0% found this document useful (0 votes)
5 views37 pages

C18 Documentation

The document discusses the Internet of Things (IoT), highlighting its transformative impact on various industries through interconnected devices that communicate and share data. It covers the history, working principles, distinct applications, advantages, challenges, and drawbacks of IoT systems, emphasizing the need for security and privacy measures. The document also outlines specific applications in sectors like healthcare, agriculture, and smart cities, while addressing the potential risks associated with increased connectivity.

Uploaded by

ka38ak1049
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views37 pages

C18 Documentation

The document discusses the Internet of Things (IoT), highlighting its transformative impact on various industries through interconnected devices that communicate and share data. It covers the history, working principles, distinct applications, advantages, challenges, and drawbacks of IoT systems, emphasizing the need for security and privacy measures. The document also outlines specific applications in sectors like healthcare, agriculture, and smart cities, while addressing the potential risks associated with increased connectivity.

Uploaded by

ka38ak1049
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 37

CHAPTER 1

INTRODUCTION

The paradigm of the Internet of Things (IoT) stands as a groundbreaking transformation, reshaping our
interactions with the surrounding world. It represents a network of interconnected devices, objects, and
systems that communicate and share data seamlessly through the internet. In essence, IoT extends the
capabilities of the internet beyond traditional computing devices, such as computers and smartphones, to
include a vast array of everyday objects embedded with sensors and actuators.

At its core, IoT relies on the integration of sensors, actuators, and communication technologies to enable
objects to collect and exchange data. These smart devices can range from simple household appliances
like thermostats and refrigerators to complex industrial machinery and city infrastructure. By connecting
these devices, IoT creates a network that facilitates the collection, analysis, and utilization of real-time
data, leading to improved efficiency, automation, and decision-making across various domains.

One of the key aspects of IoT is its ability to enable smart and autonomous functionality. Through
continuous data exchange, devices can adapt and respond to changing conditions without direct human
intervention. For example, smart thermostats can learn user preferences and adjust temperature settings,
accordingly, optimizing energy consumption. In industrial settings, IoT applications can enhance
predictive maintenance by monitoring equipment performance and alerting maintenance teams to
potential issues before they escalate.

The widespread adoption of IoT has far-reaching implications for various industries, including healthcare,
agriculture, transportation, and urban planning. In healthcare, for instance, IoT devices can monitor
patients' vital signs remotely, providing timely information to healthcare professionals and enhancing
patient care. In agriculture, IoT-enabled sensors can monitor soil conditions, weather patterns, and crop
health, optimizing farming practices and resource utilization.

However, the proliferation of IoT also raises concerns about privacy, security, and data management. As
more devices become interconnected, the need for robust cybersecurity measures becomes paramount to
safeguard sensitive information and prevent unauthorized access.

The Internet of Things is a transformative force that is reshaping the way we live and work. Its ability to
connect and empower everyday objects with intelligence and communication capabilities holds the
promise of creating a more efficient, interconnected, and automated world. As IoT continues to evolve,
addressing challenges related to security and privacy will be crucial in ensuring its responsible and
sustainable integration into our increasingly connected lives.

1.1 HISTORY

The Internet of Things (IoT) traces back to the early days of computing and networking, emerging from
the convergence of multiple technologies and the desire to connect and automate various devices and
systems. This documentation provides a brief history of IoT without any duplicated content.

1. Pre-Internet Era (Before 1980s):

The roots of IoT can be found in early computer networks and automated systems. However, the term
"Internet of Things" was not coined at this time. Various industries began using detectors and selectors for
monitoring and control purposes.

2. 1980s-1990s: Rise of the Internet:

The establishment of the internet set the groundwork for the inception of IoT. The wide adoption of the
TCP/IP protocol and the creation of the World Wide Web provided a standardized way for devices to
communicate. This period saw the initial steps towards interconnectedness.

3. Late 1990s: RFID and Sensor Technologies:

Radio-frequency identification (RFID) technology gained prominence, allowing for the wireless
identification and tracking of objects. Advances in detector technologies also contributed to the capability
to collect and transmit data from the physical world.

4. Early 2000s: Coining of "Internet of Things":

The term "Internet of Things" was popularized by Kevin Ashton, a British technologist, in 1999. He used
it to describe a system where the internet is connected to the physical world through detectors and
selectors. This marked the formal conceptualization of IoT.

5. Mid-2000s: Proliferation of Wireless Technologies:

The widespread adoption of wireless technologies, such as Wi-Fi and Bluetooth, further accelerated the
development of IoT. These technologies enabled devices to communicate seamlessly and paved the way
for more connected and smart solutions.
6. 2010s: Rapid Growth and Standardization:

The 2010s witnessed a surge in the number of connected devices and IoT applications. Standardization
bodies like the International Telecommunication Union (ITU) and the Institute of Electrical and
Electronics Engineers (IEEE) worked on defining protocols and norms for IoT devices to ensure
interoperability.

7. Present and Future: Expanding Ecosystems:

Today, IoT has become an integral part of various industries, including healthcare, transportation,
agriculture, and smart cities. The ecosystem continues to expand with advancements in edge computing,
artificial intelligence, and 5G technology, enabling faster and more effective data processing.

8. Challenges and Concerns:

Despite its growth, IoT faces challenges such as security and privacy concerns. The massive amount of
data generated by IoT devices also raises issues related to data operation and analytics.

1.2 WORKING PRINCIPLE

The Internet of Things (IoT) is a concept that refers to the connection of everyday objects and devices to
the Internet, allowing them to send and receive data. The working principle of IoT involves a combination
of hardware, software, and communication technologies to enable seamless connectivity and data
exchange between devices. Here are the key components and principles of IoT:

Sensors and Actuators:

Sensors: These are devices that gather data from the environment. They can measure various parameters
such as temperature, humidity, light, motion, and more.

Actuators: These devices are responsible for taking actions based on the data received. They can perform
tasks like turning on/off lights, adjusting thermostat settings, or controlling other physical devices.

Connectivity:

IoT devices use various communication protocols to transmit and receive data. Common communication
protocols include Wi-Fi, Bluetooth, Zigbee, RFID, and cellular networks. The choice of protocol depends
on factors like range, power consumption, and data transfer speed.

Data Processing and Storage:


IoT devices often have embedded processors for data processing. These processors analyze the data
collected from sensors and make decisions or extract valuable information.

Data storage is essential for retaining historical information and facilitating analysis. Cloud computing is
frequently employed for scalable and accessible storage solutions.

Edge Computing:

In some cases, processing data at the edge of the network (closer to the device) is preferred to reduce
latency and bandwidth usage. Edge computing involves performing data processing on the device itself or
in nearby edge servers.

IoT Platforms:

IoT platforms provide a framework for managing and analyzing data from various devices. They offer
features like device management, data analytics, security, and integration with other systems.

Security:

Security is a critical aspect of IoT due to the potential risks associated with connected devices.
Encryption, authentication, and secure communication protocols are implemented to protect data and
ensure the integrity of the IoT ecosystem.

User Interface:

IoT systems often include user interfaces, such as mobile apps or web portals, to allow users to monitor
and control connected devices remotely. These interfaces provide a user-friendly way to interact with the
IoT ecosystem.

Scalability:

The IoT ecosystem is designed to be scalable, accommodating a growing number of devices seamlessly.
This scalability is crucial as the number of connected devices continues to increase.

1.3 DISTINCT APPLICATIONS OF IoT

IoT applications are being deployed in many areas such as social media, health, transportation, and
medicine. The benefits and requirements of IoT solutions vary according to industry needs. This article
covers only a few areas such as healthcare, business analytics, transportation, and smart homes/cities.
Some of the applications are:
1. Agricultural Precision Monitoring: The Internet of Things (IoT) plays a pivotal role in modern
agriculture by providing real-time data on soil moisture, temperature, and crop health. Sensors
placed in the fields transmit information to a central system, enabling farmers to make data-driven
decisions about irrigation, fertilization, and pest control. This precision monitoring optimizes
resource usage, enhances crop yields, and promotes sustainable farming practices.

2. Healthcare Wearables and Remote Monitoring: IoT devices in healthcare extend beyond fitness
trackers to encompass wearable medical devices that monitor vital signs and chronic conditions.
These devices facilitate remote patient monitoring, allowing healthcare professionals to track
patients' health in real-time. This not only enhances patient care but also reduces hospital visits,
lowering healthcare costs and improving overall patient outcomes.

3. Smart Cities and Urban Planning: In the realm of urban development, IoT is instrumental in
creating smart cities. Smart traffic management systems utilize sensors and connected devices to
optimize traffic flow, reduce congestion, and enhance transportation efficiency. Additionally,
waste management systems leverage IoT for real-time monitoring of trash levels, ensuring timely
and efficient collection, thereby contributing to cleaner and more sustainable urban environments.

4. Supply Chain Optimization: The integration of IoT in supply chains revolutionizes logistics and
inventory management. Sensors attached to shipments provide real-time location and condition
data, allowing businesses to track the movement and condition of goods throughout the supply
chain. This level of transparency and automation improves efficiency, reduces costs, and
minimizes the risk of product spoilage or damage.

5. Energy Management and Conservation: IoT technologies contribute significantly to energy


conservation by enabling smart grids and energy-efficient systems. Smart meters and sensors
monitor energy consumption in real-time, providing valuable insights for both consumers and
utility companies. This data-driven approach enhances energy efficiency, promotes sustainable
practices, and empowers consumers to make informed decisions about their energy usage.

6. Industrial IoT (IIoT) for Manufacturing Optimization: Industrial IoT transforms traditional
manufacturing processes by incorporating sensors, connectivity, and data analytics. Smart
factories leverage IoT to monitor and control machinery, predict equipment failures, and optimize
production processes. This results in increased productivity, reduced downtime, and improved
overall operational efficiency in manufacturing environments.
7. Environmental Monitoring for Conservation: IoT plays a crucial role in environmental
conservation by providing real-time monitoring of ecosystems and wildlife. Connected sensors in
remote areas collect data on factors such as temperature, humidity, and wildlife movement.
Conservationists use this information to make informed decisions about habitat protection,
wildlife conservation, and natural resource management.

8. Retail and Customer Experience Enhancement: In the retail sector, IoT is employed to enhance
the customer experience. Smart shelves, beacons, and connected devices enable retailers to track
inventory in real-time, personalize marketing efforts, and optimize store layouts. This not only
improves operational efficiency but also creates a more personalized and seamless shopping
experience for customers.

9. Smart Home Automation and Security: IoT has revolutionized home living with the advent of
smart home devices. From thermostats and lighting systems to security cameras and door locks,
interconnected devices provide homeowners with remote control and monitoring capabilities. The
seamless integration of IoT in smart homes not only elevates convenience by allowing
homeowners to control and monitor their environments remotely but also contributes to enhanced
energy efficiency and bolstered home security.

10. Fleet Management for Transportation: IoT technologies are instrumental in optimizing fleet
management for transportation companies. Connected sensors in vehicles provide real-time data
on location, fuel consumption, and maintenance needs. Fleet managers use this information to
optimize routes, reduce fuel costs, and ensure timely vehicle maintenance, leading to improved
efficiency and cost savings in the transportation industry.

