SlideShare a Scribd company logo
Master of Science in Computer Engineering
Class of Pervasive System by:
Ioannis Chatzigiannakis
1
Mattia Brunetti
https://it.linkedin.com/
in/mattiabrunetti
mattiab31@gmail.com
Marco Casini
https://it.linkedin.com/i
n/marcocasini2
marcoktm89@gmail.co
m
ABOUT US
2
https://github.com/mattiab31/SmartDoorBell
THE PROBLEM
To control the door when you
are not at home.
To control the hall of an office
without need to be there.
To control automatic gate
without to be in the range.
3
There are many situation where is hard
to control your «door»!
OUR SOLUTION
We developed a «SmartDoorBell», a device
that is always connected to internet, to have
a remote control of your door, simply using
your smartphone!
4
There are some similar solutions but:
1) Really expensive – more than 200 $
2) Need a special app to work
3) Are not flexible (e.g. you can’t turn on
lights)
POSSIBLE SCENARIOS
The purpose of this device is to help people
to have easly access at their house and to
have a remote control of a door.
The focus of this project is about the
domestic use of this product.
5
6
POSSIBLE SCENARIOS
We found three main situations:
6
Owner: with beacon
Friends: with code
Strangers: ring the bell
7
POSSIBLE SCENARIOS 1/3
7
Owner: with beacon
Owner of the house has a beacon device that
works like a real key. When he comes back home
the «SmartDoorBell» recognise him and unlock
the door.
8
POSSIBLE SCENARIOS 2/3
8
Friends: with code
Friends or everyone that would enter in the
house, and know the security code, can do that
simply typing the code on the numeric keyboard
on the door.
9
POSSIBLE SCENARIOS 3/3
9
Strangers: ring the bell
Every time that someone ring the bell the owner
receives a Telegram message with a photo and
he can decide to take some decisions using
Telegram (e.g. take a photo, send/receive vocal
messages…)
THE HARDWARE
10
THE SOFTWARE
11
Script Button
Script OpenDoorScript Secure
Code
Our BOT Telegram runs on Raspberry Pi
Script Multi-Media
BOT COMMANDS
/roll  reply with a random integer, used for test
/time  reply with a current time, used for test
/photo  take a photo and send it to the owner
/video  take a video and send it to the owner
/sound  play an audio message from the Raspberry speaker
/open  unlock the door
/openL  unlock the door and turn on the light for 10 seconds
/light  turn on the light for 10 seconds
/reboot  reboot the Raspberry Pi
/shutdown  shutdown the Raspberry Pi
/help  send a document with the list of commands
12
PROJECT PROGRESS REPORT
SET UP
HARDWARE
SET UP
SOFTWARE
IMPLEMENT
STRANGER
SCENARIO
FAIL TO
IMPLEMENT
API
TELEGRAM
ON
ANDROID
IMPLEMENT
FRIENDS
SCENARIO
IMPLEMENT
OWNER
SCENARIO
13
WHAT’S MISSING – THE OWNER
For the owner side we want that when he
comes back home the door will
automatically open.
We tried to send an automatic message to our
bot with the Telegram API but it’s not so
easy to use.
14
We decided to change the
implementation of this part.
WHAT'S WRONG WITH TELEGRAM?
https://yalantis.com/blog/whats-
wrong-telegram-open-api/
15
1. Telegram’s source code is not an SDK or a library.
2. Strange pieces of code, like setTextColor(0xff757575).
3. Magic numbers for int values like “42540” which are passed as flag values.
4. “If-Else” statements that are too long and too, and really long methods.
(i.e. 300 lines of code in one method).
5. Spaghetti code and copy-paste.
6. Only three Activities in such a huge project.
7. Many classes *activity, which extendBaseFragment, which is not actually a
Fragment.
HOW TO SOLVE - CASE 1
We developed a simple application for Android that
allow the owner to open the door, with just few
click, when he enters in the range of the beacon.
16
We would use an App like a real key!
PROS
Easy to implement
Don’t need additional
hardware
CONS
It’s not completly
automated
Need to have a special
app
HOW TO SOLVE - CASE 2
We use Raspberry Pi as a beacon reciever, and the
beacon of the owner as a trasmitter. When the
Raspberry catches the signal, it performs an
action.
17
We would use a Beacon like a real key!
PROS
Completly automated
Don’t need special app
CONS
Hard to implement
You must have a beacon
to enter
18
FIRST PROTOTYPE
19
SECOND PROTOTYPE
20
THIRD PROTOTYPE
21
LAST PROTOTYPE
22
THE «FINAL» PRODUCT
23
24
QUESTIONS?
SUGGESTIONS
?
IDEAS? 25

