A major conventional car key is the mechanical key. When users inserted the key into a cylinder mechanical
key and turn, users can unlock. The mechanical key may be able to be worn away for physical contact. And it
may be impossible to use. Further the mechanical key may be damaged or destroyed by mischief. So a keyless
entry system has been developed. The keyless entry system locks and unlocks using the infrared ray and radio
waves communication. The keyless entry system does not require physical contacts. Therefore, the
possibilities of damage due to mischief and be worn away are fell. However, the transmission ranges of
infrared ray and radio waves communication are not clear. Submitting data might be tapped to the malicious
people. If the information is tapped, then you have theft of the car and the risk of car break.
We propose a keyless entry system using visible light communication in order to solve this problem. Visible
light communication transmits signal using blinking light. Thus the transmission range is clear. The user can
transmit the information only to the aimed place. Therefore, the usability is improved. We measure the
durations of "take out the remote control", "put the aim" and "takes to unlock key" in order to evaluate the
usability in the experiment. We also compared with the infrared ray communication and examined the
superiority. Usability is improved in the experimental results, and usability is better than conventional
keyless entry system.
The document proposes a global wireless e-voting system for India that uses retina scanning and remote servers. Voters would go to a voting machine, have their retina scanned, and cast their vote. The retina scan, vote, and other security information would be converted to radio waves and sent to a remote server via mobile towers. The server would authenticate the voter's identity by matching the retina scan to a secure database before recording the vote. This system aims to make voting more secure, efficient, and allow voters to cast ballots anywhere.
IRJET- Design and Development of Gesture Controlled RobotIRJET Journal
This document describes the design and development of a gesture controlled robot. The robot consists of a transmitter circuit worn on a glove and a receiver circuit mounted on a robot. The transmitter circuit uses an accelerometer to sense hand gestures and transmit corresponding signals via radio frequency to the receiver circuit. The receiver circuit decodes the signals and uses a motor driver to control the robot's movement accordingly. Additional features like a metal detector and camera were added to the robot. The goal is to enhance the robot for applications like landmine detection. The robot is wireless and can be controlled remotely through hand gestures up to a range of 50-80 meters.
IRJET- Gesture Controlled Speaking Microcontroller for Dumb and Handicapp...IRJET Journal
This document describes a system called "Gesture Controlled Speaking Microcontroller for Dumb and Handicapped People using Internet of Things" that aims to help those who cannot speak communicate more easily. The system uses an accelerometer sensor in a glove to detect hand gestures. The gestures are translated into pre-recorded voice messages or text displayed on an LCD. The messages are also sent to an online platform. This provides an efficient way for non-verbal people to convey messages through simple hand motions that are translated to audio or text others can understand. The goal is to help make life easier for those unable to communicate verbally.
Automatic Object Detection and Target using Ultrasonic SensorIRJET Journal
The document describes an automatic object detection and targeting system using ultrasonic sensors. The system is intended to secure border areas by reducing human effort and increasing response time and precision. It uses an ultrasonic sensor to detect objects, determines the distance, and then automatically targets the object's position. The system is mounted on a robot that moves and rotates using stepper motors controlled by a microcontroller. When an object is detected, the ultrasonic sensor sends signals to the microcontroller which processes the data and activates a laser targeting mechanism. The system is capable of detecting objects from 2-400cm away with 3mm accuracy.
This document describes a mobile app called the Women Security App developed by a group of students to help ensure women's safety. The app allows a user to save their contact details and then activate a "widget" that can instantly alert contacts and share the user's location if they feel unsafe. It also records audio from the user's surroundings and sends the recording along with a text message and GPS coordinates to the designated contact. The app aims to help women get assistance quickly in dangerous situations.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a research paper on developing a wearable wireless sensor network using accelerometers to track human motion without restraints. Small sensors containing MEMS accelerometers and flex sensors would be attached to limbs to track their movement wirelessly. This allows for unrestrained motion monitoring and portable use. The system could have applications in medical areas like rehabilitation and sports science to analyze player behavior.
This document proposes a system for global wireless e-voting. It summarizes the current voting system and its disadvantages like re-elections and inability to check voter eligibility. The proposed system uses retina scanning, radio waves, and a remote server for secure authentication and storage of votes to allow people to vote from anywhere using the internet. It describes the technical components like interface devices, encryption algorithms, and distributed servers to address security, efficiency, and geographical challenges in implementing such a system. Future enhancements could enable voting via mobile phones or the internet for more accessibility.
IRJET- IoT based Portable Hand Gesture Recognition SystemIRJET Journal
This document describes a portable hand gesture recognition system to help deaf and mute people communicate. The system uses flex sensors on a glove to detect hand gestures. An Arduino microcontroller matches the gestures to a database and sends the output to a smartphone via Bluetooth. The smartphone app then converts the text to speech so others can understand the user's message. The system is meant to overcome communication barriers for those unable to speak or hear by translating sign language gestures into audible speech in real-time.
