0% found this document useful (0 votes)
20 views92 pages

VTES19

The document discusses developing an automation tool for home fire safety checks using image sensors to automatically build an environmental model and reduce labor. It introduces the topic, describes the proposed system and its advantages over existing systems like faster response and accuracy. It also discusses various applications of embedded systems including in consumer appliances, industrial automation and more.

Uploaded by

Nallapu Sahithya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views92 pages

VTES19

The document discusses developing an automation tool for home fire safety checks using image sensors to automatically build an environmental model and reduce labor. It introduces the topic, describes the proposed system and its advantages over existing systems like faster response and accuracy. It also discusses various applications of embedded systems including in consumer appliances, industrial automation and more.

Uploaded by

Nallapu Sahithya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 92

AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Department of ECE, GNITC 1


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

ABSTRACT
Fire simulation tools have been developed for the inspection of environmental safety. However,
they have not been extensively exploited for home use. One critical reason for this is that
building the environmental model relies highly on manual operations. In this letter, image
sensors are adopted to automatically build an environmental model and reduce the labor burden
of exploiting fire simulation tools for a fire safety check. To increase the accuracy of an
environmental model, our automation extracts the essential features affecting fires from images
using recognition models and the proposed approaches. Our automation converts the
environmental data into an FDS6 syntax. The experimental results reveal the feasibility of our
automation. Compared to a manual operation, our approach not only reduces the labor burden
but also the inconsistent environmental model owing to a manual operation as well.

Department of ECE, GNITC 2


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

INTRODUCTION
1. GENERAL
Nowadays, fire incidents have become a critical issue [1-3], which must be dealt with on
time without any unnecessary delay to avoid the loss in lives and belongings [4-10]. It is
considered a fire situation when the monitored temperature exceeds 50o C. In critical
places such as hospitals, schools, and banks, personnel's arrival time to come for help in
fire hazards is around 15 minutes [11]. The statistics show that there are 475,500 structural
fires annually in the United States, causing 2,950 civilian deaths, 12,775 civilian injuries,
and $7.9 billion in property damage [12]. According to the National Fire Protection
Association (NFPA), two-third of U.S. household fires occur in premises with no working
smoke alarms, alarms with no proper maintenance, or misplaced alarms [13]. The
appropriate allocation of fire alarms with a proactive warning could save lives and reduce
property losses [14], [15]. Particularly, there are many types of fire alarms as heat detectors
and smoke detectors [16]; studying these types helps to decide which type is more suitable
for home or store. For instance, heat detectors are classic options [17] when the
temperature reaches a certain level. Thus, it is more suitable for applications that rapid
response is not required or in an environment where smoke detectors cannot be placed like
frozen areas. Heat detectors have a lower false alarm rate but still slower in response
because the temperature rises slowly [19]. With all these lacks, smoke detectors remain
better than heat detectors. Smoke alarms will more likely detect fires before it really starts.
Smoke comes when the energy of an object is consumed due to the loss of Carbon Dioxide
(CO2) from heat [20]. Smoke detectors are classified into three types: ionization,
photoelectric, and combination. All these types can be studied further in instruments and
measurement books. In this study, we will highlight a brief description of ionization. In
brief, ionization is a radioactive material that receives radiation from the fire. It enters the
ionization chamber, which is an air-filled space between two electrodes and permits a
small, constant current between the electrodes. This type is the best for fast fires or fires
caused by bombs or accidents [21].

Department of ECE, GNITC 3


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

The concept of Internet of things (IoT) nowadays is applied in many applications ranging
from the smart industry [33], smart agriculture [34] to smart healthcare [31], and smart
home application [32]. Home automation is an area where IoT has several advantages [35-
37]. In the case of remote plant locations, for example, technology enabling remote
operation and maintenance will benefit; autonomous inter-appliance such that devices are
mutually aware of the information exchange, thereby minimizing engineering costs in
handling all devices involved. Nowadays, fires can get out of control because people intend
to save money rather than installing proper fire alarm systems. Some problems are still on,
such as affordability, effectiveness, and responsiveness [22-24]. Previous related works
such as Network-Based Real-time Integrated Fire Detection and Alarm (FDA) System with
Building Automation [25] have been done to overcome these problems.
Considering the aforementioned challenges, this study focuses on building an advanced fire
alarm using heat and smoke alarms. The system reads the flame, heat, and smoke data
using IoT, analyzes these data, and then quickly triggers the automatic water sprinkler.
Thus, this study's importance is to provide a low-cost fire alarm system considering the
affordability, effectiveness, and responsiveness.
Many studies have been conducted to address these issues like [26-28]; however, fire
detection issues are not addressed properly since these systems rely on machine vision,
where the algorithms need more images to train, and the detection rate is not satisfactory.
Other approaches like [29,30] suffer from some limitations, mainly slow time responses
and low accuracy. Thus, this paper aims to minimize false alarms, provide faster response,
and a new IoT approach than previous studies that used mostly Node-Red. The
contribution is as follows: (1) To determine which combinations and algorithms of sensors
can accurately and quickly detect fires, (2) We have designed and then developed a system
that detects fire and activates the fire alarm, (3) the proposed system evaluates the situation
and initiates an automatic water sprinkler where the water unit was designed separately,
and (4) the system analyses the collected data using Ubidots platform which results in a
faster response. Thus, the highlighted four points make the proposed system superior in
terms of affordability, effectiveness, and responsiveness.

Department of ECE, GNITC 4


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

1.2 EXISTING SYSTEM:


Numerous Home Automation products exist on the market. Numerous Home Automation
products exist on the market. Numerous Home Automation products exist on the market.
Many studies have been conducted to address these issues however, fire detection issues
are not addressed properly since these systems rely on machine vision, where the
algorithms need more images to train, and the detection rate is not satisfactory. Other
approaches suffer from some limitations, mainly slow time responses and low accuracy.

1.3 PROPOSED SYSTEM:


Image sensors are adopted to automatically build an environmental model and reduce the
labor burden of exploiting fire simulation tools for a fire safety check.

Department of ECE, GNITC 5


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

CHAPTER 2
PROJECT DESCRIPTION
An embedded system can be defined as a computing device that does a specific
focused job. Appliances such as the air-conditioner, VCD player, DVD player, printer, fax
machine, mobile phone etc. are examples of embedded systems. Each of these appliances
will have a processor and special hardware to meet the specific requirement of the
application along with the embedded software that is executed by the processor for meeting
that specific requirement. The embedded software is also called “firm ware”. The
desktop/laptop computer is a general-purpose computer. You can use it for a variety of
applications such as playing games, word processing, accounting, software development
and so on. In contrast, the software in the embedded systems is always fixed listed below:
· Embedded systems do a very specific task, they cannot be programmed to do different
things. . Embedded systems have very limited resources, particularly the memory.
Generally, they do not have secondary storage devices such as the CDROM or the floppy
disk. Embedded systems have to work against some deadlines. A specific job has to be
completed within a specific time. In some embedded systems, called real-time systems, the
deadlines are stringent. Missing a deadline may cause a catastrophe-loss of life or damage
to property. Embedded systems are constrained for power. As many embedded systems
operate through a battery, the power consumption has to be very low.
· Some embedded systems have to operate in extreme environmental conditions such as
very high temperatures and humidity.

Application Areas
Nearly 99 per cent of the processors manufactured end up in embedded systems. The
embedded system market is one of the highest growth areas as these systems are used in
very market segment- consumer electronics, office automation, industrial automation,
biomedical engineering, wireless communication, data communication,
telecommunications, transportation, military and so on.

Department of ECE, GNITC 6


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Consumer appliances:
At home we use a number of embedded systems which include digital camera, digital
diary, DVD player, electronic toys, microwave oven, remote controls for TV and air-
conditioner, VCO player, video game consoles, video recorders etc. Today’s high-tech car
has about 20 embedded systems for transmission control, engine spark control, air-
conditioning, navigation etc. Even wristwatches are now becoming embedded systems.
The palmtops are powerful embedded systems using which we can carry out many general-
purpose tasks such as playing games and word processing.

Office Automation:
The office automation products using embedded systems are copying machine, fax
machine, key telephone, modem, printer, scanner etc.

Industrial Automation:
Today a lot of industries use embedded systems for process control. These include
pharmaceutical, cement, sugar, oil exploration, nuclear energy, electricity generation and
transmission. The embedded systems for industrial use are designed to carry out specific
tasks such as monitoring the temperature, pressure, humidity, voltage, current etc., and then
take appropriate action based on the monitored levels to control other devices or to send
information to a centralized monitoring station. In hazardous industrial environment, where
human presence has to be avoided, robots are used, which are programmed to do specific
jobs. The robots are now becoming very powerful and carry out many interesting and
complicated tasks such as hardware assembly.

Medical Electronics:

Department of ECE, GNITC 7


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Almost every medical equipment in the hospital is an embedded system. These


equipment’s include diagnostic aids such as ECG, EEG, blood pressure measuring devices,
X-ray scanners; equipment used in blood analysis, radiation, colonoscopy, endoscopy etc.
Developments in medical electronics have paved way for more accurate diagnosis of
diseases.

Computer Networking:
Computer networking products such as bridges, routers, Integrated Services Digital
Networks (ISDN), Asynchronous Transfer Mode (ATM), X.25 and frame relay switches
are embedded systems which implement the necessary data communication protocols. For
example, a router interconnects two networks. The two networks may be running different
protocol stacks. The router’s function is to obtain the data packets from incoming pores,
analyze the packets and send them towards the destination after doing necessary protocol
conversion. Most networking equipments, other than the end systems (desktop computers)
we use to access the networks, are embedded systems.

Telecommunications:
In the field of telecommunications, the embedded systems can be categorized as subscriber
terminals and network equipment. The subscriber terminals such as key telephones, ISDN
phones, terminal adapters, web cameras are embedded systems. The network equipment
includes multiplexers, multiple access systems, Packet Assemblers Dissemblers (PADs),
sate11ite modems etc. IP phone, IP gateway, IP gatekeeper etc. are the latest embedded
systems that provide very low-cost voice communication over the Internet.
Wireless Technologies:
Advances in mobile communications are paving way for many interesting applications
using embedded systems. The mobile phone is one of the marvels of the last decade of the
20’h century. It is a very powerful embedded system that provides voice communication
while we are on the move. The Personal Digital Assistants and the palmtops can now be

Department of ECE, GNITC 8


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

used to access multimedia service over the Internet. Mobile communication infrastructure
such as base station controllers, mobile switching centres are also powerful embedded
systems.

Insemination:
Testing and measurement are the fundamental requirements in all scientific and
engineering activities. The measuring equipment we use in laboratories to measure
parameters such as weight, temperature, pressure, humidity, voltage, current etc. are all
embedded systems. Test equipment such as oscilloscope, spectrum analyzer, logic
analyzer, protocol analyzer, radio communication test set etc. are embedded systems built
around powerful processors. Thank to miniaturization, the test and measuring equipment
are now becoming portable facilitating easy testing and measurement in the field by field-
personnel.

Security:
Security of persons and information has always been a major issue. We need to protect our
homes and offices; and also the information we transmit and store. Developing embedded
systems for security applications is one of the most lucrative businesses nowadays.
Security devices at homes, offices, airports etc. for authentication and verification are
embedded systems. Encryption devices are nearly 99 per cent of the processors that are
manufactured end up in~ embedded systems. Embedded systems find applications in every
industrial segment- consumer electronics, transportation, avionics, biomedical engineering,
manufacturing, process control and industrial automation, data communication,
telecommunication, defense, security etc. Used to encrypt the data/voice being transmitted
on communication links such as telephone lines. Biometric systems using fingerprint and
face recognition are now being extensively used for user authentication in banking
applications as well as for access control in high security buildings.