More Related Content

What's hot

Home automation - SMART HOME
Home automation - SMART HOME Home automation - SMART HOME
Home automation - SMART HOME
Ankur Mehra
 
IoT Based Home Automation System Presantation
IoT Based Home Automation System PresantationIoT Based Home Automation System Presantation
IoT Based Home Automation System Presantation
Farhan Ahmed Rahee
 
Smart home Environment using iot
Smart home Environment using iotSmart home Environment using iot
Smart home Environment using iot
parvathy s m
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automation
geetha chandrathi
 
IoT Smart Home
IoT Smart HomeIoT Smart Home
IoT Smart Home
Sergey Seletsky
 
Niche smart-home-automation-all-products
Niche smart-home-automation-all-productsNiche smart-home-automation-all-products
Niche smart-home-automation-all-products
Pranav Sayta
 
IoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINOIoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINO
AYSHA S KABEER
 
smart Home security
smart Home securitysmart Home security
smart Home security
Arvind Narayanan
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation project
Shohin Aheleroff
 
Smart Digital Door Lock
Smart Digital Door LockSmart Digital Door Lock
Smart Digital Door Lock
shakil2604
 
Voice Based Home Automation
Voice Based Home AutomationVoice Based Home Automation
Voice Based Home AutomationSumukh Athrey
 
Home automation using wifi
Home automation using wifiHome automation using wifi
Home automation using wifi
Khairunnisa Naaz
 
Home automation
Home automationHome automation
Home automation
Rupshanker Mishra
 
Home automation using IOT
Home automation using IOTHome automation using IOT
Home automation using IOT
Maneesh Devanaboyina
 
Home Automation using Iot
Home Automation using IotHome Automation using Iot
Home Automation using Iot
Rabiya Mustafa
 
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with TelegramIRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET Journal
 
Smart door lock system
Smart door lock system Smart door lock system
Smart door lock system
Shivangee Shukla
 
Home automation based iot
Home automation based iotHome automation based iot
Home automation based iot
tashushy
 
Voice Control Home Automation
Voice Control Home AutomationVoice Control Home Automation
Voice Control Home Automation
Abhishek Neb
 

What's hot (20)

Home automation - SMART HOME
Home automation - SMART HOME Home automation - SMART HOME
Home automation - SMART HOME
 
IoT Based Home Automation System Presantation
IoT Based Home Automation System PresantationIoT Based Home Automation System Presantation
IoT Based Home Automation System Presantation
 
Smart home Environment using iot
Smart home Environment using iotSmart home Environment using iot
Smart home Environment using iot
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automation
 
IoT Smart Home
IoT Smart HomeIoT Smart Home
IoT Smart Home
 
Niche smart-home-automation-all-products
Niche smart-home-automation-all-productsNiche smart-home-automation-all-products
Niche smart-home-automation-all-products
 
IoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINOIoT BASED SMART HOME USING ARDUINO
IoT BASED SMART HOME USING ARDUINO
 
smart Home security
smart Home securitysmart Home security
smart Home security
 
Smart door bell
Smart door bellSmart door bell
Smart door bell
 
IoT home automation project
IoT home automation projectIoT home automation project
IoT home automation project
 
Smart Digital Door Lock
Smart Digital Door LockSmart Digital Door Lock
Smart Digital Door Lock
 
Voice Based Home Automation
Voice Based Home AutomationVoice Based Home Automation
Voice Based Home Automation
 
