ICIEMS 2015

International Conference on Information Engineering, Management and Security 2015

 


ICIEMS 2015 Kokula Krishna Hari K
Publication Meta Value
Short Title ICIEMS 2015
Publisher ASDF, India
ISBN 13 978-81-929742-7-9
ISBN 10 81-929742-7-8
Language English
Type Hard Bound - Printed Book
Copyrights ICIEMS Organizers / DCRC, London, UK
Editor-in-Chief Kokula Krishna Hari K
Conference Dates 13 - 14, August 2015
Venue Country IITM-RP, Chennai, India
Submitted Papers 410
Acceptance Rate 4.11%
Website www.iciems.in

Paper 053


Smart-phone Based Home/Office Automation With Environment Monitoring

Smart-phone Based Home/Office Automation With Environment Monitoring

SUYOG SHRIPAD PANDE1, AARTI R SALUNKE2

1M.E. Student, 2Assistant Professor, 1, 2 Jawaharlal Nehru Engineering College, Aurangabad, (M.S.), India

Abstract

This paper presents the design of Smart-phone Based Home/Office Automation System with environment monitoring with low cost and wireless remote control. General idea of home/office automation shows the quality of human being at office/house. Prime focus of this technology is to control the office/household equipment’s like light, fan, door etc. automatically. In hazardous condition, it is useful for old aged and handicapped persons. Also, the smart home concept in the system improves the standard living at Office/home. The main control system implements wireless Bluetooth technology to provide remote access from PC/laptop or smart phone. The design remains the existing electrical switches and provides more safety control on the switches with low voltage activating method. The system intended to control electrical appliances and devices in office/house with relatively low cost design also for physical environment monitoring, user-friendly interface and ease of installation.

Author's Profile

SUYOG SHRIPAD PANDE : Profile

AARTI R SALUNKE : Profile

Cite this Article as Follows

SUYOG SHRIPAD PANDE, AARTI R SALUNKE. "Smart-phone Based Home/Office Automation With Environment Monitoring." International Conference on Information Engineering, Management and Security (2015): 318-322. Print.