The Intelligent Home Automation System (IHAS) is usually a cell phone web-based application that enables end users in order to keep track of in addition to manage home/office appliance using their mobile system. The main objective of this system is developed to facilitate home users, especially domestic electrical appliances with simple controls. In addition, it can save the cost of electricity for lighting can be controlled to suit the user. Generally, most home appliances controlled from a distance using a remote control. Has created a system for controlling home lighting from a certain distance, which replaces the remote control using mobile smartphone. To make the smartphone to function as a remote control, an application was developed using Android technology. App Inventor software used for designing applications intended. Hardware microcontroller Arduino UNO R3 which is used to connect the smartphone to the electrical equipment. The system has been tested by developing a mini model and take into account the situation in the domestic home. The test is based on the level of control for wirelessly using Bluetooth and the distance between the lamp and the smartphone. The results of this test, the system can be used on equipment or other home appliances for the purpose of controlling or adjustment. In addition, the security system was also highlighted in a typical system, using the global system for mobile (GSM), it can be warned and notified to the consumer where there is a gas leak or the presence of a person in the vicinity of the residence.
Energy Management with Disaster Intimation and Control using IoTIJEACS
In the area of digitization and automation, the life of
human being is getting simpler as almost everything is
automated. Nowadays humans have made internet an integral
part of their everyday life without which they are helpless.
Internet of things (IoT) gives a platform which allows different
devices to inter-connect, sense and control the things remotely
across a network infrastructure without any limitation to the
coverage area. In our proposed work, we stress on Wireless-
Home-Automation-System (WHAS) using IoT, it is a system uses
computers or smart phone to control basic home functions and
features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home.
The proposed system is able to monitor the entire things
connected to the internet and also to be maintaining the status of
individual devices for further action. We have built the home
automation with several devices and sensors, here sensor help to
monitor the device status and intimate the authorized person to
take particular action.
Energy Management with Disaster Intimation and Control using IoTIJEACS
In the area of digitization and automation, the life of
human being is getting simpler as almost everything is
automated. Nowadays humans have made internet an integral
part of their everyday life without which they are helpless.
Internet of things (IoT) gives a platform which allows different
devices to inter-connect, sense and control the things remotely
across a network infrastructure without any limitation to the
coverage area. In our proposed work, we stress on Wireless-
Home-Automation-System (WHAS) using IoT, it is a system uses
computers or smart phone to control basic home functions and
features automatically through internet from anywhere around
the world, an automated home is sometimes called a smart home.
The proposed system is able to monitor the entire things
connected to the internet and also to be maintaining the status of
individual devices for further action. We have built the home
automation with several devices and sensors, here sensor help to
monitor the device status and intimate the authorized person to
take particular action.
The home security system has become vital for every house. Previously, most doors can be open by using traditional ways, such as keys, security cards, password or pattern. However, incidents such as a key loss has led to much worrying cases such as robbery and identity fraud. This has become a significant issue. To overcome this problem, face recognition using deep learning technique was introduced and Internet of Thing (IoT) also been used to perform efficient door access control system. Raspberry Pi is a programmable small computer board and used as the main controller for face recognition, youth system and locking system. The camera is used to capture images of the person in front of the door. IoT system enables the user to control the door access.
UBIQUITOUS SMART HOME SYSTEM USING ANDROID APPLICATIONIJCNCJournal
This paper presents a flexible standalone, low cost smart home system, which is based on the Android app communicating with the micro-web server providing more than the switching functionalities. The Arduino Ethernet is used to eliminate the use of a personal computer (PC) keeping the cost of the overall system to a inimum while voice activation is incorporated for switching functionalities. Devices such as light switches, power plugs, temperature sensors, humidity sensors, current sensors, intrusion detection sensors, smoke/gas sensors and sirens have been integrated in the system to demonstrate the feasibility and effectiveness of the proposed smart home system. The smart home app is tested and it is able successfully perform the smart home operations such as switching functionalities, automatic environmental control and intrusion detection, in the later case where an email is generated and the siren goes on.
Smart home systems have gained importance nowadays owing to the various applications they provide to the users. Applications of smart home systems cover many aspects of our daily life and help to reduce the cost of living via controlling and managing home appliances as an example.
Design and Implementation of a Contactless Smart House Network System IJECEIAES
The Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two main parts: the main station part and the wireless house nodes part. The local wireless communication between the house nodes and the main station is done through ZigBee technology with low power and low data rate. The mode of operation of these house nodes can be configured dynamically by the end user and determined multicast or broadcast operation according to the user requirements. The implementation and upgrading of SHNS are costless, flexible and required less power comparing with other reviewed systems.
