I
nte
rna
t
io
na
l J
o
urna
l o
f
Rec
o
nfig
ura
ble a
nd
E
m
be
dd
e
d Sy
s
t
e
m
s
(
I
J
R
E
S
)
Vo
l.
5
,
No
.
2
,
J
u
l
y
201
6
,
p
p
.
9
0
~
9
5
I
SS
N:
2089
-
4864
90
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
jo
u
r
n
a
l.c
o
m/o
n
lin
e/in
d
ex
.
p
h
p
/I
J
RES
Web
Ba
sed
H
o
m
e
Securi
ty a
nd Au
t
o
m
a
tion Sy
ste
m
Ai
m
a
n
Z
a
k
w
a
n J
idi
n
*
,
L
i
m
M
ei
Sze
*
,
No
rf
a
dzlia
M
o
hd
Yus
o
f
**
*
F
a
c
u
lt
y
o
f
En
g
in
e
e
rin
g
T
e
c
h
n
o
lo
g
y
,
Un
iv
e
rsiti
T
e
k
n
ik
a
l
M
a
la
y
si
a
M
e
lak
a
,
M
a
la
y
sia
**
Ce
n
ter o
f
A
d
v
a
n
c
e
d
Co
m
p
u
ti
n
g
T
e
c
h
n
o
lo
g
y
,
Un
iv
e
rsiti
T
e
k
n
ik
a
l
M
a
lay
si
a
M
e
lak
a
,
M
a
la
y
si
a
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
an
2
,
2
0
1
6
R
ev
i
s
ed
Mar
23
,
2
0
1
6
A
cc
ep
ted
A
p
r
1
1
,
2
0
1
6
Ho
m
e
se
c
u
rit
y
a
n
d
a
u
to
m
a
ti
o
n
is
c
ru
c
ial
issu
e
c
o
n
c
e
rn
e
d
b
y
p
e
o
p
l
e
.
A
h
o
m
e
se
c
u
rit
y
s
y
ste
m
is
n
e
e
d
e
d
f
o
r
c
o
n
v
e
n
ien
c
e
a
n
d
sa
f
e
t
y
.
A
h
o
m
e
a
u
to
m
a
ti
o
n
s
y
ste
m
is
a
k
e
y
to
h
a
v
in
g
e
ff
e
c
t
iv
e
e
n
e
rg
y
e
ff
icie
n
c
y
in
th
e
h
o
u
se
.
In
th
is
p
a
p
e
r,
w
e
p
re
s
e
n
t
th
e
d
e
sig
n
a
n
d
im
p
lem
e
n
tatio
n
o
f
a
w
e
b
-
b
a
se
d
h
o
m
e
se
c
u
rit
y
a
n
d
a
u
to
m
a
ti
o
n
sy
st
e
m
.
T
h
is
s
y
ste
m
u
se
s
P
IR
m
o
ti
o
n
se
n
so
r
to
d
e
tec
t
in
tru
d
e
r
i
n
th
e
h
o
u
se
.
T
h
is
se
n
so
r
is
f
u
rth
e
r
f
e
d
to
m
icro
c
o
n
tr
o
ll
e
r
w
h
ich
w
o
u
ld
h
e
lp
th
e
G
S
M
m
o
d
u
le
to
se
n
d
n
o
ti
f
ica
ti
o
n
to
h
o
u
se
o
w
n
e
r
re
g
a
rd
in
g
th
e
in
tr
u
sio
n
.
On
th
e
o
th
e
r
h
a
n
d
,
t
h
e
L
DR
li
g
h
t
se
n
so
r
is
u
se
d
to
p
ro
v
id
e
a
u
to
-
l
ig
h
t
f
u
n
c
ti
o
n
a
li
ty
w
h
ich
w
il
l
tu
rn
o
n
th
e
li
g
h
t
a
t
n
ig
h
t
a
n
d
d
im
it
a
t
d
a
y
ti
m
e
.
A
we
b
-
b
a
se
d
s
y
st
e
m
f
u
n
c
ti
o
n
a
s
a
re
m
o
te
c
o
n
tro
l
s
y
ste
m
f
o
r
u
se
r
to
m
o
n
it
o
r
c
o
n
tro
ls
t
h
e
se
n
so
rs
a
n
d
li
g
h
ts
a
t
h
o
m
e
in
o
rd
e
r
to
sa
v
e
e
n
e
rg
y
c
o
n
su
m
p
ti
o
n
.
T
h
is
sy
st
e
m
is
a
c
c
e
ss
ib
le
b
y
u
se
r
a
n
y
ti
m
e
a
n
d
a
n
y
w
h
e
r
e
a
s lo
n
g
th
e
re
is
a
n
I
n
ter
n
e
t
c
o
n
n
e
c
ti
o
n
.
K
ey
w
o
r
d
:
A
r
d
u
i
n
o
Un
o
GSM
m
o
d
u
le
Ho
m
e
s
ec
u
r
it
y
L
D
R
s
e
n
s
o
r
P
I
R
s
en
s
o
r
Co
p
y
rig
h
t
©
2
0
1
6
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
No
r
f
ad
zlia
Mo
h
d
Yu
s
o
f
,
Facu
lt
y
o
f
E
n
g
i
n
ee
r
i
n
g
T
ec
h
n
o
lo
g
y
,
Un
i
v
er
s
iti T
ek
n
ik
al
Ma
la
y
s
ia
Me
lak
a,
Han
g
T
u
ah
J
a
y
a,
7
6
1
0
0
Du
r
ian
T
u
n
g
g
al,
Me
la
k
a,
Ma
la
y
s
ia.
E
m
ail:
n
o
r
f
ad
zlia
@
u
te
m
.
ed
u
.
m
y
1.
