Batch 9

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 78

PERSONAL ASSISTIVE DEVICE FOR ELDER PEOPLE

USING IOT

ABSTRACT
Nowadays Health Care sector is developing in terms of science and technology by
using Wireless-Sensing node technology. Care must be taken in order to maintain
good health or else it might affect almost any part of body. Patients are facing a
situation of unpredicted demise due to many reasons like heart problems and heart
attack which is because of non-availability of good medical support to patients at the
necessary time. In order to get rid of all such problems our project aims to wipe off
such sudden deaths by using Patient Health Monitoring that uses sensor technology
and uses internet to communicate to the loved ones in case of problems. This project
is especially developed to ensure good safety of health of old aged patients and
informing doctors and their loved ones about their health conditions at any given time.
This system uses Temperature, ECG, and heartbeat sensor for tracking patient’s
health. The sensors are connected to the Arduino Mega. In case of any adverse
changes in patient heart rate or body temperature or ECG alert is sent about the patient
using IOT. Thus, Patient health monitoring system based on IOT uses internet to
effectively monitor patient health irrespective of the availability of doctors.

This project uses regulated 5V, 500mA power supply. Unregulated 12V DC is used
for relay. 7805 three terminal voltage regulator is used for voltage regulation. Bridge
type full wave rectifier is used to rectify the ac output of secondary of 230/12V step
down transformer.
CHAPTER 1
INTRODUCTION TO EMBEDDED SYSTEMS

1.1 INTRODUCTION:

Microcontroller are widely used in Embedded Systems products. An


Embedded product uses the microprocessor (or microcontroller) to do one task &
one task only. A printer is an example of Embedded system since the processor
inside it perform one task only namely getting the data and printing it. Although
microcontroller is preferred choice for many Embedded systems, there are times
that a microcontroller is inadequate for the task. For this reason, in recent years
many manufactures of general-purpose microprocessors such as INTEL, Motorola,
AMD & Cyrix have targeted their microprocessors for the high end of Embedded
market. One of the most critical needs of the embedded system is to decrease
power consumptions and space. This can be achieved by integrating more functions
into the CPU chips. All the embedded processors have low power consumptions in
additions to some forms of I/O, ROM all on a single chip. In higher performance
Embedded system, the trend is to integrate more & more function on the CPU chip
& let the designer decide which feature he/she wants to use.

1.2 EMBEDDED SYSTEM:

Physically, embedded systems range from portable devices such as


digital watches and MP3 players, to large stationary installations like traffic lights,
factory controllers, or the systems controlling nuclear power plants. Complexity
varies from low, with a single microcontroller chip, to very high with multiple
units, peripherals and networks mounted inside a large chassis or enclosure

In general, "embedded system" is not an exactly defined term, as many


systems have some element of programmability. For example, Handheld
computers share some elements with embedded systems such as the operating
systems and microprocessors which power them but are not truly embedded
systems, because they allow different applications to be loaded and peripherals to
be connected. Embedded systems span all aspects of modern life and there are
many examples of their use. Telecommunications systems employ numerous
embedded systems from telephone switches for the network to mobile phones at
the end-user. Computer networking uses dedicated routers and network bridges to
route data.

Examples of Embedded System:

 Automated teller machines (ATMS).


 Integrated system in aircraft and missile.
 Cellular telephones and telephonic switches.
 Computer network equipment, including routers timeservers and firewalls
 Computer printers, Copiers.
 Disk drives (floppy disk drive and hard disk drive)
 Engine controllers and antilock brake controllers for automobiles.
 Home automation products like thermostat, air conditioners sprinkles
and security monitoring system.
 House hold appliances including microwave ovens, washing machines, TV
sets DVD layers/recorders.
 Medical equipment.
 Measurement equipment such as digital storage oscilloscopes, logic
analyzers and spectrum analyzers.
 Multimedia appliances: internet radio receivers, TV set top boxes.
 Small hand-held computer with P1M5 a n d other applications.
 Programmable logic controllers (PLC’s) for industrial automation and
monitoring.
 Stationary video game controllers.

1.3 CHARACTERISTICS:

Embedded systems are designed to do some specific tasks, rather than be


a general-purpose computer for multiple tasks. Some also have real-time
performance constraints that must be met, for reasons such as safety and usability;
others may have low or no performance requirements, allowing the system
hardware to be simplified to reduce costs.
Embedded systems are not always standalone devices. Many embedded
systems consist of small, computerized parts within a larger device that serves a
more general purpose. For example, the Gibson Robot Guitar features an
embedded system for tuning the strings, but the overall purpose of the Robot Guitar
is, of course, to play music. Similarly, an embedded system in an automobile
provides a specific function as a subsystem of the car itself.

The software written for embedded systems is often called firmware,


and is usually stored in read-only memory or Flash memory chips rather than a disk
drive. It often runs with limited computer hardware resources: small or no
keyboard, screen, and little memory.

1.4 MICROPROCESSOR (MP):

A microprocessor is a general-purpose digital computer central


processing unit (CPU). Although popularly known as a “computer on a chip” is in
no sense a complete digital computer. The block diagram of a microprocessor CPU
is shown, which contains an arithmetic and logical unit (ALU), a program
counter (PC), a stack pointer (SP), some working registers, a clock timing circuit,
and interrupt circuits.

Seria
l
CPU COM
RAM ROM I/O Port Timer
General Port
MICROCONTR
OLLERS (MC)-

Purpose

Fig 1.1 Block diagram of microprocessor

1.5 MICROCONTROLLER (MC):

Figure shows the block diagram of a typical microcontroller. The design


incorporates all of the features found in micro-processor CPU: ALU, PC, SP,
and registers. It also added the other features needed to make a complete
computer: ROM, RAM, parallel I/O, serial I/O, counters, and clock circuit.
Fig 1.2 Microcontroller

1.6 Comparison between microprocessor and


microcontroller

The microprocessor must have many additional parts to be


operational as a computer whereas microcontroller requires no additional
external digital parts.
1. The prime use of microprocessor is to read data, perform
extensive calculations on that data and store them in the mass storage
device or display it. The prime functions of microcontroller is to read
data, perform limited calculations on it, control its environment based on
these data. Thus, the microprocessor is said to be general-purpose digital
computers whereas the microcontroller is intended to be special purpose
digital controller.
2. Microprocessor need many opcodes for moving data from the
external memory to the CPU, microcontroller may require just one or
two, also microprocessor may have one or two types of bit handling
instructions whereas microcontrollers have many.
Peripherals:

Embedded Systems talk with the outside world via peripherals, such as
 Serial Communication Interfaces (SCI): RS-232, RS-422, RS-
485etc
 Synchronous Serial Communication Interface: I2C, JTAG, SPI,
SSC and ESSI
 Universal Serial Bus (USB)
 Networks: Ethernet, Controller Area Network, LAN networks,
etc.
 Timers: PLL(s), Capture/Compare and Time Processing Units
 Discrete IO: aka General Purpose Input/output (GPIO)
 Ana log to Digital/Digital to Analog (ADC/DAC)

Tools:

As for other software, embedded system designers use compilers,


assemblers, and debuggers to develop embedded system software.
However, they may also use some more specific tools:

 Utilities to add a checksum or CRC to a program, so the


embedded system can check if the program is valid.
 For systems using digital signal processing, developers may use a
math workbench such as MATLAB, Simulink, Mathcad, or
Mathematica to simulate the mathematics. They might also use
libraries for both the host and target which eliminates developing
DSP routines as done in DSP nano RTOS and Unison Operating
System.
 Custom compilers and linkers may be used to improve
optimization for the particular hardware.
 An embedded system may have its own special language or
design tool, or add enhancements to an existing language such as
Forth or Basic.
 Another alternative is to add a Real-time operating system or
Embedded operating system, which may have DSP capabilities
like DSP Nano RTOS.
CHAPTER 2

OVERVIEW OF THE PROJECT

2.1 INTRODUCTION

With a rapid growth in human population and medical expenditure,


healthcare has become one of most significant issues for both individuals
and governments. Meanwhile, according to a report from the World Health
Organization (WHO), the problem of population aging is becoming more
serious. Health conditions of aged people usually need to be checked more
frequently, which poses a greater challenge to existing medical systems.
Therefore, how to identify human diseases in a timely and accurate manner
with low costs has been paid an increasing attention. Due to the dominance
in the diagnosis of heart-related diseases, electrocardiogram (ECG)
monitoring has been widely applied in both hospitals and medical research.

Traditionally, the ECG is detected through large and stationary


equipment in professional medical institutions. The kind of equipment
usually employs twelve electrodes to collect ECG data due to their good
performance in short-term measuring. However, the equipment is unlikely
to be portable, which means that patients’ activities are severely limited
during the period of data collection. Moreover, as these devices are usually
too expensive for home use, patients have to go to hospital frequently,
which will inevitably increase the burden of hospitals. Therefore, a portable
system for a long-term ECG signal detection with low costs is highly
desired.

Thanks to the development of mobile Internet and wireless sensor


networks (WSNs), wearable ECG monitoring systems have emerged which
are able to detect ECG signals using a non-intrusive sensor and transmit the
signal to the smart phone through wireless transmission techniques, such as
Bluetooth or Zigbee. For the sake of portability, electrodes of the WSN-
based ECG monitoring systems are usually less than traditional methods. At
the expense of accuracy, it is sufficient to collect the basic information of
the heart. These portable sensors are usually embedded into some wearable
textiles, which have little impact on the user’s daily activities. With the aid
of these systems, long-term ECG can be monitored in a cost-effective
manner. However, to the best of our knowledge, nearly all existing systems
cannot work without a smart phone, which is used as a receiver and
processor of the ECG data. Due to limited power and computational
capabilities, the complex tasks of data transportation and processing may
have a great impact on the daily use of the smart phone. Furthermore, in
order to support all the OS platforms of smart terminals, great efforts are
required for the cross-platform development of the mobile application.

In this paper, the architecture of an ECG monitoring system based on the


Internet-of-Things (IoT) cloud is firstly proposed. Based on this
architecture, we design and implement a wearable ECG monitoring system.
The ECG data gathered from the human body will be transmitted directly to
the IoT cloud using Wi-Fi without the need of a mobile terminal. Compared
with Bluetooth or Zigbee, Wi-Fi can provide higher data rates and wider
coverage areas. In order to provide convenient and timely access to ECG
data for users, both the HTTP and MQTT servers are deployed in the IoT
cloud. The gathered data are stored in a non-relational database, i.e., Redis,
which can greatly improve the speed and flexibility of data storage. A web-
based graphical user interface is implemented so that it provides ease of
access for doctors and patients alike using smart phones of different OS
platforms to access to the data services provided by the IoT cloud. The
proposed system has been successfully deployed and fully tested with
demonstrated effectiveness and reliability in ECG monitoring.

The reminder of this paper is organized as follows. Section II presents


the architecture of the IOT based ECG monitoring system. The system
implementation is introduced in Section III, which includes a monitoring
node, the IoT cloud and a graphic user interface (GUI). In Section IV, we
conduct several tests on a healthy volunteer in order to verify the reliability
of the proposed system. Finally, Section V concludes this paper.
2.2 EXISTING SYSTEM

The monitoring system is made up by physiological parameters


acquisition module and Android smartphone application module.
Physiological data is transmitted between the two parts via Bluetooth, and
WI-FI or 3G network is also used to realize remote data transmission with
the remote health server. We use 3AHcare node as parameters acquisition
module.

The 3AHcare node is able to continuously measure seven leads ECG,


respiration, temperature, blood pressure and SpO2 in real time, and via
wireless standard communications protocols of Zigbee and Bluetooth, it can
be used for exchanging data with other devices. After fully considering the
characteristics of the existing smartphone operating systems, we decide to
develop our monitoring application with the Android operating system
which is open, interface friendly, and network function powerful. We use
HUAWEI C8813 as a prototype to test our monitoring application, some of
the necessary parameters about C8813 are as follows:4.5-inch screen size,
854x480 pixel resolution, 1228MHz CPU frequency, Android OS 4.1
operating system, 512MB RAM, 4GB ROM, supported by Bluetooth.

Zigbee and Bluetooth are used for remote telemetry given the
requirements for high bandwidth, standardized communications protocol,
there are prevalence in consumer endpoints for visualization and data relay,
and the ability to interface to a large number of Bluetooth and Zigbee-
enabled health devices, which can be choose freely by wearer.

Currently available devices are overpriced in the market, even more so,
they are not available in Bangladesh. The resolution was establishing a
remote personalized assistive system which is in need at this moment in this
country as there are an insubstantial number of doctors in remote/rural
areas. This system can help those areas greatly and doctors can work
remotely taking better care for many patients who are in need of assistance.
On the other hand, ambulances in Bangladesh are are not properly equipped
with any sort of devices that monitor the health of the patient being
transported, whereas it is a necessity to have a health monitoring system in
ambulances as it gives the doctor critical insight about the patient. Hence,
this system can be put to good use within ambulances as well. On the other
hand, Bangladesh faces a lot of congestion and traffic on the road and there
is no emergency lane for the ambulances to pass in critical situations. Many
patients face serious consequences for this reason only. So, this device can
help in that area severely.

2.3 PROPOSED SYSTEM

IoT is an application-specific, low power, effective, and easy to use a


solution of any real-time problems. Sensors are the input providers from
the physical world, which transferred over a network, and actuators allow
vthings to act or react according to the input received from sensors.

The prototype implementation of the COVID-19 screening device.


The device contains medical sensors connected with a processor and a Wi-
Fi module for data processing and transfer to the cloud. The device has two
interconnected parts: one placed around the arm, while the other one
attached to the frontal part closer to the neck so that the cough intensity and
frequency can be determined (see Figure 2b, c). Its purpose is to identify the
symptoms of the coronavirus by measuring the temperature, oxygen level in
the blood, the heartbeat rate, and determining the severity of the patient’s
cough. The on-board process is programmed using Arduino to combine the
data and send it to a cloud-storage platform using the Wi-Fi module.

Our screening device allows physicians or patient-supervising


professionals to take physiological measurements and remotely analyze
their patients, always know their health conditions, and determine the
necessary medical characteristics without any physical and direct contact
with them. The device is accompanied by a smartphone application to
remotely follow and determine the patient’s health condition if he/she is
infected with influenza or coronavirus in a combination of the data from the
sensors, as shown in Figure. Using patterns from visualization concepts, we
use different widgets and different colors to display the results of the
sensors as well as the diagnosis, based on data from the sensors. The
application uses an algorithm to decide on the status of the patient as
without any symptoms or having mild, moderate, or severe symptoms along
with individual sensor reading for explanation and evaluation.

2.3.1 BLOCK DIAGRAM OF PROPOSED SYSTEM

RPS Wi-Fi
MODULE

TEMPERATURE
SENSOR IOT

SPO2 SENSOR
MOBILE APP
ARDUINO
MEGA
ECG SENSOR
LCD

SWITCH
BUZZER

RTC

Fig 2.1 Block Diagram of Proposed System


2.3.2 HARDWARE COMPONENTS
 Power Supply
 Arduino Mega
 Temperature Sensor
 SPO2 Sensor
 ECG Sensor
 Switch
 RTC
 Wi-Fi Module
 LCD
 Buzzer

2.3.3 SOFTWARE COMPONENTS


 Arduino IDE
 Proteus

2.3.4 TECHNOLOGY USED

 IOT Technology
CHAPTER 3

IOT TECHNOLOGY

3.1INTRODUCTION OF IOT TECHNOLOGY

1. The term "Internet of Things" has come to describe a number of


technologies and research disciplines that enable the Internet to
reach out into the real world of physical objects.
2. The Internet of Things, also called The Internet of Objects, refers
to a wireless network between objects.
3. From any time, any place connectivity for anyone, we will now have
connectivity for anything!

Fig 3.1 IOT Technology

3.1.1 THE VISION

To improve human health and well-being is the ultimate goal of any


economic, technological and social development. The rapid rising and aging
of population are one of the macro powers that will transform the world
dramatically, it has caused great pressure to food supply and healthcare
systems all over the world, and the emerging technology breakthrough of
the Internet-of-Things (IoT) is expected to offer promising solutions
(National Information Council 2008). Therefore, the application of IoT
technologies for the food supply chain (FSC) (so-called Food-IoT) and in-
home healthcare (IHH) (so-called Health-IoT1) have been naturally
highlighted in the strategic research roadmaps (European Commission
Information Society 2009). To develop practically usable technologies and
architectures of IoT for these two applications is the final target of this
work. The phrase "Internet of Things" (IoT) was coined at the beginning of
the 21st century by the MIT Auto-ID Center with special mention to Kevin
Ashton (Ashton 2009) and David L. Brock (Brock 2001). As a complex
cyber- physical system, the IoT

Integrates all kinds of sensing, identification, communication,


networking, and informatics devices and systems, and seamlessly connects
all the people and things upon interests, so that anybody, at any time and
any place, through any device and media, can more efficiently access the
information of any object and any service (ITU 2005, European
Commission Information Society 2008 and 2009). “Ubiquitous” is the
distinct feature of IoT technologies, so the IoT is often related to ubiquitous
identification (Sheng et al. 2010), ubiquitous sensing (ITU-T, 2008),
ubiquitous computing (Fried Ewald and Raabe 2011), ubiquitous
intelligence (Zheng et al. 2008), etc. As shown in Figure 1-1, a vivid
description of this vision has been illustrated in a report by The Economist
in 2007 (The Economist 2007).

A vivid description of the vision of Internet-of-Things (Authorized


by Jon Berkeley) The impact caused by the IoT to human life will be as
huge as the internet has caused in the past decades, so the IoT is recognized
as “the next of internet”. A part of the enabling technologies are sensors and
actuators, Wireless Sensor Network (WSN), Intelligent and Interactive
Packaging (I2Pack), real-time embedded system, Microelectromechanical
Systems (MEMS), mobile internet access, cloud computing, Radio
Frequency Identification (RFID), Machine-to-Machine (M2M)
communication, human machine interaction (HMI), middleware, Service
Oriented Architecture (SOA), Enterprise Information System (EIS), data
mining, etc. With various descriptions from various viewpoints, the IoT has
become the new paradigm of the evolution of information and
communication technology (ICT).

3.2 CHARACTERISTICS FOR INTERNET OF THINGS:

 Event driven

 Ambient intelligence

 Flexible structure

 Semantic sharing

 Complex access technology

Anyone who says that the Internet has fundamentally changed


society may be right, but at the same time, the greatest transformation
actually still lies ahead of us. Several new technologies are now converging
in a way that means the Internet is on the brink of a substantial expansion as
objects large and small get connected and assume their own web identity.

