Computer Systems Knowledge Based Article
Computer Systems Knowledge Based Article
Article
(Smart Home Security System)
(Sabin Tamang/Academic Writing/1st Semester)
Abstract—As technology proceeds and the number of smart devices continues to grow substantially,
need for ubiquitous context-aware platforms that support interconnected, heterogeneous, and
distributed network of devices has given rise to what is referred today as Internet-of-Things.
However, paving the path for achieving aforementioned objectives and making the IoT paradigm
more tangible require integration and convergence of different knowledge and research domains,
covering aspects from identification communication to resource discovery and service integration.
This Article provides an explanation of the internet of things and their uses its effects in our daily
life, the trends which may have in society and also clarify the problems through the explanation of
computer system the article will help to explain in great detail and understanding of IOT systems.
Also, it helps how IOT devices can be implement in future objects for specific environments.
Keywords- Internet of Things, Web of Things, Cloud of Things, Systems, Computer, Gate, Innovation,
Power
The Internet of Things (IoT) is an important topic in technology industry, policy, and engineering circles
and has become headline news in both the specialty press and the popular media. The large-scale
implementation of IoT devices promises to transform many aspects of the way we live. For consumers,
new IoT products like Internet-enabled appliances, home automation components, and energy
management devices are moving us toward a vision of the “smart home’’, offering more security and
energy efficiency. Other personal IoT devices like wearable fitness and health monitoring devices and
network enabled medical devices are transforming the way healthcare services are delivered. This
technology promises to be beneficial for people with disabilities and the elderly, enabling improved levels
of independence and quality of life at a reasonable cost.1 IoT systems like networked vehicles, intelligent
traffic systems, and sensors embedded in roads and bridges move us closer to the idea of “smart cities’’,
which help minimize congestion and energy consumption. IoT technology offers the possibility to
transform agriculture, industry, and energy production and distribution by increasing the availability of
information along the value chain of production using networked sensors.
A number of companies and research organizations have offered a wide range of projections about the
potential impact of IoT on the Internet and the economy during the next five to ten years. For example,
projects more than 24 billion Internet–connected objects by 2019. However, projects 75 billion networked
devices by 2020. Looking out further and raising the stakes higher, Huawei forecasts 100 billion IoT
connections by 2025. McKinsey Global Institute suggests that the financial impact of IoT on the global
economy may be as much as $3.9 to $11.1 trillion by 2025. While the variability in predictions makes any
specific number questionable, collectively they paint a picture of significant growth and influence.
Some observers see the IoT as a revolutionary fully–interconnected “smart” world of progress, efficiency,
and opportunity, with the potential for adding billions in value to industry and the global economy. Others
warn that the IoT represents a darker world of surveillance, privacy and security violations, and consumer
lock–in. Attention-grabbing headlines about the hacking of Internet-connected automobiles, surveillance
concerns stemming from voice recognition features in “smart” TVs, and privacy fears stemming from the
potential misuse of IoT data have captured public attention. This “promise vs. peril” debate along with an
influx of information though popular media and marketing can make the IoT a complex topic to
understand.
The client A appeals a home entertainment system with 5 parameters which are battery, spoken control
(voice recognition), mobile phone, multiple user profiles and user verification where client has also asked
the 5th one should upgrade. From the first, the battery is connected to an AND gate with three inputs and
other AND gate with two inputs. Both AND gate where the battery is connected to are added to Q which
is the final output.
The Voice recognition parameter is also connected to an AND gate and this gate has three inputs. The
mobile phone parameter has connected to this AND gate and the multiple user profile parameter also
connected to this gate which has three inputs. From the output of this gate is connected to the first AND
gate with three inputs. User verification is the fifth parameter which upgrades the home entertainment
system. User verification is connected to the AND gate which has two inputs and from there the gate is
added to the first AND gate which has three inputs to get Q which is the output. In the sense of
concerning technical development of the 5th parameter which is user verification, the user verification will
support various types of profiles like enabling the fridge to clearly and it also tells a difference between
users and sending a notification (sending and receiving emails). These technical development of the 5 th
Parameter helps user to get notification to the user’s mobile device. Another technical development of the
5th parameter is that there is a manual control which helps to control the device manually in case of faults
or disallow therefore enabling the device which is a smart fridge freezer to be able to continue
functioning. Finally, the bespoke home entertainment system will cater to all of the client’s requirements.
Q = A AND E AND (B OR C OR D)
The new product intended to be introduced is a smart home security system which is a microcontroller.