I
NT
RO
D
UCT
I
O
N
Du
r
in
g
t
h
is
f
ast
p
ac
e
o
f
tec
h
n
o
lo
g
y
d
ev
elo
p
m
e
n
t,
t
h
er
e
ar
e
m
an
y
tec
h
n
o
lo
g
ies
ca
n
b
e
u
s
e
d
to
s
ec
u
r
e
th
e
h
o
m
e.
On
e
o
f
t
h
e
tech
n
o
lo
g
ies
is
u
s
i
n
g
m
icr
o
co
n
tr
o
ll
er
b
ased
h
o
m
e
s
ec
u
r
it
y
s
y
s
te
m
[
1
]
.
I
t
is
b
u
ilt
to
m
o
n
ito
r
th
e
d
o
o
r
s
an
d
w
i
n
d
o
w
s
o
f
a
h
o
u
s
e.
I
t
w
ill
t
r
ig
g
er
an
alar
m
to
s
e
n
d
w
ar
n
in
g
s
i
g
n
al
to
n
ea
r
es
t
p
o
lice
s
tatio
n
w
h
e
n
p
er
s
o
n
s
tr
ied
to
b
r
ea
k
in
to
t
h
e
h
o
u
s
e.
A
cc
o
r
d
in
g
to
[
2
]
ex
is
ti
n
g
s
y
s
t
e
m
f
o
r
s
ec
u
r
it
y
ar
e
p
ass
iv
e
a
n
d
co
s
tl
y
.
T
h
e
y
d
ev
elo
p
ed
a
w
eb
b
ased
h
o
m
e
s
ec
u
r
it
y
s
y
s
te
m
ca
n
b
e
u
s
ed
to
d
etec
t
in
tr
u
d
er
,
f
ir
e
a
n
d
s
m
o
k
e
at
h
o
m
e.
T
h
e
aim
s
o
f
th
eir
p
r
o
j
ec
t
t
o
p
r
o
v
id
e
s
ec
u
r
it
y
i
n
s
u
c
h
a
w
a
y
t
h
at
u
s
er
ca
n
m
o
n
ito
r
h
is
h
o
m
e
a
n
d
at
th
e
s
a
m
e
t
i
m
e
ca
n
co
n
tr
o
l
f
o
r
a
n
y
b
ad
s
itu
a
tio
n
s
o
cc
u
r
r
in
g
at
h
o
m
e.
Usi
n
g
t
h
is
s
y
s
te
m
,
o
n
e
ca
n
m
a
n
ag
e
h
is
h
o
m
e
s
af
e
l
y
f
r
o
m
r
e
m
o
te
p
lace
s
.
W
o
r
k
in
[
3
]
p
r
esen
ts
th
e
d
es
ig
n
an
d
i
m
p
le
m
e
n
tat
io
n
o
f
a
G
S
M
b
ased
w
ir
eles
s
h
o
m
e
s
ec
u
r
i
t
y
s
y
s
te
m
w
h
ic
h
ta
k
e
a
v
er
y
less
p
o
w
er
.
T
h
e
s
y
s
te
m
is
a
w
ir
eles
s
h
o
m
e
n
et
w
o
r
k
w
h
ic
h
co
n
tai
n
s
a
GSM
m
o
d
e
m
a
n
d
m
ag
n
et
w
i
th
r
ela
y
w
h
ic
h
ar
e
d
o
o
r
s
ec
u
r
it
y
n
o
d
es.
T
h
e
s
y
s
te
m
ca
n
r
esp
o
n
s
e
r
ap
id
l
y
as
in
tr
u
d
er
d
etec
t
an
d
GSM
m
o
d
u
le
w
ill
d
o
aler
t
h
o
m
e
o
w
n
er
.
S
u
s
p
ec
ted
ac
tiv
it
i
es
ar
e
co
n
v
e
y
ed
to
r
e
m
o
te
u
s
er
th
r
o
u
g
h
SMS
o
r
C
all
u
s
i
n
g
G
SM
tech
n
o
lo
g
y
.
No
w
ad
a
y
s
,
m
o
s
t
o
f
th
e
p
eo
p
le
ar
e
th
e
s
m
ar
tp
h
o
n
e
u
s
er
s
.
T
h
i
s
ca
u
s
e
t
h
e
tech
n
o
lo
g
y
o
f
h
o
m
e
s
ec
u
r
it
y
s
y
s
te
m
lo
o
k
to
w
ar
d
s
to
an
d
r
o
id
b
ased
.
T
h
e
an
d
r
o
id
b
ased
h
o
m
e
s
ec
u
r
it
y
s
y
s
te
m
h
e
lp
u
s
er
s
to
co
n
tr
o
l
th
eir
h
o
m
e
ap
p
lian
ce
b
y
j
u
s
t
to
u
c
h
a
b
u
tto
n
o
n
th
eir
s
m
ar
tp
h
o
n
e.
T
h
ey
ca
n
co
n
tr
o
l
th
eir
h
o
m
e
ap
p
lian
ce
at
ev
er
y
w
h
er
e
w
i
th
ac
ce
s
s
to
t
h
e
in
ter
n
e
t.
I
t a
l
s
o
u
s
es
to
i
n
f
o
r
m
th
e
h
o
u
s
e
o
w
n
er
s
in
a
r
e
m
o
te
lo
ca
tio
n
ab
o
u
t a
n
y
h
o
m
e
i
n
tr
u
s
io
n
o
r
atte
m
p
t to
i
n
tr
u
d
e
t
h
e
h
o
u
s
e
[
4
]
.
I
n
t
h
is
p
ap
er
,
th
e
h
o
m
e
s
ec
u
r
i
t
y
s
y
s
te
m
p
r
o
v
id
es
P
ass
i
v
e
I
n
f
r
ar
ed
Sen
s
o
r
(
P
I
R
)
m
o
tio
n
d
etec
to
r
an
d
lig
h
t
d
etec
to
r
to
u
s
er
s
.
A
n
y
m
o
tio
n
d
etec
t
ed
b
y
t
h
e
P
I
R
s
en
s
o
r
in
th
e
h
o
m
e
w
ill
n
o
tify
t
h
e
u
s
er
s
v
ia
SM
S
an
d
at
th
e
s
a
m
e
t
i
m
e
w
ill
tr
ig
g
er
t
h
e
b
u
zz
er
in
th
e
r
e
m
o
te
h
o
m
e
m
ak
in
g
o
t
h
er
s
a
w
ar
e
o
f
th
e
p
o
s
s
ib
le
i
n
tr
u
s
io
n
.
O
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
9
-
4864
IJ
R
E
S
Vo
l.
5
,
No
.
2
,
J
u
l
y
201
6
:
9
0
–
9
5
91
th
e
o
t
h
er
h
a
n
d
,
t
h
e
L
i
g
h
t
Dep
en
d
en
t
R
es
is
to
r
(
L
DR
)
lig
h
t
d
et
ec
to
r
s
en
s
o
r
is
u
s
ed
to
d
etec
t
th
e
p
r
esen
ce
a
n
d
ab
s
en
ce
o
f
li
g
h
t.
T
h
e
la
m
p
will
li
g
h
t
u
p
a
u
to
m
atica
ll
y
at
n
ig
h
t
a
n
d
d
i
m
at
d
a
y
ti
m
e.
I
n
ad
d
ito
n
,
w
eb
b
a
s
ed
s
y
s
te
m
allo
w
s
u
s
er
s
to
ch
o
o
s
e
w
h
ic
h
li
g
h
t
to
b
e
t
u
r
n
ed
o
f
f
w
h
e
n
it
i
s
u
n
u
s
ed
.
B
y
u
s
in
g
a
u
to
-
l
ig
h
t
s
y
s
te
m
,
t
h
e
en
er
g
y
co
n
s
u
m
p
tio
n
ca
n
b
e
g
r
ad
u
all
y
r
ed
u
ce
d
.
I
n
s
u
m
m
ar
ize,
th
e
w
eb
b
ased
h
o
m
e
s
ec
u
r
it
y
s
y
s
te
m
is
d
ev
elo
p
ed
to
allo
w
s
u
s
er
s
to
k
n
o
w
t
h
e
s
tat
u
s
o
f
th
eir
h
o
m
e
b
y
ac
ce
s
s
i
n
g
to
th
e
in
ter
n
et
alt
h
o
u
g
h
u
s
er
s
ar
e
n
o
t
at
h
o
m
e.
T
h
e
m
ai
n
ad
v
a
n
ta
g
e
o
f
d
ev
el
o
p
i
n
g
w
eb
b
ased
in
s
tead
o
f
an
d
r
o
id
ap
p
s
is
it
allo
w
s
u
s
er
s
o
f
an
y
m
o
b
ile
d
ev
ice
s
u
c
h
a
s
iP
h
o
n
e
a
n
d
B
l
ac
k
B
er
r
y
to
ac
ce
s
s
th
e
w
eb
s
it
e
an
d
u
s
e
it
i
m
m
ed
iate
l
y
[
5
]
.
B
esid
es
t
h
at,
it
o
n
l
y
n
ee
d
s
o
n
e
p
er
s
o
n
o
r
a
tea
m
to
m
ai
n
tai
n
t
h
e
s
i
n
g
le
co
d
e
b
ase.
T
h
is
en
ab
les a
ll
u
s
er
s
ac
r
o
s
s
all
p
latf
o
r
m
s
ac
ce
s
s
an
d
u
s
e
t
h
e
s
y
s
te
m
.
2.
RE
S
E
ARCH
M
E
T
H
O
D
T
h
is
p
r
o
j
ec
t
in
v
o
lv
es
t
h
e
i
m
p
le
m
en
ta
tio
n
o
f
s
o
f
t
w
ar
e
an
d
h
ar
d
w
ar
e.
T
h
r
ee
m
o
d
u
les
h
av
e
b
ee
n
ca
r
r
ied
o
u
t in
th
i
s
p
r
o
j
ec
t,
w
h
i
ch
in
cl
u
d
e
au
t
h
e
n
ticatio
n
m
o
d
u
le,
h
o
m
e
s
ec
u
r
it
y
m
o
d
u
le
a
n
d
GSM
m
o
d
u
le.
2
.
1
.
Aut
hentic
a
t
io
n
M
o
du
le
Fig
u
r
e
1
s
h
o
w
s
th
e
f
lo
w
c
h
ar
t
o
f
t
h
e
s
y
s
te
m
’
s
a
u
th
e
n
ticat
io
n
m
o
d
u
le.
Fo
r
t
h
e
f
ir
s
t
ti
m
e
l
o
g
in
,
u
s
er
s
m
a
y
ac
ce
s
s
to
t
h
e
s
y
s
te
m
b
y
u
s
in
g
t
h
e
d
e
f
au
l
t p
ass
w
o
r
d
p
r
o
v
id
ed
,
w
h
ic
h
i
s
1
2
3
4
5
.
T
h
en
,
u
s
er
s
ar
e
r
eq
u
ir
ed
to
ch
an
g
e
to
a
n
e
w
p
ass
w
o
r
d
,
in
o
r
d
er
to
p
r
ev
en
t
u
n
a
u
th
o
r
ize
d
p
er
s
o
n
f
r
o
m
ac
ce
s
s
i
n
g
to
t
h
e
s
y
s
te
m
.
On
ce
t
h
e
p
ass
w
o
r
d
is
c
h
an
g
ed
,
th
e
y
n
ee
d
to
lo
g
in
ag
ai
n
to
v
er
i
f
y
t
h
eir
id
en
tit
y
.
