AFZA
AFZA
Submitted by
ABINAYA.E 812020205004
BACHELOR OF TECHNOLOGY
in
INFORMATION TECHNOLOGY
SIGNATURE SIGNATURE
Dr.K.Geetha,M.E.,Ph.D., Ms.K.PREMA
Head of the Department Supervisor
Department of IT Department of IT
M.A.M. College of Engineering M.A.M College of Engineering
and Technology and Technology
Tiruchirappalli – 621 105. Tiruchirappalli – 621 105.
ACKNOWLEDGEMENT
With warm hearts and immense pleasure, I thank the almighty for his
grace and blessing bestowed on me, which drove me to the successful
completion of this project. I take this opportunity to express my sincere
thanks to the respected Director Dr.M.A.Maluk Mohammed, M.E.,
Ph.D., and Secretary & Correspondent Mrs. Fathima Bathool Maluk,
M.B.A., who is guiding light for all activities in our college.
I would like to thank our Head of the Department Dr. K. Geetha, M.E.,
Ph.D., for her cooperation, advice and suggestions at every stage of my
project work.
ABSTRACT
In today's lifestyle, people are moving towards achieving a fit and healthy body.
This shift has changed the way of living in almost every household. Now everyone
craves for healthy and nutritious food to be placed on their plates. Hence, healthy
eating and nutritious food have become an essential part of everyone’s lifestyle to
achieve a balanced and healthy life in such busy and hectic environment. Hence,
to make their fitness path a bit smoother and to enhance their experience, I have
created an Android [Personal Dietician] application to provide a broader approach
in providing a better living through nutritious and fit diet plan to the users. In this
project, the Personal Dietitian android application will use food ontology APIs,
which is a part of knowledge representation and semantic web technology to
produce diet plans for the users. Additionally, the app will provide an activity
tracker which will track the steps walk, climb, and run by the user. The activity
tracker is built using an API which uses accelerometer and gyroscope sensors built
into the Android device. v The application will start by signing up or logging the
user with the Personal Dietitian application. The signup and login screen which
will be useful to the user to manage their activities in the application. The
application provides four main user functionalities, namely, the activity tracker,
meal planner, reports, and health blog. (1) The Activity Tracker is used for tracking
the user steps including the walking, running and stairs time along with the total
step taken in a day. (2) The Meal planner activity is used to get the suggested
meal plans with the help of the user's general information (Height, Weight,
Gender, Age, and Body fat) and the food ontology database APIs. This
functionality also allows the user to add foods manually using text search and
voice search. (3) The third feature, Progress Report activity is used to present the
weekly and monthly reports of the activity tracker and nutrients consumed by the
user in the form of a line and pie chart. Moreover, the user can also see his/her
weekly progress for the activity tracker and meal planner by just clicking the icons
on the activities in the form of bar chart as well as a daily report in a list format.
(4) The last activity is the health blog which can be used to see different blogs
available online related to the health and life improvement.
TABLE OF CONTENTS
CHAPTER TITLE
NO.
ABSTRACT
LIST OF FIGURES
LIST OF ABBREVIATION
1 INTRODUCTION
1.1 OVERVIEW
1.2 OBJECTIVE
2 LITERATURE SURVEY
2.5 BLUETOOTH
BASED HOME 33
AUTOMATION
USING
ARDUINO.
