Faculty of Automation and Computers Master Program: Master of Information Technology Remote Monitoring of Alarm Embedded System Detection Using Alarm… [311610]
Faculty of Automation and Computers
Master Program: Master of Information Technology
Remote Monitoring of Alarm Embedded System Detection Using Alarm Sensors
Dissertation Thesis
Maria Românu
Supervisor:
Prof. dr. eng. Ștefan Holban
Timișoara,
2018
Abstract
Contents
Introduction
Short description of the domain
Figure 1 IoT Overview
Internet of things is the concept of connecting any device with an on and off switch to the Internet. As of 2016, the vision on the IoT has evolved due to a [anonimizat], real-[anonimizat], [anonimizat], [anonimizat]. [anonimizat].
[anonimizat]. [anonimizat], centralized control and management of devices and appliances in a [anonimizat], energy efficiency and safety. [anonimizat], remote monitoring & control, accessibility and security to the users.
For this project the following courses studied these years will be helpful: [anonimizat], [anonimizat], Advanced Databases.
Literature Review
An alarm system is a designed system for intrusion detection or unauthorized entry in a building or area. [anonimizat], industrial, [anonimizat]. Some system alarms serve a [anonimizat], combined system offer protection both for fire and intrusion. [1]
A system alarm contains one or more sensors to detect intrusion and one alert device to signal it. A typical alarm system has the following components: [anonimizat], [anonimizat].
[anonimizat], being the core of the alarm. [anonimizat] a plastic or metal box connected to a [anonimizat].
The next component of an alarm system and perhaps the most important is the sensor. [anonimizat], to certain physical or chemical properties of the environment. [anonimizat] a physical quantity (pressure, humidity, [anonimizat], strength, [anonimizat]) and turns into a signal that can be read by an observer through an instrument or it can be processed. Sensors are located within the protected area's perimeter, which then detects intruders in a [anonimizat], [anonimizat], vibration or other disturbances.
The third component is an alert device that indicates an alarm condition. Generally, [anonimizat], or other types of speakers. [anonimizat]. In addition to the system itself, security alarms are often coupled with a monitoring service. In case of an alarm, the local control unit contacts a central monitoring station. Keyboard is another component, being the main interface between the user and the alarm. In addition to the keyboard, there are LEDs that can indicate the status of the alarm, a display to list the settings, or both.
The main goal of security is system stability. With every new idea, technology, procedures, actions and specialized institutions, integrated security devices offer protection, surveillance and optimal condition for system to function and to be used properly. Hence, security represent the main quality parameter of all systems and processes and without it, efficiency will not be possible.
Purpose of thesis
A main object of the paper is to get a clear understanding of remote surveillance and monitoring technologies, to find out if the technology exists and if it is possible to control and monitor a remote home automation system from the web. Underlying objectives within the project are to research for existing remote monitoring packages, to implement and a surveillance and research videoconferencing technology, research the sending of data over the electricity supply network. Alarm Sensors are essential elements of your home security system. A wide variety of security alarm sensors and detectors are available for use.
Security has becoming an important issue everywhere. Home security is becoming necessary nowadays as the possibilities of intrusion are increasing day by day. Safety from theft, leaking of raw gas and fire are the most important requirements of home security system for people.[2]
The next questions must be answered:
Why Are Home Security Systems Important?
What values we must protect?
What threats we should counterattack?
What are the potential threats to alter the software deployed?
How can we enhance the user’s privacy?
The alarm system aims to protect goods and values from a space and alerts both immediate and alarm users who have access to the alarm. In this paper will describe an alarm, which state can be seen through the Internet. The data value received from sensors that are attached to the system is registered on cloud database that is attached on a website. When a certain value is registered that can be considered faulty, the user is alerted via webpage. Besides being alerted, the alarm system discussed makes possible value registering. This becomes useful when there are more than one users.
Examples of home security
D-Link DCS-930L Enabled Wireless-N Network Camera
The DCS-930L Wi-Fi Day Camera is a complete surveillance solution for your home or small office. It can connect to your network using Wireless N, so you can place it anywhere in your home, and it even includes motion and sound detection. You can check on your camera anytime, anywhere from any PC, tablet, or mobile phone.[3] It keys features are easy, secure setup in minutes ,Fits almost anywhere thanks to its compact design, Compatible with iOS and Android devices.
