Skip to main content

Pervasive Home Security: An Intelligent Domotics Application

  • Conference paper
Intelligent Distributed Computing IV

Part of the book series: Studies in Computational Intelligence ((SCI,volume 315))

Abstract

The pervasive computing paradigm promotes new applications in several scenarios. Among these, domotics is receiving a considerable attention. This work presents an intelligent and pervasive surveillance system for home and corporate security based on the ZigBee protocol which detects and classifies intrusions discarding false positives, also providing remote control and cameras live streaming. Results of tests in different environments show the effectiveness of the proposed system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ZigBee Alliance, http://www.zigbee.org/

  2. Rodden, T., Benford, S.: The evolution of buildings and implications for the design of ubiquitous domestic environments. In: CHI 2003: Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 9–16. ACM, New York (2003)

    Google Scholar 

  3. Lorente, S.: Key issues regarding domotic applications. In: International Conference on Information and Communication Technologies: From Theory to Applications, April 2004, pp. 121–122 (2004)

    Google Scholar 

  4. Lee, T.-S., Yang, Y., Park, M.-S.: A sms based ubiquitous home care system. In: Yang, L.T., Rana, O.F., Di Martino, B., Dongarra, J. (eds.) HPCC 2005. LNCS, vol. 3726, pp. 1049–1057. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. European Institute for Corporate Security, http://www.eicsm.org/index.html

  6. Krausz, B., Herpers, R.: Event detection for video surveillance using an expert system. In: AREA 2008: Proceeding of the 1st ACM workshop on Analysis and retrieval of events/actions and workflows in video streams, pp. 49–56. ACM, New York (2008)

    Chapter  Google Scholar 

  7. Miori, V., Russo, D., Aliberti, M.: Domotic technologies incompatibility becomes user transparent. Commun. ACM 53(1), 153–157 (2010)

    Article  Google Scholar 

  8. Nieuwdorp, E.: The pervasive discourse: an analysis. Comput. Entertain. 5(2), 13 (2007)

    Article  Google Scholar 

  9. Bell, G., Dourish, P.: Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision. Personal Ubiquitous Comput. 11(2), 133–143 (2007)

    Article  Google Scholar 

  10. McCullough, M.: Digital Ground: Architecture, Pervasive Computing, and Environmental Knowing. MIT Press, Cambridge (2004)

    Google Scholar 

  11. Weiser, M., Gold, R., Brown, J.S.: The origins of ubiquitous computing research at parc in the late 1980s. IBM Syst. J. 38(4), 693–696 (1999)

    Article  Google Scholar 

  12. Weiser, M.: The computer for the 21st century. SIGMOBILE Mob. Comput. Commun. Rev. 3(3), 3–11 (1999)

    Article  Google Scholar 

  13. Hansmann, U., Nicklous, M.S., Stober, T.: Pervasive computing handbook. Springer-Verlag New York, Inc., New York (2001)

    MATH  Google Scholar 

  14. Torrisi, D.: Sistema di sicurezza perimetrale con allarmistica e controllo a distanza. Technical report, Dipartimento di Ingegneria Informatica e delle Telecomunicazioni - Facolta’ di Ingegneria - Universita’ di Catania (2009)

    Google Scholar 

  15. QextSerialPort, http://qextserialport.sourceforge.net/

  16. Qt Nokia Framework, http://qt.nokia.com/about/news/nokia-releases-qt-4.6.2

  17. OpenCV libraries, http://sourceforge.net/projects/opencvlibrary/

  18. Williams, B.R., Zhang, M.: Multiple dimension chrominance model for background subtraction. In: Computational Intelligence, pp. 438–443 (2005)

    Google Scholar 

  19. Lee, D.S.: Effective gaussian mixture learning for video background subtraction. IEEE Trans. Pattern Anal. Mach. Intell. 27(5), 827–832 (2005)

    Article  Google Scholar 

  20. Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.M.: The many faces of publish/subscribe. ACM Comput. Surv. 35(2), 114–131 (2003)

    Article  Google Scholar 

  21. Pohja, M.: Server push with instant messaging. In: SAC 2009: Proceedings of the 2009 ACM symposium on Applied Computing, pp. 653–658. ACM, New York (2009)

    Google Scholar 

  22. Apple Push Notification Service, http://developer.apple.com/IPhone/library/documentation/NetworkingInternet/Conceptual/RemoteNotificationsPG/ApplePushService/ApplePushService.html

  23. Cocoa Touch Framework, http://developer.apple.com/iphone

  24. Orlik, P., Zhang, J., Bhargava, B., Ding, G., Ding, G., Sahinoglu, Z., Sahinoglu, Z.: Reliable broadcast in zigbee networks. In: Proceedings of SECON IEEE Conference (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Carchiolo, V., Longheu, A., Malgeri, M., Mangioni, G., Torrisi, D. (2010). Pervasive Home Security: An Intelligent Domotics Application. In: Essaaidi, M., Malgeri, M., Badica, C. (eds) Intelligent Distributed Computing IV. Studies in Computational Intelligence, vol 315. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15211-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15211-5_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15210-8

  • Online ISBN: 978-3-642-15211-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics