Sunteți pe pagina 1din 58

CHAPTER 1

1.1 INTRODUCTION
Fire is a phenomenon combustion manifested in light, flame, and heat. There are three
main elements required for fire to exist, these are; oxygen, heat and fuel. The proportion of
each of these elements determines the nature of the fire. With fire and some of its byproducts
being employed in a lot of useful applications such as cooking, power generation and the
manufacturing process, among others, it has the potential to also cause havoc. Fire related
loss of lives and properties continue to increase despite vigorous fire safety campaigns being
carried out by the public agencies. Even though a lot of safety measures are put in practice of
loss in lives in incurred due to fire accidents is increasing. This has led to a lot of novel
contributions in the field of fire detection.

We have developed Smart and hassle free method for detecting outbreak of fire. As soon
as fire is detected we sense the fire, smoke and flame if they are above the threshold value a
message is sent to the authorized person along with the location thus reducing the damage
and the loss .By using the Internet of things (IOT) we have created a global server where the
information is updated for every 20 seconds and discrepancies if any well be recorded thus
alarming the concerned person about the station time to time.

1.2 OBJECTIVE
The design of a logic based multi-sensor fire detection system and a web -based
notification system. A fuzzy logic system was implemented using an Arduino development
board with inputs from an MQ2 smoke sensor, an Lm 35 temperature sensor and a flame
sensor.

The output of the detection system is sent over SMS (Short Message Service) using a
SIM900 Global System for Mobile Communication (GSM) module to the web-based system
and the house owner or caretaker in real-time. With access granted to the web-based system,
the fire and rescue crew also get notified in real- time with location information.

1
1.3 MOTIVATION
According to the Center of Fire Statistics of the International Technical Committee
for the Prevention and Extinction of Fire (CTIF), between 70,000 and 80,000 deaths occur
annually due to fire outbreaks since the beginning of the 21st century. Prior to the
introduction of technology, fire detection was done mainly by visual inspection and
confirmation. This however changed during the late 1930s when Walter Jaeger accidentally
discovered a sensor which capable of detecting smoke thereby paving the way for research
into modern smoke sensors.

Smoke detectors are broadly categorized into photoelectric based and ionization
based detectors. The need to produce a more reliable fire detection system devoid of false
alarms has led to the adoption of a multi-sensor approaches. Unlike fire detection approaches
relying solely on smoke, this approach relies on the detection of more than one fire signature.
Due to the effectiveness and efficiency of multi sensor based fire detection systems, current
research on fire detection is largely focused on developing better algorithms and processing
techniques based on the data received from the sensors, thereby reducing false alarms.

1.4 BACKGROUND
Prior to the introduction of technology, fire detection was done mainly by visual
inspection and confirmation. With the advancement of technology various algorithms and
methods have been implemented to detect the fire and alert the concerned persons. Most
existing fire detection systems automatically actuate an audible alert via a siren or a strobe
light on detecting fire. Others however require manual actuation of the fire alarm using a
button or a break glass station. Remote notification has been done traditionally using the
Public Switched Telephone Network (PSTN). An emerging phenomenon in fire detection is
the use of multiple parameters and sensors in the detection mechanism. Fire is always
accompanied by smoke and flame so in order to reduce the number of false alarms both
smoke and fire are being sensed and concerned person is alarmed.

2
CHAPTER 2
2.1 PROJECT DESCRIPTION AND GOALS
The design and development of a fuzzy logic based multisensor fire detection system
and a web based notification system. Until recently, most consumer grade fire detection
systems relied solely on smoke detectors. The protection provided by these has been
established to be limited by the type of fire present and the detection technology at use. The
problem is further compounded by the lack of adequate alert and notification mechanisms. A
typical system relies on the physical presence of a human being to act on the alert. In
developing countries, poor planning and addressing negatively affects the fire and rescue
crews response time. To address this problem, a fuzzy logic system was implemented using
an Arduino development board with inputs from an MQ2 smoke sensor, a LM 35
temperature sensor, and a flame sensor. The output of the detection system is sent over short
message service (SMS) using a SIM800C global system for mobile communication (GSM)
module to the web-based system and the house owner or caretaker in real-time. With access
granted to the web-based system, the fire and rescue crew also get notified in real-time with
location information. A comparison between the efficiency of the notification system
employed by standard fire detectors and the multisensor remote-based notification approach
adopted in this paper showed significant improvements.

2.2 INTRODUCTION TO FUZZY LOGIC


Principle of Fuzzy logic System Zadeh introduced the idea of fuzzy set and symbolic
logic in 1965. Fuzzy logic is that the extension of the traditional two-valued logic to the
continue interval by adding the intermediate values between absolute true and absolute false.
A Fuzzy logic System (FLS) may be a non-linear mapping of Associate in input file into
Associate in nursing output data that consists of four steps: fuzzifier, fuzzy Interference, rule
and defuzzifier. The target of the FLS is to map the crisp input to the crisp output. Figure
given below is delineated the structure of the symbolic logic system.

To understand Fuzzy logic, the two sets of logic need to be mentioned. Crisp set is that the
membership operate solely takes a pair of values: zero or unity. Fuzzy set outlined on a
universe of discourse takes on values within the interval [0, 1]. Membership operate that's
typically denoted by the Greek letter p. ties variety to every component of the set, and
provides a live of the similarity of component during a crisp set to a fuzzy set.
3
RULES
INPUT OUTPUT
x x y=f(x) Y
FUZZIFIER DEFUZZIFIER

INFERENCE
FUZZY INPUT FUZZY OUTPUT
SETS SETS
s
Fig 2.1: The structure of fuzzy logic system.

Fuzzifier matches the crisp input x e X into fuzzy sets, that is any assortment of objects. The
grade of membership of range between 0 and 1 for all its members describes a fuzzy set.
Membership function will be either continuous or distinct. The membership functions are
determined by users based on their experiences. The foremost common functions are
triangular, trapezoidal that's a four-sided figure with one pair of parallel sides, piecewise
linear and Gaussian. The lot of membership functions are, the bigger resolutions are
achieved, and but, the higher process quality is required. Rules are explicated as a group of
IF-THEN statements and typically designed on high of skilled information. The linguistic
variables, that are quantified by a membership function, use words or sentences to explain the
system that has associate antecedent block (between the IF and THEN) and a sequent block
(following IF THEN).Inference engine computes fuzzy output sets by mapping the fuzzy
input sets through the collection of IF-THEN rules.

IF Xj is F (AND x2 is F [AND ... AND x, is F' THEN y is G',


Where x, is the crisp input, F' and G' are input and output fuzzy set respectively.
Defuzzifier, which is the opposite operation of Fuzzifier, converts the fuzzy output sets in to
crisp numbers. There are some commonly used defuzzifiers,
E.g. Maximum Defuzzifier, Centroid Defuzzifier, Height Defuzzifier etc. However no matter
which defuzzification approach is chosen, the most interesting characteristic of defuzzifier in
engineering application is the computational simplicity.

4
2.2.1 Linguistic Variables:

While variables in mathematics usually take numerical values, in symbolic logic


applications, the non-numeric are typically wont to facilitate the expression of rules and
facts.

A linguistic variable is young or its antonym old. However, the worth of linguistic
variables is that they will be changed via linguistic hedges applied to primary terms. These
linguistic hedges can be associated with certain functions.

Fuzzification operations will map mathematical input values into fuzzy membership
functions. And the opposite de-fuzzifying operations can be accustomed map a fuzzy output
membership functions into a crisp output value that may be then used for decision or
control functions.

2.2.2 Forming Of Consences And Input Fuzzy Logic:


Since the fuzzy system output may be an accord of all of the inputs and all of the
rules, fuzzy logic systems can be well behaved when input values aren't available or aren't
trustworthy. Weightings are often optionally supplementary to every rule in the rule base and
weightings can be used to regulate the degree to which a rule affects the output values. These
rule weightings are often supported the priority, reliability or consistency of every rule.
These rule weightings could also be static or are often modified dynamically, even primarily
based upon the output from different rules

2.3 FUZZY LOGIC PROCESS


1. It fuzzy all the input values into fuzzy membership functions and so on

2. It then executes all the applicable rules in the rule base to compute the fuzzy output
functions.

3. Then the De-Fuzzifying starts and the fuzzy output functions to get Crisp output values

5
2.4 HARD SCIENCE WITH IF-THEN RULES
Fuzzy set theory defines fuzzy operators on fuzzy sets. The problem in applying this is
that the appropriate fuzzy operator may not be known. For example, the logic for a simple
temperature regulator that uses a fan might look like this.
I. IF temperature IS very cold THEN stop fan

II. IF temperature IS cold THEN fan speed is slow

III. IF temperature IS warm THEN fan speed is moderate

IV. IF temperature IS hot THEN fan speed is high

Using this rule base and the previous Rules, we might expect the output fan speed to
be a combination of zero and moderate, which might be evaluated as some extent of slow
once the input value could be a combination of cold and warm and not hot. The fan speed can
still get slower because the input temperature gets colder till the input temperature is 100%
cold, 0.33 heat and 0.33 hot, at that purpose the output fan speed are going to be zero. as the
temperature input gets warmer and hotter, the output fan speed can still get quicker till the
input temperature is 0.33 cold, 0%warm and 100% hot, at that purpose the fan speed output
are going to be high.

