An electronic switch sensor with a point to-point intrusive monitoring systemZac Darcy
Sophistications in theft and other criminal damages necessitates for the symbiotic blending of technology with security needs. In this research, electronic switches in the form of sensors were used to implement a point-to point intrusive monitoring system for the detection of an unauthorized access to commercial and residential buildings. The system is a simple and reliable security system and uses switch sensor technology to revolutionize the standards of living. The system is also simple, adaptable and cost-effective. It is designed in six major units which include; the power supply, the input/sensor micro-switches, the monitoring and indicator, the timing, the tone generation and output units. To ensure steady power supply in the circuit, the power unit constitutes both the mains and DC supplies. The alarm unit are being activated by the normally closed sensor micro-switches unit which is connected in an electronic/door mat at both the entrance and exit of buildings. In order to facilitate easy location of the intruder, the exact point of intrusion is being determined by the monitoring and indicator unit which constitutes the quad R/S flip-flop IC and LED’s. The timing/tone generation unit is built on the 555 timer IC, in the Astable mode, which output keeps changing as far as there is a breakage of the sensors. The output of the system is mainly the LEDs and buzzer, which gives electrical light and audio signal to notify the owner of an intruder in the building. Major design issues considered include; efficiency, portability, cost-effectiveness, durability, compatibility as well as the availability of required materials. This system works on the principle of the micro-switch sensor and dependent on the condition that an intruder entered through the door and stepped in any one of the switches under the mat. Verification and validation of the system indicate compliances to design specification hence the output requirements were met.
Application of Zigbee in Smart Home with Dynamic Routing AlgorithmNooria Sukmaningtyas
In order to avoid damaging the walls and bore a hole through the walls, also to save the cost of
rewiring, low voltage power line can be used to implement the smart home. However, several difficult
problem must be solved at the same time , the most important are finding a technology method to
suppress the noise interference and resist the weaker signal. The smart home system is introduced in the
paper. During the design of Smart Home System adopting power line signal carrier, a dynamic routine
algorithm based on the idea of Genetic Algorithm is proposed to cope with the time-varying and random
feature of power line channel. Thus the system can find the transmission path in real time and dispatch the
signal carrier to transmit among the nodes. With this algorithm, the communication between a certain
group-controller and its terminal nodes or between the main-controller and the group-controllers is realized
successfully. In the proposed algorithm all nodes but the controller adopt same driver, therefore the plug
and play is realized for all nodes.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
An electronic switch sensor with a point to-point intrusive monitoring systemZac Darcy
Sophistications in theft and other criminal damages necessitates for the symbiotic blending of technology with security needs. In this research, electronic switches in the form of sensors were used to implement a point-to point intrusive monitoring system for the detection of an unauthorized access to commercial and residential buildings. The system is a simple and reliable security system and uses switch sensor technology to revolutionize the standards of living. The system is also simple, adaptable and cost-effective. It is designed in six major units which include; the power supply, the input/sensor micro-switches, the monitoring and indicator, the timing, the tone generation and output units. To ensure steady power supply in the circuit, the power unit constitutes both the mains and DC supplies. The alarm unit are being activated by the normally closed sensor micro-switches unit which is connected in an electronic/door mat at both the entrance and exit of buildings. In order to facilitate easy location of the intruder, the exact point of intrusion is being determined by the monitoring and indicator unit which constitutes the quad R/S flip-flop IC and LED’s. The timing/tone generation unit is built on the 555 timer IC, in the Astable mode, which output keeps changing as far as there is a breakage of the sensors. The output of the system is mainly the LEDs and buzzer, which gives electrical light and audio signal to notify the owner of an intruder in the building. Major design issues considered include; efficiency, portability, cost-effectiveness, durability, compatibility as well as the availability of required materials. This system works on the principle of the micro-switch sensor and dependent on the condition that an intruder entered through the door and stepped in any one of the switches under the mat. Verification and validation of the system indicate compliances to design specification hence the output requirements were met.
