Abstract
The pervasive computing paradigm promotes new applications in several scenarios. Among these, domotics is receiving a considerable attention. This work presents an intelligent and pervasive surveillance system for home and corporate security based on the ZigBee protocol which detects and classifies intrusions discarding false positives, also providing remote control and cameras live streaming. Results of tests in different environments show the effectiveness of the proposed system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ZigBee Alliance, http://www.zigbee.org/
Rodden, T., Benford, S.: The evolution of buildings and implications for the design of ubiquitous domestic environments. In: CHI 2003: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 9–16. ACM, New York (2003)
Lorente, S.: Key issues regarding domotic applications. In: International Conference on Information and Communication Technologies: From Theory to Applications, April 2004, pp. 121–122 (2004)
Lee, T.-S., Yang, Y., Park, M.-S.: A sms based ubiquitous home care system. In: Yang, L.T., Rana, O.F., Di Martino, B., Dongarra, J. (eds.) HPCC 2005. LNCS, vol. 3726, pp. 1049–1057. Springer, Heidelberg (2005)
European Institute for Corporate Security, http://www.eicsm.org/index.html
Krausz, B., Herpers, R.: Event detection for video surveillance using an expert system. In: AREA 2008: Proceeding of the 1st ACM workshop on Analysis and retrieval of events/actions and workflows in video streams, pp. 49–56. ACM, New York (2008)
Miori, V., Russo, D., Aliberti, M.: Domotic technologies incompatibility becomes user transparent. Commun. ACM 53(1), 153–157 (2010)
Nieuwdorp, E.: The pervasive discourse: an analysis. Comput. Entertain. 5(2), 13 (2007)
Bell, G., Dourish, P.: Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision. Personal Ubiquitous Comput. 11(2), 133–143 (2007)
McCullough, M.: Digital Ground: Architecture, Pervasive Computing, and Environmental Knowing. MIT Press, Cambridge (2004)
Weiser, M., Gold, R., Brown, J.S.: The origins of ubiquitous computing research at parc in the late 1980s. IBM Syst. J. 38(4), 693–696 (1999)
Weiser, M.: The computer for the 21st century. SIGMOBILE Mob. Comput. Commun. Rev. 3(3), 3–11 (1999)
Hansmann, U., Nicklous, M.S., Stober, T.: Pervasive computing handbook. Springer-Verlag New York, Inc., New York (2001)
Torrisi, D.: Sistema di sicurezza perimetrale con allarmistica e controllo a distanza. Technical report, Dipartimento di Ingegneria Informatica e delle Telecomunicazioni - Facolta’ di Ingegneria - Universita’ di Catania (2009)
QextSerialPort, http://qextserialport.sourceforge.net/
Qt Nokia Framework, http://qt.nokia.com/about/news/nokia-releases-qt-4.6.2
OpenCV libraries, http://sourceforge.net/projects/opencvlibrary/
Williams, B.R., Zhang, M.: Multiple dimension chrominance model for background subtraction. In: Computational Intelligence, pp. 438–443 (2005)
Lee, D.S.: Effective gaussian mixture learning for video background subtraction. IEEE Trans. Pattern Anal. Mach. Intell. 27(5), 827–832 (2005)
Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.M.: The many faces of publish/subscribe. ACM Comput. Surv. 35(2), 114–131 (2003)
Pohja, M.: Server push with instant messaging. In: SAC 2009: Proceedings of the 2009 ACM symposium on Applied Computing, pp. 653–658. ACM, New York (2009)
Apple Push Notification Service, http://developer.apple.com/IPhone/library/documentation/NetworkingInternet/Conceptual/RemoteNotificationsPG/ApplePushService/ApplePushService.html
Cocoa Touch Framework, http://developer.apple.com/iphone
Orlik, P., Zhang, J., Bhargava, B., Ding, G., Ding, G., Sahinoglu, Z., Sahinoglu, Z.: Reliable broadcast in zigbee networks. In: Proceedings of SECON IEEE Conference (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G., Torrisi, D. (2010). Pervasive Home Security: An Intelligent Domotics Application. In: Essaaidi, M., Malgeri, M., Badica, C. (eds) Intelligent Distributed Computing IV. Studies in Computational Intelligence, vol 315. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15211-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-15211-5_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15210-8
Online ISBN: 978-3-642-15211-5
eBook Packages: EngineeringEngineering (R0)