If the fuzzy membership functions cover 100% of the input variable domain, then it may
be tested that the behavior of the fuzzy system is absolutely settled over the whole input
domain and obscurity ambiguous. This determinism is very necessary to be used in control
and decision systems.

There is no "ELSE" all of the rules are evaluated as a result of the temperature might be
"cold" and "normal" at a similar time to different degrees.

The AND, OR, and NOT operators of Boolean logic exist in fuzzy logic, typically
outlined because the minimum, maximum, and complement; when they are outlined this
way, they're referred to as the Zadeh operators.

So for the fuzzy variables x and y:

I. NOT x = (1 - truth(x))

II. x AND y = minimum(truth(x), truth(y))

III. x OR y = maximum(truth(x), truth(y))

6
2.4.1 Logical Analysis

In mathematical logic, there are several formal systems of "fuzzy logic"; most of
them belong among so-called t-norm fuzzy logic

2.4.2 Predicate Fuzzy Logics:


These extend the above-mentioned fuzzy logics by adding universal and existential
quantifiers in a manner similar to the way that predicate logic is created from propositional
logic. The semantics of the universal (resp. existential) quantifier in t-norm fuzzy logics is
the infimum of the truth degrees of the instances of the quantified sub formula.

2.5 Advantages of Fuzzy Logic:


Fuzzy logic is conceptually easy to understand.

The mathematical concepts behind fuzzy reasoning are very simple. Fuzzy logic is a

More intuitive approach without the far-reaching complexity.

Fuzzy logic is flexible. With any given system, it is easy to layer on more
functionality without starting again from scratch. Fuzzy logic is tolerant of imprecise
data.

Everything is imprecise if you look closely enough, but more than that, most things
are imprecise even on careful inspection. Fuzzy reasoning builds this understanding
into the process rather than tacking it onto the end.

Fuzzy logic can model nonlinear functions of arbitrary complexity. You can create a
fuzzy system to match any set of input-output data. This process is made particularly
easy by adaptive techniques like Adaptive Neuro-Fuzzy Inference Systems (ANFIS),
which are available in Fuzzy Logic Toolbox software.

Fuzzy logic can be built on top of the experience of experts. In direct contrast to
neural networks, which take training data and generate opaque, impenetrable models,
fuzzy logic lets you rely on the experience of people who already understand your
system.

Fuzzy logic can be blended with conventional control techniques. Fuzzy systems
don't necessarily replace conventional control methods. In many cases fuzzy systems
augment them and simplify their implementation.

7
Fuzzy logic is based on natural language. The basis for fuzzy logic is the basis for
human communication. This observation underpins many of the other statements
about fuzzy logic. Because fuzzy logic is built on the structures of qualitative
description used in everyday language, fuzzy logic is easy to use.

2.6 DISADVANTAGES OF FUZZY LOGIC:

1. Fuzzy logic is not a cure-all. When should you not use fuzzy logic? The safest
statement is the first one made in this introduction: fuzzy logic is a convenient way to
map an input space to an output space. If you find it's not convenient, try something
else. If a simpler solution already exists, use it. Fuzzy logic is the codification of
common sense. Use common sense when you implement it and you will probably
make the right decision. Many controllers, for example, do a fine job without using
fuzzy logic. However, if you take the time to become familiar with fuzzy logic, you'll
see it can be a very powerful tool for dealing quickly and efficiently with imprecision
and nonlinearity.

2. The rules of combining membership functions discussed above are known as


the minimax rule for conjunctive (AND) and disjunctive (OR) reasoning. These rules
have a major drawback: They are not robust at all. If we try to imitate the way
humans reason, the minimax rule is definitely not the way.

3. It has been proposed by Shashikala and Petrou that the membership functions are
allowed to take values higher than 1, up to a value that reflects the relative importance
between the different factors that are to be combined

2.7 APPLICATIONS OF FUZZY LOGIC


Data fusion technology uses in the industrial, household, and entertainment electronics
with the ability of controlling and adjusting the system and process to improve decision-
making, reduce resource consumption and increase performance. Fuzzy Logic System
improves the efficiency when the system has vague information and could not use the
traditional mathematical model to be accurately described. It provides sensor more human-
like thinking, noise-tolerant and increases the intelligence of the sensor network. The theory
of fuzzy logic is based on the notion of relative graded membership, as inspired by the
processes of human perception and cognition. Lotfi A. Zadeh published his first famous

8
research paper on fuzzy sets in 1965. Fuzzy logic can deal with information arising from
computational perception and cognition, that is, uncertain, imprecise, vague, partially true, or
without sharp boundaries. Fuzzy logic allows for the inclusion of vague human assessments
in computing problems. Also, it provides an effective means for conflict resolution of
multiple criteria and better assessment of options. New computing methods based on fuzzy
logic can be used in the development of intelligent systems for decision making,
identification, pattern recognition, optimization, and control.
1) Fuzzy logic is extremely useful for many people involved in research and
development including engineers (electrical, mechanical, civil, chemical, aerospace,
agricultural, biomedical, computer, environmental, geological, industrial, and
mechatronics), mathematicians, computer software developers and researchers,
natural scientists (biology, chemistry, earth science, and physics), medical
researchers, social scientists (economics, management, political science, and
psychology), public policy analysts, business analysts, and jurists.

2) Indeed, the applications of fuzzy logic, once thought to be an obscure mathematical


curiosity, can be found in many engineering and scientific works. Fuzzy logic has
been used in numerous applications such as facial pattern recognition, air
conditioners, washing machines, vacuum cleaners, antiskid braking systems,
transmission systems, control of subway systems and unmanned helicopters,
knowledge-based systems for multi objective optimization of power systems, weather
forecasting systems, models for new product pricing or project risk assessment,
medical diagnosis and treatment plans, and stock trading.

3) Fuzzy logic has been successfully used in numerous fields such as control systems
engineering, image processing, power engineering, industrial automation, robotics,
consumer electronics, and optimization. This branch of mathematics has instilled new
life into scientific fields that have been dormant for a long time.

4) Thousands of researchers are working with fuzzy logic and producing patents and
research papers. According to Zadehs report on the impact of fuzzy logic as of
March 4, 2013, there are 26 research journals on theory or applications of fuzzy logic,
there are 89,365 publications on theory or applications of fuzzy logic in the INSPEC
database, there are 22,657 publications on theory or applications of fuzzy logic in the
MathSciNet database, there are 16,898 patent applications and patents issued related

9
to fuzzy logic in the USA, and there are 7149 patent applications and patents issued
related to fuzzy logic in Japan.

5) The number of research contributions is growing daily and is growing at an


increasing rate. Zadeh started the Berkeley Initiative in Soft Computing (BISC), a
famous research laboratory at University of California, Berkeley, to advance theory
and applications of fuzzy logic and soft computing

6) It is used in Detection and elimination of a potential fire in engine and battery


compartments of hybrid electric vehicles

7) A novel fuzzy deterministic non controller type (FDNCT) system and an FDNCT
inference algorithm (FIA). The FDNCT is used in an intelligent system for detecting
and eliminating potential fires in the engine and battery compartments of a hybrid
electric vehicle. They also present the simulation results of the comparison between
the FIA and singleton inference algorithms for detecting potential fires and
determining the actions for eliminating them.

8) It can be used in compare various logic analysis methods and present results for a
hypothetical target classification scenario. They show how pre-processing can
reasonably preserve result confidence and compare the results between Boolean,
multi quantization Boolean, and fuzzy techniques.

9) In BDD, BNN, and FPGA on fuzzy techniques for rapid system analysis we can get
the look at techniques to simplify data analysis of large multivariate military sensor
systems.

10) A fuzzy inference system to automate crack detection and impact source
identification (CDISI) and present their work on a microchip for automated CDISI.

11) Method for multi crack detection of structure using a fuzzy Gaussian technique.

12) Innovative failure analysis approach that combines the flexibility of fuzzy logic with
the structural properties of stochastic Petri nets. This algorithm has a diverse range of
industrial applications.

13) Innovative mean-variance neural approach for group decision making in uncertain
situations. Provide a case study with the excluded-mean-variance approach that
shows that this approach can improve the effectiveness of qualitative decision making

10
by providing the decision maker with a new cognitive tool to assist in the reasoning
process.

14) Almost any control system can be replaced with a fuzzy logic based control system.
This may be overkill in many places however it simplifies the design of many more
complicated cases. So fuzzy logic is not the answer to everything, it must be used
when appropriate to provide better control. If a simple closed loop or PID controller
works fine then there is no need for a fuzzy controller. There are many cases when
tuning a PID controller or designing a control system for a complicated system is
overwhelming, this is where fuzzy logic gets its chance to shine.

15) One of the most famous applications of fuzzy logic is that of the Sendai Subway
system in Sendai, Japan. This control of the Nanboku line, developed by Hitachi,
used a fuzzy controller to run the train all day long. This made the line one of the
smoothest running subway systems in the world and increased efficiency as well as
stopping time. This is also an example of the earlier acceptance of fuzzy logic in the
east since the subway went into operation in 1988.

16) The most tangible applications of fuzzy logic control have appeared commercial
appliances. Specifically, but not limited to heating ventilation and air conditioning
(HVAC) systems. These systems use fuzzy logic thermostats to control the heating
and cooling, this saves energy by making the system more efficient. It also keeps the
temperature more steady than a traditional thermostat.

17) Another significant area of application of fuzzy control is in industrial automation.


Fuzzy logic based PLCs have been developed by companies like Moeller. These
PLCs, as well as other implementations of fuzzy logic, can be used to control any
number of industrial processes.

11
CHAPTER 3

3.1 TECHNICAL SPECIFICATIONS


For successful execution of my project we have used various hardware components as
well as software components. The hardware components include:
1. Arduino ATMEGA 3286P
2. LM 35 Temperature sensor,
3. MQ2 smoke sensor,
4. GSM Module
5. GPS Module,
6. Buzzer,
7. Internet of Things (IOT).

Introduction to Microcontroller:
Circumstances that we find ourselves in today in the field of microcontrollers had
their beginnings in the development of technology of integrated circuits. This development
has made it possible to store hundreds of thousands of transistors into one chip. That was a
prerequisite for production of microprocessors, and the first computers were made by adding
external peripherals such as memory, input-output lines, timers and other. Further increasing
of the volume of the package resulted in creation of integrated circuits. These integrated
circuits contained both processor and peripherals. That is how the first chip containing a
microcomputer, or what would later be known as a microcontroller came about.
Definition Of A Microcontroller
Microcontroller, as the name suggests, are small controllers. They are like single chip
computers that are often embedded into other systems to function as processing/controlling
unit. The key features of microcontrollers include:
Integration of Functionality
Microcontrollers sometimes are called single-chip computers because they have on-
chip memory and I/O circuitry and other circuitries that enable them to function as
small standalone computers without other supporting circuitry. Field
Programmability, Flexibility Microcontrollers often use EEPROM or EPROM as
their storage device to allow field programmability so they are flexible to use.

12
Once the program is tested to be correct then large quantities of microcontrollers can
be programmed to be used in embedded systems.
Easy to use
Assembly language is often used in microcontrollers and since they usually follow
RISC architecture, the instruction set is small. The development package of
microcontrollers often includes an assembler, a simulator, a programmer to "burn" the
chip and a demonstration board. Some packages include a high level language
compiler such as a C compiler and more sophisticated libraries. Most
microcontrollers will also combine other devices such as:
i. A Timer module to allow the microcontroller to perform tasks for certain time
periods.
ii. A serial I/O port to allow data to flow between the microcontroller and other
devices such as a PC or another microcontroller.
iii. An ADC to allow the microcontroller to accept analogue input data for
processing.

Fig 3.1: Showing a typical microcontroller device and its different subunits

Microcontrollers versus Microprocessors


Microcontroller differs from a microprocessor in many ways. First and the most
important is its functionality. In order for a microprocessor to be used, other components
such as memory, or components for receiving and sending data must be added to it. In short
that means that microprocessor is the very heart of the computer. On the other hand,
microcontroller is designed to be all of that in one. No other external components are needed

13
for its application because all necessary peripherals are already built into it. so, we save the
time and space.

1. Arduino - ATMEGA 328p


Introduction
The Arduino microcontroller is an easy to use yet powerful single board computer
that has gained considerable traction in the hobby and professional market. The Arduino Uno
is a microcontroller board based on the ATmega328 (datasheet). It has 14 digital input/output
pins (of which 6 can be used as PWM outputs), 6 analog inputs, a 16 MHz ceramic resonator,
a USB connection, a power jack, an ICSP header, and a reset button. It contains everything
needed to support the microcontroller; simply connect it to a computer with a USB cable or
power it with a AC-to-DC adapter or battery to get started.

The Uno differs from all preceding boards in that it does not use the FTDI USB-to-
serial driver chip. Instead, it features the Atmega16U2 (Atmega8U2 up to version R2)
programmed as a USB-to-serial converter. Revision 2 of the Uno board has a resistor pulling
the 8U2 HWB line to ground, making it easier to put into DFU mode. Revision 3 of the board
has the following new features:

Pin out: added SDA and SCL pins that are near to the AREF pin and two other new
pins placed near to the RESET pin, the IOREF that allow the shields to adapt to the
voltage provided from the board. In future, shields will be compatible both with the
board that use the AVR, which operate with 5V and with the Arduino Due that
operate with 3.3V. The second one is a not connected pin that is reserved for future
purposes.
i. Stronger RESET circuit.
ii. Atmega 16U2 replace the 8U2.
"Uno" means one in Italian and is named to mark the upcoming release of Arduino
1.0. The Uno and version 1.0 will be the reference versions of Arduino, moving
forward. The Uno is the latest in a series of the USB Arduino boards, and the
reference model for the Arduino platform for a comparison with previous versions,
see the index of Arduino boards.
a) The Arduino Uno can be powered via the USB connection or with an external
Power supply. The power source is selected automatically.
14
b) External (non-USB) power can come either from an AC-to-DC adapter (wall-
wart) or battery. The adapter can be connected by plugging a 2.1mm center-
positive plug into the board's power jack. Leads from a battery can be inserted
in the Gnd and Vin pin headers of the POWER connector.
c) The board can operate on an external supply of 6 to 20 volts. If supplied with
less than 7V, however, the 5V pin may supply less than five volts and the
board may be unstable. If using more than 12V, the voltage regulator may
overheat and damage the board. The recommended range is 7 to 12 volts.
The power pins are as follows:
VIN. The input voltage to the Arduino board when it's using an external power source
(as opposed to 5 volts from the USB connection or other regulated power source).
You can supply voltage through this pin, or, if supplying voltage via the power jack,
access it through this pin.
5V: This pin outputs a regulated 5V from the regulator on the board. The
board can be supplied with power either from the DC power jack (7 - 12V),
the USB connector (5V), or the VIN pin of the board (7-12V). Supplying
voltage via the 5V or 3.3V pins bypasses the regulator, and can damage your
board. We don't advise it.
3V3. A 3.3 volt supply generated by the on-board regulator. Maximum current draw
is 50 mA.
GND. Ground pins.

Fig 3.2: Arduino UNO Board

15
Pin Configurations of ATMEGA 328p

Fig 3.2.1: ATMEGA 328p pin diagram


Pin Descriptions
VCC Digital supply voltage.
GND Ground.
Port B (PB[7:0]) XTAL1/XTAL2/TOSC1/TOSC2 :
Port B is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for
each bit). The Port B output buffers have symmetrical drive characteristics with both
high sink and source capability. As inputs, Port B pins that are externally pulled low
will source current if the pull-up resistors are activated.
The Port B pins are tri-stated when a reset condition becomes active, even if the clock
is not running. Depending on the clock selection fuse settings, PB6 can be used as
input to the inverting Oscillator Amplifier and input to the internal clock operating
circuit.
Depending on the clock selection fuse settings, PB7 can be used as output from the
inverting Oscillator amplifier.
If the Internal Calibrated RC Oscillator is used as chip clock source, PB[7:6] is used
as TOSC[2:1] input
For the Asynchronous Timer/Counter2 if the AS2 bit in ASSR is set.
Port C is a 7-bit bi-directional I/O port with internal pull-up resistors (selected for
each bit).
Output buffers have symmetrical drive characteristics with both high sink and source
capability. As inputs, Port C pins that are externally pulled low will source current if

16
the pull-up resistors are activated. The Port C pins are tri-stated when a reset
condition becomes active, even if the clock is not running.
PC6/RESET
If the RSTDISBL Fuse is programmed, PC6 is used as an I/O pin. Note that the
electrical characteristics of PC6 differ from those of the other pins of Port C.
If the RSTDISBL Fuse is unprogrammed, PC6 is used as a Reset input. A low level on
this pin for longer than the minimum pulse length will generate a Reset, even if the
clock is not running. Shorter pulses are not guaranteed to generate a Reset.
The various special features of Port C are elaborated in the Alternate Functions of Port
C section.
Port D
Port D is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for
each bit). The Port D
Output buffers have symmetrical drive characteristics with both high sink and source
capability. As inputs, Port D pins that are externally pulled low will source current if
the pull-up resistors are activated. The Port D pins are tri-stated when a reset
condition becomes active, even if the clock is not running.
AVCC
AVCC is the supply voltage pin for the A/D Converter, PC [3:0], and PE [3:2]. It
should be externally connected to VCC, even if the ADC is not used. If the ADC is
used, it should be connected to VCC through a low-pass filter. Note that PC [6:4] use
digital supply voltage, VCC.
AREF :AREF is the analog reference pin for the A/D Converter
USB Over current Protection
The Arduino Uno has a resettable poly fuse that protects your computer's USB ports
from shorts and over current. Although most computers provide their own internal protection,
the fuse provides an extra layer of protection. If more than 500 mA is applied to the USB
port, the fuse will automatically break the connection until the short or overload is removed.
Physical Characteristics:
The maximum length and width of the Uno PCB are 2.7 and 2.1 inches respectively,
with the USB connector and power jack extending beyond the former dimension. Four screw
holes allow the board to be attached to a surface or case. Note that the distance between
17
digital pins 7 and 8 is 160 mil (0.16"), not an even multiple of the 100 mil spacing of the
other pins.

2. LM 35 Temperature sensor:
LM35 series sensors are precision integrated-circuit temperature sensors whose
output voltage is linearly proportional to the Celsius temperature. The LM35 requires no
external calibration since it is internally calibrated. The LM35 does not require any external
calibration or trimming to provide typical accuracies of 14C at room temperature and
34C over a full 55 to +150C temperature range.

Fig 3.3: LM 35 Temperature Sensor

The LM35s low output impedance, linear output, and precise inherent calibration
make interfacing to readout or control circuitry especially easy. It can be used with single
power supplies, or with plus and minus supplies. As it draws only 60 A from its supply, it
has very low self-heating, less than 0.1C in still air.

