Pub Date : 2016-09-30DOI: 10.7236/IJASC.2016.5.3.66
S. Han, Minwoo Lee, V. Mariappan, Junghoon Lee, Seungyoun Lee, Juyoung Lee, Jintae Kim, J. Cha
Smart building gate security control system using smartphone integrated with near field communication (NFC) has become part of daily life usage these days. The technology change in replacing RF NFC device using visible light communication technology based approach growing faster in recent days. This paper propose a design and development of gate security control system using color code based user authentication ID generation as part of an intelligent access control system to control automatic door open and close. In this approach gate security access control use the recent visible light communication technology trends to transfer the user specific authentication code to door access control system using color code on smartphone screen. Using a camera in the door access control system (ACS), color codes on smartphone screens are detected and matched to the database of authenticated user to open the door automatically in gate security system. We measure the visual light communication technology efficiency as a part of the research and the experiments have revealed that more than 95% users authenticated correctly at the suggested experiment environment on gate security control system.
{"title":"Smartphone Color-Code based Gate Security Control","authors":"S. Han, Minwoo Lee, V. Mariappan, Junghoon Lee, Seungyoun Lee, Juyoung Lee, Jintae Kim, J. Cha","doi":"10.7236/IJASC.2016.5.3.66","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.3.66","url":null,"abstract":"Smart building gate security control system using smartphone integrated with near field communication (NFC) has become part of daily life usage these days. The technology change in replacing RF NFC device using visible light communication technology based approach growing faster in recent days. This paper propose a design and development of gate security control system using color code based user authentication ID generation as part of an intelligent access control system to control automatic door open and close. In this approach gate security access control use the recent visible light communication technology trends to transfer the user specific authentication code to door access control system using color code on smartphone screen. Using a camera in the door access control system (ACS), color codes on smartphone screens are detected and matched to the database of authenticated user to open the door automatically in gate security system. We measure the visual light communication technology efficiency as a part of the research and the experiments have revealed that more than 95% users authenticated correctly at the suggested experiment environment on gate security control system.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123023282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.7236/IJASC.2016.5.3.56
Jeong-Lae Kim, Kyu-ok Shin
Body physical technique is to pursuit the dynamic motion by the physical index(PI) and sensory index(SI) on the physical body function. Function of the physical body by the motor condition is organized the dynamic physical system. For the physical motion of signal, we is defined a runout value of the body function by the physical index on the dynamic state. The concept of body physical index was identified the reference of physical index and sensory index by the body technique. As to detect a variation of the body physical technique-runout physical index(BPT-RPI) of the maximum and average and minimum in terms of physical motion, and the dynamic sensory value that was a runout function of the vision variation of the Vi-ξ MAX-AVG-MIN with 2.53±4.85 units, that was a runout function of the vestibular variation of the Ve-ξ MAX-AVG-MIN with (-0.69±2.32)units, that was a runout function of the somatosensory variation of the So-ξ MAX-AVG-MIN with (-1.43±-1.36) units. The dynamic physical motion will be to confirm at the variable function of the runout motion for the body function values of dynamic physical index on the BPT-RPI that was identified an evaluation of the physical sensory function by the dynamic physical system. Runout body system was mentioned of a physical body situation by the mild moving and was refer a runout data of dynamic physical nervous index.
