Ai Based Home Automation

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

National Conference on Recent Innovations in Engineering-2022

AI BASED HOME AUTOMATION


VIDYASAGAR R
Electronics and Communication VENKATESH M N SURYA K B
engineering Electronics and Communication Electronics and Communication
K S Institute of technology engineering engineering
Bangalore,India K S Institute of technology K S Institute of technology
hiremathsagar123@gmail.com Bangalore,India Bangalore,India
venkatesheravenky@gmail.com suryarajukb@gmail.com

Mr.SAMPATH KUMAR,ASSISTANT
PROFESSOR
Electronics and Communication
engineering
K S Institute of technology
Bangalore,India

Abstract: In the present scenario the crimes are unlocking the locked door in the form of SMS and
increasing exponentially, arising a need of security. CALL. The project can also be used for
Security can also be described as a condition so that surveillance. For instance, it can capture the
one can develop and progress freely and with a faith images of unidentified individuals and store it
that no harm may be done. Hence, we are which can later be used to determine the impostors
introducing any automatic door lock security system who tried to gain illegitimate access. Interface relay
and home automation for the security purpose. as on output. And additional home automation
Camera is now enormously being used and with the system is used to control the home appliance like
development of its content that is used in various fan and light using mobile application. With help
applications. One of such is automatic door lock of Wi-Fi connected for the model using TCP/IP.
security system using camera.
The Internet of Things (IoT) is the
I. INTRODUCTION
interconnection of uniquely identifiable
embedded computing devices within the existing
The “Home Automation” concept has existed for
Internet infrastructure. Typically, IoT is expected many years. The terms “Smart Home”, “Intelligent
to offer advanced connectivity of devices, systems, Home” followed and has been used to introduce the
and services that goes beyond machine- to- concept of networking appliances and devices in
machine communications (M2M) and covers a the house. Home automation Systems (HASs)
variety of protocols, domains, and applications. represents a great research opportunity in creating
The interconnection of these embedded devices new fields in engineering, and Computing. HASs
(including smart objects), is expected to user in includes centralized control of lighting, appliances,
automation in nearly all fields, while also enabling security locks of gates and doors and other systems,
advanced applications like a Smart Grid. Things, to provide improved comfort, energy efficiency
in the IoT, can refer to a wide variety of devices
and security system. HASs becoming popular
such as heart monitoring implants, biochip
transponders on farm animals, electric clams in
nowadays and enter quickly in this emerging
coastal waters, automobiles with built-in sensors, market. However, end users, especially the
or field operation devices that assist fire- fighters disabled and elderly due to their complexity and
in search and rescue. Current market examples cost, do not always accept these systems.
include thermostat systems and washer/dryers Due to the advancement of wireless
that utilize wifi for remote monitoring. technology, there are several different of
Interfacing of camera to capture live face connections are introduced such as GSM, WIFI,
images. Create a database of authorized person if and Bluetooth. Each of the connection has their
they exist. Capturing current image, save it and own unique specifications and applications.
compare with the database image. Interface GSM Among the four popular wireless sections that
module to send alert to authorized person while often implemented in HAS project, WIFI is

978-1-6654-9801-2/22/$31.00 ©2022 IEEE


being chosen with its suitable capability. The In [5] Connect any door with internet. In this
capabilities of WIFI are more than enough to be system user also implemented PIR sensor and
implemented in the design. Also, most of the camera. PIR sensor used for detecting person and
current laptop/notebook or Smartphone come camera used for capturing the video of the person
with built-in WIFI adapter. It will indirectly who comes at the door. The video was sent through
reduce the cost of this system. 3g dongle to authorized person. They had also
discussed some advantages of this system. They
had concluded use of this system in banks,
II. LITERATURE SURVEY hospitals etc. But their proposed model didn’t
provide the facility of sending messages to the
In [1] a Door lock access system which consists authorized people
of three subsystems: to be specific face
recognition, face detection, and automated door PROPOSED METHDOLOGY
access control. Face recognition is actualized by
using the PCA (Principal Component Analysis).
The door will open itself for the known person in The proposed system consists of Interfacing of
command of the microcontroller and caution will camera to capture live face images. Create a
ring for the unknown person. Demerit of this database of authorized person if they exist.
system is input images are taken through a web Capturing current image, save it and compare
camera continuously until the ‘stop camera’ button with the database image. Send alert to authorized
is pressed. Somebody is required at the location to person while unlocking the locked door in the
check unauthorized person’s images or status of the form of SMS . The project can also be used for
system and take further appropriate action. surveillance. For instance, it can capture the
Personal computer (PC) is associated with the images of unidentified individuals and store it
microcontroller, the entire system will not work if which can later be used to determine the
PC is crashed or non-Function. impostors who tried to gain illegitimate access.
Interface relay as on output.
In [2] Embedded Image Capturing System
Using Raspberry Pi. In this work, they captured
the image and compared it with the database but
I. BLOCK DIAGRAM
the limitation was the system couldn’t work
properly in the ambient light condition.
In [3] A Face Recognition System based on
Eigen face method in which they used Eigen
method for face recognition and Euclidean
distance method to compare the image of the
person concerned with the images in the
database. It was very efficient and fast method
and also gave high accuracy.

