|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
September 2015 | Vol. 79 No.2 |
Title: |
TOWARDS SECURE CLOUD COMPUTING USING DIGITAL SIGNATURE |
Author: |
C. MERLIN PAULIESTHER, DR.J.VISUMATHI |
Abstract: |
Cloud Computing is a new flair of computing in which real time scaling and
virtualized resources are provided as services over the internet. The services
provided by Cloud Computing can be grouped into three categories: software as a
service, platform as a service, infrastructure as a service. Cloud technologies
can help to reduce cost, reduce management responsibilities, increase agility
and efficiency of organizations. There are various security issues for Cloud
Computing as it comprises many technologies including networks, databases,
operating systems, virtualization, resource scheduling, Transaction management,
load balancing, concurrency control and memory management. Providing Data
security is the crucial challenge in Cloud Computing . The Data security in
Cloud Computing includes six aspects: Data-in-transit, Data–at-rest, Processing
of Data, Data Lineage, Data Provenance, Data Remanence. Even though Many
standards and solutions are developed by groups like The Cloud Security Alliance
(CSA), and Open Web Application Security Project (OWASP), still there are Many
challenges in Cloud Computing security. An architectural model is discussed to
mitigate the data threats by enhancing key management system which aims to
provide guaranteed computing dynamic environments for end-users. |
Keywords: |
VM Template, Key Management System, MultiCloud |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
ADAPTATION AND APPLICATION OF PROJECT MANAGEMENT ACCORDING TO THE PMBOK TO A SET
OF IT PROJECTS IN A PUBLIC BODY |
Author: |
SAFAA ERRIHANI, SAID ELFEZAZI, KHALID BENHIDA |
Abstract: |
Project management provides a permanent advantage in the dynamic context of
current organizations. It has evolved into a key role for the success of any
project. Besides the PMI (Project Management Institute) already offers several
versions of its guide: Project Management Body Of Knowledge PMBOK. Thus, this
guide is fast becoming an indispensable tool for practitioners in all
organizations and sectors.The main focus of the article is reserved for
analyzing and modeling the PMBOK in order to reach a uniform model of project
management. The obtained model will be projected on a set of projects within a
Moroccan public department. Let's recall that the PMBoK defines the project
management in terms of: integration, scope, time, cost, quality, human
resources, communication, risk, procurement and the stakeholders of the project.
We are also interested in the context of this work to the study of the
application of all these knowledge areas in a real project of customer
complaints management application. |
Keywords: |
IT project, Modeling, Project Management, PMBOK. |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
DEVELOPMENT OF TRUSTED OPERATING SYSTEM FOR MOBILE DEVICES |
Author: |
D.M. MIKHAYLOV, M.I. FROIMSON, A.V. ZUYKOV, A.S. SMIRNOV, A.V. STARIKOVSKIY, I.A.
OVCHINNIKOV, R.O. ROSLAVTSEV, D.A.ANDRYAKOV |
Abstract: |
The number of mobile devices used daily all around the world is growing every
day. Mobile devices have become “smart” and, thus, suffer intrusion attempts.