W
h
en
e
n
ter
i
n
g
th
e
m
ain
p
ag
e,
th
e
s
y
s
te
m
w
o
u
ld
r
eq
u
est
s
u
s
er
to
en
ter
t
h
e
I
P
ad
d
r
ess
o
f
t
h
e
s
y
s
te
m
b
ef
o
r
e
th
e
y
ca
n
s
tar
t
to
co
n
f
ig
u
r
e
th
e
s
e
n
s
o
r
s
a
n
d
li
g
h
ts
,
as
i
llu
s
tr
ated
in
Fi
g
u
r
e
2
.
T
h
is
m
eth
o
d
h
as
p
r
o
v
id
ed
o
n
e
m
o
r
e
p
r
o
tectio
n
lay
er
to
th
e
s
y
s
te
m
[
4
]
.
T
h
er
ef
o
r
e,
o
n
ly
a
u
t
h
o
r
ized
p
er
s
o
n
,
w
h
o
i
n
s
er
ted
th
e
co
r
r
ec
t
I
P
ad
d
r
ess
o
f
th
e
s
y
s
te
m
i
m
p
le
m
en
ted
at
th
eir
h
o
m
e,
ca
n
ac
ce
s
s
to
th
e
co
n
f
ig
u
r
atio
n
p
ag
e.
T
h
e
GUI
w
as
cr
ea
ted
u
s
i
n
g
Ad
o
b
e
D
r
ea
m
w
ea
v
er
.
T
h
e
A
p
ac
h
e
an
d
M
y
SQ
L
i
n
X
A
MP
P
s
e
r
v
er
ac
t
as
a
w
eb
s
er
v
er
a
n
d
d
atab
ase
s
y
s
te
m
.
T
h
e
d
ata
o
f
u
s
er
n
a
m
e
a
n
d
p
ass
w
o
r
d
w
as
k
ep
t
i
n
M
y
SQL
d
atab
ase.
T
h
is
s
y
s
te
m
l
i
m
it
to
o
n
l
y
1
u
s
er
ac
co
u
n
t
p
er
h
o
u
s
e.
Af
ter
s
u
c
ce
s
s
f
u
l
l
y
lo
g
in
to
t
h
e
s
y
s
te
m
,
u
s
er
ca
n
s
tar
t
to
co
n
f
i
g
u
r
e
th
e
m
o
t
io
n
s
e
n
s
o
r
,
li
g
h
t
s
en
s
o
r
an
d
lig
h
t
s
in
t
h
e
h
o
u
s
e.
Fig
u
r
e
1
.
Flo
w
c
h
ar
t o
f
au
th
e
n
t
icatio
n
m
o
d
u
le
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
R
E
S
I
SS
N:
2
0
8
8
-
8708
W
eb
B
a
s
ed
Ho
me
S
ec
u
r
ity
a
n
d
A
u
to
ma
tio
n
S
ystem
(
N
o
r
fa
d
z
lia
Mo
h
d
Yu
s
o
f
)
92
Fig
u
r
e
2
.
Ma
in
p
ag
e
o
f
t
h
e
s
y
s
te
m
2.
2
.
H
o
m
e
Securit
y
M
o
du
le
Fig
u
r
e
3
illu
s
tr
ates
t
h
e
o
v
er
al
l
h
o
m
e
s
ec
u
r
it
y
s
y
s
te
m
in
t
h
i
s
p
r
o
j
ec
t.
I
n
th
is
s
y
s
te
m
,
A
r
d
u
in
o
U
n
o
b
o
ar
d
w
ith
E
t
h
er
n
et
s
h
ield
i
s
u
s
ed
as
th
e
m
a
in
co
n
tr
o
lle
r
f
o
r
all
d
ev
ices
an
d
co
m
p
o
n
en
t
s
.
T
h
e
co
n
tr
o
l
p
r
o
g
r
am
,
w
h
ic
h
w
as
e
m
b
ed
d
ed
in
to
th
e
A
t
m
eg
a3
2
8
m
icr
o
co
n
tr
o
ller
o
n
th
e
A
r
d
u
i
n
o
Un
o
b
o
ar
d
[
9
]
,
w
as
d
ev
elo
p
ed
in
A
r
d
u
in
o
I
DE
s
o
f
t
w
ar
e
b
y
u
s
in
g
t
h
e
A
r
d
u
i
n
o
p
r
o
g
r
a
m
m
i
n
g
la
n
g
u
a
g
e,
w
h
ic
h
i
s
a
lan
g
u
ag
e
b
ased
o
n
C
++
la
n
g
u
a
g
e.
Me
an
w
h
ile
,
th
e
A
r
d
u
i
n
o
E
th
er
n
et
s
h
ie
ld
[
1
0
]
is
th
e
in
ter
f
ac
e
w
h
ic
h
co
n
n
ec
t
s
t
h
e
A
r
d
u
i
n
o
Un
o
to
th
e
I
n
ter
n
et,
th
u
s
m
a
k
e
it p
o
s
s
ib
le
to
b
e
co
n
tr
o
lled
b
y
u
s
er
s
r
e
m
o
tel
y
.
T
h
e
A
r
d
u
i
n
o
U
n
o
b
o
ar
d
is
co
n
n
ec
ted
to
s
e
v
er
al
s
en
s
o
r
s
a
n
d
co
m
p
o
n
e
n
ts
,
s
u
c
h
a
s
a
P
I
R
m
o
t
io
n
s
en
s
o
r
,
L
DR
s
en
s
o
r
s
an
d
also
b
u
zz
er
.
P
I
R
m
o
tio
n
s
en
s
o
r
is
u
s
ed
in
th
is
s
y
s
te
m
f
o
r
m
o
tio
n
d
etec
tio
n
in
s
id
e
th
e
h
o
u
s
e,
w
h
er
ea
s
t
h
e
L
D
R
s
e
n
s
o
r
s
ar
e
r
esp
o
n
s
ib
le
in
d
etec
tin
g
t
h
e
p
r
esen
ce
an
d
t
h
e
in
te
n
s
it
y
o
f
lig
h
t
[
1
]
.
