Sunday, December 29, 2019

The Law of Attraction - 1551 Words

The Law of Attraction Many people in this world live their lives without any aspirations towards greatness. They think that they don’t stand a chance of fulfilling any of the dreams or goals they might have. Their idea of â€Å"dreams coming true† are far from their imagination and stick around with the absurd idea of keeping their feet in the ground and stop day dreaming or even think about it. What they don’t know is that by just thinking about it, they’re much closer to their dream than what they thought they were. There are several steps to follow though, steps that will make you reach your goal a lot faster with just using your mind and that are what I’d like to demonstrate you. For a long time a thing such as â€Å"the law of attraction†Ã¢â‚¬ ¦show more content†¦Basically every thought you have will contribute to what what’s going on in your mind, whether you want it or not if you think about it you’ll attract it. Some people say that this is where the saying â€Å"Be careful with what you wish for† comes from. It doesn’t matter if it’s for good or bad by having it in your head you just might get it. â€Å"The law of attraction has been with us always, whether you knew about it or not† (Byrne 58). Where we could see it a lot is with children. Take me for example, when I was little I used to dream about going to Disney World. I would see the commercials and I would see myself there also. Playing, meeting my favorite characters, getting on all the rides and just simply having fun. I would pray and ask my parents to take me. Down deep inside of me I knew I was going to be able to go one day, I never lost hope. Until one day my aunt decided to organize a trip for the whole family and I just couldn’t believe it! After all that wishing and hoping I finally got to go and made my biggest dream come true. That’s exactly what a person needs to do, have faith that you’re going to receive it and just like a child, don’t worry on the how and when to receive it. Just wait and have that certainty of being able to have it at the right time at the right moment. What also keeps a lot of people away from their goals is their fear. Fear of hoping and â€Å"day dream† andShow MoreRelatedLaw of Attraction1288 Words   |  6 PagesDraft) Seeing Is Believing The law of attraction is the name given to the belief that â€Å"like attracts like† and that by focusing on positive or negative thoughts one can bring about positive or negative results. This belief is based upon the idea that people and their thoughts are both made from pure energy, and the belief that like energy attracts like energy. For example, if a person opened an envelope expecting to see a bill, then according to the law of attraction would confirm those thoughts andRead MoreThe Law Of Attraction2130 Words   |  9 PagesThe law of attraction says that focusing on positive or negative thoughts will bring either those positive or negative thoughts into positive or negative experiences. Most people wouldn’t believe that such a theory could possibly work in their lives, but I personally believe that this theory is one of the main reasons that America has such a large gap in income. In the USA today, the gap between the rich and the poor has steadily increased to the point where there the middle class has all but disappearedRead MoreWhat Is Law Of Attraction Essay1167 Words   |  5 PagesWhat Is Law of Attraction and How to Use It in Your Life? By Sakesare Khan | Submitted On June 03, 2012 Recommend Article Article Comments Print Article Share this article on Facebook Share this article on Twitter Share this article on Google+ Share this article on Linkedin Share this article on StumbleUpon Share this article on Delicious Share this article on Digg Share this article on Reddit Share this article on Pinterest Expert Author Sakesare Khan The Law of Attraction is among the mostRead MoreGratitude And The Law Of Attraction1039 Words   |  5 PagesGratitude The Law Of Attraction Sven Hylten-Cavallius By Sven Hylten-Cavallius Dec 15, 2013 The Law of Attraction works in a very simple way. Whatever you place your attention on grows bigger. Put another way - you get more of what you focus on! Or, put another way - what your attention rests on expands! This is the very foundation upon which the Law of Attraction works. In order to fully utilize this law and, thus create the life you want, you need to be very careful about where you are placingRead MoreIt Is A Simple Law Of Attraction1702 Words   |  7 Pagesâ€Å"It is a simple law of attraction that you get back what you put out into the universe. The more give the more you attract, when you put good energy into the world we get more good energy back and make those around us feel good.† Those words are not just words they greatest piece of advice that anyone has ever gave to me. They weren’t words given to me by just anyone, but my mom. She gave me this advice when I was going through some hard times in my life where I felt like everything was justRead MoreThe Law Of Attraction And The Power Of Prayer Essay887 Words   |  4 PagesThe Law of Attraction and the Power of Prayer By Wade Wilson | Submitted On July 25, 2012 Recommend Article Article Comments Print Article Share this article on Facebook Share this article on Twitter Share this article on Google+ Share this article on Linkedin Share this article on StumbleUpon Share this article on Delicious Share this article on Digg Share this article on Reddit Share this article on Pinterest Have you ever wondered why some prayers are answered while others are not? AreRead MoreThe Law Of Attraction By Rhonda Byrne821 Words   |  4 Pagesmisconceptions is that some people are simply born lucky. Some would depend on the principle of karma and justify their misfortunes by a bad deed they must have done on their past life. But one revolutionary way of thinking changed all that. The Law of Attraction is a belief that every good or bad thing that happens to people is a result of one s thinking. Positive thinkers are successful because they emit good energy that attracts the universe to help him get everything he wants, no matter how impossibleRead MoreWhat Is Law Of Attraction And How To Use It In Your Life?.1167 Words   |  5 PagesWhat Is Law of Attraction and How to Use It in Your Life? By Sakesare Khan | Submitted On June 03, 2012 Recommend Article Article Comments Print Article Share this article on Facebook Share this article on Twitter Share this article on Google+ Share this article on Linkedin Share this article on StumbleUpon Share this article on Delicious Share this article on Digg Share this article on Reddit Share this article on Pinterest Expert Author Sakesare Khan The Law of Attraction is among the mostRead MoreHobbits Use the Law of Attraction on Their Adventure through Middle Earth1006 Words   |  4 PagesBilbo cannot avoid adventure when it tumbles into his hobbit hole. The novel, The Hobbit, supplies a fictional account of the positive and negative outcomes produced by fluctuating self-esteem and the Law of Attraction throughout a young hobbits adventure through Middle Earth. The Law of Attraction sounds as though it could be a complicated scientific theory; however, the theory is quite simple: your thoughts become things (Byrne 25). Whatever the mind focuses on, the universe attracts. For exampleRead MoreThe Secret And Its Sequel The Power854 Words   |  4 Pagesimpart the same wisdom of positive thinking and the law of attraction. This includes some of the world’s leaders in the fields of business, economics, medicine, psychology, history, theology, and science. The Secret reveals their life stories and how each of their lives has changed in a profound way. The Secret The Secret is a â€Å"self-help† book about the power of positive thinking. The book is based on a scientific theory called the â€Å"law of attraction† – the principle that â€Å"like attracts like.† Specifically

Friday, December 20, 2019

Issue Brief On Net Neutrality - 1359 Words

Issue Brief on Net Neutrality Background Information The Federal Communications Commission (FCC), which is a formal policy actor (Kraft and Furlong, (2015), has faced numerous challenges in resolving the difficulties involving Net Neutrality. Jamison and Layton state that â€Å"In 2005, FCC adopted an Internet Policy Statement consisting of four consumer-centric guiding principles, also referred to as the Four Freedoms to ensure that broadband networks are widely deployed, open, affordable, and accessible to all consumers. When the agency attempted to apply these rules in 2008, the DC Circuit rejected the FCC’s decision on jurisdictional grounds. These principles could have been successful if the FCC could have administered this policy. In 2010, the FCC’s second attempt was a light-handed, multistakeholder approach for addressing net neutrality issues. In 2014, the DC Court again reversed the FCC on jurisdictional grounds (Jamison Layton, 2016). Problem There are four serious problems regarding US net neutrality policy to date. One is a market muddle problem that offers the same level of internet services while disregarding the differences in competition, geography, customer type, services, etc. These actions result in hindering advancements by causing undue analysis and aggressive injunctions on positive consumer protection services. The next problem is an overkill problem because net neutrality rules force internet service providers from offering service features. ProvidersShow MoreRelatedDeangles, M. (2015). National Electronic Health Record819 Words   |  4 Pagessubstantially reduce waste and healthcare costs. Friedlander, S. A. (2016). NET NEUTRALITY AND THE FCC S 2015 OPEN INTERNET ORDER. Berkeley Technology Law Journal, 31905-929. doi:10.15779/Z382S0F The article focuses on development of net neutrality law in the U.S. with the 2015 Open Internet Order of the Federal Communications Commission (FCC) established judicial standards. It explains that net neutrality (a.k.a. â€Å"network neutrality† or â€Å"open Internet†) â€Å"is the principle that those who manage networksRead MoreIssues of the Internet: Privacy, Piracy and Net Neutrality5434 Words   |  22 PagesIssues of the Internet: Privacy, Piracy and Net Neutrality CS 306 Craig Lloyd Table of Contents Abstract †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 3 Introduction †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 4 Social Networking and Privacy †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 Software Piracy †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 11 Net Neutrality †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 14 Final Thoughts and Opinion †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦.. 17 Conclusion †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦. 19 Works Cited †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Read MoreSkype and ATT: The Future of Telecommunications2023 Words   |  8 Pagesthat it would become a handset, but there are also other options the company could consider. Skype vs. ATT: The Future of Telecommunications Skypes parent company is eBay (A brief, n.d). Skype was founded back in 2003 and created a voice communication software that allowed users to communicate over the Internet (A brief, n.d.; Homepage, 2012). They could talk in real time, much in the same way they would on the telephone. Nearly everyone around the world who had a computer and internet access foundRead MoreThe Central Bank Of Australia936 Words   |  4 Pagesthe level of interest rate, the availability of credit and the supply of money. All of these have a direct impact on financial markets and institutions, and also on the level of economic activities (such as business investment, consumer spending and net exports) and the rate of inflation which is known as important sector in the economy. There are three main ways the RBA can control the liquidity in the financial system. First, the RBA is managing the Exchange Settlement Funds (ESF) held by the ExchangeRead MoreQuestions On The Spectrum Bands2138 Words   |  9 Pagesis so congested such that the service providers are forced to â€Å"recycle† spectrum. In these areas, the low-band spectrum has no advantage over the higher-band spectrum. Question 2 Give a brief description of Title I Title II and how the courts have limited the FCC s power. Your answer should include a brief discussion on the major cases that led to these power limits. For a very long time now, there has been several disputes and misunderstanding between telecommunication lawyers over how to pigeonholeRead MoreBenefits And Downfalls Of The United States2142 Words   |  9 Pagespoints, while bandwidth is a measurement of the theoretical maximum transfer capacity of a certain point on a network. With all this data flowing freely, there has to be some sort of restriction on how fast different applications are. This is where net neutrality comes into play. For example, online streaming effectively requires your computer to download a new image once every fraction of a second. This takes up much more data than sending a simple email or using a simple application. The result of thisRead MoreThe Origins Of The Internet And Future Developments1732 Words   |  7 Pagesmessage was sent from UCLA host to the Stanford host. Eventually other nodes were added including UC Santa Barbara, and University of Utah. With the additional nodes visualization projects were added, such as investigating 3D representation over the net and displaying mathematical functions (PBS, 1999). The first network system included four nodes and was incorporated with research to include both an underlying network and the work on how to utilize the network. Computers were quickly added to theRead MoreOpensecrets. Org : The Internet And The Internet1417 Words   |  6 Pagesthe url to track/analyze finances regarding the members of the congress, all the way to the creation of the website itself. Just as it is with the newspaper; the first few articles to present themselves included were ones dealing with more present issues--like gun control--with a section dedicated to original journalism following right after. The links to the heart of its purpose--tracking congress finances--were all at the bottom of the page, like runts. As per the media, the juiciest material getsRead MoreThe Effects of World War Ii on Northern Southern Ireland; 1939-19453103 Words   |  13 Pagesidentities on an international stage. To understand the experiences and philosophy of the Republic of Ireland during World War II, the past must be analyzed to realize their decision for declaring neutrality. Ireland’s neutrality lineage can be dated back to 1914 when organizations such as the Irish Neutrality League promoted such nationalist slogans as, â€Å"Neither King nor Kaiser but Ireland!† (Murphy 9). Prior to World War II beginning, the Republic of Ireland found itself in a less than desirable positionRead MoreIntermediate Accounting17109 Words   |  69 Pagespotentially dilutive securities. EPS—Treasury share method. EPS—Weightedaverage computation. EPS—General objectives. EPS—Comprehensive calculations. EPS—Contingent shares. Convergence issues. Share appreciation rights. 26, 27 16 30, 31 Questions 1, 2, 3, 4, 5, 6, 7, 27 3, 8, 9 1, 10, 11, 12, 13, 14, 15 17, 18, 24 19, 20, 21 Brief Exercises 1, 2, 3 Exercises 1, 2, 3, 4, 5, 6, 7, 25, 26 7, 8, 9, 10, 29 11, 1 2, 13, 14, 15 1, 2, 3 Problems Concepts for Analysis 1 2. 3. 4, 5 6, 7, 8 1, 3 2, 4 4. 5

Thursday, December 12, 2019

Concept of Home Security System-Free-Samples-Myassignmenthelp.com

Question: Discuss about the Concept of home security system. Answer: Introduction Security system can be defined as the system for securing anything by a system of internetworking devices or components. IT makes the security system cost effective and time saving. Moreover, it acts as a data storage and file management system. Home security system is a type of security system that is being utilized for the purpose of securing houses (Toh and Lim 2013). These are eventually networks of various integrated electronic devices that work together with a specific centralized panel of controlling. This system is used for protecting and securing the houses against any type of burglary or intruders. The following literature review outlines a brief discussion on the entire concept of home security system. The definition and the advantages of the home security system will be explained here. This literature review even comprises of the methodologies by researching various papers. Furthermore, the literature review also analyzes the common differences and themes and the work of various researchers are compared. Methodology Methodology can be defined as the systematic as well as theoretical analysis of method, utilized for executing any particular activity or area of study. This literature review was completed with the help of secondary qualitative research methodology. The previously existing journal papers, conference papers, books and peer reviewed articles were taken while writing this particular literature review. Various papers and articles were reviewed in the process and out of them; eight best papers and articles were selected for completing the task. Body Home Security System by GSM Technology According to Javale et al. 2013, home automation and security system is one of the most important need in the 21st century. The system of home automation enables the users to manage several household appliances such as air conditioners, fan, light, doors and windows. It even provides home security as well as emergency system for the individuals. The most significant advantages of this home security system are that it reduces the human efforts and is energy efficient time saver. This paper has described the home security and automation system by utilizing Android ADK. It would be developing an authentication to the home security system for all the authorized users. The system would be connected to the Android mobile or tablet of that particular user. Rana et al. 2013 have described this home security system in a similar manner like Javale et al. 2013. They have focused on the designing and implementation of a specific GSM based remote home security system. The GSM technology is to be utilized by the user for making the home security system flexible and cost effective. It is a mobile based technology that every user would have in their Android mobile phones. The appliances are also controlled by this device. The main advantage of this system is that the user can carry the remote anywhere in the world and if any type of threat is identified, he will be immediately notified. Similar methodology is discussed by Hasan et al. 2015 in their paper. They have described about a microcontroller based home security system with the technology of GSM. Home Security System by UART and GUI Javale et al. 2013, Hasan et al. 2015 and Rana et al. 2013 have discussed about the advanced home security system by mobile phone technology. The only disadvantage of this system is that the mobile phone has to be in a GSM area. However, if there will be no network, the user will not be notified. Moreover, the old people may not be accustomed to use the mobile phones. Lee, Chuah and Chai 2013 have the perfect answer for this problem. This paper discusses about a Multilevel Home Security System. It would be having sensor nodes within it. A specific UART or Universal Asynchronous Receiver Transmitter or UART and GUI are embedded within the system. This captures the images and sends emails to the house owner or police forces. Home Security System and Door Access Control by Face Recognition Method The above papers have involved technologies for home security systems. However, the people, who do not have any idea about technology, will not be feeling safe as they would not be able to use this system. Sahani et al. 2015 in their paper have solved this problem. They have discussed about the simplest method in a home security system. The method is known as face recognition system. A ZigBee technology is embedded for controlling and accessing the door of the house. Moreover, there is a technique to identify the faces of the visitors and thus unauthorized users can be stopped for entering into the house. Yugashini, Vidhyasri and Devi 2013 have also discussed about the door access system by means of face recognition system. This is done by the approach of PCA or principal component analysis. The similar type of security system is discussed by Chowdhury, Nooman and Sarker 2013 in their paper. The only difference between this paper and the paper of Sahani et al. 2015 is that they have utilized Raspberry Pi technology for controlling the access of the house and Sahani et al. 2015 have described about the ZigBee technology. Conclusion Therefore, from the above literature review, it can be concluded that home security system is the technological method of securing houses effectively. The security system is the systematic way to secure any specific object from all types of threats or vulnerabilities. A home security system is one of the most important requirements in the houses in todays world. The above literature review has explained about the importance of information technology in a security system by describing the home security system properly. Moreover, the various methodologies from various research papers are provided here. The works of the several researchers are properly compared in this literature review. Three types of methodologies are explained here. The first methodology is the GSM or mobile technology. The second methodology is by UART and GUI and the final methodology is the simplest of the three; the face recognition method. Significant and relevant details are provided for each of these technolog ies. References Chowdhury, M.N., Nooman, M.S. and Sarker, S., 2013. Access Control of Door and Home Security by Raspberry Pi Through Internet.Int. J. Sci. Eng. Res,4, pp.550-558. Hasan, R., Khan, M.M., Ashek, A. and Rumpa, I.J., 2015. Microcontroller Based Home Security System with GSM Technology.Open Journal of Safety Science and Technology,5(02), p.55. Javale, D., Mohsin, M., Nandanwar, S. and Shingate, M., 2013. Home automation and security system using Android ADK.International journal of electronics communication and computer technology (IJECCT),3(2), pp.382-385. Lee, J.V., Chuah, Y.D. and Chai, C.T., 2013. A multilevel home security system (mhss).International Journal of Smart Home,7(2). Rana, G.S.M., Khan, A.A.M., Hoque, M.N. and Mitul, A.F., 2013, December. Design and implementation of a GSM based remote home security and appliance control system. InAdvances in Electrical Engineering (ICAEE), 2013 International Conference on(pp. 291-295). IEEE. Sahani, M., Nanda, C., Sahu, A.K. and Pattnaik, B., 2015, March. Web-based online embedded door access control and home security system based on face recognition. InCircuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on(pp. 1-6). IEEE. Toh, S.H. and Lim, S.R., 2013. Wireless home security system. Yugashini, I., Vidhyasri, S. and Devi, K.G., 2013. Design and implementation of automated door accessing system with face recognition.International Journal of Science and Modern Engineering (IJISME),1(12).