1.4 ADVANTAGES OF IoT

The Internet of Things (IoT) boasts a myriad of advantages that revolutionize various aspects of our lives
and industries. Here are some key benefits:

1. Ecosystem Synergy and Collaboration:

IoT promotes collaboration among diverse ecosystems. Devices from different manufacturers
can seamlessly interact and share data, fostering innovation and the development of
interconnected solutions. This collaborative approach leads to a more holistic and integrated
technological landscape.
2. Environmental Sustainability:

IoT plays a pivotal role in promoting sustainability by enabling better resource management.
Smart sensors and devices monitor environmental parameters, allowing for optimized energy
consumption, waste reduction, and efficient use of resources. This contributes to a greener and
more eco-friendly future.

3. Personalized Healthcare Solutions:

In the healthcare sector, IoT facilitates the creation of personalized and patient-centric
solutions. Wearable devices and health monitoring systems provide real-time health data,
allowing for proactive healthcare interventions. This not only improves patient outcomes but
also enhances the overall efficiency of healthcare delivery.

4. Decentralized Autonomous Systems:

IoT enables the development of decentralized autonomous systems where devices can make
decisions locally based on real-time data. This reduces the dependency on centralized control
systems, making processes more resilient and adaptive. Decentralized decision-making is
particularly advantageous in scenarios where low latency and high reliability are crucial.

5. Cognitive Computing and Predictive Analysis:

Cognitive computing, coupled with IoT, empowers systems to learn from patterns and trends
in data. This leads to more accurate predictive analysis and forecasting. Businesses can
anticipate market trends, equipment failures, and customer preferences, allowing for proactive
strategies and timely responses to changing conditions.

1.5 CHALLENGES IN BUILDING IoT SYSTEM

● As the number of connected devices increases and more information is exchanged in


prolong between them, the potential for hackers to steal sensitive information also increases.
● An organization may have to deal with a huge number of (possibly millions) IoT devices,
and it is difficult to collect and manage data from all these devices.
● Any device connected to the can be damaged if the system fails.
● The lack of an international standard for IoT compatibility makes it difficult for devices
from different manufacturers to communicate with each other.
The Internet of Things (IoT) has rapidly become a big part of people's lives, communications and
businesses. Across the globe, Internet-enabled devices are transforming our global entitlement
into a larger, empowered realm. IoT faces many kinds of challenges, and the following can be
the Security Challenges in IoT

1. Increased with more devices


Ransomware uses encryption to effectively lock users out of various devices and platforms but
uses users' valuable data and information. Example – A Hacker can hijack your computer's
camera and take pictures. Malware Access Points allow hackers to demand a ransom to unlock
your device and return your data.

2. Brute force and default password risk


Weak credentials and credentials make almost all IoT devices vulnerable to password hacking
and brute force. An organization that uses factory-default credentials on devices puts both its
business and its assets, and its customers and their valuable information, at risk of being
vulnerable to brute force attacks.

3. Inadequate Testing and Updates


As IoT devices become more prevalent manufacturers strive to manufacture and ship the devices
as quickly as possible but offer too little security. there is no. Most of these devices and IoT
products have not received sufficient testing and updates and are vulnerable to hacking and other
security issues.
4. Lack of encryption
Encryption is a great way to prevent hackers from accessing your data, but it is also one of the
major IoT security challenges. These drives are like the storage and processing capabilities found
in traditional computers. As a result, there is an increasing number of hackers who can easily
manipulate algorithms designed to protect them.

1.6 DRAWBACKS OF IoT-BASED SYSTEMS

Now, let us see there are numerous the dangers of IoT on this web of Things tutorial.

Security: IoT generation builds an environment of linked devices. But sometimes, in the course of this
operation, the gadget may additionally offer small authentication manipulation, preferably sufficient
safety measures.

Privacy: The use of IoT, exposes a major quantity of personal information, in severe explain, without the
user’s piquant participation. This builds masses of privateer’s problems.

Adaptability: there exist a big subject regarding the aptitude of an IoT gadget.it's mainly regarding
integrating with several other gadgets, as there exist abundant structures of handles inside the method.

Compliance: IoT has its personalized set of guidelines and regulations. But sometimes, because of its
complexity, the challenge of compliance is attractive complicated.

Dependency on internet connectivity: IoT systems rely on internet connectivity for data transmission
and communication, which can be disrupted by network outages or slow internet speeds.

Compatibility issues: There are various protocols and standards used in IoT systems, which may not be
compatible with each other, leading to difficulty in integration and interoperability.

Limited computing power: IoT devices typically have limited processing power, storage, and memory,
which can hinder their performance and functionality.

High upfront cost: The initial cost of implementing an IoT system can be expensive, especially for large-
scale deployments.
CHAPTER 2

LITERATURE SURVEY

2.1 Minimum of 10 to 15 manuscripts (papers) Summary along with their Results, Advantages, and
Drawbacks

1. "An IoT-Driven Smart Campus System for Animal Intrusion Detection and Response" (S. Sharma, A.
Singh, R. Sharma, 2023). IEEE Sensors Journal, Vol. 23, Issue 12, pp. 15234-15242.

 Results: Achieved 95% accuracy in animal identification using YOLOv5 deep learning algorithm.

 Advantages: Cost-effective, real-time detection and response, remote monitoring capabilities.

 Drawbacks: High initial setup cost for infrastructure and technology, the potential for false
positives due to environmental factors.

2. "Deep Learning-Powered Animal Detection and Tracking for Campus Security" (C. Chen, Z. Li, H.
Zhang, 2022). ACM Transactions on Sensor Networks, Vol. 18, No. 2, Article 21, pp. 1-16.

 Results: Reduced animal-related incidents on campus by 70% using R-CNN for species
recognition and tracking.

 Advantages: Improved campus safety through proactive animal control, and reduced reliance on
human patrols.

 Drawbacks: Requires robust network infrastructure and data storage capacity, ethical
considerations regarding animal welfare during capture.

3. "IoT-Based Animal Detection System for Enhanced Campus Security" L. Zhang, X. Wang, Y. Liu, Z.
Zhou, 2021).Proceedings of the 2021 International Conference on Internet of Things (IoT), pp. 1-6.