Home automation using wifi
Home automation using wifiHome automation using wifi
Home automation using wifi
 
Home automation
Home automationHome automation
Home automation
 
Home automation using IOT
Home automation using IOTHome automation using IOT
Home automation using IOT
 
Home Automation using Iot
Home Automation using IotHome Automation using Iot
Home Automation using Iot
 
IRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with TelegramIRJET- Smart Door Security System using Raspberry Pi with Telegram
IRJET- Smart Door Security System using Raspberry Pi with Telegram
 
Smart door lock system
Smart door lock system Smart door lock system
Smart door lock system
 
Home automation based iot
Home automation based iotHome automation based iot
Home automation based iot
 
Voice Control Home Automation
Voice Control Home AutomationVoice Control Home Automation
Voice Control Home Automation
 

Viewers also liked

Sensoro beacon review
Sensoro beacon review Sensoro beacon review
Sensoro beacon review
Mattia Brunetti
 
Bfonics beacons supermarket
Bfonics beacons supermarketBfonics beacons supermarket
Bfonics beacons supermarket
bfonics
 
Power Group presentation Medigroup stock-movement
Power Group presentation Medigroup stock-movementPower Group presentation Medigroup stock-movement
Power Group presentation Medigroup stock-movement
Viet Nguyen
 
Raspberry pi 2 demo
Raspberry pi 2 demoRaspberry pi 2 demo
Raspberry pi 2 demo
Viet Nguyen
 
Basics of Raspberry Pi
Basics of Raspberry PiBasics of Raspberry Pi
Basics of Raspberry Pi
Maryala Srinivas
 
Eddystone beacons demo
Eddystone beacons demoEddystone beacons demo
Eddystone beacons demo
Angelo Rüggeberg
 
Candra lab gis v 1
Candra lab gis v 1Candra lab gis v 1
Candra lab gis v 1
Candra Adi Putra
 
Home Automation with perl
Home Automation with perlHome Automation with perl
Home Automation with perl
flyingrobin13
 
Home alarm & automation
Home alarm & automationHome alarm & automation
Home alarm & automation
SteveAmor
 
Home Automation
Home AutomationHome Automation
Home Automation
Cássio Landim
 
Freewire Berkeley final presentation
Freewire Berkeley final presentationFreewire Berkeley final presentation
Freewire Berkeley final presentationStanford University
 
A Retailer's Guide To iBeacon Marketing
A Retailer's Guide To iBeacon MarketingA Retailer's Guide To iBeacon Marketing
A Retailer's Guide To iBeacon MarketingG3 Communications
 
Introduction to Raspberry PI
Introduction to Raspberry PIIntroduction to Raspberry PI
Introduction to Raspberry PI
Chandrashekar Babu
 
iBeacon and its Biz Model
iBeacon and its Biz ModeliBeacon and its Biz Model
iBeacon and its Biz Model
Jeffrey Funk Business Models
 
Eddystone beacons: Everything you need to know
Eddystone beacons: Everything you need to knowEddystone beacons: Everything you need to know
Eddystone beacons: Everything you need to know
Beaconstac
 
Road Beacon System (RBS) project presentation
Road Beacon System (RBS) project presentationRoad Beacon System (RBS) project presentation
Road Beacon System (RBS) project presentation
Armengol Torres
 
Security system using Arduino
Security system using ArduinoSecurity system using Arduino
Security system using Arduino
Apoorv Anand
 
50 ideas for using beacons
50 ideas for using beacons50 ideas for using beacons
50 ideas for using beacons
Sinergia Labs
 
Movement Sensed Automatic Door Opening System
Movement Sensed Automatic Door Opening SystemMovement Sensed Automatic Door Opening System
Movement Sensed Automatic Door Opening System
Edgefxkits & Solutions
 
IOT Based Home Automation using Raspberry Pi-3
IOT Based Home Automation using Raspberry Pi-3IOT Based Home Automation using Raspberry Pi-3
IOT Based Home Automation using Raspberry Pi-3
Mohammad Qasim Malik
 