Features

Calibrated directly in Celsius (Centigrade)

Linear + 10.0 mV/C scale factor

0.5C accuracy guaranteed (at +25C)

Rated for full 55 to +150C range

Suitable for remote applications

Low cost due to wafer-level trimming


18
Operates from 4 to 30 volts

Less than 60 A current drain

Low self-heating, 0.08C in still air

Nonlinearity only 14C typical

Low impedance output, 0.1 W for 1 mA load

Fig 3.3.1: LM 35 Circuit Diagram

For each degree of centigrade temperature it outputs 10milli volts. ADC accepts the
output from LM35 and converts that data into digital form which is sent to microcontroller
for further processing.

2 MQ2 Gas Sensor:


In current technology scenario, monitoring of gases produced is very important. From
home appliances such as air conditioners to electric chimneys and safety systems at
industries monitoring of gases is very crucial. Gas sensors are very important part of such
systems. Small like a nose, gas sensors spontaneously react to the gas present, thus keeping
the system updated about any alterations that occur in the concentration of molecules at
gaseous state.

Gas sensors are available in wide specifications depending on the sensitivity levels,
type of gas to be sensed, physical dimensions and numerous other factors. This Insight covers
a methane gas sensor that can sense gases such as ammonia which might get produced from
methane. When a gas interacts with this sensor, it is first ionized into its constituents and is
then adsorbed by the sensing element. This adsorption creates a potential difference on the

19
element which is conveyed to the processor unit through output pins in form of current. The
MQ series of gas sensors use a small heater inside with an electro-chemical sensor. They are
sensitive for a range of gasses and are used indoors at room temperature. The output is an
analog signal and can be read with an analog input of the Arduino.

The MQ-2 Gas Sensor module is useful for gas leakage detecting in home and
industry. It can detect LPG, i-butane, propane, methane, alcohol, hydrogen and smoke.
Sensitive material of MQ-2 gas sensor is SnO2, which with lower conductivity in clean air.
When the target combustible gas exist, the sensors conductivity is higher along with the gas
concentration rising. Please use simple electro circuit, Convert change of conductivity to
correspond output signal of gas concentration. MQ-2 gas sensor has high sensitive to LPG,
Propane and Hydrogen, also could be used to Methane and other combustible steam, it is
with low cost and suitable for different application.

Fig 3.2: MQ2 Smoke Sensor

Character Configuration
Good sensitivity to Combustible gas in wide range

High sensitivity to LPG, Propane and Hydrogen

Long life and low cost Simple drive circuit


Application
Domestic gas leakage detector
Industrial Combustible gas detector

Portable gas detector


Structure and configuration of MQ -2 gas sensor is shown as fig(configuration
sensitive layer, measuring electrode and heater are fixed into a crust made by plastic and
20
stainless steel net, the heater providers necessary work conditions for work of sensitive
components. The enveloped MQ-2 has 6 pin, 4 of them are used to fetch signals, and other 2
are used for providing heating current.
Testing through calibration gas

Preheating the gas leak alarm for 10 minutes, making the calibrating gas
concentration according to volume proportion, put the gas leak alarm in the calibrated gas.
After 10 seconds, the gas sensor sensing the gas adequately, then adjust the RP slightly to
make buzzer sound exactly and RED LED light, the calibration will be completed after
repeated it several times.

Installation

If the detected gas is LPG, butane and propane which is heavier than normal air,
install the gas leak alarm about 1.00 meter above the ground, adversely, for the natural gas,
methane, coal gas, CO and H2, which is lighter than the normal air, install gas leak alarm 1
meter below the roof, both of them are should be with good air circulation.

Sensitivity Adjustment

Resistance value of MQ-2 is difference to various kinds and various concentration


gases. So when using this components, sensitivity adjustment is very necessary. we
recommend that you calibrate the detector for 1000ppm liquefied petroleum gas <LPG> ,or
1000ppm iso-butane <i-C4H10> concentration in air and use value of Load resistance that(
RL) about 20 K(5K to 47 K). When accurately measuring, the proper alarm point for
the gas detector should be determined after considering the temperature and humidity
influence.

21
4. Flame Sensor:
Introduction

This module is sensitive to the flame and radiation. It also can detect ordinary light
source in the range of a wavelength 760nm-1100 nm. The detection distance is up to 100 cm.
The Flame sensor can output digital or analog signal. It can be used as a flame alarm or in
firefighting robots. These types of sensors are used for short range fire detection and can be used
to monitor projects or as a safety precaution to cut devices off / on. This unit is mostly accurate up
to about 3 feet. The flame sensor is very sensitive to IR wavelength at 760 nm ~ 1100 nm light.
Analog output (A0): Real-time output voltage signal on the thermal resistance. Digital output (D0):
When the temperature reaches a certain threshold, the output high and low signal threshold
adjustable via potentiometer.

Pins

VCC...... Positive voltage input: 5v for analog 3.3v for Digital.


A0.......... Analog output
D0......... Digital output
GND..... Ground

Fig 3.3: Flame Sensor

Applications

This module can be applied to fire detection system, fire-fighting robot, fire alarm system,
etc.

22
5. Buzzer
A BUZZER or BEEPER is an audio signaling device which may
be mechanical, electromechanical, or piezoelectric. Typical uses of buzzers and beepers
include alarm devices, timers, and confirmation of user input such as a mouse click or
keystroke. Here we use a ceramic piezoelectric buzzer plate for vibration detection. Piezo
ceramic buzzers generate sound through the bending vibrations of a thin metal plate adhered
to a piezo ceramic disc.These buzzers feature low power consumption, a safe, spark-free,
non-contact structure, a small size and light weight for an easy mounting to printed circuit
boards. As a result, a 38 increasing number of piezo ceramic buzzers are now used to
generate an artificial voice in combination with voice synthesizing ICs.

To produce high quality piezo ceramic buzzers, FDK has capitalized on many years
of piezo ceramics production and outstanding ceramic processing technologies and thin film
forming techniques. By adding a sophisticated audio know-how to this manufacturing
expertise, FDK offers a large array of electronic tone generating products, such as piezo
ceramic diaphragms, sounders and buzzers, to meet loud sound outputs, wide frequency
ranges and many other requirements.

Fig 3.4: Buzzer


We will be fixing this vibrator detector to each side of the vehicle so that when the
vehicle is met with an accident or if it hits any object, it can be detected. The arrangement of
this sensor in our project is as shown in the figure above which is sensed by the
microcontroller. After sensing the signal, the corresponding action is done by the
microcontroller which is preprogrammed.

23
6. GSM Module:
Definition: Global system for mobile communication (GSM) is globally accepted standard
for digital cellular communication. GSM is the name of a standardization group established
in 1982 to create a common European mobile telephone standard that would formulate
specifications for a pan-European mobile cellular radio system operating at 900 MHz

Fig 3.5: GSM Modem

GSM History

WE have developed a lot in the last three decades we have seen telephones with a
wired connection to smart phones through which we can even have a conversation through
cameras. An important component of all these communication devices is the GSM module.
GSM module are widely available in the market at good prices and are highly reliable. GSM
module provides a feature rich with applications such as text messages, calling, using internet
services. The first telephones introduced were the analog ones with a lot of wired network.
They used frequency modulated carries for voice channel transmissions. They never had a
feature like text messaging, using internet services. With the advancements in technology
these old and outdated machines have almost replaced by wireless mobile network which are
more reliable, robust and easy to handle. The major components of the mobile network is
GPS, GSM module through communication is done.

Finally in the mid 1992 GSM became available and the real launch took place in the
latter part of that year. Though it is a new service many people were skeptical as analogue
systems were still in use. By the end of the year 1993 GSM had successfully attracted over a
million subscribers and there were nearly 25 roaming agreements in place. The growth is
continuing day by day and decade by decade and continues to be on. Meanwhile the analogue
systems are also in use and continue to be on due their easiness and usability. When

24
developed GSM was intended to operate on frequencies in the 900MHZ cellular band. In
September 1993 British operators launched a network which operated in quite new
frequencies in a new band 1800MHZ. with the introduction in new frequency further
competition was introduced between the cellular companies further which increased the
capacity in now as such. This trend was followed in many countries, and soon the term DCS
1800 was dropped in favor of calling it GSM as it was purely the same cellular technology
but operating on a different frequency band .Now GSM is being used by most of the mobile
users globally with CDMA next to it. Even now a lot of research activities are being done in
this field and in future many changes can be seen making it much more reliable.

Fig 3.5.1: GSM Module

Circuit Diagram

Fig 3.5.2: GSM Circuit diagram

25
GSM Applications

GSM is used in a lot of application is day to day life right from major and robust
industries to small buildings such as apartments. They include

1. Pumping stations
2. Weather stations
3. Process industries
4. Transformer stations
5. Base stations and many more.

Specifications and characteristics for GSM

The specifications and characteristics for GSM are

1. Frequency band- The frequency range specified for GSM is 1,850 to 1,990 MHz

2. Duplex distance the duplex distance is 80 MHz. Duplex distance is the distance
between the uplink and downlink frequencies. A channel has two frequencies, 80
MHz apart.

3. Channel separationthe separation between adjacent carrier frequencies. In GSM,


this is 200 kHz.

4. ModulationModulation is the process of sending a signal by changing the


characteristics of a carrier frequency. This is done in GSM via Gaussian minimum
shift keying (GMSK).

