SlideShare a Scribd company logo
1 of 8
Download to read offline
Natarajan Meghanathan, et al. (Eds): SIPM, FCST, ITCA, WSE, ACSIT, CS & IT 06, pp. 259–266, 2012.
© CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2325
UBIQUITOUS NETWORK TECHNICAL ROOM
MONITORING SYSTEM MODEL USING WEB
SERVICE
Ha Quoc Trung1
1
Department of Data Communication and Computer Network, School of
Information and Telecommunication Technology, Hanoi University of Science
and Technology, Hanoi, Vietnam
trunghq@soict.hut.edu.vn
ABSTRACT
Ubiquitous computing allows more efficient exploitation of information systems, economizes
user cost and effort to use the information system. The network technical room monitoring
problem, arising from network management practice, is important to operate the network, to
discover and resolve unpredictable situation. In addition, many of monitoring and sensor
product are shipped with closed proprietary software, and the interoperability between them is
very difficult. In this article, the author present several ubiquitous computing technologies,
propose a model of ubiquitous monitoring system for network technical room. This model
allows monitoring the network technical room remotely, via variable terminal devices and
variable communication infrastructure. The model has been implemented in Hanoi University of
Science and Technology (HUST) Network Information Centre with IP Cameras and RFID
devices.
KEYWORDS
Ubiquitous, pervasive, monitoring, distributed system.
1. INTRODUCTION
In network management practice, there are many cases that users without technical competence
try to modify network configuration both logically such as access to control terminal and
physically such as switching cables. These cases lead to network fails that are difficult to discover
and repair. These situations raise the need of a monitoring system for the technical room. This
kind of monitoring system provides additional information about what is the fail happened, who
is responsible for the fail and how to recover the fail [1]. In addition, nowadays network-
monitoring systems can monitor the network devices, network communication channels, but not
the space that they are situated [3]. The network technical room monitoring system, in integration
with the classic monitoring system, allows monitoring the device environment and to facilitate
failing discovering and recovering.
With the availability of ubiquitous computing equipment, especially monitoring cameras, card
readers, sensors, the task of space monitoring can be done in integration of several systems from
different kinds [5].
260 Computer Science & Information Technology ( CS & IT )
Unfortunately, the monitoring equipment, the sensor systems are normally offered with specific,
proprietary software to manage and exploit the devices. So the integration of the systems is
difficult, base on fact that very little real-time information is allowed to be accessed from external
programs. Anyway, these systems normally offer a web interface allowing users (not user’s
application) to access collected data.
In order to integrate different products in to an unified system, an intermediated component is
needed. The functionality of the component is two folds. In relation with the monitoring device,
the component must act as the end user, collects and store real-time information and store. In
relation with the ubiquitous monitoring system, this component provides real-time processed
information, raises triggers and generates event. In our solution, the component is simulated and
implemented by a computer, but in the future, this computer can be embedded.
In this article, based on ubiquitous computing technology, a model for network technical room
monitoring system is proposed. The model allows: (i) using IP camera and RFID card reader to
monitor network technical room; (ii) access the monitoring system via different kind of end user
devices and communication infrastructures. The model is experimentally implemented and tested
at Hanoi University of Science and Technology’s Network Information Center.
The paper is organized as the following: section 1 gives an introduction, section 2 describes
several ubiquitous monitoring technologies such as IP camera, RFID, and some frame work to
develop ubiquitous application; section 3 presents the model of network monitoring system;
section 4 gives information about implementation and testing and section 5 gives some
conclusion and perspectives.
2. UBIQUITOUS TECHNOLOGIES
In order to monitoring in an indoor space, the following technologies can be used:
IP camera allows monitor and store audio-video information about preconfigured space. A
monitoring system using IP camera consists of one or multiple IP camera, distributed on
monitored locations, and a concentrated display in a dedicated for monitoring goals space. The IP
cameras and the displays are connected by a cable, in some case wireless network, and are
controlled by software. The producer of the system normally provides this software. Common
functionalities of such system are:
- Continuously capture picture or video from monitored space.
- Control of detail and quality of the picture and video (i.e. focus, zoom…).
- Storage of video and picture (by some rotation mechanism)
- Detection abnormal situation: motion, interruption of connection, …
- Provide an easy-to-use interface for the users.
Normally, a system of such type is well packaged, ready for use. If users need some special
functionality of the system, the producer provides an API allowing users to develop new
functionality. Unfortunately, the API is proprietary, expensive, and support only specific
hardware and software from the vendor. That makes the development of new functionality
hard.When using the motion detection function of the IP camera for authentication, a
disadvantage of IP camera is that we cannot authenticate the person, caused by low quality image.
IP Camera is better used in combination with other authentication methods such as fingerprint,
RFID or magnetic readers. Anyway, audio-video content information that can be used for
validating authentication results [4]. This is the reason why in our solution includes the IP
Computer Science & Information Technology ( CS & IT ) 261
Camera component. As mentioned before, one of the problems is the difficulty to develop the
function to interact with other systems.