DEDA: An algorithm for early detection of topology attacks in the internet of...IJECEIAES
The internet of things (IoT) is used in domestic, industrial as well as mission-critical systems including homes, transports, power plants, industrial manufacturing and health-care applications. Security of data generated by such systems and IoT systems itself is very critical in such applications. Early detection of any attack targeting IoT system is necessary to minimize the damage. This paper reviews security attack detection methods for IoT Infrastructure presented in the state-of-the-art. One of the major entry points for attacks in IoT system is topology exploitation. This paper proposes a distributed algorithm for early detection of such attacks with the help of predictive descriptor tables. This paper also presents feature selection from topology control packet fields. The performance of the proposed algorithm is evaluated using an extensive simulation carried out in OMNeT++. Performance parameter includes accuracy and time required for detection. Simulation results presented in this paper show that the proposed algorithm is effective in detecting attacks ahead in time.
Design and realization of motion detector system for house securityTELKOMNIKA JOURNAL
In this paper, the design and realization of motion detector system for house security based GSM
network is presents. The development of microcontroller carried out intruder detection that supports
tracking techniques to provide vital security with control and alert operation inside and outside the home.
The pivot of security on the integration the motion detector and cameras into web applications has become
more interested. The smart surveillance Pi camera obtain the input from the motion detector and controller
which is send the video to the web server allowing the homeowner to access this video by use web
applications. An intrusion alert send to the owner by mean of message via mobile and buzzers alarms
located at suitable distance. This system is typify proficient video camera for remote sensing and tracking
with live video for succeeding play again to offers efficient and easy implementation with omnipresent
surveillance solution.
IoT based Environmental Monitoring and Control SystemIJMREMJournal
IoT plays a major role in collecting the information from the sensing unit enclosing our environment due to
alterations in the climate which led to the significance of environmental monitoring. This Paper presents a
development of real time environmental monitoring and control system by utilizing Node MCU, DHT11 sensor,
ACS712 current sensor, Thing Speak (Open IoT analytics service) and Blynk application. The main task of
monitoring parameters (Humidity, temperature and power consumption) with real time sensors is done by Thing
Speak continuously which has API (Application programming Interface) for gathering sensed data and enabling
users to observe the monitored data in graphs for an interval of every 15 seconds.
This project is also designed to control home devices sitting at any place in the world by utilizing power
efficiently through Blynk application which is used to read data from sensors located in home environment using
smart phone and to turn on/off heating and cooling appliances automatically with respect to room temperature
values.
This paper illustrates a portable domestic locker security system which is based on GSM (Global System for Mobile Communications) technology. A handcrafted low-cost touch sensitive box is designed (using Vero board) for the project which is one of the most attractive features of the system. The system will operate in a way that if there is any unexpected user, tries to touch any portion of the touch sensitive box, a feedback system will be turned on immediately. The feedback system will alert the property holder about the unexpected user by sending SMS (Short Message Service) and turning on an alarm system. The alarm system will be turned off only if it receives a specific SMS from the property holder. This system not only has the advantages of high sensitivity, small size and lightweight, but also it is easy to use. This system is featured with an uncomplicated design, convenient use, strong flexibility and reliable performance. Since the circuit in the system is simple and easy to contrivance, the system can be installed without any difficulty at homes & offices. It will also provide a good security in the vehicles and Automated Teller Machine (ATM) booths.
Developed a home security system to protect occupants from fire and intrusion. The device sends SMS to the emergency number provided to it via GSM (Global System for Mobile communications) module. Led my group and implemented the device successfully.
In this work, a new security system design is demonstrated based on the sound signal for bank protection. Voice Acknowledgment Module is placed on the gate of the safe. Voice Acknowledgment Module is set to perceive the capable client as indicated by his sound recurrence reaction. The plan could program to permit tow clients for greater adaptability the card location strategy is executed utilizing individual data information to permit other client in the framework. A delicate camera is accustomed to observing the developments in the structure and for the reasons for wellbeing and security. All these sensors are controlled by arduino.
The home security system has become vital for every house. Previously, most doors can be open by using traditional ways, such as keys, security cards, password or pattern. However, incidents such as a key loss has led to much worrying cases such as robbery and identity fraud. This has become a significant issue. To overcome this problem, face recognition using deep learning technique was introduced and Internet of Thing (IoT) also been used to perform efficient door access control system. Raspberry Pi is a programmable small computer board and used as the main controller for face recognition, youth system and locking system. The camera is used to capture images of the person in front of the door. IoT system enables the user to control the door access.
