The Design and Implementation of Home Automation Universal Terminal Node Based on ZigBee

2012 ◽  
Vol 235 ◽  
pp. 403-407
Author(s):  
Jun Ke Lv

ZigBee home automation networks is a future trend of intelligent home system. This paper analyses the types and characteristics of home automation terminal node. Based on the chip of CC2530 and Z-Stack protocol stack from Texas Instruments, the home automation universal terminal node is designed. The hardware design adopts modular form with CC2530 as its core, including CC2530 module, sensor module, output driving module and power supply module. For software design, Z-Stack protocol stack is transplanted. Based on the analysis of Z-Stack protocol stack, this paper presents the process of establishing a new ZCL application. Depending on the different types of terminal node, the program flow diagrams are provided. Practice indicates that the design proposal is universal and suitable for terminal node of home automation.

2020 ◽  
Vol 17 (4) ◽  
pp. 1949-1952
Author(s):  
S. Vamsi Krishna ◽  
N. M. Ramalingeswara Rao ◽  
K. V. Lalitha ◽  
B. Naveen Kumar

Smart home is an exceptionally encouraging region, which has different types of advantages, for example, giving expanded solace, more noteworthy wellbeing and security, a more judicious utilization of vitality and different assets along these lines adding to a critical investment funds. This examination application area is imperative and will increment in future as it likewise offers capable means for aiding and supporting uncommon needs of the elderly and individuals with inabilities. This paper shows the improvement of a firmware for a Smart Switch, which can control the on–off of any electrical gadget at home by utilizing web. The Smart Switch is associated with web by means of Wi-Fi, through a PC, advanced cell, tablet or any gadget with web get to. Keeping in mind the end goal to play out this association it is important to compose the IP pre-customized into the Smart Switch in a web program with the reason to stack the Smart Switch Server, which will open in design page to compose the information of the client’s system. At that point, the client will choose in programmed mode the system, the security composes, and the client probably composed a passphrase. Once these data is transferred and spared, it is important to restart the Smart Switch keeping in mind the end goal to access web, from which the client can control the Smart Switch just sending a main or a number zero to switch the electrical gadget, this procedure is done on a basic level through the web, yet it should be possible without the utilization of web, i.e., by utilizing a neighborhood arrange.


An emerging Lightweight machine to machine had been indulged with a high speed portable client-server specification. The LWM2M was helpfull for constrained networks. It has systematic machine manipulation also with an invulnerability venture, was supported in IoT applications. Research activities also focus on the server domain was in process in LWM2M. In LWM2M end-nodes are always resource-constrained. The client-side authorized LWM2M functionalities are not only critical and crucial also challenging. To approach the client-side set-up in LWM2M, it has a proper authenticity environment embedded in hand with IoT node. Its interconnection was predetermined to associate with the lightweight protocol stack and response was figured up by the LWM2M v1.0 specification. The usability and effectiveness of Lightweight protocol validated using a real-world application. Building a home automation product is one of the most effective parts is to think about protocols. Thus the LWM2M protocols are one of the efficient ways to communicate to gateways, servers, and sensors.


2017 ◽  
Vol 30 (5) ◽  
pp. 436-444
Author(s):  
Oliwier Dziadkowiec ◽  
Reese Jenniges

Purpose The purpose of this paper is to understand how the Wyoming Quit Tobacco Program (WQTP) is used by its subscribers and to better understand how WQTP might be connected to WQTP outcomes. Design/methodology/approach Provider intake and program use data corresponding to the May 2010 to March 2012 enrollment period (n=6,168) were used. All program flows were constructed using frequencies and crosstabs, based on an initial theoretical model prepared by the program provider. Data were adjusted based on analysis that explored all possible uses beyond those specified by the provider’s theoretical model. Findings Although the authors could replicate the structure – the theoretical model constructed by the provider – the authors were not able to replicate all relationships between program components. The authors also found that most individuals signed up and used web-based services. Only a few individuals finished their treatment regimens in the way they were designed to be used by the program. Originality/value This is the first case study to use a program flow method to investigate an entire comprehensive tobacco cessation program structure and delivery.


This paper presents the intelligent Home Automation System (HAS) for disabled people, since still now facilities for disabled people are insufficient around the world. Numerous researchers developed different technologies considering Bluetooth technology, ZigBee system, and Wifi technology. However, these topologies lack efficient support for disabled people. Therefore, to engage the disabled people with the modern technology and make their life safe, secure and comfortable, authors have introduced the Rasberry Pi 3 Model B with Blynk application which is able to control the home appliances from their smart android phone. In this research, the motion of the intruder has been considered as the key parameters and HOG method is used to detect the motion. Experimental validation of the proposed model implies that this process is more secure and user-friendly for disabled people compare to other existing technology. Therefore, the main contribution of this research is to develop a secured automated system, which will enable the disabled people to control the home appliances and thus overcome the limitation of the existing technology


Sign in / Sign up

Export Citation Format

Share Document