The proposed home monitoring system uses sensors to monitor temperature and humidity in a home. The sensor data is sent to a web server and stored in the cloud. This allows users to access the sensor data from anywhere using a mobile phone or computer. The system also allows users to remotely control electric appliances in the home through the web server. When temperature or humidity thresholds are exceeded, the system can send alerts to users.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
Mobile technology opens the door for a new kind of learning called here and now learning that occurs when learners have access to information anytime and anywhere to perform authentic activities in the context of their learning. Mobile devices, applications and services have become integrated into people's daily lives on a personal and professional level. The purpose of this study was to investigate challenges &opportunities of IoT in mobile technology. The paper is divided in 5 sections and the content of the paper covers the history, elements, challenges and opportunities salong with future of IoT specific to Indian Mobile arena.
Iot: Introduction ,architecture ,application especially engineering ,software,hardware,protocols and challenges
nodered software code for Iot simulation
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVEScsandit
The common vision of smart systems today, is by and large associated with one single concept,
the internet of things (IoT), where the whole physical infrastructure is linked with intelligent
monitoring and communication technologies through the use of wireless sensors. In such an
intelligent vibrant system, sensors are connected to send useful information and control
instructions via distributed sensor networks. Wireless sensors have an easy deployment and
better flexibility of devices contrary to wired setup. With the rapid technological development of
sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an
invaluable resource for realizing the vision of Internet of things (IoT) paradigm. It is also
important to consider whether the sensors of a WSN should be completely integrated into IoT or
not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a
number of security primitives that can be taken to protect their data over the internet.
IoT: Ongoing challenges and opportunities in Mobile TechnologyAI Publications
Mobile technology opens the door for a new kind of learning called here and now learning that occurs when learners have access to information anytime and anywhere to perform authentic activities in the context of their learning. Mobile devices, applications and services have become integrated into people's daily lives on a personal and professional level. The purpose of this study was to investigate challenges &opportunities of IoT in mobile technology. The paper is divided in 5 sections and the content of the paper covers the history, elements, challenges and opportunities salong with future of IoT specific to Indian Mobile arena.
Iot: Introduction ,architecture ,application especially engineering ,software,hardware,protocols and challenges
nodered software code for Iot simulation
WIRELESS SENSORS INTEGRATION INTO INTERNET OF THINGS AND THE SECURITY PRIMITIVESIJCNCJournal
The common vision of smart systems today, is by and large associated with one single concept, the internet of things (IoT), where the whole physical infrastructure is linked with intelligent monitoring and communication technologies through the use of wireless sensors. In such an intelligent vibrant system, sensors are connected to send useful information and control instructions via distributed sensor networks. Wireless sensors have an easy deployment and better flexibility of devices contrary to wired setup. With the rapid technological development of sensors, wireless sensor networks (WSNs) will become the key technology for IoT and an invaluable resource for realizing the vision of Internet of things (IoT) paradigm.
It is also important to consider whether the sensors of a WSN should be completely integrated into IoT or not. New security challenges arise when heterogeneous sensors are integrated into the IoT. Security needs to be considered at a global perspective, not just at a local scale. This paper gives an overview of sensor integration into IoT, some major security challenges and also a number of security primitives that can be taken to protect their data over the internet.
The Internet of things describes physical objects that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Internet of Things ( IoT) is a happening phenomenon today. It is sweeping across all spheres of human life- business, agriculture, education and more. It provides a a fertile ground for research and innovation. This presentation covers major areas of research both current and future expected trends
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY IJCNCJournal
The Internet of Things (IoT) enables numerous business opportunities in fields as diverse as e-health, smart
cities, smart homes, among many others. The IoT incorporates multiple long-range, short-range, and
personal area wireless networks and technologies into the designs of IoT applications. Localisation in
indoor positioning systems plays an important role in the IoT. Location Based IoT applications range from
tracking objects and people in real-time, assets management, agriculture, assisted monitoring technologies
for healthcare, and smart homes, to name a few. Radio Frequency based systems for indoor positioning
such as Radio Frequency Identification (RFID) is a key enabler technology for the IoT due to its costeffective,
high readability rates, automatic identification and, importantly, its energy efficiency
characteristic. This paper reviews the state-of-the-art RFID technologies in IoT Smart Homes applications.
It presents several comparable studies of RFID based projects in smart homes and discusses the
applications, techniques, algorithms, and challenges of adopting RFID technologies in IoT smart home
systems.
Many technical communities are vigorously pursuing
research topics that contribute to the Internet of Things (IoT).