UBIQUITOUS SMART HOME SYSTEM USING ANDROID APPLICATIONIJCNCJournal
This paper presents a flexible standalone, low cost smart home system, which is based on the Android app communicating with the micro-web server providing more than the switching functionalities. The Arduino Ethernet is used to eliminate the use of a personal computer (PC) keeping the cost of the overall system to a inimum while voice activation is incorporated for switching functionalities. Devices such as light switches, power plugs, temperature sensors, humidity sensors, current sensors, intrusion detection sensors, smoke/gas sensors and sirens have been integrated in the system to demonstrate the feasibility and effectiveness of the proposed smart home system. The smart home app is tested and it is able successfully perform the smart home operations such as switching functionalities, automatic environmental control and intrusion detection, in the later case where an email is generated and the siren goes on.
Smart home systems have gained importance nowadays owing to the various applications they provide to the users. Applications of smart home systems cover many aspects of our daily life and help to reduce the cost of living via controlling and managing home appliances as an example.
Design and Implementation of a Contactless Smart House Network System IJECEIAES
The Internet of Things (IoT) technology is every object around us and it is used to connect these objects to the Internet to verify Machine to Machine (M2M) communication. The smart house system is the most important application of IoT technology; it is increase the quality of life and decrease the efforts. There were many problems that faced the existing smart house networking systems, including the high cost of implementation and upgrading, high power consumption, and supported limited features. Therefore, this paper presents the design and implementation of smart house network system (SHNS) using Raspberry Pi and Arduino platforms as network infrastructure with ZigBee technology as wireless communication. SHNS consists of two main parts: the main station part and the wireless house nodes part. The local wireless communication between the house nodes and the main station is done through ZigBee technology with low power and low data rate. The mode of operation of these house nodes can be configured dynamically by the end user and determined multicast or broadcast operation according to the user requirements. The implementation and upgrading of SHNS are costless, flexible and required less power comparing with other reviewed systems.
DEDA: An algorithm for early detection of topology attacks in the internet of...IJECEIAES
The internet of things (IoT) is used in domestic, industrial as well as mission-critical systems including homes, transports, power plants, industrial manufacturing and health-care applications. Security of data generated by such systems and IoT systems itself is very critical in such applications. Early detection of any attack targeting IoT system is necessary to minimize the damage. This paper reviews security attack detection methods for IoT Infrastructure presented in the state-of-the-art. One of the major entry points for attacks in IoT system is topology exploitation. This paper proposes a distributed algorithm for early detection of such attacks with the help of predictive descriptor tables. This paper also presents feature selection from topology control packet fields. The performance of the proposed algorithm is evaluated using an extensive simulation carried out in OMNeT++. Performance parameter includes accuracy and time required for detection. Simulation results presented in this paper show that the proposed algorithm is effective in detecting attacks ahead in time.
Design and realization of motion detector system for house securityTELKOMNIKA JOURNAL
In this paper, the design and realization of motion detector system for house security based GSM
network is presents. The development of microcontroller carried out intruder detection that supports
tracking techniques to provide vital security with control and alert operation inside and outside the home.
The pivot of security on the integration the motion detector and cameras into web applications has become
more interested. The smart surveillance Pi camera obtain the input from the motion detector and controller
which is send the video to the web server allowing the homeowner to access this video by use web
applications. An intrusion alert send to the owner by mean of message via mobile and buzzers alarms
located at suitable distance. This system is typify proficient video camera for remote sensing and tracking
with live video for succeeding play again to offers efficient and easy implementation with omnipresent
surveillance solution.
IoT based Environmental Monitoring and Control SystemIJMREMJournal
IoT plays a major role in collecting the information from the sensing unit enclosing our environment due to
alterations in the climate which led to the significance of environmental monitoring. This Paper presents a
development of real time environmental monitoring and control system by utilizing Node MCU, DHT11 sensor,
ACS712 current sensor, Thing Speak (Open IoT analytics service) and Blynk application. The main task of
monitoring parameters (Humidity, temperature and power consumption) with real time sensors is done by Thing
Speak continuously which has API (Application programming Interface) for gathering sensed data and enabling
users to observe the monitored data in graphs for an interval of every 15 seconds.
This project is also designed to control home devices sitting at any place in the world by utilizing power
efficiently through Blynk application which is used to read data from sensors located in home environment using
smart phone and to turn on/off heating and cooling appliances automatically with respect to room temperature
values.
This paper illustrates a portable domestic locker security system which is based on GSM (Global System for Mobile Communications) technology. A handcrafted low-cost touch sensitive box is designed (using Vero board) for the project which is one of the most attractive features of the system. The system will operate in a way that if there is any unexpected user, tries to touch any portion of the touch sensitive box, a feedback system will be turned on immediately. The feedback system will alert the property holder about the unexpected user by sending SMS (Short Message Service) and turning on an alarm system. The alarm system will be turned off only if it receives a specific SMS from the property holder. This system not only has the advantages of high sensitivity, small size and lightweight, but also it is easy to use. This system is featured with an uncomplicated design, convenient use, strong flexibility and reliable performance. Since the circuit in the system is simple and easy to contrivance, the system can be installed without any difficulty at homes & offices. It will also provide a good security in the vehicles and Automated Teller Machine (ATM) booths.