1) The document describes a smart doorbell system that uses image recognition to identify visitors and control access to a home.
2) A Raspberry Pi connected to a camera captures images of visitors and compares them to a database of authorized individuals.
3) If the image matches someone in the database, the door will automatically unlock, but if not, an alert message will be sent to the homeowner. The system aims to remotely monitor and control home security.
This document summarizes the third blog post in a series about automating home appliances using a Raspberry Pi. It describes how the application was created as a captive portal to allow remote access. The application is hosted on the Raspberry Pi and built with Spring Boot for its lightweight and packageable qualities. It also demonstrates the real-time use including easy setup, learning modes to program gestures or numbers to commands, and execution mode to activate those commands remotely.
This document describes a voicebox system for mute people that uses flex sensors, an accelerometer, and wireless transmission to recognize hand gestures and provide emergency messaging. The system includes a transmitter glove fitted with flex sensors to detect gestures. An accelerometer detects falls and triggers an emergency SMS. The gestures and signals are sent wirelessly and received by a microcontroller connected to a voice module that plays pre-recorded messages corresponding to the gestures and signals. The system aims to help mute people communicate through translated hand gestures.
This document describes the design of a line-following robot with additional protective features. The robot uses a variety of sensors to follow a line and features circuits to trigger alarms for fires, smoke, and intruders. The robot is designed for 360-degree movement and streamlined body design. Additional improvements could include obstacle detection sensors, remote control via GPS, and differential steering for improved turning and stability. The robot has potential applications in security, industrial transport, and places where human access is difficult.
The document describes a study that used Faster R-CNN, a deep learning approach, to detect road objects like vehicles, pedestrians, and traffic signs in Bangladesh. The researchers collected images to train a neural network to identify 19 object classes. Their model achieved 86.42% accuracy and was able to detect objects in various lighting and traffic conditions, though it struggled when objects were extremely close together. The study aims to help analyze traffic and potentially assist autonomous vehicles in Bangladesh.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET - Automatic Toll E-Tickting System for Transportation and Finding o...IRJET Journal
This document describes an automatic toll collection and stolen vehicle detection system using RFID and wireless communication technologies. The system uses RFID modules to automatically collect tolls from moving vehicles by deducting payment from the owner's bank account. It can also detect and locate stolen vehicles by sending SMS alerts and notifications to the vehicle owner and police with the vehicle's location coordinates. The system aims to make toll collection more efficient by eliminating waiting times and reducing manpower needs. It also allows for quicker recovery of stolen vehicles.
Final Year Project Report Device Control using smsMuhammad Shakeel
This document describes a project to develop a hardware system that can control electric appliances via SMS messages. The system utilizes a microcontroller interfaced with a GSM modem to receive SMS commands and switch devices on or off. The literature review discusses GSM modems and how they operate using AT commands to send and receive SMS texts. It also explains how to interface a microcontroller with a GSM modem serially using a MAX232 chip for voltage conversion. Relays are used to control high-power appliances as the microcontroller cannot source enough current directly. The project aims to implement this remote device control system using SMS for a stand-alone hardware device.
RFID Based School Children Security SystemIRJET Journal
This document describes an RFID-based school children security system that aims to safely transport children to and from school. The system uses RFID tags on the children to monitor their entry and exit from the bus and sends notifications to parents. It also includes sensors to monitor the bus speed, detect if the driver has been drinking alcohol, and ensure children are not left on the bus. The system is intended to address issues where children are sometimes forgotten and not dropped off at the correct bus stop. It uses a microcontroller, GSM module, RFID reader, LCD display, proximity sensor, and alcoholic sensor. The document provides details on the hardware and software components used and concludes the system endeavors to provide safe transportation for school children
Hand gesture recognition using ultrasonic sensor and atmega128 microcontrollereSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Design and development of intelligent electronics travelling aid for visually...eSAT Journals
Abstract The dynamic nature of the environment poses a big challenge to the visually impaired in navigation. This compels most of the visually impaired persons in the developing countries, who generally do not get any technology support, to depend on the visual sense of others, thus, undermining their independence. The intelligent electronic travelling aid for the visually impaired (IETA-VI) designed and developed by the authors and reported here, intends to provide solution to the navigational challenges of the visually impaired individuals. The system utilizes the ultrasonic detection technology for detecting any obstacle in his/her path, and then converts the distance to the obstacle into voice using voice synthesis technology so as to inform the visually impaired user. The device uses GPS and GSM technologies to determine the location of the user and to send this location to his/her care givers on mobile phone, respectively. The device also recognizes the voice signals of the visually impaired when in distress, by making use of voice recognition technology and send SMS to his care givers giving his location and asking them to help him. In a moment of emergency, when the visually impaired requires the attention of his/her care givers, the device provides three alternatives: The first alternative it provides is an emergency key, which when pressed will automatically send the location of the visually impaired to the care givers. The second alternative is that the visually impaired shouts (gives a voice command), the device responds by sending the location of the visually impaired to the care givers. The third alternatives take care of the situation when the user is unconscious or cannot even speak. This is provided by the display device, which displays the names and contact details of his/her care givers, so that someone can offer a helping hand. KEYWORDS: Ultrasonic detection, Voice recognition, Voice synthesis, GPS, GSM.
