The proposed home monitoring system uses sensors to monitor temperature and humidity in a home. The sensor data is sent to a web server and stored in the cloud. This allows users to access the sensor data from anywhere using a mobile phone or computer. The system also allows users to remotely control electric appliances in the home through the web server. When temperature or humidity thresholds are exceeded, the system can send alerts to users.
2. 2
INTRODUCTION
1.1. OVERVIEW
Internet of Things (IoT) is a concept that visualizes all objects around us as part
of internet. Internet of things coverage is very wide and includes variety of objects like
smart phones, digital cameras, sensors, etc. Once all these devices are connected to each
other, they enable more and more smart processes and services that support our basic
needs, economies, environment, health etc. Such large number of devices connected to
internet provides many kinds of services and produce huge amount of data and
information.
Cloud computing is a one such model for on-demand access to a shared pool of
configurable resources ( compute, networks, servers, storage applications, services,
software etc.) that can be easily provisioned as Infrastructure, software and applications
(SaaS). Cloud based platforms help to connect to the things around us so that we can
access anything at any time and any place in a user friendly manner using customized
portals and in built applications (SaaS). Hence, cloud acts as a front end to access IoT.
Applications that interact with devices like sensors have special requirements of huge
storage to store big data, huge computation power to enable the real time processing of the
data i.e information, and high speed network to stream audio or video.
In this project, we describe how IoT and Cloud computing can work together
to provide automation of domestic things so as to reduce human intervention and save time
and energy.
3. 3
1.2 IoT (INTERNET OF THINGS)
The internet of things (IoT) can be described as the technology in which the
actual physical entities (electronic devices) with data sensing, processing & self adoption
capacity can be used to interact with other such device and process that data to take an
intelligent decision which will prove useful for our daily day to day life . IOT is defined as
an environment in which objects (devices) are given unique identifiers and the ability to
transfer data over a network without having human-to-human or human-to-computer
interaction.
The IOT is being formed from two words internet and things which combine
means any object or person which can be distinguishable by the real world can be
connected to global system of interconnected computer networks and governs by standard
protocol. They defined IOT as “An open and comprehensive network of intelligent objects
that have the capacity to auto organize, share information, data and resources, reacting and
acting in face of situations and changes in the environment” The internet of things is a new
era of intelligence computing and it is providing a privilege to communicate around the
world. The objective of IOT is anything, anyone, anytime, anyplace, any service and any
network,
1.3 ADVANTAGES OF HOME AUTOMATION SYSTEM
In recent years, wireless systems like Wi-Fi have become more and more
common in home networking. Also in home and building automation systems, the use of
wireless technologies gives several advantages that could not be achieved using a wired
network only.
1) Reduced installation costs: First and foremost, installation costs are significantly
reduced since no cabling is necessary. Wired solutions require cabling, where material as
well as the professional laying of cables (e.g. into walls) is expensive.
2) System scalability and easy extension: Deploying a wireless network is especially
advantageous when, due to new or changed requirements, extension of the network is
necessary. In contrast to wired installations, in which cabling extension is tedious. This
makes wireless installations a seminal investment.
4. 4
3) Aesthetical benefits: Apart from covering a larger area, this attribute helps to full
aesthetical requirements as well. Examples include representative buildings with all-glass
architecture and historical buildings where design or conservatory reasons do not allow
lying of cables.
4) Integration of mobile devices: With wireless networks, associating mobile devices such
as PDAs and Smartphone with the automation system becomes possible everywhere and at
any time, as a device's exact physical location is no longer crucial for a connection (as long
as the device is in reach of the network). For all these reasons, wireless technology is not
only an attractive choice in renovation and refurbishment, but also for new installations.
6. 6
LITERATURE SURVEY
2.1 LITERATURE REVIEWS
The Internet of Things (IoT) is the interconnection of uniquely identifiable
embedded computing devices within the existing Internet framework. Typically, IoT is
expected to offer advanced connectivity of devices and systems, and services that goes
beyond M2M i.e. machine-to-machine communications and covers a variety of protocols,
various domains, and applications. The interconnection of all these embedded devices
which also includes smart objects is expected to lead in automation in nearly all fields
enabling advanced applications like a Smart Grid. According to Gartner, there will be
nearly 26 billion devices on the Internet of Things by 2020.
ABI Research has estimated that more than 30 billion devices will be
wirelessly connected to the Internet of Things by 2020.According to the recent survey and
study done by Pew Research Internet Project, a huge majority of the technology experts
and engaged Internet users who responded 83 percent agreed with the conception that the
Internet of Things, embedded, wearable computing will have widespread and beneficial
effects by 2025.It is clear that the IoT will consist of a very large number of devices being
connected to the Internet.
The Internet of Things (loT) refers to uniquely recognizable objects and their
virtual representations in an Internet-like structure. Internet of Things refer to day-to-day
objects, which are understandable, distinguishable, locatable, addressable, and or
controllable via the Internet using RFID, wireless LAN, wide-area network, or other
means. These objects include not only the day to day usable electronic devices or the
products of higher technological development such as vehicles and equipment, but also
include various things like food, clothing, shelter; materials, their parts, and subassemblies;
7. 7
commodities and luxury items; boundaries, landmarks, and monuments; and all the
miscellany of commerce and culture. Ubiquitous computing refers to a new genre of
computing in which the computer completely permeates the life of the user. Internet of
Things (IoT) will comprise of billions of devices that can sense, communicate, calculate
and potentially actuate. Data streams coming from these devices will challenge the
traditional approaches to data management and contribute to the emerging paradigm of Big
Data. IoT has burst onto the stage, interconnecting everyday objects over the Internet,
which acts as everlasting sources of information. The occurrence has required a
combination of three developments.
2.2 IoT ELEMENTS
There are mainly three components of IOT a) Hardware - made up of sensors,
actuators and embedded communication hardware b) Middleware - on demand storage and
computing tools for data analytics and c) Presentation - novel easy to understand
visualization and interpretation tools which can be widely accessed on different platforms
and which can be designed for different applications[6]. In this section, we discuss a few
enabling technologies in these categories which will make up the three components stated
above.
2.2.1 Cloud Storage
Cloud computing is the practice of using remote servers on the internet to
manage, store and process data instead of using a personal computer. Cloud computing is a
general term that is better divided into three categories: Infrastructure-as-a-Service,
Platform-as-a-Service, and Software-as-a-Service. IaaS (or utility computing) follows a
traditional utilities model, providing servers and storage on demand with the consumer
paying accordingly. PaaS allows for the construction of applications within a provider’s
framework, like Google’s App Engine. SaaS enables customers to use an application on
demand via a browser. A common example of cloud computing is Gmail, where you can
access your stored data from any computer with internet access. Here we are using Gmail
for the storage of the data.
8. 8
2.2.2 Wi-Fi or WiFi is a technology for wireless local area networking with devices
based on the IEEE 802.11 standards. Wi-Fi is a trademark of the Wi-Fi Alliance, which
restricts the use of the term Wi-Fi Certified to products that successfully complete
interoperability certification testing.
Devices that can use Wi-Fi technology include personal computers, video-
game consoles, smart phones, digital cameras, tablet computers, digital audio players and
modern printers. Wi-Fi compatible devices can connect to the Internet via a WLAN
network and a wireless access point. Such an access point (or hotspot) has a range of about
20 meters (66 feet) indoors and a greater range outdoors. Hotspot coverage can be as small
as a single room with walls that block radio waves, or as large as many square kilometres
achieved by using multiple overlapping access points.
Depiction of a device sending information wirelessly to another device, both
connected to the local network, in order to print a document
Wi-Fi most commonly uses the 2.4 gigahertz (12 cm) UHF and 5 gigahertz
(6 cm) SHF ISM radio bands. Having no physical connections, it is more vulnerable to
attack than wired connections, such as Ethernet.