RFID (radio frequency identification device) [5] allows identifying people and things by tag
attached to them. RFID can be used for monitoring as it provides the capability of authentication.
The RFID tag is used to identify the tag bearer. The RFID system consists of RFID reader, the
distributed control device and a central database system. The RFID reader reads the ID of the tag;
send it to central control system. The control system then verifies the correspond credential and
send it back to the control device if passed. The device then activates the mechanism to allow
bearer access the protected object. The problem is that RFID tag can be attached with different
object. A multiple authentication mechanism can resolve the problem. In our solution, RFID tag
is included with IP Camera such that identification by tag can by batch verified by IP Camera.
RFID middleware [6,7] processes the data acquired from the reader and then updates it to the
backend database or other systems. An open-source RFID middleware is appropriate for our
solution to allow we add own business logic and easy to extend the system. There are numbers of
different open-source option for RFID middleware like Mobitec, Fosstrak and Rifidi. The reason
we use Rifidi is it have complete development tool for design, simulation, testing and a lot of API
to develop we application. In addition, the middleware work not only with RFID reader, but also
with bar-code scanner, sensor, and other hardware such as cameras [3].
Rifidi Edge is a complete RFID middleware platform with an edge server and development tools
to enable the development and deployment of highly customized RFID applications. It contain
three conceptual architectural layers:
- Sensor Abstraction Layer: allow user connect to device to collect the kind of data
required for the application.
- Application Engine Layer: The Layer is intended to let application weight loss pills
developers build much of the functionality of their RFID applications using esper-
queries.
- Communication Layer: The edge server has several built in connectors to use, namely
JMS and Web Services (via Spring's remote framework). However, as this is
application-independent, it is possible to write your own connector (such as a TCP/IP
socket connection) if the application needs it.
Fortunately, these characteristics make the development of new functionality of the RFID much
easier.
Context-aware computing. [8] Another requirement of the system is the access by different kind
of terminal devices and communication media. The computing part of the system needs to detect
the terminal and communication characteristics, and then format the information suitable for this
context of interaction. That is called context awareness computing [7]. In our solution, a
ubiquitous engine is used to convert and reformat information suitable for different kind of
terminal is needed.
Ubiquitous computing framework.[9] To implement the context awareness computation, there
are variable choices of the implementation framework. In our case, we need a framework
allowing connecting different sensor and monitoring system from different producers. That the
reasons why we choose a general, universal and open framework. Of course, we’ll have more
work to develop the needed functionalities. Web Service is the tool that we choose.
262 Computer Science & Information Technology ( CS & IT )
Web service provides connectivity, discoverability between software component using HTTP as
transmission protocol and XML as data definition language. In ubiquitous computing, web
services allow ubiquitous device can send and receive information easily to processing server. We
can easily customize the server, the protocol to meet the specification of the sensor part of the
system.
Combine monitoring
As analyzed above, RFID authentication has several advantages: simple and flexible
authentication; authenticates by RFID tag id; can be used with physical access control devices.
But it also has some disadvantages: no information about access period; It is not strong enough.
Every one who has a RFID tag can be authenticated.
IP camera monitoring gives us the capability to capture video and picture in a customizable way,
but it can not gives us the details functional information about the monitored object.
The idea is to combine the monitoring by RFID and by IP camera in a way that authentication can
be double checked by the 2 systems online or offline. The log and traces from RFID will be
extended with video and pictures from the IP Camera monitoring system. These video and
pictures are taken from preconfigured action for indoor – network technical room- spaces. To
accomplish this task, interaction between 2 systems has to be designed and implemented, with
condition that RFID sub-system is open source, while IP camera system is closed and proprietary.
3. THE SYSTEM MODEL AND FUNCTIONALITY
The system requirement: Technical room monitoring requires the following functionalities: (i)
supports traceable entries, operations and exit in the working space; (ii) supports traceable
activities on pre-configured equipment; (iii) provides automatically identification and
authentication of the object; (iv) provides access to the system via different devices and
communication media.
The system is organized in 3 subsystems: the local subsystem, the central subsystem and the
monitoring subsystem. The local subsystem is for administrator-monitor. The central system
consists of overall monitoring logics of the system. The monitoring points server for real-time
monitoring, access control and authentication.
Central
Server
Monitored
points
Monitored
points
Monitored
points
Mobile
Application
Desktop
Application
Desktop
ApplicationLocal Subsystem
Central Subsystem
Monitoring
Subsystem
Figure 1: The system overall architecture
Computer Science & Information Technology ( CS & IT ) 263
The monitoring subsystem has several monitoring points. Each monitoring point consists of: an
IP camera, RFID reader(s), a LCD for each RIFD, a computer and a mechanical access control
device (lock, barrier…).
The RFID reader is used to control the physical access to the space via mechanical device. The IP
Camera is installed and configured to control the entrance and part of the space. The LCD is
installed next to the entrance, serving for announcing welcome message for the user. These 3
components are controlled with a computer. This computer is autonomous, self-activate, and will