 Results: Achieved 88% accuracy in identifying stray dogs using a custom convolutional neural
network (CNN) model.

 Advantages: Scalable for large campuses, integrates seamlessly with existing security systems.

 Drawbacks: Reliant on accurate sensor placement and coverage, potential for system malfunction
or failure.
4. "Leveraging Edge Computing for Real-time Animal Detection in Campus Corridors" (J. Liu, F. Yang,
X. Chen, 2020). Sensors, Vol. 20, No. 17, Article 4747, pp. 1-15.

 Results: Reduced response time to animal sightings by 50% using edge computing for on-site
processing and decision-making.

 Advantages: Low latency and reduced reliance on central servers, saves bandwidth and improves
system efficiency.

 Drawbacks: Requires specialized edge computing hardware and expertise, increased complexity
compared to traditional setups.

5. "A Multi-Sensor Fusion Approach for Animal Detection and Classification on Campuses" (Y. Wang, J.
Li, H. Chen,2019). IEEE Transactions on Cybernetics, Vol. 50, No. 1, pp. 124-135.

 Results: Improved detection accuracy to 92% by combining motion sensors, cameras, and acoustic
data for comprehensive information.

 Advantages: Reduces false positives and provides additional details for animal identification and
behavior analysis.

 Drawbacks: Increased system complexity and cost due to multiple sensors, require more data
storage and processing power.

6. "Drone-Assisted Animal Detection and Intervention for Enhanced Campus Security" (S. Kim, J. Lee,
W. Park, 2023). Journal of Intelligent and Robotic Systems, Vol. 112, No. 3, pp. 375-388.

 Results: Reduced animal presence on campus by 80% using drones for aerial surveillance and
targeted interventions like noise emitters.

 Advantages: Covers large areas efficiently, provides real-time visual data, and minimizes human-
animal interaction.

 Drawbacks: High initial investment in drones and maintenance, potential for public privacy
concerns regarding drone footage.

7. "IoT-Based Animal Detection System with LiDAR Technology for Precise Tracking" (A. Das, M.
Sharma, N. Singh, 2022). Sensors and Actuators A: Physical, Vol. 341, pp. 117273-117282.
 Results: Achieved 98% accuracy in animal localization using LiDAR sensors for 3D environment
mapping and tracking.

 Advantages: Highly accurate, works in low-visibility conditions, and provides detailed animal
movement data.

 Drawbacks: Higher cost compared to cameras, limited range compared to drones, requires
specialized data processing algorithms.

8. "Enhancing Animal Detection with Context-Aware IoT Systems: A Case Study for Campus Corridors"
(V. Singh, R. Gupta, S. Ahmed, 2021). Proceedings of the 2021 IEEE International Conference on
Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 159-164.

 Results: Reduced false positives by 65% by incorporating weather data, time of day, and campus
activity patterns into the detection algorithm.

 Advantages: Improves system efficiency, reduces unnecessary alerts, and provides insights into
animal behavior.

 Drawbacks: Requires extensive data collection and analysis and may not apply to all campus
environments.

9. "Towards a Collaborative IoT Network for Animal Detection and Management Across Campuses" (B.
Ahmed, J. Chen, Z. Huang, 2020). Ad Hoc Networks, Vol. 99, pp. 102-112.

 Results: Increased detection accuracy and response time by sharing real-time animal data among
neighboring campuses.

 Advantages: Improves overall campus safety in a region and facilitates resource sharing and
expertise exchange.

 Drawbacks: Requires inter-campus collaboration and data security agreements, potential for
technical compatibility issues.

10. "IoT-Based Animal Detection System for Public Health Monitoring and Zoonotic Disease Prevention"
(M. Huang, L. Zhang, Y. Wang, 2019). IEEE Transactions on Industrial Informatics, Vol. 16, No. 5, pp.
3218-3228.

 Results: Identified and tracked potential disease vectors like rodents with 85% accuracy using
thermal cameras and AI-based anomaly detection.
 Advantages: Contributes to public health initiatives, early warning system for potential
outbreaks, and provides valuable data for disease research.

 Drawbacks: Requires specialized equipment and expertise for disease-specific detection, raises
ethical concerns regarding animal welfare and data privacy.

2.2 Description of GISMO – VI Board and Various Sensors

The GISMO-VI IOT Board consists of the following resources:

1. ESP32 Devkit
2. Relay
3. Buzzer
4. OLED graphic display
5. BMP280 Environment sensor
6. MPU6050 3-axis accelerometer & gyro
7. Soil moisture sensor
8. APDS 9960 Gesture 17
9. HC-SR04 Ultrasonic sensor
10. PIR sensor
11. Magnetic switch
12. MAX30100 Heart rate
13. INMP441 MEMS microphone

2.1.1 ESP32 Microcontroller

ESP32 is a low-cost microcontroller with twin cores. It includes built-in Wi-Fi and Bluetooth capabilities.
In addition, it contains an antenna, a power amplifier, a low-noise amplifier, and a power management
module. All of these technologies are incorporated into the circuit board, hence requiring the smallest
amount of space on the printed circuit board. It supports 32-bit applications. This microcontroller board is
available with either 30 or 36 pins. In addition to a vast array of peripherals, it has hall effects and
temperature sensors.

The ESP32 is a chain of low-value and low-strength schemes on a Chip (SOC) microcontrollers
sophisticated with the aid of utilizing denote if that encompass Wi-Fi and Bluetooth Wi-Fi capabilities
and dual-middle processor. If you're acquainted with the ESP8266, the ESP32 is its successor, loaded
with masses of modern options.

● Low-cost: you may get an ESP32 birth at $6, which makes it effortlessly on out to the public.

●Low-energy: the ESP32 consumes dinky or no power compared to distinct microcontrollers, and it
assists low-energy mode states like deep sleep to maintain power.