Intelligent travelling and home automation aid, for visually impairedUmar Shuaib
The document describes the design and development of an intelligent electronic travelling aid called IETA-VI for visually impaired individuals. The system uses ultrasonic detection to detect obstacles and converts distances to voice messages. It uses GPS and GSM technologies to determine the user's location and send it to caregivers. The device can also recognize voice distress signals, send the user's location via SMS, and has an emergency button to alert caregivers. The system aims to help visually impaired people navigate independently.
IRJET- Smart Assistive Device for Visually ImpairedIRJET Journal
This document describes the development of a smart assistive device for visually impaired individuals. The device uses an ultrasonic sensor to detect obstacles and provide haptic or audio feedback to warn the user of obstacles in their path. It is powered by a lithium ion battery and processed using an Arduino microcontroller. Testing showed that visually impaired individuals could use the device to safely navigate an environment and avoid collisions with obstacles. The device aims to improve independence and mobility for the visually impaired.
This document describes a smart blind walking stick that uses ultrasonic sensors and other components to help blind people navigate independently. The stick detects nearby objects using ultrasonic sensors and notifies the user via voice commands from a playback module. It determines distances to nearby objects and warns the user if objects are close through different voice alerts. The stick is powered by an Arduino microcontroller and includes additional sensors, displays, and circuits to accurately detect obstacles and assist blind users in walking confidently without needing assistance from others. The goal is to help overcome challenges faced by blind people through an improved walking stick that provides object detection and distance information.
Public wireless LAN services have been increasing recently. These are convenient services for carrier
companies particularly. And carrier companies and the user can disperse traffic. However in order to
improve the convenience, the services do not often use the encryption key or do not change the encryption
key that has already been set. Therefore, the services have a problem in safety. This paper solves this
problem using the visible light communication.
The visible light communication sends a signal by blinking the light. One of the visible light communication
features is that we can see the transmission area. The visible light communication can use lighting
equipments as the transmitter unlike infrared or conventional radio communications. Further, visible light
communication can separate to clarify the transmission range by using light.
We propose the distribution of the encryption key and the SSID using visible light communication. Visible
light communication can easily prepare a small network, such as a partition or per a room basis. For
malicious users connecting to the network is necessary to enter in the service provided area. Thus the
administrator is able to easily manage legitimate users. In addition, it is possible to update the SSID and
the encryption key by visible light communication easily for an administrator. Thus if malicious users get
the SSID and the encryption key, they cannot use the SSID and the encryption key immediately. Normal
users may only need to run the shell script for receiving information from the receiver. Therefore,
convenience is good.
In order to confirm the improved convenience, we measured the time it takes for a user to connect to the
network. Conventional methods are methods that use or do not use the encryption key. As a result, users
can connect to the network in a short time compared with the conventional methods. The system becomes
stronger than conventional methods because it is possible to update the encryption key and SSID
automatically in the security aspect.
Automatic Ambulance Detection System in Traffic Signals Using IOTIRJET Journal
This document describes an automatic ambulance detection system using IoT that detects ambulances approaching traffic signals and clears the path. The system uses RF transmitter modules in ambulances and receiver modules at traffic signals. When an ambulance gets within range, pressing an in-ambulance panic button triggers the nearby traffic signal to turn the lane's light green and add a blue light, informing others to clear the way. After the ambulance passes, the signal returns to normal operation. This is designed to help ambulances quickly reach hospitals in emergencies.
IRJET- Smart Cane for Blind People using IoTIRJET Journal
1) Students developed a smart cane for blind people using IoT that detects obstacles with ultrasonic sensors and alerts the user via audio output.
2) The system measures distance to obstacles, processes the data with an Arduino microcontroller and produces a voice alert for the user.
3) It also includes a GPS tracking system and guidance application to navigate the blind person's path.
In this pape r the system used which consist of different types of sensors such as alcohol sensor,eye blink sensor,tilt sensor and also mainly used GSM modem,GPS receiver. T he eye blink sensor is used to sense the person driving the vehicle is sleeping or not. T ilt sensor is used to identify weather the vehicle is running in normal condition or not when the accident occurs . it send the information to the controller system. The Alcohol Sensor is used to sense weather the person driving the car taken Alcohol or not and this data is also given to ADC. The ADC is used i n this system because the signal comes from the Sensor are analog in nature,so we want to convert the analog signals into digital signal for this purpose ADC is used. GSM and GPS based vehicle location and tracking system will provide effective,real time vehicle location,mapping and reporting this information value.