Nowadays, as sensing, actuation, communication, and control become
even more sophisticated and ubiquitous, there is a significant
overlap in these communities, sometimes from slightly different
perspectives. More cooperation between communities is encouraged.
To provide a basis for discussing open research problems in
IoT, a vision for how IoT could change the world in the
distant future is first presented. Then, eight key research topics
are enumerated and research problems within these topics are
discussed.
Internet of Things (IoT) integrates billions of the heterogeneous IoT things with the Internet in which the embedded systems such as sensors and actuators linked together to improve quality of life, and becomes the future of technologies in any field of human daily life. These IoT devices cooperate with each other and generate useful information to provide better services and applications to the governments and the society. Also, there is a need to store these data on Cloud for monitoring. This paper, surveys IoT applications, new challenges and issues arise in different fields and provides IoT architecture, focuses on explanation of IoT protocols and their operations and functionalities, presents different microcontroller types used by researchers. With the huge amount of data generated from IoT devices, the integrating Cloud and IoT may helpful, Therefore, a survey on open issues faced when these two concepts integrating together is discussed. The objective of this paper is to provide a survey for everything related to IoT and direct it to all beginners in this filed or academic researchers.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Internet of Things ( IoT) is a happening phenomenon today. It is sweeping across all spheres of human life- business, agriculture, education and more. It provides a a fertile ground for research and innovation. This presentation covers major areas of research both current and future expected trends
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY IJCNCJournal
The Internet of Things (IoT) enables numerous business opportunities in fields as diverse as e-health, smart
cities, smart homes, among many others. The IoT incorporates multiple long-range, short-range, and
personal area wireless networks and technologies into the designs of IoT applications. Localisation in
indoor positioning systems plays an important role in the IoT. Location Based IoT applications range from
tracking objects and people in real-time, assets management, agriculture, assisted monitoring technologies
for healthcare, and smart homes, to name a few. Radio Frequency based systems for indoor positioning
such as Radio Frequency Identification (RFID) is a key enabler technology for the IoT due to its costeffective,
high readability rates, automatic identification and, importantly, its energy efficiency
characteristic. This paper reviews the state-of-the-art RFID technologies in IoT Smart Homes applications.
It presents several comparable studies of RFID based projects in smart homes and discusses the
applications, techniques, algorithms, and challenges of adopting RFID technologies in IoT smart home
systems.
Many technical communities are vigorously pursuing
research topics that contribute to the Internet of Things (IoT).
Nowadays, as sensing, actuation, communication, and control become
even more sophisticated and ubiquitous, there is a significant
overlap in these communities, sometimes from slightly different
perspectives. More cooperation between communities is encouraged.
To provide a basis for discussing open research problems in
IoT, a vision for how IoT could change the world in the
distant future is first presented. Then, eight key research topics
are enumerated and research problems within these topics are
discussed.
Understand about the fundamentals of Internet of Things and its building blocks along with their
characteristics.
Understand the recent application domains of IoT in everyday life.
Gain insights about the current trends of Associated IOT technologoes and IOT Anlaytics.
Understand about the fundamentals of Internet of Things and its building blocks along with their
characteristics.
Understand the recent application domains of IoT in everyday life.
Gain insights about the current trends of Associated IOT technologoes and IOT Anlaytics.
In this presentation, Sujani introduces IoT and latest trends in that domain. Sujani is interested in security of IoT devices where she wants to tackle both access of IoT devices and the data generated by these devices.
Internet of things (IoT) is an emerging technology today that envisions all objects around us as a part of
Internet. Automation of the devices, appliances at home and office is having extensive possibility of research
with the innovation of technology in communication. Misuse of power energy can be shortened by automating
the devices and appliances. Mobile communication is plays a major role in the automation domain. Android
phones are designed with applications to automate the required devices. Creating a mobile app on a Smartphone
device so that the user can control electronic devices; see the amount of flow, so the problem is the difficulty in
saving electricity can be resolved. IoT includes variety of objects like smart phones, tablets, digital cameras and
different sensors. When all these devices are connected together, they enable additional smart processes and
services that support our basic needs, environment and health. Massive number of devices connected to internet
provides enormous kinds of services and also produces huge amount of data and information. Cloud computing
is an on-demand access to a shared pool of configurable resources that can be provisioned as infrastructures,
software and applications. Cloud based platforms help to connect to the things around us so it is easy to connect
any objects anytime at any place using in built applications. Applications that use devices like sensors have
unique requirements of enormous storage to store big data and huge computation power to enable the real time
processing of the data, information and high speed network is required for audio and video streaming. Wireless
technologies like Bluetooth, WiFi, and ZigBee have been used in wide range of applications like modern home
security systems using low cost, low power, less complexity RF module.