Although different antivirus software is being developed, it does not provide
overall security. That is why trusted operating systems appear. Trusted (or
secure) operating systems for computers exist and are widely spread. However,
there is none for mobile devices. This paper is devoted to the development of a
trusted operating system for mobile devices. Authors highlight the differences
in security issues of ordinary computers and mobile devices and discuss intruder
models used in PC operating systems (OS) and in mobile OS. Generation and
analysis of requirements to a secure mobile OS and secure mobile OS architecture
are provided. Authors also tell about general scheme of the mobile device’s
access to the Internet and provide suggestions to improve current security
policy. |
Keywords: |
Android, secure operating system, trusted operating system for mobile devices. |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
PERFORMANCE ANALYSIS OF SEAMLESS VERTICAL HANDOVER IN 4G NETWORKS |
Author: |
IZZELDIN I. MOHAMED, 2AMRAN A. HADI, MD R. OTHMAN, A. OUDAH |
Abstract: |
The current extraordinary growth of wireless technology promises an even greater
effect on how people communicate, interact and enjoy their entertainment. The
growing advances in research and development of wireless communication
technologies and the increasing capabilities of electronic devices are driving
an evolution towards ubiquitous services to mobile users. Wireless networks
become increasingly interoperable with each other and with the high-speed wired
networks. This reflects a paradigm shift towards new generations of mobile
networks where seamless mobility across heterogeneous networks becomes
fundamental. This generation is referred to as fourth generation (4G). 4G
wireless networks is envisioned as a convergence of different wireless access
technologies providing the user with the best anywhere, anytime connection and
improving the system resource utilization. With the advent of new value-added
services (video-conference, multimedia streaming, etc.) and novel concepts
introduced into Long Term Evolution (LTE) architecture of the 4th Generation
(4G) networks, provisioning efficient mobility management with quality of
service guarantees and seamless handoff feature become even more important for
next-generation wireless network design. Vertical handover, a term used to
indicate the handover between two access nodes of two different technologies, is
an issue in heterogeneous networks since each technology has its own mobility
management solution. Generally, multimedia applications, one of main services in
4G networks, require a short handover latency, low jitter and minimal packet
loss. Handover is required to be achieved seamlessly to enable the users want to
have a continuous and qualified service regardless of which access technology
they have connected. The aim of this work is to present research outcomes
including an analysis of UMTS/WLAN integration and the performance of common
applications. The work included the development of a model and simulation
environment that could be used to gain results suitable for analysis. Specific
attention was paid to design tight coupling and loose coupling architectures as
this work direction taken was to identify an architecture that can provide
better overall performance and flexible interworking. Our results show that
tight and loose coupling have advantages depending on the application. For video
conference loose coupling provides lower jitter and end to end delay. Tight
coupling was found to provide a lower response time for an http page
application. Tight coupling was also provides a lower response time for ftp file
uploads however to download ftp files loose coupling provides a lower response
time. |
Keywords: |
4G Network, Vertical, Handover, Wireless, Seamless |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
PRIVATE SEARCHING KEYWORD FREQUENCY USING HOMOMORPHIC ENCRYPTION |
Author: |
N. ANUSHA, M. SUGANYA |
Abstract: |
With the rapid growth of internet technologies, the web has become the world's
largest repository of knowledge. So, it is challenging task of the webmasters to
organize the contents of the particular websites to gather the needs of the
users. Optimised search engine is used for effectively searching keyword queries
which are frequently visited by the user based on their interest. The most
frequently used keyword queries are encrypted using homomorphic encryption which
are semantically secured through searching mechanism. This paper presents a new
framework for a semantic-enhanced Web Page Recommendation (WPR), and a suite of
enabling techniques which include semantic network models of domain knowledge
and Web usage knowledge, querying techniques, and Web-page recommendation
strategies.Time based ranking technique is used to calculate the time taken by
each user for visiting the recommended web-pages and also to keep record of the
number of users. The privacy of the user is thus enhanced by using the clustered
web-pages on the search engine. The proposed technique also provides a set of
clustered web-pages which are effectively filtered through private searching
keyword query and also provides better web-page features in order to satisfy the
user’s requirements. |
Keywords: |
Semantic network, Web-Page Recommendation(WPR), Domain knowledge, knowledge
representation, Web usage mining, Homomorphic encryption |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
DESIGN A SQUARE MICROSTRIP PATCH ANTENNA AT 2.4 GHZ, AND COMPARISON BETWEEN
UNSLOTTED AND SLOTTED VERSION |
Author: |
MOHAMMED B. MAJED |
Abstract: |
Low profile antennas support the operation of many modern communication systems.