Following on from the Internet of computers, when our servers and


personal computers were connected to a global network, and the Internet of
mobile telephones, when it was the turn of telephones and other mobile
units, the next phase of development is the Internet of things, when more or
less anything will be connected and managed in the virtual world. This
revolution will be the Net’s largest enlargement ever and will have
sweeping effects on every industry — and all of our everyday lives.

Smart connectivity with existing networks and context-aware


computation using network resources is an indispensable part of IoT. With
the growing presence of Wi-Fi and 4G-LTE wireless Internet access, the
evolution towards ubiquitous information and communication networks is
already evident. However, for the Internet of Things vision to successfully
emerge, the computing paradigm will need to go beyond traditional mobile
computing scenarios that use smart phones and portables, and evolve into
connecting everyday existing objects and embedding intelligence into our
environment. For technology to disappear from the consciousness of the
user, the Internet of Things demands: a shared understanding of the
situation of its users and their appliances, software architectures and
pervasive communication networks to process and convey the contextual
information to where it is relevant, and the analytics tools in the Internet of
Things that aim for autonomous and smart behavior. With these three
fundamental grounds in place, smart connectivity and context-aware
computation can be accomplished.

A radical evolution of the current Internet into a Network of


interconnected objects that not only harvests information from the
environment (sensing) and interacts with the physical world (actuation/
command/control), but also uses existing Internet standards to provide
services for information transfer, analytics, applications, and
communications. Fueled by the prevalence of devices enabled by open
wireless technology such as Bluetooth, radio frequency identification
(RFID), Wi-Fi, and telephonic data services as well as embedded sensor
and actuator nodes, IoT has stepped out of its infancy and is on the verge of
transforming the current static Internet into a fully integrated Future
Internet.

The Internet revolution led to the interconnection between people at


an unprecedented scale and pace. The next revolution will be the
interconnection between objects to create a smart environment. Only in
2011 did the number of interconnected devices on the planet overtake the
actual number of people. Currently there are 9 billion interconnected
devices and it is expected to reach 24 billion devices by 2020. According to
the GSMA, this amounts to $1.3 trillion revenue opportunities for mobile
network operators alone spanning vertical segments such as health,
automotive, utilities and consumer electronics.

3.3DEFITNITION OF INTERNET OF THINGS (IoT)

“Today computers—and, therefore, the Internet—are almost wholly


dependent on human beings for information. Nearly all of the roughly 50
petabytes(a petabyte is 1,024 terabytes) of data available on the Internet
were first captured and created by human beings— by typing, pressing a
record button, taking a digital picture, or scanning a bar code. Conventional
diagrams of the Internet … leave out the most numerous and important
routers of all - people. The problem is, people have limited time, attention
and accuracy—all of which means they are not very good at capturing data
about things in the real world. And that's a big deal. We're physical, and so
is our environment … You can't eat bits, burn them to stay warm or put
them in your gas tank. Ideas and information are important, but things
matter much more. Yet today's information technology is so dependent on
data originated by people that our computers know more about ideas than
things. If we had computers that knew everything there was to know about
things—using data they gathered without any help from us—we would be
able to track and count everything, and greatly reduce waste, loss and cost.
We would know when things needed replacing, repairing or recalling, and
whether they were fresh or past their best. The Internet of Things has the
potential to change the world, just as the Internet did. Maybe even more
so”.

“Things are active participants in business, information and social processes


where they are enabled to interact and communicate among themselves and
with the environment by exchanging data and information sensed about the
environment, while reacting autonomously to the real/physical world events
and influencing it by running processes that trigger actions and create
services with or without direct human intervention.”
“The Internet of Things represents an evolution in which objects are
capable of interacting with other objects. Hospitals can monitor and
regulate pacemakers’ long distance, factories can automatically address
production line issues and hotels can adjust temperature and lighting
according to a guest's preferences, to name just a few examples.”

3.4 24 HOURS IN FUTURE WITH INTERNET OF


THINGS

How many devices do you currently own? Three, four or more? A


laptop, a tablet, a smartphone or even a smart watch and a smart band or the
new Nike smart shoes maybe? It goes without saying that technology has
become an indispensable part of our lives.

Here is how 24 hours would like in the future with IoT-

I wouldn’t need to set an alarm for the next day. My smartphone


will pick up the time of my meeting from my digital calendar will connect
to estimate the real time traffic and predict my travelling time to the
meeting venue will analyze how much time I usually take to get ready AND
finally it will calculate how early I need to wake up!

My smart heater would know that I am up and it will adjust the


water temperature according to my preference.

When I'll be ready to leave the house, the smart refrigerator will tell
me that there is milk and fruits for my breakfast and I shouldn’t eat cheese
today because I didn’t exercise yesterday. It is so smart that if any food item
has finished or expired- it will connect to the supermarket on the internet,
order my groceries and I would be able to pay sitting from anywhere
anytime through my mobile wallet.

When I am finished eating breakfast, my smart car will turn the AC


on so that as soon as I start driving there is a favorable temperature in the
car and smart radio will be automatically turned to my favorite radio
station. When let's say I get back from a yoga class, my smart clothing will
know that I am sweating and this data will be sent to my smart home
temperature system which will adjust the room temperature as soon as I
enter the house to make me feel comfortable.

These devices are so smart that they would be collecting data from my
physical movements and will monitor my activities and behavior to do
predictive analysis of my routine and preferences. You would be amazed
at how many such smart devices already exist or are going to be available in
the near future to make up a powerful Internet of Things.

3.5ARCHITECTURE OF INTERNET OF THINGS

Architecture of internet Of Things contains basically 4 layers:

Application Layer
1. Gateway and the network layer
2. Management Service layer
3. Sensor layer

3.5.1 APPLICATION LAYER:

 Lowest Abstraction Layer

 With sensors we are creating digital nervous system.

 Incorporated to measure physical quantities

 Interconnects the physical and digital world

 Collects and process the real time information

3.5.2 GATEWAY AND THE NETWORK LAYER:

 Robust and High-performance network infrastructure

 Supports the communication requirements for latency, bandwidth or


security

 Allows multiple organizations to share and use the same network


independently

3.5.3 MANAGEMENT LAYER:

 Capturing of periodic sensory data

 Data Analytics (Extracts relevant information from massive amount


of raw data)

 Streaming Analytics (Process real time data)

 Ensures security and privacy of data.

3.5.4 SENSOR LAYER:

 Provides a user interface for using IoT.


 Different applications for various sectors like Transportation,
Healthcare, Agriculture, Supply chains, Government, Retail etc.
3.6 INTERNET OF THINGS ELEMENTS

There are three IoT components which enables seamless:

a) Hardware—made up of sensors, actuators and embedded


communication hardware
b) Middleware—on demand storage and computing tools for data
analytics and
c) Presentation—novel easy to understand visualization and
interpretation tools which can be widely accessed on different
platforms and which can be designed for different applications

3.7 RADIO FREQUENCY IDENTIFICATION (RFID)


RFID technology is a major breakthrough in the embedded
communication paradigm which enables design of microchips for wireless
data communication. They help in the automatic identification of anything
they are attached to acting as an electronic barcode. The passive RFID tags
are not battery powered and they use the power of the reader’s interrogation
signal to communicate the ID to the RFID reader. This has resulted in many
applications particularly in retail and supply chain management. The
applications can be found in transportation (replacement of tickets,
registration stickers) and access control applications as well. The passive
tags are currently being used in many bank cards and road toll tags which
are among the first global deployments. Active RFID readers have their
own battery supply and can instantiate the communication. Of the several
applications, the main application of active RFID tags is in port containers
for monitoring cargo.

3.8 WIRELESS SENSOR NETWORKS (WSN)

Recent technological advances in low power integrated circuits and wireless


communications have made available efficient, low cost, low power
miniature devices for use in remote sensing applications. The combination
of these factors has improved the viability of utilizing a sensor network
consisting of a large number of intelligent sensors, enabling the collection,
processing, analysis and dissemination of valuable information, gathered in
a variety of environments. Active RFID is nearly the same as the lower end
WSN nodes with limited processing capability and storage. The scientific
challenges that must be overcome in order to realize the enormous
potential of WSNs are substantial and multidisciplinary in nature. Sensor
data are shared among sensor nodes and sent to a distributed or centralized
system for analytics. The components that make up the WSN monitoring
network include:

a) WSN hardware—Typically a node (WSN core hardware) contains


sensor interfaces, processing units, transceiver units and power
supply. Almost always, they comprise of multiple A/D converters
for sensor interfacing and more modern sensor nodes have the
ability to communicate using one frequency band making them
more versatile.

b) WSN communication stack—The nodes are expected to be


deployed in an ad-hoc manner for most applications. Designing an
appropriate topology, routing and MAC layer is critical for the
scalability and longevity of the deployed network. Nodes in a WSN
need to communicate among themselves to transmit data in single or
multi-hop to a base station. Node drop outs, and consequent
degraded network lifetimes, are frequent.

c) WSN Middleware—A mechanism to combine cyber infrastructure


with a Service Oriented Architecture (SOA) and sensor networks to
provide access to heterogeneous sensor resources in a deployment
independent manner. This is based on the idea of isolating resources
that can be used by several applications. A platform-independent
middleware for developing sensor applications is required, such as
an Open Sensor Web Architecture.

d) Secure Data aggregation—An efficient and secure data aggregation


method is required for extending the lifetime of the network as well
as ensuring reliable data collected from sensors. Node failures are a
common characteristic of WSNs, the network topology should have
the capability to heal itself. Ensuring security is critical as the
system is automatically linked to actuators and protecting the
systems from intruders becomes very important.

