Título: Implementation of Integrity of Voice and face Recognition for Home Security by using GSM AND ZIGBEE
Autores: Lokanadham, Chandrasekhar; V.R.S. & Y.R.N. College of Eng & Tech., Chirala
Subbarao, B. Purna V.; V.R.S. & Y.R.N. College of Eng & Tech., Chirala
Santhisri, V.; V.R.S. & Y.R.N. College of Eng & Tech., Chirala
Fecha: 2012-08-12
Publicador: International journal of computer and electronics research
Fuente:
Tipo: Peer-reviewed Article
Tema: Voice, pattern; IRIS, authentication; GSM, Smart Sensors; Zigbee; SMS; A/ D Converter; Embedded C; Flash magic.Voice; pattern; IRIS; authentication; GSM; Smart Sensors; Zigbee; SMS; A/ D Converter; Embedded C; Flash magic.
Computer Science
Descripción: Home security is very popular in present days in its simplest form home controlling is the ability to control lighting , household and image reorganization appliances remotely with this device automation safety from theft, leak in of raw gas and fire is also the most important requirement of home for people by combining wireless sensor net work and GSM technology, In this proposes a new solution for remote home security and device control system. The system is composed of the ARM7 based WSN center node with GSM module, data collecting node , device control node and mobile phone. The WSN data collecting node module is connected with PIR, temperature sensor, smoke detector and gas sensor separately and send data to the data collecting node. Advances in the field of Information Technology also make Information Security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a review on the Voice authentication techniques and somefuture possibilities in this field. In Voice & face, a human being needs to be identified based on some characteristic physiological parameters. A wide variety of systems require reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services.The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user, and not anyone else. By using Voice & ace it is possible to confirm or establish an individual’s identity. The position of biometrics in the current field of Security has been depicted in this work. We have also outlined options about the usability of voice and face authentication systems. The data collecting node will send encoded alarm signal to the WSN center node through WSN sensor network established in home . Once the WSN center node receives alarm signal, it will send alarm SMS to the users through the GSM module and GSM network immediately.
Idioma: Inglés

Artículos similares:

A hybrid k-Mean-GRASP for partition based Clustering of two-dimensional data space as an application of p-median problem por Nadella, Sunil; Associate Professor,P.G. Dept of Computer Science, Ideal College of Arts & Sciences, Kakinada,M V S V, Kiranmai; Lecturer ,Department of CSE,University College of Engineering,JNTU Kakinada,Gugulotu, Narasimha; Department of CSE JNTUH College of Engineering, Nachupally, Kondagattu,Karimnagar
Architecture of Mobile application, Security issues and Services involved in Mobile Cloud Computing Environment por Saini, Swarnpreet SIngh; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Bagga, Ritu; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Singh, Devinder; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Jangwal, Tarun; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar
A Novel approach of Hybrid Method of Hiding the Text Information Using Stegnography por R, Thamaraiselvan; Assistant Professor Dept. of Computer Applications M.G.R.College Dr. MGR Nagar Hosur - 635109 TN, India,Saradha, A.; Professor and Head, Department of Computer Science and Engineering, Institute of Road and Transport Technology, Erode, TN, India
RSA Algorithm Implementation for Ciphering Medical Imaging por Ali, Samoud; Signal processing Laboratory - Science Faculty of Tunis , 1060 Tunis.,Adnen, Cherif; Signal processing Laboratory - Science Faculty of Tunis , 1060 Tunis.
A STUDY ON KNOWLEDGE ACQUISITION APPROACH FOR COMPOSITE AEROSPACE COMPONENT DESIGN por Sivaraman, G; Assistant Professor & HeadDept. of Computer ApplicationsM.G.R.CollegeDr. MGR NagarHosur - 635109TN
Corpus based Emotion Extraction to implement prosody feature in Speech Synthesis Systems por Chandak, Manoj B; DEPTT. OF COMPUTER SCIENCE AND ENGG S.R.K.N.E.C NAGPUR UNIVERSITY,Bhutekar, Swati
A NEW DATA HIDING METHOD USING PIXEL POSITION AND LOGICAL AND OPERATION por Saini, Ravi; C.M.R.A., GP Sanghi,Rohtak, Haryana,Yadav, Rajkumar; U.I.E.T, Maharshi Dayanand University, Rohtak
A New Focus on Distance Learning for Physically Impaired Students: A Multi-agent Oriented Approach por Pujari, Shiladitya; University Institute of Technology, Burdwan University,Mondal, Subrata
Productivity Inference with Dynamic Bayesian Models in Software Development Projects por Naman, Abou Bakar; Department of Comptuer Science & Information Technology Sarhad University,Lali, M.Ikram.; University of education Lahore, Attock campus
10