Smart Cane for Blind Person Assisted with Android Application and Save Our So...Dr. Amarjeet Singh
Today technology is improving daily in different
aspects in order to provide flexible proposes Smart Cane
(Stick) for blind person. But there is no such kind of good
system to navigate a blind person and help in emergency
situation. In this paper, user friendly device is proposed that
can identify the obstacles in the path using ultrasonic sensors.
In this system blind person will navigated through a cane
interfaced with an android application. A blind person can
establish voice call or SMS to a predefined number just by
pressing the emergency button on cane using GSM module. In
addition, people will get notified as Facebook status updated
with emergency alert. This system develop an android
application which is smart and user-friendly. While walking
in public place during night time, the blind person can use
cane as a flashlight which illuminates automatically.
Design and Development of Secure Navigation System for Visually Impaired Peopleijcsit
The proposed work presents a navigation system, which detects the obstacles and also guide to visually impaired people about appropriate path. The system we propose detects the obstacle via an infrared based detecting system and sends back vibro-tactile or sound (buzzer) feedback to inform the user about its position. The most common method of obstacle detection, used by blind people is the walking stick. The limitation of walking stick is that, it does not provide protection near to head area. A sensor module is fixed on a light weight cap allowing the user to obtain the information about obstacles (near to head area) and also about correct path on which the user should move. When the user uses this system with cane, he is fully protected about obstacles and can navigate freely into the environment.
F B ASED T ALKING S IGNAGE FOR B LIND N AVIGATIONIJCI JOURNAL
The major challenge of visually impaired person is
in mobility, object identification and identificati
on of
space around him/her. The proposed RF Based Talking
Signage for Blind Navigation aims to provide a
universal electronic travel guide for the visually
challenged people. This system incorporates a user
friendly and versatile method called “Talking Signa
ge” that is implemented using android devices. The
system uses an Android application in the mobile ph
one which could deliver voice messages about the us
er
environment via a heterogeneous network. It can be
deployed in any dense environment so that blind
persons can fulfill their needs. The primary advant
age of the system compared to other system in the a
rea is
low cost, ease of transport, less power consumption
, lightweight, and it could be utilized by those pe
oples
who are technically challenged. The architecture pr
oposed in this paper clearly shows communication
between a mobile phone and a heterogeneous network
enabled with RF devices. We have implemented the
system in our university environment and the propos
ed system found to be a great success
IRJET- Bemythirdeye- A Smart Electronic Blind Stick with GogglesIRJET Journal
This document describes a smart electronic blind stick designed to help visually impaired people navigate independently and safely. The stick uses various sensors like ultrasonic sensors, IR sensors, and a PIR motion sensor to detect obstacles, motion, and staircases. It alerts the user with a buzzer when obstacles are detected. It also includes a location tracking module using GPS and GSM to send the user's location to contacts in emergencies. The stick is controlled with a microcontroller and aims to provide more accurate detection than traditional blind sticks by combining multiple sensor types. It allows visually impaired users to navigate with greater confidence, safety, and independence.
Design and implementation of smart guided glass for visually impaired peopleIJECEIAES
The objective of this paper is to develop an innovative microprocessor-based sensible glass for those who are square measure visually impaired. Among all existing devices in the market, one can help blind people by giving a buzzer sound when detecting an object. There are no devices that can provide object, hole, and barrier information associated with distance, family member, and safety information in a single device. Our proposed guiding glass provides all that necessary information to the blind person’s ears as audio instructions. The proposed system relies on Raspberry pi three model B, Pi camera, and NEO-6M global positioning system (GPS) module. We use TensorFlow and faster region-based convolutional neural network (R-CNN) approach for detection of objects and recognition of family members of the blind man. This system provides voice information through headphones to the ears of the blind person, and facile the blind individual to gain independence and freedom within the indoor and outdoor atmosphere.
Controlling and Reducing of Speed for Vehicles Automatically By Using Rf Tech...IJERA Editor
This document describes a system to automatically control and reduce vehicle speed using RF technology. The system uses RF transmitters mounted in areas like curves to transmit a signal when a vehicle enters that area. Receivers in the vehicle detect this signal and send it to a microcontroller which reduces the fuel flow, slowing the vehicle. This prevents accidents by reducing speed in hazardous areas. The document provides details on the system components, working, applications, advantages and conclusions.
This document describes a smart walking stick designed to assist blind people by detecting obstacles and potholes using ultrasonic sensors. The stick is connected to an Android application via Bluetooth to provide auditory feedback to the user. Ultrasonic sensors detect obstacles and determine the closest safe path. Additional sensors check the ground clearance to identify potholes. The application allows navigation to locations via voice commands and calling pre-set emergency contacts using hand gestures. The system aims to help blind individuals move independently and safely.