Application of Zigbee in Smart Home with Dynamic Routing AlgorithmNooria Sukmaningtyas
In order to avoid damaging the walls and bore a hole through the walls, also to save the cost of
rewiring, low voltage power line can be used to implement the smart home. However, several difficult
problem must be solved at the same time , the most important are finding a technology method to
suppress the noise interference and resist the weaker signal. The smart home system is introduced in the
paper. During the design of Smart Home System adopting power line signal carrier, a dynamic routine
algorithm based on the idea of Genetic Algorithm is proposed to cope with the time-varying and random
feature of power line channel. Thus the system can find the transmission path in real time and dispatch the
signal carrier to transmit among the nodes. With this algorithm, the communication between a certain
group-controller and its terminal nodes or between the main-controller and the group-controllers is realized
successfully. In the proposed algorithm all nodes but the controller adopt same driver, therefore the plug
and play is realized for all nodes.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
WSN Based Temperature Monitoring System for Multiple Locations in Industryijtsrd
Wireless sensor network technology has demonstrated a great potential for industrial, commercial, and consumer applications. Speci cally, in process monitoring and control, process data such as pressure, humidity, temperature, ow, level, viscosity, density and vibration intensity measurements can be collected through sensing units and transferred wirelessly to a control system for operation and management. Adopting WSNs for process monitoring and control provides great advantages over traditional wired system. In today's world we are facing with many di erent types of emergencies in the indoor environment. Response to such emergencies is critical in order to protect resources including human life and also we can save property from damage. This wireless sensor network for Temperature monitoring System which can report the emergency to the users in various forms, such as pop ups on a Computer screen, SMS on their cell phones and so on. Due to this exibility of reporting low cost wireless sensor network prepared for emergency response system of future. We are going to develop three wireless sensor nodes and we have to place in di erent position in the building using arduino board and we have to inform to the master node or monitoring node about the temperature available at each sensor node. While sending data to each and every sensor is very costly. Hence nodes are connected to WSN and their is only one node called 'Gateway' which collects the data from all other nodes and sends it to the cloud. Aditya Jogdand | Amit Chaudhari | Niranjan Kadu | Udaykumar Shroff ""WSN Based Temperature Monitoring System for Multiple Locations in Industry"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23124.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23124/wsn-based-temperature-monitoring-system-for-multiple-locations-in-industry/aditya-jogdand
Bluetooth is a low-cost, short-range wireless technology with
small footprint, small power consumption, reasonable
throughput and hence suitable for various small, batterydriven devices like mobile phones, PDAs, cameras, laptops
etc. Development of the Bluetooth started several years ago
with the intention to replace all sorts of cables used to
connect different devices. In meantime the idea has evolved
and Bluetooth is now developing not just as a point-to-point,
but as a network technology as well.
Bluetooth has gone through periods of big hype when it was
considered as the best short-range technology as well as
through periods when it was considered a failure. However,
the last year could be seen as the turning point year for
Bluetooth. A lot of various Bluetooth devices and accessories
appeared on the market, broad range of users is able to use it
and first experiences are generally positive. The main
challenge in front of Bluetooth developers now is to prove
interoperability between different manufacturers’ devices and
to provide numerous interesting applications. An example of
such applications are wireless sensor networks.
Bluetooth operates in the 2.4GHz frequency band and uses
frequency hopping spread spectrum technique. There are 79
channels, each 1MHz wide, available for hopping.
A Bluetooth device has to be member of a piconet to be able
to communicate with other devices. A piconet is a collection
of up to 8 devices that frequency hop together. Each piconet
has one master, usually the device that initiated establishment
of the piconet, and up to 7 slave devices. Master’s Bluetooth
address is used for definition of the frequency hopping
sequence. Slave devices use the master’s clock to
synchronize their clocks to be able to hop simultaneously.
Wireless sensor networks are an interesting research area
with many possible applications. They are based on
collaborative effort of many small devices capable of
communicating and processing data. There are still many
open issues ranging from the choice of physical and MAC
layer to design of routing and application level protocols.
Bluetooth is a possible choice for data communication in
sensor networks. Good throughput, low-power, low-cost,
standardized specification and hardware availability are
Bluetooth advantages, while slow connection establishment
and lack of scatternet support are some of the deficiencies.
An initial implementation of a Bluetooth based sensor
network platform is presented. Implemented functionality and
various problems experienced during the implementation are
described. Implemented platform presents a good
environment for further research and development of sensor
network protocols and algorithms.
Project Report on HOME AUTOMATION USING DTMF.