5. Transmission rateGSM is a digital system with an over-the-air bit rate of 270


kbps.

6. Access methodGSM utilizes the time division multiple access (TDMA) concept.
TDMA is a technique in which several different calls may share the same carrier.
Each call is assigned a particular time slot.

7. Speech coderGSM uses linear predictive coding (LPC). The purpose of LPC is to
reduce the bit rate. The LPC provides parameters for a filter that mimics the vocal
tract. The signal passes through this filter, leaving behind a residual signal. Speech is
encoded at 13 kbps.

26
7. GPS TECHNOLOGY
The Global Positioning System (GPS) is a satellite based navigation system that sends
and receives radio signals. A GPS receiver acquires these signals and provides the user with
information. Using GPS technology, one can determine location, velocity and time, 24 hours
a day, in any weather conditions anywhere in the world for free. GPS was formally known as
the NAVSTAR (Navigation Satellite Timing and Ranging). Global Positioning System was
originally developed for military. Because of its popular navigation capabilities and because
GPS technology can be accessed using small, inexpensive equipment, the government made
the system available for civilian use.

The USA owns GPS technology and the Department of Defense maintains it. It
provides reliable positioning, navigation, and timing services to worldwide users on a
continuous basis in all weather, day and night, anywhere on or near the Earth. Once upon a
time when the technology was under developed people had to undergo pretty extreme
measures from getting lost and even in finding the lost ones was a difficult business, knowing
the exact location of some areas or places, calculating distances between places were a few of
the difficult tasks. But these all activities have now become simpler with the help of a pocket
sized gadget which helps you to tell the exact location or place where you are or where
someone is without using any landmark of monuments nearby. This all activities have been
made easy with the help of GPS module. As long as you have a GPS receiver and clear view
of the sky, you will never be lost or find difficulties in locating position.

Fig 3.6: GPS Module

27
A GPS receivers job is to locate four or more of the 24-27 satellites placed which
help in finding the position. These figure out the distance to each, and use this information to
deduce its own location. This operation is based on simple mathematical operation called
trilateration. In simple words trilateration is nothing but gathering information from all
reliable sources until we get enough information to know about a thing exactly.

A GPS receiver must be linked to at least two satellites to calculate the position of an
object in 2D view (latitude and longitude) and track an object or peoples movement. With
the increase in number of satellites more information can be known. With four or more
satellites in view, the receiver can determine the users three dimensional position (latitude,
longitude, altitude). In any view whether it may be a 2D or 3D once the position is
determined other parameters such as speed, bearing, track, trip distance and many more
parameters can be determined.

How GPS Works

GPS is funded by and controlled by the U. S. Department of Defense (DOD). While


there are many thousands of civil users of GPS worldwide, the system was designed for and
is operated by the U. S. military. GPS provides specially coded satellite signals that can be
processed in a GPS receiver, enabling the receiver to compute position, velocity and time.
Four GPS satellite signals are used to compute positions in three dimensions and the time
offset in the receiver clock.
Determining Position

Upon taking in all available satellite signals, the receiver compares the time that the
satellite sent the signal to the time it was received for each of the available signals.

Fig 3.6.1: Determining the position using GPS


28
Tri lateralization (similar to triangulation) then calculates the position by comparing the
difference among the signals.

Operating Principles

The basis of the GPS technology is a set of 24 satellites that are continuously orbiting
the earth. These satellites are equipped with atomic clocks and send out radio signals as to
the exact time and their location. These radio signals from the satellites are picked up by the
GPS receiver. Once the GPS receiver locks on to four or more of these satellites, it can
triangulate its location from the known positions of the satellites. Regarding the issue of time,
UTC time is the basis of all GPS time functions and calculations. The receiver updates itself
from the atomic clocks on the satellites. It is also very important to understand that the
receiver must know the time difference between the user location and of Greenwich England
or UTC time. This is a function in the set-up of all GPS receivers. With many GPS
manufacturers, this is referred to as Offset which is referring to the offset or difference in
time zones from the present location to UTC time.

GPS Calculations
At a particular time (let's say midnight), the satellite begins transmitting a long,
digital pattern called a pseudo-random code. The receiver begins running the same digital
pattern also exactly at midnight. When the satellite's signal reaches the receiver, its
transmission of the pattern will lag a bit behind the receiver's playing of the pattern. The
length of the delay is equal to the signal's travel time. The receiver multiplies this time by the
speed of light to determine how far the signal travelled. Four spheres that all intersect at one
point can be drawn. Three spheres will intersect even if the given numbers are way off, but
four spheres will not intersect at one point if measured incorrectly. Since the receiver makes
all its distance measurements using its own built-in clock, the distances will all be
proportionally incorrect.

GPS Applications
One of the most significant and unique features of the Global Positioning Systems is the
fact that the positioning signal is available to users in any position worldwide at any time.
With a fully operational GPS system, it can be generated to a large community of likely to

29
grow as there are multiple applications, ranging from surveying, mapping and navigation to
GIS data capture. The GPS will soon be a part of the overall utility of technology.
There are countless GPS applications, a few important ones are covered in the following
section.
Surveying and Mapping
Navigation
Remote Sensing and GIS
Geodesy
Military
MAX232 3.6.1
Introduction
The MAX232 is a dual driver/receiver that includes a capacitive voltage generator to
supply TIA/EIA-232-F voltage levels from a single 5-V supply. Each receiver converts
TIA/EIA-232-F inputs to 5-V TTL/CMOS levels. These receivers have a typical threshold of
1.3 V, a typical hysteresis of 0.5 V, and can accept 30-V inputs. Each driver converts
TTL/CMOS input levels into TIA/EIA-232-F levels.

Pin Diagram
The MAX232 from MAXIM was the first IC which in one package contains the
necessary drivers (two) and receivers (also two), to adapt the RS-232 signal voltage levels to
TTL logic. It became popular, because it just needs one voltage (+5V) and generates the
necessary RS-232 voltage levels (approx. -10V and +10V) internally. This greatly simplified
the design of circuitry. Circuitry designers no longer need to design and build a power supply
with three voltages (e.g. -12V, +5V, and +12V), but could just provide one +5V power
supply.

Fig 3.6.2: MAX 232 Pin Diagram


30
RS232
The USB to RS232 serial communications interface provides RS232 serial
communication interfaces to computers with USB support.RS-232 full duplex serial port
furnished with a 9 pin D-type male connector similar to which can be found on back of PC.
The port is fully configured with two data, six control I/O lines and one signal return.

Fig 3.6.3: Pin Diagram of RS 232

USB to RS232 Converter is an intelligent module which connects to a PC Universal


Serial Bus port providing a high-speed asynchronous RS-232 serial port. The USB-232
Converter provides easy connectivity between the PC and standard communicating ports, not
requiring PC reconfiguration.

System Requirements
A PC with a minimum of a 75MHz Pentium, or equivalent
A minimum of 16M bytes of RAM
One available USB type port compliant with USB1.1
Drivers are included on our software CD
Supported Operating Systems: Windows 2000/XP/Server 2003/Vista (v5.0),
Macintosh OSX, Macintosh 9, Linux 2.4, Linux 2.6
Features
Computer interface: USB V1.1 or USB 2 Plug and Play.
Operational system virtual serial port driver.
Supports Windows 98/ME/XP/2000/CE, MAC & Linux 2.4.20 or superior.
Transmission rate: from 75 bps to 6Mbps.

31
8. Internet of Things (IOT):
The internet of things (IOT) is the network of physical devices, vehicles, buildings
and other items embedded with electronics, software, sensors, actuators, and network
connectivity that enable these objects to collect and exchange data. In 2013 the Global
Standards Initiative on Internet of Things (IOT-GSI) defined the IOT as "the infrastructure of
the information society. The IOT allows objects to be sensed and controlled remotely across
existing network infrastructure, creating opportunities for more direct integration of the
physical world into computer-based systems, and resulting in improved efficiency, accuracy
and economic benefit. When IOT is augmented with sensors and actuators, the technology
becomes an instance of the more general class of cyber-physical systems, which also
encompasses technologies such as smart grids, smart homes, intelligent
transportation and smart cities. Each thing is uniquely identifiable through its embedded
computing system but is able to interoperate within the existing Internet infrastructure.
Experts estimate that the IOT will consist of almost 50 billion objects by 2020.

Internet of Things (IOT) is an environment in which objects, animals or people are


provided with unique identifiers and the ability to transfer data over a network without
requiring human-to-human or human-to-computer interaction. IOT board featured with
SIM900 GPRS modem to activate internet connection also equipped with a controller to
process all input UART data to GPRS based online data. Data may be updated to a specific
site or a social network by which the user can able to access the data.

Fig3.7: IOT Module

32
FEATURES:

Power Supply: DC +12v 1Amp

Auto data updating: 30sec

Digital Output port Pins: +5V DC Provided with 3 links

Data updating to a specific web site

Device controlling web site

Data updating to a social network

INFRASTRUCTURE:
The Internet of Things will become part of the fabric of everyday life. It will become
part of our overall infrastructure just like water, electricity, telephone, TV and most recently
the Internet. Whereas the current Internet typically connects full-scale computers, the Internet
of Things (as part of the Future Internet) will connect everyday objects with a strong
integration into the physical world.

