Send Orders for Reprints to
[email protected] 20
International Journal of Sensors, Wireless Communications and Control, 2014, 4, 20-31
Design and Implementation of an Automation System Based on the Desktop and Mobile Technologies Zeeshan Ahmed* University of Massachusetts, USA Abstract: Developing an embedded, automated system is a challenging task because it requires a fully managed system implemented with the involvement of several electronic components, external printed circuit boards (PCBs) and miscellaneous advanced devices to be attached and used in an organized way. Here, the focus is on the development of such a system to regulate the electronic devices implanted in a building (house, office etc.) from desktop and mobile application. Meeting the technological goals of this research and development, this manuscript introduces a new application, i.e. Smart House, a combination of the both hardware and software. The proposed system is capable of controlling several electronic appliances, scheduling the operations, recording the operational activities and implementing security system to track the interruptions. This manuscript briefly explores the implemented application, including its features, usage, pitfalls and implemented hardware.
Keywords: Automation, hardware, mobile interface, product line architecture, software. 1. INTRODUCTION Computer science (CS) has been categorized in different sub-fields (e.g. software engineering, artificial intelligence, semantic web, image processing, game programming, human machine interaction, natural language processing and bioinformatics etc.). Thousands of software and hardware oriented real time systems have been developed and well contributing in the world. This paper focuses on the implementation of an automation system to remotely control the electric appliances via personal computer and mobile technology. The scope of the research is up to governing different electric appliances manually as well by scheduling the operations. Moreover, it provides a security system to track the interruptions and unexpected situations. Along with the ubiquitous control to the electric appliances, it is also about implementing a relational database management system to record the use of electric appliances. In terms of its usage, the presented work may lead to the different kind of benefits e.g. reducing the electricity consumption by controlling the usage of unnecessary electric devices, scheduling the light operations with respect to the day light, improving the security conditions by monitoring the secured area, having mobile access to the electric appliances and saving money etc. Beside, its residential electric alliance’s control, it can be used to run and regulate the different scientific experiments (based on electronic apparatus) in laboratories e.g. producing *Address correspondence to this author at the University of Massachusetts, USA; Tel: +1-774-455-3516; Email:
[email protected]
2210-3287/14 $58.00+.00
dark and light cycles (circadian and diurnal rhythms) in the behavioral research on insects etc. The proposed application is an embedded system, designed following the Software Engineering (SE) [1, 2] principles, including Spiral [3] (one of the well-established Software Development Life Cycles (SDLC) [4, 5]), formal Unified Modelling Language (UML) [6] prospects [7, 8] and incorporating Human Computer Interaction (HCI) design patterns [9-11]. Following the agenda (section 1); the paper is organized in the following sections: (2) briefly presents the research objectives, system requirements and conceptual design of the proposed system, (3) discusses the designed hardware, (4) elaborates the impended software designs and implemented modules, (5) gives details of used tools and technologies and (6) concludes the discussion. 2. CONCEPT The concept of this research was to develop a user friendly desktop and mobile phone based automation system to control electric components by manual and automatics switching (on/off). Moreover, the aim was also to provide a security system to get notified about unexpected interruptions. 2.1. System Requirements The well know System Analysis and Design (SAD) [12] techniques are used to analyze the system requirements e.g. Archival Documents, Sampling Data and Prototyping etc. Initially, all the requirements were gathered and then analysis helped in pruning the functional and non-functional requirements. Looking at the scope of this research, the functional requirements analysis [13-16] were divided into two categories: software and hardware requirements. © 2014 Bentham Science Publishers
Design & Implementation of an Automation System
International Journal of Sensors, Wireless Communications and Control, 2014, Vol. 4, No. 1
The concluded hardware requirements were about to implement two different PCBs, one was to send the instructions to the electric appliances from the computer and mobile phone applications, and the other was to receive the signals from the electric appliances to the personal computer and mobile phone applications. The finalized functional requirements were: • Developing prototype application, capable of controlling house’s electric appliances via computer and mobile. • Scheduling operations with respect to the user given futuristic date and time. • Providing database management system to maintain the information about all operational activities with user creation and authentication mechanism.
