The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper is aimed at researching the subject area, models and prototypes of secure mobile communication mesh networks providing support and operational management in critical emergency situations. Such a network represents a command technical complex that provides services of text messages and media data transfer, database services, web services, etc. A two-layer network architecture using Arduino...
The current automobile industry aims at using wireless communication to enable intelligence for creating next generation automobiles. The industries are intending to build intelligent transport system a real-time communication system to transmit and receive instant information from a current vehicle and its surrounding. In this direction, the proposed work is to implement Zigbee, an IEEE 802.15.4...
The application of the Internet of things(IoT) speeds up the realization of intelligent home security. In this paper, solution of Home security based on ARM and ZigBee is proposed. Using S3C2440 as the central controller, GPRS MC39i constitute SMS sending terminal, as well as CC2430 forms the ZigBee network module. By real-time monitoring to multiple sensors through ZigBee, when any one of the sensor's...
M2M is an approach where devices such as sensors and actuators connected with each other or with a computer system for data analysis for producing immediate action. This approach is gaining popularity among consumers and service providers to improve the lives of people. Among the most popular M2M vertical applications today is the Smart Home application. This application was built by several key components...
This paper outlines the development of a remote monitoring system for deadlocks; in the aim of improving peace of mind, and adding an extra layer of security at a low cost. The literature research covers the flaws and commonalities of door security, explores different wireless protocols, passive sensors, and microcontroller to internet interface strategies. The development then goes through the mechanical,...
Technology is quickly changing the way we interact with the world around us. We are moving towards new networking paradigm which is Internet of Things (IoT), where number of interconnected sensors or smart objects deployed around the world keeps generating data and transmit over the internet to achieve greater value and services. IoT organizations are trying to create new smart devices which are efficient...
This research is basically on an electronic device which can be used at the time of emergency while driving a vehicle. It has embedded the concept of wireless communication i.e. Zigbee and GSM and many other sensors by the help of which immediate help can be delivered to the person who has met with an accident. The overall structure is based on the AT89S52 microcontroller. Also the key role of DTMF...
In this paper, the design and development of an effective secured framework for transmission of heterogeneous wireless sensor network data related to Internet of Things is presented. The description about the integrated multimedia applications network design and the secured mechanisms for reliable data transmission of smart sensors data is illustrated. Mechanisms for multimedia aware traffic analysis...
An implementation scheme for security system in intelligent residential district is presented in this paper. The security system is composed of home security subsystem, access control system and residential security control network. Hardware and software architecture of the home subsystem and design of the control network are introduced in detail. Problems of wired networks are solved due to the application...
As the society has been computerized and automated, the crime for the ATM device is increased due to the wide distribution of ATM device, even the banking is easy. The theft is shown over 90%, the very high proportion among the Financial accident and crime. With the locational characteristics of external ATM equipment that is always exposed to the crime, its accident even the theft to steal the ATM...
The number of wearable wireless sensors is expected to grow to 400 million by the year 2014, while the number of operational mobile subscribers has already passed the 5.2 billion mark in 2011. This growth results in an increasing number of mobile applications including: Machine-to-Machine (M2M) communications, Electronic-Health (eHealth), and Mobile-Health (mHealth). A number of emerging mobile applications...
Location Fingerprinting methods are an alternative to accurate localization of mobile sensors and actuators in indoor environments, which learn a radio map for a given scenario and use this information for recognizing the position of a given node at a particular moment. In fact, when using other conventional methods in complex scenarios that may present irregular geometries and materials, fingerprinting...
Nowadays, Wireless Monitoring for home security is among the cutting-edge researches in the field of International Intelligent Building. To implement real-time surveillance of the home security, the intelligent remote monitoring system was developed for home security based on ZigBee technology and GSM / GPRS network. The system can send abnormal images and warning messages through MMS and SMS, receive...
In this paper the need of sensors other than analog and digital cameras in a CCTV environment are discussed as well as the advantages these security relevant sensors can offer. After evaluating various use cases the currently available technologies in this area will be analyzed including Bluetooth, Zigbee and Wireless USB. The main focus will be placed on the security aspects, the behavior in case...
In this paper, we present a design approach and implementation result of home control devices for standby power reduction. The proposed mechanism uses the IEEE 802.15.4 based ZigBee protocol between Host and Agent for communication and security. Experimental results demonstrate that in the proposed mechanism, standby power consumption by Agent (consumer device) can be reduced by 200 mW.
Wireless sensor networks consist of a large number sensors spread across a given geographical area. Each sensor has its own communication capability as well as certain level of intelligence for signal processing and networking. As the sensor nodes are densely populated, communication range requirement for these nodes is smaller. After signal detection, a number of sensor nodes communicate over the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.