Viewers also liked (20)

Sensoro beacon review
Sensoro beacon review Sensoro beacon review
Sensoro beacon review
 
Bfonics beacons supermarket
Bfonics beacons supermarketBfonics beacons supermarket
Bfonics beacons supermarket
 
Power Group presentation Medigroup stock-movement
Power Group presentation Medigroup stock-movementPower Group presentation Medigroup stock-movement
Power Group presentation Medigroup stock-movement
 
Raspberry pi 2 demo
Raspberry pi 2 demoRaspberry pi 2 demo
Raspberry pi 2 demo
 
Basics of Raspberry Pi
Basics of Raspberry PiBasics of Raspberry Pi
Basics of Raspberry Pi
 
Eddystone beacons demo
Eddystone beacons demoEddystone beacons demo
Eddystone beacons demo
 
Candra lab gis v 1
Candra lab gis v 1Candra lab gis v 1
Candra lab gis v 1
 
Home Automation with perl
Home Automation with perlHome Automation with perl
Home Automation with perl
 
Home alarm & automation
Home alarm & automationHome alarm & automation
Home alarm & automation
 
Home Automation
Home AutomationHome Automation
Home Automation
 
Freewire Berkeley final presentation
Freewire Berkeley final presentationFreewire Berkeley final presentation
Freewire Berkeley final presentation
 
A Retailer's Guide To iBeacon Marketing
A Retailer's Guide To iBeacon MarketingA Retailer's Guide To iBeacon Marketing
A Retailer's Guide To iBeacon Marketing
 
Introduction to Raspberry PI
Introduction to Raspberry PIIntroduction to Raspberry PI
Introduction to Raspberry PI
 
iBeacon and its Biz Model
iBeacon and its Biz ModeliBeacon and its Biz Model
iBeacon and its Biz Model
 
Eddystone beacons: Everything you need to know
Eddystone beacons: Everything you need to knowEddystone beacons: Everything you need to know
Eddystone beacons: Everything you need to know
 
Road Beacon System (RBS) project presentation
Road Beacon System (RBS) project presentationRoad Beacon System (RBS) project presentation
Road Beacon System (RBS) project presentation
 
Security system using Arduino
Security system using ArduinoSecurity system using Arduino
Security system using Arduino
 
50 ideas for using beacons
50 ideas for using beacons50 ideas for using beacons
50 ideas for using beacons
 
Movement Sensed Automatic Door Opening System
Movement Sensed Automatic Door Opening SystemMovement Sensed Automatic Door Opening System
Movement Sensed Automatic Door Opening System
 
IOT Based Home Automation using Raspberry Pi-3
IOT Based Home Automation using Raspberry Pi-3IOT Based Home Automation using Raspberry Pi-3
IOT Based Home Automation using Raspberry Pi-3
 

Similar to Smart DoorBell - Make your door smart with Raspberry Pi!

Veilig communiceren power point presentatie
Veilig communiceren power point presentatieVeilig communiceren power point presentatie
Veilig communiceren power point presentatie
leonardoleno
 
Hacking, Surveilling, and Deceiving Victims on Smart TV
Hacking, Surveilling, and Deceiving Victims on Smart TVHacking, Surveilling, and Deceiving Victims on Smart TV
Hacking, Surveilling, and Deceiving Victims on Smart TV
Seungjoo Kim
 
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
44CON
 
Droidcon it-2014-marco-grassi-viaforensics
Droidcon it-2014-marco-grassi-viaforensicsDroidcon it-2014-marco-grassi-viaforensics
Droidcon it-2014-marco-grassi-viaforensics
viaForensics
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Nick Galbreath
 
Hacking the Kinect with GAFFTA Day 1
Hacking the Kinect with GAFFTA Day 1Hacking the Kinect with GAFFTA Day 1
Hacking the Kinect with GAFFTA Day 1
benDesigning
 
GSM Based Security System
GSM Based Security SystemGSM Based Security System
GSM Based Security System
Prajjwol Tripathi
 
Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -
Seungjoo Kim
 
pentest mobile app issue
pentest mobile app issuepentest mobile app issue
pentest mobile app issueshekar M
 
Two Hours of Code - IoT and Cloud
Two Hours of Code - IoT and CloudTwo Hours of Code - IoT and Cloud
Two Hours of Code - IoT and Cloud
Greg Thomas
 
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecuritySmart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecurityOKsystem
 
Golden droplets webinar table of content
Golden droplets webinar table of contentGolden droplets webinar table of content
Golden droplets webinar table of content
Ricardo Valls P. Geo., M. Sc.
 