21
2) Output circuit to control the external electric appliances (switches). 3) Input circuit to get the signals from external security system (third party developed). The personal computer is the user machine which will run the software application. Output circuit is a PCB which will be attached to the electric appliances and computer (via parallel port). Electric switches are the actual devices to be controlled via computer and mobile (via the World Wide Web). The input circuit is to provide an automatic security system using infrared security system developed by the third parties. 2.3. Prototype
• Implementing a security system to inform user at interruptions.
The designed architecture of the proposed prototype (Fig. 2) consists of three layers:
• A phone dialer to make automatic telephonic calls to inform about the interruptions in the security system.
1) External Layer .
• An email system to generate automatic emails to inform about the lapses in security system.
3) Internal Layer.
2.2. Conceptual Design The presented the conceptual architecture (Fig. 1), explains the workflow of the proposed system. It consists of the elements: 1) Mobile phone and the personal computer with preinstalled software (author’s developed).
2) Central Layer . The external layer holds the security system, central layer carries the internal structure of the place (e.g. room or lab or office, etc.) equipped with electric appliances and the internal layer contains implemented hardware board, connected to the electric appliances and personal computer. 3. HARDWARE The d.esigned hardware consists of two different boards: Output Control Circuit and Input Control Circuit.
Fig. (1). Designed conceptual architectures of the proposed system. The Fig. (1) presents the component diagram including mobile phone and personal computer with pre-installed software application, output circuit to control switches, electric switches, input circuit to send signals to the personal computer and designed main board.
22 International Journal of Sensors, Wireless Communications and Control, 2014, Vol. 4, No. 1
Zeeshan Ahmed
It consists of following different electric components: “eight Relays, eight Transistors, eight Crystal diodes, eight 1K Resistances, eight 4.7K Resistances, eight LEDs, one 2.5 volts Capacitor, one Bridge (AC to DC Converter), one Connector and one Parallel port” [27], [28] and [29]. The designed and implemented board sockets to the main board of the computer via data-cable using I/O Port. The planted eight relays are of 12V (5A) and used to switch between two terminals. Implanted relay’s job is to switch current between 220 Volts 5A-AC, and it’s of 12 Volts-DC. Fig. (2). Three Layer Architecture. The Fig. (2) presents three layers: External Layer (Outer), Central Layer (Middle) and Internal Layer (Inner).
3.1. Output Control Circuit This circuit (Fig. 3) is used to regulate the electric components via desktop software and mobile application, directly or indirectly via internet.
The embedded C-945 Transistors controls the biasing at the maximum operating voltage (1-1.5V or 0.3A). The crystals diodes purifies the biased current flow to the relays. Crystal Diode
1k Resistance 1k Resistance
-
Transister
Transister 1k Resistance
LED
LED
Crystal Diode
1k Resistance
-
4.7k Relay 12 VDC
Transister
Transister
1k Resistance
1k Resistance
1k Resistance
Crystal Diode
Crystal Diode
-
4.7k
Relay 12 VDC
Transister
Transister 1k Resistance
1k Resistance
Relay 12 VDC LED
1k Resistance
Crystal Diode
+
4.7k
LED
+
Relay 12 VDC
LED
LED
+
+
4.7k -
Crystal Diode
+
Relay 12 V DC
-
Relay 12 VDC
+
4.7k
4.7k
-
Crystal Diode
+
Each relay does forward and reverse biasing, controlled using the transistor. At forward biasing it bonds to the terminal (1) and during reverse biasing it links to the terminal (2) [27], [28] and [29]. The individual electric devices are connected to the associated each relays.