The document describes the design of an autonomous navigation robot that can avoid obstacles. An ATmega328P microcontroller is used to process signals from ultrasonic sensors and direct the robot's movement. When an obstacle is detected, the microcontroller determines the distance and redirects the robot by turning or reversing direction to avoid collisions. The robot's movement is controlled by the microcontroller sending signals to motors through a motor driver. The goal is for the robot to intelligently navigate unknown environments without needing remote control by detecting obstacles with sensors and maneuvering autonomously.
Developing Infrared Controlled Automated Door SystemIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
IRJET - Enhancing Indoor Mobility for Visually Impaired: A System with Real-T...IRJET Journal
The document presents a system to enhance indoor mobility for visually impaired people using real-time obstacle detection with QR codes and audio feedback. The system uses an ultrasonic sensor to detect obstacles and QR codes placed in locations to provide context through audio feedback to the user via headphones or speakers. When an obstacle is detected or a QR code is scanned, the microcontroller processes the data and triggers the voice recorder module to provide navigation assistance through audio cues to the user. The goal is to allow visually impaired individuals to safely and independently maneuver indoor environments.
This document describes a system for wireless transmission of an image using LED to LED visible light communication. The system represents LEDs as both transmitters and receivers, with free space as the transmission medium. At the transmitter, an image is converted to binary data and transmitted to an LED using serial communication. The LED is toggled on and off to transmit 1s and 0s. At the receiver, the LED senses the light and the microcontroller reconstructs the image. The system achieved a data rate of around 200 bps over a distance of 1 inch. Potential applications of this technology include vehicle communication, underwater communication, and data transmission in healthcare facilities.
The document describes a smart guide stick designed for blind people using ultrasonic sensors and an Arduino nano microcontroller. The stick detects nearby obstacles using ultrasonic sensors and notifies the user through a buzzer or vibration motor depending on the distance to the obstacle. This allows blind users to safely detect and navigate around obstacles. It can also help users locate the stick if it is misplaced using an RF module. The device aims to help blind people overcome common navigation challenges with a conventional walking stick.
Similar to A Novel Keyless Entry System Using Visible Light Communication (20)
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
Exploring Deep Learning Models for Image Recognition: A Comparative Reviewsipij
Image recognition, which comes under Artificial Intelligence (AI) is a critical aspect of computer vision,
enabling computers or other computing devices to identify and categorize objects within images. Among
numerous fields of life, food processing is an important area, in which image processing plays a vital role,
both for producers and consumers. This study focuses on the binary classification of strawberries, where
images are sorted into one of two categories. We Utilized a dataset of strawberry images for this study; we
aim to determine the effectiveness of different models in identifying whether an image contains
strawberries. This research has practical applications in fields such as agriculture and quality control. We
compared various popular deep learning models, including MobileNetV2, Convolutional Neural Networks
(CNN), and DenseNet121, for binary classification of strawberry images. The accuracy achieved by
MobileNetV2 is 96.7%, CNN is 99.8%, and DenseNet121 is 93.6%. Through rigorous testing and analysis,
our results demonstrate that CNN outperforms the other models in this task. In the future, the deep
learning models can be evaluated on a richer and larger number of images (datasets) for better/improved
results.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
Social media management system project report.pdfKamal Acharya
The project "Social Media Platform in Object-Oriented Modeling" aims to design
and model a robust and scalable social media platform using object-oriented
modeling principles. In the age of digital communication, social media platforms
have become indispensable for connecting people, sharing content, and fostering
online communities. However, their complex nature requires meticulous planning
and organization.This project addresses the challenge of creating a feature-rich and
user-friendly social media platform by applying key object-oriented modeling
concepts. It entails the identification and definition of essential objects such as
"User," "Post," "Comment," and "Notification," each encapsulating specific
attributes and behaviors. Relationships between these objects, such as friendships,
content interactions, and notifications, are meticulously established.The project
emphasizes encapsulation to maintain data integrity, inheritance for shared behaviors
among objects, and polymorphism for flexible content handling. Use case diagrams
depict user interactions, while sequence diagrams showcase the flow of interactions
during critical scenarios. Class diagrams provide an overarching view of the system's
architecture, including classes, attributes, and methods .By undertaking this project,
we aim to create a modular, maintainable, and user-centric social media platform that
adheres to best practices in object-oriented modeling. Such a platform will offer users
a seamless and secure online social experience while facilitating future enhancements
and adaptability to changing user needs.
Software Engineering and Project Management - Introduction to Project ManagementPrakhyath Rai
Introduction to Project Management: Introduction, Project and Importance of Project Management, Contract Management, Activities Covered by Software Project Management, Plans, Methods and Methodologies, some ways of categorizing Software Projects, Stakeholders, Setting Objectives, Business Case, Project Success and Failure, Management and Management Control, Project Management life cycle, Traditional versus Modern Project Management Practices.