3 SYSTEM 38
ANALYSIS
3.1 EXISTING 38
SYSTEM
3.1.1 39
Disadvantag
es
3.2 PROPOSED 39
SYSTEM
3.2.1 40
Advantages
4 SYSTEM 41
REQUIREMEN
TS
4.1 41
HARDWARE
REQUIREMENT
S
4.2 SOFTWARE 41
REQUIREMENT
S
5 SYSTEM 42
DESIGN
5.1 SYSTEM 42
ARCHITECTUR
42
E
6 MODULES 44
44
46
47
48
49
50
51
7 CONCLUSION AND 53
FUTURE
ENHANCMENT
7.1 53
CONCLUSION
7.2 FUTURE 53
ENHANCMENT
APPENDICES 54
A.SOURCE 54
CODE
B.SCREENSHO 59
TS
REFERENCES 63
LIST OF FIGURES
LIST OF ABBREVIATION
GUI Graphical User Interface
CHAPTER 1
INTRODUCTION
1.1 OVERVIEW
Web applications need for extensive testing before deployment and use,
for early detecting security vulnerabilities to improve the quality of the safety
of the software, the purpose of this paper is to research the fuzzing
applications in security vulnerabilities. This research first introduces the
common Web software security vulnerabilities, and then provide a
comprehensive overview of the fuzzing technology, and using fuzzing tools
Web fuzz to execute a software vulnerability testing, test whether there is a
software security hole. Test results prove that fuzzing is suitable for software
security vulnerabilities testing, but this methodology applies only to security
research field, and in the aspect of software security vulnerabilities detection
is still insufficient. Fuzzing is done under the premise that every programme
has bugs that are just waiting to be found. As a result, a methodical technique
ought to locate them eventually. Due of its non-human approach, fuzzing
might provide a different perspective to traditional software testing procedures
Due to the minimal effort required to set up the technique, it serves as a
reasonable complement rather than a replacement for them. Fuzz testing, often
known as fuzzing, is an automated software testing approach used in
programming and software development that includes feeding random,
erroneous, or invalid data into a computer programme.
1.2 OBJECTIVE
Our aim in this activity is to identify potential risks.
CHAPTER 2
LITERATURE SURVEY
2.2 author -Ivan Andrianto , M. M. Inggriani Liem, Yudistira Dwi Wardhana Asnar
ABSTRACT
INTRODUCTION
Security is very important for web applications. However, in the past three
years, more than three-quarters of scanned websites contain unpatched
security loopholes, of which one in seven are considered critical by 2015 [1]. It
becomes an opportunity for attackers to attack and take advantage as much
as possible. In general, web-based applications are accessible from anywhere
so the possibility of being attacked is bigger. Therefore, the development of
web-based applications need to pay attention to the security aspect. Various
techniques to perform security testing software according to Al-Ghamdi [2]
are code review, automated static analysis, binary code analysis, fuzz testing,
source and binary code fault injection, risk analysis, vulnerability scanning,
and penetration testing. In security testing of a software, multiple techniques
can be used in order to find as many vulnerabilities as possible. Fuzz testing
(fuzzing) is a technique for testing software by providing invalid input on
software tested for the purpose of causing errors in the software [3].The
software under test will be monitored against crashes or unexpected
behaviors. By generating a set of inputs, fuzz testing is expected to cover test
scenarios not covered by testing with other techniques. Fuzz testing can be
applied for security testing of web applications. Fuzz testing for web
applications can be done by sending a set of HTTP requests to the web
application under test. The tester needs to configure how input will be
generated. After he HTTP requests has been sent to the web application
under test, the next step is analyzing is there any vulnerability found and
generate testing reports.
METHODOLOGY
a.Fuzz Testing for Web Application
b.input Generations
In order to test web applications with fuzz testing, a fuzzer should support
input generation mechanisms. The generated inputs will be applied on a part
of HTTP request that will be sent to the web application under the test. Input
generation can be done with fuzz vector, number generator, brute forcer, or
similar string generators. The generated inputs then can be 2017 International
Conference on Data and Software Engineering (ICoDSE) modified with string
substitution, case modification, or encoding. In some cases, a tester also
needs to combine two or more parts of input generations. A part of HTTP
request may also need a value that can be obtained from an HTTP response.
Generation of inputs can be done with fuzz vector. A fuzz vector consists of a
set of strings that will be given to the web application under the test. For
testing against common vulnerability such as injections, XSS, and path
traversal there are some available fuzz vectors ready to be used, such as
provided by OWASP [9]. A number generator is used to generate a set of
numbers with a certain range. It is suited for generating a part of an HTTP
request that has been known consisting of numbers only. A brute forcer is
used to generate a set of strings with certain character sets. It can be used to
observe how the application behaves against all possible inputs. A similar
strings generator generates a set of strings, similar to a given input, by slightly
modifying the given input, such as by incrementing each characters. String
substitution is used to modify generated inputs by replacing the presence of
certain character sequence with another one. For example, a tester can
replace the presence of the word “password” in a fuzz vector with “pass”.