1. Plug and Play Integration


If we look at IOT-related technology available today, there is a huge heterogeneity. It
is typically deployed for very specific purposes and the configuration requires significant
technical knowledge and may be cumbersome. To achieve a true Internet of Things we need
to move away from such small-scale, vertical application silos, towards a horizontal
infrastructure on which a variety of applications can run simultaneously.
2. Infrastructure Functionality
The infrastructure needs to support applications in finding the things required.An
application may run anywhere, including on the things themselves. Finding things is not
limited to the start-up time of an application. Automatic adaptation is needed whenever
relevant new things become available, things become unavailable or the status of things
changes. The infrastructure has to support the monitoring of such changes and the adaptation
that is required as a result of the changes.
3. Physical Location and Position
As the Internet of Things is strongly rooted in the physical world, the notion of
physical location and position are very important, especially for finding things, but also for

33
deriving knowledge. Therefore, the infrastructure has to support finding things according to
location (e.g. geo-location based discovery). Taking mobility into account, localization
technologies will play an important role for the Internet of Things and may become
embedded into the infrastructure of the Internet of Things.
4. Security and Privacy
In addition, an infrastructure needs to provide support for security and privacy
functions including identification, confidentiality, integrity, non-repudiation authentication
and authorization. Here the heterogeneity and the need for interoperability among different
ICT systems deployed in the infrastructure and the resource limitations of IOT devices (e.g.,
Nano sensors) have to be taken into account.
5. DATA MANAGEMENT
Data management is a crucial aspect in the Internet of Things. When considering a
world of objects interconnected and constantly exchanging all types of information, the
volume of the generated data and the processes involved in the handling of those data
become critical. A long-term opportunity for wireless communications chip makers is the rise
of Machine-to-Machine (M2M) computing, which one of the enabling technologies for
Internet of Things. This technology spans abroad range of applications. While there is
consensus that M2M is a promising pocket of growth, analyst estimates on the size of the
opportunity diverge by a factor of four Conservative estimates assume roughly 80 million to
90 million M2M units will be sold in 2014, whereas more optimistic projections forecast
sales of 300 million units. Based on historical analyses of adoption curves for similar
disruptive technologies, such as portable MP3 players and antilock braking systems for cars,
it is believed that unit sales in M2M could rise by as much as a factor of ten over the next
five years. There are many technologies and factors involved in the data management
within the IOT context. Some of the most relevant concepts which enable us to understand
the challenges and opportunities of data management are:
Data Collection and Analysis
Big Data
Semantic Sensor Networking
Virtual Sensors
Complex Event Processing.

34
APPLICATION AREAS:
In the last few years the evolution of markets and applications, and therefore their
economic potential and their impact in addressing societal trends and challenges for the next
decades has changed dramatically. Societal trends are grouped as: health and wellness,
transport and mobility, security and safety, energy and environment, communication and e-
society. These trends create significant opportunities in the markets of consumer electronics,
automotive electronics, medical applications, communication, etc. The applications in these
areas benefit directly by the More-Moore and More-than-Moore semiconductor technologies,
communications, networks, and software developments.
1. Cities
Smart Parking: Monitoring of parking spaces availability in the city.
Structural health: Monitoring of vibrations and material conditions in buildings,
bridges and historical monuments.
Noise Urban Maps: Sound monitoring in bar areas and centric zones in real time.
Traffic Congestion: Monitoring of vehicles and pedestrian levels to optimize
driving and walking routes.
Smart Lightning: Intelligent and weather adaptive lighting in street lights.
Waste Management: Detection of rubbish levels in containers to optimize the trash
collection routes.
Intelligent Transportation Systems: Smart Roads and Intelligent Highways with
warning messages and diversions according to climate conditions and unexpected
events like accidents or traffic jams.
2. Environment
Forest Fire Detection: Monitoring of combustion gases and preemptive fire
Conditions to define alert zones.
Air Pollution: Control of CO2 emissions of factories, pollution emitted by cars and
Toxic gases generated in farms.
Landslide and Avalanche Prevention: Monitoring of soil moisture, vibrations and
earth density to detect dangerous patterns in land conditions.
Earthquake Early Detection: Distributed control in specific places of tremors.
3. Water
Water Quality: Study of water suitability in rivers and the sea for fauna and
Eligibility for drinkable use.
35
Water Leakages: Detection of liquid presence outside tanks and pressure variations
Along pipes.
River Floods: Monitoring of water level variations in rivers, dams and reservoirs.
4. Energy Smart Grid, Smart Metering
Smart Grid: Energy consumption monitoring and management.
Tank level: Monitoring of water, oil and gas levels in storage tanks and cisterns.
Photovoltaic Installations: Monitoring and optimization of performance in solar
energy plants.
Water Flow: Measurement of water pressure in water transportation systems.
Silos Stock Calculation: Measurement of emptiness level and weight of the goods.
5. Security & Emergencies
Perimeter Access Control: Access control to restricted areas and detection of
People in non-authorized areas.
Liquid Presence: Liquid detection in data centers, warehouses and sensitive
Building grounds to prevent break downs and corrosion.
Radiation Levels: Distributed measurement of radiation levels in nuclear power
Stations surroundings to generate leakage alerts.
Explosive and Hazardous Gases: Detection of gas levels and leakages in industrial
environments, surroundings of chemical factories and inside mines.
6. Industrial Control
M2M Applications: Machine auto-diagnosis and assets control.
Indoor Air Quality: Monitoring of toxic gas and oxygen levels inside chemical
plants to ensure workers and goods safety.
Temperature Monitoring: Control of temperature inside industrial and medical
Fridges with sensitive merchandise.
Vehicle Auto-diagnosis: Information collection from CAN Bus to send real time
alarms to emergencies or provide advice to drivers.
7. Agriculture
Wine Quality Enhancing: Monitoring soil moisture and trunk diameter in
vineyards to control the amount of sugar in grapes and grapevine health.
Green Houses: Control micro-climate conditions to maximize the production of
fruits and vegetables and its quality.
Meteorological Station Network: Study of weather conditions in fields to forecast
36
ice formation, rain, drought, snow or wind changes.
Compost: Control of humidity and temperature levels in alfalfa, hay, straw, etc. to
prevent fungus and other microbial contaminants.
8. Domestic & Home Automation
Energy and Water Use: Energy and water supply consumption monitoring to
Obtain advice on how to save cost and resources.
Remote Control Appliances: Switching on and off remotely appliances to avoid
Accident and save energy.
Intrusion Detection Systems: Detection of window and door openings and
violations to prevent intruders.
9. E Health
Fall Detection: Assistance for elderly or disabled people living independent.
Medical Fridges: Control of conditions inside freezers storing vaccines,
medicines And organic elements.
Sportsmen Care: Vital signs monitoring in high performance centres and fields.
Patients Surveillance: Monitoring of conditions of patients inside hospitals and in
old peoples home.
Ultraviolet Radiation: Measurement of UV sun rays to warn people not to be
exposed in certain hours.

PIN CONFIGURATION:
J10- 8 Digital Outputs
J11- 8 Channels ADC inputs
J13- 8 Digital Inputs
J1- Network Status LED
J7- Power Supply out (+5v DC)

Input Specifications:
Power Supply: DC +12v 1Amp.
Baud Rate : 9600
ADC : 0-5V DC Analog Input

37
Format : * message or Data # (Start with * and End with #) Enter $ for help- you
can get webpage details and control page of the board

Fig 3.7.1: IOT Module Pin Configuration

Output Specifications:
o Digital Output port Pins: +5V DC

Features:
Dedicated Webpage and face book community page will be provided for every board.
Network connectivity status.
Applications:
o Online Traffic monitoring
o Online Health monitoring
o Real time Transport and Logistics monitoring
o Daily life and domestics

38
Sample Webpage:

Fig 3.7.2: Web Page

39
CHAPTER 4
4.1 DESIGN AND IMPLEMENTATION OF FIRE DETECTION
ALGORITHM USING FUZZY LOGIC SYSTEM

Robust and intelligent data fusion techniques mine hidden patterns in the sensor data
to improve event detection rate and eliminate the erroneous readings. As the previous
mentioned researches are emphasized on multi sensor scenarios assisted by the data
processing techniques, some recently papers examine the impact of the single features
(sensors). Previous researches show combination of temperature sensor, ionization detector
and CO detector increases the accuracy of the fire detection and decreases the nuisance report
from the real fire based on the threshold basis fire detections.
Benefits from the new technologies enables the ability for sensor node to integrate a
mini-Operation System as well as simple computing capabilities. Fuzzy Logic and FFNN
have proved that less computation complexities could fit the energy and memory restricted
sensor networks. Recently studies incorporate the data mining technique into the fire
detection system to improve the results. However they all inherit the multi-sensor setup.
Using the Fuzzy Logic System, less features means simpler computation. In order to simplify
computation, we present the algorithm, which only involves temperature sensor with the
assistance of the Fuzzy Logic engine to combine the neighbor's observation. Also we have
expanded the comparison between two consecutive readings to the five continuous readings
to characterize the temperature development. The temperature sensors we have used are
homogenous, the simplest and the cheapest sensor. A sensor knows its exact location
parameters. The algorithm consists of two criteria: temperature criterion and neighborhood
agreement. The sensor is periodically checking environmental parameters.
The traditional threshold basis algorithm is to either check if the temperature exceeds
the predefined threshold or if the temperature changes between the current reading and the
previous reading exceeds the predefined threshold to decide if a fire starts. The difference of
our temperature criterion from them is that we are checking not only the difference between
current temperature reading and previous reading, but also the temperature changes of the
previous five readings. The purpose of the extended examination is to find the trend of the
temperature development because we have noticed that the temperature from the fire cases
indicates the constant increasing during the fire development, and the temperature from the
nuisance cases shows the fluctuations all the time even with one or two temperature spikes.
40
Our goal is to try and find a proper algorithm to accurately interrupt the temperature trend
during the fire development. Of course, this approach could be applied to other features as
well. We have interfaced our Arduino board with LM35, MQ2 smoke sensor, and flame
sensor, IOT Module, GSM Module and GPS Module. If the sensors get a value which is
greater than the threshold (given accordingly in the code and standards) an immediate
message with position (latitude and longitude) is sent to the concerned person. The working
and flow algorithm of the project is as follows.