Online music portal management system project report.pdfKamal Acharya
The iMMS is a unique application that is synchronizing both user
experience and copyrights while providing services like online music
management, legal downloads, artists’ management. There are several
other applications available in the market that either provides some
specific services or large scale integrated solutions. Our product differs
from the rest in a way that we give more power to the users remaining
within the copyrights circle.
An Internet Protocol address (IP address) is a logical numeric address that is assigned to every single computer, printer, switch, router, tablets, smartphones or any other device that is part of a TCP/IP-based network.
Types of IP address-
Dynamic means "constantly changing “ .dynamic IP addresses aren't more powerful, but they can change.
Static means staying the same. Static. Stand. Stable. Yes, static IP addresses don't change.
Most IP addresses assigned today by Internet Service Providers are dynamic IP addresses. It's more cost effective for the ISP and you.
Unblocking The Main Thread - Solving ANRs and Frozen FramesSinan KOZAK
In the realm of Android development, the main thread is our stage, but too often, it becomes a battleground where performance issues arise, leading to ANRS, frozen frames, and sluggish Uls. As we strive for excellence in user experience, understanding and optimizing the main thread becomes essential to prevent these common perforrmance bottlenecks. We have strategies and best practices for keeping the main thread uncluttered. We'll examine the root causes of performance issues and techniques for monitoring and improving main thread health as wel as app performance. In this talk, participants will walk away with practical knowledge on enhancing app performance by mastering the main thread. We'll share proven approaches to eliminate real-life ANRS and frozen frames to build apps that deliver butter smooth experience.
A Novel Keyless Entry System Using Visible Light Communication
1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.5, October 2014
A NOVEL KEYLESS ENTRY SYSTEM USING VISIBLE
LIGHT COMMUNICATION
Kuniyoshi Okuda, Hideaki Shirai, Tomoo Nakamura and Wataru Uemura
Department of Electronics and Informatics, Ryukoku University, Shiga, Japan
ABSTRACT
A major conventional car key is the mechanical key. When users inserted the key into a cylinder mechanical
key and turn, users can unlock. The mechanical key may be able to be worn away for physical contact. And it
may be impossible to use. Further the mechanical key may be damaged or destroyed by mischief. So a keyless
entry system has been developed. The keyless entry system locks and unlocks using the infrared ray and radio
waves communication. The keyless entry system does not require physical contacts. Therefore, the
possibilities of damage due to mischief and be worn away are fell. However, the transmission ranges of
infrared ray and radio waves communication are not clear. Submitting data might be tapped to the malicious
people. If the information is tapped, then you have theft of the car and the risk of car break.
We propose a keyless entry system using visible light communication in order to solve this problem. Visible
light communication transmits signal using blinking light. Thus the transmission range is clear. The user can
transmit the information only to the aimed place. Therefore, the usability is improved. We measure the
durations of "take out the remote control", "put the aim" and "takes to unlock key" in order to evaluate the
usability in the experiment. We also compared with the infrared ray communication and examined the
superiority. Usability is improved in the experimental results, and usability is better than conventional
keyless entry system.
KEYWORDS
Keyless entry system, Infrared ray communication, Visible light communication
1. INTRODUCTION
Recently many car manufacturers are adopting the keyless entry system. A keyless entry system
unlocks doors without the key inserted into the keyhole. In the traditional mechanical key (Figure
1), keyholes and keys are worn away. Therefore the mechanical key will be difficult to unlock or
lock. And people with malicious might to unlock forcibly or destroy the keyhole by malicious
mischief. The keyless entry system solves these problems.
There are some types of authentication methods. In the case of two-way communication, there are
the zero-knowledge proof and challenge-response. In the challenge response, at first the transmitter
sends an authentication request. After the receiver gets it, the receiver sends back a random number
sequence. It is called a challenge. The transmitter receives the challenge, and combined with the
password and challenge. It is called response. The transmitter sends the response. In the same way,
the receiver makes response. It receives transmitter's challenge and checks.
The Zero-knowledge proof is a proof method to check the remainder of the quotient. The receiver
DOI : 10.5121/ijasuc.2014.5501 1
2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.5, October 2014
sends the divisor to the transmitter. The transmitter divides by the received divisor password. The
transmitter calculates the remainder, and sends it to the receiver. In the same way, the receiver
calculates the remainder. It receives transmitter's remainder and check. The transmitter and the
receiver repeat these steps several times.
2
Figure 1: mechanical key and keyless entry module
2. SOME PROBLEMS OF THE CONVENTIONAL KEY
The mechanical key is used long time on many occasions even now. There are several types of
mechanical key. Most major keys are a cylinder type. A cylinder type has some cylinders in the
keyhole. The cylinders of different lengths move up and down. When the user inserts into the key
hole, the lock cylinder are arranged in a row. The key is unlocked when the cylinders are in a line.