A
b
u
zz
er
,
w
h
ic
h
f
u
n
ctio
n
is
t
o
e
m
it
t
h
e
s
o
u
n
d
,
is
u
s
ed
t
o
s
ca
r
e
o
f
f
th
e
in
tr
u
d
er
s
,
b
esid
es
aler
ti
n
g
th
e
n
eig
h
b
o
u
r
h
o
o
d
.
B
esid
es,
a
GSM
m
o
d
u
le
i
s
also
co
n
n
ec
ted
to
th
e
A
r
d
u
in
o
Un
o
,
t
h
u
s
all
o
w
i
n
g
th
e
latter
t
o
s
en
d
an
d
to
r
ec
eiv
e
SM
S
m
e
s
s
ag
es
f
r
o
m
m
o
b
ile
p
h
o
n
es.
Fig
u
r
e
3
.
Ov
er
all
h
o
m
e
s
ec
u
r
it
y
an
d
au
to
m
atio
n
s
y
s
te
m
2.
3
.
No
t
if
ica
t
io
n
M
o
du
le
A
n
o
tific
atio
n
m
o
d
u
le
is
r
eq
u
ir
ed
in
th
is
s
y
s
te
m
,
in
o
r
d
er
to
s
en
d
SMS
m
ess
a
g
e
s
to
u
s
er
s
,
aler
tin
g
th
e
m
r
e
g
ar
d
in
g
th
e
d
etec
ted
m
o
tio
n
i
n
s
id
e
t
h
eir
h
o
m
e
[
6
,
7
,
8
]
.
T
h
e
GSM
m
o
d
u
l
e
is
ch
o
s
e
n
as
t
h
e
co
m
m
u
n
icatio
n
m
ed
i
u
m
,
s
i
n
c
e
it
d
o
esn
’
t
h
a
v
e
a
n
y
li
m
itatio
n
o
n
t
h
e
co
m
m
u
n
icatio
n
r
a
n
g
e,
th
u
s
SM
S
ca
n
b
e
s
u
cc
e
s
s
f
u
ll
y
s
e
n
t
to
t
h
e
r
ec
ip
ien
ts
,
e
v
e
n
i
f
t
h
e
y
ar
e
f
ar
e
a
w
a
y
f
r
o
m
h
o
m
e.
I
n
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
,
it
i
s
in
itial
ized
to
s
e
n
d
a
n
d
r
ec
eiv
e
m
o
d
e.
A
t
f
ir
s
t,
A
r
d
u
i
n
o
s
e
n
d
s
t
h
e
A
T
co
m
m
an
d
s
to
G
SM
m
o
d
u
le
r
ep
ea
ted
l
y
,
u
n
t
il
t
h
e
la
tter
r
ep
l
y
a
n
ac
k
n
o
w
led
g
e
m
e
n
t
to
t
h
e
f
o
r
m
er
.
Af
ter
th
at,
i
t
w
ait
s
f
o
r
in
p
u
ts
f
r
o
m
t
h
e
P
I
R
m
o
tio
n
s
en
s
o
r
s
.
O
n
ce
it
d
etec
ts
m
o
v
e
m
en
t
i
n
s
id
e
th
e
h
o
u
s
e,
th
e
w
a
r
n
in
g
l
ig
h
t
w
o
u
ld
lig
h
t
u
p
a
n
d
th
e
GSM
m
o
d
u
le
w
il
l
in
it
iate
a
w
ar
n
in
g
SMS
m
ess
a
g
e,
w
h
ic
h
w
ill
b
e
s
en
t
to
u
s
er
s
’
m
o
b
ile
p
h
o
n
es.
T
h
e
p
r
o
c
ess
is
ill
u
s
tr
ated
in
Fig
u
r
e
4
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
9
-
4864
IJ
R
E
S
Vo
l.
5
,
No
.
2
,
J
u
l
y
201
6
:
9
0
–
9
5
93
Fig
u
r
e
4
.
Flo
w
c
h
ar
t o
f
No
ti
f
i
ca
tio
n
m
o
d
u
le
3.
RE
SU
L
T
S
A
ND
AN
AL
Y
SI
S
T
h
e
s
y
s
te
m
w
a
s
co
n
s
tr
u
cted
as
s
h
o
w
n
i
n
Fi
g
u
r
e
5
,
w
h
er
e
th
e
A
r
d
u
i
n
o
Un
o
w
it
h
E
t
h
er
n
et
Sh
ield
,
GSM
m
o
d
u
le
a
n
d
s
en
s
o
r
s
w
e
r
e
attac
h
ed
an
d
co
n
n
ec
ted
to
g
eth
er
,
an
d
i
m
p
le
m
e
n
ted
to
a
h
o
m
e
p
r
o
to
t
y
p
e.
A
s
er
ies o
f
tes
ts
w
er
e
co
n
d
u
cted
in
o
r
d
er
to
v
alid
ate
th
e
f
u
n
ct
io
n
alit
y
o
f
t
h
e
p
r
o
p
o
s
ed
s
y
s
te
m
.
Fig
u
r
e
5
.
Sid
e
v
ie
w
o
f
h
o
m
e
p
r
o
to
ty
p
e
As
ca
n
b
e
o
b
s
er
v
ed
in
Fig
u
r
e
6
,
th
e
w
ar
n
in
g
li
g
h
t
i
s
lig
h
te
n
u
p
an
d
th
e
b
u
zz
er
is
tr
ig
g
er
ed
,
o
n
ce
th
e
P
I
R
s
en
s
o
r
d
etec
ts
in
s
id
e
t
h
e
h
o
u
s
e.