Figure 3 D-Link Alarm
TENVIS Wireless IP Vision Internet Surveillance Camera Built-in Microphone
Two-way audio and remote monitoring via your smart phone mean nothing will escape your sight. Night vision mode lets you view up to 12 meters away. It keys features are : 270-degree vertical tilt, 90-degree horizontal tilt, Compatible with iOS and Android devices[4]
PNI PG200 Alarm
The system consists of the central unit of the intrusion detection system and various wireless or wired accessories. When an intrusion detection is detected in the zone protected by the intrusion detection system, the central unit will activate the siren, if it is switched on, for alert and call, if more than one, the programmed telephone numbers.
The main functions of the alarm system are: arm or disarm remote system from remote controls, or via SMS or phone call; intelligent perimeter reinforcement; panic button on remote control; the possibility of registering with a private dispatcher; autonomy due to internal battery and SMS warning when no power is supplied; the possibility of connecting an external siren; can call or send SMS to up to 6 phone numbers; can be configured by call or SMS.
European Standards for Alarm Systems
To help ensure that alarms are designed, installed and maintained reliably, most European alarm suppliers and installers adhere to a series of Standards or Codes of Practice. EN 50131 is a European standard series for intruder alarms and hold-up systems.
One of the most important aspects of the EN 50131 requirements is the concept of a security grade. For each installation the grade of system must be chosen according to various factors. In the EN the grade is described in terms of the type of intruder and how much effort they would put into a burglary. Whilst an interested customer will naturally take an interest in/help determine the type of alarm system they wish to buy, the main role of determining graded performance will usually lie with two other parties. [5]
The key feature of the Euro Standards is the system of grading. Four ‘Grades' of alarm system exist, based on increasing levels of resilience against attack by intruders with anticipated levels of alarm knowledge and tools.
For a Grade 1 alarm, intruders are expected to have little or no expertise. The alarm must have either 2 warning devices, a self-powered warning device or be connected to an alarm receiving Centre (these are minimum requirements). For a Grade 2 alarm, intruders are expected to have more knowledge and some specialist equipment. A Grade 2 alarm must be connected to an alarm receiving center and have at least 1 self-powered warning device or 2 remotely powered warning devices (warning devices are not required with certain higher-grade Transmission Systems). At Grade 3, intruders will have both comprehensive knowledge and portable electronic equipment and for a Grade 4 alarm, intruders have expertise, access to good equipment and planned intrusion.
In addition to the security grade, each component is given an environmental classification. There is no overall environmental classification, each component must meet the classification for the location it is installed. Environmental classes are defined as follows: Indoor (influences normally experienced indoors when the temperature is well maintained), Indoor-General (Environmental influences normally experienced indoors when the temperature is not well maintained), Outdoor-Sheltered or indoor extreme conditions, Outdoor-General. [6]
Theoretical Foundations
Alarm Management
Alarm Philosophy
All enterprises have goals for their operation and recognized limitations as to what they
can accomplish. The alarm philosophy will recognize both and incorporate them into
the alarm improvement process. [7] Alarms are defined, appropriate operator responses are identified, success criteria are established, and the roles that all other parts of the enterprise should provide to support the alarm system redesign. This is where the complete design is framed as “fully expanded design specification”, providing the alarm improvement teams with the clear guidance necessary to produce the new alarm design.
Lessons For Successful Alarm Management
There should be five lessons to be taken in consideration: theory, progress, history, humility, truth. Improving the alarm system alone will not improve the control room, like the environment needs to be taken in consideration, or which sensors are appropriated. Real progress often requires a change in direction and you should not always blame the operator to control room problems. Do not forget about history as incidents and accidents provide powerful knowledge. It is always wise to maintain some humility as almost everything we think we know about alarms will change in time. Technologists must always have a single agenda—the truth meaning get good data, perform accurate analyses, and believe the results.
Advantages of Home automation systems
In recent years, wireless systems like Wi-Fi have become more and more common in home networking. Also in home and building automation systems, the use of wireless technologies gives several advantages.
One could be reduced installation costs. First and foremost, installation costs are significantly reduced since no cabling is necessary. Wired solutions require cabling, where material as well as the professional laying of cables is expensive. [8] The second one is system scalability. Deploying a wireless network is especially great when, due to new or changed functionalities or standards, extension of the network is necessary. The third one can be apply to aesthetical benefits an alarm can provide. This is advised when adding security systems to representative buildings with all-glass architecture and historical buildings where design reasons do not allow laying of cables. Fourth advantage and probably the most celebrated is integration of mobile devices. With wireless networks, associating mobile devices such as PDAs and Smartphones with the automation system becomes possible everywhere and at any time, as a device's exact physical location is no longer crucial for a connection.