be embedded. The computer provides a web-service for other part to access collected information
from monitoring devices. The principal functions of each monitoring point are:
- RFID Authentication and Checking.
- Device monitoring by predefined detection zone.
- Configure monitoring devices.
Central system consists of processing server. The server collects information from monitoring
points, process this information with management information in the database. The server
publishes this information using a web server. On this server, context awareness module allows
providing information for different access contexts. The functions of central module are:
- Users (technical administrator) management
- Devices and technical rooms management
- Grouping users and devices
- Search and summary
- Abnormal situation detection and alert.
The local system in fact is the client – end user interface. As well as we use Web Interface, the
problem to resolve is to provide web information conforming to the device’s and communication
link’s capability.
The functional model of the system is described in Figure 2 : Functional Model
Figure 2: Functional model
In this article, we don’t concentrate on the detail analyze of each function. We concentrate on the
functions of each monitoring point. The components of each monitoring point are described on
Figure 3: Monitoring point.
264 Computer Science & Information Technology ( CS & IT )
Mechanical
Lock
RFIDIP Camera
IP Camera SW RFID SWLock SW
Mini LCD
Mini LCD SW
Collective Module
WS1-3 WS4 WS5 WS6
Figure 3: Monitoring point
As mentioned above, in each monitoring point we have to allow interaction between components.
We use web services to transfer from normal software user interface to programmable interfaces.
The list of the web services is presented in Table 1: Monitoring point web services.
Table 1: Monitoring point web services
WS Name Description
1 Forced
monitoring
Activated when a predefined entrance is accessed, or administrators
need to view the IP Camera directly. Accept monitoring commands
and transfers to Camera
2 Conditional
monitoring
Activated when a predefined condition is true (a device is accessed,
some one operates on some devices). Based on motion detection.
3 Configuration Receive configuration from collective modules and transfer it to
camera. Configuration information is depended on monitored
devices.
4 Display
announce
Receive text (audio) message from collective module and send to
LCD and speaker.
5 Authentication
sending
Raised when RFID reader is accessed and sending information
6 Allow access Raised when authentication is successful
Computer Science & Information Technology ( CS & IT ) 265
4. IMPLEMENTATION AND EXPERIMENTATION
The model is implemented in the server room at the HUST’s network information center. One
monitoring system uses 1 camera, 1 RFID card reader, one PC to collect information from camera
and RFID reader. 4 monitoring points are deployed in server room and 3 network technical rooms
in the same building.
For experimental purpose, 4 devices are controlled in the server room. In each network technical
room we monitor only one device. Information about 20 administrators and 3 roles are stored in
the central DB. The system has been tested in 3 months.
The system helps the managers to:
- Control the entry and exit of the technical room;
- Enforce the RFID authentication by camera support;
- Control the important devices (servers and network equipment).
- Determine initiator of the selected configuration activities.
- Access system anytime and anywhere.
5. CONCLUSIONS
The paper presents the model of the ubiquitous network technical room monitoring and its
experimental implementation. The main contributions are:
• Study the monitoring technical room problem
• Study several ubiquitous computing technologies
• Propose the model of the ubiquitous network technical room monitoring
• Implement the model with web services with. The model allows connecting several
proprietary products.
In the future, the system will be extended to serve multiple network technical rooms, and to
integrate more ubiquitous computing technologies such as batch, bioinformatics….
ACKNOWLEDGMENTS
I would like to thank HUST’s BKNIC staffs, which give me the possibility to implement and test
my solution. This work is also supported by Ministerial Project B2010-01-139.
REFERENCES
[1] Ko, Ren-Song. (2011), Anywhere/Anytime Software and Information Access via Collaborative
Assistance. Eduard Babkin, Ubiquitous Computing, 31-49.
[2] Marie-Luce. (2011), Uncertainty and Error Handling in Pervasive Computing: A User's Perspective.
Eduard Babkin. (2011), Ubiquitous Computing, 49-67.
[3] Nicolas Ferry. (2011), Vincent Hourdin, Stéphane Lavirotte, Gaëtan Rey, Michel Riveill and Jean-
Yves Tigli. (2011). WComp, a Middleware for Ubiquitous Computing, Ubiquitous Computing, 151-
177.
266 Computer Science & Information Technology ( CS & IT )
[4] Wanderley Lopes de Souza, Antonio Francisco do Prado, Marcos Forte and Carlos Eduardo Cirilo.
(2011). Content Adaptation in Ubiquitous Computing. Ubiquitous Computing, 67-95.
[5] Bakhouya, Mohamed. (2008). Ubiquitous and pervasive application design, Proceedings of the 2nd
international workshop on Agent-oriented software engineering challenges for ubiquitous and
pervasive computing.
[6] Roussaki, Ioanna, Strimpakou, Maria and Pils, Carsten. (2007). Distributed Context Retrieval and
Consistency Control in Pervasive Computing. Plenum Press, Netw. Syst. Manage., Vol. 15, 57-74.
[7] Reyes, Fernando Martinez and Greenhalgh, Chris. (2009). The User's Touch: A Design Requirement
for Smart Spaces. IJAPUC, Vol. 1, 14-28.
[8] Grzywaczewski, Adam, et al. (2009). An Investigation of User Behavior Consistency for Context-
Aware Information Retrieval Systems. IJAPUC, Vol. 1, 69-90.
[9] Chang, Po-Chien. 1,.(2009). Understanding Consumers' Behavior when Using a Mobile Phone as a
Converged Device. IJAPUC, Vol. 1, 60-74.
Authors
Ha Quoc Trung (Ph. D.) Graduated from Technical University of Sofia in 1996, speciality
“Electronic, Microelectronic and Automation”. In 2004 he completed his Ph. D. degree in
School of Advance Research Practice (Ecole Pratique de Hautes Etudes-Paris, France).
From 1999 to recent he is lecturer at department of data communication and computer
network. His research interests are: distributed algorithm, system and application,
ubiquitous computing.