In [4] Implementation of Automated Door A. ARM11 Raspberry Pi 3board


Accessing System with Face Design and Pi is a credit-card sized computer that connects to
Recognition in which they used Viola Jones a computer monitor or TV and uses input devices
method for face detection and PCA (Principal like keyboard and mouse. It is capable of
Component Analysis) for the comparison of performing various functionalities such as
images. The limitation of this work was that it is surveillance system, military applications, surfing
not robust and the efficiency is less. internet, playing high-definition videos, live games
and to make data bases.
B. STORAGE Raspberry Pi OS is highly optimized for the
The Raspberry Pi does not have any onboard Raspberry Pi line of compact single-board
storage available. The operating system is loaded computers with ARM CPUs.
on a SD card which is inserted on the SD card slot Raspbian Pi OS comes with over 35,000 packages,
on the Raspberry Pi. The operating system can be pre-compiled software bundled in a nice format for
loaded on the card using a card reader on any easy installation on your Raspberry Pi.
computer H.FAN & LIGHT ON/OFF:
C. PIR / IR SENSOR
More advanced security systems include passive We will install a web server on your Raspberry Pi
infrared (PIR) motion detectors. The "motion that run a Java script application to send On/Off
sensing" feature on most lights (and security messages to a message broker (MQTT). Then a
systems) is a passive system that detects infrared Python program will receive the on/off messages
energy. These sensors are therefore known as PIR and switch the Raspberry Pi GPIO on/off, which
(passive infrared) detectors or pyro electric switches the relay on/off. See figure 1 below that
sensors. These sensors "see" the infrared energy show you how the Raspberry Pi is connected to
emitted by an intruder's body heat. When an the relay switch.
intruder walks into the field of view of the detector,
the sensor detects a sharp increase in infrared CONCLUSION
energy.
The arrangement of a facial recognition
D. LPG GAS SENSOR
system using raspberry pi can make the system
An electrical switch is a relay consisting of littler, lighter and work successfully utilizing
multiple signals. Relay equipment that allows lower control use, so it is more convenient than
communication outside of the home network the pc- based face recognition system. It is open
E. IoT CLOUD:. source software on Linux. Also, send a security
An IoT cloud is a network that supports IoT alert message to the authorized person utilities.
devices and applications. This includes the We are also providing power backup for the
underlying infrastructure, servers and storage, smooth and continuous functioning of the
needed for real-time operations and processing. An system in case of power failure. The power bank
IoT cloud also includes the services and standards is used to charge the Raspberry Pi so there is
necessary for connecting, managing, and securing less chance to slow down the system. This
different IoT devices and applications. development scheme is cheap, fast, and highly
F. Python IDE: reliable and Raspberry pi takes less power and
An IDE(Integrated Development Environment) is provides enough flexibility to suit the
a program dedicated to software development. requirement of different people.
Python is an easy to learn, powerful programming
language. It has efficient high-level data structures
and a simple but effective approach to object- If a blacklisted person tries to open the
oriented programming door, the system will send a message to the
The Python interpreter is easily extended with new admin using GSM module regarding the same.
functions and data types implemented in C or C++ A real time speaking assistant can be deployed
Python is also suitable as an extension language for to make the system more user -friendly and
customizable applications. efficient. Highly secure protocols such as TLS
G. Raspbian OS: can be deployed to ensure there is no security
Raspbian is a free operating system based on breach.
Debian optimized for the Raspberry Pi hardware.
REFERENCES

1. Chowdhury. M. Nooman. S, Y.
Januzaj, 2013. Access Control of
Door and Home Security by
Raspberry Pi through Internet.
2. Senthikumar G. Gopalkrishnan. K.
Sathish Kumar V. 2014 Embedded
Image Capturing System Using
Raspberry Pi System.
3. Çarıkçı, M. Özen, F. 2012 A Face
Recognition System Based on Eigen
faces Method.
4. Jogdand. S, Karanjkar. M. 2015
Implementation of Automated Door
Accessing System with Face Design
and Recognition.
5. Sowmiya. U, shafiq mansoor, J. 2015
Raspberry pi based home door
security through 3G dongle.
6. Kartik J. Srimadhavan V. 2013 SMS
Alert and Embedded Network Video
Monitoring Terminal.
7. Sahani. M., Nanda C, Sahu A,
Pattnaik, B. 2015Web Based Online
Embedded Door Access Control and
Home Security System Based on Face
Recognition.
8. Mulla. M, Patil, R. 2015, Facial Image
Based Security System using PCA.
9. C. Gomez and J. Paradells, "Wireless
home automation networks: A survey
of architectures and technologies,"
IEEE Communications Magazine,
vol. 48, 2010

You might also like