Chart 1: Flow Chart

41
4.1.1 Design of a code and MATLAB Tool Box:
The microcontroller board used here is Arduino board. The code dumbed in to the
Arduino board is written by using the syntax of embedded C. The IF THEN Rules obtained
in MATLAB are used to write required code in Embedded C.The data thats required for the
calculation of fire status is assumed and based on that data the coding for the if then rules is
done using embedded C.

4.2 FUZZY LOGIC CONTROLLER BLOCK:


A fuzzy control system is a control system based on fuzzy logic which means a mathematical
system that analyzes analog input values in terms of logical variables that take on continuous
values between 0 and 1. But in digital logic we use the values either 0 or 1 to analyze. It
gives exact results because it is used with a range of inputs rather than using constant values
of inputs.

Fig 4.1: Fuzzy Control Block

4.2.1 FIS Editor:

General information about a fuzzy inference system is displayed by FIS editor. It is a


simple diagram that shows the names of each input variable on the left, and those of each
output variable on the right. The sample membership functions are shown in the FIS editor
which describes the range of inputs and outputs. It is represented as FIS File in the system.
Here is the FIS editor which is used in our project,

Fig 4.2: FIS Editor


42
Here the inputs given are:

1: Smoke

2: Flame

3: Temperature

Table 1: The Ranges of the Sensors are

Inputs Ranges

Smoke (0-1024)

Flame (0-100)

Temperature (>110C)

The Assumed data of smoke, flame and temperature are divided into subsets:

The membership sets for smoke are divided into low, medium, high. The range of the subsets
are shown in the fig:

The range for the smoke density are divided into three sets:

Low: 0 to 200

Medium: 200 to 600

High: 600 to 1024

Fig 4.2.1: Membership Function of Smoke

43
The membership sets for temperature are divided into low, medium, high. The range for the
subsets are shown in the fig :

The range of temperature is divided into three membership sets :

Low: 0C to 20C

Medium: 20C to 40C

High: >40C

Fig4.2.2: Membership Function of Temperature

The membership sets for the flame are divided into low, medium, high. The range for the
subsets are shown in the fig:

The intensity of the flame is divided into three membership sets:

Low: 0 to 20

Medium: 20 to 60

High: 60 to 100

Fig 4.2.3: Membership Function of Flame


44
4.3 RULE EDITOR:
Rules construction using the graphical Rule Editor interface is fairly self-evident.
Based on the ranges of the input and output variables defined with the FIS Editor, the Rule
Editor helps us to construct. Some rule statements automatically by the algorithm, by
selecting one item in each input variable box, selecting one item in each output box, and one
connection item. Rules can be added, deleted, or changed in the rule editor easily.

The names of the variables are least concerned in rule editor. The names are given to the
variables only for user convenience. So, here we always use verbose format for naming of
variables.

Table 2: Assigned conditions for each input and output variable.,

Smoke Temperature Flame Fire Status

Low(L) Cold (L) Far(F) No Fire

Medium(M) Medium (M) Not Far(NF) Potential Fire

High(H) High (H) Near(N) Fire

Based on the ranges of input variables the rules are generated automatically by rule editor.

We got the rules as,

1. If (Smoke is Low) and (Temp is Low) and (Flame is Far) then (Fire status is No_Fire)

2. If (Smoke is Low) and (Temp is Low) and (Flame is Not Far) then (Fire Status is No Fire)

3. If (Smoke is Low) and (Temp is Low) and (Flame is Near) then (Fire Status is potential

fire)

4. If (Smoke is Low) and (Temp is Medium) and (Flame is Far) then (Fire Status is No Fire)

5. If (Smoke is Low) and (Temp is Medium) and (Flame is Not Far) then (Fire Status is

NoFire) .

6. If (Smoke is Low) and (Temp is Medium) and (Flame is Near) then (Fire Status is
Potential fire).
45
7. If (Smoke is Low) and (Temp is High) and (Flame is Far) then (Fire Status is potential
Fire)

8. If (Smoke is Low) and (Temp is High) and (Flame is Not Far) then (Fire Status is Fire)

9. If (Smoke is Low) and (Temp is High) and (Flame is Near) then (Fire Status is Fire)

10. If (Smoke is Medium) and (Temp is Low) and (Flame is Far) then (Fire Status is No Fire)

11. If (Smoke is Medium) and (Temp is Low) and (Flame is Not Far) then (Fire Status is

Potential fire)

12. If (Smoke is Medium) and (Temp is Low) and (Flame is Near) then (Fire Status is Fire)

13. If (Smoke is Medium) and (Temp is Medium) and (Flame is Far) then (Fire Status is

Potential fire)

14. If (Smoke is Medium) and (Temp is Medium) and (Flame is Not Far) then (Fire Status is

Potential fire)

15. If (Smoke is Medium) and (Temp is Medium) and (Flame is Near) then (Fire Status is
Fire)

16. If (Smoke is Medium) and (Temp is High) and (Flame is Far) then (Fire Status is

Potential fire)

17. If (Smoke is Medium) and (Temp is High) and (Flame is Not Far) then (Fire Status is
Fire)

18. If (Smoke is Medium) and (Temp is High) and (Flame is Near) then (Fire Status is Fire)

19. If (Smoke is High) and (Temp is Low) and (Flame is Far) then (Fire Status is

Potential fire)

20. If (Smoke is High) and (Temp is Low) and (Flame is Not Far) then (Fire Status is

Potential fire)

21. If (Smoke is High) and (Temp is Low) and (Flame is Near) then (Fire Status is Fire)

22. If (Smoke is High) and (Temp is Medium) and (Flame is Far) then (Fire Status is

Potential fire)

46
23. If (Smoke is High) and (Temp is Medium) and (Flame is Not Far) then (Fire Status is

Fire)

24. If (Smoke is High) and (Temp is Medium) and (Flame is Near) then (Fire Status is Fire)

25. If (Smoke is High) and (Temp is High) and (Flame is Far) then (Fire Status is Fire)

26. If (Smoke is High) and (Temp is High) and (Flame is Not Far) then (Fire Status is Fire)

27. If (Smoke is High) and (Temp is High) and (Flame is Near) then (Fire Status is Fire)

4.3.1 Rule Viewer:

The Rule Viewer displays a roadmap of the whole fuzzy inference process. It's based
on the fuzzy inference diagram. We will see a single figure window with 27 small plots
embedded in it. The entire fuzzy inference process can be interpreted at once using Rule
Viewer. The Rule Viewer also shows how the shape of certain membership functions
influences the overall result. Since it plots every part of every rule, it can become unwieldy
for particularly large systems, but, for a relatively small number of inputs and outputs, it
performs well. Rule viewer for Smoke, Temperature and Flame (inputs) and output,

Fig 4.3: Rule Viewer

47
4.3.2 Surface Viewer:

Surface viewer is a two-dimensional curve that represents the mapping from service
quality to tip amount. Here we can see the entire mapping in one plot. Surface viewer is
comfortable up to two dimensions, but if we use three dimensions we may encounter
problems. It allows you to keep the calculation time reasonable for complex problems.

The Surface Viewer has capability that is very helpful in cases when we have two (or
more) inputs and one output. Suppose if we have a four-input one-output system and if we
would like to see the output surface, the Surface Viewer can generate a three-dimensional
output surface where any two of the inputs vary, but two of the inputs must be held constant
since computer monitors cannot display a five-dimensional shape.

Fig 4.3.1: Surface Viewer for Smoke, Flame and Fire Status

48
Fig 4.3.2: Surface Viewer for Smoke, Temperature and Fire Status

4.4 CODES AND STANDARDS

The proposed system for generating high capacity signal follows upon the
IEEE802.11 standards. This standard provides the IEEE recommended practice for local and
metropolitan area networks with regard to the coexistence of fixed broadband wireless access
systems. The recommended practice provides recommendations for the design and
coordinated deployment of fixed broadband wireless access systems in order to control
interference and facilitate coexistence. It analyzes appropriate coexistence scenarios and
provides guidance for system design, deployment, coordination, and frequency usage.

4.5 CONSTRAINTS, ALTERNATIVES AND TRADEOFFS


The main Tradeoff is that for large buildings, they can be expensive to install because
of the extensive amounts of wire that are necessary to accurately monitor initiating devices.
The sensor pinging period, IOT processing time period and fire spreading model need to be
cooperated and optimized according to the real fire situations. Our project cant with stand
heavy fires (can damage the equipment).

