Smart home microcontroller: Telephone interfacing
In this paper, we present the results of the effort to design and produce a smart home system, PhoneTech. PhoneTech has been designed and built utilizing the telephone network to enable users to remotely control an array of automated home electronic devices by entering a series of commands through p...
| Main Authors: | Leong, , CS, Goi,, BM |
|---|---|
| Format: | Article |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2064/ |
Similar Items
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
MaTRU: A new NTRU-based cryptosystem
by: Coglianese, , M, et al.
Published: (2005)
by: Coglianese, , M, et al.
Published: (2005)
On the security bounds of CMC, EME, EME(+) and EME* - Modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Cryptanalysis of PASS II and MiniPass
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Modelling interface aesthetics
by: Ngo, David Chek Ling, et al.
Published: (2003)
by: Ngo, David Chek Ling, et al.
Published: (2003)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
An integrated approach for head gesture based interface
by: Lee, Gin Chong, et al.
Published: (2012)
by: Lee, Gin Chong, et al.
Published: (2012)
Microcontroller based standalone PV system for wireless sensor node
by: Azim, Md. Anwarul, et al.
Published: (2008)
by: Azim, Md. Anwarul, et al.
Published: (2008)
Preliminary Work on Speech Unit Selection Using Syntax Phonology Interface
by: Tiun, Sabrina, et al.
Published: (2008)
by: Tiun, Sabrina, et al.
Published: (2008)
Interfacing of biped KHR-1 with DSP board TMS320F2812
by: Lim, Chot Hun, et al.
Published: (2006)
by: Lim, Chot Hun, et al.
Published: (2006)
Compute Language Interface: A Transparent Wrapper Library For Multi Cpu-Gpu
by: Ooi, Keng Siang
Published: (2013)
by: Ooi, Keng Siang
Published: (2013)
Smart Child Portal: User Requirements For Children‟S Portal
by: Basim Obaid N, Althagfi
Published: (2010)
by: Basim Obaid N, Althagfi
Published: (2010)
Real time actions and gestures as intuitive user interface for creative 3D modeling
by: Looi, N.K., et al.
Published: (2005)
by: Looi, N.K., et al.
Published: (2005)
'Push' and 'Pull' Modeling In RosettaNet's Business-To -Business e-Commerce Partner Interface Processes.
by: Ting, Tin Tin, et al.
Published: (2007)
by: Ting, Tin Tin, et al.
Published: (2007)
An E-Book Building Methodology Using An Extensible Personalization Structure For Operationalizing E-Book Interface Metaphors
by: Hameed, M. Noorul
Published: (2010)
by: Hameed, M. Noorul
Published: (2010)
Classification Of P300 Signals In Brain-Computer Interface Using Neural Networks With Adjustable Activation Functions
by: Aslarzanagh, Seyed Aliakbar Mousavi
Published: (2013)
by: Aslarzanagh, Seyed Aliakbar Mousavi
Published: (2013)
Factors Influencing The Adoption Of Internet Of Things For Home Security In Dhaka Households
by: Mahmud, Arif
Published: (2023)
by: Mahmud, Arif
Published: (2023)
Improving the performance of two-state mental task brain-computer interface design using linear discriminant classifier
by: Palaniappan, , R, et al.
Published: (2005)
by: Palaniappan, , R, et al.
Published: (2005)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
CPC357 – IoT Architecture and Smart Applications
(Seni Bina dan Aplikasi Pintar IoT)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
Quantifying the narration board for visualising final design concepts by interface designers
by: Wong, Chui Yin, et al.
Published: (2007)
by: Wong, Chui Yin, et al.
Published: (2007)
An integrated vision-based architecture for home security system
by: See, J., et al.
Published: (2007)
by: See, J., et al.
Published: (2007)
A context-aware architecture for smart space environment
by: Goh, E., et al.
Published: (2007)
by: Goh, E., et al.
Published: (2007)
Context modeling and reasoning in a smart space environment
by: Yin, Erin Goh Yii, et al.
Published: (2007)
by: Yin, Erin Goh Yii, et al.
Published: (2007)
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008)
by: TING, G, et al.
Published: (2008)
QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
by: Yiqi, Tew, et al.
Published: (2008)
by: Yiqi, Tew, et al.
Published: (2008)
QSCILLOSCOPE: A PC-Based Real Time Oscilloscope
by: Yiqi, Tew, et al.
Published: (2008)
by: Yiqi, Tew, et al.
Published: (2008)
Accepting Multipurpose “Smart” Identity Cards in a Developing Country
by: Heng, Paul Ping Yeow, et al.
Published: (2007)
by: Heng, Paul Ping Yeow, et al.
Published: (2007)
A fast motion sensing algorithm for vision based mobile phones user interface design
by: Chang, Yoong Choon, et al.
Published: (2009)
by: Chang, Yoong Choon, et al.
Published: (2009)
Data Mining and Warehousing Approaches on School Smart System: A Conceptual Framework
by: Janson Luke Ong Wai, Kit, et al.
Published: (2008)
by: Janson Luke Ong Wai, Kit, et al.
Published: (2008)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008)
by: Phan, Raphael C.-W., et al.
Published: (2008)
A fragile watermarking scheme protecting originator's rights for multimedia service
by: Ting, Grace C. -W., et al.
Published: (2007)
by: Ting, Grace C. -W., et al.
Published: (2007)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
Security mediated certificateless signatures
by: Yap, Nvun-She, et al.
Published: (2007)
by: Yap, Nvun-She, et al.
Published: (2007)
Similar Items
-
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005) -
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005) -
MaTRU: A new NTRU-based cryptosystem
by: Coglianese, , M, et al.
Published: (2005) -
On the security bounds of CMC, EME, EME(+) and EME* - Modes of operation
by: Phan, , RCW, et al.
Published: (2005) -
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)