The Project “Home Automation using mobile communication” has different sections such as:
1.Microcontroller
2.DTMF decoder
3. Relays
. This project we propose a unique System for Home automation utilizing Dual Tone Multi Frequency (DTMF) that is paired with a wireless module to provide seamless wireless control over many devices in a house. This user console has many keys, each corresponding to the device that needs to be activated. The encoder encodes the user choice and sends via a GSM transmitter. The GSM receiver receives the modulated signal and demodulates it and the user choice is determined by the DTMF decoder. Based upon this the required appliance is triggered.
it has a small description about how wireless sensor system network can be applied in various field. A application of leaksge detection is discussed in detail.
It is a short-range wireless connectivity standard that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other.
SENSOR ID is a company founded by a team of young engineers, that polarizes its own activity into designing and production devices dedicated to the world of applications of IoT. Thanks to the experience gained with CUBIT Innovation Lab and University of Pisa, SensorID has developed a strong know-how in wireless technology standard integration and implementation and in wireless network topology design. SensorID built a complete portfolio of embedded electronic modules based on NFC, UHF, RFID.
WSN Based Temperature Monitoring System for Multiple Locations in Industryijtsrd
Wireless sensor network technology has demonstrated a great potential for industrial, commercial, and consumer applications. Speci cally, in process monitoring and control, process data such as pressure, humidity, temperature, ow, level, viscosity, density and vibration intensity measurements can be collected through sensing units and transferred wirelessly to a control system for operation and management. Adopting WSNs for process monitoring and control provides great advantages over traditional wired system. In today's world we are facing with many di erent types of emergencies in the indoor environment. Response to such emergencies is critical in order to protect resources including human life and also we can save property from damage. This wireless sensor network for Temperature monitoring System which can report the emergency to the users in various forms, such as pop ups on a Computer screen, SMS on their cell phones and so on. Due to this exibility of reporting low cost wireless sensor network prepared for emergency response system of future. We are going to develop three wireless sensor nodes and we have to place in di erent position in the building using arduino board and we have to inform to the master node or monitoring node about the temperature available at each sensor node. While sending data to each and every sensor is very costly. Hence nodes are connected to WSN and their is only one node called 'Gateway' which collects the data from all other nodes and sends it to the cloud. Aditya Jogdand | Amit Chaudhari | Niranjan Kadu | Udaykumar Shroff ""WSN Based Temperature Monitoring System for Multiple Locations in Industry"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23124.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23124/wsn-based-temperature-monitoring-system-for-multiple-locations-in-industry/aditya-jogdand
Bluetooth is a low-cost, short-range wireless technology with
small footprint, small power consumption, reasonable
throughput and hence suitable for various small, batterydriven devices like mobile phones, PDAs, cameras, laptops
etc. Development of the Bluetooth started several years ago
with the intention to replace all sorts of cables used to
connect different devices. In meantime the idea has evolved
and Bluetooth is now developing not just as a point-to-point,
but as a network technology as well.
Bluetooth has gone through periods of big hype when it was
considered as the best short-range technology as well as
through periods when it was considered a failure. However,
the last year could be seen as the turning point year for
Bluetooth. A lot of various Bluetooth devices and accessories
appeared on the market, broad range of users is able to use it
and first experiences are generally positive. The main
challenge in front of Bluetooth developers now is to prove
interoperability between different manufacturers’ devices and
to provide numerous interesting applications. An example of
such applications are wireless sensor networks.
Bluetooth operates in the 2.4GHz frequency band and uses
frequency hopping spread spectrum technique. There are 79
channels, each 1MHz wide, available for hopping.
A Bluetooth device has to be member of a piconet to be able
to communicate with other devices. A piconet is a collection
of up to 8 devices that frequency hop together. Each piconet
has one master, usually the device that initiated establishment
of the piconet, and up to 7 slave devices. Master’s Bluetooth
address is used for definition of the frequency hopping
sequence. Slave devices use the master’s clock to
synchronize their clocks to be able to hop simultaneously.
Wireless sensor networks are an interesting research area
with many possible applications. They are based on
collaborative effort of many small devices capable of
communicating and processing data. There are still many
open issues ranging from the choice of physical and MAC
layer to design of routing and application level protocols.
Bluetooth is a possible choice for data communication in
sensor networks. Good throughput, low-power, low-cost,
standardized specification and hardware availability are
Bluetooth advantages, while slow connection establishment
and lack of scatternet support are some of the deficiencies.
An initial implementation of a Bluetooth based sensor
network platform is presented. Implemented functionality and
various problems experienced during the implementation are
described. Implemented platform presents a good
environment for further research and development of sensor
network protocols and algorithms.
Project Report on HOME AUTOMATION USING DTMF.
The Project “Home Automation using mobile communication” has different sections such as:
1.Microcontroller
2.DTMF decoder
3. Relays
. This project we propose a unique System for Home automation utilizing Dual Tone Multi Frequency (DTMF) that is paired with a wireless module to provide seamless wireless control over many devices in a house. This user console has many keys, each corresponding to the device that needs to be activated. The encoder encodes the user choice and sends via a GSM transmitter. The GSM receiver receives the modulated signal and demodulates it and the user choice is determined by the DTMF decoder. Based upon this the required appliance is triggered.
it has a small description about how wireless sensor system network can be applied in various field. A application of leaksge detection is discussed in detail.
It is a short-range wireless connectivity standard that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other.
SENSOR ID is a company founded by a team of young engineers, that polarizes its own activity into designing and production devices dedicated to the world of applications of IoT. Thanks to the experience gained with CUBIT Innovation Lab and University of Pisa, SensorID has developed a strong know-how in wireless technology standard integration and implementation and in wireless network topology design. SensorID built a complete portfolio of embedded electronic modules based on NFC, UHF, RFID.
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
The objective of this research is to integrate an RFID (Radio Frequency Identification) reader into a
Wireless Sensor Network (WSN) to authorize or keep track of people carrying RFID tags. The objective
was accomplished by integrating hardware and software. The hardware consisted of two WSN nodes –
the RFID node connected to one of the WSN nodes, and a computer connected to the other WSN node.
For the RFID equipment, we used the SM130-EK kit, which included the RFID reader and the RFID tags;
and for the WSN, we used the Synapse Network Evaluation kit, which included the two sensor nodes. The
software consisted of a program module developed in Python to control the microprocessors of the
nodes; and a database controlled by a simple program to manage the tag IDs of people wearing them.
The WSN and RFID nodes were connected through I2C interfacing. Also, the work of sending commands
to the RFID node, to make it read a tag and send it back to the computer, was accomplished by the
Python code developed which also controls the data signals. At the computer, the received tag ID is
evaluated with other existing tag IDs on the database, to check if that tag has authorization or not to be
in the covered area. Our research has the potential of being adapted for use with secure real-time access
control applications involving WSN and RFID technologies.
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
The objective of this research is to integrate an RFID (Radio Frequency Identification) reader into a
Wireless Sensor Network (WSN) to authorize or keep track of people carrying RFID tags. The objective
was accomplished by integrating hardware and software. The hardware consisted of two WSN nodes –
the RFID node connected to one of the WSN nodes, and a computer connected to the other WSN node.
For the RFID equipment, we used the SM130-EK kit, which included the RFID reader and the RFID tags;
and for the WSN, we used the Synapse Network Evaluation kit, which included the two sensor nodes. The
software consisted of a program module developed in Python to control the microprocessors of the
nodes; and a database controlled by a simple program to manage the tag IDs of people wearing them.
The WSN and RFID nodes were connected through I2C interfacing. Also, the work of sending commands
to the RFID node, to make it read a tag and send it back to the computer, was accomplished by the
Python code developed which also controls the data signals. At the computer, the received tag ID is
evaluated with other existing tag IDs on the database, to check if that tag has authorization or not to be
in the covered area. Our research has the potential of being adapted for use with secure real-time access
control applications involving WSN and RFID technologies.
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
The objective of this research is to integrate an RFID (Radio Frequency Identification) reader into a
Wireless Sensor Network (WSN) to authorize or keep track of people carrying RFID tags. The objective
was accomplished by integrating hardware and software. The hardware consisted of two WSN nodes –
the RFID node connected to one of the WSN nodes, and a computer connected to the other WSN node.
For the RFID equipment, we used the SM130-EK kit, which included the RFID reader and the RFID tags;
and for the WSN, we used the Synapse Network Evaluation kit, which included the two sensor nodes. The
software consisted of a program module developed in Python to control the microprocessors of the
nodes; and a database controlled by a simple program to manage the tag IDs of people wearing them.
The WSN and RFID nodes were connected through I2C interfacing. Also, the work of sending commands
to the RFID node, to make it read a tag and send it back to the computer, was accomplished by the
Python code developed which also controls the data signals. At the computer, the received tag ID is
evaluated with other existing tag IDs on the database, to check if that tag has authorization or not to be
in the covered area. Our research has the potential of being adapted for use with secure real-time access
control applications involving WSN and RFID technologies.
Diabetes is a debilitating disease, with approximately 366 million people worldwide. Its treatment today requires patients to take their own blood glucose measurements on a regular basis and draw blood by puncturing the skin. This is a painful process that is repeated and helps the patient suffer.
Dynamic Communication of Wireless Sensor Network IJERA Editor
The aim of present this paper is to the describes the design of a wireless sensor network and RFID communication based on ZigBee technology. It is mainly used for dynamic communication with various nodes. For communication and connected coverage here used various algorithms which improves the efficiency of the system. Here temperature sensor are used for sensor nodes for observation and analysis of node communication with real time application. Verifying the dynamic communication between the nodes and overcome the collision problems between master and slaves. To demonstrate the effectiveness of the proposed method in terms of balancing energy consumption and maximization of network lifetime, it compare approach with the shortest path and RANDOM algorithm with nearest neighbor approach. Simulation results demonstrate that the network lifetime achieved by the proposed method could be increased by nearly Twenty five percent more than that obtained by the RANDOM and by nearly Twenty percent more than that obtained by the Local Connect Then Cover (LCTC)
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
actuator device configuration by NFC
1. 1
1
Abstract - In the area of building automation, many sensor
or actuator devices are tiny embedded systems which are
installed throughout the building. The sensors gather
information about the current environment (e.g., the
temperature, number of people in a room, etc.) and the
actuators interact with the environment (e.g., controlling
lights, heating, or door access). A central unit controls these
devices (wirelessly or by wire), therefore all devices need at
least a unique id throughout the system, and in many cases
some more configuration or authentication data. New or
replaced devices have to be registered with the central unit in
order to enable correct control. Thus, the person installing a
new device has to prepare it in terms of at least setting an id
before it can be connected to the network. This can be tedious
work, especially for untrained workers. This paper proposes
adding an NFC module as an enhancement for standard
devices. The devices can then be configured on site using a
standard smart phone running an appropriate application.
This eliminates the need to preconfigure devices using a
programmer tool. The presented application enables (first-
time or re-) configuration of wireless embedded devices. The
prototype features an ATmega 328P micro-controller from
Atmel and a M24SR02-Y NFC chip from STMicroelectronics.
I. INTRODUCTION1
Today more and more devices in buildings are connected
and can be controlled from a central unit. Typical controlled
devices are sensors (collecting information about the
environment) or actuators (directly interacting with the
environment).
In the context of building automation, sensors can be
temperature sensors, movement sensors, light sensors,
humidity sensors, light barriers, pressure sensors, etc.
Actuators can be lights, locks on doors or windows, small
motors actually opening doors or windows (like in the case
of a fire, in order to act as a smoke outlet), thermostats
(lowering or increasing room temperature), etc. The devices
usually consist of a micro-controller, a communication unit
(like a transceiver or a network connection), some memory, a
power management unit, and, depending on its purpose,
some sensor or actuator unit.
The devices then communicate wirelessly (e.g., using a
low-power protocol like ZigBee, KNX, Wireless HART, or
EnOcean) or weirdly (e.g., using power line communication
(PLC) or even dedicated cables) with a central control unit.
This unit mainly takes input data from the sensor devices
and sends commands to the actuator devices. If the location
of a sensor device is known then the received sensor value
can be put into a greater context; e.g., the current
temperatures of all rooms in a whole building can be
collected and the current state be used to make decisions on
whether some actuators (like thermostats or window-
openers) should be put into action. For this, of course the
location of those actuators has to be known, too, and the
actuators be individually approached.
Therefore, a broadcast structure will not suffice for such
a setup. For communication, at least a unique id for each
device is required so it can be accessed individually.
.
