Real Time Data Acquisition and Home Parameters Monitoring using LabVIEW
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
Home automation refers to a system that is used to control devices around the home. These devices can include doors, lights, surveillance systems, and consumer electronics. A smart home automation system has been developed to automatically achieve some activities performed frequently in daily life to obtain more comfortable and easier life environment. A sample house environment monitor and control system that is one branch of the Smart home is addressed in this paper. The system is based on the LabVIEW software and can act as a security guard of the home. The approach combines hardware and software technologies.
Authors and Affiliations
Mr. Rajesh R. Karhe , Mr. C. S. Patil , Mr. Mahesh S. Patil
Frequent Itemset Mining Technique in Data Mining
In computer science and data mining, Apriori is a classic algorithm for learning association rules. Apriori is designed to operate on databases containing transactions (for example, collections of items bought by c...
Accurate Spam Mail Detection using Bayesian Algorithm
— With the increasing popularity of a E-mail users, E-mail spam problem growing proportionally. Spam filtering with near duplicate matching scheme is widely discussed in recent years. It is based on a known spam...
SMART CARD BASED TOLL GATE AUTOMATED SYSTEM
: Smart cards are secure tokens that can provide security services to a wide range of applications. Along with other technology advances, smart card technology has changed dramatically as well. However, its communicati...
A BRIEF SURVEY ON THE CONCEPTS OF AGENT AND ARTIFICIAL IMMUNE SYSTEMS
Agents are probably the fastest growing area Information Technology. As agents has ability to migrate to any system, perform the tasks and return the results. The field of software agents is a broad and rapidly dev...
Charismatic of Malware diffusion in distributed peer-to-peer networks
in this paper, we articulate a reasoned sculpt to portray the diffusion of malware in distributed, Gnutella sort peer-to-peer networks and learning the charismatic allied with widen of malware. Using a segmented sculpts,...