2.2.3 Wireless Sensor Networks (WSN)
A WSN is a wireless network consisting of spatially distributed autonomous
devices using sensors to cooperatively monitor physical or environmental conditions, such
as temperature, sound, vibration, pressure, motion or pollutants, at different locations
(Wikipedia). Formed by hundreds or thousands of notes that communicate with each other
and pass data along from one to another. A wireless sensor network is an important
element in IoT paradigm. Sensor nodes may not have global ID because of the large
amount of overhead and large number of sensors. WSN based on IoT has received
remarkable attention in many areas, such as military, homeland security, healthcare,
precision agriculture monitoring, manufacturing, habitat monitoring, forest fire and flood
detection and so on [16]. Sensors mounted to a patient’s body are monitoring the responses
to the medication, so that doctors can measure the effects of the medicines.
9. 9
2.2.4 Addressing schemes
The ability to uniquely identify Things is critical for the success of IoT. This
will not only allow us to uniquely identify billions of devices but also to control remote
devices through the Internet. The few most critical features of creating a unique address
are: uniqueness, reliability, persistence and scalability. Every element that is already
connected and those that are going to be connected must be identified by their unique
identification, location and functionalities. The current IPv4 may support to an extent
where a group of cohabiting sensor devices can be identified geographically, but not
individually. The Internet Mobility attributes in the IPV6 may alleviate some of the device
identification problems; however, the heterogeneous nature of wireless nodes, variable data
types, concurrent operations and confluence of data from devices exacerbates the problem
further. Persistent network functioning to channel the data traffic ubiquitously and
relentlessly is another aspect of IoT. Although, the TCP/IP takes care of this mechanism by
routing in a more reliable and efficient way, from source to destination, the IoT faces a
bottleneck at the interface between the gateway and wireless sensor devices. Furthermore,
the scalability of the device address of the existing network must be sustainable. The
addition of networks and devices must not hamper the performance of the network, the
functioning of the devices, the reliability of the data over the network or the effective use
of the devices from the user interface [12]. To address these issues, the Uniform Resource
Name (URN) system is considered fundamental for the development of IoT. URN creates
replicas of the resources that can be accessed through the URL. With large amounts of
spatial data being gathered, it is often quite important to take advantage of the benefits of
metadata for transferring the information from a database to the user via the Internet [12].
IPv6 also gives a very good option to access the resources uniquely and remotely. Another
critical development in addressing is the development of a light-weight IPv6 that will
enable addressing home appliances uniquely
2.2.5 ITU Architecture
According to the recommendations of the International Telecommunication
Union (ITU), the network, Architecture Internet of Things consists of
(a) The Sensing Layer
10. 10
(b) The Access Layer
(c) The Network Layer
(d) The Middleware Layer
(e) The Application Layers
Fig 2.1: Reference model in network and data communication.
These are like the Open Systems Interconnection (OSI) reference model in network and
data communication.
11. 11
2.2.6 Layers of System
The reference architecture for the internet of things consists of a set of
components. Layers can be realized by means of specific technologies, and we will discuss
options for realizing each component. There are also some cross-cutting/vertical layers
such as access/identity management the layers are :
2.2.6.1 The Device Layer
The bottom layer of the architecture is the device layer. Devices can be of
various types, but in order to be considered as IoT devices, they must have some
communications that either indirectly or directly attaches to the Internet.
2.2.6.2 The Communication Layer
The communication layer supports the connectivity of the devices. There are
multiple potential protocols for communication between the devices and the cloud. The
most well known three potential protocols are Figure: 4. Reference Architecture for IOT
2.2.6.3 The Aggregation/Bus Layer
An important layer of the architecture is the layer that aggregates and brokers
communications. This is an important layer for three reasons:
1. The ability to support an HTTP server and/or an MQTT broker to talk to the devices
2. The ability to aggregate and combine communications from different devices and to
route communications to a specific device (possibly via a gateway)
3. The ability to bridge and transform between different protocols, e.g. to offer HTTP
based APIs that are mediated into an MQTT message going to the device. The
aggregation/bus layer provides these capabilities as well as adapting into legacy protocols.