{"title":"Study of runout-motion in body physical techniques: physical index and sensory index","authors":"Jeong-Lae Kim, Kyu-ok Shin","doi":"10.7236/IJASC.2016.5.3.56","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.3.56","url":null,"abstract":"Body physical technique is to pursuit the dynamic motion by the physical index(PI) and sensory index(SI) on the physical body function. Function of the physical body by the motor condition is organized the dynamic physical system. For the physical motion of signal, we is defined a runout value of the body function by the physical index on the dynamic state. The concept of body physical index was identified the reference of physical index and sensory index by the body technique. As to detect a variation of the body physical technique-runout physical index(BPT-RPI) of the maximum and average and minimum in terms of physical motion, and the dynamic sensory value that was a runout function of the vision variation of the Vi-ξ MAX-AVG-MIN with 2.53±4.85 units, that was a runout function of the vestibular variation of the Ve-ξ MAX-AVG-MIN with (-0.69±2.32)units, that was a runout function of the somatosensory variation of the So-ξ MAX-AVG-MIN with (-1.43±-1.36) units. The dynamic physical motion will be to confirm at the variable function of the runout motion for the body function values of dynamic physical index on the BPT-RPI that was identified an evaluation of the physical sensory function by the dynamic physical system. Runout body system was mentioned of a physical body situation by the mild moving and was refer a runout data of dynamic physical nervous index.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122584782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.7236/IJASC.2016.5.3.8
Prima Sanjaya, Dae-Ki Kang
In recent years, one of deep learning models called Deep Belief Network (DBN) which formed by stacking restricted Boltzman machine in a greedy fashion has beed widely used for classification and recognition. With an ability to extracting features of high-level abstraction and deal with higher dimensional data structure, this model has ouperformed outstanding result on image and speech recognition. In this research, we assess the applicability of deep learning in dna classification level. Since the training phase of DBN is costly expensive, specially if deals with DNA sequence with thousand of variables, we introduce a new encoding method, using decimal-binary vector to represent the sequence as input to the model, thereafter compare with one-hot-vector encoding in two datasets. We evaluated our proposed model with different contrastive algorithms which achieved significant improvement for the training speed with comparable classification result. This result has shown a potential of using decimal-binary vector on DBN for DNA sequence to solve other sequence problem in bioinformatics.
{"title":"Could Decimal-binary Vector be a Representative of DNA Sequence for Classification?","authors":"Prima Sanjaya, Dae-Ki Kang","doi":"10.7236/IJASC.2016.5.3.8","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.3.8","url":null,"abstract":"In recent years, one of deep learning models called Deep Belief Network (DBN) which formed by stacking restricted Boltzman machine in a greedy fashion has beed widely used for classification and recognition. With an ability to extracting features of high-level abstraction and deal with higher dimensional data structure, this model has ouperformed outstanding result on image and speech recognition. In this research, we assess the applicability of deep learning in dna classification level. Since the training phase of DBN is costly expensive, specially if deals with DNA sequence with thousand of variables, we introduce a new encoding method, using decimal-binary vector to represent the sequence as input to the model, thereafter compare with one-hot-vector encoding in two datasets. We evaluated our proposed model with different contrastive algorithms which achieved significant improvement for the training speed with comparable classification result. This result has shown a potential of using decimal-binary vector on DBN for DNA sequence to solve other sequence problem in bioinformatics.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127160637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.7236/IJASC.2016.5.3.47
Rohit G Bal
Router main task is to provide routing of Internet Protocol (IP) packets. Routing is achieved with help of the IP lookup. Router stores information about the networks and interfaces in data structures commonly called as routing tables. Comparison of IP from incoming packet with the IPs stored in routing table for the information about route is IP Lookup. IP lookup performs by longest IP prefix matching. The performance of the IP router is based on the speed of prefix matching. IP lookup is a major bottle neck in the performance of Router. Various algorithms and data structures are available for IP lookup. This paper is about reviewing various tree based structure and its performance evaluation.