Case modification is done by modifying generated inputs to lower or upper
case. Some web applications validate input by blacklisting certain values. In
some cases, it is possible that the value can pass the validation if the
capitalization is changed. Therefore, case modification is required to change
the capitalization of the given string. Encoding may need to be applied to
generated inputs in order to make the HTTP request valid. Therefore, the tool
should be able to allow encoding with certain. Sometimes, a tester needs to
apply input generation on two or more HTTP request parts. Therefore, the
tool should be able to support combination of generation method on some
HTTP request parts where input generation applied. Sometimes, a part of an
HTTP request requires a value from the HTTP response obtained. For example,
an HTTP request requires an anti-CSRF token. If the request does not include a
valid token, the request will not be processed. Therefore, the tool should be
able to provide a way to replace a part of HTTP request with a value obtained
from the HTTP response.
C. Vulnerability Detection
ADVANTAGES
Fuzzing provides a good overall picture of the quality of the target system
and software.
Fuzzing is the primary technique used by malicious hackers to find software
vulnerabilities.
Fuzzing has a low overhead for both cost and time.
DISADVANTAGES
Fuzz testing alone cannot provide a complete picture of an overall security
threat or bugs.
Fuzz testing is less effective for dealing with security threats that do not
cause program crashes, such as some viruses, worms, Trojan, etc.
Fuzz testing can detect only simple faults or threats.
ABSTRACT
Web applications need for extensive testing before deployment and use, for
early detecting security vulnerabilities to improve the quality of the safety of the
software, the purpose of this paper is to research the fuzzing applications in
security vulnerabilities. This article first introduces the common Web software
security vulnerabilities, and then provide a comprehensive overview of the
fuzzing technology, and using fuzzing tools Webfuzz to execute a software
vulnerability testing , test whether there is a software security hole. Test results
prove that fuzzing is suitable for software security vulnerabilities testing, but
this methodology applies only to security research field, and in the aspect of
software security vulnerabilities detection is still insufficient
INTRODUCTION
Fuzzing methods
Fuzzing tool
http://xss.killsec.com/?m=user&a=login˗
DISADVANTAGES
Fuzz testing alone cannot provide a complete picture of an overall security
threat or bugs.
Fuzz testing is less effective for dealing with security threats that do not
cause program crashes, such as some viruses, worms, Trojan, etc.
Fuzz testing can detect only simple faults or threats.
ABSTRACT
Home Automation industry is growing rapidly, this is fulfilled by the need
to provide supporting systems for the elderly and the disabled, especially those
who live alone. Coupled with this, the world population is confirmed to be
getting older. Home automation systems must comply with the household
standards and convenience of usage.Home automation is one of the major
growing industries that can change the way people live. Some of these home
automation systems target those seeking luxury and sophisticated home
automation platforms; others target those with special needs like the elderly
and the disabled. Typical wireless home automation system allows one to
control household appliances from a centralized control unit which is wireless.
These appliances usually have to be specially designed to be compatible with
each other and with the control unit for most commercially available home
automation systems. The developed system can be integrated as a single
portable unit and allows one to wirelessly control lights, fans, air conditioners,
television sets, security cameras, electronic doors, computer systems,
audio/visual equipment’s etc... and turn ON or OFF any appliance that is
plugged into a wall outlet, get the status of different sensors and take decision
accordingly. The system is portable and constructed in a way that is easy to
install, configure, run, andmaintain. The perfect user interface still does not
exist at present and to build a good interface requires knowledge of
bothsociology and technology fields.
INTRODUCTION
Home Automation industry is growing rapidly, this is fulfilled by the need
to provide supporting systems for the elderly and the disabled, especially those
who live alone. Coupled with this, the world population is confirmed to be
getting older. Home automation systems must comply with the household
standards and convenience of usage. Home automation is one of the major
growing industries that can change the way people live. Some of these home
automation systems target those seeking luxury andsophisticated home
automation platforms; others target those with special needs like the elderly
and the disabled. Typical wireless home automation system allows one to
control household appliances from a centralized control unit which is wireless.