Microstrip patch antennas represent one family of compact antennas that offer a
conformal nature and the capability of ready integration with communication
system's printed circuitry. And it has many advantages over conventional
antennas. In this paper a square Microstrip Patch Antenna has been designed at
2.4 GHz frequency. By using Microwave office 2006 software (AWR) for design
simulation to get the best parametric design, and compared with a slotted
version of the antenna having a slotting shape of letter (P). It included in the
design the return loss, gain, radiation pattern, bandwidth, HPBW, co and cross
polar isolation parameters. The square slotted antenna that designed has a
result of a return loss is about ( - 42.41dB ) and about 12.92% bandwidth. |
Keywords: |
Return Loss, Coaxial Feed, Bandwidth, Antenna Radiation Pattern, Co-Polar
Isolation, Cross-Polar Isolation. |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
ON THE USE OF OPTIMUM CURVES IN ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SENSOR
NETWORKS |
Author: |
SAEID BAKHTIARI, SUBARIAH IBRAHIM, MAZLEENA SALLEH, MAHDI SHARIFI |
Abstract: |
Providing security in Wireless Sensor Networks (WSNs) is a considerable
challenge due to the concomitant limitations in processing time, power, area and
energy consumption in sensor nodes and the nature of wireless links. A variety
of cryptographic methods are available for security establishment. Among them,
Elliptic Curve Cryptography (ECC) is the best candidate to accomplish this
challenge because it provides high security in spite of a smaller key size. In
addition, ECC was subject to many recent studies to optimize the time needed for
base point selection and point multiplication operations. In this paper, the
points on elliptic curves are analyzed, and an efficient implementation of ECC
base point selection is proposed. The proposed implementation can be utilized by
extremely constrained devices. We prefer to utilize projective coordinate
representations of field elements than to utilize affine coordinates over prime
finite field Fp, whereas projective coordinates reduce computational complexity
by eliminating the multiplicative inverse in point additions and point doubling.
This paper further analyzes non-prime order elliptic curves .The analysis
results show that the order of the elliptic curve plays a critical role in
determining how fast a base point can be selected. |
Keywords: |
Elliptic Curve Cryptography, Wireless Sensor, Prime Order, Adhoc Networks, Base
Point |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
AN ANALYSIS AND ACCURACY PREDICTION OF HEART DISEASE WITH ASSOCIATION RULE AND
OTHER DATA MINING TECHNIQUES |
Author: |
SHABANA ASMI P, Dr. S. JUSTIN SAMUEL |
Abstract: |
Disease is a term for defining a large amount of healthcare conditions that
affects part or all of an organism. Knowledge of various disease symptoms and
signs favorable for disease development is necessary to optimize a disease
forecaster. Different data mining techniques such as Naive Bayes, Decision Tree,
Linear Regression and Association Rule are used to predict the heart disease.
Data mining techniques in all disease diagnosis applied over all disease
treatment dataset investigate if hybrid data mining techniques can achieve
equivalent (or better) results in identifying suitable treatments as that
achieved in the diagnosis. In this paper, our work is to more accurately predict
the presence of heart disease with added attributes of the disease and using
association rules. Final results show that association rule implemented on
dataset produces better accuracy. |
Keywords: |
Artificial Neural Network (ANN), Cleveland Heart Disease Data Set (CHDD),
k-Nearest Neighbor (KNN), Heart Disease Prediction and Diagnosis, Knowledge
Discovery in Database (KDD) |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
ARCHITECTURE KNOWLEDGE FLOW FRAMEWORK DESGIN |
Author: |
MUSTAFA S.KHALEFA, MARZANAH A.JABAR, RUSLI HJ ABDULLAH, SALFARINA ABDULLAH |
Abstract: |
Flow of Knowledge pertains in most teamwork and it attracts the researchers in
the field of knowledge management. Since flow of knowledge usually happens in a
particular context, context has to be taken into consideration in knowledge flow
modeling. Past models of flow of knowledge lacked in terms of software
