Javascript must be enabled to continue!
ANDROID BASED SECURITY AND REMOTE SURVEILANCE SYSTEM
View through CrossRef
Mobile phones have been important Electronic devices in our life. Consequently, Home automation and security system becomes one of the prominent futures on mobile devices. In this paper, we have developed the android application that interfaces with the security system using wifi direct technology. The wifi technology is relatively new as compared to other technologies and there is huge potential of its growth and practical application. The android application loaded on mobile devices, can connect with security system and easy to use GUI. The application developed to command lock, unlock or video monitoring of the home. The security system then acts on these command and responds to the user. The CMOS camera and the motion detector are attached with security system for remote surveillance.
Institute for Project Management Pvt. Ltd
Title: ANDROID BASED SECURITY AND REMOTE SURVEILANCE SYSTEM
Description:
Mobile phones have been important Electronic devices in our life.
Consequently, Home automation and security system becomes one of the prominent futures on mobile devices.
In this paper, we have developed the android application that interfaces with the security system using wifi direct technology.
The wifi technology is relatively new as compared to other technologies and there is huge potential of its growth and practical application.
The android application loaded on mobile devices, can connect with security system and easy to use GUI.
The application developed to command lock, unlock or video monitoring of the home.
The security system then acts on these command and responds to the user.
The CMOS camera and the motion detector are attached with security system for remote surveillance.
Related Results
E-College : an aid for E-Learning systems
E-College : an aid for E-Learning systems
The use of Android apps has significantly increased over the past few years, making android the most accepted and trusted operating system for smart devices. According to a survey,...
EKMPRFG: Ensemble of KNN, Multilayer Perceptron and Random Forest using Grading for Android Malware Classification
EKMPRFG: Ensemble of KNN, Multilayer Perceptron and Random Forest using Grading for Android Malware Classification
Android is the most popular Operating Systems with over 2.5 billion devices across the globe. The popularity of this OS has unfortunately made the devices and the services they ena...
Environmental Monitoring System by Using Unmanned Aerial Vehicle
Environmental Monitoring System by Using Unmanned Aerial Vehicle
This paper presents a reliable and low cost environmental monitoring system. The system uses an Unmanned Ariel Vehicle (UAV) equipped with a set of sensors, microcontroller, wirele...
Russian Bases Abroad: Security Policy or Power Projection?
Russian Bases Abroad: Security Policy or Power Projection?
After the collapse of the bipolar system, the Soviet Union, and then its heir, the Russian Federation, lost its position as a global player in favour of US hegemony. The arms race ...
LIVELIHOOD SECURITY OF SCHEDULED CASTE FARMERS THROUGH INTEGRATED FARMING SYSTEM
LIVELIHOOD SECURITY OF SCHEDULED CASTE FARMERS THROUGH INTEGRATED FARMING SYSTEM
The study was conducted in purposively selected Chickballapura district, a total sample of 271 respondents was purposively selected for the study. Data was collected by using struc...
SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN
SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN
Block chain being a foundational technology impacting and attracting a wide range of applications has become predominant in solving the problem of privacy preserving and security i...
Alamut: a highâperformance network intrusion detection system in support of virtualized environments
Alamut: a highâperformance network intrusion detection system in support of virtualized environments
ABSTRACTOne of the benefits of virtualization technology is the provision of secure and isolated computing environments on a single physical machine. However, the use of virtual ma...
Improving ICS security through Honeynets and Machine Learning techniques
Improving ICS security through Honeynets and Machine Learning techniques
Abstract
Abstract The internet of things(IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) can be seen everywhere, Home applications, Buildin...