These appliances usually have to be specially designed to be compatible with
each other and with the control unit for most commercially available home
automation systems. The developed system can be integrated as a single
portable unit and allows one to wirelessly control lights, fans, air conditioners,
television sets, security cameras, electronic doors, computer systems,
audio/visual equipment’s etc. and turn ON or OFF any appliance that is
plugged into a wall outlet, get the status of different sensors and take decision
accordingly. The system is portable and constructed in a way that is easy to
install, configure, run, andmaintain. The perfect user interface still does not
exist at present and to build a good interface requires knowledge of
bothsociology and technology fields. Arduino Uno is a microcontroller board
developed by Arduino CC. Arduin UNO is a microcontroller board having a
number of input and output pins. It is not only a processing node in Wireless
Sensor Networks(WSN) but also acts as a centralized controller in a Wireless
Sensor Network(WSN). Further integrating the Home AUtomation
System(HAS) to the voice assistant makes it controlled using voice commands.
The light in the system will be triggered based on the motion sensor which will
indeed trigger the light sensor to check the ambient light and turn the light on if
the sensor senses the reading below the threshold value.
METHODOLOGY
ADVANTAGES
Easy to use.
Has good processing power and can handle multiple functions at the
same time. Uses reliable wireless connection.
DISADVANTAGES
Needs large capital expenditure.
ABSTRACT
INTRODUCTION
with built-in WIFI adapter. It will indirectly reduce the cost of this system.
METHODOLOGY
The proposed model provides a method for automation with sensor based
learning. The system uses temperature sensor for development but other
sensors can also be used as per requirement. These smart home devices with
sensors can configure themselves autonomously and can operate without
human intervention. This work minimizes encryption decryption and focuses
on authentication and automation of smart home devices with learning. The
system bypasses local gateway mentioned in existing system to provide better
security for smart home devices and sensor data and save computation
overhead. The real time broker cloud is directly connected with smart home
and manages all incoming and outgoing request between users and devices.
The main purpose to use real time broker cloud is save time of cryptographic
operations.The prototype uses Arduino MK1000, known as Genuino MK1000.
The NLP in this project gives the user the freedom to interact with the home
appliances with his/her own voice and normal language rather than
complicated computer commands. The appliances are connected to the mobile
device through an Arduino Board that establishes the concept of Internet of
Things. The Arduino Boards are interfaced with the appliances and
programmed in such a way that they respond to mobile inputs.
ADVANTAGES
The advantage of IOT is monitoring. Knowing the exact quantity of
supplies or the air quality in your home, can further provide more
information that could not have previously been collected easily.
ABSTRACT
INTRODUCTION
ADVANTAGES
This adds a protection from unauthorized users.
This system can be used as a test bed for any appliances that requires
on-off switching applications without any internet connection.
DISADVANTAGES
It has low bandwidth as compared to Wi-Fi.
It allows only short range communication between devices.
CHAPTER 3
SYSTEM ANALYSIS
3.1.1. DISADVANTAGE
Replacing humans is dangerous May take time and learning
Security concerns
Vulnerable to attacks
Most of the times range is restricted
High dependency on sensor devices which makes the system vulnerable
if sensor fails
This system will mainly help the disabled and elderly people to
control the appliances giving them a real world experience with
the help of Augmented reality.