The bus layer may also provide some simple correlation and mapping from different
correlation models (e.g. mapping a device ID into an owner’s ID or vice-versa).
12. 12
2.2.6.4 The Event Processing and Analytical Layer
This layer takes the events from the bus and provides the ability to process and
act upon these events. A core capability here is the requirement to store the data into a
database. This may happen in three forms. The traditional model here would be to write a
server side application, e.g. this could be a JAX-RS application backed by a database.
However, there are many approaches where we can support more agile approaches. The
first of these is to use a big data analytics platform. This is a cloud-scalable platform that
supports technologies such as Apache Hadoop to provide highly scalable map reduce
analytics on the data coming from the devices. The second approach is to support complex
event processing to initiate near real-time activities and actions based on data from the
devices and from the rest of the system.
2.2.6.5 Device Management
Device management (DM) is handled by two components. A server-side
system (the device manager) communicates with devices via various protocols and
provides both individual and bulk control of devices. It also remotely manages software
and applications deployed on the device. It can lock and/or wipe the device if necessary.
The device manager works ind conjunction with the device management agents. There are
multiple different agents for different platforms and device types.
14. 14
PROPOSED HOME MONITORING SYSTEM
Fig 3.1: Block diagram of proposed Home Automation system.
The proposed model of the home monitoring system is as shown in the figure.
The model consists of different sensors like temperature and humidity. The sensor network
is connected to the internet through WiFi. The sensor data are sent to the web server and
stored in the cloud. The data can be analyzed anywhere any time. In the proposed model
the temperature and humidity in the house is monitored. The temperature and humidity
detection is stored in cloud for analysis. The user can also monitor the electric appliances
through the internet via web server.
The end user can use their mobile phone or personal computer to log into the
system through the web server. An initial check is performed for whether the hardware
device is ON or not. Only if the Hardware is authorized and ON then the user is
15. 15
authenticated. Once the authentication is done successfully the user is able to see the data
signals of the Hardware machine. At the hardware machine the SL driver program will
continuously track for the change in the status & will accordingly send the signals to the
Circuit. The data from the handheld is sent to the Web Server in a string format, where the
Web – site is hosted. On the server the status is stored in the database in their respective
device field. At the Hardware end, the circuit drive program a web page is [retrieve.aspx]
is used to retrieve the status of the devices in a timely pattern [every 10sec]. These changes
come in to form of cookies [temporary internet files] from the web server & are stored on
the computer in the name of the web site. Hence every 10 sec as the page refreshes the
new cookie values are updated. The cookie values are read from the program using the VB
component GETINERNETCOOKIE after a fixed delay. As the program receives any
change in the Device values it send the control signal [binary data] accordingly to the
required data pin of the parallel port.
3.1 PROPOSED SYSTEM’S FUNCTIONS
The proposed home automation system has the capabilities to control the
following components in users home and monitor the following alarms:
• Temperature and humidity
The proposed model of the home automation system is as shown in the figure.
The model consists of number of sensors. Initially all the sensors are connected to the
internet through Wi-Fi. When the connection is established in on web page we provide
virtual switches to operate the connected devices. Also it will start reading the parameters
of devices to shows the graph of current verses time for each device. If problem found it
report to cloud server. Here user can modify some settings and see the devices
functionality and working.
The system allows the user to monitor various standards such as temperature
and humidity from a smart phones and PC from anywhere in the world through an internet
connection. In this project we proposed a Novel technique that will give us best results and
provides Notifications to the user if problem occurs in any device.
18. 18
PROCESS AND REQUIREMENTS
4.4 INTERFACE DESIGN OF SERVER AND
HARDWARE
4.4.1 Front End Design:
This is provided by the IoT service providing sites. Here we are using service
of thingspeak.com.
Fig. 4.1: Front end interface of IoT service providing site.
19. 19
It provides us the graphical representation of the data from the home; send
through the sensor networks. The MATLAB code is preinstalled in the site and it process
the data and accordingly generate the graphs, which can be seen after we login into the
channel we have reserved in the service site “thingspeak.com”.
4.4.2 Database Storage
The system generates forms to collect data and stores the responses in a
database. This storage facility is also provided by the services providing site
“thingspeak.com” only. This data can be seen for further analysis using GOOGLE
SPREAD SHEET.
4.5 SOFTWAREWARE REQUIREMENT
4.5.1 Arduino Compiler:
The Arduino IDE is a cross-platform application written in Java, and is derived
from the IDE for the Processing programming language and the Wiring project. It is
designed to introduce programming to artists and other newcomers unfamiliar with
software development. It includes a code editor with features such as syntax highlighting,
brace matching, and automatic indentation, and is also capable of compiling and uploading
programs to the board with a single click. There is typically no need to edit make files or
run programs on a command-line interface. Although building on command-line is
possible if required with some third-party tools such a The Arduino IDE comes with a
C/C++ library called "Wiring" (from the project of the same name), which makes many
common input/output operations much easier. Arduino programs are written in C/C++.
20. 20
Fig. 4.2: Arduino platform software
4.6 PCB CONSTRUCTION:
4.7.1 PCB Layout
No device can work if its connections are not according to specification, and if
the proper resistance, capacitance, inductance etc. are not connected to the place where
required. Thus a PCB designer has to first think of the very possible combination of
voltages that are required by the circuit and make them available at points where they are
needed with the minimum use of jumpers and keeping the circuit size compact and yet
effective.
The layout of PCB has to incorporate all the information on the board before
one can go on the artwork preparation. This means that a concept, which clearly defines all
the details of the circuitry and partly of final equipment, is a prerequisite before the actual
layout can start.
For PCB layout, the following points ought to be considered carefully
. Record size of components used.
Overall area covered is normally kept rectangular or square.
21. 21
Vcc and ground lines should be provided at the sides to facilitate external connection.
Input and output terminals may be placed giving through to external connection.
Make a rough sketch placing components and interconnect components with jumpers.
Do not place components pointing in differed direction unless needed. Make them
parallel to the either side of the board.
Make the neat final scaled sketch on the inch graph sheet.
Lines mounted are of uniform width.
Invest the layout to confirm that all the components are connected properly and given
sufficient place in the layout.
22. 22
4.6.2 Tracing
After the circuit layout has been prepared on the tracing paper, inverting the
tracing paper onto the PCB so that the side that had been traced faces the PCB copper
coating. Then trace the layout onto the PCB placing a carbon paper in between the two.
4.6.3 Painting
Paint can also be done on the PCB however it must be uniformly applied. Use
0 number painting brushes for painting PCB layout.
4.6.4 Etching
In all PCBs, etching is the most important step. The final copper pattern is
formed by selective removal of all unwanted copper which is not protected by an etch
resist. Amongst the Enchants, FeCl3 (Ferric Chloride) is commonly used for small PCBs
where etching is only out carried out occasionally for a small number of boards.
For etching, the solution is made, wherein sample and standard solution are in 2*1
dilutions. In order to increases the copper dissolution capacity and to bring the etching time
slightly down, HCL is added. Etching temperature should be in the ranges of 20°C to
45°C. FeCl3 is an enchant used in small-scale PCB production. In high volume production
FeCl3 is of not much importance because it cannot be generated and it attacks the common
metal each resist.
4.6.5 Procedure
To etch copper and Ferric Chloride is used. In order to increase the copper
dissolving capacity and to bring the etching time slightly down, often HCL is added. HCL
acts simultaneously against excessive sludge formation.
After etching is over the Ferric Chloride contained surface should be first
cleaned by spraying water, which is not enough. Then we dip it in a 5% (by volume) in the
solution of oxalic acid to remove iron and copper salts and final water rinsed vigorously.
Then we rinse it by using petrol so that the paint comes out and copper remains intact
where the paint was applied. The copper acts as conduction path for flow of signals.
The high corrosive nature of Ferric chloride leads to short etching time and
avoid under etching.
23. 23
4.6.6 Chemistry
Due to hydrolysis reaction, free acid is formed which reacts with copper.
FeCl3+3H2O = Fe(OH)3+3HCl
The copper is oxidized by Ferric ion forming cuprous chloride.
4.6.7 Drilling
Drilling of holes for mounting components is important mechanical operation
in PCB production process. The importance of hole drilling into PCB’s has further gone up
with electronic components miniaturization. After rinsing drilling is done using bit as per
the circuit provided. The diameters of holes generally accepted are as follows.
1. D = 0.8 mm
2. D =1.1 mm
3. D = 1.5 mm
4. D = 3.2 mm
Where,
D = Hole diameter.
Component Mounting
Before mounting any components, examine the PCB carefully for any cracks, beaks or
other defects in conduction paths.
The leads of components like resistors and capacitors should be fully inserted into the
mounting holes taking care to mount the components so that any information written
on the components is clearly visible.
Carefully cut the leads of components so that about 3 mm of the end extended beyond
the wiring side of the PCB. The ends of the leas are bent at right angles to make a firm
contact with the surface where it is to be soldered.
24. 24
In case of semiconductor devices like transistors and diodes, the length of the leads
extending above the component side of the PCB should be about 1 cm. if transistor
leads are too short we use a base. Metal cap should touch if they are not at ground
potential. The right terminals should be at right certain components like transformers,
potentiometers and variable capacitors, which are meant for use with PCB, are
provided with pin type terminals that can be simply inserted into the hole in the PCB
and soldered.
25. 25
4.6.8 Soldering:
PCB soldering required proper soldering technique, as explained below:
A light duty soldering iron of 25W or 30 W rating should be used to prevent damage to
the printed circuit wiring due to excessive heating. The tip of soldering iron should not
have an oxide coating. Clean it using sand paper.
Do not use excess solder to avoid solder flouring to adjacent conducing paths forming
bridges, which cause short circuits.
Clean the surface of traces before you start soldering. It is advisable to use flux.
Layout of desired circuit diagram and preparation is first and most important
operation in any printed circuit board manufacturing process. First of all layout of
component side is to be made in accordance with available components dimensions. The
following points are to be observed while forming the layout of P.C.B:
Between two components, sufficient space should be maintained.
High wattage/max, dissipated components should be mounted at a sufficient distance
from semiconductors and electrolytic capacitors.
4.8 PCB Layout
Fig 4.3: Actual PCB layout
29. 29
cmd += String(getStr.length());
espSerial.println(cmd);
if (DEBUG) Serial.println(cmd);
delay(100);
if(espSerial.find(">"))
{
espSerial.print(getStr);
if (DEBUG) Serial.print(getStr);
}
Else
{
espSerial.println("AT+CIPCLOSE");
// alert user
if (DEBUG) Serial.println("AT+CIPCLOSE");
return false;
}
return true;
}
//===============================================================
================= setup
void setup()
{
DEBUG=true; // enable debug serial
Serial.begin(9600);
dht.begin(); // Start DHT sensor
espSerial.begin(115200);
// Enable this line to reset the module;
espSerial.println("AT+RST");
//showResponse(1000);
30. 30
espSerial.println("AT+CWMODE=1");
// set esp8266 as client
showResponse(1000);
espSerial.println("AT+CWJAP=""+ssid+"",""+password+"""); // set your home
router SSID and password
showResponse(5000);
if (DEBUG) Serial.println("Setup completed");
}
//===============================================================
======= loop
void loop()
{
// Read sensor values
float t = dht.readTemperature();
float h = dht.readHumidity();
if (isnan(t) || isnan(h)) {
if (DEBUG) Serial.println("Failed to read from DHT");
}
else {
if (DEBUG) Serial.println("Temp="+String(t)+" *C");
if (DEBUG) Serial.println("Humidity="+String(h)+" %");
thingSpeakWrite(t,h);
// Write values to thingspeak
}
// thingspeak needs 15 sec delay between updates,
delay(20000);
}
32. 32
RESULTS AND REPRESENTATIONS
6.1 REPRESENTATION
We have measured temperature and humidity. We have set time by which it
continuously senses temperature and Humidity. In the screenshot we have shown the result
senses temperature and humidity after every 5 seconds.
Fig 5.1: Channels saved on the server.
This screen shows the channels allotted to record and represent the data
collected from the sensors. We can design different channels for different process within
the same server.
We can select the desired channel for desired task and monitoring.
33. 33
6.2 RESULT
The figure 5.2 shows the actual recorded data of the sensors. The first graphical
representation shows the Temperature Vs Time graph and the second graphical
representation shows the Humidity Vs Time graph.
We can also include the Temperature Vs Humidity graph in the same screen for further
analysis.
Fig 5.2: This is the results from our system.
35. 35
CONCLUSIONS AND FUTURE WORK
7.1 CONCLUSION
The home automation using Internet of Things has been experimentally proven
to work satisfactorily by connecting simple appliances to it and the appliances were
successfully controlled remotely through internet. The designed system not only monitors
the sensor data, like temperature and humidity but can also actuates a process according to
the requirement, for example switching on the light when it gets dark. It also stores the
sensor parameters in the webpage (database) in a timely manner. This will help the user to
analyze the condition of various parameters in the home anytime anywhere.
7.2 FUTURE WORK
Using this system as framework, the system can be expanded to include
various other options which could include home security feature like capturing the photo of
a person moving around the house and storing it onto the cloud. This will reduce the data
storage than using the CCTV camera which will record all the time and stores it. The
system can be expanded for energy monitoring, or weather stations. This kind of a system
with respective changes can be implemented in the hospitals for disable people or in
industries where human invasion is impossible or dangerous, and it can also be
implemented for environmental monitoring.
37. 37
REFERENCES
[1] Asaad M. J. Al-Hindawi, Ibraheem Talib, “Experimentally Evaluation of GPS/GSM Based System
Design”, Journal of Electronic Systems, Volume 2 Number, 2 June, 2012.
[2] Kunal Maurya , Mandeep Singh, Neelu Jain, “Real Time Vehicle Tracking System using GSM and GPS
Technology- An Anti-theft Tracking System”, International Journal of Electronics and Computer Science
Engineering, ISSN 2277-1956/V1N3-1103-1107 .
[3] Vikram Kulkarni & Viswaprakash Babu, “embedded smart car security system on face detection”, special
issue of IJCCT, ISSN (Online) : 2231-0371, ISSN(Print):0975-7449,volume-3, issue-1.
[4] Chen, H., Chiang, Y. Chang, F. H. Wang, Toward Real-Time Precise Point Positioning: Differential GPS
Based on IGS Ultra Rapid Product, SICE Annual Conference, The Grand Hotel, Taipei, Taiwan August 18-
21, (2010).
[5] R.S Gaonkar, “Microprocessor Architecture Programming and Application”, Wiley Eastern Ltd, New
Delhi.
[6] Krishna Kant, “Microprocessor and microcontroller”, Eastern Company Edition, New Delhi 2007.
[7] Daniel. W. Lewis, “Fundamental of embedded software”, prentice hall of India, 2004.
[8] William Stalling, “Wireless Communication and Networks”, 2nd edition, prentice hall of India, 2005.