Crystal Diode
+
Relay 12 VDC
Transister
Transister 1k Resistance
-
-
4.7k Relay 12 VDC
LED
LED
Female Data cable Port
AC
DC
+ -
Capacitor 25 volt
Converter (Bridge) Tranfarmer
Data Cable
Fig. (3). Output control circuit design. The Fig. (3) presents the design of the output control circuit, which consists of eight Relays, eight Transistors, eight Crystal diodes, eight 1K Resistances, eight 4.7K Resistances, eight LEDs, one 2.5 volts Capacitor, one Bridge (AC to DC Converter), one Connector and one Parallel port.
Design & Implementation of an Automation System
International Journal of Sensors, Wireless Communications and Control, 2014, Vol. 4, No. 1
23
The resistances descents the flow of the current up to the magnitude of the resistance. 1k and 4.7k resistances are used, where 1K is for LEDs and 4.7k is for the transistor [27], [28] and [29]. Capacitors are imbedded to store (25V 2200 MICRO FARAD) the charge and maintain constant flow of the current (25V 2200 MICRO FARAD). The bridge is a combination of four diodes which transforms the AC to DC voltage. The connector links AC transformer (12V, 1A) to the board. LEDs are used to produce light and to verify the signal. Parallel Port is used to connect the output control circuit to the computer system for parallel communication. It is mainly divided into three parts: “Port A (selection lines D0 – D7, number 2 to 9), Port B (ERROR, SLCT, PE, ACK, BUSY Lines, number 15, 13, 12, 10, 11 respectively) and Port C (AUTOFND, INIT, SLCTIN lines, number 14, 16, 17)” [27], [28] and [29].
Fig. (4). Output Control Circuit; Flow of Current. The Fig. (4) presents the flow of the current in output control circuit.
3.2. Input Control Circuit The input control circuit controls the implemented infrared based security system and triggers the signal to the computer at interruptions. This circuit connects to the computer via data cable. The designed circuit (Fig. 5) consists of following components: “Transistor C945, Resistances, Capacitor (25V 2200 MICRO FARAD), Bridge, Connector (12V, 1A), One Integrated circuit, LEDs and Parallel port” [27], [28] and [29].
The output control circuit manages the flow of the current to relay. The circuit is based on the amalgamation of a C945 transistor, 1k, 1k and 4.7k three resistances, crystal diode and LEDs. The electricity is provided to start the system (switching operations between electric components via implemented output circuit board and the computer board). Later then signals proceed to the connected electrical devices from the respective rely and the corresponding switches will also be turned on/off.
Likewise the Output Control Circuit electricity is need to be provided to start the system, at interruption the generated signal (analog) is first converted into the digital signal and then forwarded to the computer board.
IO Port Female Dala cable Port
Data Cable 4.7k
AC
DC
+ -
Capacitor 25 volt 1k Resistance
Converter (Bridge) 4.7k
LED 1k Resistance
4.7k
1k Resistance
LED
1k Resistance
Fig. (5). Input control circuit design. The Fig. (5) presents the design of the input control circuit which consists of a Transistor C945, Resistances, Capacitor (25V 2200 MICRO FARAD), Bridge, Connector (12V, 1A), One Integrated circuit, LEDs and Parallel port.
24 International Journal of Sensors, Wireless Communications and Control, 2014, Vol. 4, No. 1
Zeeshan Ahmed
4. SOFTWARE DESIGN & IMPLEMENTATION
4.2. Sending Signals
The designed and implemented software is a Product Line Architecture (PLA) [17], [18], [19], [20] and the implemented following the Butterfly paradigm [21] and [30].
The implemented software consists of the following modules: Database Management System, Phone Interface, Mail Box Interface, Mobile Interface Output bit controlling (to set signal) and Receiving input (to get signal). As the developed solution (Smart House) is PLA based, so the all the modules work independently as well as in integrated form.
4.1. Work Flow The overall work flow (Fig. 6) of the propose applications consists of several steps. It starts with the user authentication process. Authorized user is provided the main graphical user interface of the application and using that a user can view the status (information stored in the database, if some information exists) of manually operated or scheduled switches, can manipulate records (only admin), can directly switch on / off attached switches, can schedule the time for on and off of all or a particular switch, and can log out or quit the application.