SYSTEM REQUIREMENTS
CHAPTER 5
SYSTEM DESIGN
7.1 CONCLUSION
SOURCE CODE
{
"dependencies": {
"com.unity.collab-proxy": "1.17.6",
"com.unity.feature.development": "1.0.1",
"com.unity.ide.rider": "3.0.15",
"com.unity.ide.visualstudio": "2.0.16",
"com.unity.ide.vscode": "1.2.5",
"com.unity.test-framework": "1.1.31",
"com.unity.textmeshpro": "3.0.6",
"com.unity.timeline": "1.6.4",
"com.unity.ugui": "1.0.0",
"com.unity.visualscripting": "1.7.8",
"com.unity.xr.management": "4.2.1",
"com.unity.xr.oculus": "3.2.1",
"com.unity.modules.ai": "1.0.0",
"com.unity.modules.androidjni": "1.0.0",
"com.unity.modules.animation": "1.0.0",
"com.unity.modules.assetbundle": "1.0.0",
"com.unity.modules.audio": "1.0.0",
"com.unity.modules.cloth": "1.0.0",
"com.unity.modules.director": "1.0.0",
"com.unity.modules.imageconversion": "1.0.0",
"com.unity.modules.imgui": "1.0.0",
"com.unity.modules.jsonserialize": "1.0.0",
"com.unity.modules.particlesystem": "1.0.0",
"com.unity.modules.physics": "1.0.0",
"com.unity.modules.physics2d": "1.0.0",
"com.unity.modules.screencapture": "1.0.0",
"com.unity.modules.terrain": "1.0.0",
"com.unity.modules.terrainphysics": "1.0.0",
"com.unity.modules.tilemap": "1.0.0",
"com.unity.modules.ui": "1.0.0",
"com.unity.modules.uielements": "1.0.0",
"com.unity.modules.umbra": "1.0.0",
"com.unity.modules.unityanalytics": "1.0.0",
"com.unity.modules.unitywebrequest": "1.0.0",
"com.unity.modules.unitywebrequestassetbundle": "1.0.0",
"com.unity.modules.unitywebrequestaudio": "1.0.0",
"com.unity.modules.unitywebrequesttexture": "1.0.0",
"com.unity.modules.unitywebrequestwww": "1.0.0",
"com.unity.modules.vehicles": "1.0.0",
"com.unity.modules.video": "1.0.0",
"com.unity.modules.vr": "1.0.0",
"com.unity.modules.wind": "1.0.0",
"com.unity.modules.xr": "1.0.0"
}
}
{
"dependencies": {
"com.unity.collab-proxy": {
"version": "1.17.6",
"depth": 0,
"source": "registry",
"dependencies": {
"com.unity.services.core": "1.0.1"
},
"url": "https://packages.unity.com"
},
"com.unity.editorcoroutines": {
"version": "1.0.0",
"depth": 1,
"source": "registry",
"dependencies": {},
"url": "https://packages.unity.com"
},
"com.unity.ext.nunit": {
"version": "1.0.6",
"depth": 1,
"source": "registry",
"dependencies": {},
"url": "https://packages.unity.com"
},
"com.unity.feature.development": {
"version": "1.0.1",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.ide.visualstudio": "2.0.16",
"com.unity.ide.rider": "3.0.15",
"com.unity.ide.vscode": "1.2.5",
"com.unity.editorcoroutines": "1.0.0",
"com.unity.performance.profile-analyzer": "1.1.1",
"com.unity.test-framework": "1.1.31",
"com.unity.testtools.codecoverage": "1.0.1"
}
},
"com.unity.ide.rider": {
"version": "3.0.15",
"depth": 0,
"source": "registry",
"dependencies": {
"com.unity.ext.nunit": "1.0.6"
},
"url": "https://packages.unity.com"
},
"com.unity.ide.visualstudio": {
"version": "2.0.16",
"depth": 0,
"source": "registry",
"dependencies": {
"com.unity.test-framework": "1.1.9"
},
"url": "https://packages.unity.com"
},
"com.unity.ide.vscode": {
"version": "1.2.5",
"depth": 0,
"source": "registry",
"dependencies": {},
"url": "https://packages.unity.com"
},
"com.unity.nuget.newtonsoft-json": {
"version": "3.0.2",
"depth": 2,
"source": "registry",
"dependencies": {},
"url": "https://packages.unity.com"
},
"com.unity.performance.profile-analyzer": {
"version": "1.1.1",
"depth": 1,
"source": "registry",
"dependencies": {},
"url": "https://packages.unity.com"
},
"com.unity.services.core": {
"version": "1.5.2",
"depth": 1,
"source": "registry",
"dependencies": {
"com.unity.modules.unitywebrequest": "1.0.0",
"com.unity.nuget.newtonsoft-json": "3.0.2",
"com.unity.modules.androidjni": "1.0.0"
},
"url": "https://packages.unity.com"
},
"com.unity.settings-manager": {
"version": "1.0.3",
"depth": 2,
"source": "registry",
"dependencies": {},
"url": "https://packages.unity.com"
},
"com.unity.subsystemregistration": {
"version": "1.1.0",
"depth": 1,
"source": "registry",
"dependencies": {
"com.unity.modules.subsystems": "1.0.0"
},
"url": "https://packages.unity.com"
},
"com.unity.test-framework": {
"version": "1.1.31",
"depth": 0,
"source": "registry",
"dependencies": {
"com.unity.ext.nunit": "1.0.6",
"com.unity.modules.imgui": "1.0.0",
"com.unity.modules.jsonserialize": "1.0.0"
},
"url": "https://packages.unity.com"
},
"com.unity.testtools.codecoverage": {
"version": "1.0.1",
"depth": 1,
"source": "registry",
"dependencies": {
"com.unity.test-framework": "1.0.16",
"com.unity.settings-manager": "1.0.1"
},
"url": "https://packages.unity.com"
},
"com.unity.textmeshpro": {
"version": "3.0.6",
"depth": 0,
"source": "registry",
"dependencies": {
"com.unity.ugui": "1.0.0"
},
"url": "https://packages.unity.com"
},
"com.unity.timeline": {
"version": "1.6.4",
"depth": 0,
"source": "registry",
"dependencies": {
"com.unity.modules.director": "1.0.0",
"com.unity.modules.animation": "1.0.0",
"com.unity.modules.audio": "1.0.0",
"com.unity.modules.particlesystem": "1.0.0"
},
"url": "https://packages.unity.com"
},
"com.unity.ugui": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.ui": "1.0.0",
"com.unity.modules.imgui": "1.0.0"
}
},
"com.unity.visualscripting": {
"version": "1.7.8",
"depth": 0,
"source": "registry",
"dependencies": {
"com.unity.ugui": "1.0.0",
"com.unity.modules.jsonserialize": "1.0.0"
},
"url": "https://packages.unity.com"
},
"com.unity.xr.legacyinputhelpers": {
"version": "2.1.10",
"depth": 1,
"source": "registry",
"dependencies": {
"com.unity.modules.vr": "1.0.0",
"com.unity.modules.xr": "1.0.0"
},
"url": "https://packages.unity.com"
},
"com.unity.xr.management": {
"version": "4.2.1",
"depth": 0,
"source": "registry",
"dependencies": {
"com.unity.modules.subsystems": "1.0.0",
"com.unity.modules.vr": "1.0.0",
"com.unity.modules.xr": "1.0.0",
"com.unity.xr.legacyinputhelpers": "2.1.7",
"com.unity.subsystemregistration": "1.0.6"
},
"url": "https://packages.unity.com"
},
"com.unity.xr.oculus": {
"version": "3.2.1",
"depth": 0,
"source": "registry",
"dependencies": {
"com.unity.xr.management": "4.2.0"
},
"url": "https://packages.unity.com"
},
"com.unity.modules.ai": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.androidjni": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.animation": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.assetbundle": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.audio": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.cloth": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.physics": "1.0.0"
}
},
"com.unity.modules.director": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.audio": "1.0.0",
"com.unity.modules.animation": "1.0.0"
}
},
"com.unity.modules.imageconversion": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.imgui": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.jsonserialize": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.particlesystem": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.physics": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.physics2d": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.screencapture": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.imageconversion": "1.0.0"
}
},
"com.unity.modules.subsystems": {
"version": "1.0.0",
"depth": 1,
"source": "builtin",
"dependencies": {
"com.unity.modules.jsonserialize": "1.0.0"
}
},
"com.unity.modules.terrain": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.terrainphysics": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.physics": "1.0.0",
"com.unity.modules.terrain": "1.0.0"
}
},
"com.unity.modules.tilemap": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.physics2d": "1.0.0"
}
},
"com.unity.modules.ui": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.uielements": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.ui": "1.0.0",