Mechanical keys have some weak points. One is that it is damaged or destroyed the keyhole [1-4].
When the key is broken there is a possibility of theft.
Therefore the keyless entry system does not require a mechanical lock and has become widespread.
The keyless entry system locks and unlocks using the remote control. The keyless entry system uses
infrared ray and radio waves communication for unlocking. The system does not require physical
contact. Therefore, the possibility of wear of the keyhole and the key is less. The possibility of
mischief and theft is also low. Users can unlock using the mechanical key in an emergency.
However humans can not know the propagation area of the infrared ray and radio waves, because
humans are not able to view the infrared ray and radio waves. Therefore we cannot know a reach
emitted signal from the remote control. However, people with malicious may intercept the contents
of communication using the listening device [5].
A smart entry system has been developed now. The smart entry system is an extension to keyless
entry system. The smart entry system transmits and receives using radio waves. This system does
not require the manipulation of the remote controller to lock and unlock. Users with a remote
control can unlock by approaching the car. And users with the remote control can start the engine
without the mechanical key, because the remote control communicates with the car.
3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.5, October 2014
However the starting of the engine and unlocking can be even a person with malicious intent, when
it is in the vicinity of the car remote control of regular. Also, if the user forgets the key, it is
impossible to start the engine on the go.
For preventing eavesdropping, the transmitter sends data to only a specific location. However the
communication areas of infrared ray and radio waves are unclear, because we cannot see the
infrared ray and radio waves. That is, it is impossible for the users to understand the transmission
range of the transmitted data. It is a benefit to a people with malicious. Therefore, with the use of
visible light communication [6-8], it is possible to lower the potential to provide the password to the
people with malicious. Visible light communication is different from the conventional
communication method. Visible light communication sends information by blinking light. We can
understand intuitively the communication range that is characteristic of visible light
communication. Its transmission range is lit by light. The user can understand intuitively
transmission range. We can use the lighting infrastructure as transmitters of visible light
communication. Recently, The LED is used as a lighting equipment. The LED is long life and high
brightness, and further it is expected success.
3
Figure 2: Visible light communication
3. A NOVEL KEYLESS ENTRY SYSTEM USING VISIBLE LIGHT
COMMUNICATION
We propose a keyless entry system using visible light communication. The conventional keyless
entry system uses radio waves or infrared rays. Therefore the transmission range is unknown. Our
proposed system uses visible light communication for keyless entry system. Therefore the
transmission range is clear. We show the proposed system in Figure 3.
4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.5, October 2014
4
Figure 3: keyless entry system using visible light communication
The remote control includes the LED. The remote control sends the password by using visible light
communication. The car has a receiver.
The transmission range of infrared ray and radio waves communication used by conventional
keyless entry system is not clear. However our proposed system is different. We can see the
transmission range of visible light communication. Thus the user does not send the information to
unnecessary place. Therefore information is less likely to be tapping. The user easily can transmit
information in an aimed location. It improves the usability.
Our proposed system uses bidirectional communication. An outward path is visible light
communication and a return path is infrared ray communication. Our proposed system
authenticates a bidirectional communication. We assume that the authentication method is the
zero-knowledge proof or challenge-response. Infrared ray communication might be tapping.
However, important information is not sent in return path. And modulation system is required
to be constant transmission energy by the code.
4. EXPERIMENT
We show fabricated transmitter and receiver in Figure 4 and 5.
Figure 4: the transmitter
5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.5, October 2014
Figure 5: the receiver
The transmitter can perform infrared
replacing the LED. We use the PPM
Brightness is not changed by the data in PPM.
ray
communication or visible light communication programmatically, because the receiver has
elements of visible light and infrar
PPM (pulse
position modulation) as a modulation scheme [9
the PPM.
We evaluate the usability of a proposed keyless entry system.
convenience. We measure N/E
represents the ratio of the operating time of the designer and the operating time of the general user.
That is the operating time of the designer N/
time of the general user. It is judged to have a high usability. We
entry system using infrared ray communication
time to take out the remote control,
General users and designers measure them.
We show the results of the experiment
2
1.5
1
0.5
0
Measurement time
take out the remote control
ray communication or visible light communication by
(pulse position modulation) to the modulation scheme.
The receiver can perform infrared
infrared ray for receiver module. And we use the
9-10]. We prevent flicker by using
The usability means ease of use and
(novice expert ratio method) ratio in the experiment. N/
E ratio
rating E ratio is low, there is no difference in the operation
compare the conventional keyless
and proposed system. The measurement items
time to put the aim and the time it takes to unlock the key.
In addition, we calculate the N / E ratio of at that time.
in the Figure 6 and 7.
time it takes to unlock the key
put the aim
take out the remote control
put the aim time it takes to unlock the key
Figure 6: measurement time
5
ference easurement are
e
6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.5, October 2014
6
N/E ratio
put the aim time it takes to unlock
N/E(VLC) N/E(IR)
Figure 7: N/E ratio
1.6
1.4
1.2
1
0.8
0.6
0.4
0.2
0
take out the remote
control
the key
Remote control parts are common except for the LED. Therefore, there was no difference in time to
time other than "time it takes to unlock the key". We think that the cause is clear communication
range. Human can understand intuitively transmission range of visible light communication.