The Internet of Things (IoT) is the network of physical objects or "things" embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.
IoT allows objects to be sensed and controlled remotely across existing network infrastructure, creating opportunities for more direct integration between the physical world and computer-based systems, and resulting in improved efficiency, accuracy, and economic benefit.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
2. 2
INTRODUCTION
1.1. OVERVIEW
Internet of Things (IoT) is a concept that visualizes all objects around us as part
of internet. Internet of things coverage is very wide and includes variety of objects like
smart phones, digital cameras, sensors, etc. Once all these devices are connected to each
other, they enable more and more smart processes and services that support our basic
needs, economies, environment, health etc. Such large number of devices connected to
internet provides many kinds of services and produce huge amount of data and
information.
Cloud computing is a one such model for on-demand access to a shared pool of
configurable resources ( compute, networks, servers, storage applications, services,
software etc.) that can be easily provisioned as Infrastructure, software and applications
(SaaS). Cloud based platforms help to connect to the things around us so that we can
access anything at any time and any place in a user friendly manner using customized
portals and in built applications (SaaS). Hence, cloud acts as a front end to access IoT.
Applications that interact with devices like sensors have special requirements of huge
storage to store big data, huge computation power to enable the real time processing of the
data i.e information, and high speed network to stream audio or video.
In this project, we describe how IoT and Cloud computing can work together
to provide automation of domestic things so as to reduce human intervention and save time
and energy.
3. 3
1.2 IoT (INTERNET OF THINGS)
The internet of things (IoT) can be described as the technology in which the
actual physical entities (electronic devices) with data sensing, processing & self adoption
capacity can be used to interact with other such device and process that data to take an
intelligent decision which will prove useful for our daily day to day life . IOT is defined as
an environment in which objects (devices) are given unique identifiers and the ability to
transfer data over a network without having human-to-human or human-to-computer
interaction.
The IOT is being formed from two words internet and things which combine
means any object or person which can be distinguishable by the real world can be
connected to global system of interconnected computer networks and governs by standard
protocol. They defined IOT as “An open and comprehensive network of intelligent objects
that have the capacity to auto organize, share information, data and resources, reacting and
acting in face of situations and changes in the environment” The internet of things is a new
era of intelligence computing and it is providing a privilege to communicate around the
world. The objective of IOT is anything, anyone, anytime, anyplace, any service and any
network,
1.3 ADVANTAGES OF HOME AUTOMATION SYSTEM
In recent years, wireless systems like Wi-Fi have become more and more
common in home networking. Also in home and building automation systems, the use of
wireless technologies gives several advantages that could not be achieved using a wired
network only.
1) Reduced installation costs: First and foremost, installation costs are significantly
reduced since no cabling is necessary. Wired solutions require cabling, where material as
well as the professional laying of cables (e.g. into walls) is expensive.
2) System scalability and easy extension: Deploying a wireless network is especially
advantageous when, due to new or changed requirements, extension of the network is
necessary. In contrast to wired installations, in which cabling extension is tedious. This
makes wireless installations a seminal investment.
4. 4
3) Aesthetical benefits: Apart from covering a larger area, this attribute helps to full
aesthetical requirements as well. Examples include representative buildings with all-glass
architecture and historical buildings where design or conservatory reasons do not allow
lying of cables.
4) Integration of mobile devices: With wireless networks, associating mobile devices such
as PDAs and Smartphone with the automation system becomes possible everywhere and at
any time, as a device's exact physical location is no longer crucial for a connection (as long
as the device is in reach of the network). For all these reasons, wireless technology is not
only an attractive choice in renovation and refurbishment, but also for new installations.
6. 6
LITERATURE SURVEY
2.1 LITERATURE REVIEWS
The Internet of Things (IoT) is the interconnection of uniquely identifiable
embedded computing devices within the existing Internet framework. Typically, IoT is
expected to offer advanced connectivity of devices and systems, and services that goes
beyond M2M i.e. machine-to-machine communications and covers a variety of protocols,
various domains, and applications. The interconnection of all these embedded devices
which also includes smart objects is expected to lead in automation in nearly all fields
enabling advanced applications like a Smart Grid. According to Gartner, there will be
nearly 26 billion devices on the Internet of Things by 2020.