Smart-houses
Smart home is an emerging concept that attracts the synergy of several areas of science and engineering. A lot of research has been going on for more than a decade now in order to increase the power efficiency at the consumer level of the power management systems. Smart Home is the term commonly used to define a residence that integrates technology and services through home networking to enhance power efficiency and improve the quality of living [9].
Figure 5 Smart-House Overview
The "smart house" technology is one realization of home automation ideals using a specific set of technologies. It's a house that has highly advanced automatic systems for lighting, temperature control, security, appliances, and many other functions. [10]
Data signals from an embedded system are sent through the home's wiring to switches and outlets that are programmed to operate appliances and electronic devices in every part of the house, depending on configuration. The computer systems can monitor many aspects of daily living, enabling a Smart house to give a remote interface to home appliances or the automation system itself, via phone with messaging or phone applications, wireless transmission or the internet, accessing web pages. The elderly population and increasing life expectancy may have brought a lot challenges in health and healthcare but this domains are not an exception. For this reason, Home automation increased in popularity, making it more advantageous for safety, security.
So, Smart home appliance can be an interface between the remote control with its mobile or remote control and a home reliever.
Figure 6 Block Diagram of Complete Smart Home System
Smart-Metering
Households utilities could be itemized allowing residents to track their usage and see which devices utilize the most electricity, water, or gas. New sensor technology that consists of a single device for each utility, which builds a picture of household activity by tracing electrical wiring, plumbing, and gas lines back to specific devices or fixtures, could make this far simpler to implement. Smart sensors have become increasingly popular over the past few years as more people have become interested in cutting their utility bills and minimizing the resources that they consume.
In 1972, Theodore George “Ted” Paraskevakos, , developed a sensor monitoring system that used digital transmission for security, fire and medical alarm systems as well as meter reading capabilities for all utilities. However, the remote metering concept was not realized in the expected electricity context for many years.
Climate change, awareness of energy efficiency, new trends in electricity markets drive to an evolution towards developing smart meters, an enabling technology for many smart grid applications that records consumption and communicates information at least daily back to the utility for monitoring and billing. The first attempts at metering automatization, or Automated Meter Reading, allowed utilities to remotely read the consumption records and basic status information from customers’premises . Due to its one-way communication system, Automated Meter Reading is limited to remote reading and cannot run additional applications, which prompted utilities to move towards the Smart Metering or Advanced Metering Infrastructure, which enable a two-way communication between the meter and the central system and gather data for remote reporting. The metering side of the distribution system has been the focus of most recent infrastructure investments.
Advanced Metering Infrastructure benefits incudes more efficient member service support, meaning improved handling of member accounts, hourly use data for billing use inquiries, fewer visits to the meter location, high-level billing and meter read accuracy. It also includes lower costs for meter reading, fewer trucks on the road, online presentation of daily and houly use to interested members. It is required for it to provide commercial service issues, such as support advanced tariff system or allow remote on or off control supply and flow/power limitations.
RealTime Embedded System
An embedded system is an electronic system that is designed to perform a dedicated function
within a larger system. Real-time systems are those that can provide guaranteed worst-case
response times to critical events, as well as acceptable average-case response times to
noncritical events. When a real-time system is designed as an embedded component, it is
called a real-time embedded system. Real-time embedded systems are widespread in
consumer, industrial, medical, and military applications.[11]
Introduction to Embedded and Real-Time Systems
An embedded system is a combination of computer hardware and software, which can be described as having microprocessor as the heart and memory block as the brain.
Figure 7 A generic embedded system architecture
Embedded software can be contained in read-only memory, ROM, which is a nonvolatile memory, or erasable programmable ROM (EPROM), and flash memory. For its run-time computation, the microprocessor needs random-access memory.
The difference between a general purpose computing device, such as smart phone, laptop, or desktop computer and an embedded system is that the latter is designed simply for a specific function. Another difference can be that an embedded system is traditionally built together with the software intended to run on it, known as hardware-software co-design.