development and lacked in-depth exploration of context modeling, which made
those models less applicable. This research proposes a conceptual framework of
context oriented flow of knowledge in software development aspects. In this
framework, the context is seen as an inseparable element of flow of knowledge,
which is regarding the creation, transformation as well as application of
knowledge items. Framework KFFD is proposed based on three aspects- flow of
knowledge, software development project and ontology. For the proper use of
knowledge, dynamic flow to destinations form sources is necessary. In this
context, a new framework in KM is analyzing, designing and implementing
knowledge flow management systems. One crucial challenge in such systems is the
exploration of flow of knowledge from its origin to the receiver. Another
challenge is controlling the flow for quality enhancements regarding the
requirements of the users. As such, the aim of this research is to provide a
framework so as to solve this challenge. |
Keywords: |
knowledge flow, knowledge flow framework design, type of knowledge flow,
knowledge flow management. |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
EVALUATION FOR ASSOCIATION OF CRIME RISK ATTRIBUTES FOR DECISION SUPPORT SYSTEM |
Author: |
NOOR MAIZURA MOHAMAD NOOR, AHMAD FAIZ GHAZALI, ROSMAYATI MOHEMAD, MD YAZID MOHD
SAMAN |
Abstract: |
The aim of this paper is to evaluate the association between attributes for
house breaking crimes identified from police reports. Data collected from the
house breaking (HB) crime cases reported can be initially analyzed using
statistical methods in several tests. The purpose of conducting the test is to
ensure the significant attributes to be utilized in the development of a
decision support system based on the proposed generic framework. The result of
analysis shows the association between the identified attributes in HB crime
reports in terms of its significance using several statistical methods. |
Keywords: |
Association, Crime Attributes, Decision Support System, Statistical Methods |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
PRODUCT DESIGN METHODOLOGY FOR MODELING MULTI BUSINESS PRODUCTS: COMPARATIVE
STUDY BETWEEN UML AND BPMN MODELING FOR BUSINESS PROCESSES |
Author: |
KNOUNI SALMA, BENHIDA KHALID, EL FEZAZI SAID |
Abstract: |
The development of a multidisciplinary product (having a strong software
component) is a complex task with multiple constraints, especially during the
design phase. The mastery of the design phase is a necessary condition for the
product development success and therefore assuring its competitiveness on the
market. To contribute to this mastery, the formalization and modeling of the
process design is imperative. We aim in this article, the formalization of
multidisciplinary product’s design methodology with an organizational character,
throughout the modeling of the product design process’s different aspects:
structural, behavioral ..., which can be exploited by business stakeholders or
software analysts. We used two modeling standards: UML and BPMN and we made a
comparative study between models obtained by these two standards |
Keywords: |
Design, multidisciplinary product, process modeling, UML, BPMN. |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
SPECTRUM SENSING SCHEMES FOR STATIC PRIMARY USER SIGNAL UNDER AWGN AND RAYLEIGH
FADING CHANNELS |
Author: |
WASAN KADHIM SAAD, MAHAMOD ISMAIL, ROSDIADEE NORDIN, AYMAN A. EL-SALEH |
Abstract: |
This paper taught the performance of the proposed sensing models, namely,
constant false alarm rate-dynamic waveform detector (CFAR-DWD) are categorized
as dynamic threshold (DT), two-stage (TS), and adaptive two-stage (ATS)
detection for accurately detecting of the static-primary user (PU) signals,
where the state of the PU signal not change during the sensing duration. Whereby
it is carried out by deriving a closed-form expressions for the average
detection probability for the proposed models over AWGN and Rayleigh fading
channels under low signal-to-noise ratio (SNR) environments. In addition,
complete mathematical analysis for the normalized throughput and average channel
capacity of the secondary network are developed over AWGN and Rayleigh fading
channels to demonstrate the impact of the opportunistic spectrum access.