The system is based on microcontroller, which assists in ensuring residential security. In this system, user
will get real-time status of his house weather sit is secured or not and any unwanted motion occurred in
the house can be detected by the PIR sensor. This system also includes a facility of anti-theft door
security system. If anyone enters in the house, an alarm will be on and both a message and a notification
will be sent to the user’s phone. For being notified, user needs to install an application in his android
smartphone, which communicates with a cloud server. By using this smart home security system, user can
be alerted any time weather staying anywhere in the world.
By this system, user can get notification by using the android application. The system is independent of
fixed IP address. So that, the user can easily be connected to the system. SMS Based: In case of internet
connection failure, user will be notified through SMS. Low Cost: The price of the components of this
system is low. It can be constructed with 1361 BDT. Very short response time: The system takes less than
a second to give notification or SMS. Wide area coverage: As the system is based on internet, it can be
accessed from anywhere. User-friendly interface: This system offers user-friendly interface. Anyone
having little knowledge on android can use this system.
This system includes two Android smart phone, a Microcontroller (ATmega8), a Bluetooth module (HC-
05), a PIR sensor (HC-SR501), a Security Alarm, a Cloud-based application and an android application.
The Android has two sides and they are Device side and user side. The process starts in two situations,
one when any one enterer in the house by the front door and another when any unwanted movement is
detected in the house by PIR sensor. This sends a signal to microcontroller. Then microcontroller turns on
the alarm through there lay and sends a signal to the Bluetooth module. Bluetooth module receives the
signal from the microcontroller. Through Bluetooth module, the signal goes to the android device. There
is an application in android device, which sends a data to a particular cloud server. At the same time, it
sends a message to the user’s phone the server, there is a website and a cloud-based application. Server
sends a data to the user’s android phone. In user’s phone, there will be an application that receives the
data from the server. Then the application gives a notification to user. User can check the status of his
house through the application at any time. For this privilege, an active data connection is required in
user’s phone. By this user can also get the time of occurrence of the incident.
Q=A AND E AND (B OR C OR D)
There are many hardware parts in order to make the smart home security system with microcontroller
function. The key hardware components that make up the smart home security system are android
smartphone and the microcontroller board. Other components are Bluetooth module, PIR sensor, relay,
alarm and door state detection output. These components are connected to the Microcontroller board. An
ATmega8 microcontroller does the total operation. A Bluetooth module (HC-05) is connected to the
microcontroller, which communicates with the android device. Microcontroller get data form the door
state detection output pin, and the PIR sensor (HC-SR501) output pin. PIR sensor gives a signal to the
microcontroller when any motion is detected. The relay triggers the alarm by taking the output from the
microcontroller. An Alarm device or system of alarm devices gives an audible, visual or other form of a
signal about a condition. The Bluetooth terminal applications should be present in our devices like mobile
& PC to communicate with the microcontroller with the help of Bluetooth. The HC-05 Bluetooth Module
can be used in two modes of operation: Command Mode and Data Mode. In Command Mode, you can
communicate with the Bluetooth module through AT Commands for configuring various settings and
parameters of the Module like get the firmware information, changing Baud Rate, changing module
name, it can be used to set it as master or slave. A point about HC-05 Module is that it can be configured
as Master or Slave in a communication pair. In order to select either of the modes, you need to activate
the Command Mode and sent appropriate AT Commands. Coming to the Data Mode, in this mode, the
module is used for communicating with other Bluetooth device that is data transfer happens in this mode.
A passive infrared sensor is an electronic sensor that measures infrared light radiating from objects. PIR
sensors mostly used in PIR-based motion detectors. Also, it used in security alarms and automatic lighting
applications. The PIR sensor consists of 3 pins,
Pin1 corresponds to the drain terminal of the device, which connected to the positive supply 5V
DC.
Pin2 corresponds to the source terminal of the device, which connects to the ground terminal via a
100K or 47K resistor. The Pin2 is the output pin of the sensor. The pin 2 of the sensor carries the
detected IR signal to an amplifier from the
Generally, PIR sensor can detect animal/human movement in a requirement range. PIR is made of a
pyroelectric sensor, which is able to detect different levels of infrared radiation. The detector itself
does not emit any energy but passively receives it.
The raspberry Pi is an advantage in terms of hardware choice as it’s an open-source nature, which
can be developed further in the future if needed. All hardware components are ultimately linked
as without one component the smart home security system will not be able to function to its best
capabilities. IoT can have many different hardware components, depending on what the smart
object wants to achieve. different smart objects will have different hardware components
compared to others.