Professional Documents
Culture Documents
IOT Assignment
IOT Assignment
Assignment
BAIT2123 Internet of Things
2021/2022
1.0 Introduction
The Chalet System is a computer network that is used to monitor and operate chalet equipment
as well as residential lighting systems. It lets consumers use the Internet to remotely monitor and
operate consumer electronics. Homestay automation is a relatively new field that has sparked
interest in the research community. Figure 1 compares traditional wired home servers to the
proposed digital door smart lock system, despite the fact that wired homestay networks are
widely known for the early development of homestay automation systems.
Furthermore, it enhances home automation by including a master control panel for major home
appliances and lighting systems into the digital door lock, as well as switching home appliances
on and off based on the presence and absence of people. We used the ZigBee network as the
backbone of our system in this project. The authors suggest a homestay automation system based
on a digital door lock that takes advantage of the full capabilities of the ZigBee sensor network
by combining home security and home automation. A ZigBee module is installed in the digital
door lock in the proposed system, and the door lock serves as the system's principal controller.
The suggested system consists of a sensor node network with a digital door lock serving as the
base station. Sensor nodes are placed in strategic locations throughout the homestay.
Furthermore, to control the power condition, ZigBee modules with ZigBee relay modules are
coupled to the major household appliances. The digital door lock may be used to monitor and
control the entire network. The homestay automation function in digital door lock systems
enables users to control and monitor home environment and condition from a single master
control panel before entering or leaving the house, as the door lock is the first and last thing
people see when entering and leaving the house, respectively. It also allows users to check the
condition of the house remotely via the Internet or any other public network.
1.1 Description of System
The smart digital door lock is a technology that allows you to monitor and control certain devices
in your house. A wireless sensor network powers the smart digital door lock system. As depicted
in Figure 1, it is a sensor node network with a digital door lock as a sink node. The control
module, motor module, sensor module, communication module, and I / O module are the five
components of a smart digital smart lock system. The MCU included in the digital door lock, the
system's brain, makes up the control module. The motor module is in charge of the locking
mechanism. The communication module allows the device and control module to communicate
with one another. The I/O module allows users to access the door lock system. RFID reader and
digital dial pad for verification, TFT Touch LCD to control individual devices and show related
information are all included in the I/O module. The user can monitor and control the household
appliances from the central control panel once the user has been verified by the system. Door
locks are equipped with camera modules, microphones, and speakers to allow visitors to interact
with them. On both sides of the door, there is a touch LCD. As a result, users can use this gadget
to watch and interact with other visitors' doors.
Module for ZigBee The ZigBee module is utilized in digital door locks and sensor nodes and
comprises RF communication modules. The ZigBee module structure put in residential
equipment is shown in Figure 2. The ZigBee and MCU transceivers are the major components of
the ZigBee module. Commercial RF chips with modems to implement the IEEE802.15.4
medium and MAC (IEEE802.15.4) physical access layer (PHY) running at 2.4 GHz are used in
ZigBee transceivers. The MCU is the program's controller and operates the ZigBee transceiver.
Program memory is used to implement the MAC, network layer, and application layer in ZigBee.
The application layer interface is specified by the ZigBee Alliance table, but the PHY and MAC
layers of the ZigBee stack design follow the proposed IEEE802.15.4.
Smart cameras are the modernized versions of the typical traditional camera where one person
needs to click the button in order to take a photo, instead it advances in both machine vision and
semiconductor technology. To define a smart camera, it is a vision system that extracts specific
information from images taken that are placed in devices such as computers and surveillance
cameras, which are the things that are needed to improve the security around the chalet without
being remotely there. The basic figure shows the smart camera architecture. Just like a regular
digital camera, a smart camera captures the images using an image sensor, stores the image in the
memory after processing and transfers it to a device using a communication interface. However,
the processor in a smart camera not only controls basic functionalities but has the capabilities to
analyze the images that have been captured so that extra information can be obtained which will
be explained further below.
Face Detection
Face detection through image-based technology combines classifications based on binary
features that can be computed at a rapid speed. For example, simple, rectangular, Haar-like
features are extracted, with face and non-face classification. Higher resolution images provide
more detailed information but require a higher processing speed and more memory.
