Sunteți pe pagina 1din 9

1.

Literature Survey
Smart Home Automation using IOT :-1
Publisher: - Dhakad Kunal , Dhake Tushar , Undegaonkar Pooja , Zope Vaibhav,
Vinay Lodha
Publication :- International Journal of Advanced Research in Computer and
Communication Engineering Vol. 5, Issue 2, February 2016
The main objective of home automation and security is to help handicapped and
aged people that will enable them to control home appliances and alert them in
critical situations.

Securing IoT for Smart Home System:-2


Publisher: - Freddy K Santoso, and Nicholas C H Vun
Publication :- 2015 IEEE International Symposium on Consumer Electronics

(ISCE)
The IoT smart home system runs on conventional wifi network implemented based
on the AllJoyn framework, using an asymmetric Elliptic Curve Cryptography to
perform the authentications during system operation. A wifi gateway is used as the
center node of the system to perform the system initial configuration. It is then
responsible for authenticating the communication between the IoT devices as well
as providing a mean for the user to setup, access and control the system through
an Android based mobile device running appropriate application program..

Smart Homes System Using Internet-of-Things :-2


Publisher: - Mr. Pranay P. Gaikwad , Mrs. Jyotsna P. Gabhane
Publication: - 2015 INTERNATIONAL CONFERENCE ON COMPUTATION OF

POWER, ENERGY, INFORMATION AND COMMUNICATION


Smart homes are those where household devices/home appliances could monitor
and control remotely. When these household devices in smart homes connect with
the internet using proper network architecture and standard protocols, the whole
system can be called as Smart Home in loT environment or loT based Smart
Homes. Smart Homes ease out the home automation task. This paper presents not
only the problems and challenges come in loT and Smart homes system using loT
but also some solutions that would help to overcome on some problems and
challenges.

Enhanced Wireless Control System for Smoke and Fire


Detection :-2
Publisher: - Toufiqul Islam, Syed Asif Abdullah, and Golam Sarowar
Publication: - 2015 INTERNATIONAL CONFERENCE ON COMPUTATION OF

POWER, ENERGY, INFORMATION AND COMMUNICATION

This paper describes the design and engineering of a wireless control system for
smoke and fire detection with alarming provision, sms sending and fire
extinguishing by a vehicle.

A new embedded car theft detection system :-2


Publisher: - Zhixiong Liu
Publication: - Embedded Software and Systems, 2005. Second International

Conference on
Car theft was a growing problem in the early and mid 1980's. Solutions to the theft
problem are driven by customer and police wants, primarily concerned with the loss
of the vehicle, but also theft of contents and personal security, legal directives and
insurance requirements.

A collocation model for water-hammer dynamics with


application to leak detection:-2
Publisher: - L. Torres
Publication: - Decision and Control, 2008. CDC 2008. 47th IEEE Conference on
This paper presents a new model for so-called water hammer equations based on a
collocation method. This model is shown to fairly represent possible leak effects in a
pipeline and thus to be useful in the purpose of leak detection. This is illustrated in
simulation by an example of observer-based leak detector relying on this model.

An Improved Motion Detection Method for Real-Time


Surveillance:-2
Publisher: - Nan Lu, Jihong Wang, Q.H. Wu and Li Yang
Publication: - IAENG International Journal of Computer Science, 35:1,

IJCS_35_1_16
The temporal differencing is used to detect initial coarse motion areas for the
optical flow calculation to achieve real-time and accurate object motion detection.
The DBF method is used to obtain and keep a stable background image to cope
with variations on environmental changing conditions and is used to eliminate the
background interference information and separate the moving object from it. The
morphological processing methods are adopted and combined with the DBF to get
improved results.

Human Motion Detection using Background Subtraction


Algorithm:-2
Publisher: - R.S.Rakibe,Prof.B.D.Patil
Publication: - International Journal of Advanced Research inComputer Science

and Software Engineering

the purpose is to detect the moving human body from the background image in
video sequences, and for the follow-up treatment such as the target classification,
the human body tracking and behavior understanding, its effective detection plays
a very important role. Human motion analysis concerns the detection, tracking and
recognition of people behaviors, from image sequences involving humans.
According to the result of moving object detection research on video sequences,
this project presents a new algorithm for detecting moving objects from a static
background scene, to detect moving object based on background subtraction.

Motion Detection based on Multi Frame Video under


Surveillance System:-2
Publisher: - Neelam Patel
Publication: - IAENG International Journal of Computer Science, 35:1,

IJCS_35_1_16
In this paper a series of algorithm has been formed to track the feature of motion
detection under surveillance system.In this paper a pixel variant plays a vital role in
detection of moving frame of a particular clip.If there is a little bit motion in a file
then it is detected very easily by tracking pixel variance. This algorithm detects the
zero variation only when there is no motion in a frame clip. It is simple and easier
for motion detection in the frames of moving object having Avi file.In this paper we
enhanced the efficiency of tracking the moving object by implementing pixel base
displacement algorithm in the frame of object as the current and previous.

Motion Detection Based Multimedia Supported Intelligent


Video Surveillance System:-2
Publisher: - Zeljkovic, V. , Pokrajac, D
Publication: - 48th International Symposium ELMAR-2006,07-09 June

2006,Zadar,Croatia
An integrated multimedia supported intelligent video surveillance system is
proposed.The system is aimed to alleviate the disadvantages of the existing videosurveillance kits and provides advanced search,notification,visualization and
alarming functionality through integration of artificial intelligence,motion detection
and tracking technology,multimedia databases and Internet l cell phone
connectivity.The effectiveness and feasibility of the proposed concept is proven
through experimental results on areal-life video sequence.