Developed a home security system to protect occupants from fire and intrusion. The device sends SMS to the emergency number provided to it via GSM (Global System for Mobile communications) module. Led my group and implemented the device successfully.
In this work, a new security system design is demonstrated based on the sound signal for bank protection. Voice Acknowledgment Module is placed on the gate of the safe. Voice Acknowledgment Module is set to perceive the capable client as indicated by his sound recurrence reaction. The plan could program to permit tow clients for greater adaptability the card location strategy is executed utilizing individual data information to permit other client in the framework. A delicate camera is accustomed to observing the developments in the structure and for the reasons for wellbeing and security. All these sensors are controlled by arduino.
GSM Based Home Appliances Monitoring System for Handicapped Peoplepaperpublications3
Abstract: The aim of the project is to use Bluetooth communication for controlling the home appliances and monitoring the main door of home using smartphone. Now-a-days it is a kind of requirement to have a modern technology for security of our homes and also be able to monitor the various activities around without interrupting the current work one is doing. Fine grained access rights are built into the system which also leverages external social networking sites for making access control and invitation interface easier for the end users. So the following system is designed using which a person will be able to control (switch on/off) any of the appliances connected in home. The proposed system consists of a control console interfaced with different sensors using bluetooth. Suspected activities are conveyed to remote user through SMS (Short Message Service) or Call using GSM (Global System for Mobile communication) technology. Upon reply, the remote user can control his premises again through GSM-Bluetooth combination.
Smart home automation towards the development of smart citiesCSITiaesprime
The home automation system is indeed a system that offers a mobile application to monitor it through the smartphone or tablet. It can control home appliances like light, fans, air conditions, and smart security locks, etc. Bluetooth or Wi-Fi is used for remote control of things. The smart home is essentially how it looks: automating with such an easy touch of a button or a voice command the ability to manage things across the home. Several operations were both simple and extremely low-cost, such as setting up a light to turn on and off at the time of your moment. Others need much more money and resources, including advanced spy cameras. Some people thought that technology is taking a really huge part of our lives. It does! we’re living in a modern generation where smart and intelligent systems are necessary to be there wherever we are to make our lives easier and much better, for example, we can do many things faster, better, and more accurate.
Communication Methods to build Smart Home Monitoring System: A Surveydbpublications
The inability to access and control the appliances from remote locations is one of the major reasons for energy loss. An android application or any input method is used by the users to give instructions to home automation systems. This system can make use of a host of communication methods such as Wi-Fi, GSM, Bluetooth and ZigBee etc.. Different controlling devices and configurations can be found in existing systems. Such systems have been found already in many places for a wide variety of applications. This paper presents a survey of such systems.
Communication Methods to build Smart Home Monitoring System: A Surveydbpublications
The inability to access and control the appliances from remote locations is one of the major reasons for energy loss. An android application or any input method is used by the users to give instructions to home automation systems. This system can make use of a host of communication methods such as Wi-Fi, GSM, Bluetooth and ZigBee etc.. Different controlling devices and configurations can be found in existing systems. Such systems have been found already in many places for a wide variety of applications. This paper presents a survey of such systems. Keywords: I
Smart home system is very popular in current days that give many kind of application that make all simple and easy to control. In modern day, home machines are using wireless equipment and can be retrieved by internet that will make populations life easier and organized. It based Home Computerization System is designed to assist the people with physical debilities and elderly to provide support as well as to control the electrical usages and monitor the room infection using mobile application. The design is using surrounded controller board and the home appliances are physically associated to output ports of this board via relays. The Home Automation is a wireless home computerization system that is supposed to be executed in existing home environments, without any variations in the infrastructure. Arun Kumar. N | Sathiyabama. T "Smart Security System (IOT)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29337.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/29337/smart-security-system-iot/arun-kumar-n
Abstract: Android based E-home is an application of embedded system which integrates Android operating system, Arduino controller and GSM for the implementation of Smart Home. Any Android device can act as a transmitting device. The user can control any appliance through an user friendly mobile application built in Android platform. A unique code for controlling each appliance installed with the system is assigned in the program and it is transmitted from the Android phone to the CPU installed in receiver, through the application, as Text messages. The GSM receiver in the CPU receives the text messages from the transmitting device and transfers it to the controller. The Controller decodes the message based on the decoding algorithm stated in the program and based on the command from the user; the controller sends signals to the switching circuitry. The Switching circuitry is the device which is in direct contact with the home appliances through wires and it controls the devices connected to it. Thus, by controlling the Switching circuitry, it is possible to control the various devices. Backward communication is also enabled when an event occurs in the mechanical switch. In this case, the GSM shield acts as a transmitter and sends a message to the user. Thus, ‘Android based E-Home’ provides a cost efficient, long range solution for the implementation of a smart home using less complex circuits and also provides an user friendly environment through the android app. There is no need for an extra hardware as the Android smart phone itself acts as a transmitter which in turn contributes to the cost efficiency, ease of access and efficient operation of the system.
