“…Smart devices are the controlling devices or the devices which give instruction and other devices are the slave devices that perform tasks that are to be instructed or programmed by the controlling module. This system requires that all the devices are to be connected to the cloud all the time for remote access of the system and to synchronize the devices so the functionality should not be compromised [46][47][48]. It has features like notification of urgent calls and messages over laptop or web application if a smartphone is not in reach or the music is loud and your ringtone or notification tone is not audible, etc.…”
he main problem that we face today is not about getting services, but how efficiently we manage them. We are living in an era where we cannot neglect the fact that we are now depending on various electronic devices which we use daily in our life. These devices have become an inseparable part of our life, in the present scenario technology is evolving so rapidly that it's a fact if we do not accept any upcoming trend then we lag behind in the eye of others. Managing all these devices and remembering to tune them is quite a hectic task, as we have to do other main tasks too. Using every device efficiently at the same time is not possible. Hence, we came up with a solution, with a system that will manage all these devices according to predefined rules or instructions. Current smart home systems work in a way, to establish a connection between nodes and a hub and are controlled by smartphones, computers, remote, etc. In this research paper, we have proposed a model that will not only establish a connection but will work smartly according to instructions and algorithms saved earlier. This Auxiliary Informatics System (AuxIS) will serve the requirement of managing all the devices in a parallel fashion with very little human intervention and hence, will make a smarter home environment.
“…Smart devices are the controlling devices or the devices which give instruction and other devices are the slave devices that perform tasks that are to be instructed or programmed by the controlling module. This system requires that all the devices are to be connected to the cloud all the time for remote access of the system and to synchronize the devices so the functionality should not be compromised [46][47][48]. It has features like notification of urgent calls and messages over laptop or web application if a smartphone is not in reach or the music is loud and your ringtone or notification tone is not audible, etc.…”
he main problem that we face today is not about getting services, but how efficiently we manage them. We are living in an era where we cannot neglect the fact that we are now depending on various electronic devices which we use daily in our life. These devices have become an inseparable part of our life, in the present scenario technology is evolving so rapidly that it's a fact if we do not accept any upcoming trend then we lag behind in the eye of others. Managing all these devices and remembering to tune them is quite a hectic task, as we have to do other main tasks too. Using every device efficiently at the same time is not possible. Hence, we came up with a solution, with a system that will manage all these devices according to predefined rules or instructions. Current smart home systems work in a way, to establish a connection between nodes and a hub and are controlled by smartphones, computers, remote, etc. In this research paper, we have proposed a model that will not only establish a connection but will work smartly according to instructions and algorithms saved earlier. This Auxiliary Informatics System (AuxIS) will serve the requirement of managing all the devices in a parallel fashion with very little human intervention and hence, will make a smarter home environment.
“…There is no such thing as "THE CLOUD", it's just somebody else's computer. Cloud computing is also called ondemand computing and it is a kind of web-based processing, where participating resources and data are rendered to workstations and different gadgets according to demand [1,2]. Cloud computing is essentially intended to give the most extreme limit from the least resources [3,4].…”
<p>This paper is about preserving the Cloud data whose idea is to cure everyday problems with computing. Cloud computing is fundamentally pooling the resources virtually and the resources like storage are provided to the end-users through the web. Information preservation, security, uniform quality, and interoperability are some issues related to cloud computing. However, the most essential issue is Security and how it is ensured by a cloud supplier. Security of data can be offered by means of cryptography. This paper presents an improved composite data protection mechanism to protect data on the cloud from illegitimate access.</p>
“…On the other hand, MA security aims to protect MA against malicious hosts that may attack the MA integrity. In addition, malicious hosts may prevent MAs to continue their journeys (Capturing) [15]. Two main approaches to deal with MA security issues: detection or prevention approaches.…”
Mobile Agent has many benefits over traditional distributed systems such as reducing latency, bandwidth, and costs. Mobile Agent Systems are not fully utilized due to security problems. This paper focuses on mobile agent protection against malicious hosts. A new security mechanism called Checkpoints has been proposed. Checkpoint Mechanism (CPM) aims to protect Mobile Agent against malicious hosts in case of Capturing and Integrity attacks. CPM assumes using a free-roaming mobility mechanism by Mobile agent systems. The main idea behind CPM is to generate multiple versions of Mobile Agent. The multiple version is used to recover Mobile Agent from Capturing and Integrity attacks by untrusted hosts. MA versions are kept in Recovery Host(RH). RH plays a key role in CPM by controlling and monitoring MAs' recovery processes. A prototype method has been used to prove the feasibility of CPM. The prototype was implemented by using the .Net framework and C#. full discussion for several scenarios has been done to analyze the feasibility and performance for CPM. As found from this research, CPM has a strong ability to protect Mobile Agents from Capturing and Integrity attacks completely. In addition, there is no negative impact on the overall performance of the mobile agent system.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.