● Wi-Fi capacities: the ESP32 can effortlessly associate with a Wi-Fi community dG8gassociate with The
web (station mode), or build its extremely own Wi-Fi community (get matriculation to factor mode) so
various gadgets can associate with it—that significant for IoT and Home Automation projects—you may
have a couple of gadgets speaking with any distinct the usage of their Wi-Fi abilities.

● Bluetooth: the ESP32 assists Bluetooth familiar and Bluetooth Low power (BLE) —that's helpful for an
enormous kind of IoT applications.

●Dual-center: greatest ESP32 are dual-center— they come with 2 Tens 32-bit LX6 microprocessors:
center zilch and center 1.

● Wealthy peripheral input / output interface—the ESP32 assists an enormous kind of input (examine
records from the outdoor world) and output (to ship commands / alerts to the outdoor world) peripherals
like capacitive touch, ADC's, Days, PART, SPI, I2C, PWM, and lots more.

● Compatible with the Arduino “programming language”: the ones which might be already acquainted
with programming the Arduino committee, you'll be gratified to realize that they're capable to implement
the ESP32 within the Arduino style.

● Compatible with Micro Python: you may implement the ESP32 with MicroPython firmware, that's a re-
implementation of Python three centered for microcontrollers and entrenched systems.

MAX30102 (Pulse Oximeter & Heart-Rate Sensor)


Function :- This sensor is used to measure the heart beat as well as the blood oxygen level.
The MAX30102 sensor is used to measure the pulse(generally referred as heart rate) and also the
SPO2 levels(blood oxygen levels) of a person with utmost accuracy.
The MAX30102 contains internal LEDs,low-noise electronics, photodetectors and optical
elements with ambient light rejection.The MAX30102 sensor comes in handy for design-in process
for mobile and small wearable devices (like smart watches) making the tasks easy and less clumsy.
Uses of MAX30102 sensor
● Smart phones
● Wearable devices
● Fitness gadgets
● Tables

Figure 11. MAX30102 sensor (courtesy: Source [11])

The Advantages of MAX30102


● With simple technology such as the LED Refractive Solution we can monitor heart rate as
well as the blood oxygen level.
● Works under extreme temperature conditions such as as low as -40°C and even as hot as
+85°C.
● The MAX30102 provides fast data outputs.
● MAX30102 operates on low power
• For power savings, programmable sample rate and LED current
• Heart rate is measured at very low power consumption (W)
• Very low consumption of Shutdown Current (0.7µA)
Figure 12. MAX30102 System Diagram (courtesy: Source [12])

MAX30102 Arduino Library


The communication between Arduino and MAX30102 is handled using a library from Sparkfun.
The high-speed reading of the IR and red reflectance data will be handled by the Sparkfun library.
● The Arduino IDE contains
● Open Sketch, choose Include Library, and then click Manage Libraries.
● In the search box, enter "max30".
● On your PC, save the "Sparkfun MAX3010x Pulse and Proximity Sensor Library" file.

Figure 13. MAX30102 Library (courtesy: Source [13])


Ultrasonic Sensor
Description
The sensor's name suggests that it has something to do with ultrasonic waves, which is what it
does. Yes, the ultrasonic sensor is a sensor that measures the separation between two objects using
ultrasonic waves. The common optical sensor, which has a transmitter and receiver to send and
receive waves accordingly, is in contrast to the ultrasonic sensor. The Ultrasonic Sensor, in
contrast, is made up of a single component that may function as both a wave emitter and receiver.
In order to maximize space and improve sensor compatibility, this form of circuit design has been
specifically created to eliminate all kinds of extraneous components.
Working
Distance Calculation Since the Ultrasonic sensor's goal is to determine distance using signals that
are emitted by the sensor and then received back, it must make sure that the sensor maximizes
compatibility while also delivering incredibly accurate results. In order to do so, the Distance
formula is applied:
Distance D = 1/2xTxC is a formula.
Where:
D -> the distance to be determined.
T -> The amount of time between sending and receiving waves.
C -> Sonic Wave Speed
Applications
● Chemical plants to ascertain the precise measurement of the liquid level.
● Robot sensing
● Automobile assembly
● Beam detection.
● Drink filling machines that stop the corresponding liquid output when the bottle reaches a
specific level.
● Car washing.
● The use of speed guns to measure vehicle speeds.
Ultrasonic sensor benefits
● The ultrasonic sensor can easily find deeper objects from a distance since it produces
very high frequencies.
● Effortlessly integrates with a microcontroller.

Figure 14. Ultrasonic Sensor HCSRO4 (courtesy: Source [14])


Disadvantages
● To operate the sensor properly, engineers and technicians with extensive knowledge are
required.
● Ultrasonic sensors must be water resistant or they would be quickly damaged.
● Controls the microcontroller interface, which calls for extremely skilled and experienced
programmers.

Performance:
● Range: Under controlled conditions, 0.1% - 0.2% accuracy
● Accuracy: 1% - 3% accuracy.
● Power Consumption: 20mA
● Output Type: Analog
● Pin-arrangement: 4-Pin
● Wave format: Acoustic Weave
● Frequency Modulation: 20Hz - 120kHz
● Response time: 50 ms - 200 ms
● Sensor Range: 40 cm - 300 cm
● Transmission Angle: 5°
● Voltage Range: 20 VDC - 30 VDC
Figure 15. HCSRO4 Sensor Diagram (courtesy: Source [15])

INMP441
The INMP441 is a widely used sensor in various IOT Projects and its numerous applications.
The following are some of its features that make it an important part of the project :
● High-Performance
● Low Power
● Digital-Output
● Omnidirectional MEMS microphone with a bottom port

Figure 16. INMP441 Sensor (courtesy: Source [16])


The complete INMP441 solution consists of :
● A MEMS sensor
● Micro Electro-Mechanical System, or MEMS, a chip technology where between a pair
of capacitive plates the sensors are composed in the form of a suspended mass.
Figure 17. INMP441 Sensor (courtesy: Source [17])

● When tilted, a difference in electrical potential is created by this suspended mass. The
measured difference is the calculated change of capacitance.

● Signal Conditioning
● The exquisite re-construction of the signal that prepares it for the next stage of
processing.

Figure 18. INMP441 Sensor Diagram (courtesy: Source [18])


● Most of its applications involve the structural or environmental measurement, such as
vibration and temperature measured by the sensors.
● An analog-to-digital converter translates following
■ analog signals,
■ real world signals like
● current
● light intensity
● voltage
● distance
● pressure
● temperature
Passive Infrared Sensor (PIR)

Description
A PIR sensor essentially functions as a motion detection sensor. By looking at the name, it is clear
that the sensor projects infrared rays onto a target item in order to detect motion. The spectrum of
infrared rays is broad, and they are also renowned for being simple to employ.

Figure 19. PIR Sensor (courtesy: Source [19])


Working of Passive Infrared Sensor
Any change in heat (infrared) radiation is found using a passive infrared sensor. It works by
gathering thermal energy from the surroundings, which is then stored and processed for use in
the future. Although this application is often thought of as a system that uses heat detection as its
primary capability, the system is also capable of detecting any movement and any temperature that
is slightly higher than the ambient temperature. As a result, even cooler things can be seen if they
are traveling somewhat more quickly. Since these sensors are typically passive, they can last for
over 15 years.
Components of a PIR Sensor
● Lens
● Circuit Board
Performance
● Range: 5m - 12m
● Category: Pyro Electric
● Pin-Arrangement: 3-Pin
● Power Consumption: 5V
● Setting time: 10 sec- 60 sec
Areas of Application
● Outdoor Lighting systems
● Garden Lightings
● Automated Lighting in homes
● Public Lifts & Elevators
● Basement lighting
● Solar Lighting
● Other Automated Lighting-related applications.

Advantages
● PIR Sensors don't require an external implementation or connection, making it more simple
to move these sensors from one place to another.
● Since PIR sensors use infrared rays to function, they can detect an object that is warmer
than the target temperature even if it is hidden by another object.

Figure 20. PIR Sensor Circuit Diagram (courtesy: Source [20])

Soil Moisture Sensor

Description
An inexpensive electronic device called a soil moisture sensor is commonly used to measure the
moisture content of a specific soil sample. The amount of water in the soil is measured by this
sensor. To continue with the components that make up the majority of the soil moisture sensor:
● Sensing Probe: This device checks if current is flowing through the soil and determines the
resistance characteristics that correlate to the amount of soil moisture.
● Sensor Module: The Sensor module gathers information from sensor probes and processes it
to produce the desired output form (eg. Digital or Analogue).

Figure 21. Soil Moisture Sensor (courtesy: Source [21])


PIN Arrangement
● VCC: +5V Supply
● Digital Output: 0 or 1
● Analogue Output: 0 to 1023
● GND: Ground

Areas of application
● Agriculture
● Landscape irrigation
● Simple sensors for gardeners.
● Research
Performance
● Soil temperature: -40 to +80 °C
● Maximal Fluctuation: ±0.5 °C(temperature) and ±5%(moisture)
● Rating: IP66
● Output: 4~20mA
● Accuracy measure: ±2%
Advantages
● Saves Water, Increases yields, and increases the quality of the crop.
● Easier measurement.
● Produces accurate results.
● Low-cost
● Immediate output of results.

Figure 22. Soil moisture Sensor Circuit Diagram (courtesy: Source [22])

Disadvantages
● Requires skilled personnel for data processing and information gathering.
● Because the output depends on a number of parameters, an in-depth analysis of the inputs
and other dependent variables are required.
● There is a considerable likelihood of inaccurate value prediction due to the bigger
particles in the provided soil sample.
● Needs each type of soil being utilized to be individually calibrated.

Infrared Sensor (IR)


Description
IR detectors are tiny microchips that include a photocell tuned to hear infrared light. Every TV
and DVD player has one of these in the front to listen for the IR signal from the clicker.
They are essentially always used for remote control detection. A matching IR LED is located
within the remote control, and it generates IR pulses to instruct the TV to switch on, turn off, or
change channels. It requires a bit more effort to evaluate a setup because IR light cannot be seen by
the human eye.

PIN Arrangement
● Pin 1 is the output so we wire this to a visible LED and resistor and resistor to it.
● Pin 2 is ground.
● Pin 3 is VCC, connected to 3-5V.
Since the LED is red and easier for us to see than IR, the detector will pull the output low when it
detects an IR signal.

Figure 23. Infrared Sensor (courtesy: Source [23])


Advantages

● Moving objects are read via IR sensors. On moving objects, contact-based temperature
sensors perform poorly. For detecting the temperatures of tyres, brakes, and related
equipment, infrared temperature sensors are the best option.
● IR sensors are not brittle. Without touch, there is no friction. Infrared sensors have longer
operational lifetimes since they don't incur wear and tear.
● IR sensors can offer extra information. By aiming an IR sensor at various locations on the
item being read, it can measure an object with more precision than touch devices.
● By monitoring changes in temperature within the area of vision, IR sensors may be utilised
to find motion.
Disadvantages

● Hard objects (such as barriers and doors), smoke, dust, haze, brightness, and other factors
all affect infrared wavelengths. Therefore, it cannot pass through doors or partitions.
● High-energy infrared rays can damage eyes.
● It can only operate one device at a time in the screen and control application.
● Additionally, controlling objects outside of Line of Sight is challenging (Line of Sight).
● To convey, the transmitter and collector must see one other.
● It is supported by a more constrained reach, and as a result, its execution degrades across
greater distances.
● Compared to cable transmission, it maintains a lower information rate.

