in real time while the critical data can be monitored from Cloud. In addition, the response time is evaluated using traffic generator called Tsung. It has been found that the proposed architecture reduces traffic on Cloud network and provides better data analysis.
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP N...TELKOMNIKA JOURNAL
The Internet of Things (IoT) communication protocol built over IP and non-IP environment.
Therefore, a gateway device will be needed to bridge the IP and non-IP network transparently since an IoT
user is more likely to concern on the service provided by the IoT device, rather than the complexity of the
network or device configuration. Since today ubiquitous computing needs to hide the architectural level
from it users, the data & information centric approach was proposed. However, the data & information
centric protocol is having several issues and one of them is device and service discovery protocol over IP
& non-IP network. This paper proposed a pervasive device and service discovery protocol that able to
work in interoperability of the IP and non-IP network. The system environment consists of a smart device
with XBee Communication as the non-IP network that will send the device and service description data to
the IP network using WebSocket. The gateway will able to recognize the smart device and sent the data to
the web-based user application. The user application displayed the discovered devices along the services
and able to send the control data to each of the smart devices. Our proposed protocol also enriched with
the smart device inoperability detection by using keep-alive tracking from the gateway to each of the smart
devices. The result showed that the delay for the user application to detect the smart device in the XBee
network is around 10.13 ms delay, and the service average delay requested by the user application to
each of the devices is 2.13 ms.
The Internet of Things (IoT): A Comprehensive Overview
Introduction:
The Internet of Things (IoT) is a revolutionary concept that has transformed the way we interact with the world around us. It refers to the network of physical devices, vehicles, appliances, and other objects embedded with sensors, software, and connectivity capabilities to exchange data and communicate with each other through the internet. This comprehensive overview will delve into the various aspects of IoT, including its definition, key components, applications, challenges, and future prospects.
Definition and Key Components of IoT:
The IoT encompasses a vast ecosystem of interconnected devices that work together to collect and exchange data. Key components of IoT include:
Devices and Sensors: IoT devices are physical objects embedded with sensors, actuators, and connectivity modules that enable them to gather and transmit data. These devices can range from simple sensors like temperature or motion sensors to complex devices like smart appliances, wearables, and industrial machinery.
Connectivity: IoT devices rely on various communication protocols and technologies to connect and exchange data. These include Wi-Fi, Bluetooth, Zigbee, NFC, cellular networks, and more recently, low-power wide-area networks (LPWAN) like LoRaWAN and NB-IoT.
Cloud Computing: IoT devices generate enormous amounts of data, which are typically processed and stored in the cloud. Cloud computing provides the infrastructure and services required to process and analyze this data, enabling real-time insights and remote management of IoT devices.
Data Analytics and Artificial Intelligence (AI): IoT generates massive volumes of data, often referred to as big data. Data analytics and AI techniques are employed to derive valuable insights from this data, enabling predictive analysis, anomaly detection, and optimization of IoT systems.
Applications of IoT:
Smart Homes and Buildings: IoT enables the creation of smart homes and buildings where devices like thermostats, lighting systems, security cameras, and appliances can be interconnected and controlled remotely. This allows for energy optimization, enhanced security, and increased convenience.
Industrial Internet of Things (IIoT): IIoT refers to the integration of IoT technologies in industrial settings. It enables real-time monitoring, predictive maintenance, and optimization of industrial processes, leading to increased efficiency, reduced downtime, and cost savings.
Healthcare: IoT has transformative applications in healthcare, including remote patient monitoring, wearable devices for health tracking, smart medical devices, and real-time health data analysis. These advancements enhance patient care, enable early detection of diseases, and improve overall healthcare outcomes.
Smart Cities: IoT can be utilized to create smart cities by integrating various systems such as transportation, infrastructure, energy management, waste management, and p
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
This paper provides a review of orchestration distributed systems for IoT smart services in fog computing. The cloud infrastructure alone cannot handle the flow of information with the abundance of data, devices and interactions. Thus, fog computing becomes a new paradigm to overcome the problem. One of the first challenges was to build the orchestration systems to activate the clouds and to execute tasks throughout the whole system that has to be considered to the situation in the large scale of geographical distance, heterogeneity and low latency to support the limitation of cloud computing. Some problems exist for orchestration distributed in fog computing are to fulfil with high reliability and low-delay requirements in the IoT applications system and to form a larger computer network like a fog network, at different geographic sites. This paper reviewed approximately 68 articles on orchestration distributed system for fog computing. The result shows the orchestration distribute system and some of the evaluation criteria for fog computing that have been compared in terms of Borg, Kubernetes, Swarm, Mesos, Aurora, heterogeneity, QoS management, scalability, mobility, federation, and interoperability. The significance of this study is to support the researcher in developing orchestration distributed systems for IoT smart services in fog computing focus on IR4.0 national agenda.