The designed main graphical user interface (GUI) of the implemented system (Fig. 7) provides six different options (Fig. 8): “Control, Detector, Mail Box, Phone, Records and Quit Me” [27], [28] and [29]. Control module allows the user to govern the electric components (manually switching and scheduling) using earlier mentioned Output Bit Control system.
Start
Smart House
User Name and password
Yes
Logout
Back to Login
No
Recognised
Recognised
Main Page
Status
Not Recognised
View
View Status
Change
DB Scheduled
Option
One Switch
Status of all Switches
Chocga Whole Manual
Set Timings
Change Status
Status of Onclone Switch
Time
Fig. (6). Work Flow of the Application. The Fig. (6) presents the overall work flow of the application which starts with the execution of the application. At successful user login, main menu is enabled and user is also allowed to manually operate and schedule the operation. Moreover user can also view and alter the records in database.
Design & Implementation of an Automation System
International Journal of Sensors, Wireless Communications and Control, 2014, Vol. 4, No. 1
25
Fig. (7). Main graphical user interface of application. The Fig. (7) presents the Main GUI of the application, developed using visual basic programming language, providing options to call different modules: Control, Detector, Mail Box, Phone, Records and Quit Me.
User Logout or Lock
Verifying Password and name
l o g o u t
Do
Main
L o c k
Have sveral doors to open
Open
Open
Controls
Open
Open
Mail Box
Dectector
Open
Open
Record
Phone
GUI
Exit
Fig. (8). Work Flow of Main GUI. The Fig. (8) presents the work flow of the Main GUI of the application which starts with the user input for logging into the system, the authorized user is allowed to choose between provided modules: Controls, Detector, Mail box, Phone, Records and GUI options. Later after using system user can logout or quit application.
26 International Journal of Sensors, Wireless Communications and Control, 2014, Vol. 4, No. 1
Detector turns on the interruption detecting security system, using Input Control system. Mailbox is like other, normal email send and receive email provider, which allows the user to write, send, and receive email along with the automatic email generation at the caught interruption from Detector module. Phone is like many other call making software applications which helps the user in making manual telephone calls and automatic recorded call generation at the caught interruption from Detector module. Records is a well designed and implemented database management system, which maintains the information about the all performed operation using Smart House application e.g. turning on and off lights, scheduling light operations, users and their profiles, telephone numbers and call logs etc. Quite-Me is a simple option to manually exit from the application. The desktop application’s front end is developed in Visual Basic programming language and the back end programming is performed in C/C++ programming language. Front end takes the instructions from the user and perform accordingly e.g. sending signals to the board for switching (Fig. 9) etc.
Front End
Control
Fig. (9). Work Flow of Output Control Module.
Board
Zeeshan Ahmed
The process of regulating hardware consists of two stages (Fig. 10): “Manual Output Control and Schedule Output Control” [27], [28] and [29]. User can directly switch on/off the lights or can also schedule the operation with date and time (on/off). The manual output control GUI provides 8 different options (buttons) to control 8 different hardware switches. When a button is pressed then its related bit value (0 or 1) passes at run time through the front end to back end and then the appropriate action is performed and with respect to the user in command, the database is updated. Likewise manual output control GUI, the schedule output control also provide 8 options to schedule switches by assigning the time of ‘On’ and ‘Off’. When a button is pressed then a new window opens to get the value for its On and off time from the user and then at those entered timings, its related bit value passes to the backend and then the appropriate action is performed on given time. The user assigned on and off timings are also saved in the database with the name of the current user and current time with unique Id number. 4.3. Receiving Signals This is the reverse process of the output bit controlling. It takes an input signal (comes with the IO port at address 889) from an external device (Fig. 11) at interruption and proceeds to the alarming situation actions e.g. making telephone call using programmed dialer (Fig. 12). Moreover, it also enables mail box and send automatically compiled email with security disturbance information.