2. Problem Definition with scope


When you leave your home then some suspicious activity doing in home, shop

to solve this security problem we introduce home based automation tool to Get
24-hour home security whether you're in home or not

3. Mathematical model
The LBP feature vector, in its simplest form, is created in the following manner:

Divide the examined window into cells (e.g. 16x16 pixels for each cell).

For each pixel in a cell, compare the pixel to each of its 8 neighbors (on its
left-top, left-middle, left-bottom, right-top, etc.). Follow the pixels along a
circle, i.e. clockwise or counter-clockwise.

Where the center pixel's value is greater than the neighbor's value, write
"0". Otherwise, write "1". This gives an 8-digit binary number (which is
usually converted to decimal for convenience).

Compute the histogram, over the cell, of the frequency of each "number"
occurring (i.e., each combination of which pixels are smaller and which are
greater than the center). This histogram can be seen as a 256dimensional feature vector.

Optionally normalize the histogram.

Concatenate (normalized) histograms of all cells. This gives a feature


vector for the entire window.

4. State Transition diagram

. Propose system design


a.

System architecture

1) Vibration sensor:We analyze the vibration in the door and sensor will recognize hammer.
It works on electromechanical principle vibration velocity sensors operate in
accordance with the electrodynamics principle and are used for measuring the bearing
absolute vibration based on the piezoelectric effect. Change in resistance due to the force
acting on itand converts it into 4 - 20 mA. they're measuring differences in oscillation, so they
probably want a -12 and +12swing with 0 as the base lines we have peizo electric sensor
which detects the vibration created on the surface

2) Microcontroller:Microcontroller collect output from vibration sensor and analyze the hammer
detection if recognize hammer then play the buzzer.
3) Feature Extraction:-Local binary patterns (LBP) is a type of visual
descriptor used for classification in computer vision. LBP is the particular
case of the Texture Spectrum model proposed in 1990. LBP was first
described in 1994. It has since been found to be a powerful feature for
texture classification; it has further been determined that when LBP is
combined with the Histogram of oriented gradients (HOG) descriptor, it
improves the detection performance considerably on some datasets.

4) Classification:- we classify the hammer detection using Support Vector


Machine. In machine learning, support vector machines (SVMs, also support
vector networks[1]) are supervised learning models with associated
learning algorithms that analyze data used for classification and regression
analysis. Given a set of training examples, each marked for belonging to one
of two categories, an SVM training algorithm builds a model that assigns new
examples into one category or the other, making it a nonprobabilistic binary linear classifier. An SVM model is a representation of the
examples as points in space, mapped so that the examples of the separate
categories are divided by a clear gap that is as wide as possible. New examples
are then mapped into that same space and predicted to belong to a category
based on which side of the gap they fall on.
In addition to performing linear classification, SVMs can efficiently perform a
non-linear classification using what is called the kernel trick, implicitly
mapping their inputs into high-dimensional feature spaces.

b. data flow diagram

C.UML diagram
Use Case Diagram

Sequence Diagram

6. System feature
a. functional requirements
General principles of requirements engineering is a distinction between requirements definitions
and requirements specifications. A software requirements definition is an abstract description of
the services which the system should provide and the constraints under which the system must
operate. And requirements de finition is probably the most important technique in structured
analysis. It is the only technique that permeates every step of the method. It also is one of the
least pictorial, making it difficult to describe precisely. In essence, the technique involves
capturing what the users really want and making sure that every subsequent project activity
leads to the best possible transformation of those user needs into system needs which, when
satisfied, will deliver what the users wanted in the first place.
1.

Sensor: - If a sensor is involved, it might be measuring the first vibrational movements of an

thief.
2.

Hammer Detection:
Sensor collect the data of vibration and microcontroller get that data and system will
analyze the sound of breaking the door or glass.
Input: - vibration
Output: - hammer detect or not
Pre conditions: - system will get the vibration data from sensor then it will be analyze
the hammer detection otherwise system in idle state.

B.non functional requirements


Non-functional requirements are requirements that are not directly concerned with the specific
functions delivered by the system. They may relate to emergent system properties such as
reliability, response time and store occupancy. They may specify system performance, security,

availability, and other emergent properties. This means that they are often more critical than
individual functional requirements. System users can usually find ways to work around a system
function that doesnt really meet their needs. However, failing to meet a non-functional
requirement can mean that the whole system is unusable. Non-functional requirements needed
in this internet banking system are identified as performance requirements, safety
requirements, security requirements and software quality attributes.
Performance Requirements
Increase Customer Satisfaction
Hammer Detection system must allows customers to access secure home security services 24
hours a day, 365 days a year with minimum downtime period for backup and maintenance.
Expand Product Offerings
The new services allows system to capture a larger percentage of their customers asset base.
The hammer detection system will provide facilities for customer to get new services.
Reduce Overall Costs
It will help to reduce a banks costs in two fundamental ways: it minimize the cost of maintain
watchman and reduces the availability in home.
Security Requirements
We understand that there is nothing more important than knowing
private

and

secure.

that

mailing

is

Therefore, we have applied the very latest in technology when

creating hammer detection we use java.


Safety Requirements
We maintain back up by using mailing system the data which is stored in cloud and that data
could not delete by any third party.

7.

Testing of problem statement

Using generated test data


b. using mathematical model
c. using GUI
d. using UML diagram

a.

S-ar putea să vă placă și