{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T18:36:15Z","timestamp":1773340575002,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icacci.2016.7732455","type":"proceedings-article","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T20:57:45Z","timestamp":1478638665000},"page":"2629-2634","source":"Crossref","is-referenced-by-count":12,"title":["Multi-functional secured smart home"],"prefix":"10.1109","author":[{"given":"Md","family":"ShariqSuhail","sequence":"first","affiliation":[]},{"given":"G","family":"ViswanathaReddy","sequence":"additional","affiliation":[]},{"given":"G","family":"Rambabu","sequence":"additional","affiliation":[]},{"given":"C. V. R.","family":"DharmaSavarni","sequence":"additional","affiliation":[]},{"given":"V. K.","family":"Mittal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"ETSI Mobile Technologies GSM","year":"2015","journal-title":"ETSI"},{"key":"ref11","article-title":"Specifications and Application Documents-NFC Forum","year":"2015","journal-title":"NFC-Forum"},{"key":"ref12","article-title":"Speak recognition, voice recognition module v3","year":"2014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2009.5277992"},{"key":"ref14","first-page":"119","article-title":"Intelligent Security System for Industries by using GPS and GSM","volume":"2","author":"nandeesh","year":"2014","journal-title":"International Journal of Advance Research in Computer Science Technology"},{"key":"ref15","first-page":"49","article-title":"A multilevel home security system","volume":"7","author":"lee","year":"2013","journal-title":"International Journal of Smart Home"},{"key":"ref16","article-title":"Smart Suveillance System using PIR sensor Network and GSM","volume":"4","author":"satishkumar","year":"2015","journal-title":"International Journal of Advance Research in Comp Engineering and Technology"},{"key":"ref17","article-title":"A Locking System Using Bluetooth Technology and Camera Verification","author":"bhalekar","year":"2016","journal-title":"International Journal of Technical Research and Applications"},{"key":"ref18","first-page":"2801","article-title":"Person Detection by Mobile Manipulator for Monitoring","author":"mae","year":"2003","journal-title":"Proc SICE Annual Conference"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14257\/ijsh.2013.7.6.19"},{"key":"ref4","first-page":"291","article-title":"Design and Implementation of a GSM Based Remote Home Security and Appliance Control System","author":"rana","year":"2013","journal-title":"Proc 2nd International Conference on Advances in Electrical Engineering"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1145\/1978942.1979249","article-title":"Home automation in the wild:challenges and opportunities","volume":"11","author":"brush","year":"2011","journal-title":"Proceedings of the SIGCHI conference on Human factors in computing systems"},{"key":"ref6","article-title":"Home Automation Network Technologies","author":"buddubarki","year":"2015","journal-title":"IEEE 3rd International Conference on Electronics Computing and Communication Technologies"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON.2015.7443699"},{"key":"ref8","article-title":"Bluetooth Specification Adopted Documents","author":"group","year":"2015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INDICON.2015.7443538"},{"key":"ref2","article-title":"The-History-of-Home-Security","year":"2010"},{"key":"ref9","article-title":"IEEE Standards Association - IEEE 802.11: Wireless LANs","author":"association","year":"2012"},{"key":"ref1","article-title":"Method and Device to Communicate via SMS After a Security Intrusion","author":"karri","year":"2005","journal-title":"Proc 1st Int Conf Sensing Technol"},{"key":"ref20","year":"2016","journal-title":"Simcom GSM modem"},{"key":"ref22","year":"2016"},{"key":"ref21","first-page":"3236","article-title":"Remote Temperature Monitoring Using LM35 sensor and Intimate Android user via C2DM Service","volume":"2","year":"2013","journal-title":"IJCSMC"},{"key":"ref24","year":"2016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14569\/SpecialIssue.2011.010206"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISPCC.2015.7374996"},{"key":"ref25","article-title":"Multi-stage Face Recognition for Biometric Access","author":"rai","year":"2015","journal-title":"Proc IEEE 12th International INDICON 2015 Conference (E3-C3)"}],"event":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","location":"Jaipur, India","start":{"date-parts":[[2016,9,21]]},"end":{"date-parts":[[2016,9,24]]}},"container-title":["2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7592392\/7732013\/07732455.pdf?arnumber=7732455","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T21:28:25Z","timestamp":1657661305000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7732455\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icacci.2016.7732455","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}