DISABLED WORKERS
DISABLED WORKERSDISABLED WORKERS
DISABLED WORKERS
GeorgeDiamandis11
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
Rapid7
 
Human Firewall - IoT presentation
Human Firewall - IoT presentationHuman Firewall - IoT presentation
Human Firewall - IoT presentation
LeonardoSarra
 
Is data secure on the password protected blackberry device
Is data secure on the password protected blackberry deviceIs data secure on the password protected blackberry device
Is data secure on the password protected blackberry deviceSTO STRATEGY
 
TxJS 2011
TxJS 2011TxJS 2011
TxJS 2011
Brian LeRoux
 
iLabs Toolbox Javashare 2008
iLabs Toolbox Javashare 2008iLabs Toolbox Javashare 2008
iLabs Toolbox Javashare 2008
rmzdotno
 

Similar to Smart DoorBell - Make your door smart with Raspberry Pi! (20)

Veilig communiceren power point presentatie
Veilig communiceren power point presentatieVeilig communiceren power point presentatie
Veilig communiceren power point presentatie
 
Hacking, Surveilling, and Deceiving Victims on Smart TV
Hacking, Surveilling, and Deceiving Victims on Smart TVHacking, Surveilling, and Deceiving Victims on Smart TV
Hacking, Surveilling, and Deceiving Victims on Smart TV
 
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
 
Droidcon it-2014-marco-grassi-viaforensics
Droidcon it-2014-marco-grassi-viaforensicsDroidcon it-2014-marco-grassi-viaforensics
Droidcon it-2014-marco-grassi-viaforensics
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013
 
Hands Company - Deck
Hands Company - DeckHands Company - Deck
Hands Company - Deck
 
Hacking the Kinect with GAFFTA Day 1
Hacking the Kinect with GAFFTA Day 1Hacking the Kinect with GAFFTA Day 1
Hacking the Kinect with GAFFTA Day 1
 
GSM Based Security System
GSM Based Security SystemGSM Based Security System
GSM Based Security System
 
Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -
 
pentest mobile app issue
pentest mobile app issuepentest mobile app issue
pentest mobile app issue
 
Two Hours of Code - IoT and Cloud
Two Hours of Code - IoT and CloudTwo Hours of Code - IoT and Cloud
Two Hours of Code - IoT and Cloud
 
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecuritySmart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
 
Golden droplets webinar table of content
Golden droplets webinar table of contentGolden droplets webinar table of content
Golden droplets webinar table of content
 
ppt2 (1).pptx
ppt2 (1).pptxppt2 (1).pptx
ppt2 (1).pptx
 
DISABLED WORKERS
DISABLED WORKERSDISABLED WORKERS
DISABLED WORKERS
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
Human Firewall - IoT presentation
Human Firewall - IoT presentationHuman Firewall - IoT presentation
Human Firewall - IoT presentation
 
Is data secure on the password protected blackberry device
Is data secure on the password protected blackberry deviceIs data secure on the password protected blackberry device
Is data secure on the password protected blackberry device
 
TxJS 2011
TxJS 2011TxJS 2011
TxJS 2011
 
iLabs Toolbox Javashare 2008
iLabs Toolbox Javashare 2008iLabs Toolbox Javashare 2008
iLabs Toolbox Javashare 2008
 

Recently uploaded

power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 

Recently uploaded (20)

power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 

Smart DoorBell - Make your door smart with Raspberry Pi!

