Abstract
1.Introduction
2. Background
3. An Overview of the Multilevel Home Security System (MHSS)
4. System Implementation A Multilevel Home Security System (MHSS)
5. Hardware and Circuit Testing
6. Conclusion and Future Work
Multilevel home security system (MHSS) has been designed and developed. The sensor nodes have been introduced and implemented in MHSS. The UART communication between the hardware and the computer has been successfully established and configured which enables the integration of sensor nodes with the computer. The on-state of the camera is controlled by the PIC module through UART. Camera captures images when the third stage is triggered. WIFI is used to send an instant notification email to the home owner and police station. The email is attached with instantly captured images after the third stage of MHSS is triggered. In addition, MHSS has energy saving feature for example the light bulbs are turn off automatically after exceeding a specified period.
At the current stage, MHSS lacks of the certain degree of freedom for the users. For example, the target email addresses where the instant notification email is sent to cannot be changed manually by users. It is proposed to improve the user’s preference setting that enables the users to set the target email addresses. In the future, MHSS will include an image processing tool at the entrance of the house. The user’s face will be used as the passkey to opens locked door and unlock other security system like alarm systems. Since the application of smart phone has become common which is affordable worldwide, thus it will be used as the tool to control and monitor MHSS by the user remotely.
Download in pdf here
At the current stage, MHSS lacks of the certain degree of freedom for the users. For example, the target email addresses where the instant notification email is sent to cannot be changed manually by users. It is proposed to improve the user’s preference setting that enables the users to set the target email addresses. In the future, MHSS will include an image processing tool at the entrance of the house. The user’s face will be used as the passkey to opens locked door and unlock other security system like alarm systems. Since the application of smart phone has become common which is affordable worldwide, thus it will be used as the tool to control and monitor MHSS by the user remotely.
Download in pdf here
References
[1] L. Ophir, “802.11 Over Coax – A Hybrid Coax – Wireless Home Network Using 802.11 Technology”, Consumer Communications and Networking Conference, (2004) January, pp. 13-18.
[2] Y. Zhao and Z. Ye, “A Low Cost GSM/GPRS Based Wireless Home Security System”, IEEE Transactions on Consumer Electronics, vol. 54, no. 2, (2008).
[3] A. Alheraish, “Design and implementation of home automation system”, IEEE Trans. Consumer Electron., vol. 50, no. 4, (2004), pp. 1087-1092.
[4] C. K. Ng, K. S. Wee, N. K. Noordin, M. I. Saripan and R. Syamsul and A. R. Abdullah, “Theft Prevention using Wireless Security System (WSS)”, IEEE International RF and Microwave Conference, (2008), pp. 257-261.
[5] C. C. Tan, B. Sheng and Q. Li, "Secure and Serverless RFID Authentication and Search Protocols", IEEE Transactions on Wireless Communications, vol. 7, no. 4, (2008), pp. 1400 - 1407.
[6] R. Weinstein, "RFID: A Technical Overview and Its Application to the Enterprise", IT Professional, vol. 7, no. 3, (2005) May – June, pp. 27 - 33.
[7] K. Domdouzis, B. Kumar and C. Anumba, “Radio-Frequency Identification (RFID) applications: A brief introduction”, Advanced Engineering Informatics, vol. 21, no. 4, (2007), pp. 350-355.
[8] T. Phillips, T. Karygiannis and R. Kuhn, "Security Standards for the RFID Market", IEEE Security & Privacy, vol. 3, no. 6, (2005) November - December, pp. 85 - 89.
[9] Y. Tajika, T. Saito K. Termoto, N. Oosaka and M. Isshiki, “Networked home appliance system using bluetooth technology integrating appliance control/monitoring with internet service”, IEEE Trans.Consumer Electron., vol. 49, no. 4, (2003), pp. 1043-1048.
[10] Z. Yu, Z. Hou, G. Zhao and X. Zuo, “Family guard against theft and alarm system Based on GSM Modem”, Proceedings of the 4th World Congress on Intelligent Control and Automation, (2002), pp. 649 – 651. [11] N. Jinaporn, S. Wisadsud, P. Nakonrat and A. Suriya, “Security System against Asset Theft by using Radio Frequency Identification Technology”, Proceedings of ECTI-CON, (2008), pp. 761-764.