ABI Research has estimated that more than 30 billion devices will be
wirelessly connected to the Internet of Things by 2020.According to the recent survey and
study done by Pew Research Internet Project, a huge majority of the technology experts
and engaged Internet users who responded 83 percent agreed with the conception that the
Internet of Things, embedded, wearable computing will have widespread and beneficial
effects by 2025.It is clear that the IoT will consist of a very large number of devices being
connected to the Internet.
The Internet of Things (loT) refers to uniquely recognizable objects and their
virtual representations in an Internet-like structure. Internet of Things refer to day-to-day
objects, which are understandable, distinguishable, locatable, addressable, and or
controllable via the Internet using RFID, wireless LAN, wide-area network, or other
means. These objects include not only the day to day usable electronic devices or the
products of higher technological development such as vehicles and equipment, but also
include various things like food, clothing, shelter; materials, their parts, and subassemblies;
7. 7
commodities and luxury items; boundaries, landmarks, and monuments; and all the
miscellany of commerce and culture. Ubiquitous computing refers to a new genre of
computing in which the computer completely permeates the life of the user. Internet of
Things (IoT) will comprise of billions of devices that can sense, communicate, calculate
and potentially actuate. Data streams coming from these devices will challenge the
traditional approaches to data management and contribute to the emerging paradigm of Big
Data. IoT has burst onto the stage, interconnecting everyday objects over the Internet,
which acts as everlasting sources of information. The occurrence has required a
combination of three developments.
2.2 IoT ELEMENTS
There are mainly three components of IOT a) Hardware - made up of sensors,
actuators and embedded communication hardware b) Middleware - on demand storage and
computing tools for data analytics and c) Presentation - novel easy to understand
visualization and interpretation tools which can be widely accessed on different platforms
and which can be designed for different applications[6]. In this section, we discuss a few
enabling technologies in these categories which will make up the three components stated
above.
2.2.1 Cloud Storage
Cloud computing is the practice of using remote servers on the internet to
manage, store and process data instead of using a personal computer. Cloud computing is a
general term that is better divided into three categories: Infrastructure-as-a-Service,
Platform-as-a-Service, and Software-as-a-Service. IaaS (or utility computing) follows a
traditional utilities model, providing servers and storage on demand with the consumer
paying accordingly. PaaS allows for the construction of applications within a provider’s
framework, like Google’s App Engine. SaaS enables customers to use an application on
demand via a browser. A common example of cloud computing is Gmail, where you can
access your stored data from any computer with internet access. Here we are using Gmail
for the storage of the data.
8. 8
2.2.2 Wi-Fi or WiFi is a technology for wireless local area networking with devices
based on the IEEE 802.11 standards. Wi-Fi is a trademark of the Wi-Fi Alliance, which
restricts the use of the term Wi-Fi Certified to products that successfully complete
interoperability certification testing.
Devices that can use Wi-Fi technology include personal computers, video-
game consoles, smart phones, digital cameras, tablet computers, digital audio players and
modern printers. Wi-Fi compatible devices can connect to the Internet via a WLAN
network and a wireless access point. Such an access point (or hotspot) has a range of about
20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can be as small
as a single room with walls that block radio waves, or as large as many square kilometres
achieved by using multiple overlapping access points.
Depiction of a device sending information wirelessly to another device, both
connected to the local network, in order to print a document
Wi-Fi most commonly uses the 2.4 gigahertz (12 cm) UHF and 5 gigahertz
(6 cm) SHF ISM radio bands. Having no physical connections, it is more vulnerable to
attack than wired connections, such as Ethernet.
2.2.3 Wireless Sensor Networks (WSN)
A WSN is a wireless network consisting of spatially distributed autonomous
devices using sensors to cooperatively monitor physical or environmental conditions, such
as temperature, sound, vibration, pressure, motion or pollutants, at different locations
(Wikipedia). Formed by hundreds or thousands of notes that communicate with each other
and pass data along from one to another. A wireless sensor network is an important
element in IoT paradigm. Sensor nodes may not have global ID because of the large
amount of overhead and large number of sensors. WSN based on IoT has received
remarkable attention in many areas, such as military, homeland security, healthcare,
precision agriculture monitoring, manufacturing, habitat monitoring, forest fire and flood
detection and so on [16]. Sensors mounted to a patient’s body are monitoring the responses
to the medication, so that doctors can measure the effects of the medicines.
9. 9
2.2.4 Addressing schemes
The ability to uniquely identify Things is critical for the success of IoT. This
will not only allow us to uniquely identify billions of devices but also to control remote
devices through the Internet. The few most critical features of creating a unique address
are: uniqueness, reliability, persistence and scalability. Every element that is already
connected and those that are going to be connected must be identified by their unique
identification, location and functionalities. The current IPv4 may support to an extent
where a group of cohabiting sensor devices can be identified geographically, but not
individually. The Internet Mobility attributes in the IPV6 may alleviate some of the device
identification problems; however, the heterogeneous nature of wireless nodes, variable data
types, concurrent operations and confluence of data from devices exacerbates the problem
further. Persistent network functioning to channel the data traffic ubiquitously and
relentlessly is another aspect of IoT. Although, the TCP/IP takes care of this mechanism by
routing in a more reliable and efficient way, from source to destination, the IoT faces a
bottleneck at the interface between the gateway and wireless sensor devices. Furthermore,
the scalability of the device address of the existing network must be sustainable. The
addition of networks and devices must not hamper the performance of the network, the
functioning of the devices, the reliability of the data over the network or the effective use
of the devices from the user interface [12]. To address these issues, the Uniform Resource
Name (URN) system is considered fundamental for the development of IoT. URN creates
replicas of the resources that can be accessed through the URL. With large amounts of
spatial data being gathered, it is often quite important to take advantage of the benefits of
metadata for transferring the information from a database to the user via the Internet [12].
IPv6 also gives a very good option to access the resources uniquely and remotely. Another
critical development in addressing is the development of a light-weight IPv6 that will
enable addressing home appliances uniquely
2.2.5 ITU Architecture
According to the recommendations of the International Telecommunication
Union (ITU), the network, Architecture Internet of Things consists of
(a) The Sensing Layer
10. 10
(b) The Access Layer
(c) The Network Layer
(d) The Middleware Layer
(e) The Application Layers
Fig 2.1: Reference model in network and data communication.
These are like the Open Systems Interconnection (OSI) reference model in network and
data communication.
11. 11
2.2.6 Layers of System
The reference architecture for the internet of things consists of a set of
components. Layers can be realized by means of specific technologies, and we will discuss
options for realizing each component. There are also some cross-cutting/vertical layers
such as access/identity management the layers are :
2.2.6.1 The Device Layer
The bottom layer of the architecture is the device layer. Devices can be of
various types, but in order to be considered as IoT devices, they must have some
communications that either indirectly or directly attaches to the Internet.
2.2.6.2 The Communication Layer
The communication layer supports the connectivity of the devices. There are
multiple potential protocols for communication between the devices and the cloud. The
most well known three potential protocols are Figure: 4. Reference Architecture for IOT
2.2.6.3 The Aggregation/Bus Layer
An important layer of the architecture is the layer that aggregates and brokers
communications. This is an important layer for three reasons:
1. The ability to support an HTTP server and/or an MQTT broker to talk to the devices
2. The ability to aggregate and combine communications from different devices and to
route communications to a specific device (possibly via a gateway)
3. The ability to bridge and transform between different protocols, e.g. to offer HTTP
based APIs that are mediated into an MQTT message going to the device. The
aggregation/bus layer provides these capabilities as well as adapting into legacy protocols.
The bus layer may also provide some simple correlation and mapping from different
correlation models (e.g. mapping a device ID into an owner’s ID or vice-versa).
12. 12
2.2.6.4 The Event Processing and Analytical Layer
This layer takes the events from the bus and provides the ability to process and
act upon these events. A core capability here is the requirement to store the data into a
database. This may happen in three forms. The traditional model here would be to write a
server side application, e.g. this could be a JAX-RS application backed by a database.
However, there are many approaches where we can support more agile approaches. The
first of these is to use a big data analytics platform. This is a cloud-scalable platform that
supports technologies such as Apache Hadoop to provide highly scalable map reduce
analytics on the data coming from the devices. The second approach is to support complex
event processing to initiate near real-time activities and actions based on data from the
devices and from the rest of the system.
2.2.6.5 Device Management
Device management (DM) is handled by two components. A server-side
system (the device manager) communicates with devices via various protocols and
provides both individual and bulk control of devices. It also remotely manages software
and applications deployed on the device. It can lock and/or wipe the device if necessary.
The device manager works ind conjunction with the device management agents. There are
multiple different agents for different platforms and device types.
14. 14
PROPOSED HOME MONITORING SYSTEM
Fig 3.1: Block diagram of proposed Home Automation system.
The proposed model of the home monitoring system is as shown in the figure.
The model consists of different sensors like temperature and humidity. The sensor network
is connected to the internet through WiFi. The sensor data are sent to the web server and
stored in the cloud. The data can be analyzed anywhere any time. In the proposed model
the temperature and humidity in the house is monitored. The temperature and humidity
detection is stored in cloud for analysis. The user can also monitor the electric appliances
through the internet via web server.
