Synopsis to Project of Remote Home Automation And Security System Using Android Application
Comments
Content
Remote Home Automation System Using Android Application
Team
Team Members Vijaykumar S (2SA09EC044) Vitthal Katti (2SA09EC045) Pra ee! Mama"a#ur (2SA$0EC4$$) %& i!" 'ath&" (2SA$$EC404) (9$90)*29$5+, e!tures&me, ijay./mail01&m
Cell E-mail
Abstract
Aut&mati&! &2 the surr&u!"i!/ e! ir&!me!t &2 a m&"er! huma! bei!/ all&3s i!1reasi!/ his 3&rk e22i1ie!1y a!" 1&m2&rt0 There has bee! a si/!i2i1a!t "e el&#me!t i! the area &2 a! i!"i i"ual4s r&uti!e tasks a!" th&se 1a! be aut&mate"0 5! the #rese!t times6 3e 1a! 2i!" m&st &2 the #e&#le 1li!/i!/ t& their m&bile #h&!es a!" smart "e i1es thr&u/h&ut the "ay0 7e!1e 3ith the hel# &2 his 1&m#a!i&! 8 a m&bile #h&!e6 s&me "aily h&useh&l" tasks 1a! be a11&m#lishe" by #ers&!i2yi!/ the use &2 the m&bile #h&!e0 A!alysi!/ the 1urre!t smart #h&!e market6 !& i1e m&bile users are &#ti!/ 2&r A!"r&i" base" #h&!es0 5t has be1&me a se1&!" !ame 2&r a m&bile #h&!e i! layma! terms0 7&me Aut&mati&! System (7AS) has bee! "esi/!e" 2&r m&bile #h&!es ha i!/ A!"r&i" #lat2&rm t& aut&mati&! + bit 9luet&&th i!ter2a1e" mi1r&1&!tr&ller 3hi1h 1&!tr&ls a !umber &2 h&me a##lia!1es like li/hts6 2a!s6 bulbs a!" ma!y m&re usi!/ &!:&22 relay0 This #r&je1t #rese!ts the aut&mate" a##r&a1h &2 1&!tr&lli!/ the "e i1es i! a h&useh&l" that 1&ul" ease the tasks &2 usi!/ the tra"iti&!al meth&" &2 the s3it1h0 The m&st 2am&us a!" e22i1ie!t te1h!&l&/y 2&r sh&rt ra!/e 3ireless 1&mmu!i1ati&!- 9luet&&th is use" here t& aut&mate the system0 The 7AS system 2&r A!"r&i" users is a ste# t&3ar"s the ease &2 the tasks by 1&!tr&lli!/ &!e t& t3e!ty 2&ur "i22ere!t a##lia!1es i! a!y h&me e! ir&!me!t0
A""-$A,&ES ACs Therm&stat Ci/hts Camera 9ur/lar Alarm )i*Fi +odule
Android (U$
<e el&#me!t Plat2&rm A!"r&i" @&r this h&me aut&mati&! a!" se1urity system 3e are tar/eti!/ A!"r&i" #lat2&rm si!1e it has hu/e market a!" &#e! s&ur1e0 A!"r&i" is a s&2t3are sta1k 2&r m&bile "e i1es that i!1lu"es a! &#erati!/ system6 mi""le3are a!" key a##li1ati&!s0 The A!"r&i" AS is base" &! Ci!uG0 A!"r&i" A##li1ati&!s are ma"e i! a >a a like la!/ua/e ru!!i!/ &! a irtual ma1hi!e 1alle" H<al ik4 1reate" by %&&/le0 The A!"r&i" S<K #r& i"es the t&&ls a!" AP5s !e1essary t& be/i! "e el&#i!/ a##li1ati&!s &! the A!"r&i" #lat2&rm usi!/ the >a a #r&/rammi!/ la!/ua/e0 A11ess&ry m&"e is a 2eature &2 A!"r&i" AS si!1e ersi&! 20)04 %i!/erbrea" a!" )0$ 7&!ey1&mb a!" ab& e0 S&2t3are <esi/!
As "is1usse" earlier 3e are "e el&#i!/ A!"r&i" a##li1ati&!0 The a##li1ati&! 1&!sists &2 mai! 2u!1ti&! like Ci/ht 1&!tr&lli!/6 <&&r 1&!tr&lli!/6 Sm&ke "ete1ti&! a!" Tem#erature se!si!/0 Ehe! the a##li1ati&! starts user is 2irst authe!ti1ate"6 i2 user is auth&ri=e" he 3ill be !a i/ate" t& mai! s1ree!0 The mai! s1ree! has a list &2 all 2u!1ti&!s am&!/ 3hi1h user 1a! sele1t a!y &!e 2u!1ti&! 3hi1h he 3a!t t& 1&!tr&l0 A2ter sele1ti!/ a 2u!1ti&! he 3&ul" be able t& see a 1urre!t status &2 a #arti1ular "e i1e0 52 user 3ishes6 he 1a! e!able &r "isable i!te!"e" "e i1e0 The system is smart e!&u/h t& a1ti ate alarm 3he! sm&ke is "ete1te" &r it is #r&/ramme" t& aut& &!:&22 li/hts "uri!/ late !i/ht h&urs0 52 r&&m tem#erature /&es ery hi/h &r l&3 it 1a! aut&mati1ally a"just 2a!:AC as #er the tem#erature0
Applications
@&ll&3i!/ are the a##li1ati&!s &2 7&me Aut&mati&! a!" • Se1urity System • Me"i1al alert : teleassista!1e0 • Pre1ise a!" sa2e bli!" 1&!tr&l0 • <ete1ti&! &2 2ire6 /as leaks a!" 3ater leaks0 • Sm&ke "ete1t&r 1a! "ete1t a 2ire &r sm&ke 1&!"iti&!6 1ausi!/ all li/hts i! the h&use t& bli!k t& alert a!y #ers&! &2 the h&use t& the #&ssible emer/e!1y0 • The system 1a! 1all the h&me &3!er &! their m&bile #h&!e t& alert them6 &r 1all the 2ire "e#artme!t &r alarm m&!it&ri!/ 1&m#a!y0 • 5! terms &2 li/hti!/ 1&!tr&l6 it is #&ssible t& sa e e!er/y 3he! h&urs &2 3aste" e!er/y i! b&th resi"e!tial a!" 1&mmer1ial a##li1ati&!s by aut& &!:&22 li/ht at !i/ht time i! all maj&r 1ity &22i1e buil"i!/s6 say a2ter $0#m0 • C&!tr&l a!" i!te/rati&! &2 se1urity systems a!" als& the #&te!tial 2&r 1e!tral l&1ki!/ &2 all #erimeter "&&rs a!" 3i!"&3s0 • Se1urity 1ameras 1a! be 1&!tr&lle"6 all&3i!/ the user t& &bser e a1ti ity ar&u!" a h&use &r busi!ess ri/ht 2r&m a M&!it&r &r t&u1h #a!el0 • Se1urity systems 1a! i!1lu"e m&ti&! se!s&rs that 3ill "ete1t a!y ki!" &2 u!auth&ri=e" m& eme!t a!" !&ti2y the user thr&u/h the se1urity system &r ia 1ell #h&!e0 • A! i!ter1&m system all&3s 1&mmu!i1ati&! ia a mi1r&#h&!e a!" l&u" s#eaker bet3ee! multi#le r&&ms0
&onclusion
The h&me aut&mati&! system has bee! eG#erime!tally #r& e! t& 3&rk satis2a1t&rily by 1&!!e1ti!/ sam#le a##lia!1es t& it a!" the a##lia!1es 3ere su11ess2ully 1&!tr&lle" 2r&m a 3ireless m&bile "e i1e0 The Ei-@i 1lie!t 3as su11ess2ully teste" &! a multitu"e &2 "i22ere!t m&bile #h&!es 2r&m "i22ere!t ma!u2a1turers6 thus #r& i!/ its #&rtability a!" 3i"e 1&m#atibility0 This #r&je1t 3ill !&t &!ly #r& i"e 1&! e!ie!1e t& the 1&mm&! ma! but 3ill be a b&&! 2&r the el"erly a!" "isable"0