[12] M. Lu, W. Chen, X. Shen, H.C. Lam and J. Liu, “Positioning and tracking construction vehicles in highly dense urban areas and building construction sites”, Automation in Construction, vol. 16, no. 5, (2007), pp. 647-656.
Authors
Dr. Lee Jer-Vui is an Assistant Professor in the Department of Mechatronics and BioMedical Engineering, Faculty of Engineering & Science, Universiti Tunku Abdul Rahman, Malaysia. His research interests are in the field of automation and robotics.
Chuah Yea-Dat is the Department Head of Mechatronics and BioMedical Engineering, Faculty of Engineering & Science, Universiti Tunku Abdul Rahman, Malaysia. He is a Chartered Engineer and member of The Institution of Engineering and Technology (IET) UK. His research interests are in the field of mechatronics and biomedical engineering system design.
[2] Y. Zhao and Z. Ye, “A Low Cost GSM/GPRS Based Wireless Home Security System”, IEEE Transactions on Consumer Electronics, vol. 54, no. 2, (2008).
[3] A. Alheraish, “Design and implementation of home automation system”, IEEE Trans. Consumer Electron., vol. 50, no. 4, (2004), pp. 1087-1092.
[4] C. K. Ng, K. S. Wee, N. K. Noordin, M. I. Saripan and R. Syamsul and A. R. Abdullah, “Theft Prevention using Wireless Security System (WSS)”, IEEE International RF and Microwave Conference, (2008), pp. 257-261.
[5] C. C. Tan, B. Sheng and Q. Li, "Secure and Serverless RFID Authentication and Search Protocols", IEEE Transactions on Wireless Communications, vol. 7, no. 4, (2008), pp. 1400 - 1407.
[6] R. Weinstein, "RFID: A Technical Overview and Its Application to the Enterprise", IT Professional, vol. 7, no. 3, (2005) May – June, pp. 27 - 33.
[7] K. Domdouzis, B. Kumar and C. Anumba, “Radio-Frequency Identification (RFID) applications: A brief introduction”, Advanced Engineering Informatics, vol. 21, no. 4, (2007), pp. 350-355.
[8] T. Phillips, T. Karygiannis and R. Kuhn, "Security Standards for the RFID Market", IEEE Security & Privacy, vol. 3, no. 6, (2005) November - December, pp. 85 - 89.
[9] Y. Tajika, T. Saito K. Termoto, N. Oosaka and M. Isshiki, “Networked home appliance system using bluetooth technology integrating appliance control/monitoring with internet service”, IEEE Trans.Consumer Electron., vol. 49, no. 4, (2003), pp. 1043-1048.
[10] Z. Yu, Z. Hou, G. Zhao and X. Zuo, “Family guard against theft and alarm system Based on GSM Modem”, Proceedings of the 4th World Congress on Intelligent Control and Automation, (2002), pp. 649 – 651. [11] N. Jinaporn, S. Wisadsud, P. Nakonrat and A. Suriya, “Security System against Asset Theft by using Radio Frequency Identification Technology”, Proceedings of ECTI-CON, (2008), pp. 761-764.
[12] M. Lu, W. Chen, X. Shen, H.C. Lam and J. Liu, “Positioning and tracking construction vehicles in highly dense urban areas and building construction sites”, Automation in Construction, vol. 16, no. 5, (2007), pp. 647-656.
Authors
Dr. Lee Jer-Vui is an Assistant Professor in the Department of Mechatronics and BioMedical Engineering, Faculty of Engineering & Science, Universiti Tunku Abdul Rahman, Malaysia. His research interests are in the field of automation and robotics.
Chuah Yea-Dat is the Department Head of Mechatronics and BioMedical Engineering, Faculty of Engineering & Science, Universiti Tunku Abdul Rahman, Malaysia. He is a Chartered Engineer and member of The Institution of Engineering and Technology (IET) UK. His research interests are in the field of mechatronics and biomedical engineering system design.
IChai Chin-
Tin is an engineer and graduated student of Department of Mechatronics and BioMedical Engineering, Faculty of Engineering & Science, Universiti Tunku Abdul Rahman, Malaysia. His research interest is in the field of smart home system design and application.
No comments:
Post a Comment
its cool