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
With the advancement of wireless technology, our dependency on smart system has increases to a higher level than before. Without doubt, integration between different technologies becomes inevitable in order create affordable surveillance system. This paper presents the development of with web-based surveillance system with a dedicated Android-based mobile application using a Raspberry Pi and its supporting components i.e., Pi-Camera, PIR motion sensor, Ultrasonic sensor, web-based & mobile application. The designed system also utilizes Node-Red development tools as the platform to integrate all components of the system, MQTT as the communication protocol for data acquisition and ThingSpeak as the middleware. The proposed system can be implemented over the internet using any computer and mobile devices, at anywhere and anytime. The system can automatically stream live video viewed from the Android mobile application and the Raspberry Pi device can send an alert notification to users via email and SMS. The system can be one possible features in smart home system and is considered as an affordable solution, customizable and easy to implement in comparison with other commercial surveillance system products such as CCTV or IP Camera
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
Mobile technology opens the door for a new kind of learning called here and now learning that occurs when learners have access to information anytime and anywhere to perform authentic activities in the context of their learning. Mobile devices, applications and services have become integrated into people's daily lives on a personal and professional level. The purpose of this study was to investigate challenges &opportunities of IoT in mobile technology. The paper is divided in 5 sections and the content of the paper covers the history, elements, challenges and opportunities salong with future of IoT specific to Indian Mobile arena.
Similar to UDP Pervasive Protocol Integration with IoT for Smart Home Environment using LabVIEW (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
2. Int J Elec & Comp Eng ISSN: 2088-8708
UDP Pervasive Protocol Integration with IoT for Smart Home ... (Mochammad Hannats Hanafi Ichsan)
5343
need a large amount of data [10]. It also very efficient because does not need to validate data that is sent to
the Host or the Client.
LabVIEW is used because it can easily connect with devices such as Arduino, microcontroller even
computer networks [11] and could perform simulated input/output as well as real hardware [12]. At industrial
words they have such as MyRIO, CompactRIO, and Elvis etc. to develop prototyped systems [13]. Pervasive
computing sometimes is called by ubiquitous computing that has difficult task which is how to become an
automatic identification from the distributed environment such as computation, communication and its
process. It needs storage on the cloud where the data from either the Host or the Client being saved and
visualized. One of the most cloud that free to save the data is dweet.io. Dweet.io is a free web service/cloud
server that has facilitation to save simple data format online from every device that is connected [14].
Simpler data transfer format that used by dweet.io is JSON which include a timestamp, device ID and
data value [15].
Previous research is conducted by designing and implementing UDP Pervasive on LabVIEW [9]
and implementing on MyRIO [16] this research is originally extended from that previous system that
communicate over cloud server. This system is designed by having a Host and a Client. The Host is designed
by one device that could connect with many clients. The Client could communicate pervasively to the host.
Our research is to measure the communication between Host, Client and dweet.io. Each of the Host and the
Client will communicate with dweet.io by the internet and between Host and Client will be communicating
locally so it can be measured how the service provided and are affected by the complexity of the network
configuration and architecture.
2. RESEARCH METHOD
This section will explain about the communication design between the Client, the Host and
dweet.io. Based on previous research, a pervasive discovery protocol is performed between Client and Host
[9]. After both of Client and Host connected, they will communicate each other and both of them will send
data to dweet.io. Each step by step state will be explained in this section, started from Client performing a
broadcasted data until they can communicate. At communication state, a parallel process will be performing
to send data to dweet.io and data format which is used is JSON. Then the communication between Client
and Host; Client and dweet.io; and Host and dweet.io will be measured.
3.1. Network Design
The used standard design is from ETSI [17] M2M (Machine to Machine) area network domain and
at this research that design will be extended to communicate via the internet. The pervasive service discovery
protocol using UDP is shown in
Figure 1 which has Client and Host and several communication states. Start from the Client
performing broadcast, until the broadcast are listened by the Host. Data which is sent during the broadcast
process is Client Name, IP and Service that the Client has. After host listen the broadcast, the Host performs
checking about device duplication. If the client is already known, it will give the same IP. But if the Client is
not already known, the Host would give a new IP to the Client at Send ACK process. Send ACK process is a
process that Host replying broadcast for the Client. A client receiving data from the host and the Client turn
of broadcast process. After several processes completely performed, they will communicate which is
performed by Data Transfer.