More Related Content

What's hot

Internet of Things: an overview
Internet of Things: an overviewInternet of Things: an overview
Internet of Things: an overviewPascal Bodin
 
Comparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scadaComparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scadaIJARIIT
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologiesFabMinds
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET Journal
 
Intelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbeeIntelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbeeIAEME Publication
 
Project Report on Intrusion Detection System
Project Report on Intrusion Detection SystemProject Report on Intrusion Detection System
Project Report on Intrusion Detection SystemVishal Polley
 
IoT and connected devices: an overview
IoT and connected devices: an overviewIoT and connected devices: an overview
IoT and connected devices: an overviewPascal Bodin
 
IRJET- Automatic Metro Train using RFID
IRJET- Automatic Metro Train using RFIDIRJET- Automatic Metro Train using RFID
IRJET- Automatic Metro Train using RFIDIRJET Journal
 
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformEnergy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformIRJET Journal
 
IRJET- Intelligent Student Tracking and Monitoring for College Infrastruc...
IRJET-  	  Intelligent Student Tracking and Monitoring for College Infrastruc...IRJET-  	  Intelligent Student Tracking and Monitoring for College Infrastruc...
IRJET- Intelligent Student Tracking and Monitoring for College Infrastruc...IRJET Journal
 
Bb4101307311
Bb4101307311Bb4101307311
Bb4101307311IJERA Editor
 
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...Editor IJCATR
 
Secure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
Secure Dual-mode Robotic Intrusion Detection System for Remote SurveillanceSecure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
Secure Dual-mode Robotic Intrusion Detection System for Remote SurveillanceCSCJournals
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemIOSR Journals
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
3.pillars of embedded io t and physical devices
3.pillars of embedded io t and physical devices3.pillars of embedded io t and physical devices
3.pillars of embedded io t and physical devicesRaghavendra Maggavi
 

What's hot (18)

Internet of Things: an overview
Internet of Things: an overviewInternet of Things: an overview
Internet of Things: an overview
 
Comparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scadaComparative analysis of traditional scada systems and io t implemented scada
Comparative analysis of traditional scada systems and io t implemented scada
 
Communication technologies
Communication technologiesCommunication technologies
Communication technologies
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFID
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Intelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbeeIntelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbee
 
Project Report on Intrusion Detection System
Project Report on Intrusion Detection SystemProject Report on Intrusion Detection System
Project Report on Intrusion Detection System
 
IoT and connected devices: an overview
IoT and connected devices: an overviewIoT and connected devices: an overview
IoT and connected devices: an overview
 
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PIIMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
 
IRJET- Automatic Metro Train using RFID
IRJET- Automatic Metro Train using RFIDIRJET- Automatic Metro Train using RFID
IRJET- Automatic Metro Train using RFID
 
Energy Meters using Internet of Things Platform
Energy Meters using Internet of Things PlatformEnergy Meters using Internet of Things Platform
Energy Meters using Internet of Things Platform
 
IRJET- Intelligent Student Tracking and Monitoring for College Infrastruc...
IRJET-  	  Intelligent Student Tracking and Monitoring for College Infrastruc...IRJET-  	  Intelligent Student Tracking and Monitoring for College Infrastruc...
IRJET- Intelligent Student Tracking and Monitoring for College Infrastruc...
 