A. Existing Operation of Devices
If a building is to be equipped with lots of sensors or
actuators, a problem arises in terms of configuring all
these devices. The devices need at least a unique id, and in
many cases, it is important to take note of the location of
the device (like the room number or even an exact
position). In order to avoid tampering with wirelessly
connected devices it is advisable to use some kind of secure
communication, usually by use of cryptographic keys and
algorithms.
The configuration use case occurs throughout the whole
life cycle of a sensor or actuator device:
o deploy, when a device is installed for the first
time
o repairs, when a device is being replaced and a
new device has to take over the same id and
configuration
o reconfiguration, when a device is being moved to
Wireless sensor/actuator device configuration
by NFC
SANDEEP P M PROF.
MADHUKARA S
ECE Dept, S.J.C.I.T CHIKBALLAPURA ASSISTANT
PROFESSOR
Sandeep.pm.sp37@gmail.com ECE Dept, S.J.C.I.T CHIKBALLAPURA
madhukara2008@gmail.com
2. a new location
o deactivation, when a device is being taken down
and unregistered
In all these situations except the very first installation a
secure communication is required to ensure authorized
access only.
Albeit the embedded devices do have a way of
communication (usually a transceiver for wireless devices
or a cable connection for others), this cannot be used for
initial configuration. One of the reasons is the fact that the
new device would not be reachable due to a yet unknown
or even undefined id. Another reason is that most such
communication is performed securely, i.e., based on
cryptographic algorithms and keys; without being given
the keys the device would therefore not be able to
participate in secure communication, and of course it
would be out of the question to allow insecure initial
communication.
B.Proposed operation of devices
This paper proposes a new manual configuration
schema for sensor and actuator devices. Instead of using
small displays, keypads, switches or cables for
configuration, we propose using Near Field
Communication (NFC). NFC is a short range wireless
protocol supported by many different devices today,
including smart phones. NFC chips are cheap because of
their wide distribution. Therefore, sensors and actuators
can be extended with a NFC chip without increasing the
production costs much. These extended devices can be
configured using any NFC writer, including many smart
phones . An application on the smart phone then manages
the different sensors and actuators and their configuration,
making a specific portable configuration device unnecessary
Fig.1.1 A smart phone connecting to a sensor device via
NFC
C. Related Work
The approach of NFC or RFID tags being used for
configuring sensor network devices is not yet that common.
However, the potential of some chip less RFID tags in term
of sensing. Two configurations of chip less sensor tags are
studied and experimented. The first configuration is based
on a chip less RFID tag coded in frequency domain and
transformed into a sensor thanks to a deposit of a
nanomaterial that exhibits high sensitivity to humidity. One
of the advantages of such a transformation is to combine
both identification and sensing in the same and unique
device. Very interesting sensitivity is observed in practice.
The second configuration is based on the use of frequency
coded tag where sensing capability consists in measuring a
flight time. Then several sensors located on an object in
preselected positions are used in order to monitor the
deformation of the object and Shrestha et al. chip less RF
identification (RFID) sensor system platform consisting of
passive chip less RFID sensor tags and specialized reader
has been developed for cyber centric monitoring
applications. The sensor tags are fabricated on a flexible
substrate, and the tag identification (ID) generation circuit
consists of micro strip transmission lines. Two tag
configurations are presented. The first configuration (conf-I)
consists of an antenna and an integrated sensor. The
second configuration (conf-II) consists of an antenna, ID
generation circuit, and a sensor. Use chip less RFID tags
instead of full embedded systems as sensing units. Surpass
and Yoshigoe propose to use NFC as a transmission method
for Wireless sensor networks.
Explored the idea to use NFC for configuration and
encryption key download onto wireless devices when
connecting to previously unknown public Wi-Fi hotspots a
Wi-Fi hotspot authentication system that relies on a Near
Field Communications (NFC) sidechannel to address the
security issues of Wi-Fi configuration and access in public
locations. The proposed solution defines an architecture
that simplifies Wi-Fi access point configuration for the end
user, while simultaneously increasing user security and
privacy in public networks. This is achieved by embedding
network and security information in NFC enabled devices
(e.g. tags) that allow the user to connect to secure wireless
networks without a preestablished relationship.