The data transfer process is performed periodically. The delay is set for 2 seconds. While the Host
and the Client perform data transfer, both of them transfer the data to dweet.io. Parallel Process paradigm is
used in this communication method. Its process will run if the communication success, while the Client send
data to Host, at the same time the Client is also send data to a cloud server, the Host perform that process in
the same way. One of any web service that provides free cloud server is dweet.io. Data is sent to dweet.io in
JSON format. In
Figure 2 is an example of JSON data which is sent from Host to cloud server. That data contains
data status explains with “this”, “getting” and “dweets” [18] explains data transmission status between
success or not. On the data that is sent, contain “thing”, the “thing” is written by the thing names. The other is
“created”, the “created” data contains date and time which indicated the time when the data is sent by
"thing". The last structure is “content”, the “content” contains data sent or generated by "thing". The “date”
format that sent by Host is milliseconds precision.
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5342 - 5350
5344
Client Host
Cloud
Server
Broadcast :
Client Name, IP, Service
Send ACK,
Host Name, IP
Broadcast Turn Off
Broadcast Listen
Check Client Duplication
Data Transfer
Data Transfer
Host Data Process
Dweet Responses
Client Data Process
Dweet Responses
Transfer
Periodically
Figure 1. Machine to machine area network (Extended) [17]
Figure 2. Data sent from host to dweet.io
After dweet.io received the data, they will send response data to Host. Data that is sent by dweet.io
has JSON format too. The data contains “date”, the “date” represent the date and time when dweet.io sent a
response in
Figure 3. When the Host disconnect with the Client, the entire process is stopped. The host will not
send data to Client and cloud server, so does the Client. The host would be back on the broadcast process, the
client back to listen process. If client have been detected, the Host will check duplication for the Client. If
there is no duplication, Host will perform sent ACK etc. But if there is duplication client, the Host will clear
his memory, the Host will perform broadcast again. The detail of the scheme is explained in next section.
Figure 3. Dweet.io responses to host
4. Int J Elec & Comp Eng ISSN: 2088-8708
UDP Pervasive Protocol Integration with IoT for Smart Home ... (Mochammad Hannats Hanafi Ichsan)
5345
In this research, network which is used between Host and Client is connected locally. But they will
be doing communication to cloud server via internet. This research is focused to measure availability
between Host to Client, Host to dweet.io and Client to dweet.io. Between the Hosts to Client it will measure
their availability and their delay with milliseconds time precision.
3.2. Host and Client Design
This design on this section is the resulting design from previous research [9]. That design on
Figure 4 has already tested by functional testing scenario and works well. Between expected output
and the real output, it matches. But the previous research doesn’t measure the availability of host and client.
At this research the design is extended so it has some feature which is:
1. Idle: this process is turning on the Host and performs opening UDP port. After port opened, the Host
sending broadcast data.
2. Listening: at this state, the host listen is there any data returned from the client. If the data returned by
the client, it goes to Check Device Duplication state. But if the host doesn’t receive any data, it will stay
at Wait for Broadcast State.
3. Check Device Duplication: this state is checking Client. Did the Client was known before, if the Client
has not been connected to the Host, then the Host sending ACK and goes to ACK Sent state. If the
client has been known before, the Host directly goes to Control Process state.
4. Send ACK: this state performing for checking Client hardware status. The process of what services are
owned by the Client. ACK that is sent contains Host Name and Host IP.
5. Control Process: this state is when the Host performing control Client.
6. Dweet.io: this state is extending state from previous research. This state is working parallel with Control
Process State when the Host connected with the Client. If the Client disconnected from the Host then
this state stops working too.
Idle
Listen Wait For
Broadcast
Check
Device
Duplicati
on
Control
Process
Check
Appliance
Data Status ACK
Sentdweet.io
Action : Sent Processed Data
Event : Sent Real Time Data Host
Action : Sent responseAction : Display Data
Event : Device Turn On
Action : Send Broadcast
Listening Port
Event : Wait for Appliance Device Data
Action : Receive Broadcast
Event : Receive Device & Service Info
Action : Check Appliance Device Duplication
Event : Receive Device & Service Info
Action : Sent ACK Data
Event : Appliance Device
Duplication
Action : Ignore Device & Service Info
Event : Check Appliance Device
Action : Sent Alive Request
Event : Control Appliance Device
Action : Send Control Data
Event : Control Appliance Device
Action : Send Control Data
Event : No Appliance Device Data
Action : Listen Device Data
Figure 4. Host state machine diagram
One cycle of processes is performed in number 1 until 5 by the Host is the entire process that
described. Every cycle is performed to identify one Client. If there is more than one client, the other client
should wait the previous cycle is completed. The 6th
state, the dweet.io state is performed to send data that
generated by the Host. The data contains a host name, dweet status, and data that received from the client.