"com.unity.modules.imgui": "1.0.0",
"com.unity.modules.jsonserialize": "1.0.0",
"com.unity.modules.uielementsnative": "1.0.0"
}
},
"com.unity.modules.uielementsnative": {
"version": "1.0.0",
"depth": 1,
"source": "builtin",
"dependencies": {
"com.unity.modules.ui": "1.0.0",
"com.unity.modules.imgui": "1.0.0",
"com.unity.modules.jsonserialize": "1.0.0"
}
},
"com.unity.modules.umbra": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.unityanalytics": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.unitywebrequest": "1.0.0",
"com.unity.modules.jsonserialize": "1.0.0"
}
},
"com.unity.modules.unitywebrequest": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.unitywebrequestassetbundle": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.assetbundle": "1.0.0",
"com.unity.modules.unitywebrequest": "1.0.0"
}
},
"com.unity.modules.unitywebrequestaudio": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.unitywebrequest": "1.0.0",
"com.unity.modules.audio": "1.0.0"
}
},
"com.unity.modules.unitywebrequesttexture": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.unitywebrequest": "1.0.0",
"com.unity.modules.imageconversion": "1.0.0"
}
},
"com.unity.modules.unitywebrequestwww": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.unitywebrequest": "1.0.0",
"com.unity.modules.unitywebrequestassetbundle": "1.0.0",
"com.unity.modules.unitywebrequestaudio": "1.0.0",
"com.unity.modules.audio": "1.0.0",
"com.unity.modules.assetbundle": "1.0.0",
"com.unity.modules.imageconversion": "1.0.0"
}
},
"com.unity.modules.vehicles": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.physics": "1.0.0"
}
},
"com.unity.modules.video": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.audio": "1.0.0",
"com.unity.modules.ui": "1.0.0",
"com.unity.modules.unitywebrequest": "1.0.0"
}
},
"com.unity.modules.vr": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.jsonserialize": "1.0.0",
"com.unity.modules.physics": "1.0.0",
"com.unity.modules.xr": "1.0.0"
}
},
"com.unity.modules.wind": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {}
},
"com.unity.modules.xr": {
"version": "1.0.0",
"depth": 0,
"source": "builtin",
"dependencies": {
"com.unity.modules.physics": "1.0.0",
"com.unity.modules.jsonserialize": "1.0.0",
"com.unity.modules.subsystems": "1.0.0"
}
}
}
}
A SCREENSHOTS
REFERENCES
Evil Genius, McGraw-Hill/TAB Electronics. "Raspberry Pi Projects for the
Evil Genius", 1'1 Edition, 2014.
2014, Autodesk, Inc, Web Control of Raspberry Pi GPIO, accessed on 22
Jan 2015. http://www.instructables.comlid/WebControl-of-Raspberry-Pi-
GPIOI
Kimmo Karvinen & Tero Karvinen, Make: Getting Started with Sensors,
Measure the world with Electronics, Arduino and Raspberry Pi, 1 st Edition,
2014
Michal Varchola, Milos Drutarovsky, “Zigbee based home automation
wireless sensor network” IEEE PERCOM Workshops, pp. 141-146, 2011.
Leroy Zi Wei Tang, Kian Sin Ang, Mohamad Amirul Maricar Bin Mohamed
Yusoff, “Augmented Reality Control Home (ARCH) for Disabled and
Elderlies”2015 IEEE Tenth International Conference on Intelligent Sensors,
Sensor Networks and Information Processing (ISSNIP)
K. Bromley, M. Perry, and G. Webb. "Trends in Smart Home
Systems,Connectivity and Services", www.nextwave.org.uk, 2003.
2015 Wikitude GmbH, Wikitude AR project, accessed 22 Jan 2015.
http://www.wikitude.com/app
J. Dizdarevi´c, F. Carpio, A. Jukan, X. Masip-Bruin, A survey of commu-
nication protocols for internet of things and related challenges of fog and
cloud computing integration, ACM Computing Surveys (CSUR) 51 (6)
(2019) 1–29.
J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of things (iot): A
vision, architectural elements, and future directions, Future generation
computer systems 29 (7) (2013) 1645–1660.
P. Ferrara, A. K. Mandal, A. Cortesi, F. Spoto, Cross-programming lan-
guage taint analysis for the iot ecosystem, Electronic Communications ofthe
EASST 77 (2019).