Bb4101307311
Bb4101307311Bb4101307311
Bb4101307311
 
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
A Comparative Study Of Remote Access Technologies and Implementation of a Sma...
 
Secure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
Secure Dual-mode Robotic Intrusion Detection System for Remote SurveillanceSecure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
Secure Dual-mode Robotic Intrusion Detection System for Remote Surveillance
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control System
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
3.pillars of embedded io t and physical devices
3.pillars of embedded io t and physical devices3.pillars of embedded io t and physical devices
3.pillars of embedded io t and physical devices
 

Similar to UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE

Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET Journal
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationCHAKER ALLAOUI
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET Journal
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of ThingsIRJET Journal
 
Network Robots - Abhijeet
Network Robots - AbhijeetNetwork Robots - Abhijeet
Network Robots - AbhijeetAbhijeet Kalsi
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemIOSR Journals
 
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...IJTET Journal
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IRJET Journal
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemIRJET Journal
 
IRJET- High Responsive Smart Parking System using IoT
IRJET- High Responsive Smart Parking System using IoTIRJET- High Responsive Smart Parking System using IoT
IRJET- High Responsive Smart Parking System using IoTIRJET Journal
 
Ak4103212215
Ak4103212215Ak4103212215
Ak4103212215IJERA Editor
 
IRJET- Inventory Management System for Warehouse
IRJET- Inventory Management System for WarehouseIRJET- Inventory Management System for Warehouse
IRJET- Inventory Management System for WarehouseIRJET Journal
 
An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System Saptarshi Nag
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyIRJET Journal
 

Similar to UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE (20)

Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...
 
Src 147
Src 147Src 147
Src 147
 
IRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud CommunicationIRJET- Plug and Play Approach: Sensors to Cloud Communication
IRJET- Plug and Play Approach: Sensors to Cloud Communication
 
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and DemonstrationIoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
IoT ( M2M) - Big Data - Analytics: Emulation and Demonstration
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
 
Network Robots - Abhijeet
Network Robots - AbhijeetNetwork Robots - Abhijeet
Network Robots - Abhijeet
 
Embedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control SystemEmbedded Web Server based Interactive data acquisition and Control System
Embedded Web Server based Interactive data acquisition and Control System
 
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
IRJET- High Responsive Smart Parking System using IoT
IRJET- High Responsive Smart Parking System using IoTIRJET- High Responsive Smart Parking System using IoT
IRJET- High Responsive Smart Parking System using IoT
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
Ak4103212215
Ak4103212215Ak4103212215
Ak4103212215
 
IRJET- Inventory Management System for Warehouse
IRJET- Inventory Management System for WarehouseIRJET- Inventory Management System for Warehouse
IRJET- Inventory Management System for Warehouse
 
An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System An Internet Based Interactive Data Acquisition System
An Internet Based Interactive Data Acquisition System
 
Comparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi TechnologyComparative Study on Various System Based on Raspberry-Pi Technology
Comparative Study on Various System Based on Raspberry-Pi Technology
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE

  • 1. Natarajan Meghanathan, et al. (Eds): SIPM, FCST, ITCA, WSE, ACSIT, CS & IT 06, pp. 259–266, 2012. © CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2325 UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE Ha Quoc Trung1 1 Department of Data Communication and Computer Network, School of Information and Telecommunication Technology, Hanoi University of Science and Technology, Hanoi, Vietnam trunghq@soict.hut.edu.vn ABSTRACT Ubiquitous computing allows more efficient exploitation of information systems, economizes user cost and effort to use the information system. The network technical room monitoring problem, arising from network management practice, is important to operate the network, to discover and resolve unpredictable situation. In addition, many of monitoring and sensor product are shipped with closed proprietary software, and the interoperability between them is very difficult. In this article, the author present several ubiquitous computing technologies, propose a model of ubiquitous monitoring system for network technical room. This model allows monitoring the network technical room remotely, via variable terminal devices and variable communication infrastructure. The model has been implemented in Hanoi University of Science and Technology (HUST) Network Information Centre with IP Cameras and RFID devices. KEYWORDS Ubiquitous, pervasive, monitoring, distributed system. 1. INTRODUCTION In network management practice, there are many cases that users without technical competence try to modify network configuration both logically such as access to control terminal and physically such as switching cables. These cases lead to network fails that are difficult to discover and repair. These situations raise the need of a monitoring system for the technical room. This kind of monitoring system provides additional information about what is the fail happened, who is responsible for the fail and how to recover the fail [1]. In addition, nowadays network- monitoring systems can monitor the network devices, network communication channels, but not the space that they are situated [3]. The network technical room monitoring system, in integration with the classic monitoring system, allows monitoring the device environment and to facilitate failing discovering and recovering. With the availability of ubiquitous computing equipment, especially monitoring cameras, card readers, sensors, the task of space monitoring can be done in integration of several systems from different kinds [5].
  • 2. 260 Computer Science & Information Technology ( CS & IT ) Unfortunately, the monitoring equipment, the sensor systems are normally offered with specific, proprietary software to manage and exploit the devices. So the integration of the systems is difficult, base on fact that very little real-time information is allowed to be accessed from external programs. Anyway, these systems normally offer a web interface allowing users (not user’s application) to access collected data. In order to integrate different products in to an unified system, an intermediated component is needed. The functionality of the component is two folds. In relation with the monitoring device, the component must act as the end user, collects and store real-time information and store. In relation with the ubiquitous monitoring system, this component provides real-time processed information, raises triggers and generates event. In our solution, the component is simulated and implemented by a computer, but in the future, this computer can be embedded. In this article, based on ubiquitous computing technology, a model for network technical room monitoring system is proposed. The model allows: (i) using IP camera and RFID card reader to monitor network technical room; (ii) access the monitoring system via different kind of end user devices and communication infrastructures. The model is experimentally implemented and tested at Hanoi University of Science and Technology’s Network Information Center. The paper is organized as the following: section 1 gives an introduction, section 2 describes several ubiquitous monitoring technologies such as IP camera, RFID, and some frame work to develop ubiquitous application; section 3 presents the model of network monitoring system; section 4 gives information about implementation and testing and section 5 gives some conclusion and perspectives. 2. UBIQUITOUS TECHNOLOGIES In order to monitoring in an indoor space, the following technologies can be used: IP camera allows monitor and store audio-video information about preconfigured space. A monitoring system using IP camera consists of one or multiple IP camera, distributed on monitored locations, and a concentrated display in a dedicated for monitoring goals space. The IP cameras and the displays are connected by a cable, in some case wireless network, and are controlled by software. The producer of the system normally provides this software. Common functionalities of such system are: - Continuously capture picture or video from monitored space. - Control of detail and quality of the picture and video (i.e. focus, zoom…). - Storage of video and picture (by some rotation mechanism) - Detection abnormal situation: motion, interruption of connection, … - Provide an easy-to-use interface for the users. Normally, a system of such type is well packaged, ready for use. If users need some special functionality of the system, the producer provides an API allowing users to develop new functionality. Unfortunately, the API is proprietary, expensive, and support only specific hardware and software from the vendor. That makes the development of new functionality hard.When using the motion detection function of the IP camera for authentication, a disadvantage of IP camera is that we cannot authenticate the person, caused by low quality image. IP Camera is better used in combination with other authentication methods such as fingerprint, RFID or magnetic readers. Anyway, audio-video content information that can be used for validating authentication results [4]. This is the reason why in our solution includes the IP
