Monitoring the efficiency of workflow in industry and secure access using NFC and Ethernet
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 3
Abstract
Mobile phones have evolved from their usual function of calling to a lot more in the last decade, the 4G networks are being used for microwave access, But the use of mobile in field of Tele-monitoring is still a open issue. In this paper we propose a system which uses NFC(Near Field Communication) in mobile phones for monitoring various machine related details such as current, voltage, vibration, inter dislocation, etc..
Authors and Affiliations
M. RAJESH, C. Saktheeswaran, S. Selva Ganesh
Design of Automatic Automobile using CAN Bus
CAN is a serial bus protocol to connect individual systems and sensors as an alternative to conventional multi-wire looms. It allows automotive components to communicate on a single or dual-wire networked data bus up...
Load balancing and a Gossip protocol for dynamic resource allocation in cloud Environment
The new emerging cloud computing technology is providing various services to users and organizations. Now we are focusing on Infrastructure as a service which allows customers to use resource multiplexing through vir...
Distributed Hash Table (DHT) Based Clone Detection In WSN’s
Distributed Hash Table (DHT) by which a completely decentralized, key-based caching and checking system is created to catch cloned nodes efficiently. The protocol arrangement on competent storage utilization and emin...
Semi-Autonomous Mobile Hexapod Unmanned Ground Robot With Camera based Navigation For Military Reconnaissance And Ethological Research (SAMHUGR)
Conventionally reconnaissance vehicles used in military application have a wheel based design. Such wheel based robots have a major disadvantage of being unadaptive to rough terrain. These robots do not have the capac...
Invalid Detachment centered Outlier Recognition acquired from Reverse Nearest Neighbors
Data Mining essentially alludes to the extraction of exceptionally fascinating examples of the Data from the gigantic Data sets. Anomaly recognition is one of the imperative parts of Data mining which really discover...