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5342 - 5350
5346
Broadcast
Idle
Wait for
ACK
Check
Control
Device
Event : Inform
Control Device
Action : Send
Broadcast
Listening Port
Event : Wait ACK
Action : Time Start ()
Send Device & Service Info
Event : Timer Expired
Action : Timer-Restart()
Event : Control Device Down
Action : Send Device & Service Info
Event : Check Control Device Status
Action : Sent Alive Data
Wait
Control
Message
Event : IO Control
Action : Wait Host
Sent Control
dweet.io
Event : Control Process
Action : Service Provide
Action : Sent
response
Event : Sent Response
Action : Sent dweet response
Action : Display
Client Data
Figure 5. Client state machine diagram
Figure 5 representing state machine for the Client. The Client design is an extended design from
previous research too. The Client has several states that specifically describes and already tested. The Client
state which has been designed is:
1. Idle: this state was designed when the Client turned on. In this state, the client performs preparation
process to perform broadcast data. The broadcasted data are Service Name, IP Client and Service
Number.
2. Broadcast: in this state, the Client broadcast data for 250 milliseconds. Then it will move to wait for
ACK State.
3. Wait for ACK: while the Client went to this state, the Broadcast process is turned off. If the Client
receiving an ACK, then goes to Check Control Device state. But if the Client doesn’t receive ACK after
several seconds, the Client goes back to Broadcast State.
4. Check Control Device: this state is checking the services that owned by the Client itself. If the services
ready to control, the Client sent data to the host about the Client status.
5. Wait for Control Message: in this state, the Client waiting for the Host to be controlled. If the Client has
data that is not to be controlled such as gyro meter or accelerometer, the Client directly sent data to the
Host. This state is performed when the Client communicates with the Host.
6. Dweet.io: as done by the Host, the Client will send data to dweet.io. This process is parallel with Wait
Control state. If disconnected with the Host, the Client would not send data to dweet.io as a cloud
server. Cloud server would send data status if they received data from the Client such as the Host do.
3. RESULTS AND TESTING
Implementation of the Host and the Client interface has been rebuild based on system design. There
are several changes to user interface such as time, data which is sent to cloud server, cloud server responses
etc. This section would be described the user interface that contains much information about system
development (the Host and the Client) and contains system testing. System testing would be conducted to
measure the availability of the systems between the Host, the Client and cloud server.
3.1. Result
Based on previous research and the extended methods that created in this research, interface
implementation would be explained in this chapter.
Figure 6 represent Host user interface that has feature and function based on system design. The
host has the ability to control more than one device at one time. Each feature which is owned by the Client
could pervasively control and monitored by the Host.
6. Int J Elec & Comp Eng ISSN: 2088-8708
UDP Pervasive Protocol Integration with IoT for Smart Home ... (Mochammad Hannats Hanafi Ichsan)
5347
Figure 6. The Host user interface
At this research, the feature that is owned by the Client represents by 2 LED, 1 accelerometer sensor
and 1 gyroscope sensor. If the client doesn’t have one of several sensors, the Client service would not appear
on the Host interface. To measure the availability of the Host, it provided the time that represents when data
is executed and sent from the client. To measure communication time of cloud server, it provided two text
boxes. First text box “sent to dweet.io” is data that sent by the Host to cloud server which contains the Host
time. “Dweet.io Response” is responses from cloud sensor that contain time when data is sent by cloud
server. Accelerometer and gyroscope sensor is represented by waveform chart that generated by the Client.
At the Host, the process of sending data was done in the parallel process while sending data to the
Client and Dweet.io.
Figure 7 is Client user interface that has feature and function based on system design and is
extended from previous research. The Client provided services that could monitor and controlled by the Host
and could receive a message from the Host. At this research, the client has 2 LED, 1 generated XYZ signal
for each gyroscope and accelerometer sensors. Such as the Host, the Client has “sent to dweet.io” feature that
indicates the Client could communicate with a cloud server. The message which is sent to cloud server are
same with the message that sent to the Host that works parallels too. Then “Dweet.io response” is a function
that sent by cloud server to the Client. So it can measure communication time between the Clients with a
cloud server. “Halo Host exec” is used to display message from the host, it contains time that is sent by the
Host that used to measure communication delay. So it can measure availability between the Host – the Client,
the Host – cloud server and the Client – cloud server.