3.9 APPLICATIONS:

There are several application domains which will be impacted by


the emerging Internet of Things. The applications can be classified based on
the type of network availability, coverage, scale, heterogeneity,
repeatability, user involvement and impact.

We categorize the applications into four application domains:

1) Personal and Home


2) Enter prize
3) Utilities
4) Mobile.

There is a huge crossover in applications and the use of data between


domains. For instance, the Personal and Home IoT produces electricity
usage data in the house and makes it available to the electricity (utility)
company which can in turn optimize the supply and demand in the Utility
IoT. The internet enables sharing of data between different service
providers in a seamless manner creating multiple business opportunities.

3.9.1 PERSONAL AND HOME


The sensor information collected is used only by the individuals
who directly own the network. Usually, Wi-Fi is used as the backbone
enabling higher bandwidth data (video) transfer as well as higher sampling
rates (Sound).

Ubiquitous healthcare has been envisioned for the past two


decades. IoT gives a perfect platform to realize this vision using body area
sensors and IoT back end to upload the data to servers. For instance, a
Smartphone can be used for communication along with several interfaces
like Bluetooth for interfacing sensors measuring physiological parameters.
So far, there are several applications available for Apple iOS, Google
Android and Windows Phone operating systems that measure various
parameters. However, it is yet to be centralized in the cloud for general
physicians to access the same.

An extension of the personal body area network is creating a home


monitoring system for elderly care, which allows the doctor to monitor
patients and the elderly in their homes thereby reducing hospitalization
costs through early intervention and treatment.

Control of home equipment such as air conditioners, refrigerators,


washing machines etc., will allow better home and energy management.
This will see consumers become involved in the IoT revolution in the same
manner as the Internet revolution itself.

Social networking is set to undergo another transformation with


billions of interconnected objects. An interesting development will be using
a Twitter like concept where individual ‘Things’ in the house can
periodically tweet the readings which can be easily followed from
anywhere creating a Tweetot. Although this provides a common framework
using cloud for information access, a new security paradigm will be
required for this to be fully realized.

3.9.2 ENTER PRIZE


We refer to the ‘Network of Things’ within a work environment as
an enter prize- based application. Information collected from such networks
are used only by the owners and the data may be released selectively.
Environmental monitoring is the first common application which is
implemented to keep track of the number of occupants and manage the
utilities within the building (e.g., HVAC, lighting).

Sensors have always been an integral part of the factory setup for
security, automation, climate control, etc. This will eventually be replaced
by a wireless system giving the flexibility to make changes to the setup
whenever required. This is nothing but an IoT subnet dedicated to factory
maintenance.

One of the major IoT application areas that is already drawing


attention is Smart Environment IoT. There are several test beds being
implemented and many more planned in the coming years. Smart
environment includes subsystems and the characteristics from a
technological perspective.

These applications are grouped according to their impact areas.


This includes the effect on citizens considering health and well-being
issues; transport in light of its impact on mobility, productivity, pollution;
and services in terms of critical community services managed and provided
by local government to city inhabitants.

3.9.3 Utilities
The information from the networks in this application domain is
usually for service optimization rather than consumer consumption. It is
already being used by utility companies (smart meter by electricity supply
companies) for resource management in order to optimize cost vs. profit.
These are made up of very extensive networks (usually laid out by large
organization on a regional and national scale) for monitoring critical
utilities and efficient resource management. The backbone network used
can vary between cellular, Wi-Fi and satellite communication.

Smart grid and smart metering are another potential IOT application
which is being implemented around the world. Efficient energy
consumption can be achieved by continuously monitoring every electricity
point within a house and using this information to modify the way
electricity is consumed. This information at the city scale is used for
maintaining the load balance within the grid ensuring high quality of
service.

Video based IOT, which integrates image processing, computer


vision and networking frameworks, will help develop a new challenging
scientific research area at the intersection of video, infrared, microphone
and network technologies. Surveillance, the most widely used camera
network applications, helps track targets, identify suspicious activities,
detect left luggage and monitor unauthorized access.

Water network monitoring and quality assurance of drinking water is


another critical application that is being addressed using IOT. Sensors
measuring critical water parameters are installed at important locations in
order to ensure high supply quality. This avoids accidental contamination
among storm water drains, drinking water and sewage disposal. The same
network can be extended to monitor irrigation in agricultural land. The
network is also extended for monitoring soil parameters which allows
informed decision-making concerning agriculture.

3.9.4 MOBILE:
Smart transportation and smart logistics are placed in a separate
domain due to the nature of data sharing and backbone implementation
required. Urban traffic is the main contributor to traffic noise pollution and
a major contributor to urban air quality degradation and greenhouse gas
emissions. Traffic congestion directly imposes significant costs on
economic and social activities in most cities. Supply chain efficiencies and
productivity, including just-in-time operations, are severely impacted by
this congestion causing freight delays and delivery schedule failures.
Dynamic traffic information will affect freight movement, allow better
planning and improved scheduling. The transport IoT will enable the use of
large scale WSNs for online monitoring of travel times, origin– destination
(O–D) route choice behavior, queue lengths and air pollutant and noise
emissions. The IoT is likely to replace the traffic information provided by
the existing sensor networks of inductive loop vehicle detectors employed
at the intersections of existing traffic control systems. They will also
underpin the development of scenario-based models for the planning and
design of mitigation and alleviation plans, as well as improved algorithms
for urban traffic control, including multi-objective control systems.
Combined with information gathered from the urban traffic control system,
valid and relevant information on traffic conditions can be presented to
travelers. The prevalence of Bluetooth technology (BT) devices reflects the
current IoT penetration in a number of digital products such as mobile
phones, car hands-free sets, navigation systems, etc. BT devices emit
signals with a unique Media Access Identification (MAC-ID) number that
can be read by BT sensors within the coverage area.

Readers placed at different locations can be used to identify the movement


of the devices. Complemented by other data sources such as traffic signals,
or bus GPS, research problems that can be addressed include vehicle travel
time on motorways and arterial streets, dynamic (time dependent) O–D
matrices on the network, identification of critical intersections, and accurate
and reliable real time transport network state information. There are many
privacy concerns by such usages and digital forgetting is an emerging
domain of research in IoT where privacy is a concern. Another important
application in mobile IoT domain is efficient logistics management. This
includes monitoring the items being transported as well as efficient
transportation planning. The monitoring of items is carried out more
locally, say, within a truck replicating enterprize domain but transport
planning is carried out using a large scale IoT network.
3.9.5 CLOUD CENTRIC INTERNET OF THINGS
The vision of IoT can be seen from two perspectives— ‘Internet’
centric and ‘Thing’ centric. The Internet centric architecture will involve
internet services being the main focus while data is contributed by the
objects. In the object centric architecture, the smart objects take the center
stage.

In order to realize the full potential of cloud computing as well as


ubiquitous sensing, a combined framework with a cloud at the center seems
to be most viable. This not only gives the flexibility of dividing associated
costs in the most logical manner but is also highly scalable. Sensing service
providers can join the network and offer their data using a storage cloud;
analytic tool developers can provide their software tools; artificial
intelligence experts can provide their data mining and machine learning
tools useful in converting information to knowledge and finally computer
graphics designers can offer a variety of visualization tools. Cloud
computing can offer these services as Infrastructures, Platforms or Software
where the full potential of human creativity can be tapped using them as
services.

The new IoT application specific framework should be able to provide


support for:

a) Reading data streams either from sensors directly or fetch the data
from databases.
b) Easy expression of data analysis logic as functions/operators that
process data streams in a transparent and scalable manner on Cloud
infrastructures
c) If any events of interest are detected, outcomes should be passed to
output streams, which are connected to a visualization program.
Using such a framework, the developer of IoT applications will able
to harness the power of Cloud computing without knowing low-
level details of creating reliable and scale applications.
3.9.6 BENEFITS OF INTERNET OF THINGS

 Improved citizen's quality of life

Healthcare from anywhere

Better safety, security and productivity

 New business opportunities

IoT can be used in every vertical for improving the efficiency

Creates new businesses, and new and better jobs

 Economic growth

Billions of dollars in savings and new services

 Better environment

Saves natural resources and trees

Helps in creating a smart, greener and sustainable planet

 Improved competitiveness

Competitive in providing cutting edge products/services

3.10 INTERNET OF THINGS IN 2016

3.10.1 SMARTWATCHES

Smartwatches broke new ground last year, with the popularity of the
devices like the pebble and the Galaxy Gear. More mart watches making
their way in the market with better and at the feasible prices. With apple’s
long-anticipated but expected announcement of the iWatch, as the company
has been ramping up its sapphire glass production and flexible, wearable
watch like patents.

Industry Innovators: Pebble, Meta watch, Samsung Galaxy Gear

3.10.2 THE AUTOMATED HOME


Popular devices like Google’s Nest Smart Thermostat and WeMo’s
electrical outlet controller gained in popularity last year. Since then,
numerous home automation IoT technologies have flourished- everything
from smart locks to Wi-Fi enabled light bulbs.