  • 1. Master of Science in Computer Engineering Class of Pervasive System by: Ioannis Chatzigiannakis 1
  • 3. THE PROBLEM To control the door when you are not at home. To control the hall of an office without need to be there. To control automatic gate without to be in the range. 3 There are many situation where is hard to control your «door»!
  • 4. OUR SOLUTION We developed a «SmartDoorBell», a device that is always connected to internet, to have a remote control of your door, simply using your smartphone! 4 There are some similar solutions but: 1) Really expensive – more than 200 $ 2) Need a special app to work 3) Are not flexible (e.g. you can’t turn on lights)
  • 5. POSSIBLE SCENARIOS The purpose of this device is to help people to have easly access at their house and to have a remote control of a door. The focus of this project is about the domestic use of this product. 5
  • 6. 6 POSSIBLE SCENARIOS We found three main situations: 6 Owner: with beacon Friends: with code Strangers: ring the bell
  • 7. 7 POSSIBLE SCENARIOS 1/3 7 Owner: with beacon Owner of the house has a beacon device that works like a real key. When he comes back home the «SmartDoorBell» recognise him and unlock the door.
  • 8. 8 POSSIBLE SCENARIOS 2/3 8 Friends: with code Friends or everyone that would enter in the house, and know the security code, can do that simply typing the code on the numeric keyboard on the door.
  • 9. 9 POSSIBLE SCENARIOS 3/3 9 Strangers: ring the bell Every time that someone ring the bell the owner receives a Telegram message with a photo and he can decide to take some decisions using Telegram (e.g. take a photo, send/receive vocal messages…)
  • 11. THE SOFTWARE 11 Script Button Script OpenDoorScript Secure Code Our BOT Telegram runs on Raspberry Pi Script Multi-Media
  • 12. BOT COMMANDS /roll  reply with a random integer, used for test /time  reply with a current time, used for test /photo  take a photo and send it to the owner /video  take a video and send it to the owner /sound  play an audio message from the Raspberry speaker /open  unlock the door /openL  unlock the door and turn on the light for 10 seconds /light  turn on the light for 10 seconds /reboot  reboot the Raspberry Pi /shutdown  shutdown the Raspberry Pi /help  send a document with the list of commands 12
  • 13. PROJECT PROGRESS REPORT SET UP HARDWARE SET UP SOFTWARE IMPLEMENT STRANGER SCENARIO FAIL TO IMPLEMENT API TELEGRAM ON ANDROID IMPLEMENT FRIENDS SCENARIO IMPLEMENT OWNER SCENARIO 13
  • 14. WHAT’S MISSING – THE OWNER For the owner side we want that when he comes back home the door will automatically open. We tried to send an automatic message to our bot with the Telegram API but it’s not so easy to use. 14 We decided to change the implementation of this part.
  • 15. WHAT'S WRONG WITH TELEGRAM? https://yalantis.com/blog/whats- wrong-telegram-open-api/ 15 1. Telegram’s source code is not an SDK or a library. 2. Strange pieces of code, like setTextColor(0xff757575). 3. Magic numbers for int values like “42540” which are passed as flag values. 4. “If-Else” statements that are too long and too, and really long methods. (i.e. 300 lines of code in one method). 5. Spaghetti code and copy-paste. 6. Only three Activities in such a huge project. 7. Many classes *activity, which extendBaseFragment, which is not actually a Fragment.
  • 16. HOW TO SOLVE - CASE 1 We developed a simple application for Android that allow the owner to open the door, with just few click, when he enters in the range of the beacon. 16 We would use an App like a real key! PROS Easy to implement Don’t need additional hardware CONS It’s not completly automated Need to have a special app
  • 17. HOW TO SOLVE - CASE 2 We use Raspberry Pi as a beacon reciever, and the beacon of the owner as a trasmitter. When the Raspberry catches the signal, it performs an action. 17 We would use a Beacon like a real key! PROS Completly automated Don’t need special app CONS Hard to implement You must have a beacon to enter
  • 18. 18
  • 24. 24

Editor's Notes

  1. Facile uso anche in condominio
  2. raspbian