F
u
r
t
h
er
m
o
r
e,
u
s
er
s
al
s
o
r
ec
eiv
e
m
e
s
s
a
g
es
o
n
t
h
eir
m
o
b
ile
p
h
o
n
es,
s
e
n
t
f
r
o
m
th
e
G
SM
m
o
d
u
le
r
eg
ar
d
i
n
g
d
etec
ted
m
o
tio
n
a
t
t
h
eir
h
o
m
e,
th
u
s
t
h
e
y
ca
n
tak
e
i
m
m
ed
iate
ac
tio
n
s
,
as
ca
n
b
e
s
ee
n
in
F
ig
u
r
e
7
.
Fig
u
r
e
6
.
W
ar
n
in
g
li
g
h
t t
u
r
n
o
n
w
h
e
n
d
etec
t
m
o
v
e
m
en
t
Evaluation Warning : The document was created with Spire.PDF for Python.
IJ
R
E
S
I
SS
N:
2
0
8
8
-
8708
W
eb
B
a
s
ed
Ho
me
S
ec
u
r
ity
a
n
d
A
u
to
ma
tio
n
S
ystem
(
N
o
r
fa
d
z
lia
Mo
h
d
Yu
s
o
f
)
94
Fig
u
r
e
7
.
W
ar
n
in
g
m
es
s
a
g
e
r
ec
eiv
ed
b
y
u
s
er
s
Fig
u
r
e
8
s
h
o
w
s
t
h
e
co
n
f
i
g
u
r
at
io
n
p
ag
e
o
f
t
h
e
h
o
m
e
s
ec
u
r
it
y
s
y
s
te
m
f
o
r
ac
tiv
atio
n
o
r
d
ea
ctiv
atio
n
o
f
th
e
s
en
s
o
r
s
.
O
n
o
n
e
h
a
n
d
,
u
s
e
r
s
ca
n
r
e
m
o
tel
y
ch
o
o
s
e
w
h
ic
h
lig
h
t
s
(
r
ep
r
esen
ted
b
y
L
E
D
s
)
to
b
e
t
u
r
n
ed
o
n
o
r
o
f
f
a
s
t
h
e
y
d
es
ir
ed
.
T
h
er
ef
o
r
e,
u
s
er
s
ca
n
c
h
o
o
s
e
to
tu
r
n
o
f
f
t
h
e
L
E
Ds
r
e
m
o
tel
y
if
th
e
lig
h
t
n
o
t
n
ec
e
s
s
ar
y
,
th
u
s
r
ed
u
ci
n
g
th
e
e
n
er
g
y
co
n
s
u
m
p
t
io
n
.
On
th
e
o
t
h
er
h
an
d
,
th
e
L
D
R
s
en
s
o
r
ca
n
b
e
ac
tiv
ated
in
o
r
d
er
to
d
etec
t
th
e
lig
h
t
in
ten
s
it
y
i
n
s
id
e
th
e
h
o
u
s
e.
T
h
is
f
ea
t
u
r
e
co
n
tr
ib
u
te
s
to
an
o
th
er
ap
p
licatio
n
,
w
h
ic
h
is
t
h
e
au
to
-
li
g
h
t
co
n
tr
o
l
s
y
s
t
e
m
,
w
h
er
e
t
h
e
lig
h
t
s
o
r
th
e
L
E
D
s
c
an
b
e
au
to
m
ati
ca
ll
y
t
u
r
n
ed
o
n
i
n
t
h
e
d
ar
k
n
e
s
s
,
o
r
tu
r
n
ed
o
f
f
d
u
r
i
n
g
d
a
y
li
g
h
t,
a
s
p
ictu
r
ed
i
n
Fig
u
r
e
9
.
Fo
r
th
is
p
u
r
p
o
s
e,
a
s
p
ec
if
ic
v
alu
e
o
f
L
D
R
r
ea
d
in
g
is
s
et
as
t
h
e
t
h
r
es
h
o
ld
v
al
u
e,
t
h
u
s
a
n
y
r
ea
d
v
al
u
e
w
h
ic
h
is
b
elo
w
th
a
n
t
h
e
th
r
es
h
o
ld
v
alu
e,
ca
n
b
e
co
n
s
id
er
ed
as d
ar
k
an
d
th
e
li
g
h
t
w
ill b
e
tu
r
n
ed
o
n
.
Fig
u
r
e
8
.
C
o
n
f
ig
u
r
atio
n
p
ag
e
Fig
u
r
e
9
.
L
E
Ds li
g
h
t u
p
w
h
en
v
alu
e
o
f
li
g
h
t i
n
te
n
s
i
t
y
le
s
s
t
h
a
n
4
0
4.
CO
NCLU
SI
O
N
In
co
n
clu
s
io
n
,
i
m
p
le
m
en
ta
tio
n
o
f
w
eb
b
ased
h
o
m
e
s
ec
u
r
it
y
s
y
s
te
m
ca
n
en
h
a
n
ce
th
e
h
o
m
e
s
ec
u
r
it
y
.
B
esid
es
t
h
at,
it
also
b
r
o
u
g
h
t
c
o
n
v
e
n
ien
t
to
u
s
er
s
b
y
p
r
o
v
id
i
n
g
au
to
-
li
g
h
t
s
y
s
te
m
a
n
d
co
n
f
ig
u
r
e
w
h
ich
li
g
h
t
to
b
e
tu
r
n
ed
ON.
T
h
e
en
er
g
y
co
n
s
u
m
p
t
io
n
ca
n
b
e
r
ed
u
ce
d
g
r
ad
u
all
y
.
T
h
is
p
r
o
j
ec
t
also
en
ab
l
e
u
s
er
s
to
ac
ce
s
s
t
o
th
e
s
y
s
te
m
a
n
y
t
i
m
e
a
n
d
an
y
wh
er
e
w
h
e
n
th
er
e
w
a
s
in
ter
n
et
c
o
n
n
ec
tio
n
.