The end user can use their mobile phone or personal computer to log into the
system through the web server. An initial check is performed for whether the hardware
device is ON or not. Only if the Hardware is authorized and ON then the user is
15. 15
authenticated. Once the authentication is done successfully the user is able to see the data
signals of the Hardware machine. At the hardware machine the SL driver program will
continuously track for the change in the status & will accordingly send the signals to the
Circuit. The data from the handheld is sent to the Web Server in a string format, where the
Web – site is hosted. On the server the status is stored in the database in their respective
device field. At the Hardware end, the circuit drive program a web page is [retrieve.aspx]
is used to retrieve the status of the devices in a timely pattern [every 10sec]. These changes
come in to form of cookies [temporary internet files] from the web server & are stored on
the computer in the name of the web site. Hence every 10 sec as the page refreshes the
new cookie values are updated. The cookie values are read from the program using the VB
component GETINERNETCOOKIE after a fixed delay. As the program receives any
change in the Device values it send the control signal [binary data] accordingly to the
required data pin of the parallel port.
3.1 PROPOSED SYSTEM’S FUNCTIONS
The proposed home automation system has the capabilities to control the
following components in users home and monitor the following alarms:
• Temperature and humidity
The proposed model of the home automation system is as shown in the figure.
The model consists of number of sensors. Initially all the sensors are connected to the
internet through Wi-Fi. When the connection is established in on web page we provide
virtual switches to operate the connected devices. Also it will start reading the parameters
of devices to shows the graph of current verses time for each device. If problem found it
report to cloud server. Here user can modify some settings and see the devices
functionality and working.
The system allows the user to monitor various standards such as temperature
and humidity from a smart phones and PC from anywhere in the world through an internet
connection. In this project we proposed a Novel technique that will give us best results and
provides Notifications to the user if problem occurs in any device.
18. 18
PROCESS AND REQUIREMENTS
4.4 INTERFACE DESIGN OF SERVER AND
HARDWARE
4.4.1 Front End Design:
This is provided by the IoT service providing sites. Here we are using service
of thingspeak.com.
Fig. 4.1: Front end interface of IoT service providing site.
19. 19
It provides us the graphical representation of the data from the home; send
through the sensor networks. The MATLAB code is preinstalled in the site and it process
the data and accordingly generate the graphs, which can be seen after we login into the
channel we have reserved in the service site “thingspeak.com”.
4.4.2 Database Storage
The system generates forms to collect data and stores the responses in a
database. This storage facility is also provided by the services providing site
“thingspeak.com” only. This data can be seen for further analysis using GOOGLE
SPREAD SHEET.
4.5 SOFTWAREWARE REQUIREMENT
4.5.1 Arduino Compiler:
The Arduino IDE is a cross-platform application written in Java, and is derived
from the IDE for the Processing programming language and the Wiring project. It is
designed to introduce programming to artists and other newcomers unfamiliar with
software development. It includes a code editor with features such as syntax highlighting,
brace matching, and automatic indentation, and is also capable of compiling and uploading
programs to the board with a single click. There is typically no need to edit make files or
run programs on a command-line interface. Although building on command-line is
possible if required with some third-party tools such a The Arduino IDE comes with a
C/C++ library called "Wiring" (from the project of the same name), which makes many
common input/output operations much easier. Arduino programs are written in C/C++.
20. 20
Fig. 4.2: Arduino platform software
4.6 PCB CONSTRUCTION:
4.7.1 PCB Layout
No device can work if its connections are not according to specification, and if
the proper resistance, capacitance, inductance etc. are not connected to the place where
required. Thus a PCB designer has to first think of the very possible combination of
voltages that are required by the circuit and make them available at points where they are
needed with the minimum use of jumpers and keeping the circuit size compact and yet
effective.
The layout of PCB has to incorporate all the information on the board before
one can go on the artwork preparation. This means that a concept, which clearly defines all
the details of the circuitry and partly of final equipment, is a prerequisite before the actual
layout can start.
For PCB layout, the following points ought to be considered carefully
. Record size of components used.
Overall area covered is normally kept rectangular or square.
21. 21
Vcc and ground lines should be provided at the sides to facilitate external connection.
Input and output terminals may be placed giving through to external connection.
Make a rough sketch placing components and interconnect components with jumpers.
Do not place components pointing in differed direction unless needed. Make them
parallel to the either side of the board.
Make the neat final scaled sketch on the inch graph sheet.
Lines mounted are of uniform width.
Invest the layout to confirm that all the components are connected properly and given
sufficient place in the layout.
22. 22
4.6.2 Tracing
After the circuit layout has been prepared on the tracing paper, inverting the
tracing paper onto the PCB so that the side that had been traced faces the PCB copper
coating. Then trace the layout onto the PCB placing a carbon paper in between the two.
4.6.3 Painting
Paint can also be done on the PCB however it must be uniformly applied. Use
0 number painting brushes for painting PCB layout.
4.6.4 Etching
In all PCBs, etching is the most important step. The final copper pattern is
formed by selective removal of all unwanted copper which is not protected by an etch
resist. Amongst the Enchants, FeCl3 (Ferric Chloride) is commonly used for small PCBs
where etching is only out carried out occasionally for a small number of boards.
For etching, the solution is made, wherein sample and standard solution are in 2*1
dilutions. In order to increases the copper dissolution capacity and to bring the etching time
slightly down, HCL is added. Etching temperature should be in the ranges of 20°C to
45°C. FeCl3 is an enchant used in small-scale PCB production. In high volume production
FeCl3 is of not much importance because it cannot be generated and it attacks the common
metal each resist.
4.6.5 Procedure
To etch copper and Ferric Chloride is used. In order to increase the copper
dissolving capacity and to bring the etching time slightly down, often HCL is added. HCL
acts simultaneously against excessive sludge formation.
After etching is over the Ferric Chloride contained surface should be first
cleaned by spraying water, which is not enough. Then we dip it in a 5% (by volume) in the
solution of oxalic acid to remove iron and copper salts and final water rinsed vigorously.
Then we rinse it by using petrol so that the paint comes out and copper remains intact
where the paint was applied. The copper acts as conduction path for flow of signals.
The high corrosive nature of Ferric chloride leads to short etching time and
avoid under etching.
23. 23
4.6.6 Chemistry
Due to hydrolysis reaction, free acid is formed which reacts with copper.
FeCl3+3H2O = Fe(OH)3+3HCl
The copper is oxidized by Ferric ion forming cuprous chloride.
4.6.7 Drilling
Drilling of holes for mounting components is important mechanical operation
in PCB production process. The importance of hole drilling into PCB’s has further gone up
with electronic components miniaturization. After rinsing drilling is done using bit as per
the circuit provided. The diameters of holes generally accepted are as follows.
1. D = 0.8 mm
2. D =1.1 mm
3. D = 1.5 mm
4. D = 3.2 mm
Where,
D = Hole diameter.
Component Mounting
Before mounting any components, examine the PCB carefully for any cracks, beaks or
other defects in conduction paths.
The leads of components like resistors and capacitors should be fully inserted into the
mounting holes taking care to mount the components so that any information written
on the components is clearly visible.
Carefully cut the leads of components so that about 3 mm of the end extended beyond
the wiring side of the PCB. The ends of the leas are bent at right angles to make a firm
contact with the surface where it is to be soldered.
24. 24
In case of semiconductor devices like transistors and diodes, the length of the leads
extending above the component side of the PCB should be about 1 cm. if transistor
leads are too short we use a base. Metal cap should touch if they are not at ground
potential. The right terminals should be at right certain components like transformers,
potentiometers and variable capacitors, which are meant for use with PCB, are
provided with pin type terminals that can be simply inserted into the hole in the PCB
and soldered.
25. 25
4.6.8 Soldering:
PCB soldering required proper soldering technique, as explained below:
A light duty soldering iron of 25W or 30 W rating should be used to prevent damage to
the printed circuit wiring due to excessive heating. The tip of soldering iron should not
have an oxide coating. Clean it using sand paper.
Do not use excess solder to avoid solder flouring to adjacent conducing paths forming
bridges, which cause short circuits.
Clean the surface of traces before you start soldering. It is advisable to use flux.
Layout of desired circuit diagram and preparation is first and most important
operation in any printed circuit board manufacturing process. First of all layout of
component side is to be made in accordance with available components dimensions. The
following points are to be observed while forming the layout of P.C.B:
Between two components, sufficient space should be maintained.
High wattage/max, dissipated components should be mounted at a sufficient distance
from semiconductors and electrolytic capacitors.
4.8 PCB Layout
Fig 4.3: Actual PCB layout
29. 29
cmd += String(getStr.length());
espSerial.println(cmd);
if (DEBUG) Serial.println(cmd);
delay(100);
if(espSerial.find(">"))
{
espSerial.print(getStr);
if (DEBUG) Serial.print(getStr);
}
Else
{
espSerial.println("AT+CIPCLOSE");
// alert user
if (DEBUG) Serial.println("AT+CIPCLOSE");
return false;
}
return true;
}
//===============================================================
================= setup
void setup()
{
DEBUG=true; // enable debug serial
Serial.begin(9600);
dht.begin(); // Start DHT sensor
espSerial.begin(115200);
// Enable this line to reset the module;
espSerial.println("AT+RST");
//showResponse(1000);
30. 30
espSerial.println("AT+CWMODE=1");
// set esp8266 as client
showResponse(1000);
espSerial.println("AT+CWJAP=""+ssid+"",""+password+"""); // set your home
router SSID and password
showResponse(5000);
if (DEBUG) Serial.println("Setup completed");
}
//===============================================================
======= loop
void loop()
{
// Read sensor values
float t = dht.readTemperature();
float h = dht.readHumidity();
if (isnan(t) || isnan(h)) {
if (DEBUG) Serial.println("Failed to read from DHT");
}
else {
if (DEBUG) Serial.println("Temp="+String(t)+" *C");
if (DEBUG) Serial.println("Humidity="+String(h)+" %");
thingSpeakWrite(t,h);
// Write values to thingspeak
}
// thingspeak needs 15 sec delay between updates,
delay(20000);
}
32. 32
RESULTS AND REPRESENTATIONS
6.1 REPRESENTATION
We have measured temperature and humidity. We have set time by which it
continuously senses temperature and Humidity. In the screenshot we have shown the result
senses temperature and humidity after every 5 seconds.
Fig 5.1: Channels saved on the server.
This screen shows the channels allotted to record and represent the data
collected from the sensors. We can design different channels for different process within
the same server.
We can select the desired channel for desired task and monitoring.
33. 33
6.2 RESULT
The figure 5.2 shows the actual recorded data of the sensors. The first graphical
representation shows the Temperature Vs Time graph and the second graphical
representation shows the Humidity Vs Time graph.
We can also include the Temperature Vs Humidity graph in the same screen for further
analysis.
Fig 5.2: This is the results from our system.
35. 35
CONCLUSIONS AND FUTURE WORK
7.1 CONCLUSION
The home automation using Internet of Things has been experimentally proven
to work satisfactorily by connecting simple appliances to it and the appliances were
successfully controlled remotely through internet. The designed system not only monitors
the sensor data, like temperature and humidity but can also actuates a process according to
the requirement, for example switching on the light when it gets dark. It also stores the
sensor parameters in the webpage (database) in a timely manner. This will help the user to
analyze the condition of various parameters in the home anytime anywhere.
7.2 FUTURE WORK
Using this system as framework, the system can be expanded to include
various other options which could include home security feature like capturing the photo of
a person moving around the house and storing it onto the cloud. This will reduce the data
storage than using the CCTV camera which will record all the time and stores it. The
system can be expanded for energy monitoring, or weather stations. This kind of a system
with respective changes can be implemented in the hospitals for disable people or in
industries where human invasion is impossible or dangerous, and it can also be
implemented for environmental monitoring.
37. 37
REFERENCES
[1] Asaad M. J. Al-Hindawi, Ibraheem Talib, “Experimentally Evaluation of GPS/GSM Based System
Design”, Journal of Electronic Systems, Volume 2 Number, 2 June, 2012.
[2] Kunal Maurya , Mandeep Singh, Neelu Jain, “Real Time Vehicle Tracking System using GSM and GPS
Technology- An Anti-theft Tracking System”, International Journal of Electronics and Computer Science
Engineering, ISSN 2277-1956/V1N3-1103-1107 .
[3] Vikram Kulkarni & Viswaprakash Babu, “embedded smart car security system on face detection”, special
issue of IJCCT, ISSN (Online) : 2231-0371, ISSN(Print):0975-7449,volume-3, issue-1.
[4] Chen, H., Chiang, Y. Chang, F. H. Wang, Toward Real-Time Precise Point Positioning: Differential GPS
Based on IGS Ultra Rapid Product, SICE Annual Conference, The Grand Hotel, Taipei, Taiwan August 18-
21, (2010).
[5] R.S Gaonkar, “Microprocessor Architecture Programming and Application”, Wiley Eastern Ltd, New
Delhi.
[6] Krishna Kant, “Microprocessor and microcontroller”, Eastern Company Edition, New Delhi 2007.
[7] Daniel. W. Lewis, “Fundamental of embedded software”, prentice hall of India, 2004.
[8] William Stalling, “Wireless Communication and Networks”, 2nd edition, prentice hall of India, 2005.