{"title":"Review On Tries for IPv6 Lookups","authors":"Rohit G Bal","doi":"10.7236/IJASC.2016.5.3.47","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.3.47","url":null,"abstract":"Router main task is to provide routing of Internet Protocol (IP) packets. Routing is achieved with help of the IP lookup. Router stores information about the networks and interfaces in data structures commonly called as routing tables. Comparison of IP from incoming packet with the IPs stored in routing table for the information about route is IP Lookup. IP lookup performs by longest IP prefix matching. The performance of the IP router is based on the speed of prefix matching. IP lookup is a major bottle neck in the performance of Router. Various algorithms and data structures are available for IP lookup. This paper is about reviewing various tree based structure and its performance evaluation.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124601568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.7236/IJASC.2016.5.3.1
A. Poernomo, Dae-Ki Kang
In existing Convolutional Neural Network (CNNs) for object recognition task, there are only few efforts known to reduce the noises from the images. Both convolution and pooling layers perform the features extraction without considering the noises of the input image, treating all pixels equally important. In computer vision field, there has been a study to weight a pixel importance. Seam carving resizes an image by sacrificing the least important pixels, leaving only the most important ones. We propose a new way to combine seam carving approach with current existing CNN model for object recognition task. We attempt to remove the noises or the “unimportant” pixels in the image before doing convolution and pooling, in order to get better feature representatives. Our model shows promising result with CIFAR-10 dataset.
{"title":"Content-Aware Convolutional Neural Network for Object Recognition Task","authors":"A. Poernomo, Dae-Ki Kang","doi":"10.7236/IJASC.2016.5.3.1","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.3.1","url":null,"abstract":"In existing Convolutional Neural Network (CNNs) for object recognition task, there are only few efforts known to reduce the noises from the images. Both convolution and pooling layers perform the features extraction without considering the noises of the input image, treating all pixels equally important. In computer vision field, there has been a study to weight a pixel importance. Seam carving resizes an image by sacrificing the least important pixels, leaving only the most important ones. We propose a new way to combine seam carving approach with current existing CNN model for object recognition task. We attempt to remove the noises or the “unimportant” pixels in the image before doing convolution and pooling, in order to get better feature representatives. Our model shows promising result with CIFAR-10 dataset.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134001988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.7236/IJASC.2016.5.3.32
Lionel Nkenyereye, Jong-Wook Jang
With the help of a small wearable device, patients reside in an isolated village need constant monitoring which may increase access to care and decrease healthcare delivery cost. As the number of patients’ requests increases in simultaneously manner, the web service gateway located in the village hall encounters limitations for performing them successfully and concurrently. The gateway based RESTful technology responsible for handling patients’ requests attests an internet latency in case a large number of them submit toward the gateway increases. In this paper, we propose the design tasks of the web service gateway for handling concurrency events. In the procedure of designing tasks, concurrency is best understood by employing multiple levels of abstraction. The way that is eminently to accomplish concurrency is to build an object-oriented environment with support for messages passing between concurrent objects. We also investigate the performance of event-driven architecture for building web service gateway using node.js. The experiments results show that server-side JavaScript with Node.js and MongoDB as database is 40% faster than Apache Sling. With Node.js developers can build a high-performance, asynchronous, event-driven healthcare hub server to handle an increasing number of concurrent connections for Remote Healthcare Monitoring System in an isolated village with no access to local medical care.
{"title":"Addressing Concurrency Design for HealthCare Web Service Gateway in Remote Healthcare Monitoring System","authors":"Lionel Nkenyereye, Jong-Wook Jang","doi":"10.7236/IJASC.2016.5.3.32","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.3.32","url":null,"abstract":"With the help of a small wearable device, patients reside in an isolated village need constant monitoring which may increase access to care and decrease healthcare delivery cost. As the number of patients’ requests increases in simultaneously manner, the web service gateway located in the village hall encounters limitations for performing them successfully and concurrently. The gateway based RESTful technology responsible for handling patients’ requests attests an internet latency in case a large number of them submit toward the gateway increases. In this paper, we propose the design tasks of the web service gateway for handling concurrency events. In the procedure of designing tasks, concurrency is best understood by employing multiple levels of abstraction. The way that is eminently to accomplish concurrency is to build an object-oriented environment with support for messages passing between concurrent objects. We also investigate the performance of event-driven architecture for building web service gateway using node.js. The experiments results show that server-side JavaScript with Node.js and MongoDB as database is 40% faster than Apache Sling. With Node.js developers can build a high-performance, asynchronous, event-driven healthcare hub server to handle an increasing number of concurrent connections for Remote Healthcare Monitoring System in an isolated village with no access to local medical care.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134540775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.7236/IJASC.2016.5.3.40
Jiacang Ho, Dae-Ki Kang
The internet allows the information to flow at anywhere in anytime easily. Unfortunately, the network also becomes a great tool for the criminals to operate cybercrimes such as identity theft. To prevent the issue, using a very complex password is not a very encouraging method. Alternatively, keystroke dynamics helps the user to solve the problem. Keystroke dynamics is the information of timing details when a user presses a key or releases a key. A machine can learn a user typing behavior from the information integrate with a proper machine learning algorithm. In this paper, we have proposed mini-batch ensemble (MIBE) method which does the preprocessing on the original dataset and then produces multiple mini batches in the end. The mini batches are then trained by a machine learning algorithm. From the experimental result, we have shown the improvement of the performance for each base algorithm.