[[IAA JSR 10(1)36-48, 2023.Automated Hybrid Smart Door Control System.pdfPUBLISHERJOURNAL
This research paper successfully designed, developed and implemented an automated hybrid smart door control system which has the ability to secure a home up to 92% electronically. This smart door system is designed and implemented by building a hardware made up of the Bluetooth module and fingerprint scanner which are interfaced with the Microcontroller system that uses +5V power supply. The written programs were interfaced into the microcontroller chips by plugging the Arduino USB cable into the laptop and upload the codes. The microcontroller chips helped in enrolling the users fingerprint into the fingerprint scanner and it automatically administers and saves the users fingerprint after enrollment. Furthermore, after all the processes the user places the enrolled or registered finger into the fingerprint scanner which either accepts or denies the user by triggering the solenoid lock to either unlock, lock or deny access. This process of unlocking and locking requires using Bluetooth and fingerprint to either lock or unlock the door smartly without stress and it can be done within one second that is why the Solenoid lock is used in building this security system. This automated hybrid smart door control system developed has curbed the problem of door breaking theft for about 92%, strengthened security and as well made it so easy for the physically challenged people to have access to their homes without third party assistance.
Keywords: Smart Door System, Fingerprint, Bluetooth, Security, Arduino, Microcontroller
Automated Hybrid Smart Door Control System.pdfssuser793b4e
This research paper successfully designed, developed and implemented an automated hybrid smart door control system which has the ability to secure a home up to 92% electronically. This smart door system is designed and implemented by building a hardware made up of the Bluetooth module and fingerprint scanner which are interfaced with the Microcontroller system that uses +5V power supply. The written programs were interfaced into the microcontroller chips by plugging the Arduino USB cable into the laptop and upload the codes. The microcontroller chips helped in enrolling the users fingerprint into the fingerprint scanner and it automatically administers and saves the users fingerprint after enrollment. Furthermore, after all the processes the user places the enrolled or registered finger into the fingerprint scanner which either accepts or denies the user by triggering the solenoid lock to either unlock, lock or deny access. This process of unlocking and locking requires using Bluetooth and fingerprint to either lock or unlock the door smartly without stress and it can be done within one second that is why the Solenoid lock is used in building this security system. This automated hybrid smart door control system developed has curbed the problem of door breaking theft for about 92%, strengthened security and as well made it so easy for the physically challenged people to have access to their homes without third party assistance.
Design and implementation of a smart home system with two levels of security ...nooriasukmaningtyas
Besides the development of technology in recent years, there has been an
effective tendency to construct smart cities and homes. Whereas the smart
home control system components can be incorporated with the existing home
appliances to eliminate the need for human intervention, save electricity,
protect homes from accidents as well as the theft, and provide home residents
with comfort. This work comprises the utilising of the internet of things (IoT)
technology to build the proposed design for the smart home. The proposed
design includes many subsystems as well as several types of sensors, such as
the passive infrared (PIR) sensor, the gas sensor, the soil moisture sensor, the
water level sensor, the temperature sensor, the light dependent resistance
(LDR), and the flame sensor. Each sensor will be connected to the Arduino
Nano for the data processing purpose, after which the Arduino Nano will be
connected to the NodeMCU module via the digital pins to implement the IoT
subsystem. The proposed system also includes a smart garage gate based on
Bluetooth HC-05 module with a specially programmed android app.
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
2. TELKOMNIKA ISSN: 1693-6930
Development of wireless and intelligent home automation system (Khalil Azha Mohd Annuar)
33
Soliman [8] study the planning and execution methods for just a cellular real-time property
automation technique dependant on Arduino Uno microcontroller as middle controllers. The
particular proposed technique features has two operational modes [8]. The very first one is
denoted like a manually–automated setting that person can certainly keep an eye on and
management the property home appliances through everywhere around the globe while using
the cell phone via Wi-Fi transmission technologies. The second one is described a new self-
automated setting that creates this controllers in order to allow you to overseeing and handling
unique home appliances in the house automatically with response to this alerts derives from this
linked devices. To aid this performance in the proposed process, a new computer hardware
execution along with Matlab-GUI software with the proposed technique is actually executed and
also the consistency in the technique is actually launched. The particular proposed technique is
actually proved to be a simple, less expensive and versatile that will making it a suitable as well
as a great customer with the smart property potential.