Fig. (10). Output Control Module. The Fig. (10) presents the GUIs of Output Control Module (left most), Manual Outputs (top right) and Scheduled Output (bottom right).
Design & Implementation of an Automation System
Board
Control
International Journal of Sensors, Wireless Communications and Control, 2014, Vol. 4, No. 1
Front End
Fig. (11). Work Flow of Receive Input Module.
The GUI (front end) of the receive input module (Fig. 13) is developed using Microsoft Visual Basic and the back end is programmed using C programming language. Following one of the constraints of the system programming that it is not directly possible to send data from 16 bit to 32 bit, I have programmed a batch (executable file) to send the data from the developed backend program to the front end interface.
27
On successful connection to the hosted server, the user is allowed to login to the system with its valid user name and password (created using desktop application). On successful login to the system, the user is offered a main menu with the options to view and change the status of manually controlled and scheduled switches. In selecting option ‘view the status’, the user is allowed to view the current status of individual switch or all switches at once. 4.5. Database
4.4. Mobile Interface
To manage the records of the application, one new database management system [22], [23], [24], [25], [26] is implemented. Using that the information about users, manually operated and scheduled electric appliances, and telephone numbers can be managed.
The mobile phone interface (Fig. 14) provides three different options: user authentication, change status and view status.
Users: By using the module ‘User Record’ (Fig. 15), the user (administrator) can create new, use as well as can check the whole record of all the users.
Fig. (12). Phone Dialer. The Fig. (12) presents the GUI of Phone Dialer (left) to make calls and the GUI of Auto Phone (right) to save the dynamic and fixed phone numbers.
Fig. (13). Receive Input Module . The Fig. (13) presents the Detector module to catch the interruption signals from the external hardware.
28 International Journal of Sensors, Wireless Communications and Control, 2014, Vol. 4, No. 1
Zeeshan Ahmed
Fig. (14). Mobile Interface. The Fig. (14) presents GUIs of the Main, User Login, Menu and Status of the switches.
Fig. (15). User Records. The Fig. (15) presents the GUI of the Make new user module which is used to create new users and also presented the user records which is used to show the created users in the system.
Manual Switching Records: By using the module ‘Manual Record’, the user can view and alter the records of each manually operated switch (Fig. 16). Scheduled Switching Records: By using the module ‘Scheduled Record’, the user can view and alter the records of each scheduled switch (Fig. 17). Phone: Phone record, one additional interface is implemented to maintain telephone numbers (Fig. 18), categorized
into two forms: Dynamic Number (user added numbers) and Fixed Numbers (used for the emergency calls). 5. USED TECHNOLOGIES Following technologies are applied during the development of the system: “Microsoft Visual Studio, Nokia Mobile Tool Kit, Tomcat, Wireless Markup Language (WML), Circuit Maker, Unified Modeling Language (UML) and
Design & Implementation of an Automation System
International Journal of Sensors, Wireless Communications and Control, 2014, Vol. 4, No. 1
29
Fig. (16). Manual Switching Records. The Fig. (16) presents the GUI of the Manual Records which is used to view the records of each manually operated switch.
Fig. (17). Scheduled Switching Records. The Fig. (17) presents the GUI of the Scheduled Records which is used to view the records of each manually operated switch.
Rational Rose, Java and C++/C programming language” [27], [28] and [29].
server, mobile service facilitating web browsing, an SMTP server for electronic mailing.