{"title":"Mini-Batch Ensemble Method on Keystroke Dynamics based User Authentication","authors":"Jiacang Ho, Dae-Ki Kang","doi":"10.7236/IJASC.2016.5.3.40","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.3.40","url":null,"abstract":"The internet allows the information to flow at anywhere in anytime easily. Unfortunately, the network also becomes a great tool for the criminals to operate cybercrimes such as identity theft. To prevent the issue, using a very complex password is not a very encouraging method. Alternatively, keystroke dynamics helps the user to solve the problem. Keystroke dynamics is the information of timing details when a user presses a key or releases a key. A machine can learn a user typing behavior from the information integrate with a proper machine learning algorithm. In this paper, we have proposed mini-batch ensemble (MIBE) method which does the preprocessing on the original dataset and then produces multiple mini batches in the end. The mini batches are then trained by a machine learning algorithm. From the experimental result, we have shown the improvement of the performance for each base algorithm.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131517676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.7236/IJASC.2016.5.3.61
Joseph Mfitumukiza, V. Mariappan, Minwoo Lee, Seungyoun Lee, Junghoon Lee, Juyoung Lee, Yunsik Lim, J. Cha
In the TV broadcasting, movie production and business the transportation of video between creators (programmers, studios) and distributors (broadcast and cable networks, cable and satellites companies) is still a mix of File Transfer Protocol (FTP), physical delivery, and expensive multicast satellite. Cloud-based file sync-and-share providers like Dropbox and box are playing an increasing role, but the industry’s unique demands for speed and multicasting have fueled the growth of IP Video transport. This paper gives a solid grasp of the major elements of IP video technology, including content preparation, system architecture alternatives and network performance management.
{"title":"IP Studio Infrastructure intended for Modern Production and TV broadcasting Facilities","authors":"Joseph Mfitumukiza, V. Mariappan, Minwoo Lee, Seungyoun Lee, Junghoon Lee, Juyoung Lee, Yunsik Lim, J. Cha","doi":"10.7236/IJASC.2016.5.3.61","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.3.61","url":null,"abstract":"In the TV broadcasting, movie production and business the transportation of video between creators (programmers, studios) and distributors (broadcast and cable networks, cable and satellites companies) is still a mix of File Transfer Protocol (FTP), physical delivery, and expensive multicast satellite. Cloud-based file sync-and-share providers like Dropbox and box are playing an increasing role, but the industry’s unique demands for speed and multicasting have fueled the growth of IP Video transport. This paper gives a solid grasp of the major elements of IP video technology, including content preparation, system architecture alternatives and network performance management.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134302112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.7236/IJASC.2016.5.3.27
Se-Hwan Park, Jongkyu Park
High-tech industries in a state well enough to troubleshoot hacking information introduction a big barrier to delay the growth of the market related to IoT(Internet of Things) as is likely to be on the rise. This early on, security issues introduced in the solution, a comprehensive solution, including the institutional laws/precautions needed. Recent examples of frequent security threats while IoT is the biggest issue of introducing state-of-the-art industry information due to the vulnerable security hacking. This high-tech industries in order to bridge the information responsible for the target attribute, target range, and the protection of security and how to protect the subject, IoT environment (domestic industrial environment) considering the approach is needed. IoTs with health care and a wide variety of services, such as wearable devices emerge. This ensures that RFID/USN-based P2P/P2M/M2M connection is the implementation of the community. In this study, the issue on the high-tech industrial information and the vulnerable security issues of IoT are described.
