Control System for Manipulation of Services in Ubiquitous Environment
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 2
Abstract
Abstract: The ubiquitous computing are to guide a the creation of intelligent space, where of users already not interaction with a only the computation system but on with different computer system at a time and not necessarily a user is aware of this interaction. Recent research describes computer systems where the user accesses the services of a ubiquitous environment through mobile devices. The problem with these systems is the lack of full control over physical objects (e.g. doors, windows, heating systems, etc). In this paper, we propose the incorporation of a control system that allows manipulation of physical objects in ubiquitous environments by developing a c o m m u n i c a t i o n protocol based on the standard USB 2.0
Authors and Affiliations
Mario I. García Antonio
An Hybrid Learning Approach using Particle Intelligence Dynamics and Bacterial Foraging Behavior for Optimized PID Parameters Evolutionary Computation of Control System Transfer Functions
The foraging behavior of E. Coli is used for optimization problems. This paper is based on a hybrid method that combines particle swarm optimization and bacterial foraging (BF) algorithm for solution of optimiz...
Performance analysis of Hybrid Transform, Hybrid Wavelet and Multi-Resolution Hybrid Wavelet for Image Data Compression
Compression of digital images play vital role in transmission of multimedia data. This paper presents application of hybrid wavelet transform in image compression. Multi-resolution property of Wavelet transform hel...
Design and Implementation of Multiplier Using Kcm and Vedic Mathematics by Using Reversible Adder
This work is devoted for the design and FPGA implementation of a 16bit Arithmetic module, which uses Vedic Mathematics algorithms. For arithmetic multiplication various Vedic multiplication techniques like Urdhva...
A study on the application of Elliptic - Curve cryptography in ¥implementing smart cards
Elliptic curve cryptography is one of the emerging techniques that stand as an alternative for conventional public key cryptography. Elliptic curve cryptography has several applications of which smart cards are als...
A Graphical Password Scheme using Persuasive Cued Click Points
Despite the ubiquity of password systems, knowledge-based authentication mechanism remains an important and active research area. Many current systems have low level security, and even then users often devise insec...