T
h
is
h
o
m
e
s
ec
u
r
it
y
s
y
s
te
m
ca
n
b
e
i
m
p
r
o
v
ed
b
y
u
s
i
n
g
a
n
o
th
er
m
o
t
io
n
d
etec
to
r
to
av
o
id
m
is
tr
ig
g
er
r
in
g
th
e
b
u
zz
er
w
h
e
n
th
er
e
h
a
v
e
a
p
et
p
ass
b
y
.
T
h
is
i
s
b
ec
au
s
e
P
I
R
s
en
s
o
r
d
o
e
s
n
o
t
k
n
o
w
h
o
w
to
d
if
f
er
e
n
tiate
t
h
e
m
o
v
e
m
e
n
t
o
f
h
u
m
an
a
n
d
an
i
m
a
l.
I
n
ad
d
itio
n
,
th
is
p
r
o
j
ec
t
ca
n
also
b
e
i
m
p
r
o
v
ed
b
y
m
a
k
i
n
g
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
9
-
4864
IJ
R
E
S
Vo
l.
5
,
No
.
2
,
J
u
l
y
201
6
:
9
0
–
9
5
95
th
e
h
o
m
e
b
ec
o
m
e
ev
e
n
s
m
ar
ter
,
w
h
ic
h
m
ea
n
in
s
talli
n
g
te
m
p
er
atu
r
e
s
en
s
o
r
,
w
eb
ca
m
,
an
d
also
f
ac
e
r
ec
o
g
n
itio
n
s
y
s
te
m
b
ef
o
r
e
en
t
er
in
g
h
o
m
e.
ACK
NO
WL
E
D
G
E
M
E
NT
S
T
h
e
au
th
o
r
s
w
i
s
h
to
ac
k
n
o
w
l
ed
g
e
Un
i
v
er
s
it
i
T
ek
n
i
k
al
Ma
l
a
y
s
ia
M
ela
k
a
(
UT
eM
)
f
o
r
th
e
f
i
n
an
cia
l
f
u
n
d
i
n
g
a
n
d
p
r
o
v
id
in
g
i
n
s
tr
u
m
en
tatio
n
d
e
v
ices s
u
p
p
o
r
t o
f
th
i
s
p
r
o
j
e
ct.
RE
F
E
R
E
NC
E
S
[1
]
M
.
S
.
Isla
m
,
“
Ho
me
se
c
u
rity
sy
st
e
m
b
a
se
d
o
n
PIC
1
8
F4
5
2
mic
ro
c
o
n
tro
ll
e
r
”
,
in
I
EE
E
I
n
tern
a
ti
o
n
a
l
Co
n
f
e
re
n
c
e
o
n
El
e
c
tro
/In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
y
,
2
0
1
4
,
p
p
.
2
0
2
-
2
0
5
.
[2
]
P
.
S
.
Ba
n
g
a
re
,
e
t
a
l.
,
“
T
h
e
On
li
n
e
Ho
m
e
S
e
c
u
rit
y
S
y
ste
m
:
W
a
y
s
to
P
ro
tec
t
Ho
m
e
f
ro
m
In
tru
d
e
rs
&
T
h
e
f
t
s”
,
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
I
n
n
o
v
a
ti
v
e
T
e
c
h
n
o
l
o
g
y
a
n
d
Exp
l
o
rin
g
E
n
g
in
e
e
rin
g
,
v
o
l.
2
,
p
p
.
1
0
9
-
1
1
2
,
2
0
1
3
.
[3
]
A
.
S
.
P
a
ra
b
,
e
t
a
l.
,
“
Im
p
le
m
e
n
tatio
n
o
f
Ho
m
e
S
e
c
u
rit
y
S
y
ste
m
u
sin
g
G
S
M
m
o
d
u
le
a
n
d
M
icro
c
o
n
tr
o
ll
e
r”
,
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
C
o
mp
u
ter
S
c
ien
c
e
a
n
d
I
n
fo
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
ies
,
v
o
l.
6
,
p
p
.
2
9
5
0
-
2
9
5
3
,
2
0
1
5
.
[4
]
R.
K.
S
h
a
rm
a
,
“
An
d
ro
i
d
In
ter
f
a
c
e
Ba
se
d
GS
M
Ho
me
S
e
c
u
rity
S
y
ste
m”,
in
IEE
E
I
n
tern
a
ti
o
n
a
l
Co
n
f
e
re
n
c
e
o
n
El
e
c
tro
/In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
y
,
2
0
1
4
,
p
p
.
2
0
2
-
2
0
5
.
[5
]
h
tt
p
:
//
u
x
m
a
g
.
c
o
m
/article
s/n
a
ti
v
e
-
or
-
w
e
b
-
b
a
se
d
-
se
lec
ti
n
g
-
th
e
-
rig
h
t
-
a
p
p
ro
a
c
h
-
f
o
r
-
y
o
u
r
-
m
o
b
il
e
-
a
p
p
[6
]
A
.
M
u
ll
a
,
e
t
a
l.
,
“
GS
M
Ba
se
d
I
n
ter
a
c
ti
v
e
Vo
ice
Res
p
o
n
se
S
y
ste
m
fo
r
W
ire
les
s
L
o
a
d
Co
n
tro
l
a
n
d
M
o
n
it
o
ri
n
g
”
,
i
n
In
tern
a
ti
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
Co
m
m
u
n
ica
ti
o
n
,
I
n
f
o
rm
a
ti
o
n
a
n
d
Co
m
p
u
ti
n
g
T
e
c
h
n
o
lo
g
y
,
2
0
1
5
,
p
p
.
1
-
6.
[7
]
S
.
I.
A
z
id
,
e
t
a
l.