49
Chapter 5

5.1 SCHEDULE, TASKS AND MILESTONES

Chart 2: Gannt Chart

50
CHAPTER 6

6.1 PROJECT DEMONSTRATION


6.1.1 Block Diagram

Fig 6.1: Block Diagram of a Project

6.1.2 Project Kit

Fig 6.1.1: Kit Diagram


51
During the occurrence of fire the density of the smoke, intensity of the flame and the increase
of the temperature is detected using the sensors. The project is divided into two stages:

1. Implementation of the IF THEN rules in the embedded c.


2. Monitoring the fire status using IOT module.

1. Implementation Of If Then Rules In Embedded C:


If then rules are obtained from the fuzzy logic. The fuzzy tool box is obtained from
the Matlab software. The 27 rules of the fuzzy logic are used to write the code in the
embedded c and used as the decision making statements. The analysis is done using the
variables to detect the fire at the early stages.

2. Monitoring the Fire Status Using IOT Module


IOT module is used to send the information to the web portal. The fire status is
calculated using the fuzzy logic. The decision making rules help to find the correct status of
the fire using the sensor acquired. The fire status is updated to the web portal using the IOT
module. Here for every 45 seconds the status of the fire is updated.The hardware components
used are Arduino board GSM module, GPS module and IOT module. The Arduino board
consists of microcontroller, analog to digital converters and is user friendly. The GSM
module is used for sending an SMS to the concerned number through GSM communication.
The GPS module is used to find the position of the fire outbreak and it sends the co-ordinates
of latitude and longitude. The IOT module helps to send the fire alerts to the web portal. The
micro controller board in the Arduino has the code thats required to perform the action
during the fire outbreak. The rules and the working of the modules are explained above.

6.2 STEPS OF WORKING


1. Initially check the hardware connections according to the circuit. Now switch on the
power supply of 5v given to both Arduino and GSM module.
2. Now the controller will be initialized and also checks the initialization of the hardware
modules (GSM & GPS).We need to insert a SIM in the GSM slot which is used to send
message when fire was detected.
3. When Fire is detected, a buzzer will ring and the Message will be sent to concerned
person with the GPS latitude and longitude as Fire Detected at LON 0.000000 LAT
0.000000 as show in Fig6.2.
52
4. The Status of the Sensors condition will be updated for every 40 SEC.

6.3 Results
The system is tested in a closed room. The results are obtained by introducing flame
(using candle), smoke (burning paper), and heat (using a hair dryer) to the device shows that
the system can effectively enhance the reliability of a fire detection system When the certain
percentage of smoke and flame the fire alerts are sent to the resident and the fire status is
updated for every 45sec. if the probability of the fire is less than 0.5 then the status shown is
potential fire and if it is more than 0.5 the status shown is fire detected. A SMS will be sent
to the mobile number given and also the fire department with the co-ordinates of latitude and
longitude. The web portal can be accessed from anywhere to know the fire status.

Fig 6.2: Screenshot of Message sent by Gsm module

53
Fig 6.2.1: Screenshot of Status in Web Page

Fig 6.2.1: Location of Fire Detected Place in Google Maps

54
6.4 CONCLUSION
An intelligent fire detection system using a soft computing technique is designed and
tested with success. Intelligent systems represent the state-of-art in fire detection and alarm
technology. Unlike typical alarm ways, this system monitors and controls the capabilities of
every alarm initiated and signaling device through microprocessors and system software. In
effect, every intelligent fireplace warning device may be a little laptop overseeing and
operating a series of input and output devices. The fire detection system consists of three
sensors smoke, flame and temperature sensor that facilitates to detect fire and also help to
provide the reliable info to eradicate the issues faced because of false alarms. An
experimental analysis is obtained by introducing flame (match stick), smoke (burning of a
paper coil) and temperature (flashlight). With the help of GSM communication, a knowledge
about the situation is sent to the distant regions. The GPS and GSM module are used to send
the SMS. Once the fire is detected an SMS will be sent to the resident and also to the fire
rescue department with the co-ordinates of latitude and longitude. With the assistance of
internet of things the status concerning the fire updated for every 45seconds to the online
portal. The information regarding the fire will be updated within the web page from where
we can find the data regarding the intensity of the fire. The coordinates of the latitude and the
longitude would be useful for the fire department to reach that exact place within low time.

55
7. COST ANALYSIS
S.no Product Quantity Cost

1 Arduino UNO 1 460

2 LM35 Temperature sensor 1 150

3 MQ2 Smoke Sensor 1 210

4 Flame Sensor 1 170

5 Buzzer 1 30

6 GPS Module 1 700

7 GSM Module 1 700

8 IOT Module 1 1000

Total 8 3,420

8. SUMMARY
Weve developed an associate intelligent fire detection system using fuzzy logic. The
planned system depends on the data obtained by the sensors. If-Then rules have been
proposed to assist the system to build a decision. This analysis is used to fully characterize t
variables such as intensity of the flame and density of smoke. All the known variables like
the values of flame, temperature, and smoke are used to calculate the intensity of the fire. A
GSM module is used to communicate between the residents and the fire rescue department.
The gsm is used for additional reliability even in the remote areas. The world positioning
system is employed to grasp the location of the place where fire is happening. The
coordinates of the latitude and longitude will be sent to the fire rescue department and the
resident. The IOT module is used for the updating the fire status in the web portal. The web
portal can be accessed from anyplace by the fire department or the resident. For every 45
seconds, the status of the fire will be updated in the web portal.

56
References
[1] K. L. Su, Automatic fire detection system using adaptive fusion algorithm for fire

fighting robot, in Proc. IEEE Int. Conf. Syst. Man Cybern., vol. 2,2006, pp. 966971.

[2] L. Chun-yuan, Design of intelligent fire alarm system based on GSM network, in

Proc.Int. Conf. Electron. Optoelectron., vol. 1, 2011,pp. V1-393V1-396.

[3] C. Jing and F. Jingqi, Fire alarm system based on multi-sensor Bayes network,

Procedia Eng., vol. 29, pp. 25512555, 2012.

[4] Milke, J. A. (1999). Using Multiple Sensors for Discriminating Fire Detection.Fire
Suppression and Detection Research Application Symposium, National Fire Protection
Research Foundation.

[5] Chen, S.; Bao, H. et al. (2003). A fire detecting method based on multi-sensor data
fusion. Systems, Man and Cybernetics, 2003. IEEE International Conference on.

[6] Ghana National Fire Service records 110 incident cases, Sep. 27, 2015.
[Online]. Available: http://www.ghananewsagency.org/social/ghananational-fire-
service-records-110-incident-cases84866.

[7] S. Chen, D. C. Hovde, K. A. Peterson, and A.W. Marshall, Fire detection using smoke
and gas sensors, Fire Safety J., vol. 42, pp. 507515, 2007.

[8] C. Caixia, S. Fuchun, and Z. Xinquan, One fire detection method using neural
networks, Tsinghua Sci. Technol., vol. 16, no. 1, pp. 3135, Feb. 2011.

[9] Atzori, L., et al.: The Internet of Things: A survey. ComputerNetworks, 2787-
2805,(2010)

[10] Cordn, O., Herrera, F., Hoffmann F., Magdalena L.: Genetic Fuzzy Systems:
Evolutionary Tuning and Learning of Fuzzy Knowledge Bases. World Scientific
Publishing:Singapore,19, (2001)

[11] Kapitanova, K., et al.: Using fuzzy logic for robust event detection in wireless sensor
networks. Ad Hoc Netw., (2011).

[12] Manjunatha, P., Verma, A.K. and Srividya, A.: Multi-Sensor Data Fusion in Cluster
based Wireless Sensor Networks Using Fuzzy Logic Method. IEEE Region 10
Colloquium and the Third ICIIS, Kharagpur, INDIA, (2008)

57
[13] Bolourchi, P.: Intelligent Decision Making Based on Fuzzy Logic System in Remote
Wireless Communication, Master Thesis, Eastern Mediterranean University,
Gazimausa, North Cyprus, (2012).

[14] Nhivekar, G.S., Nirmale, S.S., Mudholker, R.R.: Implementation of fuzzy logic control
algorithm in embedded microcomputers for dedicated application. International Journal
of Engineering, Science and Technology, 3(4), 276-283, (2011)

[15] H.Y. Lee, T.H. Cho, Fuzzy logic based key disseminating in ubiquitous sensor
networks,in: 10th International Conference on Advanced Communication Technology
(ICACT),Institute of Electrical and Electronics Engineers (IEEE), USA, 2008, pp.

[16] Q. Liang, L. Wang, Event detection in wireless sensor networks using fuzzy logic
system, in: Computational Intelligence for Homeland Security and Personal Safety
(CIHSPS), Institute of Electrical and Electronics Engineers (IEEE), USA, 2005, pp.
52 -55.

[17] Bahrepour, M., Meratnia, N., Havinga P.J.M.: Use of AI Techniques for Residental Fire
Detection in Wireless Sensor Networks. AIAI-2009 Workshops Proceedings, 311-321,
(2009)

[18] Fleming, J. and Robertson, R. G. (2003). Fire Management Tech Tips: The
Osborne Fire Finder. T. R. 1311-SDTDC, USDA Forest Service.

[19] Gottuk, D. T.; Peatross, M. J., et al. (2002). Advanced fire detection using
multisignature alarm algorithms. Fire Safety Journal 37(4): 381-394.

[20] Mendel, J.M., Fuzzy logic systems for engineering: a tutorial, Proceedings of the IEEE
vol.83, no.3, pp.345-377, Mar 1995 doi: 10.1109/5.364485.

58

S-ar putea să vă placă și