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5342 - 5350
5348
Figure 7. The Client user interface
3.2. Testing
This research conducted by two experiment scenario that all testing scenario ignore network
condition. The first experiment scenario conducted by the Client sent to each Host and Cloud server. A data
transfer that are measured is 15 (fifteen) times and each data conducted by different data sizes. Based on first
experiment scenario, the average amount of data sent by the Client is 436.47 bytes, the biggest data is 453
bytes and the smallest data that is produced by the client is 421 bytes. The data that sent to the Host has an
average delay 14.33 milliseconds which has maximum time 17 milliseconds and the smallest time that
received by the host is 11 milliseconds. The data that is sent to Cloud Server is 1.093 second which the
maximum time is 1.336 second and the smallest time that receives by Cloud server is 0.785 second that could
be seen at Table 1.
The second testing scenario is conducted by the Host sent data to each Client and Cloud Server, data
transfer that is measured are 15 (fifteen) times and each data conducted by different data sizes. The data that
produced by the Host have an average 270.93 bytes with the biggest data size is 173 bytes and the smallest
data size is 268 bytes
Table 1. Client Sent data to Host and to Cloud Server
No
Client to Host Cloud Server
Data Size (bytes) Delay (Milliseconds) Delay (Second)
1 440 12 0.785
2 438 14 1.209
3 436 13 1.199
4 435 12 1.206
5 453 17 1.106
6 440 16 1.186
7 452 11 0.816
8 447 15 1.054
9 440 14 1.186
10 431 13 1.181
11 433 15 1.193
8. Int J Elec & Comp Eng ISSN: 2088-8708
UDP Pervasive Protocol Integration with IoT for Smart Home ... (Mochammad Hannats Hanafi Ichsan)
5349
No
Client to Host Cloud Server
Data Size (bytes) Delay (Milliseconds) Delay (Second)
12 430 15 1.229
13 427 15 1.264
14 424 16 1.301
15 421 17 1.336
Average 436.47 14.33 1.093
The data that received by the Client have an average delay is 64.6 milliseconds with the biggest
delay is 81 second and the smallest delay is 49 milliseconds. The data that received by Cloud server has a
delay too with average 0.869 seconds, the biggest delay is 0.881 second and the smallest delay is 0.84 second
that could see in Table 2.
Table 2. Host Sent Data to The Client and Cloud Server
No
Host to Client Cloud Server
Data Size (bytes) Delay (Milliseconds) Delay (Second)
1 270 63 0.852
2 269 49 0.949
3 269 51 0.861
4 271 56 0.863
5 270 59 0.881
6 269 61 0.868
7 268 55 0.935
8 271 65 0.829
9 274 60 0.872
10 269 72 0.874
11 272 70 0.861
12 272 73 0.855
13 273 76 0.85
14 273 78 0.845
15 274 81 0.84
Average 270.93 64.6 0.869
4. CONCLUSION AND FUTURE WORK
This research is successfully developed UDP Pervasive service and discovery protocol using
LabVIEW. This research was conducted by one Host and one Client, each of them could communicate
pervasively. When the Host and the Client communicate, each of them has parallel communication with the
Cloud Server. The experience scenario conducted to measure availability between Host, Client and Cloud
Server that ignore the network condition. Between two testing scenario it can be seen that the delay in data
transmission between the Host to the Client (average delay 14.33 millisecond) bigger that the Client to the
Host (average 64.6 millisecond) even though the data that sent is smaller. Average data size that sent by
client is 436 bytes and average data size that the Host sent 270.93 bytes. This is due to when the Host sent
data to the Client, the Client would accomplish his task first then receiving data from the Host. The state
machine design take effect on the delay that resulting from the Client and the Host.
The Client sent data to Host, the data contains data sensor which simulated by gyroscope sensor,
accelerometer sensor and LED. The Host sent data to Host contains it too which simulated by LED. Each
experiment scenario is successfully sent each service that sent to Cloud Server too. Cloud Server just stored
data that sent them. This research could continue with bigger and ubiquitous environment. The pervasive
discovery protocol using UDP could be implemented in several embedded device such as Arduino, raspberry
or MyRIO. The embedded device could represent household equipment that could be installed such as smart
device. So the user would not cause to be experienced with the existence of smart device
at daily household equipment.