II. PROTOTYPE
The prototype system consists of two parts:
o A Smarthomatic sensor device which is was
expanded by adding an NFC chip
o An NFC application for Android smart phones
(see Section II-D)
3. 1
3
The first part is implemented using an environment
sensor from the smarthomatic house automation system, the
NFC chip M24SR02-Y from STMicroelectronics and an
Android mobile phone application. The environment
sensor and the NFC chip are described thoroughly in the
next two sections, followed by the prototype description
and the application overview.
A. Smarthomatic Smarthomatic is an open-source house
automation system developed by Uwe Freeze. The design
goals for the project are:
o keep it simple (complexity only when necessary)
o make it similar (differences only when necessary)
o make it easy to build up
o make it cheap
A basic Smarthomatic system consists of a base station
connected to a host computer through RS232, and some
sensor and actuator devices. The base station receives and
transmits Advanced Encryption Standard (AES) encrypted
radio packets from and to the sensors/actuators. The PCBs
and the firmware’s for the base station and all
smarthomatic devices are freely available under the
General Public License (GPL). At the moment, the
following sensors/actuators are available:
o environment sensor for measuring light,
temperature, pressure, and humidity
o a power switch actuator for switching 230V devices
o a RGB dimmer for three Light Emitting Diodes
(LEDs)
o a Soil Moisture Meter
The devices are configured by flashing the
configuration data into the EEPROM using an In-System
Programmer (ISP), an external device connected to a host
computer and the micro-controller
Figure 2.2 Pin layout of a M24SR02-Y NFC chip from
STMicroelectronics .
For the prototype system, the M24SR02-Y NFC chip from
STMicroelectronics is selected. It implements a NFC/RFID
tag with 2Kbit EEPROM. In addition to the radio
interface the M24SR02-Y features an I2C interface
working at up to 1MHz transmission clock. It is
compatible to the I2C interface of the ATmega 328P. The
tag supports NFC Forum Type 4 tag operations based on
the ISO/IEC 14443 standard. The 2kbit memory on the
M24SR02-Y can be read/written from the radio interface,
but also from the I2C interface.
B. Prototype At a first step the prototype is implemented
on a pin board.
Figure 2.1 Prototype systems on a pin board. The yellow
wire on the far-right side is the NFC antenna. The
two seven segment displays show the configured sensor
id.
Figure 2.1 shows this pin board. The ATmega 328P is
placed at the top of it. The ATmega runs the extended
firmware of an smarthomatic environment sensor. The larger
structure on the right is the M24SR02-Yin an SMD package
adapter. The NFC antenna is the yellow cable on the right
side of the M24SR02-Y. The two seven segment displays
show the currently configured network id of the
environment sensor. It changes every time a new id is
configured through the NFC tag.
III. APPLICATION
The mobile phone application for configuring the
smarthomatic sensors through NFC is written for the
Android Operating System (OS). Android and Apples IOS,
are the most widely spread smart phone OSs today. Java is
the programming language for most Android applications
and a lot of support material is available on the Internet.
4. Because of the low barrier for application development,
Android is chosen as the OS for the prototype application.
The application itself is clearly structured. The main
activity is displayed at the start of the application. It
presents no real information, but through selecting the
typical Android application menu the user can choose
between showing all sensor/actuator devices stored in the
database and adding a device. Figure 5 shows the activity
to add a device.
Figure3.1 shows the moment configuring the wireless
network id, the type of the device, its location, and a
128/256-bit key can be stored into the application
database. After storing the data, it can be transferred to the
sensor/actuator by just holding the phone directly above it.
The information about the configured devices can be
exported into a CSV file. An example file is displayed in
Table II. All the configured information can be exported
and for example important in a central database.
Table 1 show the different configuration data sizes for three
smarthomatic devices. Configuration data for these devices
consist among others of:
sensor data and transmitting it.
5. 1
5
IVFUTURE SCOPE
NFC SD and SIM Cards For
those who want to use near field communication
technology but don’t currently have an NFC
compatible smartphone, there are other ways to
enable NFC on your phone without trading it in for
an expensive new model. Both SIM and SD cards
can be equipped with NFC chips, and some
companies currently offer or are preparing to offer
these options so more customers can start using
NFC technology.
SD Cards An SD
card serves as a memory card for your smartphone.