Recognize Gestures
In surveillance activity, cameras are affixed to one location. Therefore, to notice gestures and
track the moving object, background subjects can be used to reduce the Region-Of-Interest. In
surveillance activity, it is extremely important to track all faces that have passed through the
camera so that for security purposes, it can be used as reference to find out who has been where
at a certain moment.
Figure 4: Detailed Smart Camera Architecture
We know that chalets are open areas thus they can be exposed to harsh environments such as
temperature change, humidity, as well as weather. Shown in a more detailed system architecture
of a smart camera, the smart camera is divided in three parts: the video sensor, processing unit,
and the communications unit.
Processing Unit
A surveillance camera requires on-board image and video processing. The performance
requirements can be fulfilled with the digital signal processors (DSP), estimated to be powered
around 600MHz due to the high performance needed. The video sensor is then connected to a
DSP via the FIFO memory method to allow space for data timing transference between the
sensor and DSP. Image taken by the camera is then transferred to the external memory to other
components.
Communications Unit
The processor manages the majority of the communications on-board such as the Ethernet,
WLAN, serial and GPRS communications. These communications allow low effort
communication connection between the different peripherals.
2.2.2 Software
DSPs (Digital signal processing) in the processing unit are used to run computation of intensive
tasks in surveillance cameras such as compressing videos and image analysis. eXpressDsp
Algorithm Interoperability Standard (XDAIS) can be implemented to enable the exchange and
configuration of algorithms during runtime of the cameras.
The processor that mainly acts as the brain of the system which controls actions and directs
pathways of communication. Thus, a standard operating system should be selected to ease the
development of the connections of communications such as web-services and PCI
communications, thus Windows is selected as the operating system.
2.2.3 Design of Smart Camera
Within the video sensor, it requires light or motion to activate the facial recognition of the
camera. For example, if a person were to walk through a camera, it would analyze the object,
determine it as a person which then saves the recording into the memory. The memory also has
the capability to snapshot images of objects that have been detected at the time of capture.
On the vision platform of the camera, pixels are generated and processed as how they come out
from the image or video sensor. After generating the pixels, it then finally shows the images and
videos that have been taken.
Figure 7: Face Detection on VGA Image(a) and 4MP Image(b)
It has been widely known surveillance cameras have a lower quality compared to digital cameras
but the reason for this is that in order for face detection to work, lower resolution images provide
a more accurate positive detection. Shown in Figure 7(a), it is by VGA resolution that is able to
detect faces easily whereas Figure 7(b), it yields more false positive detections.
Figure 8: (a) Skin Color Recognition, (b) Face recognition - First step, (c) Face recognition -
Second Step
To recognize faces, the surveillance camera needs to be installed and programmed with a
software that has been set with a list of possible skin colors through the color wheel. The purpose
of the first step in face recognition is to detect the main purpose of a surveillance camera, the
face, regardless of orientation or rotation of the body. This can be used for tracking of the object
or human shown in Figure 10(b). The second step of face recognition is to filter all
unrecognizable objects that leave only the crucial part of a recognizable face.
2.3 Sensor Module (Lam Kel Vin)
Sensor nodes are responsible for two major tasks. The first is to monitor the temperature in the
home's surroundings, and second is to adjust the power state of homestay gadgets. Sensors
attached to the ZigBee module monitor temperature, gas leakage, theft, fire, and other
environmental factors. As shown in Figure 2, the ZigBee module includes a sensor node along
with the ZigBee relay module for devices whose power status must be managed. The ZigBee
relay module is used to power on and power off household appliances. Sensor nodes regularly
send current status and relevant data to digital doors. Furthermore, once the digital instructions
are received, the sensor node sends response messages that provide operational results.
Inside the digital door lock are control modules, I/O modules, and motor modules. Figure 3
depicts the digital door lock structure and component connectivity. The main CPU, ZigBee
module, door lock controller, CDMA module, camera module, card reader, microphone, and
speaker make up the digital door lock.
The control module is the system's brain. The control module serves two primary purposes. First
and foremost, it is in charge of the door lock. Second, it supervises and regulates the entire
network. The digital door lock is activated by the lock / open lock in the door lock controller.
The motor drive circuit, which drives the motor as a drive, is controlled by the control module.
Even RFID cards and tags are verified using a card reader. Touch lenses are used to verify
passwords, adjust sensor node settings, and display important information on the screen. The
interface between the sensor node and the control module in the digital door lock is the ZigBee
module.
The ZigBee module is used to exchange data between sensor nodes and control modules. Short
message services (SMS) and multimedia messaging services are used to inform subscribers about
crises using the CDMA module (MMS). Finally, before opening the door, microphones,
speakers, and camera modules are employed to facilitate contact between guests and users.
2.4.1 Procedures of the Smart Digital Door Lock System(Choo Chun Yin)
Communication
The smart digital door lock system has two communication modes: centralized and eemergency.
In centralized mode, the digital door assumes control of the network's overall communication
and Sensor nodes respond as directed by the door lock. This is how most people communicate.In
a typical setting when everything is fine This form of communication eliminates the need for
extraneous communication. Communication between sensor nodes and the central controller
saves energy. When the sensor node detects an emergency mode, the appropriate action is done,
such as releasing water for a fire, a buzzer for a burglary, and the occurrence is promptly
reported to the door lock without any assistance from the door lock.The occurrence is then
reported to the end consumer through SMS or Sms by the door lock.
1) Outgoing Event
Figure 7 shows the flow chart for an outgoing event, such as a person leaving the house. Because
the digital door lock is the last item the user sees before leaving the house, when the user hits the
door lock button, the door lock requests that all sensors (Table) submit their current status, which
the touch LCD shows on the screen. Initially, the system operates in manual mode. In manual
modes, customers can select which household appliances to switch on/off directly from a menu.
With manual mode enabled, consumers no longer need to manually check the status of specific
home equipment. He can leave everything in his room alone and then choose which devices to
switch on or off from the door. If the user discovers that the TV is turned on, he can switch it off
from the door. If the user does not touch the LCD panel for a predetermined amount of time after
locking the door, the device enters automated mode.
To make automated mode operate, we must first adjust the device's priority setting. In this case,
the priority setting determines which device should be turned on or off in the absence of the user.
Priority 1 indicates that the equipment should remain turned on, whereas priority 0 indicates that
it should be turned off. As a result, the user determines which devices should be turned on and
off while he is away using the touch LCD panel. This is a one-time process that can be repeated
whenever it is deemed necessary. As a result, when the system enters automated mode, it
switches off all devices with a priority of 0 if they are still turned on. With the installation of this
mode, users no longer need to be concerned about the power state of the devices in their rooms
when they leave the house. When he leaves the house, he can leave the lights and television on.
Our system finally disables them .
2) Incoming Event
Figure 8 shows a flow chart for an incoming event, such as a person entering the house.
Incoming events can also be operated manually or automatically. The system unlocks the door
once the user has been authenticated. The system then seeks the most recent status of all devices
and checks for an emergency scenario. If an emergency situation has occurred, the related
emergency message, such as fire, burglary, and numerous other alert messages, is displayed on
the LCD. In any scenario, the user can view the status of the room on the touch LCD. The LCD
conveniently displays the current environmental status of the home. In manual mode, the user
can turn on/off specific devices using the touch LCD [13]. If he notices that the room is too hot,
he can activate the air conditioner via the LCD. If the user does not touch the LCD panel within a
particular length of time after unlocking the door, our system goes into automated mode. In order
for automated mode to function, we must additionally configure the priority setting of devices.
The priority utilized in this event is not the same as the priority used in the preceding outgoing
event. As a result, the system keeps two priorities for each device. The device with priority 1
should be turned on, while the device with priority 0 should be turned off. This is likewise a one-
time process, but it can be repeated whenever it is deemed necessary. As a result, when the
system enters automated mode, it switches on all devices with priority 1 if they are still turned
off. Users can set the priority of gadgets such as air conditioners and televisions to 1 so that they
turn on as soon as they arrive home.
Figure 8: Flow chart incoming event
2.4.3 Design of smart digital door lock system (Lee Wen Juin)
The prototype system is implemented for chalet automation based on digital door locks with the
ZigBee network protocol. Figure 8 shows the implementation of a smart center controller
Digital door lock system. Select and modify one of the commercial door lock products. All
control circuits for locking and unlocking doors have been rebuilt into our ZigBee-based AVR
controller system. Interface between user and system is provided by touch LCD. Figure 9 shows
a touch LCD snapshot. Figure 9 (a) shows the interface for user authentication. Input the
password user for authentication through this interface. Similarly, in Figure 9 (b), the LCD
displays the state of the home. Users can monitor and control the home environment from this
interface. Figure 10 shows our switch module used to convert consumer electronics at home. As
shown in the picture, the ordinary electric adapter is connected to the ZigBee relay module
installed on the sensor node. This switching module is used to turn on and off the power
according to instructions issued from the digital door lock server.
3.0 Suggestions for Improvement of System
3.1 Smart Camera Module
Higher Resolution of videos and images
Although a VGA resolution is perfectly fine for the suitability of the camera’s hardware and
software, it can produce blur results even after a successful facial detection. Explained in Figure
6 as to why a lower resolution is necessary, for the current modern society, technology has been
improved in order for IOT to implement a better solution for optimal results. A clearer resolution
can be achieved through different methods such as object grouping, noise filter, and background
subtraction so that not only it produces accurate positive detection, but also better for security
reasons to record all faces and movement recorded.
Relay Node
Relay nodes rely on smart digital home servers to ensure homestay automation. However, there
is still a problem with RF signal attenuation, which occurs frequently in closed situations such as
homestays. This untrustworthy RF signal will deteriorate in a micro-oven and consumer devices
house that use the same frequency range. We build the ZigBee RF repeater at the entrance of
each room to facilitate the transmission of reliable RF signals. This node can also be used to lock
and unlock each room's door.
4.0 Conclusion
Smart cameras have been introduced in surveillance cameras to provide better security around a
huge premise, which in this case is a chalet that has a large area of land that may require
surveillance to be able to capture all activity in its surrounding. In the smart camera, we have
proposed a face detection and tracking system implemented into the camera system. In the
future, we wish to be able to implement a higher resolution video and image pixel for security
purposes and clearer view of objects.
5.0 References
Ting S, Amelia, A, Abbas, B, Yasir, M 2007, ‘Real-Time Face Detection and Tracking for High
Resolution Smart Camera System’, viewed 12th April 2022,
<https://www.researchgate.net/publication/221210125_Real-
Time_Face_Detection_and_Tracking_for_High_Resolution_Smart_Camera_System>
Il-Kyu Hwang and Jin-Wook Baek, "Wireless Access Monitoring and Control System based on
Digital Door Lock," IEEE Trans. On Consumer Electronics, Vol. 53,2016
Ahsan M, Talib MR, Sarwar MU, Khan MI, Sarwar MB (2016) Ensuring interoperability among
heterogeneous devices through IoT middleware. Int J Comput Sci Inf Secur 14(4):251–
255Google Scholar
Aijaz A, Su H, Aghvami AH (2015) CORPL: A routing protocol for cognitive radio enabled
AMI networks. IEEE Trans Smart Grid 6(1):477–485
Dandelski C, Wenning BL, Perez DV, Pesch D et al (2015) Scalability of dense wireless lighting
control networks. IEEE Commun Mag 53(1):157–1654.
Desai P, Sheth A, Anantharam P (2015) Semantic gateway as a service architecture for IoT
interoperability. In: IEEE international conference on mobile services, 2015, pp 313–319
Dujovne D, Watteyne T, Vilajosana X, Thubert P (2014) 6tisch: deterministic ip-enabled
industrial internet (of things). IEEE Commun Mag 52(12):36–41C
Evans D (2011) The internet of things. how the next evolution of the internet is changing
everything, whitepaper. Cisco Internet Business Solutions Group (IBSG)
Y. A. Wahab and A.S.H. Basari. (2013). “Analysis of down time and reliability estimation in
hostel building maintenance-a case study,”Middle-East Journal of Scientific Research, Vol. 17,
no. 9, pp.1260-1268.
Y. A. Wahab and A.S...H Basari. (2014). Identifying the best parameter distribution for
university hostel building maintenance‟ Middle-EastJournal of Scientific Research 22 (8): 1145-
1149, 2014.ISSN 1990- 9233 © IDOSI Publications.
Y. A. Wahab and A.S..H Basari. (2014). „Replacement model for hostel building case study:
ICYM‟ Middle-East Journal of Scientific Research 21 (11): 1977-1981, 2014 ISSN 1990-9233
© IDOSI Publications.