Timing in RealTime Systems
Real-time systems are systems that need to respond to a service request within a certain amount of time. Each incoming service request appoints a job that is typically associated with
its timing constraint. The timing constraint of a task is the time instant by which its execution is required to be completed. A timing constraint can be either a hard, if the consequence of a missed deadline is fatal, a late response being useless or unacceptable, or a soft constraint, when consequence of a missed deadline is undesirable but tolerable, a late response still being useful as long as it is within some acceptable range. A home automation system, that is armed to monitor when the user in not around it can be defined as having soft timing constraints.
Cross-Platform Development Process
For embedded systems, timing correctness is equally important as functional correctness. Sometimes, a timing constraint is so important that it becomes an integral part of the functional requirements. Most embedded systems are required to offer high reliability since unpredictable event patterns from the environment may significantly change an embedded system’s sequence of execution. Memory size and efficient utilization of it is a challenge that demands a lot of creativity. Power management is critical increase the operating time of an embedded system.
Microprocessor
A microprocessor is a general-purpose central processing unit manufactured on a
single integrated circuit. To be useful, a microprocessor has to work with other components,
such as a memory system for storing instructions and data, and external circuits to
communicate with the peripheral environment.[ 11]
A microprocessor is merely the processing core of an application system, and together with some components and circuits can be integrated on a chip called microcontroller. A microcontroller is truly a computer on a chip and can greatly ease the hardware design.
For memory access, a microprocessor may belong to either Harvard architecture or von Neumann architecture. The later presents data and instructions that are stored in the same address space and the processor interfaces with memory through a single set of address/data buses. For Harvard Architecture data and instructions (executable code) are stored in separate address spaces and are two sets of address/data buses between the processor and the memory. Since instruction fetches and data operations are carried on separate buses, it is possible to access program memory and data memory simultaneously.
Modern microprocessor designs present conditions of both Harvard and von
Neumann architectures.
As far as the instruction set is concerned, a microprocessor may be one of two types: a
complex instruction set computing (CISC) processor or an RISC processor. An RISC processor runs compact, uniform instructions where the amount of work any single
instruction accomplishes is reduced. Such compact instructions allow effective compiler optimization and facilitate pipelining, typically leading to higher performance than CISC. As an overhead, however, RISC inevitably produces more lines of code than CISC. [11]
Wireless Sensor Networks
Wireless sensor network is a combination of large sensor nodes each can sense, process, and communicate with its peers so as to work together in a cooperative manner. A sensor network is consisting of thousands of battery processed sensors that collect data and transmit it further. Wireless sensor networks are occurring to be distributed at an accelerated structure. This is achieved by embedding numerous distributed sensor nodes into the physical world and networks so that they can coordinate to perform higher-level identification and tasks.[12]
Sensor networks collects the raw data monitored and provide basic information and decision for system. The following components appear in a sensor network: a central point for data collecting, assembly of deployed or localized sensors, an interrelated network, set of computing resources at the central point to handle data interaction, events or status query.
Sensors
Touch switch
A touch switch is a useful circuit that can be used to detect humans. It can be used to turn on an object. The touch switch relies on the “stray capacitance effect “of a human body from the sense plate to a lower potential, for example ground.
Figure 8 Touch Switch
Light/dark switch
The switch can be used in many sensing or alarm circuits. The following switch can detect an intruder passing through a light beam or a person moving through a normal ambivalent-light room by keeping the light constant.[13]
Figure 9 Light/ Dark Detector
Figure 10
The light sensor is a component that senses the ambient light level with an illumination value that can vary between 0 and 1024. The phototransistor used in following implementations is called PT15-21C / TR8, spectral adapted to visible or infrared emitting diodes. It has the following features: fast response time, high photo sensitivity, and low junction capability.
PT15-21C/TR8 is a phototransistor in miniature SMD package which is molded in a water clear with flat top view lens. The device is Spectrally matched to visible and infrared emitting diode.[14]
Figure 11 Light Sensor Brick
LED
Led is a component that emits light when the pin to its attached reads HIGH, and Low when it is not.