According to Assafa [9], in the routine outline of home security frameworks, just the
property is commonly observed, without contemplate the physical control parts of the house
itself. Furthermore, the term security is not entirely all around characterized in perspective of the
way that there is usually a period defer between the alert framework going on and genuine entry
of the security faculty. This paper shows the advancement of a home security and observing
framework that is suitable where the customary security substructure that are generally worried
about controlling robbery, social event proof against trespassing thus on failure [9]. The outline
and execution points of interest of this new home control and security framework which is taking
into account field programmable entryway exhibit has been discussed. The user here can
interact directly with the system through a web-based interface over the Internet, while home
appliances like fans, lights, door locks, and gates are controlled remotely through a user-friendly
web page. This paper will discuss the development of a security system that integrates with an
Android mobile device using Global System for Mobile Communications (GSM) shield. Home
security has been a major issue where crime is increasing. In addition, there is need to
automate home so that the user can take the advantage from technological advancement. This
paper presents a model that will provide security to their home, office or cabin by using Short
Message Service (SMS) and GSM technology.
2. Methodology
The developing process of intelligent home automation system involves in design of the
main controller circuit including hardware devices and software configurations, which provide
the platform for the whole system design. The methodology implemented in the system are
decided based on the studies done for previous research. This part will describes the
methodology employed and consideration taken into account on this development. It began with
the discussion of the project workflow followed by the system design procedures, techniques
and tools utilized. The development of this system will be involve with both hardware and
software.
2.1. Block Diagram of the System
Figure 1 shows the overall diagram for home automation system that easier to
understand. The project develops for controlling home appliances remotely and providing
security when the user is away from the place. Then, the system also include SMS based and
use wireless technology like Bluetooth to revolutionize the standard of living. This system is
wireless therefore more adaptable and cost-effective. There are two subsystems, the one
appliances control which is responsible for controlled electrical appliances and the other
subsystem being security alert that responsible for security intrusion detection and may also for
security gas leakage that exceeds certain level. For both security, GSM technology was used
for transmission of sensor data from sender to receiver. User can transmits signal instructions to
Arduino UNO as well as the technique normally takes steps in opposition to those guidance.
Hence the task offers a system that allows user to regulate devices through wireless Bluetooth
and also produce protection on discovery involving intrusion as well as gas leakage through text
message applying GSM technological.
3. ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 1, February 2019: 32-38
34
Figure 1. Full system overview
2.2. Mechanism System Design of Home Automation System
The development of mini home system can be divide into 3 parts which are hardware
system design, control system design, and software programming development. In hardware
system design, will focused to ensure the mechanical hardware is reliability and modularization.
The part of control system design is concern about the electrical hardware and position of the
sensor. In software development part, the programming of electrical appliances, PIR sensor,
MQ-2 gas sensor have been made by using Arduino software.
For this research, home system was built based on the measurement that have been
design. The size for this structure 520 mmx520 mmx520 mm. Figure 2 shows the structure of
mini home automation system. For electrical part, the schematic have been designed and then
testing on project board. It is easy for testing and troubleshooting as shown in Figure 3.
(a) (b)
Figure 2. Structure for mini home automation system (a) hall with 3 rooms (b) fan & lamp
4. TELKOMNIKA ISSN: 1693-6930
Development of wireless and intelligent home automation system (Khalil Azha Mohd Annuar)
35
Figure 3. Electrical system
For the software design, the MIT app inventor was designed based on how many
system that need to be controlled. So, from Figure 4 it shows six button that have been
designed and easy for user to use.
Figure 4. User interface selection
3. Result and Discussion
This part will explain about the results achieved in the research. A few discussions on
problem solving during process and experiment of completing this project. The data collection is
using types of gas sensor MQ2 for LPG gas that useful for gas leakage detecting in home.
5. ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 1, February 2019: 32-38
36
3.1. Lamp ON-OFF Control Test
User can selects “lamp-on” for ON light and “lamp-off” for OFF light as control from MIT
app inventor. By selecting desired command, the control button will be processed by the
system. If the command is “lamp-on” the lamp will turn on. The lamp will not change until a
command “lamp-off” is received. For this system, there are 6 output that have been installed
with Arduino Uno, it consist of 3 output AC which is lamp 1 on Digital Pin 4, lamp 2 Digital pin 5
and fan on Digital pin 6. Another 3 output DC is consist LED 1 on analog pin A2, LED 2 on
analog pin A3 and LED 3 on analog pin A4 as shown in Table 1 below.