CONCLUSION
There are already, different existing commercial and academic automation systems and appliances which can help in expediting the remote use of the house’s electric appliances e.g. [31-36]. These systems have some uniqueness in comparison to our system e.g. controlling house’s electric appliances and scheduling operations. Furthermore these systems differ as well, especially in technology and usage point of views e.g. controlling the appliances via Bluetooth [31, 33]
The software and hardware has been successfully tested using unit and integration test. Unit test verified each module at individual basis and integration test validated all modules in running, integrated form. There are following prerequisites and project limitations: the user has to arrange free real IP address for the web
30 International Journal of Sensors, Wireless Communications and Control, 2014, Vol. 4, No. 1
Zeeshan Ahmed
Fig. (18). Phone Records; Fixed and Dynamics. The Fig. (18) presents the GUI of the Phone Record module which helps in maintaining the telephone numbers (records) in Fixed and Dynamic categories.
when we control from direct computer and mobile, using Android based mobile systems [32] when we control via Nokia system using Nokia tool kit, automating home using cloud computing technology [33] when we use normal data hosting system, web based smart PLC controlled implementation [34] when we use our own designed PCB based system etc.
The author is also grateful to all interested colleagues for critical community input on the approach and anonymous reviewers for helpful comments. AUTHOR’S BIBLIOGRAPHY
AC
= Alternating Current
CS
= Computer Science
Zeeshan Ahmed is Postdoc Research Associate at the University of Massachusetts, USA. His research focus is that, how can computers be well assimilated in the life sciences, especially towards the engineering of new, user friendly solutions for complex biological data mining, analysis, visualization and management. He is the author of several first/last author publications and has developed many scientific and informatics’ computational solutions.
DC
= Direct Current
REFERENCES
HCI
= Human Computer Interaction
[1]
GUI
= Graphical User Interface
[2]
I/O
= Input Output
LED
= Light Emitting Diode
PCB
= Printed Circuit Board
SAD
= System Analysis and Design
[5]
SE
= Software Engineering
[6]
In future we are looking forward to further work and improve the current system. ABBREVIATIONS
[3] [4]
SDLC = Software Development Life Cycles UML
= Unified Modelling Language
[7]
CONFLICT OF INTEREST
[8]
The authors confirm that this article content has no conflict of interest.
[9]
ACKNOWLEDGEMENTS
[10]
The author would like to thank to the University of Wuerzburg and University of Massachusetts for support in this publication.
Boehm B. Software Engineering. IEEE Trans. On Computers, 1976; 12: 1226-42. Rook P. Controlling software projects. Software Engin. J. - Controlling software projects, 1986; 1: 7-16. Boehm BW. A spiral model of software development and enhancement. Computer, 1988; 21: 61-72. Benediktsson O, Dalcher D, Thorbergsson H. Comparison of software development life cycles: a multiproject experiment. IEE Proceedings - Software, 2006; 153: 87-101. Munassar NMA, Govardhan A. A Comparison Between Five Models Of Software Engineering. Int. Jr. Comp. Sci., 2010; 7: 94-101. Medvidovic N, Rosenblum DS, Redmiles DF, Robbins JE. Modeling software architectures in the Unified Modeling Language. ACM Trans. Software Engineering Methodologies, 2002; 11: 2-57. Ambler SW. The Elements of UML 2.0 Style, Cambridge University Press, 2005. Mahmood S, Lai R. RE-UML: A Component-Based System Requirements Analysis Language. Comput. J. 2013; 56(7): 901-922. Ahmed Z, Ganti SK, Kyhlbäck H. Design Artifact’s, Design Principles, Problems, Goals and Importance. In Fourth International Conference of Statistical Sciences, Gujrat, Pakistan, 2008, 57-68. Klemmer SR, Lee B. Notebooks that Share and Walls that Remember: Electronic Capture of Design Education Artifacts. In ACM Symposium on User Interface Software and Technology, 2005.