,
“
A
n
a
ly
sis
a
n
d
P
e
rf
o
rm
a
n
c
e
o
f
a
L
o
w
Co
st
S
M
S
Ba
se
d
Ho
m
e
S
e
c
u
rit
y
S
y
ste
m
”
,
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
S
m
a
rt Ho
me
,
v
o
l
.
5
,
p
p
.
1
5
-
2
4
,
2
0
1
1
.
[8
]
J.
Ba
n
g
a
li
,
e
t
a
l
.
,
“
De
sig
n
a
n
d
Im
p
lem
e
n
tatio
n
o
f
S
e
c
u
rit
y
S
y
st
e
m
s
f
o
r
S
m
a
rt
Ho
m
e
Ba
se
d
o
n
G
S
M
teh
n
o
lo
g
y
”
.
”
,
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
S
ma
rt H
o
me
,
v
o
l.
7
,
p
p
.
1
5
-
2
4
,
2
0
1
3
.
[9
]
h
tt
p
s:/
/www
.
a
rd
u
in
o
.
c
c
/en
/
M
a
in
/
A
rd
u
in
o
Bo
a
r
d
Un
o
[1
0
]
h
tt
p
s:/
/www
.
a
rd
u
in
o
.
c
c
/en
/
M
a
in
/
A
rd
u
in
o
Et
h
e
rn
e
tS
h
ield
B
I
O
G
RAP
H
I
E
S
O
F
AUTH
O
RS
No
r
fa
d
z
li
a
M
o
h
d
Y
u
s
o
f
re
c
e
iv
e
d
h
is
M
S
c
in
th
e
a
re
a
o
f
Co
m
p
u
t
e
r
S
c
ien
c
e
in
2
0
1
4
a
n
d
BS
c
o
f
Co
m
p
u
ter
(S
o
f
tw
a
re
En
g
in
e
e
rin
g
)
f
ro
m
Un
iv
e
r
siti
T
e
k
n
o
lo
g
i
M
a
lay
sia
.
S
h
e
h
a
s
5
y
e
a
r
s
w
o
rk
in
g
e
x
p
e
rien
c
e
in
so
f
t
w
a
r
e
h
o
u
se
a
n
d
re
se
a
rc
h
a
n
d
d
e
v
e
lo
p
m
e
n
t
o
rg
a
n
iza
ti
o
n
b
e
f
o
re
jo
in
i
n
g
Un
iv
e
rsiti
T
e
k
n
ik
a
l
M
a
la
y
sia
M
e
lak
a
(U
T
e
M
)
a
s
lec
tu
re
r
a
n
d
re
se
a
rc
h
e
r,
He
r
re
se
a
rc
h
in
tere
st
in
c
lu
d
e
se
n
so
r
a
n
d
w
irele
ss
s
y
ste
m
,
a
rti
f
ic
ial
in
telli
g
e
n
c
e
,
c
o
m
p
u
tatio
n
a
l
in
telli
g
e
n
c
e
a
n
d
se
m
a
n
ti
c
tec
h
n
o
lo
g
ies
.
Ai
m
a
n
Z
a
k
w
a
n
J
id
in
o
b
tain
e
d
h
is
M
En
g
in
El
e
c
tro
n
ic
a
n
d
M
icro
e
lec
tro
n
ic
S
y
ste
m
En
g
in
e
e
rin
g
f
ro
m
ES
IEE
En
g
in
e
e
rin
g
P
a
ris
F
ra
n
c
e
in
2
0
1
1
.
He
h
a
s
2
y
e
a
rs
o
f
w
o
r
k
in
g
e
x
p
e
rien
c
e
in
d
e
sig
n
in
g
d
ig
it
a
l
I
C
a
n
d
d
ig
it
a
l
sy
ste
m
in
F
P
G
A
a
t
A
lt
e
ra
Co
rp
o
ra
ti
o
n
M
a
lay
sia
,
b
e
f
o
re
jo
in
i
n
g
Un
iv
e
rsiti
T
e
k
n
ik
a
l
M
a
lay
sia
M
e
lak
a
(U
T
e
M
)
a
s
lec
tu
re
r
a
n
d
re
se
a
rc
h
e
r.
His
re
se
a
rc
h
in
tere
sts in
c
lu
d
e
F
P
G
A
De
sig
n
a
n
d
Dig
it
a
l
S
y
ste
m
De
sig
n
.
Li
m
M
e
i
S
z
e
stu
d
ied
h
e
r
Ba
c
h
e
l
o
r
o
f
Co
m
p
u
ter
En
g
in
e
e
ri
n
g
T
e
c
h
n
o
lo
g
y
(Co
m
p
u
ter
S
y
ste
m
s)
w
it
h
Ho
n
o
u
rs
f
ro
m
Un
iv
e
rsiti
T
e
k
n
ik
a
l
M
a
la
y
sia
M
e
la
k
a
in
2
0
1
2
.
Cu
rre
n
tl
y
,
sh
e
u
n
d
e
rg
o
h
e
r
6
m
o
n
th
s
in
ters
h
i
p
a
t
In
tel
M
icro
e
lec
tro
n
ics
(M
)
S
d
n
.
B
h
d
.
He
r
jo
b
sc
o
p
e
a
t
In
tel
is
ru
n
n
i
n
g
in
teg
ra
ti
o
n
a
n
d
sim
u
latio
n
tes
ts
u
sin
g
F
P
G
A
.
Be
sid
e
s
th
a
t,
s
h
e
h
a
s
a
lso
h
e
l
p
t
o
d
e
b
u
g
t
h
e
tes
t
e
rro
rs an
d
d
e
v
e
lo
p
a
u
t
o
m
a
ted
sc
rip
t
t
o
e
a
se
th
e
e
ff
o
rt
o
n
in
teg
ra
ti
o
n
tes
ti
n
g
.
Evaluation Warning : The document was created with Spire.PDF for Python.