scispace - formally typeset
Search or ask a question

Answers from top 8 papers

More filters
Papers (8)Insight
Therefore, this system can enhance security and safety for home assets.
Results show a good and convenient security system suitably for home and offices.
Proceedings ArticleDOI
01 Dec 2013
12 Citations
The system proposed in this paper is a better security system in terms of number of level of security.
Proceedings ArticleDOI
24 Sep 2012
9 Citations
Therefore, our system will be able to improve the above-mentioned deficiencies and strengthen the work of the home security.
The contribution of this research is that we demonstrated it is possible to build an affordable home security system with existing devices and technologies.
From this analysis, we can infer that the cases of having kids and aged person at home or location of home contribute significantly to the need of advanced home security system.
Our study informs the design of future smart-home network-level security solutions.
This research is significant and benefits for recent technology on home security system which suitable for small or large covered areas.

See what other people are reading

How does the layered architecture of Android applications improve scalability and maintainability?
4 answers
The layered architecture of Android applications, as proposed in various research papers, enhances scalability and maintainability through several key mechanisms. Firstly, the Abstraction Layered Architecture (ALA) facilitates improved software modularity, reducing computational overhead and enhancing maintainability. ALA allows for the management of hypotheses at different abstraction levels, aiding in the development of maintainable code bases. Additionally, the ALA-based development method has shown a significant reduction in maintenance costs over time, further emphasizing its benefits for scalability and maintainability. Moreover, the use of convolutional neural networks and evolutionary algorithms in Android application maintenance evaluation helps overcome class imbalance issues, leading to better prediction of maintainability and ultimately contributing to scalability and maintainability improvements.
What impact does the use of technology, such as evaluation apps, have on bystander behavior during an incident?
4 answers
The use of technology, such as evaluation apps, can have varying impacts on bystander behavior during an incident. Research suggests that safety apps, like campus safety apps, do not impede bystander intervention in campus sexual assault incidents. Additionally, the design of a CPR procedure guide in the form of an Android application aims to assist bystanders in providing consistent and high-quality CPR to cardiac arrest victims, potentially impacting the success of saving lives. Moreover, studies on bystander intervention in violent emergencies indicate that the affiliation of bystanders with the participants can influence helping behavior, with in-group bystanders potentially decreasing the likelihood of intervention. Effective risk communication and crisis communication through technology can also improve the quality of actual helping behavior by bystanders after witnessing an accident.
What are different deep learning techniques used for iot device identification till now?
5 answers
Various deep learning techniques have been employed for IoT device identification. One approach involves using device fingerprinting and deep learning models like convolutional neural networks (CNN) and CNN + LSTM. Another method utilizes directional packet length sequences in network flows along with a deep CNN for device identification, achieving high accuracy and effectiveness. Additionally, deep learning algorithms have shown promise in identifying and classifying network attack patterns in IoT devices, highlighting their potential in enhancing security frameworks. Furthermore, a study focused on identifying devices in the Aalto dataset using CNN, emphasizing the importance of IoT device identification in mitigating security vulnerabilities.
What is the last trends in intrusion detection?
5 answers
The latest trends in intrusion detection focus on leveraging machine learning and deep learning techniques to enhance security measures. These advancements aim to address the increasing sophistication of cyber attacks and the evolving threat landscape in modern information systems. Researchers are exploring new datasets and methodologies to improve the performance of intrusion detection systems, with a particular emphasis on machine learning algorithms like Support Vector Machine (SVM), Neural Network (NN), and Decision Tree (DT) for accurate intrusion detection. Additionally, there is a growing interest in developing IDS solutions tailored for emerging technologies such as the Internet of Things (IoT) and smartphone devices to ensure the security of modern networks and communication channels. The future direction involves further enhancing classifier methods through ensembling techniques to boost accuracy in detecting intrusions.
What are different deep learning techniques used for iot device identification till now?
5 answers
Various deep learning techniques have been employed for IoT device identification. One approach involves using device fingerprinting and deep learning models like convolutional neural networks (CNN) and CNN + LSTM. This method analyzes packet inter-arrival time (IAT) and round trip time (RTT) outliers to generate device fingerprints, achieving high accuracy. Another method focuses on directional packet length sequences in network flows, utilizing a deep convolutional neural network to construct device fingerprints and achieve over 99% accuracy in device recognition. Additionally, deep learning algorithms have shown promise in identifying and classifying network attack patterns in IoT devices, highlighting their potential in enhancing security frameworks. Furthermore, a CNN-based IoT device recognition method utilizes ResNet50 to extract icon feature vectors for accurate device type identification, demonstrating high accuracy rates.