ACKNOWLEDGEMENTS
The team thanks to the Computer System and Robotics Laboratory, Computer Engineering
Department, Faculty of Computer Science, Brawijaya University. This paper is an extension of work
originally published and reported in “IAES 2016: International Conference on Electrical Engineering,
Computer Science and Informatics (EECSI 2016)” at Semarang, East Java, Indonesia 22-25 November 2016,
with the title “Lightweight UDP Pervasive Protocol in Smart Home Environment based on LabVIEW”.
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 6, December 2018 : 5342 - 5350
5350
REFERENCES
[1] S.R. Akbar, W. Kurniawan, M.H.H. Ichsan, I. Arwani, M.T. Handono, "Pervasive Device and Service Discovery
Protocol In XBee Sensor Network," in ICACSIS, Malang, Indonesia, 2016.
[2] J. Froehlich, L. Findlater and J. Landay, "The Design of Eco-Feedback Technologu," in Proceedings of the SIGCHI
Conference on Human Factors in Computing Systems, Atlanta, Georgia, USA, 2010.
[3] P. Dourish and G. Bell, Divining A Digital Future - Mess and Mythology in Ubiquitous Computing, London,
England: The MIT Press, 2011.
[4] L. Atzori, A. Iera and G. Morabito, ""The Internet of Things: A survey"," Elsevier Computer Networks, pp. 2787-
2805, 2010.
[5] O. Vermesan and P. Friess, Internet of Things - Global Technological and Societal Trends, Aalborg, Denmark:
River Publisher, 2011.
[6] J. Ma, T.L. Yang, B.O. Apduhan, R. Huang, L. Barolli and M. Takizawa, "Towards a Smart World and Ubiquitous
Intelligence: A Walkthrough from Smart Things to Smart Hyperspaces and UbicKids," International Journal of
Pervasive Computing and Communications, vol. 1, no. 1, pp. 53-68, 2005.
[7] C. Aggarwal, N. Ashish and A. Sheth, The Internet of Things: A Survey from The Data-Centric Perspective, Book
Chapter in "Managing and Mining Sensor Data", Springer, 2013.
[8] G. Tripathi, D. Singh and K. K. Loo, "EOI: Entity of Interest Based Network Fusion for Future Services," in ICHIT
2011: Convergence and Hybrid Information Technology, 2011.
[9] W. Kurniawan, M.H.H. Ichsan, S. R. Akbar and I. Arwani, "Lightweight UDP Pervasive Protocol in Smart Home
Environment Based on Labview," in IAES International Conference on Electrical Engineering, Computer Science
and Informatics, Semarang, Indonesia, 2016.
[10] A. Ford, C. Raiciu, M. Handley and O. Bonaventure, TCP Extensions for Multipath Operation with Multiple
Addresses, RFC 6824, 2013.
[11] F.J. Jimenez and D.J. Frutos, "Virtual Instrument for Measurement, Processing Data, and Visualization of Vibration
Patterns of Piezoelectric Devices," Elsevier, vol. 27, no. 6, pp. 653-663, 2005.
[12] M.H.H Ichsan, W. Kurniawan and M. Huda, "Water Quality Monitoring with Fuzzy Logic Control Based on
Graphical Programming," TELKOMNIKA, vol. 14, no. 4, p. 1446~1453, 2016.
[13] L. Vanfretti, V. H. Aarstrand, M. S. Almas, V. S. Perić and J. O. Gjerde, "A software development toolkit for real-
time synchrophasor applications," in IEEE Grenoble Conference, Grenoble, 2013.
[14] K. Fysarakis and S. Ntamapiras, "Hardware implementation of a system classifying the optoacoustic signature of
insect wing flap," in Conference: 22nd International Congress on Sound and Vibration (ICSV22), Florence, Italy,
2015.
[15] A. Halldorsson, "IIoT data collection for OEE measurements," Reykjavík University Library, 2016.
[16] W. Kurniawan, M.H.H. Ichsan and S. R. Akbar, "UDP Pervasive Protocol Implementation for Smart Home
Environment on MyRIO using LabVIEW," International Journal of Electrical and Computer Engineering (IJECE),
vol. 8, no. 1, pp. 113-123, 2018.
[17] e. a. J. Holler, "From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence," in
Elsevier, Waltham, MA, 2014.
[18] I. Bug Labs, "dweet.io," 2017. [Online]. Available: http://dweet.io/. [Accessed 1 11 2017].