Design & Implementation of an Automation System [11]
[12] [13] [14] [15] [16] [17]
[18] [19]
[20]
[21] [22] [23]
International Journal of Sensors, Wireless Communications and Control, 2014, Vol. 4, No. 1
Ahmed Z. Designing Flexible GUI to Increase the Acceptance Rate of Product Data Management Systems in Industry. Inter J Comp Sci Emerging Technol, 2011; 2: 100-9. Dennis A, Wixom BH, Roth RM. System, Analysis and Design, John Wile & Sons Inc., 2012. Lee J, Xue NL. Analyzing user requirements by use cases: a goaldriven approach. IEEE Softw., 1999; 16: 92–101. Sommerville I. Integrated requirements engineering: a Tutorial. IEEE Softw., 2005; 22: 16-23. Lamsweerde AV, Darimont R, Letier E. Managing conflicts in goal-driven requirements engineering. IEEE Trans. Softw. Eng., 1998; 24: 908-926. Davis A. Software Requirements: Analysis and Specification. Prentice-Hall, New Jersey, 1989. Ahmed Z. Towards Performance Measurement and Metrics based Analysis of PLA Applications. Int. J. Software Engin. App., 2010; 1: 66-80. Ahmed Z, Majeed S. Measurement, Analysis with Visualization for better Reliability. In Artificial Intelligence and Hybrid Systems, C. Rocha, F. Akune, A. El-Shafie, iConcept Press, 2013. Ahmed Z. Measurement Analysis and Fault Proneness Indication in Product Line Applications (PLA). In Sixth International Conference on New Software Methodologies, Tools, and Techniques, Italy, 2007, 391-400. Ahmed Z. Integration of variants handling in M-system NT. M.S. thesis, Blekinge Institute of Technology, Karlskrona, Sweden. 2006. Ahmed Z, Zeeshan S, Dandekar T. Developing sustainable software solutions for bioinformatics by the "Butterfly" paradigm. F1000 Res., 2014; 3. William K. A simple guide to five normal forms in relational database theory. Commun. ACM. 1983; 26: 120-5. Codd EF. Normalized data base structure: A brief tutorial. In ACM SIG-FIDET Workshop on Data Description, Access and Control, San Diego, 1971.
Received: July 21, 2014
[24] [25]
[26] [27]
[28] [29] [30] [31] [32]
[33] [34]
[35] [36]
31
Codd EF. Further normalization of the data base relational model. IBM Res. Rep., 1971; RJ909. Fagin R. Multivalued dependencies and a new normal form for relational databases. ACM Trans. on Database Sys., 1977; 2: 26278. Fagin R. Normal forms and relational database operators”m In ACM SIGMOD International Conference on Management of Data, USA, 1979; 153-60. Ahmed Z. Implementing Computerized and Digitally Mobile Home Automation System towards Electric Appliance Control and Security System. Int. J. Emerg. Sci., 2011; 1: 487-503. Ahmed Z. Ele-Comp-Hus; Digitally Mobile and Computerized House. LAP LAMBERT Academic Publishing, 2010. Ahmed Z, Ali M. Smart House; Artificially Intelligent Home Automation System. VDM Verlag Dr. Müller, 2011. Ahmed Z, Zeeshan S.Cultivating Software Solutions Development in the Scientific Academia. Rec. Pat. Comp. Sci., 2014; 7. Lee KY, Choi JW. Remote-controlled home automation system via Bluetooth home network. In proceeding of: SICE Annual Conference, Fukui, Japan, 2003. Anwaarullah S, Altaf SV. RTOS based Home Automation System using Android. Int. Jr. Advan. Tren. Comp. Sci. Eng., 2013; 2: 4804. Salunke MB, Sonar D, Dengle N, Kangude S, Gawade D. Home Automation Using Cloud Computing and Mobile Devices. IOSR Jr. Eng., 2013; 3: 35-7. Bingol O, Tasdelen K. Web-based Smart Home Automation: PLCcontrolled Implementation. Acta Polytechnica Hungarica., 2014; 11: 51-63. Tadimeti HC, Pulipati M. Overview of Automation Systems and Home Appliances Control using PC and Microcontroller. Int. Jr. of Sci. Res., 2013; 2: 127-31. Panth S, Jivani M. Designing Home Automation System (HAS) using Java ME for Mobile Phone. Int. Jr. Elec. Comp. Sci. Eng., 2013; 2: 798-807.
Revised: September 12, 2014
Accepted: September 27, 2014