  • 3. Computer Science & Information Technology ( CS & IT ) 261 Camera component. As mentioned before, one of the problems is the difficulty to develop the function to interact with other systems. RFID (radio frequency identification device) [5] allows identifying people and things by tag attached to them. RFID can be used for monitoring as it provides the capability of authentication. The RFID tag is used to identify the tag bearer. The RFID system consists of RFID reader, the distributed control device and a central database system. The RFID reader reads the ID of the tag; send it to central control system. The control system then verifies the correspond credential and send it back to the control device if passed. The device then activates the mechanism to allow bearer access the protected object. The problem is that RFID tag can be attached with different object. A multiple authentication mechanism can resolve the problem. In our solution, RFID tag is included with IP Camera such that identification by tag can by batch verified by IP Camera. RFID middleware [6,7] processes the data acquired from the reader and then updates it to the backend database or other systems. An open-source RFID middleware is appropriate for our solution to allow we add own business logic and easy to extend the system. There are numbers of different open-source option for RFID middleware like Mobitec, Fosstrak and Rifidi. The reason we use Rifidi is it have complete development tool for design, simulation, testing and a lot of API to develop we application. In addition, the middleware work not only with RFID reader, but also with bar-code scanner, sensor, and other hardware such as cameras [3]. Rifidi Edge is a complete RFID middleware platform with an edge server and development tools to enable the development and deployment of highly customized RFID applications. It contain three conceptual architectural layers: - Sensor Abstraction Layer: allow user connect to device to collect the kind of data required for the application. - Application Engine Layer: The Layer is intended to let application weight loss pills developers build much of the functionality of their RFID applications using esper- queries. - Communication Layer: The edge server has several built in connectors to use, namely JMS and Web Services (via Spring's remote framework). However, as this is application-independent, it is possible to write your own connector (such as a TCP/IP socket connection) if the application needs it. Fortunately, these characteristics make the development of new functionality of the RFID much easier. Context-aware computing. [8] Another requirement of the system is the access by different kind of terminal devices and communication media. The computing part of the system needs to detect the terminal and communication characteristics, and then format the information suitable for this context of interaction. That is called context awareness computing [7]. In our solution, a ubiquitous engine is used to convert and reformat information suitable for different kind of terminal is needed. Ubiquitous computing framework.[9] To implement the context awareness computation, there are variable choices of the implementation framework. In our case, we need a framework allowing connecting different sensor and monitoring system from different producers. That the reasons why we choose a general, universal and open framework. Of course, we’ll have more work to develop the needed functionalities. Web Service is the tool that we choose.
  • 4. 262 Computer Science & Information Technology ( CS & IT ) Web service provides connectivity, discoverability between software component using HTTP as transmission protocol and XML as data definition language. In ubiquitous computing, web services allow ubiquitous device can send and receive information easily to processing server. We can easily customize the server, the protocol to meet the specification of the sensor part of the system. Combine monitoring As analyzed above, RFID authentication has several advantages: simple and flexible authentication; authenticates by RFID tag id; can be used with physical access control devices. But it also has some disadvantages: no information about access period; It is not strong enough. Every one who has a RFID tag can be authenticated. IP camera monitoring gives us the capability to capture video and picture in a customizable way, but it can not gives us the details functional information about the monitored object. The idea is to combine the monitoring by RFID and by IP camera in a way that authentication can be double checked by the 2 systems online or offline. The log and traces from RFID will be extended with video and pictures from the IP Camera monitoring system. These video and pictures are taken from preconfigured action for indoor – network technical room- spaces. To accomplish this task, interaction between 2 systems has to be designed and implemented, with condition that RFID sub-system is open source, while IP camera system is closed and proprietary. 3. THE SYSTEM MODEL AND FUNCTIONALITY The system requirement: Technical room monitoring requires the following functionalities: (i) supports traceable entries, operations and exit in the working space; (ii) supports traceable activities on pre-configured equipment; (iii) provides automatically identification and authentication of the object; (iv) provides access to the system via different devices and communication media. The system is organized in 3 subsystems: the local subsystem, the central subsystem and the monitoring subsystem. The local subsystem is for administrator-monitor. The central system consists of overall monitoring logics of the system. The monitoring points server for real-time monitoring, access control and authentication. Central Server Monitored points Monitored points Monitored points Mobile Application Desktop Application Desktop ApplicationLocal Subsystem Central Subsystem Monitoring Subsystem Figure 1: The system overall architecture