Therefore, if the user can aim to the wrong place, they can to correct aim immediately. However,
infrared ray communication is different. We cannot see the transmission range of the infrared ray
communication. Then, the user cannot understand intuitively transmission range. Thus correcting
the aim is not easy for the user. Long time, designers are working with a remote control. So
designers are familiar with the operation. Therefore, they understand to some extent sighting.
General users are unfamiliar with the operation. Therefore, the result is different.
5. CONCLUSION
We proposed a keyless entry system using visible light communication in this paper. The
conventional keyless entry system uses an infrared ray or radio waves. The user sends information
to unnecessary place, because we cannot see the transmission area of infrared ray and radio waves
communication. Therefore, it is possible that people with malice eavesdropping information. So we
attempt to solve the problem by using visible light communication. Visible light communication is
a communication that is visible to the eye. One of characteristic of visible light communication is to
visible transmission range. Therefore, the user does not send the information to unnecessary place.
In addition, the transmission range of visible light communication is clear. Therefore, users can
operate intuitively. So we propose a keyless entry system using visible light communication. Our
proposal can be put on the aim intuitively as compared with the keyless entry system of
conventional. Therefore, usability is good.
We have measured N/E ratio to evaluate the usability in experiments. N/E ratio is a comparison of
the operation time of the general user and operation time of the designer. If this value is low,
usability is good. The measurement item is "take out the remote control", "put the aim" and "takes
to unlock key". We compared by infrared ray communication with visible light communication the
three items.
The results of the experiment, took time to unlock up to the general user compared to the designer
in the infrared ray communication. There was no much difference between them in visible light
7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.5, October 2014
communication. We think that the cause is easy to aim. The transmission range of infrared ray
communication is not clear. However, visible light communication is different. The users can
correct aim easily, because they can understand intuition transmission range.
From the experimental results, we show that our usability of proposed system is better than
conventional keyless entry system.
7
REFERENCES
[1] Eli Biham, Orr Dunkelman, “How to Steal Cars -A Practical Attack on KeeLoq”, pp.3 (2007)
[2] Nicolas T. Courtois, Gregory V. Bard, and David Wagner, “Algebraic and Slide Attacks on
KeeLoq, (2007)
[3] Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, and
Mohammad T. Manzuri Shalmani hysical, “Cryptanalysis of KeeLoq Code Hopping
Applications”, (May 8, 2008)
[4] Nathan Keller, Orr Dunkelman, Eli Biham, and Bart Preneel, “A Practical Attack on KeeLoq”,
pp.4,5(2008)
[5] Saleh Almowuena, “AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESS
SENSOR NETWORKS USING THIRD PARTIES”, IJASUC Vol.4, No.4, 2013
[6] S.Haruyama,"Visible light communication", Journal of IEICE, 94(12), D, pp. 1055-1059,
2011
[7] Rajan Sagotra, "Visible Light Communication", International Journal of Computer Trends and
Technology (IJCTT) volume4 Issue4, pp. 906-910, 2013
[8] Dominic C. O'Brien, "Visible Light Communications: challenges and possibilities", PIMRC
2008. IEEE 19th International Symposium on Personal, Indoor and Mobile Radio
Communications, pp.15-18, 2008
[9] T. Saito, "A Study for flicker on Visible Light Communication", Technical Report of IEICE
CS, vol. 106, No. 450, pp. 31-35, 2007.
[10] I.Shouichi, "Reduction of Flicker by Coding and Modulation for Visible-Light
Communication" Technical Report of IEICE OCS, vol. 108, No. 39, pp. 1-4, 2008.
8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.5, No.5, October 2014
8
AUTHORS
Kuniyoshi Okuda (b.1986) is a student of Ryukoku University in Japan. After
studying Electronics and Informatics at Ryukoku University, he completed his
Master of Engineering at Osaka City University. Now he is a doctor course student at
Ryukoku University.
Hideaki Shirai received B.E, M.E. and D.E. degrees from Ryukoku University, in
2010 and 2012, respectively.
Tomoo Nakamura was born in 1948, and received B.E, M.E. and D.E. degrees
from Kyoto University, in 1970, 1972, and 1988. He is a professor of Ryukoku
University in Shiga, Japan.
Wataru Uemura was born in 1977, and received B.E, M.E. and D.E. degrees
from Osaka City University, in 2000, 2002, and 2005. He is an associate
professor of the Department of Electronics and Informatics, Faculty of
Engineering Science, Ryukoku University in Shiga, Japan. He is a member
of IEEE, RoboCup and others.