Comparison based on simulation was performed of the detection performance and
the normalized throughput among the proposed CFAR-DWD, CFAR-DED and conventional
schemes. The simulation results demonstrate that the proposed CFAR-DWD can
achieve a precise detection performance significantly outperformed that of the
CFAR-DED and conventional schemes. Furthermore, there is a significant impact on
the detection performance of the CFAR-DWD and CFAR-DED models by Rayleigh
fading, and the impact of Rayleigh fading gets clearer when reduces to (0.01)
and reaches up to (0.9), which will lead to poor spectrum usage. |
Keywords: |
Dynamic waveform detection (DWD), Dynamic energy detection (DED), Constant false
alarm rate (CFAR), AWGN channel, Rayleigh fading channel, Hard decision
combining (HDC) rules. |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
DESIGN PERSPECTIVE OF LOW POWER, HIGH EFFICIENCY SHIFT REGISTERS |
Author: |
MOHD. MARUFUZZAMAN, Z. H. Jalil, M. B. I. REAZ, L. F. RAHMAN |
Abstract: |
In low-power digital design, especially in shift registers, flip-flops (FF)
plays a significant role. In shift registers, the power consumption of system
clock is estimated to be half of the overall system power. Therefore, selecting
the right FF is very important for designing an compact size and low power shift
register. In this paper, a review of different FF designs that have been applied
for different shift register (SIPO, PIPO, SISO and PISO) is presented. The
connection between FFs parameters and shift registers is also discussed. FFs
architecture is evaluated via its average power, delay and power delay product.
Comparative study showed that FFs have great effect on the performance quality
of shift registers. |
Keywords: |
CMOC, FF, Single Edge Triggered FF, Double Edge Triggered FF, Shift Register |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
IDENTIFYING TEXT DOCUMENT PATTERN FOR TWO TERMS APPEARANCES VIA LATENT SEMANTIC
ANALYSIS (LSA) METHOD AND TERM DISTANCE BETWEEN TWO DOCUMENTS |
Author: |
SOEHARDJOEPRI, NUR IRIAWAN, BRODJOL SUTIJO SU, IRHAMAH |
Abstract: |
Pattern of writing a document is often said to be strongly influenced by the
mother tongue, but do not guarantee produce writing that is always the similar
pattern. If the trend similarity patterns caused by intentional copying of
documents, then it is necessary to be created a detection tool to identify the
terms pattern in those documents. This phenomena initiate this paper to acquaint
the further investigation on text document pattern recognition for terms
appearances by employing latent semantic analysis (LSA) method couple with terms
distance between two documents. This study also describes determination of text
documents similarity, which in turn can be used for early plagiarism detection. |
Keywords: |
Text Document, Pattern, Latent Semantic Analysis, Term Distance, Plagiarism. |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
GRID-CONNECTED PHOTOVOLTAIC SYSTEM USING AN ADVANCED BACKSTEPPING APPROACH |
Author: |
KHALDI NAOUFEL, MALIKA ZAZI, HASSAN MAHMOUDI |
Abstract: |
The objective of this paper is to present a nonlinear approach to design a
suitable controller system for the photovoltaic (PV) single-phase grid-connected
system. The system structure includes a PV generator, Boost converter, and DC-AC
inverter coupled to grid network. A backstepping controller is developed to
extract maximum point power tracking (MPPT), to regulate the DC bus voltage, and
to generate a sinusoidal current into the grid in phase with grid voltage in
order to achieve unity power factor. The stability of the control algorithm is
demonstrated by tools of Lyapunov analysis. Simulations show that the proposed
controller system completely accomplishes listed aims even under atmospheric
conditions variation. The performance of the proposed controller has been
validated by numerical simulation in MATLAB SIMULINK. |
Keywords: |
PV grid-connected system, backstepping technique, MPPT, power factor, Lyapunov
stability |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
LIQUID LEVEL DETECTION SYSTEM WITH A LABVIEW BASED PC USING AN ELECTROMAGNETIC
DISPLACEMENT SENSOR |
Author: |
ZAKARYAE.EZZOUINE, ABDELRHANI.NAKHELI |
Abstract: |
The purpose of presented paper is to demonstrate an innovative dynamic system
operating in real time for low cost that allows liquid level Monitoring. The
system is based on an electromagnetic sensor for detecting water level by
measuring the distance between water surface and the submerged part of the
displacer of sensor .The system was implemented with a PC running National
Instruments via the NI-USB-6281 data acquisition device. Where we have developed
a graphical user interface (GUI) by utilizing LabVIEW software, for acquire and
monitor the information obtained by the sensor and displaying the liquid level
accurately at distances up to 65 centimeters. By this method we can measure the
variations of water ranges between 1mm and 5mm. |
Keywords: |
Liquid Level Detection, Electromagnetic displacement Sensor, Indicator glass
displacer, LabVIEW, Data Acquisition, Graphical User Interface (GUI) |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