Finance:

Department of ECE, GNITC 9


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Financial dealing through cash and cheques are now slowly paving way for transactions
using smart cards and ATM (Automatic Teller Machine, also expanded as Any Time
Money) machines. Smart card, of the size of a credit card, has a small micro-controller and
memory; and it interacts with the smart card reader! ATM machine and acts as an
electronic wallet. Smart card technology has the capability of ushering in a cashless
society. Well, the list goes on. It is no exaggeration to say that eyes wherever you go, you
can see, or at least feel, the work of an embedded system.

Overview of Embedded System Architecture


Every embedded system consists of custom-built hardware built around a Central
Processing Unit (CPU). This hardware also contains memory chips onto which the
software is loaded. The software residing on the memory chip is also called the ‘firmware’.
The embedded system architecture can be represented as a layered architecture as shown in
Fig. The operating system runs above the hardware, and the application software runs
above the operating system. The same architecture is applicable to any computer including
a desktop computer. However, there are significant differences. It is not compulsory to
have an operating system in every embedded system. For small appliances such as remote
control units, air conditioners, toys etc., there is no need for an operating system and you
can write only the software specific to that application. For applications involving complex
processing, it is advisable to have an operating system. In such a case, you need to
integrate the application software with the operating system and then transfer the entire
software on to the memory chip. Once the software is transferred to the memory chip, the
software will continue to run for a long time you don’t need to reload new software.

Department of ECE, GNITC 10


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Now, let us see the details of the various building blocks of the hardware of an embedded
system. As shown in Fig. the building blocks are;
· Central Processing Unit (CPU)
· Memory (Read-only Memory and Random Access Memory)
· Input Devices
· Output devices
· Communication interfaces
· Application-specific circuitry

Central Processing Unit (CPU):

Department of ECE, GNITC 11


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

The Central Processing Unit (processor, in short) can be any of the following:
microcontroller, microprocessor or Digital Signal Processor (DSP). A micro-controller is a
low-cost processor. Its main attraction is that on the chip itself, there will be many other
components such as memory, serial communication interface, analog-to digital converter
etc. So, for small applications, a micro-controller is the best choice as the number of
external components required will be very less. On the other hand, microprocessors are
more powerful, but you need to use many external components with them. D5P is used
mainly for applications in which signal processing is involved such as audio and video
processing.
Memory:
The memory is categorized as Random Access Memory (RAM) and Read Only Memory
(ROM). The contents of the RAM will be erased if power is switched off to the chip,
whereas ROM retains the contents even if the power is switched off. So, the firmware is
stored in the ROM. When power is switched on, the processor reads the ROM; the program
is program is executed.
Input Devices:
Unlike the desktops, the input devices to an embedded system have very limited capability.
There will be no keyboard or a mouse, and hence interacting with the embedded system is
no easy task. Many embedded systems will have a small keypad-you press one key to give
a specific command. A keypad may be used to input only the digits. Many embedded
systems used in process control do not have any input device for user interaction; they take
inputs from sensors or transducers 1’fnd produce electrical signals that are in turn fed to
other systems.
Output Devices:
The output devices of the embedded systems also have very limited capability. Some
embedded systems will have a few Light Emitting Diodes (LEDs) to indicate the health
status of the system modules, or for visual indication of alarms. A small Liquid Crystal
Display (LCD) may also be used to display some important parameters.

Department of ECE, GNITC 12


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Communication Interfaces:
The embedded systems may need to, interact with other embedded systems at they may
have to transmit data to a desktop. To facilitate this, the embedded systems are provided
with one or a few communication interfaces such as RS232, RS422, RS485, Universal
Serial Bus (USB), IEEE 1394, Ethernet etc.
Application-Specific Circuitry:
Sensors, transducers, special processing and control circuitry may be required fat an
embedded system, depending on its application. This circuitry interacts with the processor
to carry out the necessary work. The entire hardware has to be given power supply either
through the 230 volts main supply or through a battery. The hardware has to design in such
a way that the power consumption is minimized.

2.2 Block Diagram:

Department of ECE, GNITC 13


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Power supply

LCD
Image
Processing

GSM

Fire Sensor
Arduino Buzzer (Sieren)

PIR Sensor Uno


Exhaust FAN

Temp Sensor

Department of ECE, GNITC 14


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

2.3 MODULES:
2.3.1 POWER SUPPLY
The power supply section is the section which provide +5V for the components to
work. IC LM7805 is used for providing a constant power of +5V.
The ac voltage, typically 220V, is connected to a transformer, which steps down that ac
voltage down to the level of the desired dc output. A diode rectifier then provides a full-
wave rectified voltage that is initially filtered by a simple capacitor filter to produce a dc
voltage. This resulting dc voltage usually has some ripple or ac voltage variation.
A regulator circuit removes the ripples and also retains the same dc value even if the input
dc voltage varies, or the load connected to the output dc voltage changes. This voltage
regulation is usually obtained using one of the popular voltage regulator IC units.

Block Diagram Of Power Supply


2.3.2 Transformer
Transformers convert AC electricity from one voltage to another with little loss of
power. Transformers work only with AC and this is one of the reasons why mains
electricity is AC.
Step-up transformers increase voltage, step-down transformers reduce voltage. Most power
supplies use a step-down transformer to reduce the dangerously high mains voltage (230V
in India) to a safer low voltage.
The input coil is called the primary and the output coil is called the secondary. There is no
electrical connection between the two coils; instead they are linked by an alternating
magnetic field created in the soft-iron core of the transformer. Transformers waste very

Department of ECE, GNITC 15


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

little power so the power out is (almost) equal to the power in. Note that as voltage is
stepped down current is stepped up.
The transformer will step down the power supply voltage (0-230V) to (0- 6V) level. Then
the secondary of the potential transformer will be connected to the bridge rectifier, which is
constructed with the help of PN junction diodes. The advantages of using bridge rectifier
are it will give peak voltage output as DC.

2.3.3 Rectifier
There are several ways of connecting diodes to make a rectifier to convert AC to
DC. The bridge rectifier is the most important and it produces full-wave varying DC. A
full-wave rectifier can also be made from just two diodes if a centre-tap transformer is
used, but this method is rarely used now that diodes are cheaper. A single diode can be
used as a rectifier but it only uses the positive (+) parts of the AC wave to produce half-
wave varying Dc

2.3.4 Bridge Rectifier


When four diodes are connected as shown in figure, the circuit is called as bridge
rectifier. The input to the circuit is applied to the diagonally opposite corners of the
network, and the output is taken from the remaining two corners. Let us assume that the
transformer is working properly and there is a positive potential, at point A and a negative
potential at point B. the positive potential at point A will forward bias D3 and reverse bias
D4.

Department of ECE, GNITC 16


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Bridge Rectifier
The negative potential at point B will forward bias D1 and reverse D2. At this time D3 and
D1 are forward biased and will allow current flow to pass through them; D4 and D2 are
reverse biased and will block current flow.
One advantage of a bridge rectifier over a conventional full-wave rectifier is that with a
given transformer the bridge rectifier produces a voltage output that is nearly twice that of
the conventional full-wave circuit.
i. The main advantage of this bridge circuit is that it does not require a special centre
tapped transformer, thereby reducing its size and cost.
ii. The single secondary winding is connected to one side of the diode bridge network and
the load to the other side as shown below.
iii. The result is still a pulsating direct current but with double the frequency.

Output Waveform Of DC

Smoothing
Smoothing is performed by a large value electrolytic capacitor connected across the
DC supply to act as a reservoir, supplying current to the output when the varying DC

Department of ECE, GNITC 17


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

voltage from the rectifier is falling. The capacitor charges quickly near the peak of the
varying DC, and then discharges as it supplies current to the output.

2.3.5 Voltage Regulators


Voltage regulators comprise a class of widely used ICs. Regulator IC units contain the
circuitry for reference source, comparator amplifier, control device, and overload
protection all in a single IC. IC units provide regulation of either a fixed positive voltage, a
fixed negative voltage, or an adjustably set voltage. The regulators can be selected for
operation with load currents from hundreds of milli amperes to tens of amperes,
corresponding to power ratings from milli watts totens of watts.
A fixed three-terminal voltage regulator has an unregulated dc input voltage, Vi, applied to
one input terminal, a regulated dc output voltage, Vo, from a second terminal, with the
third terminal connected to ground.
The series 78 regulators provide fixed positive regulated voltages from 5 to 24 volts.
Similarly, the series 79 regulators provide fixed negative regulated voltages from 5 to 24
volts. Voltage regulator ICs are available with fixed (typically 5, 12 and 15V) or variable
output voltages. They are also rated by the maximum current they can pass. Negative
voltage regulators are available, mainly for use in dual supplies. Most regulators include
some automatic protection from excessive current ('overload protection') and overheating
('thermal protection').
Many of the fixed voltage regulator ICs has 3 leads and look like power transistors, such as
the 7805 +5V 1Amp regulator. They include a hole for attaching a heat sink if necessary.

Regulator

Department of ECE, GNITC 18


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Circuit Diagram Of Power Supply

2.4 MICROCONTROLLER
2.4.1 ARDUINO UNO
Arduino/genuino uno is a microcontroller board based on the atmega328p (datasheet). It
has 14 digital input/output pins (of which 6 can be used as pwm outputs), 6 analog inputs, a
16 MHz quartz crystal, a usb connection, a power jack, an icsp header and a reset button. It
contains everything needed to support the microcontroller; simply connect it to a computer
with a usb cable or power it with a ac-to-dc adapter or battery to get started.. You can

Department of ECE, GNITC 19


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

tinker with your uno without worrying too much about doing something wrong, worst case
scenario you can replace the chip for a few dollars and start over again.
"Uno" means one in italian and was chosen to mark the release of arduino software (ide)
1.0. The uno board and version 1.0 of arduino software (ide) were the reference versions of
arduino, now evolved to newer releases. The uno board is the first in a series of usb
arduino boards, and the reference model for the arduino platform; for an extensive list of
current, past or outdated boards see the arduino index of boards.

2.4.2 TECHNICAL SPECIFICATIONS

Department of ECE, GNITC 20


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

2.4.3 PROGRAMMING
The arduino/genuino uno can be programmed with the (arduino software (ide)). Select
"arduino/genuino uno from the tools > board menu (according to the microcontroller on
your board). For details, see the reference and tutorials.
The atmega328 on the arduino/genuino uno comes pre-programmed with a bootloader that
allows you to upload new code to it without the use of an external hardware programmer. It
communicates using the original stk500 protocol (reference, c header files).

Department of ECE, GNITC 21


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

You can also bypass the bootloader and program the microcontroller through the icsp (in-
circuit serial programming) header using arduino isp or similar; see these instructions for
details.
The atmega16u2 (or 8u2 in the rev1 and rev2 boards) firmware source code is available in
the arduino repository. The atmega16u2/8u2 is loaded with a dfu bootloader, which can be
activated by:
On rev1 boards: connecting the solder jumper on the back of the board (near the map of
italy) and then reseting the 8u2.
On rev2 or later boards: there is a resistor that pulling the 8u2/16u2 hwb line to ground,
making it easier to put into dfu mode.
You can then use atmel's flip software (windows) or the dfu programmer (mac os x and
linux) to load a new firmware. Or you can use the isp header with an external programmer
(overwriting the dfu bootloader). See this user-contributed tutorial for more information.

2.4.4 WARNINGS
The arduino/genuino uno has a resettable polyfuse that protects your computer's usb ports
from shorts and overcurrent. Although most computers provide their own internal
protection, the fuse provides an extra layer of protection. If more than 500 ma is applied to
the usb port, the fuse will automatically break the connection until the short or overload is
removed.

2.4.5 DIFFERENCES WITH OTHER BOARDS


The uno differs from all preceding boards in that it does not use the ftdi usb-to-serial driver
chip. Instead, it features the atmega16u2 (atmega8u2 up to version r2) programmed as a
usb-to-serial converter.

2.4.6 POWER
The arduino/genuino uno board can be powered via the usb connection or with an external
power supply. The power source is selected automatically.

Department of ECE, GNITC 22


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

External (non-usb) power can come either from an ac-to-dc adapter (wall-wart) or battery.
The adapter can be connected by plugging a 2.1mm center-positive plug into the board's
power jack. Leads from a battery can be inserted in the gnd and vin pin headers of the
power connector.
The board can operate on an external supply from 6 to 20 volts. If supplied with less than
7v, however, the 5v pin may supply less than five volts and the board may become
unstable. If using more than 12v, the voltage regulator may overheat and damage the
board. The recommended range is 7 to 12 volts.
The power pins are as follows:
Vin. The input voltage to the arduino/genuino board when it's using an external power
source (as opposed to 5 volts from the usb connection or other regulated power source).
You can supply voltage through this pin, or, if supplying voltage via the power jack, access
it through this pin.
5v.this pin outputs a regulated 5v from the regulator on the board. The board can be
supplied with power either from the dc power jack (7 - 12v), the usb connector (5v), or the
vin pin of the board (7-12v). Supplying voltage via the 5v or 3.3v pins bypasses the
regulator, and can damage your board. We don't advise it.
3v3. A 3.3 volt supply generated by the on-board regulator. Maximum current draw is 50
ma.
Gnd. Ground pins.
Ioref. This pin on the arduino/genuino board provides the voltage reference with which the
microcontroller operates. A properly configured shield can read the ioref pin voltage and
select the appropriate power source or enable voltage translators on the outputs to work
with the 5v or 3.3v.

2.4.7 MEMORY
The atmega328 has 32 kb (with 0.5 kb occupied by the bootloader). It also has 2 kb of sram
and 1 kb of eeprom (which can be read and written with the eeprom library).
Input and output

Department of ECE, GNITC 23


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

See the mapping between arduino pins and atmega328p ports. The mapping for the
atmega8, 168, and 328 is identical.

2.4.8 CIRCUIT PIN DIAGRAM

Each of the 14 digital pins on the uno can be used as an input or output, using pinmode(),
digitalwrite (), and digitalread () functions. They operate at 5 volts. Each pin can provide or
receive 20 ma as recommended operating condition and has an internal pull-up resistor
(disconnected by default) of 20-50k ohm. A maximum of 40ma is the value that must not
be exceeded on any i/o pin to avoid permanent damage to the microcontroller.
In addition, some pins have specialized functions:

Department of ECE, GNITC 24


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Serial: 0 (rx) and 1 (tx). Used to receive (rx) and transmit (tx) ttl serial data. These pins are
connected to the corresponding pins of the atmega8u2 usb-to-ttl serial chip.
External interrupts: 2 and 3. These pins can be configured to trigger an interrupt on a low
value, a rising or falling edge, or a change in value. See the attachinterrupt() function for
details.
Pwm: 3, 5, 6, 9, 10, and 11. Provide 8-bit pwm output with the analog write() function.
Spi: 10 (ss), 11 (mosi), 12 (miso), 13 (sck). These pins support spi communication using
the spi library.
Led: 13. There is a built-in led driven by digital pin 13. When the pin is high value, the led
is on, when the pin is low, it's off.
Twi: a4 or sda pin and a5 or scl pin. Support twi communication using the wire library.
The uno has 6 analog inputs, labeled a0 through a5, each of which provide 10 bits of
resolution (i.e. 1024 different values). By default they measure from ground to 5 volts,
though is it possible to change the upper end of their range using the aref pin and the
analogreference() function.
There are a couple of other pins on the board:
Aref.Reference voltage for the analog inputs. Used with analogreference().
Reset. Bring this line low to reset the microcontroller. Typically used to add a reset button
to shields which block the one on the board.

2.4.9 COMMUNICATION
Arduino/genuino uno has a number of facilities for communicating with a computer,
another arduino/genuino board, or other microcontrollers. The atmega328 provides uartttl
(5v) serial communication, which is available on digital pins 0 (rx) and 1 (tx). An
atmega16u2 on the board channels this serial communication over usb and appears as a
virtual com port to software on the computer. The 16u2 firmware uses the standard usb
com drivers, and no external driver is needed. However, on windows, a .inf file is required.
The arduino software (ide) includes a serial monitor which allows simple textual data to be
sent to and from the board. The rx and txleds on the board will flash when data is being

Department of ECE, GNITC 25


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

transmitted via the usb-to-serial chip and usb connection to the computer (but not for serial
communication on pins 0 and 1).
A softwareserial library allows serial communication on any of the uno's digital pins.
The atmega328 also supports i2c (twi) and spi communication. The arduino software (ide)
includes a wire library to simplify use of the i2c bus; see the documentation for details. For
spi communication, use the spi library.

2.4.10 AUTOMATIC (SOFTWARE) RESET


Rather than requiring a physical press of the reset button before an upload, the
arduino/genuino uno board is designed in a way that allows it to be reset by software
running on a connected computer. One of the hardware flow control lines (dtr) of the
atmega8u2/16u2 is connected to the reset line of the atmega328 via a 100 Nano farad
capacitor. When this line is asserted (taken low), the reset line drops long enough to reset
the chip. The arduino software (ide) uses this capability to allow you to upload code by
simply pressing the upload button in the interface toolbar. This means that the bootloader
can have a shorter timeout, as the lowering of dtr can be well-coordinated with the start of
the upload.
This setup has other implications. When the uno is connected to either a computer running
mac os x or linux, it resets each time a connection is made to it from software (via usb).
For the following half-second or so, the bootloader is running on the uno. While it is
programmed to ignore malformed data (i.e. Anything besides an upload of new code), it
will intercept the first few bytes of data sent to the board after a connection is opened. If a
sketch running on the board receives one-time configuration or other data when it first
starts, make sure that the software with which it communicates waits a second after
opening the connection and before sending this data.
The uno board contains a trace that can be cut to disable the auto-reset. The pads on either
side of the trace can be soldered together to re-enable it. It's labeled "reset-en". You may
also be able to disable the auto-reset by connecting a 110 ohm resistor from 5v to the reset
line; see this forum thread for details.

Department of ECE, GNITC 26


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Department of ECE, GNITC 27


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

2.5 LIQUID CRYSTAL DISPLAY (LCD)


LCD (Liquid Crystal Display) screen is an electronic display module and find a
wide range of applications. A 16x2 LCD display is very basic module and is very
commonly used in various devices and circuits. These modules are preferred over seven
segments and other multi segment LEDs. The reasons being: LCDs are economical; easily
programmable; have no limitation of displaying special & even custom characters (unlike
in seven segments), animations and so on.
A 16x2 LCD means it can display 16 characters per line and there are 2 such lines. In this
LCD each character is displayed in 5x7 pixel matrix. This LCD has two registers, namely,
Command and Data.
The command register stores the command instructions given to the LCD. A command is
an instruction given to LCD to do a predefined task like initializing it, clearing its screen,
setting the cursor position, controlling display etc. The data register stores the data to be
displayed on the LCD. The data is the ASCII value of the character to be displayed on the
LCD.

Fig. 16x2 LCD


2.5.1 Introduction
The most commonly used Character based LCDs are based on Hitachi's HD44780
controller or other which are compatible with HD44580.

2.5.2 Pin Description


Most LCDs with 1 controller has 14 Pins and LCDs with 2 controller has 16 Pins
(two pins are extra in both for back-light LED connections). Pin description is shown in the
table below.

Department of ECE, GNITC 28


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Pin Configuration table for a 16X2 LCD character display:-


Pin
Symbol Function
Number
1 Vss Ground Terminal
2 Vcc Positive Supply
3 Vdd Contrast adjustment
4 RS Register Select; 0→Instruction Register, 1→Data Register
5 R/W Read/write Signal; 1→Read, 0→ Write
6 E Enable; Falling edge
7 DB0
8 DB1
9 DB2 Bi-directional data bus, data transfer is performed once, thru
10 DB3 DB0 to DB7, in the case of interface data length is 8-bits;
11 DB4 and twice, through DB4 to DB7 in the case of interface data

12 DB5 length is 4-bits. Upper four bits first then lower four bits.

13 DB6
14 DB7
15 LED-(K) Back light LED cathode terminal
16 LED+(A) Back Light LED anode terminal
Table Pin Description of LCD
Data/Signals/Execution of LCD
Coming to data, signals and execution.

Department of ECE, GNITC 29


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

LCD accepts two types of signals, one is data, and another is control. These signals
are recognized by the LCD module from status of the RS pin. Now data can be read also
from the LCD display, by pulling the R/W pin high. As soon as the E pin is pulsed, LCD
display reads data at the falling edge of the pulse and executes it, same for the case of
transmission.
LCD display takes a time of 39-43µS to place a character or execute a command.
Except for clearing display and to seek cursor to home position it takes 1.53ms to 1.64ms.
Any attempt to send any data before this interval may lead to failure to read data or
execution of the current data in some devices. Some devices compensate the speed by
storing the incoming data to some temporary registers.
Instruction Register (IR) and Data Register (DR)
There are two 8-bit registers in HD44780 controller Instruction and Data register.
Instruction register corresponds to the register where you send commands to LCD e.g LCD
shift command, LCD clear, LCD address etc. and Data register is used for storing data
which is to be displayed on LCD. when send the enable signal of the LCD is asserted, the
data on the pins is latched in to the data register and data is then moved automatically to
the DDRAM and hence is displayed on the LCD. Data Register is not only used for
sending data to DDRAM but also for CGRAM, the address where you want to send the
data, is decided by the instruction you send to LCD. We will discuss more on LCD
instruction set further in this tutorial.
Commands and Instruction set
Only the instruction register (IR) and the data register (DR) of the LCD can be
controlled by the MCU. Before starting the internal operation of the LCD, control
information is temporarily stored into these registers to allow interfacing with various
MCUs, which operate at different speeds, or various peripheral control devices. The
internal operation of the LCD is determined by signals sent from the MCU. These signals,
which include register selection signal (RS), read/write signal (R/W), and the data bus
(DB0 to DB7), make up the LCD instructions (Table 3). There are four categories of
instructions that:

Department of ECE, GNITC 30


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

 Designate LCD functions, such as display format, data length, etc.


 Set internal RAM addresses
 Perform data transfer with internal RAM
 Perform miscellaneous functions

Department of ECE, GNITC 31


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Table Showing various LCD Command Description

Department of ECE, GNITC 32


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Although looking at the table you can make your own commands and test them. Below is a
brief list of useful commands which are used frequently while working on the LCD.

Department of ECE, GNITC 33


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

2.5.3 List of Command


No. Instruction Hex Decimal

Function Set: 8-bit, 1


1 0x30 48
Line, 5x7 Dots
Function Set: 8-bit, 2
2 0x38 56
Line, 5x7 Dots
Function Set: 4-bit, 1
3 0x20 32
Line, 5x7 Dots
Function Set: 4-bit, 2
4 0x28 40
Line, 5x7 Dots
5 Entry Mode 0x06 6
Display off Cursor off
(clearing display
6 0x08 8
without clearing
DDRAM content)
7 Display on Cursor on 0x0E 14
8 Display on Cursor off 0x0C 12
Display on Cursor
9 0x0F 15
blinking
10 Shift entire display left 0x18 24
Shift entire display
12 0x1C 30
right
Move cursor left by
13 0x10 16
one character
Move cursor right by
14 0x14 20
one character
15 Clear Display (also 0x01 1
clear DDRAM

Department of ECE, GNITC 34


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

content)
Set DDRAM address
16 or courser position on 0x80+add* 128+add*
display
Set CGRAM address
17 or set pointer to 0x40+add** 64+add**
CGRAM location
Table: Frequently Used Commands and Instructions for LCD

* DDRAM address given in LCD basics section see Figure 2,3,4


** CGRAM address from 0x00 to 0x3F, 0x00 to 0x07 for char1 and so on.
Liquid crystal displays interfacing with Controller
The LCD standard requires 3 control lines and 8 I/O lines for the data bus.
• 8 data pins D7:D0
Bi-directional data/command pins.
Alphanumeric characters are sent in ASCII format.
• RS: Register Select
RS = 0 -> Command Register is selected
RS = 1 -> Data Register is selected
• R/W: Read or Write
0 -> Write, 1 -> Read
• E: Enable (Latch data)
Used to latch the data present on the data pins.
A high-to-low edge is needed to latch the data.

Department of ECE, GNITC 35


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

2.6 TEMPERATURE SENSOR


Temperature is the most-measured process variable in industrial automation. Most
commonly, a temperature sensor is used to convert temperature value to an electrical value.
Temperature Sensors are the key to read temperatures correctly and to control temperature
in industrials applications.

A large distinction can be made between temperature sensor types. Sensors differ a lot in
properties such as contact-way, temperature range, calibrating method and sensing
element. The temperature sensors contain a sensing element enclosed in housings of plastic
or metal. With the help of conditioning circuits, the sensor will reflect the change of
environmental temperature.

Temperature sensor (LM35)

Department of ECE, GNITC 36


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Pin Definition
The definition of gray-scale sensor pin is
1. Signal Output
2. GND
3. Power

Features Of Temperature Sensor


 Calibrated directly in Celsius (centigrade)
 0.50 C Ensured accuracy (at +250 C)
 Suitable for remote applications
 Operate from 4 to 30 V
 Low cost due to wafer-level trimming

Specifications
 Type: Analog
 Sensitivity: 10mV per degree Celcius
 Functional range: 0 degree Celsius to 100 degree Celsius

Description
The LM35 series are precision integrated-circuit temperature sensors, with an
output voltage linearly proportional to the Centigrade temperature. Thus LM35 has an

Department of ECE, GNITC 37


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

advantage over linear temperature sensors calibrated in ° Kelvin, as the user is not required
to subtract a large constant voltage from the output to obtain convenient Centigrade
scaling.
In the temperature functional module we developed, we use the LM34 series of
temperature sensors. The LM34 series are precision integrated-circuit temperature sensors,
whose output voltage is linearly proportional to the Fahrenheit temperature. The LM34
thus has an advantage over linear temperature sensors calibrated in degrees Kelvin, as the
user is not required to subtract a large constant voltage from its output to obtain convenient
Fahrenheit scaling. The LM34 does not require any external calibration or trimming to
provide typical accuracies of ±1.2°F at room temperature and ±11.2°F over a full -50 to
+300°F temperature range. The LM34 is rated to operate over a -50° to +300°F
temperature range.

Figure 1 Circuit diagram for the LM34 temperature sensor functional module
It is easy to include the LM34 series in a temperature measuring application. The
output voltage of LM34 is linearly proportional to the Fahrenheit temperature, it has a
Linear +10.0 mV/°F scale factor which means that you will get n*10.0 mV output voltage
if the environment temperature is n°F.

The LM34 series is available packaged in hermetic TO-46 transistor packages,


while the LM34C, LM34CA and LM34D are also available in the plastic TO-92 transistor
package. The LM34D is also available in an 8-lead surface mount small outline package. In
our functional module, LM34H in metal can package (TO-46) is used in the functional

Department of ECE, GNITC 38


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

module, it is very important to know that the wiring of sensor should be based on the
positions of the leading pins in different packages.

Figure 2 Package Diagram of LM34

DESCRIPTION OF TEMPERATURE SENSOR FUNCTIONAL MODULE


The temperature sensor functional module consists of two parts: the function
module box and the probe head. The LM34 temperature sensor is mounted on the probe
head. Be careful to make sure that the sensor is properly mounted on the probe head. (refer
to Figure 4 Labeled picture of the probe head.)

Department of ECE, GNITC 39


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

GND OUTPUT VOLTAGE

PROBE HEAD

SENSOR

GND +5V

Figure 3 Labeled picture of the temperature sensor circuit functional module.


By replacing the LM34 with another precision integrated-circuit temperature sensor
LM35, we can easily get an output voltage proportional to the centigrade temperature. The
LM35 sensor has a linear +10.0 mV/°C scale factor and a temperature range from -55°C to
+150°C.In fact LM34 and LM35 are among the same series of temperature sensors so that
they can be easily exchanged in different applications. The wiring for LM 35 is the same
as that of LM34. Please refer to the datasheets of LM34 and LM35 for more detailed
packaging and features information.

APPLICATIONS

Department of ECE, GNITC 40


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

The LM35 is applied easily in the same way as other integrated-circuit temperature
sensors. Glue or cement the device to a surface and the temperature should be within about
0.01°C of the surface temperature.

This presumes that the ambient air temperature is almost the same as the surface
temperature. If the air temperature were much higher or lower than the surface
temperature, the actual temperature of the LM35 die would be at an intermediate
temperature between the surface temperature and the air temperature, which is especially
true for the TO-92 plastic package where the copper leads are the principal thermal path to
carry heat into the device, so its temperature might be closer to the air temperature than to
the surface temperature.

To minimize this problem, ensure that the wiring to the LM35, as it leaves the device, is
held at the same temperature as the surface of interest. The easiest way to do this is to
cover up these wires with a bead of epoxy which will insure that the leads and wires are all
at the same temperature as the surface, and that the temperature of the LM35 die is not
affected by the air temperature.

Department of ECE, GNITC 41


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

2.7 PASSIVE INFRA-RED SENSOR


Introduction
A Passive Infrared sensor (PIR sensor) is an electronic device that measures
infrared (IR) light radiating from objects in its field of view. PIR sensors are often used in
the construction of PIR-based motion detectors. Apparent motion is detected when an
infrared source with one temperature, such as a human, passes in front of an infrared
source with another temperature, such as a wall.
All objects emit what is known as black body radiation. It is usually infrared
radiation that is invisible to the human eye but can be detected by electronic devices
designed for such a purpose. The term passive in this instance means that the PIR device
does not emit an infrared beam but merely passively accepts incoming infrared radiation.
“Infra” meaning below our ability to detect it visually, and “Red” because this color
represents the lowest energy level that our eyes can sense before it becomes invisible.
Thus, infrared means below the energy level of the color red, and applies to many sources
of invisible energy.
Infrared radiation enters through the front of the sensor, known as the sensor face.
At the core of a PIR sensor is a solid state sensor or set of sensors, made from an
approximately 1/4 inch square of natural or artificial pyroelectric materials, usually in the
form of a thin film, out of gallium nitride (GaN), caesium nitrate (CsNO3), polyvinyl
fluorides, derivatives of phenylpyrazine, and cobaltphthalocyanine. Lithium tantalate
(LiTaO3) is a crystal exhibiting both piezoelectric and pyroelectric properties.

Department of ECE, GNITC 42


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

The sensor is often manufactured as part of an integrated circuit and may consist of
one (1), two (2) or four (4) 'pixels' of equal areas of the pyroelectric material. Pairs of the
sensor pixels may be wired as opposite inputs to a differential amplifier. In such a
configuration, the PIR measurements cancel each other so that the average temperature of
the field of view is removed from the electrical signal; an increase of IR energy across the
entire sensor is self-cancelling and will not trigger the device. This allows the device to
resist false indications of change in the event of being exposed to flashes of light or field-
wide illumination. (Continuous bright light could still saturate the sensor materials and
render the sensor unable to register further information.) At the same time, this differential
arrangement minimizes common-mode interference, allowing the device to resist triggering
due to nearby electric fields. However, a differential pair of sensors cannot measure
temperature in that configuration and therefore this configuration is specialized for motion
detectors.

Department of ECE, GNITC 43


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

PIR Sensor
This PIR (Passive Infra-Red) Sensor is a pyroelectric device that detects motion by
measuring changes in the infrared (heat) levels emitted by surrounding objects. This
motion can be detected by checking for a sudden change in the surrounding IR patterns.
When motion is detected the PIR sensor outputs a high signal on its output pin. This logic
signal can be read by a microcontroller or used to drive a transistor to switch a higher
current load.

Figure: 5.2.1 PIR Sensor Module\


Features
Detection range up to 20 feet away Single bit output Jumper selects single or
continuous trigger output mode 3-pin SIP header ready for breadboard or through hole.
Product size makes it easy to conceal Compatible with BASIC Stamp, Propeller, and many
other microcontrollers.

Key Specifications
 Power requirements: 3.3 to 5 VDC; >3 mA (may vary)
 Communication: Single bit high/low output
 Operating temperature: 32 to 122 °F (0 to 50 °C)
 Dimensions: 1.27 x 0.96 x 1.0 in (32.2 x 24.3 x 25.4 mm)

Theory of Operation

Department of ECE, GNITC 44


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Pyroelectric devices, such as the PIR sensor, have elements made of a crystalline
material that generates an electric charge when exposed to infrared radiation. The changes
in the amount of infrared striking the element change the voltages generated, which are
measured by an on-board amplifier. The device contains a special filter called a Fresnel
lens, which focuses the infrared signals onto the element. As the ambient infrared signals
change rapidly, the on-board amplifier trips the output to indicate motion.

PIR pin definition and ratings:

Table: 5.5.1 Pin configuration of PIR Sensor

Fig. Pin diagram of PIR Sensor

Department of ECE, GNITC 45


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

2.8 FIRE SENSOR

The Fire sensor, as the name suggests, is used as a simple and compact device for
protection against fire. The module makes use of IR sensor and comparator to detect fire up
to a range of 1-2 meters.

The device, weighing about 5 grams, can be easily mounted on the device body. It gives a
high output on detecting fire. This output can then be used to take the requisite action. An
on-board LED is also provided for visual indication.

Feature
 Typical Maximum Range :2 m .
 Indicator LED with 3 pin easy interface connector.
 Operating Voltage 5v

An automatic fire sensor sense the unwanted presence of fire by monitoring


environmental changes associated with combustion. In general, a fire alert system is
classified as either automatically actuated, manually actuated, or both. Fire sensor are
intended to notify the fire in the building occupants to evacuate in the event of a fire or
other emergency, report the event to an off-premises location in order to summon
emergency services, and to prepare the structure and associated systems to control the
spread of fire and smoke.

Department of ECE, GNITC 46


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Fig: Fire sensor

 Fire alarm control panel: This component, the hub of the system, monitors inputs and
system integrity, controls outputs and relays information.
 Primary Power supply: Commonly the non-switched 120 or 240 Volt Alternating Current
source supplied from a commercial power utility. In non-residential applications, a branch
circuit is dedicated to the fire alarm system and its constituents. "Dedicated branch
circuits" should not be confused with "Individual branch circuits" which supply energy to a
single appliance.
 Secondary (backup) Power supplies: This component, commonly consisting of sealed lead-
acid storage batteries or other emergency sources including generators, is used to supply
energy in the event of a primary power failure.
 Initiating Devices: This component acts as an input to the fire alarm control unit and are
either manually or automatically actuated. Examples would be devices like pull stations or
smoke detectors.
 Notification appliances: This component uses energy supplied from the fire alarm system
or other stored energy source, to inform the proximate persons of the need to take action,
usually to evacuate. This is done by means of a flashing light, strobe light,
electromechanical horn, speaker, or a combination of these devices.

Department of ECE, GNITC 47


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

 Building Safety Interfaces: This interface allows the fire alarm system to control aspects of
the built environment and to prepare the building for fire and to control the spread of
smoke fumes and fire by influencing air movement, lighting, process control, human
transport and exit.

Manually actuated devices; Break glass stations, Buttons and manual fire alarm
activation are constructed to be readily located (near the exits), identified, and operated.

Automatically actuated devices can take many forms intended to respond to any
number of detectable physical changes associated with fire: convicted thermal energy; heat
detector, products of combustion; smoke detector, radiant energy; flame detector,
combustion gasses; carbon monoxide detector and release of extinguishing agents; water-
flow detector. The newest innovations can use cameras and computer algorithms to analyze
the visible effects of fire and movement in applications inappropriate for or hostile to other
detection methods.

2.9 GLOBAL SYSTEM FOR MOBILE


Global System for Mobile Communications (GSM) modems are specialized types of
modems that operate over subscription based wireless networks, similar to a mobile phone.
A GSM modem accepts a Subscriber Identity Module (SIM) card, and basically acts like a
mobile phone for a computer. Such a modem can even be a dedicated mobile phone that
the computer uses for GSM network capabilities.
Traditional modems are attached to computers to allow dial-up connections to other
computer systems. A GSM modem operates in a similar fashion, except that it sends and
receives data through radio waves rather than a telephone line. This type of modem may be
an external device connected via a Universal Serial Bus (USB) cable or a serial cable.
More commonly, however, it is a small device that plugs directly into the USB port or card
slot on a computer or laptop.

Department of ECE, GNITC 48


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

It is widely used mobile communication system in the world. GSM is an open and digital
cellular technology used for transmitting mobile voice and data services operates at the
850MHz, 900MHz, 1800MHz and 1900MHz frequency bands.

Features
 Improved spectrum efficiency
 International roaming
 Compatibility with integrated services digital network (ISDN)
 Support for new services.
 SIM phonebook management
 Fixed dialing number (FDN)
 Real time clock with alarm management
 High-quality speech
 Uses encryption to make phone calls more secure
 Short message service (SMS)

A GSM modem is a wireless modem that works with a GSM wireless network. A wireless
modem behaves like a dial-up modem. The main difference between them is that a dial-up
modem sends and receives data through a fixed telephone line while a wireless modem
sends and receives data through radio waves.
A GSM modem can be an external device or a PC Card / PCMCIA Card. Typically, an
external GSM modem is connected to a computer through a serial cable or a USB cable. A
GSM modem in the form of a PC Card / PCMCIA Card is designed for use with a laptop
computer. It should be inserted into one of the PC Card / PCMCIA Card slots of a laptop
computer. Like a GSM mobile phone, a GSM modem requires a SIM card from a wireless
carrier in order to operate.
As mentioned in earlier sections of this SMS tutorial, computers use AT commands to
control modems. Both GSM modems and dial-up modems support a common set of
standard AT commands. You can use a GSM modem just like a dial-up modem.

Department of ECE, GNITC 49


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

In addition to the standard AT commands, GSM modems support an extended set of AT


commands. These extended AT commands are defined in the GSM standards. With the
extended AT commands, you can do things like:
 Reading, writing and deleting SMS messages.
 Sending SMS messages.
 Monitoring the signal strength.
 Monitoring the charging status and charge level of the battery.
 Reading, writing and searching phone book entries.
The number of SMS messages that can be processed by a GSM modem per minute is very
low -- only about six to ten SMS messages per minute.

GSM Modem Application

THE GSM NETWORK


GSM provides recommendations, not requirements. The GSM specifications define the
functions and interface requirements in detail but do not address the hardware. The reason
for this is to limit the designers as little as possible but still to make it possible for the
operators to buy equipment from different suppliers. The GSM network is divided into

Department of ECE, GNITC 50


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

three major systems: the switching system (SS), the base station system (BSS), and the
operation and support system (OSS).

GSM Network Elements

Department of ECE, GNITC 51


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

The Switching System


The switching system (SS) is responsible for performing call processing and subscriber-
related functions. The switching system includes the following functional units.
 Home location register (HLR)—The HLR is a database used for storage and
management of subscriptions. The HLR is considered the most important database, as it
stores permanent data about subscribers, including a subscriber's service profile, location
information, and activity status. When an individual buys a subscription from one of the
PCS operators, he or she is registered in the HLR of that operator.
 mobile services switching center (MSC)—The MSC performs the telephony switching
functions of the system. It controls calls to and from other telephone and data systems. It
also performs such functions as toll ticketing, network interfacing, common channel
signaling, and others.
 visitor location register (VLR)—The VLR is a database that contains temporary
information about subscribers that is needed by the MSC in order to service visiting
subscribers. The VLR is always integrated with the MSC. When a mobile station roams
into a new MSC area, the VLR connected to that MSC will request data about the mobile
station from the HLR. Later, if the mobile station makes a call, the VLR will have the
information needed for call setup without having to interrogate the HLR each time.
 authentication center (AUC)—A unit called the AUC provides authentication and
encryption parameters that verify the user's identity and ensure the confidentiality of each
call. The AUC protects network operators from different types of fraud found in today's
cellular world.
 equipment identity register (EIR)—The EIR is a database that contains information
about the identity of mobile equipment that prevents calls from stolen, unauthorized, or
defective mobile stations. The AUC and EIR are implemented as stand-alone nodes or as a
combined AUC/EIR node.

Department of ECE, GNITC 52


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

The Base Station System (BSS)


All radio-related functions are performed in the BSS, which consists of base station
controllers (BSCs) and the base transceiver stations (BTSs).
 BSC—The BSC provides all the control functions and physical links between the MSC
and BTS. It is a high-capacity switch that provides functions such as handover, cell
configuration data, and control of radio frequency (RF) power levels in base transceiver
stations. A number of BSCs are served by an MSC.
 BTS—The BTS handles the radio interface to the mobile station. The BTS is the radio
equipment (transceivers and antennas) needed to service each cell in the network. A group
of BTSs are controlled by a BSC.

The Operation and Support System


The operations and maintenance center (OMC) is connected to all equipment in the
switching system and to the BSC. The implementation of OMC is called the operation and
support system (OSS). The OSS is the functional entity from which the network operator
monitors and controls the system. The purpose of OSS is to offer the customer cost-
effective support for centralized, regional, and local operational and maintenance activities
that are required for a GSM network. An important function of OSS is to provide a
network overview and support the maintenance activities of different operation and
maintenance organizations.

Department of ECE, GNITC 53


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

GSM NETWORK AREAS


The GSM network is made up of geographic areas. As shown in 4.2, these areas include
cells, location areas (LAs), MSC/VLR service areas, and public land mobile network
(PLMN) areas.

Network Areas
The cell is the area given radio coverage by one base transceiver station. The GSM
network identifies each cell via the cell global identity (CGI) number assigned to each cell.
The location area is a group of cells. It is the area in which the subscriber is paged. Each
LA is served by one or more base station controllers, yet only by a single MSC (fig 4.3).
Each LA is assigned a location area identity (LAI) number.

Location Areas
An MSC/VLR service area represents the part of the GSM network that is covered by one
MSC and which is reachable, as it is registered in the VLR of the MSC (fig 4.4).

Department of ECE, GNITC 54


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

MSC /VLR Service Areas


The PLMN service area is an area served by one network operator(fig 4.5).

SPECIFICATIONS AND CHARACTERISTICS FOR GSM


 frequency band—The frequency range specified for GSM is 1,850 to 1,990 MHz
(mobile station to base station).
 duplex distance—The duplex distance is 80 MHz. Duplex distance is the distance
between the uplink and downlink frequencies. A channel has two frequencies, 80 MHz
apart.
 channel separation—The separation between adjacent carrier frequencies. In GSM,
this is 200 kHz.
 modulation—Modulation is the process of sending a signal by changing the
characteristics of a carrier frequency. This is done in GSM via Gaussian minimum shift
keying (GMSK).
 transmission rate—GSM is a digital system with an over-the-air bit rate of 270 kbps.

Department of ECE, GNITC 55


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

 access method—GSM utilizes the time division multiple access (TDMA) concept.
TDMA is a technique in which several different calls may share the same carrier. Each call
is assigned a particular time slot.
 speech coder—GSM uses linear predictive coding (LPC). The purpose of LPC is to
reduce the bit rate. The LPC provides parameters for a filter that mimics the vocal tract.
The signal passes through this filter, leaving behind a residual signal. Speech is encoded at
13 kbps.

GSM SUBSCRIBER SERVICES


There are two basic types of services offered through GSM: telephony (also referred to as
teleservices) and data (also referred to as bearer services). Telephony services are mainly
voice services that provide subscribers with the complete capability (including necessary
terminal equipment) to communicate with other subscribers. Data services provide the
capacity necessary to transmit appropriate data signals between two access points creating
an interface to the network. In addition to normal telephony and emergency calling, the
following subscriber services are supported by GSM:
 dual-tone multifrequency (DTMF)—DTMF is a tone signaling scheme often used for
various control purposes via the telephone network, such as remote control of an answering
machine. GSM supports full-originating DTMF.
 facsimile group III—GSM supports CCITT Group 3 facsimile. As standard fax
machines are designed to be connected to a telephone using analog signals, a special fax
converter connected to the exchange is used in the GSM system. This enables a GSM–
connected fax to communicate with any analog fax in the network.
 short message services—A convenient facility of the GSM network is the short
message service. A message consisting of a maximum of 160 alphanumeric characters can
be sent to or from a mobile station. This service can be viewed as an advanced form of
alphanumeric paging with a number of advantages. If the subscriber's mobile unit is
powered off or has left the coverage area, the message is stored and offered back to the

Department of ECE, GNITC 56


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

subscriber when the mobile is powered on or has reentered the coverage area of the
network. This function ensures that the message will be received.
 cell broadcast—A variation of the short message service is the cell broadcast facility.
A message of a maximum of 93 characters can be broadcast to all mobile subscribers in a
certain geographic area. Typical applications include traffic congestion warnings and
reports on accidents.
 voice mail—This service is actually an answering machine within the network, which
is controlled by the subscriber. Calls can be forwarded to the subscriber's voice-mail box
and the subscriber checks for messages via a personal security code.
fax mail—With this service, the subscriber can receive fax messages at any fax machine.
The messages are stored in a service center from which they can be retrieved by the
subscriber via a personal security code to the desired fax number.

Department of ECE, GNITC 57


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

2.10 Internet of things (IoT)


Internet of things (IoT), is another advance technology in IT sector, provides
internetworking for numerous of devices such as sensors, actuators, PLCs and other
electronic embedded smart devices and controls, and various software’s’ and provides
systems network configuration and connectivity, which enables communication between
these numerous devices for information exchanging.

In 1995, “thing to thing” was coined by BILL GATES. In 1999, IoT (Internet of
Things) was come up by EPC global. IOT interconnects human to thing, thing to thing and
human to human. The goal of IoT is bring out a huge network by combining different types
connected devices. IoT targets three aspects Communication, automation, cost saving in a
system. IOT empowers people to carry out routine activities using internet and thus saves
time and cost making them more productive. IOT enables the objects to be sensed and/or
controlled remotely across existing network model. IOT in environmental monitoring helps
to know about the air and water quality, temperature and conditions of the soil, and also
monitor the intrusion of animals in to the field. IOT can also play a significant role in
precision farming to enhance the productivity of the farm.
Recent advancements, such as the vision of the Internet of Things (IoT), the cloud
computing model, and cyber-physical systems, provide support for the transmission and
management of huge amounts of data regarding the trends observed in environmental

Department of ECE, GNITC 58


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

parameters. In this context, the current work presents three different IoT-based wireless
sensors
for environmental and ambient monitoring: one employing User Datagram Protocol
(UDP)-based Wi-Fi communication, one communicating through Wi-Fi and Hypertext
Transfer Protocol (HTTP), and a third one using Bluetooth Smart. All of the presented
systems provide the possibility of recording data at remote locations and of visualizing
them from every device with an Internet connection, enabling the monitoring of
geographically large areas. The development details of these systems are described, along
with the major differences and similarities between them. The feasibility of the three
developed systems for implementing monitoring applications, taking into account their
energy autonomy, ease of use, solution complexity, and Internet connectivity facility, was
analysed, and revealed that they make good candidates for IoT-based solutions.
Nowadays, IoT is one of the most advanced, efficient, and cost less technological
solution which encompasses various hardware and software resources; and allows remotely
connected sensing devices to sense with more capabilities, provides efficiency and can be
monitored and controlled through deployed of existing systems or infrastructures, resulting
the physical World integration with computer controllers (or systems).

As IoT provides interconnectivity among various real-time sensing sensors and


PLC and other intelligent devices, therefore this technology will be an entity indicated for
the more advance cyber-systems encircling the significant developments, “such as smart
grid, smart vehicle systems, smart medical systems, smart cities, and others smart
systems.” In early future, IoT has striven to provide advance or smart connectivity for
variety of electronic and intelligent equipment’s or devices, IT-based systems and the more
advanced services through deploying of various traditional and real-time protocols,
networks domains, and system software/hardware applications, which will be an work
followed by machine-to-machine technological concept.

Through interconnection of various devices and managing ofThe internet of


things (IoT) is the network of physical devices, vehicles, buildings and other items

Department of ECE, GNITC 59


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

embedded with electronics, software, sensors, actuators, and network connectivity that
enable these objects to collect and exchange data. In 2013 the Global Standards Initiative
on Internet of Things (IoT-GSI) defined the IoT as "the infrastructure of the information
society. The IoT allows objects to be sensed and controlled remotely across existing
network infrastructure, creating opportunities for more direct integration of the physical
world into computer-based systems, and resulting in improved efficiency, accuracy and
economic benefit.

When IoT is augmented with sensors and actuators, the technology becomes an
instance of the more general class of cyber-physical systems, which also encompasses
technologies such as smart grids, smart homes, intelligent transportation and smart cities.
Each thing is uniquely identifiable through its embedded computing system but is able to
interoperate within the existing Internet infrastructure. Experts estimate that the IoT will
consist of almost 50 billion objects by 2020.

IoT is a system defines an environment that encompasses numerous of objects;


sensors that connected with these objects are accessible over the Internet through
employing of various
Networks connections, such wired or wireless. IoT can be able to carry information from
various embedded sensors attached with the physical World, human and any inanimate
object, and then transmit them to a system for further analyses. In early future, IoT will be
able to connect almost components or parts of industrial infrastructures, smart medical tele
monitoring systems, and smart transportation systems; and will provide the information
sharing facilities in order to make systems and peoples always updated.

What is the internet of things (IoT)?


The internet of things, or IoT, is a system of interrelated computing devices, mechanical
and digital machines, objects, animals or people that are provided with unique identifiers
(UIDs) and the ability to transfer data over a network without requiring human-to-human
or human-to-computer interaction.

Department of ECE, GNITC 60


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

A thing in the internet of things can be a person with a heart monitor implant, a farm
animal with a biochip transponder, an automobile that has built-in sensors to alert the
driver when tire pressure is low or any other natural or man-made object that can be
assigned an Internet Protocol (IP) address and is able to transfer data over a network.
Increasingly, organizations in a variety of industries are using IoT to operate more
efficiently, better understand customers to deliver enhanced customer service, improve
decision-making and increase the value of the business.

How does IoT work?


An IoT ecosystem consists of web-enabled smart devices that use embedded systems, such
as processors, sensors and communication hardware, to collect, send and act on data they
acquire from their environments. IoT devices share the sensor data they collect by
connecting to an IoT gateway or other edge device where data is either sent to the cloud to
be analyzed or analyzed locally. Sometimes, these devices communicate with other related
devices and act on the information they get from one another. The devices do most of the
work without human intervention, although people can interact with the devices -- for
instance, to set them up, give them instructions or access the data.

The connectivity, networking and communication protocols used with these web-enabled
devices largely depend on the specific IoT applications deployed.
IoT can also make use of artificial intelligence (AI) and machine learning to aid in making
data collecting processes easier and more dynamic.

Department of ECE, GNITC 61


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Why is IoT important?


The internet of things helps people live and work smarter, as well as gain complete control
over their lives. In addition to offering smart devices to automate homes, IoT is essential to
business. IoT provides businesses with a real-time look into how their systems really work,
delivering insights into everything from the performance of machines to supply chain and
logistics operations.
IoT enables companies to automate processes and reduce labor costs. It also cuts down on
waste and improves service delivery, making it less expensive to manufacture and deliver
goods, as well as offering transparency into customer transactions.
As such, IoT is one of the most important technologies of everyday life, and it will
continue to pick up steam as more businesses realize the potential of connected devices to
keep them competitive.
What are the benefits of IoT to organizations?

Department of ECE, GNITC 62


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

The internet of things offers several benefits to organizations. Some benefits are industry-
specific, and some are applicable across multiple industries. Some of the common benefits
of IoT enable businesses to:
 monitor their overall business processes;
 improve the customer experience (CX);
 save time and money;
 enhance employee productivity;
 integrate and adapt business models;
 make better business decisions; and
 generate more revenue.
IoT encourages companies to rethink the ways they approach their businesses and gives
them the tools to improve their business strategies.
Generally, IoT is most abundant in manufacturing, transportation and utility organizations,
making use of sensors and other IoT devices; however, it has also found use cases for
organizations within the agriculture, infrastructure and home automation industries, leading
some organizations toward digital transformation.
IoT can benefit farmers in agriculture by making their job easier. Sensors can collect data
on rainfall, humidity, temperature and soil content, as well as other factors, that would help
automate farming techniques.
The ability to monitor operations surrounding infrastructure is also a factor that IoT can
help with. Sensors, for example, could be used to monitor events or changes within
structural buildings, bridges and other infrastructure. This brings benefits with it, such as
cost saving, saved time, quality-of-life workflow changes and paperless workflow.
A home automation business can utilize IoT to monitor and manipulate mechanical and
electrical systems in a building. On a broader scale, smart cities can help citizens reduce
waste and energy consumption.
IoT touches every industry, including businesses within healthcare, finance, retail and
manufacturing.

Department of ECE, GNITC 63


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

What are the pros and cons of IoT?


Some of the advantages of IoT include the following:
 ability to access information from anywhere at any time on any device;
 improved communication between connected electronic devices;
 transferring data packets over a connected network saving time and money; and
 automating tasks helping to improve the quality of a business's services and reducing
the need for human intervention.
Some disadvantages of IoT include the following:
 As the number of connected devices increases and more information is shared between
devices, the potential that a hacker could steal confidential information also increases.
 Enterprises may eventually have to deal with massive numbers -- maybe even millions
-- of IoT devices, and collecting and managing the data from all those devices will be
challenging.
 If there's a bug in the system, it's likely that every connected device will become
corrupted.
 Since there's no international standard of compatibility for IoT, it's difficult for devices
from different manufacturers to communicate with each other.

IoT standards and frameworks


There are several emerging IoT standards, including the following:
 IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) is an open
standard defined by the Internet Engineering Task Force (IETF). The 6LoWPAN standard
enables any low-power radio to communicate to the internet, including 804.15.4, Bluetooth
Low Energy (BLE) and Z-Wave (for home automation).
 ZigBee is a low-power, low-data rate wireless network used mainly in industrial
settings. ZigBee is based on the Institute of Electrical and Electronics Engineers (IEEE)
802.15.4 standard. The ZigBee Alliance created Dotdot, the universal language for IoT that
enables smart objects to work securely on any network and understand each other.

Department of ECE, GNITC 64


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

 LiteOS is a Unix-like operating system (OS) for wireless sensor networks. LiteOS
supports smartphones, wearables, intelligent manufacturing applications, smart homes and
the internet of vehicles (IoV). The OS also serves as a smart device development platform.
 OneM2M is a machine-to-machine service layer that can be embedded in software
and hardware to connect devices. The global standardization body, OneM2M, was created
to develop reusable standards to enable IoT applications across different verticals to
communicate.
 Data Distribution Service (DDS) was developed by the Object Management Group
(OMG) and is an IoT standard for real-time, scalable and high-
performance M2M communication.
 Advanced Message Queuing Protocol (AMQP) is an open source published standard
for asynchronous messaging by wire. AMQP enables encrypted and interoperable messaging
between organizations and applications. The protocol is used in client-server messaging and
in IoT device management.
 Constrained Application Protocol (CoAP) is a protocol designed by the IETF that
specifies how low-power, compute-constrained devices can operate in the internet of
things.
 Long Range Wide Area Network (LoRaWAN) is a protocol for WANs designed to
support huge networks, such as smart cities, with millions of low-power devices.

IoT frameworks include the following:


 Amazon Web Services (AWS) IoT is a cloud computing platform for IoT released by
Amazon. This framework is designed to enable smart devices to easily connect and
securely interact with the AWS cloud and other connected devices.
 Arm Mbed IoT is a platform to develop apps for IoT based on Arm microcontrollers.
The goal of the Arm Mbed IoT platform is to provide a scalable, connected and secure
environment for IoT devices by integrating Mbed tools and services.
 Microsoft's Azure IoT Suite is a platform that consists of a set of services that
enables users to interact with and receive data from their IoT devices, as well as perform

Department of ECE, GNITC 65


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

various operations over data, such as multidimensional analysis, transformation and


aggregation, and visualize those operations in a way that's suitable for business.
 Google's Brillo/Weave is a platform for the rapid implementation of IoT applications.
The platform consists of two main backbones: Brillo, an Android-based OS for the
development of embedded low-power devices, and Weave, an IoT-oriented communication
protocol that serves as the communication language between the device and the cloud.
 Calvin is an open source IoT platform released by Ericsson designed for building and
managing distributed applications that enable devices to talk to each other. Calvin includes
a development framework for application developers, as well as a runtime environment for
handling the running application.

Consumer and enterprise IoT applications


There are numerous real-world applications of the internet of things, ranging from
consumer IoT and enterprise IoT to manufacturing and industrial IoT (IIoT). IoT
applications span numerous verticals, including automotive, telecom and energy.
In the consumer segment, for example, smart homes that are equipped with smart
thermostats, smart appliances and connected heating, lighting and electronic devices can be
controlled remotely via computers and smartphones.
Wearable devices with sensors and software can collect and analyze user data, sending
messages to other technologies about the users with the aim of making users' lives easier
and more comfortable. Wearable devices are also used for public safety -- for example,
improving first responders' response times during emergencies by providing optimized
routes to a location or by tracking construction workers' or firefighters' vital signs at life-
threatening sites.
In healthcare, IoT offers many benefits, including the ability to monitor patients more
closely using an analysis of the data that's generated. Hospitals often use IoT systems to
complete tasks such as inventory management for both pharmaceuticals and medical
instruments.

Department of ECE, GNITC 66


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Smart buildings can, for instance, reduce energy costs using sensors that detect how many
occupants are in a room. The temperature can adjust automatically -- for example, turning
the air conditioner on if sensors detect a conference room is full or turning the heat down if
everyone in the office has gone home.
In agriculture, IoT-based smart farming systems can help monitor, for instance, light,
temperature, humidity and soil moisture of crop fields using connected sensors. IoT is also
instrumental in automating irrigation systems.
In a smart city, IoT sensors and deployments, such as smart streetlights and smart meters,
can help alleviate traffic, conserve energy, monitor and address environmental concerns,
and improve sanitation.

IoT security and privacy issues


The internet of things connects billions of devices to the internet and involves the use of
billions of data points, all of which need to be secured. Due to its expanded attack
surface, IoT security and IoT privacy are cited as major concerns.
In 2016, one of the most notorious recent IoT attacks was Mirai, a botnet that infiltrated
domain name server provider Dyn and took down many websites for an extended period of
time in one of the biggest distributed denial-of-service (DDoS) attacks ever seen. Attackers
gained access to the network by exploiting poorly secured IoT devices.
Because IoT devices are closely connected, all a hacker has to do is exploit one
vulnerability to manipulate all the data, rendering it unusable. Manufacturers that
don't update their devices regularly -- or at all -- leave them vulnerable to cybercriminals.
Additionally, connected devices often ask users to input their personal information,
including names, ages, addresses, phone numbers and even social media accounts --
information that's invaluable to hackers.
Hackers aren't the only threat to the internet of things; privacy is another major concern for
IoT users. For instance, companies that make and distribute consumer IoT devices could
use those devices to obtain and sell users' personal data.

Department of ECE, GNITC 67


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Beyond leaking personal data, IoT poses a risk to critical infrastructure, including
electricity, transportation and financial services.

2.11 BUZZER
A buzzer or beeper is a signaling device, usually electronic, typically used in automobiles,
house hold appliances such as a microwave oven, or game shows.
It most commonly consists of a number of switches or sensors connected to a control unit
that determines if and which button was pushed or a preset time has lapsed, and usually
illuminates a light on the appropriate button or control panel, and sounds a warning in the
form of a continuous or intermittent buzzing or beeping sound. Initially this device was
based on an electromechanical system which was identical to an electric bell without the
metal gong (which makes the ringing noise). Often these units were anchored to a wall or
ceiling and used the ceiling or wall as a sounding board. Another implementation with
some AC-connected devices was to implement a circuit to make the AC current into a
noise loud enough to drive a loudspeaker and hook this circuit up to a cheap 8-ohm
speaker. Nowadays, it is more popular to use a ceramic-based piezoelectric sounder like a
Sonalert which makes a high-pitched tone. Usually these were hooked up to “driver”
circuits which varied the pitch of the sound or pulsed the sound on and off.
In game shows it is also known as a “lockout system,” because when one person signals
(“buzzes in”), all others are locked out from signalling. Several game shows have large
buzzer buttons which are identified as “plungers”.

Department of ECE, GNITC 68


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Fig. Buzzer
USES
 Annunciator panels
 Electronic metronomes
 Game shows
 Microwave ovens and other household appliances
 Sporting events such as basketball games
 Electrical alarms
2.12 RELAY
INTRODUCTION
A relay is an electromechanical switch, which perform ON and OFF operations
without any human interaction. General representation of double contact relay is shown in
fig. Relays are used where it is necessary to control a circuit by a low-power signal (with
complete electrical isolation between control and controlled circuits), or where several
circuits must be controlled by one signal.

Fig. Relay

Department of ECE, GNITC 69


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

History
The first relay was invented by Joseph Henry in 1835. The name relay derives from
the French noun relays’ that indicates the horse exchange place of the postman. Generally a
relay is an electrical hardware device having an input and output gate. The output gate
consists in one or more electrical contacts that switch when the input gate is electrically
excited. It can implement a decoupled, a router or breaker for the electrical power, a
negation, and, on the base of the wiring, complicated logical functions containing and, or,
and flip-flop. In the past relays had a wide use, for instance the telephone switching or the
railway routing and crossing systems. In spite of electronic progresses (as programmable
devices), relays are still used in applications where ruggedness, simplicity, long life and
high reliability are important factors (for instance in safety applications)

Working
Generally, the relay consists a inductor coil, a spring (not shown in the figure),
Swing terminal, and two high power contacts named as normally closed (NC) and normally
opened (NO). Relay uses an Electromagnet to move swing terminal between two contacts
(NO and NC). When there is no power applied to the inductor coil (Relay is OFF), the
spring holds the swing terminal is attached to NC contact.

Department of ECE, GNITC 70


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Fig. Representation of Relay

Whenever required power is applied to the inductor coil, the current flowing
through the coil generates a magnetic field which is helpful to move the swing terminal and
attached it to the normally open (NO) contact. Again when power is OFF, the spring
restores the swing terminal position to NC.

Advantage of relay:
A relay takes small power to turn ON, but it can control high power devices to
switch ON and OFF. Consider an example; a relay is used to control the ceiling FAN at our
home. The ceiling FAN may runs at 230V AC and draws a current maximum of 4A.
Therefore the power required is 4X230 = 920 watts. Off course we can control AC, lights,
etc., depend up on the relay ratings. Relays can be used to control DC motors in
ROBOTICs.

Department of ECE, GNITC 71


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

2.13 ULN2003:-
The ULN2003 is a monolithic IC consists of seven NPN darlington transistor pairs with
high voltage and current capability. It is commonly used for applications such as relay
drivers, motor, display drivers, led lamp drivers, logic buffers, line drivers, hammer drivers
and other high voltage current applications. It consists of common cathode clamp diodes
for each NPN darlington pair which makes this driver IC useful for switching inductive
loads.

The output of the driver is open collector and the collector current rating of each darlington
pair is 500mA. Darlington pairs may be paralleled if higher current is required. The driver
IC also consists of a 2.7KΩ base resistor for each darlington pair. Thus each darlington pair
can be operated directly with TTL or 5V CMOS devices. This driver IC can be used for
high voltage applications up to 50V.

Department of ECE, GNITC 72


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Logic Diagram of ULN2003


Note that the driver provides open collector output, so it can only sink current, cannot
source. Thus when a 5V is given to 1B terminal, 1C terminal will be connected to ground
via darlington pair and the maximum current that it can handle is 500A. From the above
logic diagram we can see that cathode of protection diodes are shorted to 9th pin called
COM. So for driving inductive loads, it must connect to the supply voltage.
ULN2003 is widely used in relay driving and stepper motor driving applications.

FEATURES
* 500mA rated collector current (Single output)
* High-voltage outputs: 50V
* Inputs compatible with various types of logic.
* Relay driver application

Department of ECE, GNITC 73


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

CHAPTER 3
SOFTWARE SPECIFICATIONS
3.1 THE ARDUINO INTEGRATED DEVELOPMENT
ENVIRONMENT
Arduino Software (IDE) - contains a text editor for writing code, a message area, a
text console, a toolbar with buttons for common functions and a series of menus. It
connects to the Arduino and Genuino hardware to upload programs and communicate with
them.
3.2 WRITING SKETCHES
Programs written using Arduino Software (IDE) are called sketches. These sketches are
written in the text editor and are saved with the file extension. ino. The editor has features
for cutting/pasting and for searching/replacing text. The message area gives feedback while
saving and exporting and also displays errors. The console displays text output by the
Arduino Software (IDE), including complete error messages and other information. The
bottom righthand corner of the window displays the configured board and serial port. The
toolbar buttons allow you to verify and upload programs, create, open, and save sketches,
and open the serial monitor.

Department of ECE, GNITC 74


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

NB: Versions of the Arduino Software (IDE) prior to 1.0 saved sketches with the extension
.pde. It is possible to open these files with version 1.0, you will be prompted to save the
sketch with the .ino extension on save.
Verify
Checks your code for errors compiling it.
Upload
Compiles your code and uploads it to the configured board.
See uploading below for details.
Note: If you are using an external programmer with your board, you can
hold down the "shift" key on your computer when using this icon. The text
will change to "Upload using Programmer"
New
Creates a new sketch.

Open
Presents a menu of all the sketches in your sketchbook. Clicking one will
open it within the current window overwriting its content.
Note: due to a bug in Java, this menu doesn't scroll; if you need to open a
sketch late in the list, use the File | Sketchbookmenu instead.
Save

Department of ECE, GNITC 75


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Saves your sketch.

SerialMonitor
Opens the serial monitor.
Additional commands are found within the five menus: File, Edit, Sketch, Tools, Help. The
menus are context sensitive, which means only those items relevant to the work currently
being carried out are available.

3.3 FILE
 New
Creates a new instance of the editor, with the bare minimum structure of a sketch already
in place.
 Open
Allows to load a sketch file browsing through the computer drives and folders.
 OpenRecent
Provides a short list of the most recent sketches, ready to be opened.

Department of ECE, GNITC 76


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

 Sketchbook
Shows the current sketches within the sketchbook folder structure; clicking on any name
opens the corresponding sketch in a new editor instance.
 Examples
Any example provided by the Arduino Software (IDE) or library shows up in this menu
item. All the examples are structured in a tree that allows easy access by topic or library.
 Close
Closes the instance of the Arduino Software from which it is clicked.
 Save
Saves the sketch with the current name. If the file hasn't been named before, a name will be
provided in a "Save as.." window.
 Saveas...
Allows to save the current sketch with a different name.
 PageSetup
It shows the Page Setup window for printing.
 Print
Sends the current sketch to the printer according to the settings defined in Page Setup.

Department of ECE, GNITC 77


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

 Preferences
Opens the Preferences window where some settings of the IDE may be customized, as the
language of the IDE interface.
 Quit
Closes all IDE windows. The same sketches open when Quit was chosen will be
automatically reopened the next time you start the IDE.

3.4 EDIT
 Undo/Redo
Goes back of one or more steps you did while editing; when you go back, you may go
forward with Redo.
 Cut
Removes the selected text from the editor and places it into the clipboard.
 Copy
Duplicates the selected text in the editor and places it into the clipboard.
 Copy for Forum
Copies the code of your sketch to the clipboard in a form suitable for posting to the forum,
complete with syntax coloring.
 Copy as HTML
Copies the code of your sketch to the clipboard as HTML, suitable for embedding in web
pages.
 Paste
Puts the contents of the clipboard at the cursor position, in the editor.
 Select All
Selects and highlights the whole content of the editor.
 Comment/Uncomment
Puts or removes the // comment marker at the beginning of each selected line.

Department of ECE, GNITC 78


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

 Increase/Decrease Indent
Adds or subtracts a space at the beginning of each selected line, moving the text one space
on the right or eliminating a space at the beginning.
 Find
Opens the Find and Replace window where you can specify text to search inside the
current sketch according to several options.
 Find Next
Highlights the next occurrence - if any - of the string specified as the search item in the
Find window, relative to the cursor position.
 Find Previous
Highlights the previous occurrence - if any - of the string specified as the search item in the
Find window relative to the cursor position.

3.5 SKETCH
 Verify/Compile
Checks your sketch for errors compiling it; it will report memory usage for code and
variables in the console area.

Department of ECE, GNITC 79


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

 Upload -
Compiles and loads the binary file onto the configured board through the configured Port.

 Upload Using Programmer


This will overwrite the bootloader on the board; you will need to use Tools > Burn
Bootloader to restore it and be able to Upload to USB serial port again. However, it allows
you to use the full capacity of the Flash memory for your sketch. Please note that this
command will NOT burn the fuses. To do so a Tools -> Burn Bootloader command must
be executed.
 Export Compiled Binary
Saves a .hex file that may be kept as archive or sent to the board using other tools.
 Show Sketch Folder
Opens the current sketch folder.
 Include Library
Adds a library to your sketch by inserting #include statements at the start of your code. For
more details, see libraries below. Additionally, from this menu item you can access the
Library Manager and import new libraries from .zip files.
 Add File...
Adds a source file to the sketch (it will be copied from its current location). The new file

Department of ECE, GNITC 80


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

appears in a new tab in the sketch window. Files can be removed from the sketch using the
tab menu accessible clicking on the small triangle icon below the serial monitor one on the
right side o the toolbar.

3.5.1 TOOLS
 Auto Format
This formats your code nicely: i.e. indents it so that opening and closing curly braces line
up, and that the statements inside curly braces are indented more.
 Archive Sketch
Archives a copy of the current sketch in .zip format. The archive is placed in the same
directory as the sketch.
 Fix Encoding & Reload
Fixes possible discrepancies between the editor char map encoding and other operating
systems char maps.
 Serial Monitor
Opens the serial monitor window and initiates the exchange of data with any connected
board on the currently selected Port. This usually resets the board, if the board supports
Reset over serial port opening.
 Board
Select the board that you're using. See below for descriptions of the various boards.
 Port
This menu contains all the serial devices (real or virtual) on your machine. It should
automatically refresh every time you open the top-level tools menu.
 Programmer
For selecting a harware programmer when programming a board or chip and not using the
onboard USB-serial connection. Normally you won't need this, but if you're burning a
bootloader to a new microcontroller, you will use this.
 Burn Bootloader
The items in this menu allow you to burn a bootloader onto the microcontroller on an

Department of ECE, GNITC 81


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Arduino board. This is not required for normal use of an Arduino or Genuino board but is
useful if you purchase a new ATmega microcontroller (which normally come without a
bootloader). Ensure that you've selected the correct board from the Boards menu before
burning the bootloader on the target board. This command also set the right fuses.
Help
Here you find easy access to a number of documents that come with the Arduino Software
(IDE). You have access to Getting Started, Reference, this guide to the IDE and other
documents locally, without an internet connection. The documents are a local copy of the
online ones and may link back to our online website.
 Find in Reference
This is the only interactive function of the Help menu: it directly selects the relevant page
in the local copy of the Reference for the function or command under the cursor.

3.5.2 SKETCHBOOK
The Arduino Software (IDE) uses the concept of a sketchbook: a standard place to store
your programs (or sketches). The sketches in your sketchbook can be opened from the File
>Sketchbook menu or from the Open button on the toolbar. The first time you run the
Arduino software, it will automatically create a directory for your sketchbook. You can
view or change the location of the sketchbook location from with the Preferences dialog.
Beginning with version 1.0, files are saved with a .ino file extension. Previous versions use
the .pde extension. You may still open .pde named files in version 1.0 and later, the
software will automatically rename the extension to .ino.
Tabs, Multiple Files, and Compilation
Allows you to manage sketches with more than one file (each of which appears in its own
tab). These can be normal Arduino code files (no visible extension), C files (.c extension),
C++ files (.cpp), or header files (.h).

3.5.3 UPLOADING

Department of ECE, GNITC 82


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Before uploading your sketch, you need to select the correct items from the Tools >
Board and Tools > Port menus. The boards are described below. On the Mac, the serial
port is probably something like /dev/tty.usbmodem241 (for an Uno or Mega2560 or
Leonardo) or /dev/tty.usbserial-1B1 (for a Duemilanove or earlier USB board),
or /dev/tty.USA19QW1b1P1.1 (for a serial board connected with a Keyspan USB-to-Serial
adapter). On Windows, it's probably COM1 or COM2 (for a serial board)
or COM4, COM5, COM7, or higher (for a USB board) - to find out, you look for USB
serial device in the ports section of the Windows Device Manager. On Linux, it should
be /dev/ttyACMx , /dev/ttyUSBx or similar. Once you've selected the correct serial port
and board, press the upload button in the toolbar or select the Upload item from
the Sketch menu. Current Arduino boards will reset automatically and begin the upload.
With older boards (pre-Diecimila) that lack auto-reset, you'll need to press the reset button
on the board just before starting the upload. On most boards, you'll see the RX and
TX LEDs blink as the sketch is uploaded. The Arduino Software (IDE) will display a
message when the upload is complete, or show an error.
When you upload a sketch, you're using the Arduino bootloader, a small program that has
been loaded on to the microcontroller on your board. It allows you to upload code without
using any additional hardware. The bootloader is active for a few seconds when the board
resets; then it starts whichever sketch was most recently uploaded to the microcontroller.
The bootloader will blink the on-board (pin 13) LED when it starts (i.e. when the board
resets).

3.5.4 LIBRARIES
Libraries provide extra functionality for use in sketches, e.g. working with hardware or
manipulating data. To use a library in a sketch, select it from the Sketch > Import
Library menu. This will insert one or more #include statements at the top of the sketch and
compile the library with your sketch. Because libraries are uploaded to the board with your
sketch, they increase the amount of space it takes up. If a sketch no longer needs a library,
simply delete its #includestatements from the top of your code.

Department of ECE, GNITC 83


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

There is a list of libraries in the reference. Some libraries are included with the Arduino
software. Others can be downloaded from a variety of sources or through the Library
Manager. Starting with version 1.0.5 of the IDE, you do can import a library from a zip file
and use it in an open sketch. See these instructions for installing a third-party library.
To write your own library, see this tutorial.
Third-Party Hardware
Support for third-party hardware can be added to the hardware directory of your
sketchbook directory. Platforms installed there may include board definitions (which
appear in the board menu), core libraries, bootloaders, and programmer definitions. To
install, create the hardware directory, then unzip the third-party platform into its own sub-
directory. (Don't use "arduino" as the sub-directory name or you'll override the built-in
Arduino platform.) To uninstall, simply delete its directory.
For details on creating packages for third-party hardware, see the Arduino IDE 1.5 3rd
party Hardware specification.

3.6 SERIAL MONITOR


Displays serial data being sent from the Arduino or Genuino board (USB or serial board).
To send data to the board, enter text and click on the "send" button or press enter. Choose
the baud rate from the drop-down that matches the rate passed to Serial.begin in your
sketch. Note that on Windows, Mac or Linux, the Arduino or Genuino board will reset
(rerun your sketch execution to the beginning) when you connect with the serial monitor.
You can also talk to the board from Processing, Flash, MaxMSP, etc (see the interfacing
page for details).

3.7 PREFERENCES
Some preferences can be set in the preferences dialog (found under the Arduino menu on
the Mac, or File on Windows and Linux). The rest can be found in the preferences file,
whose location is shown in the preference dialog.
LANGUAGE SUPPORT

Department of ECE, GNITC 84


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

Since version 1.0.1 , the Arduino Software (IDE) has been translated into 30+ different
languages. By default, the IDE loads in the language selected by your operating system.
(Note: on Windows and possibly Linux, this is determined by the locale setting which
controls currency and date formats, not by the language the operating system is displayed
in.)
If you would like to change the language manually, start the Arduino Software (IDE) and
open the Preferences window. Next to the Editor Language there is a dropdown menu of
currently supported languages. Select your preferred language from the menu, and restart
the software to use the selected language. If your operating system language is not
supported, the Arduino Software (IDE) will default to English.

Department of ECE, GNITC 85


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

You can return the software to its default setting of selecting its language based on your
operating system by selecting System Default from the Editor Language drop-down. This
setting will take effect when you restart the Arduino Software (IDE). Similarly, after
changing your operating system's settings, you must restart the Arduino Software (IDE) to
update it to the new default language.

3.8 BOARDS
The board selection has two effects: it sets the parameters (e.g. CPU speed and baud rate)
used when compiling and uploading sketches; and sets and the file and fuse settings used
by the burn bootloader command. Some of the board definitions differ only in the latter, so
even if you've been uploading successfully with a particular selection, you'll want to check
it before burning the bootloader. You can find a comparison table between the various
boards here.
Arduino Software (IDE) includes the built in support for the boards in the following list, all
based on the AVR Core. The Boards Manager included in the standard installation allows
to add support for the growing number of new boards based on different cores like Arduino
Due, Arduino Zero, Edison, Galileo and so on.

Department of ECE, GNITC 86


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

CHAPTER 4
IMPLEMENTATIONS

Department of ECE, GNITC 87


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

CHAPTER 5
SIMULATION AND DESIGN

Department of ECE, GNITC 88


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

CHAPTER 6
CONCLUSION

The fire detection systems proposed in the literature served fire stopping with no care of
the responsiveness. Thus, this study considers the existing issues and build an efficient and
effective fire detection system based on IoT technology, fire, temperature, and PIR sensors
to collect the data accurately and rapidly. The abnormal conditions continuous readings
sent over GSM modules to the central unit to analyze the data and trigger the water
sprinkle. This system structure enhances the efficiency and effectiveness of fire detection.
Moreover, using the cloud platform in this system made the data exchange faster and
reliable. However, this study's proposed approach obtained an average response of 5
seconds to detect the fire and alert the property owner. Meanwhile, the water pump can be
activated to suck water from the tank and release it into the water sprinkler to minimize the
fire until the property owners and emergency services reached. Hence, the proposed system
overcame the challenges of the issues of affordability, effectiveness, and responsiveness.
The proposed system still needs further enhancements. Thus, one of the enhancement
directions is integrating machine learning with the system to predict the potentiality of fire
based on the collected data from different sources. Machine learning may help the
operators find and overcome the vulnerabilities in their building to prevent fire instead of
detection only.

Department of ECE, GNITC 89


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

REFERENCES

[1] Bu, F. and Gharajeh, M.S., 2019. Intelligent and vision-based fire detection systems: A
survey. Image and Vision Computing, 91, p.103803.
[2] Saeed, F., Paul, A., Rehman, A., Hong, W.H. and Seo, H., 2018. IoT-based intelligent
modeling of smart home environment for fire prevention and safety. Journal of Sensor and
Actuator Networks, 7(1), p.11.
[3] Saeed, F., Paul, A., Karthigaikumar, P. and Nayyar, A., 2019. Convolutional neural
network based early fire detection. Multimedia Tools and Applications, pp.1-17.
[4] Shokouhi, M., Nasiriani, K., Khankeh, H., Fallahzadeh, H. and Khorasani-Zavareh, D.,
2019. Exploring barriers and challenges in protecting residential fire-related injuries: a
qualitative study. Journal of injury and violence research, 11(1), p.81.
[5] Kodur, V., Kumar, P. and Rafi, M.M., 2019. Fire hazard in buildings: review,
assessment and strategies for improving fire safety. PSU Research Review.
[6] Salhi, L., Silverston, T., Yamazaki, T. and Miyoshi, T., 2019, January. Early Detection
System for Gas Leakage and Fire in Smart Home Using Machine Learning. In 2019 IEEE
International Conference on Consumer Electronics (ICCE) (pp. 1-6). IEEE.

Department of ECE, GNITC 90


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

[7] Gong, F., Li, C., Gong, W., Li, X., Yuan, X., Ma, Y. and Song, T., 2019. A real-time
fire detection method from video with multifeature fusion. Computational intelligence and
neuroscience, 2019.
[8] Mahzan, N.N., Enzai, N.M., Zin, N.M. and Noh, K.S.S.K.M., 2018, June. Design of an
Arduino-based home fire alarm system with GSM module. In Journal of Physics:
Conference Series (Vol. 1019, No. 1, p. 012079). IOP Publishing.
[9] Suresh, S., Yuthika, S. and Vardhini, G.A., 2016, November. Home based fire
monitoring and warning system. In 2016 International Conference on ICT in Business
Industry & Government (ICTBIG) (pp. 1-6). IEEE.
[10] Kanwal, K., Liaquat, A., Mughal, M., Abbasi, A.R. and Aamir, M., 2017. Towards
development of a low cost early fire detection system using wireless sensor network and
machine vision. Wireless Personal Communications, 95(2), pp.475-489.
[11] Khalaf, O.I., Abdulsahib, G.M. and Zghair, N.A.K., 2019. IOT fire detection system
using sensor with Arduino. [12] Desima, M.A., Ramli, P., Ramdani, D.F. and Rahman, S.,
2017, November. Alarm system to detect the location of IOT-based public vehicle
accidents. In 2017 International Conference on Computing, Engineering, and Design
(ICCED) (pp. 1-5). IEEE. [13] Ahrens, M., 2019. Smoke alarms in US home fires.
National Fire Protection Association. [14] Shah, R., Satam, P., Sayyed, M.A. and Salvi, P.,
2019. Wireless Smoke Detector and Fire Alarm System. International Research Journal of
Engineering and Technology (IRJET).
[15] Nfpa.org. NFPA - Data, Research, And Tools. [online] Available:
https://www.nfpa.org/News-and-Research/Data-research-and-tools 2018 [16] Lee, D. and
Kim, B., 2019. Study on Detecting Fires and Finding Rescuers. Journal of the Korean
Society of Hazard Mitigation, 19(1), pp.225-230.
[17] Liu, Z. “Review of Recent Developments in Fire Detection Technologies”. Journal of
Fire Protection Engineering, 13(2), pp.129-151, 2003.
[18] Mowrer, F.” Lag times associated with fire detection and suppression”. Fire
Technology, 26(3), pp.244-265, 2010. [19] Gong, F., Li, C., Gong, W., Li, X., Yuan, X.,
Ma, Y. and Song, T., 2019. A real-time fire detection method from video with multifeature

Department of ECE, GNITC 91


AUTOMATION TOOL FOR HOME FIRE SAFETY CHECK

fusion. Computational intelligence and neuroscience, 2019. [20] Fonollosa, J.; Solórzano,
A.; Marco, S. Chemical Sensor Systems and Associated Algorithms for Fire Detection: A
Review. Sensors 2018, 18, 553.

Department of ECE, GNITC 92

You might also like