How qr code ordering benefits QSRs?
4 answers
QR code ordering benefits Quick Service Restaurants (QSRs) by enhancing efficiency, reducing labor costs, improving order accuracy, and increasing customer satisfaction. By allowing customers to directly place orders using QR codes displayed on tables or mobile devices, QSRs streamline the ordering process. This technology eliminates the need for customers to wait for staff assistance, leading to quicker service and reduced order times. Additionally, QR code ordering systems can minimize errors in the ordering and payment processes, ultimately enhancing operational efficiency and customer experience. Overall, the implementation of QR code ordering systems in QSRs significantly contributes to a more seamless and satisfying dining experience for customers while optimizing operational processes for the restaurant.
What are the advantage of AI robot in food service?
5 answers
AI robots in food service offer numerous advantages. They enhance the customer experience by improving the restaurant's atmosphere, food quality, and service quality, ultimately shaping a unique dining experience. AI technology helps in creating tailored menus based on customer preferences, streamlining processes, and boosting customer satisfaction. Additionally, AI service robots increase customer engagement and acceptance through automation, personalization, efficiency, and precision, with robot anthropomorphism playing a moderating role in these relationships. Moreover, in scenarios like college canteens, autonomous food serving robots aid in maintaining social distance, reducing long lines, and minimizing food service delays, benefiting both customers and administrators while being cost-effective compared to human waitstaff.
What does tracking expense do in a small business?
4 answers
Tracking expenses in a small business plays a crucial role in managing financial activities efficiently. It allows for the monitoring of daily expenditures, income sources, and the overall financial health of the business. By utilizing expense tracking systems, businesses can eliminate manual tasks, maintain accurate records, and visualize income and expenditure patterns through charts and graphs. Moreover, expense tracking can aid in setting monthly expense limits, generating alerts for exceeding limits, and providing comprehensive reports at the end of each month. Additionally, in the context of a payroll system, tracking expenses can help determine pre-tax eligibility for expenditures and adjust tax withholding accordingly. Overall, tracking expenses in a small business facilitates better financial decision-making, budget planning, and tax compliance.
What is Daily Attendance?
4 answers
Daily attendance refers to the act of students being present in class on a day-to-day basis. Research indicates that mandatory daily attendance in postgraduate studies may not always yield positive outcomes. Studies have shown that mandatory attendance can decrease student interest and efficiency, leading to lower grades and a lack of participation in innovative activities. On the other hand, mobile applications have been developed to streamline attendance tracking, sending notifications to parents for absent students and generating attendance reports for teachers. Additionally, forecasting tools have been used in emergency departments to predict patient attendances based on various factors like air quality and public holidays, aiding in resource planning and staff rostering. The stability and patterns of daily attendance over time in high schools have also been studied, highlighting the importance of understanding the dynamics underlying attendance rates.
How gps implemented in mobile application for taxi and bus?
5 answers
GPS is integrated into mobile applications for taxis and buses to provide real-time tracking and location services. By utilizing GPS technology along with GSM/GPRS and Google Map API, these applications can display the current position of vehicles on a map, allowing users to track them in real-time. Additionally, a method involving GPS data acquisition and processing is used to discern the running status of buses, categorizing it into smooth, amble, or crowded based on real-time speed data. In the case of traffic monitoring, GPS data from city buses is employed to predict traffic conditions using a Fuzzy Logic Algorithm, offering automatic updates to users without requiring manual input or additional installations. Furthermore, a taxi GPS-based method plans bus paths by clustering pick/drop records and optimizing station locations for efficient airport bus services.
What are the INTERNET OF THINGS (IOT) that apply to use for smart city?
5 answers
The Internet of Things (IoT) technologies applied in smart cities encompass a network of physical devices capable of data collection and sharing. These technologies facilitate real-time monitoring, analysis, and optimization of city services, enhancing public safety and sustainability. IoT in smart cities involves planning, design, installation, data analysis, and maintenance to ensure success. The development of IoT includes smart sensors, communication channels, and protocols for data exchange, enabling communication between central hubs and distributed modules controlling various functions in the city. By leveraging IoT, smart cities can address urban challenges, improve quality of life, and provide efficient automated services to residents. Efforts in research and innovation are crucial to address challenges like data security and privacy for the continued success of IoT in smart cities.