{"title":"IoT Industry & Security Technology Trends","authors":"Se-Hwan Park, Jongkyu Park","doi":"10.7236/IJASC.2016.5.3.27","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.3.27","url":null,"abstract":"High-tech industries in a state well enough to troubleshoot hacking information introduction a big barrier to delay the growth of the market related to IoT(Internet of Things) as is likely to be on the rise. This early on, security issues introduced in the solution, a comprehensive solution, including the institutional laws/precautions needed. Recent examples of frequent security threats while IoT is the biggest issue of introducing state-of-the-art industry information due to the vulnerable security hacking. This high-tech industries in order to bridge the information responsible for the target attribute, target range, and the protection of security and how to protect the subject, IoT environment (domestic industrial environment) considering the approach is needed. IoTs with health care and a wide variety of services, such as wearable devices emerge. This ensures that RFID/USN-based P2P/P2M/M2M connection is the implementation of the community. In this study, the issue on the high-tech industrial information and the vulnerable security issues of IoT are described.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-30DOI: 10.7236/IJASC.2016.5.3.16
Daniel Godfrey, Mihwa Song
This proposed project is about a bicycle anti theft devised system which helps people protect the bicycle from theft and helps to track the stolen bicycle’s location using a smart phone. Safety bike uses two main devices to keep the bicycle secured, the vibration sensor and GPS sensor. The purpose of this project is to put all these small devices into one well connected system which will help the bicycle owner have more control over the security of his own bicycle. The whole system can be divided into two main parts. The first part is about the hardware development whereby all electronics components are connected via the circuit design using wire wrapping technique. This hardware part includes, a vibrations sensor, a GPS receiver, a toggle switch, LED light, Bluetooth and a buzzer. Wireless Bluetooth signals are used as the means of communication between the smartphone and the microcontroller. The second part is the software part which is being to program and control the whole system. The program is written using MikroBasic, a full-featured Basic compiler for microcontroller based systems. In conclusion, this system is designed to enable user to have control in securing his/her bicycle also being able to find and locate it at any time using GPS receiver and mobile android application.
{"title":"Safe Bike : Secure your Bicycle with this smart Arduino based GPS device","authors":"Daniel Godfrey, Mihwa Song","doi":"10.7236/IJASC.2016.5.3.16","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.3.16","url":null,"abstract":"This proposed project is about a bicycle anti theft devised system which helps people protect the bicycle from theft and helps to track the stolen bicycle’s location using a smart phone. Safety bike uses two main devices to keep the bicycle secured, the vibration sensor and GPS sensor. The purpose of this project is to put all these small devices into one well connected system which will help the bicycle owner have more control over the security of his own bicycle. The whole system can be divided into two main parts. The first part is about the hardware development whereby all electronics components are connected via the circuit design using wire wrapping technique. This hardware part includes, a vibrations sensor, a GPS receiver, a toggle switch, LED light, Bluetooth and a buzzer. Wireless Bluetooth signals are used as the means of communication between the smartphone and the microcontroller. The second part is the software part which is being to program and control the whole system. The program is written using MikroBasic, a full-featured Basic compiler for microcontroller based systems. In conclusion, this system is designed to enable user to have control in securing his/her bicycle also being able to find and locate it at any time using GPS receiver and mobile android application.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114056083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}