  • 5. Computer Science & Information Technology ( CS & IT ) 263 The monitoring subsystem has several monitoring points. Each monitoring point consists of: an IP camera, RFID reader(s), a LCD for each RIFD, a computer and a mechanical access control device (lock, barrier…). The RFID reader is used to control the physical access to the space via mechanical device. The IP Camera is installed and configured to control the entrance and part of the space. The LCD is installed next to the entrance, serving for announcing welcome message for the user. These 3 components are controlled with a computer. This computer is autonomous, self-activate, and will be embedded. The computer provides a web-service for other part to access collected information from monitoring devices. The principal functions of each monitoring point are: - RFID Authentication and Checking. - Device monitoring by predefined detection zone. - Configure monitoring devices. Central system consists of processing server. The server collects information from monitoring points, process this information with management information in the database. The server publishes this information using a web server. On this server, context awareness module allows providing information for different access contexts. The functions of central module are: - Users (technical administrator) management - Devices and technical rooms management - Grouping users and devices - Search and summary - Abnormal situation detection and alert. The local system in fact is the client – end user interface. As well as we use Web Interface, the problem to resolve is to provide web information conforming to the device’s and communication link’s capability. The functional model of the system is described in Figure 2 : Functional Model Figure 2: Functional model In this article, we don’t concentrate on the detail analyze of each function. We concentrate on the functions of each monitoring point. The components of each monitoring point are described on Figure 3: Monitoring point.
  • 6. 264 Computer Science & Information Technology ( CS & IT ) Mechanical Lock RFIDIP Camera IP Camera SW RFID SWLock SW Mini LCD Mini LCD SW Collective Module WS1-3 WS4 WS5 WS6 Figure 3: Monitoring point As mentioned above, in each monitoring point we have to allow interaction between components. We use web services to transfer from normal software user interface to programmable interfaces. The list of the web services is presented in Table 1: Monitoring point web services. Table 1: Monitoring point web services WS Name Description 1 Forced monitoring Activated when a predefined entrance is accessed, or administrators need to view the IP Camera directly. Accept monitoring commands and transfers to Camera 2 Conditional monitoring Activated when a predefined condition is true (a device is accessed, some one operates on some devices). Based on motion detection. 3 Configuration Receive configuration from collective modules and transfer it to camera. Configuration information is depended on monitored devices. 4 Display announce Receive text (audio) message from collective module and send to LCD and speaker. 5 Authentication sending Raised when RFID reader is accessed and sending information 6 Allow access Raised when authentication is successful
  • 7. Computer Science & Information Technology ( CS & IT ) 265 4. IMPLEMENTATION AND EXPERIMENTATION The model is implemented in the server room at the HUST’s network information center. One monitoring system uses 1 camera, 1 RFID card reader, one PC to collect information from camera and RFID reader. 4 monitoring points are deployed in server room and 3 network technical rooms in the same building. For experimental purpose, 4 devices are controlled in the server room. In each network technical room we monitor only one device. Information about 20 administrators and 3 roles are stored in the central DB. The system has been tested in 3 months. The system helps the managers to: - Control the entry and exit of the technical room; - Enforce the RFID authentication by camera support; - Control the important devices (servers and network equipment). - Determine initiator of the selected configuration activities. - Access system anytime and anywhere. 5. CONCLUSIONS The paper presents the model of the ubiquitous network technical room monitoring and its experimental implementation. The main contributions are: • Study the monitoring technical room problem • Study several ubiquitous computing technologies • Propose the model of the ubiquitous network technical room monitoring • Implement the model with web services with. The model allows connecting several proprietary products. In the future, the system will be extended to serve multiple network technical rooms, and to integrate more ubiquitous computing technologies such as batch, bioinformatics…. ACKNOWLEDGMENTS I would like to thank HUST’s BKNIC staffs, which give me the possibility to implement and test my solution. This work is also supported by Ministerial Project B2010-01-139. REFERENCES [1] Ko, Ren-Song. (2011), Anywhere/Anytime Software and Information Access via Collaborative Assistance. Eduard Babkin, Ubiquitous Computing, 31-49. [2] Marie-Luce. (2011), Uncertainty and Error Handling in Pervasive Computing: A User's Perspective. Eduard Babkin. (2011), Ubiquitous Computing, 49-67. [3] Nicolas Ferry. (2011), Vincent Hourdin, StĂ©phane Lavirotte, GaĂ«tan Rey, Michel Riveill and Jean- Yves Tigli. (2011). WComp, a Middleware for Ubiquitous Computing, Ubiquitous Computing, 151- 177.
  • 8. 266 Computer Science & Information Technology ( CS & IT ) [4] Wanderley Lopes de Souza, Antonio Francisco do Prado, Marcos Forte and Carlos Eduardo Cirilo. (2011). Content Adaptation in Ubiquitous Computing. Ubiquitous Computing, 67-95. [5] Bakhouya, Mohamed. (2008). Ubiquitous and pervasive application design, Proceedings of the 2nd international workshop on Agent-oriented software engineering challenges for ubiquitous and pervasive computing. [6] Roussaki, Ioanna, Strimpakou, Maria and Pils, Carsten. (2007). Distributed Context Retrieval and Consistency Control in Pervasive Computing. Plenum Press, Netw. Syst. Manage., Vol. 15, 57-74. [7] Reyes, Fernando Martinez and Greenhalgh, Chris. (2009). The User's Touch: A Design Requirement for Smart Spaces. IJAPUC, Vol. 1, 14-28. [8] Grzywaczewski, Adam, et al. (2009). An Investigation of User Behavior Consistency for Context- Aware Information Retrieval Systems. IJAPUC, Vol. 1, 69-90. [9] Chang, Po-Chien. 1,.(2009). Understanding Consumers' Behavior when Using a Mobile Phone as a Converged Device. IJAPUC, Vol. 1, 60-74. Authors Ha Quoc Trung (Ph. D.) Graduated from Technical University of Sofia in 1996, speciality “Electronic, Microelectronic and Automation”. In 2004 he completed his Ph. D. degree in School of Advance Research Practice (Ecole Pratique de Hautes Etudes-Paris, France). From 1999 to recent he is lecturer at department of data communication and computer network. His research interests are: distributed algorithm, system and application, ubiquitous computing.