Table 1. Pin Number for Output
Output Pin Number
Lamp 1 4
Lamp 2 5
Fan 6
Room 1 A2
Room 2 A3
Room 3 A4
3.2. Wireless System Test
Bluetooth is one of the technology or method in wireless communication. Based on the
short-range wireless connection 2.45 GHz frequency band, it will connects between multiple
devices like smartphone. The connection can be point-to-point or multipoint where the maximum
range is 10 meters. From this range, the electrical appliances can be controlled wireless. The
connections of the Bluetooth module sometime confusing since TXD goes to Rx and RXD goes
to Tx. This is because a transmission coming out of TXD pin of the Bluetooth module must be
received by Arduino on the Rx Pin 0; similarly a transmission of Arduino, Tx Pin 1 must reach
the Bluetooth module on its RXD pin. Bluetooth transmission testing done to see how much
capability a HC-05 Bluetooth module can send data from smartphone to be received by Arduino
Uno as a result.
Table 2 shown the result for the physical capability Bluetooth module to sending data
from smartphone to Arduino. Condition without barriers that successfully connected around
15 meter and condition with barriers around 10 meter. By using HC-05 Bluetooth module,
means the transmitter can receive the signal approximately 10-15 meter, which means just
enough to communicate between different rooms with a restriction.
Table 2. Bluetooth Transmission Experiment Result
Result For Sending Data By Using HC-05 Bluetooth Module
Experiment Distance (m)
Smartphone to Arduino Uno Connection
Condition w ithout barriers Condition w ith barriers
1 2 Connect Connect
2 5 Connect Connect
3 10 Connect Connect
4 15 Connect Disconnect
5 20 Disconnect Disconnect
3.3. PIR Sensor Test
There are numerous type of passive infra-red (PIR) in the market with different of
specification. For this system, PIR motion sensor will be install at outdoor. Dual-tech motion
sensor combination with microwave detection technology, PIR detection will give more accurate
movement detection. Thus choose Dual-tech motion sensor can reduce the false alarm
effective. Based on system develop by KAM Annuar et al, PIR sensor test to detect the moving
person who wants to come inside with no pre-permissions [10]. When person detected into the
PIR’s sight area about 3 m, this sensor reports this situation to the control panel. The control
panel turns the intrusion alarm on and then will certainly send SMS towards cell phone. Figure 5
shows the hardware connection for PIR sensor with GSM shield.
6. TELKOMNIKA ISSN: 1693-6930
Development of wireless and intelligent home automation system (Khalil Azha Mohd Annuar)
37
Figure 5. Connection PIR sensor with GSM shield
Based on the Table 3, it can conclude that the PIR sensor will detect human motion with
maximum 3 meter. For this experiment, the result shows that the plant cannot detect by PIR
sensor. The testing measurement for distance and output voltage for PIR sensor to object can
be summarize as shown in Table 4 below. It shows that, the maximum distance object detection
by PIR sensor up to 300 cm.
Table 3. Object Detection Experiment Test
Distance (m) Object Experiment Result Status (object)
1 Human 5 times 5 times Sensor detect
1 Plant 5 times No feedback Sensor not detect
1 Cat 5 times 2 times Sensor detect
3 Human 5 times 5 times Sensor detect
3 Plant 5 times No feedback Sensor not detect
3 Cat 5 times 2 times Sensor detect
Table 4. Object Detection based on Distance
Distance (cm) Output voltage (Volt) Output Logic Status (object)
10 4.8 Active High Detect
30 4.8 Active High Detect
60 4.8 Active High Detect
100 4.8 Active High Detect
200 4.8 Active High Detect
300 4.8 Active High Detect
400 0 Active low Not detect
3.4. Gas Sensor Test
This system includes gas detector circuit system. It to prevent gas leakage based on the
conditions either user is inside at home or not at home. Alarm of buzzer to alert user at home
when receive signal detection of gases. Then the other condition (if outside home), user will
receive information from the SMS signal. A message is sent to the concerned person using
GSM in order to inform about the leakage of LPG gas. If the leakage still continues exhaust fan
is turned ON using a solenoid valve relay. Further leakage leads to alarming of buzzer.
So that, this connection that have been made is for Tx of GSM shield connect to pin 2 of
arduino, Rx to pin 3 and make the grounds of both the apparatus common have been
connected. Power the gsm shield with a 12v external power source while running your device.
This sensor gas will recognize the level of concentration of the gas exposed and convert it into
voltage and directly sending it into Arduino. After transferring the data, Arduino will read the data
into the digital format. Voltage output from the gas sensor (0-5) V will be read as (0-1024)
decimal output in Arduino.