//Inițialization
#define RED 13
#define GREEN 12
void setup() {
/*…*/
//Led
pinMode(13, OUTPUT);
pinMode(12, OUTPUT);
pinMode(11, OUTPUT);
/*…*/
}
ESP8266
Figure 13 HUZZAH ESP8266 WIFI Microchip
The ESP8266 WiFi Module is a self contained SOC with integrated TCP/IP protocol stack, allowing any micro controller access to a WiFi network. [15] The ESP8266 processor from Espressif is an 80 MHz microcontroller with a full WiFi front-end (both as client and access point) and TCP/IP stack with DNS support as well.[16]
The HUZZAH ESP8266 is FCC certified and contains the ESP8266 chip with 64 KiB of instruction RAM, 96 KiB of data RAM, and 4 MB of QIO FLASH. The board has the following features: reset button, user button that can also put the chip into bootloading mode, red LED, level shifting on the UART and reset pin, 3.3V out, 500mA regulator, two diode-protected power inputs. At the is presented "FTDI" pinout so you can plug in an FTDI or console cable to upload software and read/write debugging information via the UART. To connect the module to a computer and FDTI cable is needed. Inside the cabled I use is a USB<->Serial conversion chip and at the end of the 36" cable are four wire – red power, black ground, white RX into USB port, and green TX out of the USB port. The power pin provides the 5V @ 500mA direct from the USB port and the RX/TX pins are 3.3V level for interfacing with the most common 3.3V logic level chipsets.[17] The ESP8266 requires 3.3V power voltage and peaks at 500mA or of current for small periods of time.
There are two inputs for the regulator, V+, which is on FTDI/serial header at the bottom edge, and VBat that have Schottky diodes and they can be connected at different voltages. There's a 3.3V output from the present on the 3V pin. Serial pins RX, the input into the module, and TX, input from the module are the serial control and bootloading pins. This ESP board has 9 GPIO of 3.3V logic in and out : #0, #2, #4, #5, #12, #13, #14, #15, #16 that are of general purpose and can be used for any sort of input or output. The 0, which does not have an internal pullup, and is also connected to both a mini tactile switch and red LED. Is used by the ESP8266 to determine when to boot into the bootloader. If the pin is held low during power-up it will start bootloading. Pin 2, connected to the blue LED that is near the WiFi antenna, has a pullup resistor connected to it and is also used to detect boot-mode. Pin 15, is also used to detect boot-mode, with a pulldown resistor connected to it. Pin 16 can be used to wake up out of deep-sleep mode. Pin4 and 5 are used for I2C SDA and SCL. There is also a single analog input pin called A0 that has a 1V maximum voltage.
Other pins used for controlling the microchip are: LDO ( enable pin for the regulator); RST ( the reset pin for the ESP8266, pulled high by default); EN (is the enable pin for the ESP8266, pulled high by default ).
ESP8266WiFi library
The ESP8266 WiFi library was developed based on the ESP8266 SDK, using all of the naming conventions.[16] The microchip works mostly as a device that connects to a WiFi network that is provided through an access point. The access point is recognized by its SSID. The library provides a wide variety of C++ methods and properties to configure these modes. In the mode of a soft access point the ESP8266 can provide a WiFi network for others, except for the fact that it has no interface to a wired network.
Proposed Solution
Earlier Implementation using GSM
For real life security situations, procedures and strategies are used. The procedures and strategies documents contain general security objectives and associated activities, risk situations thorough defined and evaluated, fundamental decisions to establish acceptable risk values, objectives, operations and maintenance regarding security of institution activities.
The main purpose of the project is protecting goods stored in a small area from intruders. The central unit had a GSM shield integrated that is able to maintain communication between alarm station and user’s mobile. The project had the following features: arm or disarm alarm, verify status of alarm, activate or deactivate sensors, change password. These changes can be done through SMS texting or locally on a keypad. It presents two sensors: a magnetic sensor (digital device) attached to a door or window to alert when the entrance is opened and a light sensor (analog device) to read whether a light switch was opened in the alarm area.
The GSM shield must be powered from an external source, which can offer between 700mA and 1000mA. The modem can draw up to 2A.
For the alarm unit to work, it must be fed to a DC source. The continuous power source applied to the project should preferably be a battery (s) that provides a voltage of at least 6 V for all hardware modules to work.
Figure 14 GSM Project Overview
Door Sensor
The sensor used only in this project is a magnetic sensor specially designed to alert when any latch is open. This type of switch is mainly used in home security systems. Preferably, a magnet is fixed to a window or door, and the other magnet is attached to the edge of the window or door. When the two parts are separated, the contact is broken and an alarm is triggered. Connecting to the Arduino board is done by setting the pins as INPUT_PULLUP. The circuit is based on the "internal pull-up" method. This method is useful because it does not use resistor and fewer threads. This "pull up" internal pulls the "weak" switch up to + 5V, so if the switch is open, it will have 5V on it and will record HIGH, otherwise LOW if preset. The pullup resistor value is around 50K and does not pull power.