A POWER DISTRIBUTION NETWORK RESTORATION VIA FEEDER RECONFIGURATION BY USING
EPSO FOR LOSSES REDUCTION |
Author: |
N. F. NAPIS, M. F. SULAIMA, R. M. ARIF R. A. YUSOF, A. F. A. KADIR, M. F.
BAHAROM |
Abstract: |
This paper deals with 16kV and 33kV Service Restoration via Distribution Network
Reconfiguration (DNR) by using hybridization algorithm called as Evolutionary
Particle Swarm Optimization (EPSO). The main objectives of this study are to
restore as many loads as possible by transferring loads in the out of service
areas to other distribution feeders via the system of changing the status of
normally close and open switches which is known as Distribution Network
Reconfiguration (DNR). Apart from that, this study manages to analyze the
difference of losses reduction and improving the voltage profile respectively. A
detailed performance analysis is carried out in 16 and 33-bus systems
demonstrate the effectiveness of the EPSO method in MATLAB environment. The
results are presented and compared with the Particle Swarm Optimization (PSO)
algorithm and the original network. EPSO method has shown a good performance as
the confirmations for the success of this optimization with has the least power
losses and a better improvement in the voltage profile compared to PSO and
original network. This advantage will help to solve power loss problem in the
electrical power system as well as increasing the efficiency of the real
distribution system. |
Keywords: |
Distribution Network Reconfiguration, Service Restoration, voltage profile,
power losses, Evolutionary Particle Swarm Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
Title: |
DESIGNING APPROACH OF AN INTRUDER REALTIME UBIQUITOUS EMBEDDED SURVEILLANCE
SYSTEM |
Author: |
MOFTAH HMAID, NASEER SABRI, M.S. SALIM, R. BADLISHAH |
Abstract: |
As an essential constituent of many associations’ security and safety
precedence, video surveillance has established its importance and benefits
numerous times by providing immediate supervising of possessions, people,
environment and property. This paper deals with the design approach of an
Embedded Real-Time Surveillance System Based Raspberry Pi SBC for Intruder
Detection that reinforces surveillance technology to provide essential security
to our life and associated control and alert operations. The proposed security
solution hinges on our novel integration of cameras and motion detectors into
web application. Raspberry Pi operates and controls motion detectors and video
cameras for remote sensing and surveillance, streams live video and records it
for future playback. This research is focused on developing a surveillance
system that detects strangers and to response speedily by capturing and relaying
images to admin office based wireless module and thus activate the alert system
both at intruder location and office admin. We will use the Smart Surveillance
System Using Raspberry Pi presents the idea of monitoring the particular place
in a remote area. The system can be administrated by a remote user from any
networked workstation. The proposed solution offers efficient stand alone,
flexibility to upgrade and cheap development and installation as well as cost
effective ubiquitous surveillance solution. |
Keywords: |
Embedded System, Raspberry PI, Surveillance System, Motion Detection |
Source: |
Journal of Theoretical and Applied Information Technology
20th September 2015 -- Vol. 79. No. 2 -- 2015 |
Full
Text |
|
|
|