Purchasing an SD card with NFC technology
stored on it lets you pop it into your phone’s SD
card slot and start waving your smartphone at
registers or over smart posters. The drawback of
this technology is the range of phones it can work
with. Those with a metallic SD card slot won’t
work; however, those with a non-metallic slot
should work just fine with the NFC SD card.
SIM Cards SIM
cards with NFC chips embedded on them are soon
to be a worldwide standard, making them more
accessible and compatible than SD card versions of
NFC technology. The SIM card does raise security
concerns, however. It could be stolen or possibly
hacked to collect and use sensitive financial
information. As the standards for this technology
are developed, companies aim to create increased
security that prevents these potential problems
fromoccurring.
Set-up and Usage Once
you’ve purchased an SD or SIM card for your
smartphone, turn off your phone and insert the
card. Turn the phone back on and search the
smartphone’s marketplace for apps compatible with
NFC technology. To work you’ll need to wave the
area with the SD or SIM card over the card reader,
which can prove a little trickier to hit than with
smartphones that come preinstalled with NFC
chips. Removing the card will disable your NFC
access.
V CONCLUSION
A smart supermarket shopping system based on NFC has
advantages including high reliability, real-time interactions,
convenience of installation and maintenance as well as high
efficiency. However, there is still a long way to go before it
is widely put into use. The problems now focus on the super
intendance of e-tags and lack of research in NFC terminals.
With the development of mobile communication
technologies, the way of life will become more intelligent,
the system of mobile payment will be ameliorated too. The
future of NFC payment is still bright and the applications
supporting NFC will continue to turn up with the maturation
of the market.
In the near future, part of people's lives is certain to be
occupied with wide spread emergence of the NFC
technology, particularly with respect to mobile payment. It is
an industry worth continued attention
REFERENCES
[1] J. Haase, G. Zucker and M. Alahmad, Energy efficient building
automation: a survey paper on approaches and technologies for
optimized building operation, in Industrial Electronics Society,
IECON 2014 - 40th Annual Conference of the IEEE, Oct. 2014, pp.
5350–5356.
[2] E. Perret, R. Nair, E. Bel Kamel, A. Vena and S. Tedjini, Chipless
rfid tags for passive wireless sensor grids, in General Assembly and
Scientific Symposium (URSI GASS), 2014 XXXIth URSI, Aug. 2014,
pp. 1–4.
[3] D. Serfass and K. Yoshigoe, Wireless sensor networks using
android virtual devices and near field communication peer-to-peer
emulation, in Southeastcon, 2012 Proceedings of IEEE, Mar. 2012,
pp. 1–6.
[4] A. Matos, D. Romao and P. Trezentos, Secure hotspot
authentication through a near field communication side-channel, in
Wireless and Mobile Computing, Networking and Communications
(WiMob), 2012 IEEE 8th International Conference on, Oct. 2012,
pp. 807–814.
[5] K. Gravogl, J. Haase,and C. Grimm, Choosing thebest wireless
protocol forTypical applications, in 24th International Conference
on Architecture of Computing Systems (ARCS),2011.
[6] S. Shrestha, M. Balachandran, M. Agarwal, V. Phoha, and K.
Varahramyan, A chipless rfid sensor system for cyber centric
monitoring applications, Microwave Theory and Techniques, IEEE
Transactions on, vol. 57, no. 5, May 2009, ISSN: 0018-9480, pp.
1303–130.
[7] W. Diffie and M. E. Hellman, New directions in cryptography,
Information Theory, IEEE Transactions on, vol. 22, no. 6,1976,
pp. 644–654.
[8] U. Freese, Smarthomatic,
http://www.smarthomatic.org/,21.06.2015.
[9] Atmel, Data sheet atmega48pa/88pa/168pa/328p,
http://www.atmel.com/doc8161.pdf.
[10] V. Coskun, K. Ok, and B. Ozdenizci, Near Field Communication
(NFC): From Theory to Practice. John Wiley & Sons, 2011.
Wireless sensor or actuator device configuration by NFC 2017-18
DEPT. OF ECE, SJCIT
Page 30
[11] STMicroelectronics, Data sheet dynamic nfc/rfid tag ic
m24sr02-y, http: / /www . st . com
[12] N. F. Forum, Type 4 tag operation specification: technical
specification, http: / / apps4android . org / nfc - specifications /
NFCForum-TS-Type-4-Tag_2.0.pdf.