Features
The first one is activating alarm.After the alarm system is turned on, initially, intrusion checking is turned off, and all the lights are off. To activate the alarm, both the keyboard and the mobile phone can be used. If you want to activate with your mobile phone, the user sends an SMS that contains the password value. If the password is correct, the user will receive the message that the alarm is activated, otherwise the "Error" message. For the keyboard case, enter the password by pressing the corresponding buttons then press the "#" button. To reset the password, the "*" button is activated. Disabling the alarm is done by the same methods, no matter how the alarm has been activated. The state of the alarm can be seen by checking the state of the blue LED.
All changes to scheduling related to the state of the sensors are made with the armed system. Once the alarm is activated, the sensor check is activated the same way. For various reasons, you may want to check the state of a deactivated sensor. In this case, using a mobile phone or keyboard, a very short message is sent to the control panel. For example, to turn the light sensor off or on, the alarm must be "B". Instead, the user receives the status message of the sensor verification after sending the option.
Once the alarm is activated, inrush detection is possible. If the alarm is triggered, the alarm status changes. When a sensor is turned on, the corresponding bulb lights up, prints on the sensor display that is triggered, and a message is sent to your mobile phone about 10 seconds until the alarm is turned off. Messages that appear on the display or SMS may be: "L open.", If the light sensor is triggered, "Sw opened." For the door, or "SW / L opened." For both. Before the message is sent, the ringer will be heard.
Changing the password can only be done using the keyboard. Once the alarm is activated, if you want to change the password, press the "C" button. "Schimb pass" will appear on the display, and a new 4-digit password will be inserted next to "NEW". With the reset button "*", the password change programming can be canceled. A last activity that the alarm can provide is to alert the remote user to the status of the alarm. If the mobile phone sends an SMS with the short text "S". Thus, the user can find out whether the alarm is armed or disarmed, and in the first case which sensors are activated.
Figure 15 Activating
Figure 17 Sensor Activated
The first disadvantages I’ve found making this project is that GSM communication is expensive since there is a monthly sim card pay. The second problem is unknown battery life. The client won’t be aware if the battery is depleted. A resolve is to calculate battery run time and add battery life indicator circuit.
Figure 18 GSM Project Schematic
System using ESP8266
Figure 19 WIFI Project Overview
Hardware Overview
This project contains the following parts: the microchip HUZZAH ESP8266 WIFI, a pushbutton, two LEDs, one green and the other red, and the light sensor. To upload code onto the board, a FTDI cable is needed. In the table and schematic from below, you can see all connections:
Before uploading code onto the board, it needs to be put into bootload mode. This is done after each upload. The first thing to be done is holding down the GPIO0 button, the red LED will be lit. While holding down GPIO0, click the RESET button then release it. The last step is to release GPIO0.To focus more onto the relationship between board and database, the keypad was switched with a simple pushbutton. In Arduino IDE, the software we use to write and upload code, the following configurations of board are put: 80 MHz as the CPU frequency and 115200 baud upload speed
Figure 20 WIFI Project Schematic
Implementation
In order to activate the alarm, the pushbutton must be switched to value HIGH. When this happens, the green led will turn on to signalize the fact that the alarm is turned on and is able to detect intrusion. As long as the green light is on, whenever the light sensor goes below a certain value, the alarm will go off. For this implementation, a red led will be turned on. The only option to disarm the alarm is to switch pushbuttons value back to LOW.
//If pushbutton is pressed, check is sensor activated
if (armat) {
int valoareIluminare = analogRead(LIGHT);
Serial.println(valoareIluminare, DEC);
Firebase.setInt("LIGHTStatus", valoareIluminare);
//Valoarea senzorului de lumina
if ((valoareIluminare < 15)) {
movement = true;
digitalWrite(RLED, HIGH);
}
}
else {
movement = false;
digitalWrite(RLED, LOW);
digitalWrite(GLED, LOW);
}
The main concept of this implementation is connecting to the internet. For this, the following lines of code must be added:
//Added ESP8266 Library
#include <ESP8266HTTPClient.h>
#include <ESP8266WiFi.h>
//Details of home WIFI connection
const char* ssid = "myssid";
const char* password = "mypassword";
const char* host = "host.com";
//In setup
// We start by connecting to a WiFi network
void setup() {
…
WiFi.begin(ssid, password);
while (WiFi.status() != WL_CONNECTED) {
delay(500);
Serial.print(".");
}
Serial.println("");
Serial.println("WiFi connected");
Serial.println("IP address: ");
Serial.println(WiFi.localIP());
Serial.print("Netmask: ");
Serial.println(WiFi.subnetMask());
Serial.print("Gateway: ");
Serial.println(WiFi.gatewayIP());
…
Figure 21 Serial Monitor for wifi connected succesfully
Firebase
Firebase is a mobile or web application development platform developed currently owned by Google. It provides a realtime database and backend as a service. The service provides application developers an API that allows application data to be synchronized across clients and stored on Firebase's cloud. Firebase provides client libraries that enable integration with Arduino applications. FirebaseArduino is a library to simplify connecting to the Firebase database from Arduino clients. The database is also accessible through a REST API and bindings for several JavaScript frameworks .The REST API use the Server-Sent Events protocol, which is an API for creating HTTP connections for receiving push notifications from a server. Developers using the realtime database can secure their data by using the company's server-side-enforced security rules. [21]
To use Firebase in this project, I first created a new database on the website, which has its own identification key(database secret). In the Arduino code the following lines of code are pasted:
#define FIREBASE_HOST "alarma01-2eccc.firebaseio.com"
#define FIREBASE_AUTH "jLCS4ycLMaZDgnviakUjowXG8vxlh7X8yQiOWQql"
To send value of sensors from board to database, the Firebase.setInt(String path, int value)
is used. It writes the integer value to the node located at path equivalent to the REST API’s PUT, path being the path inside of your database to the node you wish to update and value integer value that you wish to write. To change a sensor value from Firebase, you need to make sureFirebase.getInt(String path) method is written in code. After that, a simple change in database by clicking and manually enter a value will be transmitted to the board.
Figure 22 Service Account page
Figure 23 Alarm Armed
Figure 24 Activated Red Led
GSM versus ESP8266
Figures and tables list
Figure 1 [18]…………………………………………………………………………….. 7
Figure 2 ……………………………………………………………………………….. 10
Figure 3 ……………………………………………………………………………….. 10
Figure 4 ……………………………………………………………………………….. 10
Figure 5 [19]…………………………………………………………………………….. 13
Figure 6 [10]…………………………………………………………………………….. 14
Figure 7 [11]………………………………………………………………………….. 15
Figure 8 [13]………………………………………………………………………….. 18
Figure 9 [13]………………………………………………………………………….. 18
Figure 10 ……………………………………………………………………………….. 19
Figure 11 [20]……………………………………………………………………….. 19
Table 1 ……………………………………………………………………………….. 20
Table 2 ……………………………………………………………………………….. 20
Figure 12 [20]……………………………………………………………………….. 20
Figure 13 [17]…………………………………………………………………………….. 21
Figure 14 ……………………………………………………………………………….. 23
Figure 15 ……………………………………………………………………………….. 25
Figure 16 ……………………………………………………………………………….. 25
Figure 17 ……………………………………………………………………………….. 25
Figure 18 ……………………………………………………………………………….. 26
Figure 19 ……………………………………………………………………………….. 27
Table 3 ……………………………………………………………………………….. 27
Figure 20 ……………………………………………………………………………….. 28
Figure 21 ……………………………………………………………………………….. 28
Figure 22 ……………………………………………………………………………….. 30
Figure 23 ……………………………………………………………………………….. 31
Figure 24 ……………………………………………………………………………….. 32
Figure 25 ……………………………………………………………………………….. 32
References
[1] Alistair security website, http://www.alistar-security.ro/servicii/sisteme-de-alarma/
[2] Arunkumar , P. Maikkannan , M. Nitheiswaran , and N. Bagyalakshmi Microcontroller Based Home Security System Using Gsm Module
[3]https://eu.dlink.com/uk/en/products/dcs-930l-wireless-n-network-camera
[4]https://www.tenvis.com/product/list?t=0
[5] Intruder Alarms – European Standards https://www.aviva.co.uk/risksolutions/help/faq/answer/1725/
[6]http://static.fw1.biz/templates/16632/myimages/guidelines_for_en_50131_certification.pdf
[7] Douglas H. Rothenberg Alarm Management for Process Control 2009
[8] Ahmed ElShafee, Karim Alaa Hamed Design and Implementation of a WiFi Based Home Automation System
[9] Hsien-Tang Lin" Implementing Smart Homes with Open Source Solutions" International Journal of Smart Home Vol. 7, No. 4, July, 2013.pp 289-295.