From the analysis, when the sensor value reached to the maximum value, then open
serial monitor and wait serial monitor will show "status OK" and soon will send sms to the
cellphone, the alarm will be on and the data will send to the user through GSM shield. From the
Table 5 it shown that the sensor can be detect to selectively choose which will be controlled gas
at the Arduino, LPG gas is in the range 4.02 to 3.98 volt. From the Table 6, shown result on the
duration between gas sensor and stove gas. The gas leakage takes a short time to give the
7. ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 1, February 2019: 32-38
38
signal to user through sms. Other that, the concentration of the gas also one of the main
important part to detect the leakage of gas.
Table 5. Voltage Output based on
Different Condition Gas
No Condition Voltage Output (Volt)
1 Free air 0.44 0.47 0.48 0.44
2 AC air 0.44 0.45 0.45 0.55
3 Cigarette smoke 0.50 0.40 0.40 0.44
4 Perfume 0.55 0.50 0.40 0.39
5 Exhaust gas vehicles 0.40 0.42 0.42 0.42
6 LPG gas 4.02 4.01 3.98 4.01
Table 6. Time Taken for Sensor
Detection
Distance Sensor (m) Time taken (s)
1 20
2 45
3 60
4 120
5 180
4. Conclusion
As conclusion, the development of wireless and intelligent home automation system is
the way to control home appliance through wireless. It introduced design and implementation of
a low cost, flexible and wireless solution to the home Integration of Bluetooth and Wi-Fi
technology in controlling home appliances can help and improve lifestyle of all user groups
especially to the disabled and elderly people in term of safety and comfortable. The
implementation of combined wired and wireless systems would be of most practical in designing
a smart home system especially in cutting the system’s installation cost for conventional homes.
Acknowledgments
The authors would like to thanks for the support given to this research by Ministry of
Education Malaysia, Universiti Teknikal Malaysia Melaka (UTeM) and Centre for Robotics and
Industrial Automation (CeRIA).
References
[1] World Report on Disability. World Health Organization and The World Bank. 2011.
[2] Vikram N, Harish KS, Nihaal MS, Raksha Umesh, Shetty Aashik Ashok Kumar. A Low Cost Home
Automation System Using Wi-Fi Based Wireless Sensor Network Incorporating Internet of Things
(IoT). 2017 IEEE 7
th
International Advance Computing Conference. 2017: 174-178.
[3] Kunal Kumar, Navneet Sen, Sheikh Azid, Utkal Mehta. A Fuzzy Decision in Smart Fire and Home
Security System. 2016 IEEE International Symposium on Robotics and Intelligent Sensors (IRIS
2016). Procedia Computer Science. 2017; 105: 93-98.
[4] Amal Paul, Aakash Upadhyay, Akhil Gaur, Renuka Bhandari. Centralized Security System Based on
IoT. International Journal of Research in Advance Engineering (IJRAE). 2016; 2(3): 15-20.
[5] WWI Wan Jusoh, KA Mohd Annuar, SH Johari, IM Saadon, MH Harun. Motorcycle Security System
using GSM and RFID. Journal of Advanced Research in Applied Mechanics. 2015; 16(1): 1-9.
[6] Rasika Hedaoo, P R Morey. Auto-Fact Security System. International Journal for Innovative
Research in Science & Technology. 2016; 2(1): 278-283.
[7] Deepali Javale, Mohd. Mohsin, Shreerang Nandanwar, Mayur Shingate. Home Automation and
Security System Using Android ADK. International Journal of Electronics Communication and
Computer Technology (IJECCT). 2013; 3(2): 2249-3878.
[8] Mohamed S Soliman, Ahmad A. Alahmadi, Abdulwadoud A. Maash, Mohamed O. Elhabib. Design
and Implementation of a Real-Time Smart Home Automation System Based on Arduino
Microcontroller Kit and LabVIEW Platform. International Journal of Applied Engineering Research.
2017; 12(18): 7259-7264.
[9] Mansour H. Assaf, Ronald Mootoo, Sunil R. Das, Emil M. Petriu, Voicu Groza, Satyendra N. Biswas.
Designing Home Security and Monitoring System Based on Field Programmable Gate Array. IETE
Technical Review. 2014; 31(2): 168-176.
[10] KAM Annuar, NA Ab Hadi, SK Subramaniam, MF Mohd Ab Halim, MBN Shah, AF Kadmin, MS Amri,
A Abdul Salam. Intelligent Image Capturing Alarm System Using Raspberry Pi. TELKOMNIKA
Telecommunication Computing Electronics and Control. 2017; 15(4): 1651-1658.