Industry Innovators: Nest, Lockitron, Lifx

3.10.3 FITNESS AND HEALTH TRACKING


Last year, health and fitness devices like Nike Fuel band and
Jawbone Up were among the most popular IoT gadgets, making large
appearance at CES.

Industry Innovators: Fitbit, Nike, Jawbone

3.10.4 CONNECTED RETAIL


Traditional retailer store is struggling to keep up with the growing e-
commerce. Thanks to the Internet Of Things, innovators have started to
breathe new life into the retail experience- offering connected point of sale
systems, NFC payments solutions and supply chain software’s.

Industry Innovators: Shop keep, Cisco, Place meter

3.10.5 VIRTUAL AUGMENTED REALITY


Last year Oculus Rift and Google glass made headline in both the
virtual and augmented Reality worlds. Oculus was acquired by Facebook
for $2.3 Billion earlier this year and Google glass recently rolled out a one-
day sale of its “Explorer Edition”.

Industry Innovators: Oculus, Google Glass, Sony

3.11 OPEN CHALLENGES AND FUTURE


DIRECTIONS

The proposed Cloud centric vision comprises a flexible and open


architecture that is user centric and enables different players to interact in
the IoT framework. It allows interaction in a manner suitable for their own
requirements, rather than the IoT being thrust upon them. In this way, the
framework includes provisions to meet different requirements for data
ownership, security, privacy, and sharing of information.
Some open challenges are discussed based on the IoT elements presented
earlier. The challenges include IoT specific challenges such as privacy,
participatory sensing, data analytics, GIS based visualization and Cloud
computing apart from the standard WSN challenges including
architecture, energy efficiency, security, protocols, and Quality of Service.

3.11.1 ARCHITECTURE
Overall architecture followed at the initial stages of IoT research
will have a severe bearing on the field itself and needs to be investigated.
Most of the works relating to IoT architecture have been from the wireless
sensor networks perspective.

European Union projects of SENSEI and Internet of Things- Architecture


(IoT-A) have been addressing the challenges particularly from the WSN
perspective and have been very successful in defining the architecture for
different applications.

3.11.2 ENERGY EFFICIENT SENSING


Efficient heterogeneous sensing of the urban environment needs to
simultaneously meet competing demands of multiple sensing modalities.
This has implications on network traffic, data storage, and energy
utilization. Importantly, this encompasses both fixed and mobile sensing
infrastructure as well as continuous and random sampling. A generalized
framework is required for data collection and modeling that effectively
exploits spatial and temporal characteristics of the data, both in the sensing
domain as well as the associated transform domains.

3.11.3 SECURE REPROGRAMMABLE NETWORKS


AND PRIVACY
Security will be a major concern wherever networks are deployed at
large scale. There can be many ways the system could be attacked—
disabling the network availability; pushing erroneous data into the network;
accessing personal information; etc.

The three physical components of IoT—RFID, WSN and cloud are


vulnerable to such attacks. Security is critical to any network and the first
line of defense against data corruption is cryptography.

Of the three, RFID (particularly passive) seems to be the most


vulnerable as it allows person tracking as well as the objects and no high-
level intelligence can be enabled on these devices. These complex problems
however have solutions that can be provided using cryptographic methods
and deserve more research before they are widely accepted.

Against outsider attackers, encryption ensures data confidentiality, whereas


message authentication codes ensure data integrity and authenticity.
Encryption, however, does not protect against insider malicious attacks,
to address which non cryptographic means are needed, particularly in
WSNs. Also, periodically, new sensor applications need to be installed, or
existing ones need to be updated. This is done by remote wireless
reprogramming of all nodes in the network. Traditional network
reprogramming consists solely of a data dissemination protocol that
distributes code to all the nodes in the network without authentication,
which is a security threat. A secure reprogramming protocol allows the
nodes to authenticate every code update and prevent malicious installation.
Most such protocols are based on the benchmark protocol Deluge. We need
cryptographic add-ons to Deluge, which lays the foundation for more
sophisticated algorithms to be developed. Security in the cloud is another
important area of research which will need more attention. Along with the
presence of the data and tools, cloud also handles economics of IoT which
will make it a bigger threat from attackers. Security and identity protection
becomes critical in hybrid clouds where private as well as public clouds
will be used by businesses. Remembering forever in the context of IoT
raises many privacy issues as the data collected can be used in positive (for
advertisement services) and negative ways (for defamation). Digital
forgetting could emerge as one of the key areas of research to address the
concerns and the development of an appropriate framework to protect
personal data.

3.11.4 QUALITY OF SERVICE


Heterogeneous networks are (by default) multi-service; providing
more than one distinct application or service. This implies not only multiple
traffic types within the network, but also the ability of a single network to
support all applications without QoS compromise. There are two
application classes: throughput and delay tolerant elastic traffic of (e.g.,
monitoring weather parameters at low sampling rates), and the bandwidth
and delay sensitive inelastic (real-time) traffic (e.g., noise or traffic
monitoring), which can be further discriminated by data-related applications
(e.g., high-vs.-low resolution videos) with different QoS requirements.
Therefore, a controlled, optimal approach to serve different network
traffics, each with its own application QoS needs is required. It is not easy
to provide QoS guarantees in wireless networks, as segments often
constitute ‘gaps’ in resource guarantee due to resource allocation and
management ability constraints in shared wireless media. Quality of Service
in Cloud computing is another major research area which will require more
and more attention as the data and tools become available on clouds.
Dynamic scheduling and resource allocation algorithms based on particle
swarm optimization are being developed. For high-capacity applications
and as IoT grows, this could become a bottleneck.

3.11.5 NEW PROTOCOLS


The protocols at the sensing end of IoT will play a key role in
complete realization. They form the backbone for the data tunnel between
sensors and the outer world. For the system to work efficiently, an energy
efficient MAC protocol and appropriate routing protocol are critical.
Several MAC protocols have been proposed for various domains with
TDMA (collision free), CSMA (low traffic efficiency) and FDMA
(collision free but requires additional circuitry in nodes) schemes available
to the user. None of them are accepted as a standard and with more ‘things’
available this scenario is going to get more cluttered, which requires further
research. An individual sensor can drop out for a number of reasons, so the
network must be self-adapting and allow for multi-path routing. Multi-hop
routing protocols are used in mobile ad hoc networks and terrestrial WSNs.
They are mainly divided into three categories—data centric, location based
and hierarchical, again based on different application domains. Energy is
the main consideration for the existing routing protocols. In the case of IoT,
it should be noted that a backbone will be available and the number of hops
in the multi- hop scenario will be limited. In such a scenario, the existing
routing protocols should suffice in practical implementation with minor
modifications.

3.11.6 CLOUD COMPUTING


Integrated IoT and Cloud computing applications enabling the
creation of smart environments such as Smart Cities need to be able to:

a) Combine services offered by multiple stakeholders


b) Scale to support a large number of users in a reliable and
decentralized manner.

They need to be able operate in both wired and wireless network


environments and deal with constraints such as access devices or data
sources with limited power and unreliable connectivity.

The Cloud application platforms need to be enhanced to support:

a) The rapid creation of applications by providing domain specific


programming tools and environments.
b) Seamless execution of applications harnessing capabilities of
multiple dynamic and heterogeneous resources to meet quality of
service requirements of diverse users.
CHAPTER 4

HARDWARE COMPONENTS
HARDWARE COMPONENTS ARE

 Power Supply
 Arduino Mega
 Temperature Sensor
 SPO2 Sensor
 ECG Sensor
 Switch
 RTC
 Wi-Fi Module
 LCD
 Buzzer

4.1 POWER SUPPLY

In this project we have power supplies with +5V & -5V option
normally +5V is enough for total circuit. Another (-5V) supply is used in
case of OP amp circuit.

Transformer primary side has 230/50HZ AC voltage whereas at the


secondary winding the voltage is step downed to 12/50 Hz and this voltage
is rectified using two full wave rectifiers the rectified output is given to a
filter circuit to fitter the unwanted ac in the signal. After that the output is
again applied to a regulator LM7805 (toprovide+5v) regulator.
WhereasLM7905 is for providing –5Vregulation. Z (+12V circuit is used
for stepper motors, Fanand Relay by using LM7812 regulator same process
like above supplies).

Fig 4.1 RPS

TRANSFORMER

Transformers are used to convert electricity from one voltage to


another with minimal loss of power. They only work with AC (alternating
current) because they require a changing magnetic field to be created in
their core. Transformers can increase voltage (step-up) as well as reduce
voltage (step-down).

Alternating current flowing in the primary (input) coil creates a


continually changing magnetic field in them on core. This field also passes
through the secondary (output) coil and the changing strength of the
magnetic field induces an alternating voltage in the secondary coil. If the
secondary coils connected to a load the induced voltage will make an
induced current flow. The correct term for the induced voltage is ‘induced
electromotive force’ which is usually abbreviated to induced e.m.f.

RECTIFIERS

The purpose of a rectifier is to convert an AC wave form into a DC


wave form (OR) Rectifier converts AC current or voltages into DC current
or voltage. There are two different rectification circuits, known as 'half-
wave' and 'full-wave' rectifiers. Both use components called diodes to
convert AC into DC.

FILTERS

A filter circuit is a device which removes the ac component of


rectifier output but allows the dc component to the load. The most
commonly used filter circuits are capacitor filter, choke input filter and
capacitor input filter or pi-filter. We used capacitor filter here.

The capacitor filter circuit is extremely popular because of its low


cost, small size, little weight and good characteristics. For small load
currents this type of filter is preferred. It is commonly used in transistor
radio battery eliminators.

Rectifier O/P C RL

Fig 4.2 Capacitor

4.2 ARDUINO MEGA


The Arduino Mega 2560 is a microcontroller board based on the
ATmega2560 (datasheet). It has 54 digital input/output pins (of which 14
can be used as PWM outputs), 16 analog inputs, 4 UARTs (hardware serial
ports), a 16 MHz crystal oscillator, a USB connection, a power jack, an
ICSP header, and a reset button. It contains everything needed to support
the microcontroller; simply connect it to a computer with a USB cable or
power it with a AC-to-DC adapter or battery to get started. The Mega is
compatible with most shields designed for the Arduino Duemilanove or
Diecimila.

The Mega 2560 is an update to the Arduino Mega, which it replaces.

Fig 4.3 Arduino Mega

SUMMARY

 Microcontroller ATmega2560
 Operating Voltage 5V
 Input Voltage (recommended) 7-12V
 Input Voltage (limits) 6-20V
 Digital I/O Pins 54 (of which 14 provide PWM output)
 Analog Input Pins 16
 DC Current per I/O Pin 40 mA
 DC Current for 3.3V Pin 50 mA
 Flash Memory 256 KB of which 8 KB used by bootloader
 SRAM 8 KB
 EEPROM 4 KB
 Clock Speed 16 MHz

POWER

The Arduino Mega can be powered via the USB connection or with an
external power supply. The power source is selected automatically. External
(non-USB) power can come either from an AC-to-DC adapter (wall-wart)
or battery. The adapter can be connected by plugging a 2.1mm center-
positive plug into the board's power jack. Leads from a battery can be
inserted in the Gnd and Vin pin headers of the POWER connector.

The board can operate on an external supply of 6 to 20 volts. If supplied


with less than 7V, however, the 5V pin may supply less than five volts and
the board may be unstable. If using more than 12V, the voltage regulator
may overheat and damage the board. The recommended range is 7 to 12
volts.

The Mega2560 differs from all preceding boards in that it does not use
the FTDI USB-to-serial driver chip. Instead, it features the ATmega16U2
(ATmega8U2 in the revision 1 and revision 2 boards) programmed as a
USB-to-serial converter.

The power pins are as follows:

VIN: The input voltage to the Arduino board when it's using an external
power source (as opposed to 5 volts from the USB connection or other
regulated power source). You can supply voltage through this pin, or, if
supplying voltage via the power jack, access it through this pin.
5V: The regulated power supply used to power the microcontroller and
other components on the board. This can come either from VIN via an on-
board regulator, or be supplied by USB or another regulated 5V supply.

3V3: A 3.3-volt supply generated by the on-board regulator. Maximum


current draw is 50 mA.

GND: Ground pins.

MEMORY

The ATmega2560 has 256 KB of flash memory for storing code (of
which 8 KB is used for the bootloader), 8 KB of SRAM and 4 KB of
EEPROM (which can be read and written with the EEPROM library).

INPUT AND OUTPUT

Each of the 54 digital pins on the Mega can be used as an input or


output, using pin Mode (), digital Write (), and digital Read () functions.
They operate at 5 volts. Each pin can provide or receive a maximum of 40
mA and has an internal pull-up resistor (disconnected by default) of 20- 50
k Ohms. In addition, some pins have specialized functions:

 Serial: 0 (RX) and 1 (TX); Serial 1: 19 (RX) and 18 (TX); Serial


2: 17 (RX) and 16 (TX); Serial 3: 15 (RX) and 14 (TX).
Used to receive (RX) and transmit (TX) TTL serial data. Pins 0 and
1 are also connected to the corresponding pins of the ATmega16U2
USB-to-TTL Serial chip.
 External Interrupts: 2 (interrupt 0), 3 (interrupt 1), 18
(interrupt 5), 19 (interrupt 4), 20 (interrupt 3), and 21 (interrupt
2).
These pins can be configured to trigger an interrupt on a low value,
a rising or falling edge, or a change in value. See the attach Interrupt
() function for details.
 PWM: 0 to 13
Provide 8-bit PWM output with the analog Write () function.
 SPI: 50 (MISO), 51 (MOSI), 52 (SCK), 53 (SS).
These pins support SPI communication using the SPI library. The
SPI pins are also broken out on the ICSP header, which is physically
compatible with the Uno, Duemilanove and Diecimila.
 LED: 13.
There is a built-in LED connected to digital pin 13. When the pin is
HIGH value, the LED is on, when the pin is LOW, it's off.
 TWI: 20 (SDA) and 21 (SCL).
Support TWI communication using the Wire library. Note that these
pins are not in the same location as the TWI pins on the
Duemilanove or Diecimila.
The Mega2560 has 16 analog inputs, each of which provide 10 bits of
resolution (i.e. 1024 different values). By default, they measure from
ground to 5 volts, though is it possible to change the upper end of their
range using the AREF pin and analog Reference () function. There are a
couple of other pins on the board:
 AREF
Reference voltage for the analog inputs. Used with analog
Reference ().
 Reset
Bring this line LOW to reset the microcontroller. Typically used to
add a reset button to shields which block the one on the board.

COMMUNICATION
The Arduino Mega2560 has a number of facilities for communicating with
a computer, another Arduino, or other microcontrollers. The ATmega2560
provides four hardware UARTs for TTL (5V) serial communication. An
ATmega16U2 (ATmega 8U2 on the revision 1 and revision 2 boards) on
the board channels one of these over USB and provides a virtual com port
to software on the computer (Windows machines will need a .inf file, but
OSX and Linux machines will recognize the board as a COM port
automatically. The Arduino software includes a serial monitor which allows
simple textual data to be sent to and from the board. The RX and TX LEDs
on the board will flash when data is being transmitted via the
ATmega8U2/ATmega16U2 chip and USB connection to the computer (but
not for serial communication on pins 0 and 1). A Software Serial library
allows for serial communication on any of the Mega2560's digital pins. The
ATmega2560 also supports TWI and SPI communication. The Arduino
software includes a Wire library to simplify use of the TWI bus; see the
documentation for details. For SPI communication, use the SPI library.

4.3 TEMPERATURE SENSOR

 LM35 is a temperature measuring device having an analog output


voltage proportional to the temperature.
 It provides output voltage in Centigrade (Celsius). It does not
require any external calibration circuitry.
 The sensitivity of LM35 is 10 mV/degree Celsius. As temperature
increases, output voltage also increases.
 E.g. 250 mV means 25°C.

 It is a 3-terminal sensor used to measure surrounding temperature


ranging from -55 °C to 150 °C.
 LM35 gives temperature output which is more precise than
thermistor output.

Fig 4.4 Temperature Sensor

VCC: Supply Voltage (4V – 30V)


Out: It gives analog output voltage which is proportional to the temperature
(in degree Celsius).

GND: Ground

SPECIFICATIONS

 Operating Voltage: 4 V to 30 V
 Output Voltage: 10mV/°C
 Sensitivity: 10mV/°C
 Linearity Error: ±1°C (for 0°C to +100°C)
 Operating Temperature: -55°C to +150°C
 Output Impedance: 100 Ω
 Power Consumption: 60 μA (typical)
 Package Type: TO-92, TO-220, SOIC
 Output Type: Analog
 Accuracy: ±1°C (typical)

4.4 SPO2 SENSOR


A SPO2 sensor is a device that helps us to detect the heart rate of a
person. It helps a person to get the heart rate checked up and thus helps us
to monitor the heartbeat. It is mainly a heartbeat sensor framework that is
connected with the database and there is also an emergency system that is
associated with any hospital management. Said device also, can store the
data of patients as well.
Fig 4.5 Heartbeat Sensor

WORK PROCEDURE

To process the work at the very beginning it is needed to scan the QR


code from the Arduino Uno device which is the IP address of the device and
then the database checks the patient’s identity (patient’s ID is valid or not).
So, it is evident that every Arduino Uno has individual IP addresses by
which the database traces individual patient's information. A wireless sensor
network is used for this type of sensor which is linked to the database
remotely from anywhere. That is why tracking every IP address in a sensor
is highly important.

When the database detects the patient’s ID validity then it gives the login
page. It can get now access anywhere from both mobile or web applications
and all the information obtained from the patient through the sensor will be
stored securely in the hospital database. The saved database then sends a
confirmation text to the patient’s device that the sensor starts running
successfully.

For this procedure, the database measures the patient’s actual physical
condition from the beginning. The sensor reads the data and compares it
with the medical history of the patient which is stored immediately in the
database system. Then by using a wireless sensor network the database
communicates with the master device remotely.
4.5 ECG SENSOR

ECG Monitor Sensor Module is based on AD8232 Analog Device IC. This
is a cost-effective ECG Sensor used to measure the electrical activity of the
heart. This electrical activity can be charted as an ECG or
Electrocardiogram and output as an analog reading. ECGs can be extremely
noisy, out AD8232 Single Lead Heart Rate Monitor acts as an op amp to
help obtain a clear signal. This sensor can be connected to an
Arduino/Raspberry Pi, etc. Sample codes are easily available on the
internet.

Fig 4.6 ECG Sensor

The AD8232 is an integrated signal conditioning block for ECG and other
biopotential measurement applications. It is designed to extract, amplify,
and filter small biopotential signals in the presence of noisy conditions,
such as those created by motion or remote electrode placement.

The AD8232 module breaks out nine connections from the IC that you can
solder pins, wires, or other connectors to. SDN, LO+, LO-, OUTPUT, 3.3V,
GND provide essential pins for operating this monitor with an Arduino or
other development board. Also provided on this board are RA (Right Arm),
LA (Left Arm), and RL (Right Leg) pins to attach and use your own custom
sensors. Additionally, there is an LED indicator light that will pulsate to the
rhythm of a heart beat.
FEATURES

 Operating Voltage - 3.3V

 Analog Output

 Leads-Off Detection

 Shutdown Pin

 LED Indicator

 3.5mm Jack for Biomedical Pad Connection or Use 3 pin header

4.6 SWITCHES

Switches are the buttons given as input to the microcontroller. It has


two pins. One of the pins is connected to the data pin in the
microcontroller. Another pin of the switch is connected to the ground of
the Arduino Mega microcontroller. It is just like input.

Fig 4.7 Switch

4.7 RTC

RTC module detects a voltage drop of the main power supply and
automatically switches to a backup power supply for operation. while the
MOS switch suppresses leakage current and voltage drops, enabling
efficient power management of the entire system compared to diode OR
circuits.

Fig 4.8 RTC

SPECIFICATIONS

 Operating Voltage: 2.3 – 5.5 Volts.


 Operating Temperature: -45 – 800C.
 Maximum Voltage: VCC+0.3 Volts.
 Battery Backup Current: 500 mA.
 Accuracy at -40 – 800C: ±3.5 ppm.
 Accuracy at 0 – 400C: ± 2.0 ppm.
 Temperature Accuracy: 30C.
 Package-Type: 16, 300-mil SO package

ADVANTAGES

 Low power consumption (important when running from alternate


power)
 Frees the main system for time-critical tasks.
 Sometimes more accurate than other methods.

4.8 WI-FI MODULE

ESP-01 Wi-Fi module is developed by Ai-thinker Team. Core processor


ESP8266 in smaller sizes of the module encapsulates Tensilica L106
integrates industry-leading ultra-low power 32-bit MCU micro, with the 16-
bit short mode, Clock speed support 80 MHz, 160 MHz, supports the
RTOS, integrated Wi-Fi MAC/BB/RF/PA/LNA, on-board antenna.

The module supports standard IEEE802.11 b/g/n agreement, complete


TCP/IP protocol stack. Users can use the add modules to an existing device
networking, or building a separate network controller.

ESP8266 is high integration wireless SOCs, designed for space and


power constrained mobile platform designer. It provides unsurpassed ability
to embed Wi-Fi capabilities within other systems, or to function as a
standalone application, with the lowest cost, and minimal space
requirement.

Fig 4.9 Wi -Fi Module


FEATURES

 802.11 b/g/n
 Integrated low power 32-bit MCU
 Integrated 10-bit ADC
 Integrated TCP/IP protocol stack
 Integrated TR switch, balun, LNA, power amplifier and matching
network
 Integrated PLL, regulators, and power management units
 Supports antenna diversity
 Wi-Fi 2.4 GHz, support WPA/WPA2
 Support STA/AP/STA+AP operation modes
 Support Smart Link Function for both Android and iOS devices
 Support Smart Link Function for both Android and iOS devices
 SDIO 2.0, (H) SPI, UART, I2C, I2S, IRDA, PWM, GPIO
 STBC, 1x1 MIMO, 2x1 MIMO
 A-MPDU & A-MSDU aggregation and 0.4s guard interval
 Deep sleep power < 5Ua
 Wake up and transmit packets in < 2ms
 Standby power consumption of < 1.0mW (DTIM3)
 +20dBm output power in 802.11b mode.
 Operating temperature range -40C ~ 125C

4.9 LCD DISPLAY

LCD (liquid crystal display) is the technology used for displays in


notebook and other smaller computers. Like light-emitting diode ( LED) and
gas-plasma technologies, LCDs allow displays to be much thinner than
cathode ray tube (CRT) technology. LCDs consume much less power than
LED and gas-display displays because they work on the principle of
blocking light rather than emitting it.
Fig 4.10 Liquid Crystal Display

FEATURES

 E-blocks compatible
 Low cost
 Compatible with most I/O ports in the E-Block range (requires 5 I/O
lines via 9-way D-type connector)
 Ease to develop programming code using Flow code icons
Fundamentals of Liquid Crystal Displays
The term liquid crystal is used to describe a substance in a state
between liquid and solid but which exhibits the properties of both.
Molecules in liquid crystals tend to arrange themselves until they all point
in the same specific direction. This arrangement of molecules enables the
medium to flow as a liquid. Depending on the temperature and particular
nature of a substance, liquid crystals can exist in one of several distinct
phases. Liquid crystals in a nematic phase, in which there is no spatial
ordering of the molecules, for example, are used in LCD technology.

One important feature of liquid crystals is the fact that an electrical


current affects them. A particular sort of nematic liquid crystal, called
twisted nematics (TN), is naturally twisted. Applying an electric current to
these liquid crystals will untwist them to varying degrees, depending on the
current's voltage. LCDs use these liquid crystals because they react
predictably to electric current in such a way as to control the passage of
light.
The working of a simple LCD is shown in Figure 1. It has a mirror (A)
in back, which makes it reflective. There is a piece of glass (B) with a
polarizing film on the bottom side, and a common electrode plane (C) made
of indium-tin oxide on top. A common electrode plane covers the entire
area of the LCD. Above that is the layer of liquid crystal substance (D).
Next comes another piece of glass (E) with an electrode in the shape of the
rectangle on the bottom and, on top, another polarizing film (F), at a right
angle to the first one.

4.10 BUZZERS

Buzzer is usually like an alarm. Whenever we press the switch


button it gives an output like an alarm sound and then activates the
machine. Buzzer contains of two pins. The negative end is connected to the
data pin of microcontroller. The positive end is connected to the Vcc in the
microcontroller.
Fig 4.11 Buzzer
CHAPTER 5

SOFTWARE COMPONENTS

5.1 ARDUINO SOFTWARE


5.1.1 PROGRAMMING

Step 1: Installing the Firmware

In Node MCU Boards the first thing you need is to install the Firmware
to the board the following method works for all Node MCU Boards

1. Open the Node MCU flasher master folder than open the
win32/win64 folder as your computer. Now open the folder Release than
double click ESP8266Flasher.

2. Select the COM Port.

3. Go to configure tab.

4. Click on the small gear and open up the firmware which you have
downloaded.

5. Go to the advanced tab and select the desired Baud rate.


6. Go to the Operation tab and click on Flash Button. Add Tip Ask

Question Comment Download

Step 2: Preparing the Arduino IDE

After installing the firmware you are ready to do the programming with
the ESP8266

1. Install the Arduino IDE

2. Open the Arduino IDE from the desktop icon

3. Click on File tab and than open preferences

4. In the additional Boards Manager URLs add the following link

(http://arduino.esp8266.com/stable/package_esp8266com_index.json)
OK

5. Go to Tools>Borads>Boards Manager

6. In the search field type esp8266 click the esp8266 by ESP8266


Community option and click Install

Step 3: Code...
Now we can do whatever you want with your Node MCU board
Following is an example for led blinking with Node MCU board via web
server
 In arduino IDE go to tools>Boards>select NODEMCU 1.0
(ESP - 12E Module)
 Again go to tools and select port.
 Change the Wi-Fi name and password from the following code.
 Now click on Upload button to upload the following code.
 Connect the led's positive leg on D9 pin of board and negative to
the ground of the code.
 Power up the board and open the serial monitor from arduino IDE
 After connecting to the Wi-Fi it will show you the IP address.
 Type that IP address on the web browser (Edge, Chrome,
Firefox etc.,)
 A webpage will open you can change the status of LED by
turning it ON or OFF.

5.1.2 COPY, PASTE AND UPLOAD THE TUTORIAL


SKETCH
The sketch is one that comes as an example from ESP8266.COM.
Serial Communication between Node MCU and Arduino

5.1.3 PROJECTS AND APPLICATIONS


Node MCU V3 is mainly used in the Wi-Fi Applications which
most of the other embedded modules fail to process unless incorporated
with some external Wi-Fi protocol. Following are some major applications
used for Node MCU V3.
 Internet Smoked Alarm
 VR Tracker
 Octopod
 Serial Port Monitor
 ESP Lamp
 Incubator Controller
 IoT home automation
 Security Alarms

Application Example:

Node MCU ESP-12E Arduino IDE Digital Input Tutorial

5.1.4 CONNECT THE CIRCUIT


You may wish to power your Node MCU another way. You can
read about it HERE.
5.1.5 COPY, PASTE AND UPLOAD THE CODE
The code is real simple works as follows:

The input is read from switch pin. If switch is closed, it will read a low.

The LED output pin is set to the opposite of the switch pin. If the switch
is closed, the output pin will be set to a high. A high will turn on the LED.
5.2PROTEUS

5.2.1 INTRODUCTION:

Generally, we are listening the words PCB’s, PCB layout, PCB


designing, etc. But what is PCB? Why we are using this PCB? We want to
know about all these things as an electronic engineer. PCB means Printed
Circuit Board. This is a circuit board with printed copper layout
connections. These PCBs are two types. One is dotted PCB and another
one is layout PCB. The two examples are shown in below.

Fig 4.1 Dotted PCB and Layout PCB

What is the main difference between the dotted PCB and layout PCB?

In dotted PCB board only, dots are available. According to our


requirement we can place or insert the components in those holes and
attach the components with wires and soldering lid. In this dotted PCB we
can make the circuit as out wish but it is very hard to design. There are so
many difficulties are there. Those are connecting the proper pins, avoiding
shot connections and etc. Coming to the layout PCB this is simple to
design. First, we select the our circuit and by using different PCB
designing software’s, design the layout of the circuit and by itching process
preparing the copper layout of our circuit and solder the components in the
correct places. It is simple to design, take less time to design, no shortages,
looking nice and perfect.

Up to now we have discussed about types of PCB’s and difference


between the types. Now we can discuss about PCB designing software.
There are so many PCB designing software’s available. Some are
Express PCB, eagle PCB, PCB Elegance, free PCB, open circuit
design, zenith PCB and Proteus etc. Apart from remaining Proteus is
different. Proteus is design suit and PCB layout designing software. In
Proteus we can design any circuit and simulate the circuit and make PCB
layout for that circuit.

5.2.2 Introduction to Proteus:

Proteus professional is a software combination of ISIS schematic


capture program and ARES PCB layout program. This is a powerful and
integrated development environment. Tools in this suit are very easy to use
and these tools are very useful in education and professional PCB
designing.

As professional PCB designing software with integrated space


based auto router, it the curser at the component pin end then draw the
connections with that pen symbol. Connect all the components according to
circuit then that designed circuit is show in below image.
If any modifications want to do to the component place the mouse
point and click on right button then option window will open. That is
shown in below figure.

After completion of designing save with some mane and debug it.
This is virtual simulation means without making circuit we can see the
result in virtually through this software and we can design the PCB layout
to our required circuit with this software.
5.3MIT APP INVENTER

This step-by-step picture tutorial will guide you through making a


talking app.

To get started, go to App Inventor on the web.

Go directly to ai2.appinventor.mit.edu, or click the orange "Create"


button from the App Inventor website.

Log in to App Inventor with a Gmail (or google) user name and
password.
Use an existing gmail account or school-based google account to log in
to ai2.appinventor.mit.edu

To set up a brand new Gmail account, go to accounts.google.com/Sign up


Click "Continue" to dismiss the splash screen.
Start a new project.

Name the project “TALKTOME” (no spaces!)

Type in the project name (underscores are allowed, spaces are not) and
click OK.

You are now in the Designer, where you lay out the "user interface" of your
app.
The Design Window or simply "Designer" is where you lay out
the look and feel of your app, and specify what functionalities it should
have. You choose things for the user interface things like Buttons, Images,
and Text boxes, and functionalities like Text-to-Speech, Sensors, and GPS.
Add a Button

Our project needs a button. Click and hold on the word "Button" in
the palette. Drag your mouse over to the Viewer. Drop the button and a
new button will appear on the Viewer.

Connect App Inventor to your phone for live testing


One of the neatest things about App Inventor is that you can see and
test your app while you're building it, on a connected device. If you have an
Android phone or tablet, follow the steps below. If you do not have a
device, then follow the instructions for setting up the on-screen emulator
(opens a new page) and then come back to this tutorial once you've gotten
the emulator connected to App Inventor.
Get the MIT AI2 Companion from the Play Store and install it on your
phone or tablet.

The preferred method for getting the AI2 Companion App is to


download the app from the Play Store by searching for "MIT AI2
Companion".
To download the AI2 Companion App to your device directly (SKIP THIS
STEP IF YOU already got the app from Play Store)

If for some reason you cannot connect to the Google Play store, you can
download the AI2 Companion as described here.
First, you will need to go into your phone's settings (#1), choose "Security",
then scroll down to allow "Unknown Sources", which allows apps that are
not from the Play Store to be installed on the phone.

Second, do one of the following:

A) Scan the QR code above(#2)or


B) Click the "Need help finding..." link and you'll be taken to the download
page. From there you can download the MITAI2Companion.apk file to
your computer and then move it over to your device to install it.

Start the AI Companion on your device

On your phone or tablet, click the icon for the MIT AI Companion to start
the app. NOTE: Your phone and computer must both be on the same
wireless network. Make sure your phones Wi-Fi is on and that you are
connected to the local wireless network. If you cannot connect over Wi-Fi,
go to the Setup Instructions on the App Inventor Website to find out how to
connect with a USB cable.

Get the Connection Code from App Inventor and scan or type it into
Companion app

On the Connect menu, choose "AI Companion". You can connect by:

1. Scanning the QR code by clicking "Scan QR code" (#1). Or


2. Typing the code into the text window and click "Connect with code" (#2).
See your app on the connected device

You will know that your connection is successful when you see your app on
the connected device. So far, our app only has a button, so that is what you
will see. As you add more to the project, you will see your app change on
your phone.
CHAPTER 6

RESULT AND DISCUSSION

PLACE THE KIT IMAGE AND WRITE THE REUSLT


CHAPTER 7

ADVANTAGES AND APPLICATIONS

7.1 ADVANTAGES

7.2 APPLICATIONS
CHAPTER 8

CONCLUSION AND FUTURE SCOPE

This design is very effective in monitoring an elder or disabled person’s


health continuously because it is fully automated. It can be tested very
easily with any person or human being help.

Developed system is very much flexible. System we have created operates


on only on the health, but our current state, we can add more health sensor
devices, where each sensor can be used provide health values. All it need is
more electronic sensor and modification.

 Nearly 8/10 of health care provider going to use IOT devices in their
institutions, organization.
 88% of facilities going to monitor their patients with IoT devices.
 91 % of organization of are planning on implementing IOT in their
facilities in their by 2023.
 Organizations, institutions fell that IOT as saved costs up to 78% of
their facilities. Also, Internet of Things (IoT) Healthcare market was
valued at USD 28.42 Billion in 2018 and is projected to reach USD
337.41 billion by 2035, growing at a CAGR of 28.2% over the
forecast period.
CHAPTER 9
REFERENCE

1) Z. Zhiao, Chnaowei, and z. Nakdahira, ``Healthcare application


based on Internet of Things,'' in Proc. IEET Int. ConfE. On
Technolgy. Application., Nov. 2013, pp. 661 662.
2) Kortoom.Y. Kaiseer, N. Fittop, and D.ramamoorthy, ``Canny
matters as construction brickss for application of Internet of
Things,'' IEE-E Interne Networks andtComput., vol. 17.
3) Z. Achmed and G. Miguel, “Assimilating Wireless Sensing Nets
with Cloud& Computing,” 2010 SixtthInnt.Confe.Mobi.Ad-hocc
Sense. Netks, pp. 263–266, Oct. 2010.
4) D. InfanZnta and Hemalattha, “Augmenting Authorisation
Construction OF Safekeeping with zIG-bEE using RfiD,” Vol5,
No.4.
5) https://en.wikipedia.org/wiki/Passive_inIOT_inf rared_se nsor
6) http://ieeexplore.ieeesorg/document/7917920/ Heealthcare survey
including the networks and architecture.
7) http://continuum.ieee.orgi/techies-talking/telecomm/int/-
internetwork-of-things-IOT-fore-castof-60-billion-devices-by-2021-
is-new.
8) http://ieeexplore.ieeesorg/document/7917920/ Heealthcare survey
including the networks and architecture.
9) Rahaman A,Islam , Sadi M, Nooruddin S. Developing IoT based
smart health monitoring systems: a review.Rev Intell Artif.
10) K. Lee, M.-P Kwan, Physical activity classification in free-living
conditions using smartphone accelerometer data and exploration of
predicted results. Computers, Environment and Urban Systems. 67:,
124–131 (2018).
11) Riazul Islam SM, Kwak Daehan, Humaun Kabir M, Hossain M,
Kwak Kyung-Sup. The Internet of Things for health care: a
comprehensive survey.
12) M. deAlmeida Mendes, I.C.M daSilva, V.V Ramires, F.F Reichert,
R.C Martins, E. Tomasi, Calibration of raw accelerometer data to
measure physical activity: A systematic review. Gait Posture. 61:,
98–110 (2018).
13) Al-Ali AR, Zualkernan IA, Rashid M, Gupta R, Alikarar M. A
smart home energy management system using IoT and big data
analytics approach. IEEE Trans Consum Electron.
14) Ayon SI, Islam MM, Hossain MR. Coronary artery heart disease
prediction: a comparative study of computational intelligence
techniques. IETE J Res. 2020.
15) Secured Smart Healthcare Monitoring System Based on Iot,
International Journal on Recent and Innovation Trends in
Computing and Communication Volume: 3 Issue: 7,
Bhoomika.B.K, Dr. K N Muralidhara.
16) Real time wireless health monitoring application using mobile
devices, International Journal of Computer Networks &
Communications (IJCNC) Vol.7, No.3, May 2015, Amna Abdullah,
Asma Ismael, Aisha Rashid, Ali Abou-ElNour, and Mohammed
Tarique.

You might also like