[10] Mohamed Abd El-Latif Mowad, Ahmed Fathy, Ahmed Smart Home Automated Control System Using Android Application and Microcontroller International Journal of Scientific & Engineering Research, Volume 5, Issue 5, May-2014
[11] Xiaocong Fan Real-Time Embedded Systems Design Principles and Engineering Practices 2015 Elsevier Inc.
[12] Karwan Muheden Ebubekir Erdem Sercan Vançin Design and Implementation of the Mobile Fire Alarm System Using Wireless Sensor Networks
[13] Thomas Petruzzellis The alarm, sensors and security circuits cookbook
[14] Technical Data Sheet 1206 Package Phototransistor
[15] Stefan Ćirić, Implementation of client and server for control and interpretation of robot Karel
[16] https://learn.adafruit.com/adafruit-huzzah-esp8266-breakout?view=all
[17] https://www.adafruit.com/product/954
[18] By Toma Cristian, Cristian Ciurea and Ion Ivan – http://jmeds.eu/index.php/jmeds/article/view/105, CC BY 3.0, https://commons.wikimedia.org/w/index.php?curid=48377298
[19] ADT Security Choice. ADT home security benefits. http://securitychoice.com/adt-home-security-benefits.html.
[20] https://www.robofun.com/
[21] https://firebase.google.com/docs/database/
Annexes
Facultatea de Automatică și Calculatoare
EVALUAREA LUCRĂRII DE DISERTAȚIE DE CĂTRE CADRUL DIDACTIC CONDUCĂTOR ȘTIINȚIFIC
Student_______________________________________________________________________________
Titlul lucrării de disertație________________________________________________________________
_____________________________________________________________________________________
Tipul lucrării (cercetare, dezvoltare, inovare, aprofundare etc.)___________________________________
Programul de Master____________________________________________________________________
Cadrul didactic conducător științific*)______________________________________________________
*) se vor trece numele tuturor cadrelor didactice conducătoare, dacă e cazul
I. EVALUAREA SINTETICĂ A LUCRĂRII
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
DECLARAȚIE DE AUTENTICITATE A
LUCRĂRII DE FINALIZARE A STUDIILOR
Subsemnatul _____________________________________________________, legitimat cu _______________seria ________nr. ________________________, CNP _____________________autorul lucrării___________________________
________________________________________________________________ ________________________________________________________________ elaborată în vederea susținerii examenului de finalizare a studiilor de Master ________________________________________________________________
organizat de către Facultatea de Automatică și Calculatoare din cadrul Universității Politehnica Timișoara, sesiunea ____________________ a anului universitar________________________, luând în considerare conținutul art. 35 din RODED – UPT, declar pe proprie răspundere, că această lucrare este rezultatul propriei activități intelectuale, nu conține porțiuni plagiate, iar sursele bibliografice au fost folosite cu respectarea legislației române și a convențiilor internaționale privind drepturile de autor.
Timișoara,
Data Semnătura
_______________________ ______________________________
Declarația se completează „de mână” și se inserează în lucrarea de finalizare a studiilor, la sfârșitul acesteia, ca parte integrantă.
Facultatea de Automatică și Calculatoare
EVALUAREA LUCRĂRII DE DISERTAȚIE DE CĂTRE CADRUL DIDACTIC CONDUCĂTOR ȘTIINȚIFIC
Student_______________________________________________________________________________
Titlul lucrării de disertație________________________________________________________________
_____________________________________________________________________________________
Tipul lucrării (cercetare, dezvoltare, inovare, aprofundare etc.)___________________________________
Programul de Master____________________________________________________________________
Cadrul didactic conducător științific*)______________________________________________________
*) se vor trece numele tuturor cadrelor didactice conducătoare, dacă e cazul
I. EVALUAREA SINTETICĂ A LUCRĂRII
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Copyright Notice
© Licențiada.org respectă drepturile de proprietate intelectuală și așteaptă ca toți utilizatorii să facă același lucru. Dacă consideri că un conținut de pe site încalcă drepturile tale de autor, te rugăm să trimiți o notificare DMCA.
Acest articol: Faculty of Automation and Computers Master Program: Master of Information Technology Remote Monitoring of Alarm Embedded System Detection Using Alarm… [311610] (ID: 311610)
Dacă considerați că acest conținut vă încalcă drepturile de autor, vă rugăm să depuneți o cerere pe pagina noastră Copyright Takedown.