Figure 24. Infrared circuit Diagram (courtesy: Source [24]) Types of IR

Sensors

There are two different kinds of IR sensors available active and passive
1. Active infrared Sensor
● Infrared source and infrared detector are the two components of an active infrared
sensor. The LED and infrared laser diodes are examples of infrared sources.
Photodiodes and phototransistors are two types of infrared detectors. An item reflects
the infrared radiation from the infrared source, which then falls on the infrared detector.
2. Passive Infrared Sensor
● Infrared detectors are essentially what passive infrared sensors are. Infrared sources and
detectors are not used by passive infrared sensors. They come in two varieties: thermal
and quantum. Infrared radiation is used as the heat source in thermal infrared sensors.
The most popular types of thermal infrared detectors are thermocouples, pyroelectric
detectors, and bolometers.

Areas of application
● Climatology
● Meteorology
● Photobiomodulation
● Flame Monitors
● Gas detectors
● Water analysis
● Moisture Analyzers
● Anesthesiology testing
● Petroleum exploration
● Rail safety
● Gas Analyzers
● IR Imaging Devices
● Infrared Tracking
● Radiation Thermometers
● Night Vision Devices

Magnetic Switch

The opening of doors and windows is detected using straightforward magnetic switches. The
magnet and a magnetically sensitive switch are the two essential components of a magnetic switch
(usually a reed switch enclosed within a glass envelope). Switches can be either generally closed
or normally open (close on alarm) (open on alarm). Some can be found in Form-C contacts (your
choice of normally open or normally closed, both in one switch).
For any requirement, there are numerous different magnetic switch form factors. There are
switches available for surface mounting as well as for hiding inside the door and its frame.
Higher detection performance is offered by infrared quantum type sensors. It is quicker than
infrared detectors of the thermal kind. Wavelength affects how photosensitive quantum type
detectors are. Better switches may be buried, whereas more affordable switches are typically
surface mounted and housed in a plastic box. Switches are designed for special uses like hiding
within hollow metal or wood doors. These cannot be used in place of one another.

Figure 25. Magnetic Switch (courtesy: Source [25])

Switches with Balanced Bias


Simple magnetic switches have the drawback that a burglar might be able to place a magnet next to
the switch while the door is open, tricking the system into not detecting that the door or window
has been opened.

Magnetic switches with a balanced bias are intended for high-security applications. Any disruption
in the magnetic field, such as opening a door or window, will result in a change in the state of the
magnetic switch since it is suspended in its case between two magnets that are oppositely polarized
(one horizontal and the other vertical). The switch will sound an alert if a magnet is placed close to
it in an attempt to trick it.
PIN Arrangement

● 1st wire- any I/O


● 2nd wire-GND

Advantages

● Capabilities for simple and dependable sensing and actuation


● Low component weight reduces the risk of overloading delicate electronics
● inexpensive unit pricing
● Low total cost of ownership with high performance
● Generally simple customization
● reliability and effectiveness throughout a long service life
● There is no need for power to operate.
● Low-profile designs for simple integration in locations with limited space

Disadvantages

● For it to function, a separate magnet is needed. Additionally, it is ineffective when the


magnet is placed more than a few millimeters from the switch component.
● When coupled with a controller or logic chip, it must be reported.
● Reed switches are not capable of being shrunk like other surface mount chips.
● Glass envelopes are prone to damage.
● Arcing might happen in between encounters.
● It may unintentionally get triggered by other magnetic fields.
● Only ferrous objects can be utilized to detect anything that gets in the way of the magnet or
switch.
Figure 26. Magnetic Switch Architecture (courtesy: Source [26])

APDS-9960
Description
The Broadcom APDS-9960 is an 8-pin device that combines a digitized RGB, ambient light,
proximity, and gesture sensor. Red, green, blue, and clear (RGBC), as well as vicinity and gesture
detection via an IR LED, as well as vicinity and gesture detection via an IR LED, are all provided
by the device's I2C-compliant interface. The RGB and ambient light sensing capability measures
light intensity through various attenuation materials, such as darkened glass, and varying
lighting circumstances. Additionally, precise ambient light and linked color temperature
detection are made possible by the inbuilt UV-IR blocking filter.
PIN Arrangement
● Pin-1, SDA. This pin is used for I2C communication.
● Pin-2, INT. This pin is active low during interrupt events.
● Pin 3, LDR. For proximity LEDs, this pin serves as an LED driver input. It links the LED
drivers to a steady power supply.
● Pin 4, LEDK. This pin is linked to the LDR pin when utilizing the internal LED driver
circuit.
● Pin 5, LEDA. This pin is connected to VLEDA on PCB.
● Pin 6, GND, is a ground pin.
● Pin 7, SCL. To give a clock signal for I2C serial data, utilize this pin.
● Pin 8, VDD. The supply voltage ranges from 2.4V to 3.6V.

Figure 28. APDS-9960 Pin Diagram (courtesy: Source [28])


Applications
● Numerous functions of the APDS-9960 include proximity sensing, RGB color sensing,
gesture detection, and ambient light sensing.
● This gadget is used to replace mechanical switches.
● The APDS-9960's RGB sensor is used to calculate color temperature.
● The proximity detecting engine of the APDS-9960 gadget is used to adjust the brightness of
TVs, cellphones, etc.
● The device's many sensor engines are also used by gesture robots.
● in medical technology.
● LCD monitors.
● RGB monitors and APDS-9960 are used for RGB rating.
BMP280
Description
Absolute barometric pressure sensors, like the BMP280, are very practical for mobile
applications. It may be used in battery-powered devices like watches, GPS modules, and cell
phones because of its tiny size and low power consumption. Based on Bosch's tried-and-true
piezo-resistive pressure sensor technology, the BMP280 has a high degree of precision and
linearity, long-term stability, and strong EMC resilience. Highest flexibility is guaranteed by a
variety of device operation choices. The device is tuned for filter performance, resolution, and
power consumption.

Figure 29. BMP280 Sensor (courtesy: Source [29])


PIN Arrangement
● PIN 1 VCC- Power source of 3.3VDC
● PIN 2 GND-Ground
● PIN 3 SCL-Serial Clock
● PIN 4 SDA-Serial Data
● PIN 5 CSB-Output to chip
● PIN 6 SDO-Serial Data Out
Applications
● Upgrading GPS navigation (e.g. time-to-first-fix improvement, dead-reckoning, slope
detection)
● Mobile phones, tablet computers, and GPS devices
● Navigation within (floor detection, elevator detection)
● Applications for outdoor navigation, recreation, and sports
● Home weather stations and weather forecasts
● Airborne toys
● Application in healthcare (e.g. spirometry)
● Indicator of vertical velocity (such as danger or sink speed)
● Watches

Figure 30. BMP280 Pin Diagram (courtesy: Source [30])


Advantages
● It needs 3.3V of power to function.
● There are no level shifters or integrated voltage regulators in it.
● The BMP280 sensor, an improved version of the BMP085 or BMP180 or BMP183 sensor, is
used by the board.
● It accurately measures barometric pressure and temperature to within 1 hPa and
1.0°C, respectively.
● The module's maximum current is 1.12mA.
● The range of pressure is 300 to 1100 hPa, or +9000 to -500 meters above sea level.
● The module is 11.5 mm by 15 mm.
Disadvantages
● Very low frequency response.
● Require filtering if a DC output is desired.
BMP 280 measures
● Temperature
● Humidity
● Pressure
● Altitude
MPU 6050
Description
● Micro Electro-Mechanical System (MEMS) MPU6050 has a three-axis gyroscope and an
accelerometer. It aids in the measurement of motion-related characteristics such as velocity,
direction, acceleration, and displacement.
● Digital Motion Processor (DMP), a component of MPU6050, has the ability to resolve
difficult calculations.
● A hardware 16-bit analogue to digital converter is part of the MPU6050. This feature allows
it to simultaneously capture three-dimensional motion.
● This module can be used with a well-known microcontroller like Arduino because of its
widely available and well-known characteristics. MPU6050 will be a fantastic option for you
if you're seeking for a sensor to regulate the movements of your drone, self-balancing robot,
remote control cars, or something similar.
● The I2C module is utilized by this module to interface with Arduino.
● The MPU6050 is less expensive and has the advantage of being simple to combine with an
accelerometer and gyro.

Figure 31. MPU-650 Sensor (courtesy: Source [31])


PIN Arrangements
● PIN 1 VCC-POWER PIN 7 ADO-IC2 address select
● PIN 2 GND-Ground PIN PIN 8 INT- Interrupt
● 3 SCL-Serial Clock PIN 4
● SDA-Serial Data
● PIN 5 XDA-Auxiliary Serial Data

Figure 32. Pin Diagram of MPU-650 Sensor (courtesy: Source [32])

Application

● The MPU6050 is the first integrated six-motion tracking system.


● It utilizes the I2C protocol for communication.
● It includes a built-in 16 BIT ADC with exceptional precision.
● 3 to 5 volts are required for it to operate.
● It is made up of a digital motion processor, which offers powerful processing.
● It is a built-in feature of the temperature sensor.
● With IIC devices like magnetometers, it may be utilized as an interface.
● Its pins have a 0.1 inch pitch.
● The range of its acceleration is +/-2g, +/-4g, +/-8g, and +/-16g.
● It measures 21.2mm (0.84") in length, 16.4mm (0.65") in width, and
3.3mm (0.13") in height, not including the pins.
● It weighs 2.1 grams.
● Its 4x4x0.9 mm QFN package is the smallest and thinnest available for portable
electronics.
CHAPTER 3
PROPOSED METHOD

3.1 Problem Statement

The existing security measures employed by colleges to prevent animal bites on campus, such
as human patrols and physical barriers, are costly and ineffective. This poses a risk to the
safety and security of students and staff. To enhance campus security and mitigate animal-
related threats, there is a critical demand for the implementation of an IoT-based animal
detection system. This system would employ surveillance robots equipped with motion
sensors and cameras for image recognition, integrated with machine learning algorithms such
as YOLO and R-CNN. The IoT system would identify and track animals on campus and
provide real-time alerts to the college community. By deploying this system, colleges can
significantly improve the safety and security of their campuses, safeguarding students and
staff from animal-related risks.

Objective

Imagine a campus where security robots transcend their traditional roles, transforming into
guardians not of buildings, but of furry friends. These "animal ambassadors" navigate
corridors, their keen sensors attuned to the pitter-patter of paws and the flutter of wings.
Equipped with advanced cameras and cutting-edge machine learning algorithms like
YOLOv5 and R-CNN, they vigilantly scan for unexpected animal visitors.
Gone are the days of surprise encounters with stray cats or lost dogs. When these four-legged
explorers are identified, the Kodular app becomes the silent herald. Its gentle notifications
inform the campus community, fostering both safety and a sense of shared responsibility.
This innovative system isn't merely a technological feat; it's a bridge to a harmonious
coexistence. Students can study with newfound peace of mind, knowing the well-being of
campus critters is actively monitored. Animal lovers receive timely updates, fostering a sense
of community and a commitment to responsible care.
This is not just about surveillance; it's about ensuring a safe and enriching environment for
both humans and animals. It's a vision of a campus where friendly wags and contented purrs
echo through the corridors, a testament to the power of technology to foster empathy and
understanding.
3.2 Explanation

This section includes explanation of the proposed solution, that include the following sections

1. Architecture diagram
2. Connectivity diagram
3. Software hardware requirements

3.2.1 Architecture Diagram

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy