Documentos de Académico
Documentos de Profesional
Documentos de Cultura
8_ServomotorControladoPorSerial.txt
/*
*/
int pushButton = 2;
void setup()
void loop()
//Declaración con inicialización de la variable auxiliar que representa el estado del boton.
}
/*
terminal de Arduino.
*/
void setup()
Serial.begin(9600); //Solo se especifican los baudios. Por defecto 8bits, sin paridad, 1 stop.
// argumento de la función:
void loop()
unsigned long time = 0; //Capacidad del entero más largo que representa el tiempo.
int sensorValue = analogRead(A0); //Variable declarada e inicializada, Pin A0 de canal analógico para sensor.
Serial.println(sensorValue); // serial.println incluye por defecto el salto de línea. No es necesario especificar el tipo de
dato.
time = millis(); //Retorna el tiempo en milisegundos desde que el Arduino arrancó. Existe riesgo de overflow cerca de
los 50 días.
}
/*
En este codigo se lee un único caracter de entrada por el puerto serie cuando está
En el ejemplo se presenta cómo se transmite una cadena constante de caracteres junto al dato leido en formato
decimal.
*/
void setup()
void loop()
}
/*
En este código se lee la salida de un sensor foto sensible configurado para una
entrada digital (pin A0) y se emite un zumbido acorde a la intensidad leida a travez de un
noTone().
*/
int fotoelectrico = 0;
void setup()
void loop()
// Escalamiento de la frecuencia Hz
tone(zumbador, tono); //Se emite un pwm al 50% con la frecuencia calculada por tono
}
/*
Código de ejemplo donde se lee una cadena de datos serial y se interpreta el comando recibido como una función
*/
void setup()
void loop()
String input=""; //Inicialización de la cadena que servirá para leer las tramas de entrada.
input += (char)Serial.read(); //Concatena el dato en la variable input, es importante el casting del tipo de dato a
caracter.
delay(5); // Hasta 5 milisegundos de espera para probar si hay aún datos en el buffer de entrada.
{
digitalWrite(led,HIGH); //Enciende el led
}
/*
En este código se utiliza una salida digital para controlar mediante pwm un motor de DC.
*/
void setup()
void loop()
analogWrite(motorDC, val / 4); // Escribe un PWM en el pin del motor con ciclo de trabajo dependiente de la lectura.
//Se divide por 4, dado que la lectura es a 10 bits (ma 1023), y el pwm es de 8 bits (max 255).
}
/*
En este código se controla un led RGB que permite establecer una tonalidad y especificada en sus componentes azul,
verde y roja.
El uso de pwm sujeto a la función analog write tiene una frecuencia constante de al rededor de 980 HZ.
*/
#define COMMON_ANODE
void setup()
pinMode(redPin,OUTPUT);
pinMode(greenPin,OUTPUT);
pinMode(bluePin,OUTPUT);
void loop() {
delay(1000);
delay(1000);
delay(1000);
delay(1000);
delay(1000);
delay(1000);
delay(1000);
//Función personalizada.
void setColor(int red, int green, int blue) //Establece el color en el led rgb.
#ifdef COMMON_ANODE //Esta operaciones tomaran efecto solo si se comento la línea en la cabecera. (#define
COMMON_ANODE)
red=255-red;
green=255-green;
blue=255-blue;
#endif
}
/*
Este codigo utiliza una recepción serial de cadenas de datos para controlar el paso de un servomotor.
Si recibe una letra D, entonces se moverá un paso de 10 grados aproximadamente a las derecha.
El ángulo nuevo es modificado y escrito en el pin del motor, cuando una trama es recibida correctamente.
*/
#include <Servo.h> //Incluisión del archivo de cabecera para poder controlar el servomotor.
int angle = 90; //Ángulo de giro, inicialmente a 90 grados lo que implica una posición neutra.
Servo servo; //Instancia del tipo Servo, necesaria para la llamada a las funciones de escritura de ángulos.
void setup()
void loop()
String input=""; //Inicializa la variabla que toma la cadena de datos para la recepción de datos.
delay(5); //Espera 5 milisegundos para probar si hay aún datos en la entrada serial.
{
if(angle>=0&&angle<=180) //Mientras el ángulo esta entre 0 y 180 grados.
else {angle=0;} //Si el paso llega al mínimo posible, lleva el servo a la posición derecha.
}
KEY ISSUES REGARDING DOMOTIC APPLICATIONS
Santiago Lorente
Telecommunication Engineering School, Universidad Politécnica de Madrid
Ciudad Universitaria, E-28040 Madrid, Spain
Phone: + 34-639-567-115;/ax: + 3491-336-73-20; e-mail: slorente@etsit.upm.es
Extended Abstract:
Domotics, in Latin languages, is a term meaning automation ofhouses. In English this is generally
referred to as "Smart House". In Spain, other ways of calling this is "Digital Home" or "Electronic
Home". It should be mentioned that in the literature, "home", "house" and "household" are used
alike. So far, Domotics has been approached predominantly, if not uniquely, as a technological
platform having to do with automatíon and control. The house was conceived of pretty much, using
the cybernetic analogy, as a machine whose goal was controlling it by way of various automatic
devices. Yet, the main contention of this paper lies in the fact that technological convergence
between Control and Automation Technologies, on the one side, and Information and
Communication Technologies, on the other, very interestingly contributes both to the enrichment of
the technological infrastructure of the home and to the benefits of its dwellers, which eventually
should be the main purpose oftechnological endeavour. That is to say, the state ofthe art in present
day technology provides easy avenues for adequately putting together electricity, electronics,
computer and telecommunícatíons in a single technological mix. Under this perspective, the
conceptual application scheme derived from an integral technological approach could be put
forward as follows:
Beds
Washing machine
Drier
Vacuum cleaner
Refrigerator
Daily (Tele)Tasks
Toaster
Díshwashíng machíne
Oven
Microwave Oven
Kitchen
- Any technology based on electricity, and especially on electronics, can be profitably be used.
- Thcsc tcchnologics encompass automation, control, information and communication. It is not
true that domotics are uniquely related to automation and control.
- Both broad and narrow band are useful for this purpose, depending on the application
requirement. The "only broadband" discourse should be downgraded.
- Both isolated products and overall systems are useful, too, for this purpose, depending on the
degree of "domotization" that is pursued. "Domotizing" a house is not an allhothing activity,
but rather a gradual one, and here economic considerations should be at stake.
- Both new and already built houses can be the target of domotics. Wireless technology emerges
as an answcr to installing domotic tcchnology in thc lattcr houscs.
The main social needs underlying the social demand are comfort, statudprestige, and security, and
these needs should be met, adapting technology to that end.
Markets that should most particularly be thought of as targets, following marketing research, should
be, firstly, those of highly mobile young couples with no children, who have clear needs of
controlling the house from the outside and of tcleservices that kcep them from additional
commuting, and secondly, the no mobile elderly and the handicapped, who have also clear needs of
controlling the house from the inside, together with teleservices that they can otherwise reach.
Among the main teleservices to be considered are those of tele-assistance, tele-information and
telebanking.
Abstract—This paper describes the communication stack of These two segments are coupled using PLC Bridges (we
the REMPLI system: a structure using power-lines and IP- write the terms Bridge, Node, and Access Point starting
based networks for communication, for data acquisition and with a capital letter, since these terms refer to the
control of energy distribution and consumption. It is components that are designed in the REMPLI project).
furthermore prepared to use alternative communication From the application point of view Bridges are transparent:
media like GSM or analog modem connections. The REMPLI
they forward data up- and downwards. Nodes, installed in
system provides communication service for existing
applications, namely automated meter reading, energy billing households (or any other energy consumption location),
and domotic applications. The communication stack, communicate directly to the local metering and SCADA
consisting of physical, network, transport, and application equipment. Another device, the Access Point, terminates
layer is described as well as the communication services communication over power line at the primary transformer
provided by the system. We show how the peculiarities of the station. The upper side of the Access Point is connected
power-line communication influence the design of the directly to the IP backbone. Application servers at the
communication stack, by introducing requirements to utilities communicate to Access Point(s), typically, in a
efficiently use the limited bandwidth, optimize traffic and request-response mode. Access Points send these requests
implement fair use of the communication medium for the
via PLC, over Bridges if necessary, to Nodes. Responses
extensive communication partners.
from Nodes are transported back to the servers. The system
Keywords-Power line communication, remote metering,
also supports non-request/response communication: Nodes
SCADA, communication protocol stack, communication
architecture, bandwidth sharing.
can generate alarm messages, which are delivered to an
appropriate server without explicit request.
I. INTRODUCTION
The REMPLI project does not attempt to develop new
The REMPLI project aims at creating a communication software for utilities. Instead, the REMPLI system
infrastructure that is suitable for data acquisition (e.g. transparently tunnels protocols that are understood by
reading of utility meters in private households), control of application servers and metering/SCADA devices. The
metering and SCADA devices and domotic applications. majority of metering and SCADA protocols are not
REMPLI is based on a power-line communication system session-oriented, meaning that one request results in one
(PLC), which is designed within the project. We focus on response without any prior connection setup.
low-bandwidth and long-distance data transmission over
low-voltage (LV) and medium-voltage (MV) power lines The Communication stack at both Nodes and Access
with redundant and alternating communication paths Points is conceptually symmetric and includes the
(meshed and switched power line). The upper level of following layers (Figure 1):
REMPLI network is an IP (Internet Protocol) backbone, The physical layer implements power line medium
which connects PLC segments to metering, SCADA, and coupling. Design of the physical layer is outside the scope
domotic systems. of this paper.
This paper presents the architecture of PLC The network layer implements a master/slave time
communication, including network, transport and division network with basic error recovery and short-
application layers with focus on the specific solutions for a distance routing mechanisms, and is responsible for
large-scale deployment. A detailed description of the maintaining information about whether a Node is currently
REMPLI system can be found in [1] and [2]. active in the network ("logged in") or not.
The transport layer supplements the network layer
II. REMPLI COMMUNICATION
with inter-network routing, fragmentation, request/response
The REMPLI PLC network spans from private pairing, address translation and reverse-channel (Node to
apartments to a secondary (MV/LV) transformer station Access Point) alarm service. The current transport layer
and then further to a primary (MV/HV) transformer station. that uses PLC communication may be replaced by new
This work is being partly supported by the EC within project REMPLI
(NNE5-2001-00825) and by FCT (CISTER UI 608)
0-7803-8844-5/05/$20.00 c 2005 IEEE. 61
implementations supporting other communication mediums Network Transport
Layer Layer
like GSM links, phone line modem, etc… A ccess A ccess
P oint P oint
Finally, the application layer carries out two tasks: Medium
Voltage
• conversion of metering/SCADA protocols into a form PLC
Network
that is suitable for transmission over PLC (including
Bridge Bridge
reverse process on the other side);
• multiplexing of data from different application servers Low Voltage
PLC
Network
and their respective sets of equipment over the same
PLC channel.
N ode N ode N ode
III. NETWORK AND TRANSPORT LAYERS This solution enables easy setup of very large networks
simply configuring parameters on the easily accessible (and
These two layers provide communication functionality small number) Access Points. It also automates the
to the Application Layer. Services available at the Access installation of new Nodes or Bridges: the system manager
Point side include: the Send Unicast Request with or simply has to configure the new serial numbers in the
without response, the Retrieve Alarm Message, the Access Point and after a while the new Node or Bridge will
Retrieve Status Service and the Node Login/Logout be available on the network.
Notification.
In terms of data communication services the Network
Services available at the Node side include: the Receive Layer implements not only basic “unconfirmed send“ and
Request/Send Response, the Send Alarm Message, the Set “send confirmed” services but also an automatic poll
Status Service and the Access Point Login/Logout system (not only to check slave connectivity, but also to
Notification. find new devices) and a slave-based repeater mechanism to
Communication services in each PLC network level are increase the coverage of the master/slave network (at the
handled by the Network Layer, the Transport Layer takes expense of additional delays). Optionally it can be
care of end-to-end communication (see Figure 2). configured to do automatic retries on the confirmed service
exchanges.
62
S3 connected to M1 and M2 a system to confirm correct delivery of the fragments of
S4 connected to M2 time large packets even if the original application service is non-
confirmed. When a delivery failure is detected the rest of
the packet is discarded at the Bridge and this information is
forwarded to the origin.
The Transport Layer also does automatic address
translation and route discovery using as little information as
possible after the basic device information is exchanged.
delay in slave responses When a Network level connection is established, the
Transport Layer is informed, so that it can build a map of
available paths (and respective Network Layer addresses)
Device inactive Master/slave transaction from each Access Point to each Node. The map of available
Slave waiting for Slave waiting for paths also includes information about each link quality
master’s request master’s connection (delay/error rate).
The starting point for this process is a table configured
Figure 3. Multiple master network
in each Access Point with information about each device:
The timings of the Network Layer services are handled node address (used by application drivers), unique serial
by an internal dispatcher service. The dispatcher manages number and Bridges that can be used to reach the device.
the traffic from the 3 different priorities (only 2 on slaves) Then the Access Point Transport Layer transfers the unique
queues, the polling cycles and additional confirmed serial numbers to the local Master Network Layer. When a
requests to retrieve data from slaves that have pending Bridge connection is detected the Access Point Transport
information on their queues. Layer sends special packets with the list of connection data
for the nodes that are authorized for that particular Bridge.
Access Points act as masters in the network; Nodes are The Bridge Transport Layer transfers this information to its
slaves. Bridges have a Slave Network Unit at the Medium local Master Network Layer. When a device is connected
Voltage (MV) side and a Master Network Unit at the Low do a Bridge, the Bridge Transport Layer first allocates a
Voltage (LV) side. Bridge ID to the new device and sends this Bridge ID and
The Transport Layer extends the fixed-size master/slave the node Unique Serial Number to the Access Point. When
packet service of the Network Layer to the the Access Point wants to send information to the node it
Request/Response end-to-end services required by the will include the Bridge ID on the Transport Layer header.
Applications: for this task it will fragment the data at the The Bridge Transport Layer forwards periodically the table
source and rebuild it at the destination. Since the MV PLC with link quality of the nodes in a particular Bridge to all
and the LV PLC may have different frame sizes, Bridges the connected Access Points so the latter can have an
have to store and join/split fragments as needed. estimation of current network link status.
Fragmentation in this system must be aware of two Some of these services depend on reliable delivery of
limiting factors in terms of header data: the Transport Layer’s own data packets. The Transport
Layer has special internal services that ensure trustworthy
• the limited data payload available in each frame. transfers of data not only from Masters to Slaves but also
This implies that absolute fragment numbering on the reverse direction.
schemes are not acceptable and an offset based
system is implemented. Finally, the Transport Layer must do its best to
guarantee a fair use of the network paths and to enforce
• the high error rate that may occur in certain application requests priorities in a meshed dynamic
periods of time. This implies that any fragment network with variable link capabilities and requests. The
identification method must be robust enough to links change not only due to physical reconfiguration of the
survive the loss of several fragments. network (power distribution switching devices) but also
To solve these issues our basic implementation uses 6 due to external electromagnetic interference (e.g. motors,
bits for fragment identification and 6 bits for packet welding machines, etc). This task is accomplished using an
identification. Depending on the final field conditions this internal scheduler that analyzes the current requests and the
numbers may be adapted to a particular deployment. available path map (see Figure 4).
The system must also handle huge packets in-transit on The Transport Layer handles redundancy (see Figure 5)
the Bridges. Since several large packets cannot be stored in for a particular Access Point – Node data transfer. When a
the limited Bridge memory we use temporary buffers to packet is sent from an Access Point the Transport Layer on
store fragments as they are received, and try to forward the the source checks the available paths and selects the most
data as soon as possible. As soon as the forwarded data is appropriate for the given moment. To limit the complexity
delivered the temporary buffers are discarded. There is also of the system all the fragments of a request (and the
63
possible response) follow the same route. This has the
IP
additional benefit that for most requests the routing
calculations are done in the Access Points, the devices with
more computing resources in the system.
64
• protocol drivers (one driver per protocol, both at Master). Redundant paths in a meshed PLC are handled by
Node and Access Point side). the Transport Layer, as described above. PLC switching is
handled by the Application Layer. Application servers and
Protocol Drivers at the Access Points interface with
drivers do not need to be aware of duplicate and alternating
utility software over IP. At the Node side protocol drivers
communication paths. A server can connect over IP to any
implement the interface to the equipment, namely meters
Access Point. Its requests are re-routed via other Access
and SCADA devices. There is one driver per protocol;
Points whenever necessary.
multiple homogenous devices, such as M-Bus meters, can
be connected to the same driver. Depending on the In a meshed network special attention is paid to
application, different standardized protocols are transmitting multicast and broadcast requests. Since a
implemented (using Drivers), namely IEC 60870 series, EN single Access Point may not be able to reach all Nodes,
62056 (also known as IEC1107), and EN 1434-3 such messages have to be re-routed by De/Multiplexer to
commonly known as M-Bus. several, or even all Access Points, which altogether provide
complete coverage of the addressed nodes. Since every
The De/Multiplexer merges streams of messages,
Access Point then sends the request over PLC
received from different drivers (these are requests from
independently, target Nodes can receive duplicate
servers, responses from equipment and internal traffic
messages. These are filtered out by De/Multiplexers at the
between the drivers). The multiplexed stream is transmitted
Nodes.
to a receiver device, where the De/Multiplexer distributes
it, so that a target driver receives only the data that was Since the De/Multiplexer and the underlying PLC stack
designated to it. This requires transmitting additional piece isolate communication between different driver pairs, the
of information (1-byte destination driver address) in every system is easily extendable to support tunneling of future
packet, which allows for up to 255 sender/recipient drivers protocols that are not anticipated at the project design stage.
at every node and Access Point. This concept is somewhat
similar to port numbers in the TCP/IP suite. V. CONCLUSIONS
In the REMPLI system drivers, implementing tunneling This paper presented the communication stack used in
of a particular protocol, talk strictly to each other. For the REMPLI system, which provides communication
example, all drivers for an IEC 60870 protocol may be service for existing utilities applications. This paper focuses
assigned the same address (say, 10) on all Access Points on the architecture of the network, transport and application
and Nodes. This means, that communication always occurs layers with focus on the specific solutions for large-scale
between pairs of drivers: a driver at the Access Point sends systems. We presented how the design of the
packets to its siblings at the Nodes; responses are delivered communication stack is influenced by the particular
back to the same address. In fact, apart from sharing PLC requirements of the power-line communication, particularly
bandwidth, different protocol drivers do not influence each to provide efficiency in the use of the available bandwidth,
other at all; communication between pairs is transparently optimizing traffic and guaranteeing fair use of the
multiplexed onto the same medium without “intervention” communication medium.
from drivers themselves.
Apart from multiplexing communication, the VI. REFERENCES
De/Multiplexer at the Access Point implements one more [1] A. Treytl, T. Sauter, G. Bumiller. "Real-time energy
function: if an Access Point cannot reach target Node, the management over power-lines and Internet”;
De/Multiplexer can re-route request from a driver (on Proceedings of the 8th International Symposium on
behalf of an application server) through another Access Power-Line Communications and its Applications, vol.
Point. Re-routing is done over the IP backbone (see ISPLC’04 no. 8, March 2004, pp. 306-411.
Figure 5), which links all Access Points to the application [2] G. Pratl, M. Lobashov. "Remote Access to Power-Line
servers and “horizontally”, between each other. Networked Nodes: Digging the Tunnel"; WFCS 2004
In a switched PLC network, where a given 5th International Workshop on Factory
communication path between Access Point and Node pair Communication Systems, Vienna, Austria; Sept. 2004;
can terminate at any time, every possible path to the Node p. 323-326.
should be covered by a separate Access Point (PLC
65
AN INTEGRATED SOLUTION FOR HOME AUTOMATION
a) b) c)
CAN CAN
d)
bus bus
2.3
to each service, through the definition of proper QoS rules.
2.2
Therefore, the introduction of such an element in the home
2.1
3 Mbps network architecture should be recommended, in order to
2.0 5 Mbps avoid bottlenecks and ensure continuous availability of the
1.9 6 Mbps basic and essential home functional services.
7 Mbps
1.8
0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 REFERENCES
Noise Traffic BW [Mbps]
(a)
[1] O. Martikainen, “Internet Revolution in Telecom,” in Proc.
1.2
IEEE JVA '06, Sofia, Bulgaria, Oct. 2006, pp. 58–62.
Service BW [Mbps]
1.0 [2] I. Han, H.-S. Park, Y.-K. Jeong and K.-R. Park, “An integrated
0.8 home server for communication, broadcast reception, and
home automation,” IEEE Transactions on Consumer
0.6
3 Mbps Electronics, vol. 52, pp. 104–109, Feb. 2006.
0.4 5 Mbps [3] C. Bae, J. Yoo, K. Kang, Y. Choe and J. Lee, “Home server
0.2 6 Mbps for home digital service environments,” IEEE Transactions on
7 Mbps Consumer Electronics, vol. 49, pp. 1129–1135, Nov. 2003.
0.0
0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 [4] IEEE 802.15.4, “Wireless Medium Access Control (MAC) and
Noise Traffic BW [Mbps] Physical Layer (PHY) Specifications for Low-Rate Wireless
Personal Area Networks (LR-WPANs)”, IEEE, August 2003.
[5] http://linuxmce.com/
(b)
[6] http://www.mythtv.org/
Fig. 4: Measured bandwidth (Mbps) for the DVB-T service (a) and for the [7] http://www.wireshark.org/
Internet service (b), as a function of the noise traffic bandwidth, for several [8] http://dast.nlanr.net/Projects/Iperf/
values of the maximum guaranteed bandwidth for the DVB-T service.
1. Introduction
The older population is growing at a considerably faster rate than that of the world’s total
population. In absolute terms, the number of older persons has tripled over the last 50 years
and will more than triple again over the next 50-year period [1]. The profound, pervasive
and enduring consequences of ageing population present enormous challenges as well as
enormous opportunities for Information Society Technology.
The World Health Organisation defines independence as the ability to perform the
activities of the daily life with little or no help from others. It is generally regarded as
having a positive impact on quality of life. Health, impairment and functioning are very
important determinants of independent living... The goals of independent Living
Applications or Services are to maximise empowerment, independence and productivity of
individuals and their integrations and inclusion into the mainstream of society. Two options
arise here. First to provide aids to mitigate the loss of independence and second empower
the conditions that make a person to continue being independent. This second approach is
the one adopted by OASIS Integrated Project.
OASIS is a five-years European project co-financed by the European Commission, with
33 partners and 5 subprojects. Its aim is to develop a multi-system application that will
enable and facilitate interoperability, seamless connectivity and sharing of content between
various services and ontologies, covering the elderly population needs.
Taking into account all previous research, OASIS proposes an innovative approach of
integration of many AAL-enabled Independent living applications through the use of a
common set of interconnected ontologies. In this paper, the relevant concept and
developments for assisting the elderly to manage their home environment efficiently, is
presented.
4. Methodology
Three possible approaches are considered for the creation of the OASIS common
ontological framework for domotics which are described next, followed by the three-
layered ontology, as a solution that is being followed in OASIS.
In order for one class to be applicable on each domotic device, it should be designed in a
very abstract way so as to include only the functionalities that are common in all
appliances. Such a design however would make a lot of core functionalities inaccessible by
the overall AmI system and would require further customization steps during development.
In the following schema the concept of such a generic ontology is depicted.
The extreme opposite of the previous concept is the development of one ontology class per
domotic device. This approach provides the means for the complete functional potential
exploitation since these become accessible via the ontology framework. However there is
the need for each domotic developer to provide the appropriate device description class so
that it becomes integrateable to the OASIS platform (an approach that could be conceived
as the analogous to the well known device drivers used by the computer operating systems).
Each device-class has different properties, which characterizes itself. For example, the
‘light’ device-class can have status and luminance properties. The temperature class can
have status properties. Table 2 shows examples of devices as stand-alone classes.
Table 2: Light‘s and Washing Machine’s Properties
Light Washing Machine
Status Status (On/off)
Luminance Running Program
Spin speed
Water temperature
Remaining wash duration
The final case is a compromise between the previous two designs. Different categories will
be formed depending on the common functionalities and characteristics of domotic devices.
The classes of brown goods, lighting, heating, etc. are described in a similar way.
A domotic
appliance
A white
good
A coffee
maker
Increased functionality
Increased availability
6. Business Benefits
One of the most important points of the domotics system is that sensors are set up so they
can be easily integrated into household equipment (including the wiring) already available
in the domicile. Examples for this are on/off sensors for light and oven, occupancy sensors
for bed and couch (pressure sensors), and temperature sensors for air and oven. This is in
line with the fact that elderly people do not want to buy new apparatus or equipment.
OASIS sees itself as a pioneering approach to the unification of heterogeneous domotic
appliances which will be possible by the provision of an ontology-based higher level of
interfacing that acts as an umbrella for the various functionalities and communication
standards. This ambitious goal however entails the involvement of a critical mass of
domotics vendors that will abide with OASIS’s technology approach. In order to achieve
this objective, OASIS will provide a graphical user interface in order to support the vendors
and companies to add new devices with their properties. Moreover, properties of existing
devices can be used or updated.
The new ontology encompasses all types of communication protocols (including older
ones and wireless), does not require specific infrastructure (i.e. fiber optics or fast internet),
is easily expandable and not brand-specific, thus is ideal for fast, cost-efficient and yet
reliable applications in countries under development.
7. Conclusions
In this document the current status towards the design of the OASIS domotics ontology is
reported. This research builds upon the work done in ASK-IT in relation to the
communication of heterogeneous devices and home appliances. In OASIS domotics
integration in a higher level is pursued by providing the semantic representation of
domotics functionalities in order to take advantage the developments of web services and
the emergence of semantic web. The design of this kind of ontological framework brings
the opportunity for standardization and harmonization in functionalities and communication
levels of different devices from different vendors and in that way facilitates the
management of distributed data sources towards more detailed context awareness by the
AmI (Ambient Intelligence framework).
The relevant ontology is publicly available at http://babel.informatik.uni-
bremen.de/ontologies and can be interfaced by a content alignment and authoring tool,
which is a stand-alone application, running on any Java-enabled PC; so that existing
emerging domotic applications at user homes or/and hospitals, elderly homes and other
rehabilitation establishments can be easily connected to it and through it to a wide number
of elderly support services.
References
[1] OASIS (ICT-215754) Description of work, 2007.
[2] Lassila O, McGuiness D. The Role of Frame-Based Representation on the Semantic Web. Technical
Report. Knowledge Systems Laboratory. Stanford University. KSL-01-02. 2001.
[3] Gómez-Pérez A, Fernández-López M, Corcho O, “Ontological Engineering.” Springer, London, 2004.
Abstract— Embedded intelligence entails a vision of the documents published become interpretable because they are
Internet of Things oriented to “Ambient Intelligence”, which enriched with information and metadata specifying the
can be defined as the capacity to collect and analyze the digital semantic context to allow for automatic processing and
traces left by people when they interact with the environment enhancing of the query process by exploiting interpretation
and with such “intelligent things”. In such a vision, the of such Web content.
ultimate aim is to acquire knowledge about everyday life and The Semantic Web is an Internet space that includes
human behavior. documents, or portions of documents, describing explicit
We apply these concepts to the automated home, in which even relationships between things and containing semantic
nowadays devices (sensors and actuators) are already Internet-
information intended for automated processing by our
capable “things” endowed with their own intelligence.
machines.
This work introduces a semantic knowledge representation for
domotics following the principles of the semantic Web (Web Not just Web pages, but databases, programs, sensors and
3.0). We have implemented specific ontologies that even household appliances will be able to present data,
automatically take account of distributed environmental multimedia, and status information in ways that powerful
context information. computing agents can use to search, filter and prepare
The first result was to achieve a natural abstraction of information in new and exciting ways. The data sources are
different, incompatible devices in order to support able to share information using the Resource Description
interoperability in a consistent technology-independent Framework (RDF) language, the basic instrument proposed
manner and impart awareness to the domestic environment in by the W3C for the encoding, exchange and reuse of
which “things” such as furniture and other objects, as well as structured metadata, making information on the Web
the rooms themselves, take on computational significance. significantly more machine-readable.
This goal includes leveraging the development of a The interpretation of document contents that the
comprehensive intelligent ecosystem that, by applying machine Semantic Web furthers will offer a number of important
learning and artificial intelligence techniques, gains knowledge advantages. It will enable building networks of relationships
of the occupants’ behaviors and habits and can thereby adapt and connections between all kinds of resources, and such
itself to the specific setting and anticipate their needs without networks will moreover be much more powerful and
direct human intervention. effective than those created with mere hypertext links.
The same modeling process serves as the basis for
In the Semantic Web, then, an ontology [2] is a partial
implementation of an e-health system that can anticipate, and
conceptualization of a given knowledge domain, shared by a
thereby prevent, possible health hazards before emergency
situations arise (especially for the sick and elderly). community of users, that has been defined in a formal,
machine-processable language for the explicit purpose of
sharing semantic information across automated systems.
The domain description is provided using a formalism
Keywords- Ambient Intelligent; domotics; home automation; called Web Ontology Language (OWL) that explicitly
DomoNet; SOA; XML; Ontology; Machine Learning; E-Health represents the meaning and semantics of terms, capturing
their intrinsic structure and their relations.
I. INTRODUCTION A computational ontology consists of Classes
The evolution of Web technology has made great strides (Concepts), Individuals (Instances) and Relations. A Class
in recent years [1]. Such advances have been driven by represents a group of different Individuals that share
changes in Web users’ needs and the consequent creation of common characteristics. The Individuals are the domain
new Web services. This evolution has led to the creation of objects that the ontology describes, such as people,
more and more sophisticated applications aiming to extend machines, devices and so on. A Relation can be declared
Web functionalities. between Individuals or between Classes and describes how
Semantic Intelligence is one of the main paradigms they are associated to each other.
underlying the Web 3.0 (W3C). In this new revision, the With the use of ontology query languages (e.g.
World Wide Web becomes an environment where any SPARQL), it is possible to interact with the ontology to
746
IV. SEMANTIC DOMONET refer to completely different devices. “Turn on”, for
The existing DomoNet framework is based on Web instance, can be directed to a lamp, a television or an
Services and Service Oriented Architecture (SOA). electric oven. Each functionality takes some
Development of the software implementation was based on a parameters as input and return other parameters as
syntactic approach using an XML-compliant language called output.
DomoML.
DomoML enables abstraction of heterogeneous systems
in order to describe device functionalities, data types,
messages and models of the interactions and
communications among framework entities. It represents a
“lingua franca” that links several single domotic systems,
providing them with common information and control
exchange mechanisms. As such, it can be used as a sort of
universal domotic language to be applied in any domotic
context.
It is up to human interpretation to undersatand the
significance of that which devices represent and which are
the effects of their actions inside the environment.
The supplementing of DomoNet with a new semantic
level makes the system a more powerful tool for abstracting
domotic devices, household objects and the surrounding
spaces. Such semantic level enables it to gather crucial
information in order to be able to contextualize the overall
environment and its contents.
The system includes solutions for implementing:
• semantic interoperability among heterogeneous
technological systems and devices, while masking
their technological differences from the framework;
• equipping the user environment, the domotic devices
and their functionalities with semantic capabilities;
• defining the position of domotic devices and
furniture to provide routing within a specific home
environment (e.g. the night-table lamp, the kitchen Figure 1. Semantic DomoNet platform architecture.
TV);
To describe how the environment is modified when
• modeling the effects within the environment of
a functionality is activated, the ontology utilizes the
activation of domotic functions in order to
effects class, whose individuals represent the
understand the impact that a device will have on the
possible functional consequences. For example, the
environment.
effect “more light” is related to the functionality
The general architecture of the overall platform is
“setPower” of a lamp by setting its input parameter
composed of four layers (figure 1): the Semantic,
to “on”. The same individual effect can be used for
DomoNetWS, TechManagers and Domotic Bus layers.
another functionality and so “more light” can be
The Semantic layer supplies a general semantic to
associated to the functionality “setStatus” of roller
devices, objects, actions and the overall environment
blinds, by setting its input parameter to “open”.
potentially making up a generic home. This level contains no
personalization or contextualization to any particular • FurOnt (Furniture Ontology): is made up of a simple
environment. taxonomy of home furniture. In particular, it defines
Four ontologies were developed for the semantic level: and classifies objects such as tables, chairs, mirrors
and so on.
• DomOnt (Domotic Ontology): this includes an
integrated taxonomy of domotic devices and their • EnvOnt (Environment Ontology): is the ontology of
functionalities. the environments within which devices and furniture
This ontology defines separate classes of devices, can be positioned. It describes the home
their functionalities, input/output parameters and the environment, that is, defines the meaning of different
effects they have in the environment. The relations rooms, such as “bathroom”, “kitchen” or “bedroom”.
amongst the classes are defined as follows (figure 3): It includes relations such as “contains bed”, “the
a device has some functionalities and any single place for eating”, etc. In this way it is possible to
functionality can be owned by more than one device. locate a specific environment without explicitly
For example, the meaning of a command (which is a calling it but by simply referring to it by its
particular type of functionality) can conceptually characteristics (e.g. “the room with the bed”).
747
• LexOnt (Lexical Ontology): defines words behavior and habits of home inhabitants in order to anticipate
specifying the positions of objects and devices inside their needs. It is an adaptive, context-aware application that
the environment and their inter-relations. The thus works in a fully interoperable environment.
defining words here are, for example, “near”, “on”, It includes two complementary, interoperable modules
“under” and so on. that perform real-time analyses to identify user behaviors and
The DomoNetWS layer defines its own ontologies by verify the rules learned. The first module applies a Data
instantiating those defined at the semantic level. This is done Mining paradigm to learn action sequences that represent
by creating an Individual of the various classes (defined at user habits, the second module is designed to learn
the semantic level) and relating them based on the specific parameters of scenarios using a statistical approach to
configuration of the environment and the objects on which analyzing the frequency and percentage of use of appliances.
the system has to operate. In the resulting model the The DomoPredict framework can also be applied to the
interactions between various system entities and any medical field (figure 2). Supposing that someone exhibits a
reference to specific objects are defined by such Individuals. significant change in sleeping, eating or toileting habits.
The ontologies defined at this level are inherited directly These can be considered early indicators of potential
from those defined at the semantic level. They are problems and can be analyzed and recognized as such by
characterized by the models of the Individuals and are DomoPredict.
respectively: DomOntInd(n), FurOntInd, EnvOntInd and
LexOntInd.
There can be from 1 to n numbers of DomOntInd,
depending to the number of domotic systems present in the
environment. There will therefore be a different ontological
instance for every application domain formed by the devices
belonging to each domotic system.
DomOntInds are the ontologies that implement the
functionalities necessary for interoperability. Express
relations have been created between Individuals that act on
device functionalities and between those that act on
parameters. In this way, when the “setStatus” push button
functionality is called, the “setPower” function of a lamp is
also called, using the same input parameter value (on or off)
for the two functions.
Figure 2. Smart home telecare devices.
The TechManagers layer is responsible for creating the
domotic device instances regarding real environments. At The results of this analysis must then be integrated with
this level a mapping is made between every Individual data on the user’s vital signs, which are obtained by constant
defined in DomOntIndns and the physical address of the monitoring through the use of special portable sensors
various devices. (integrated in shirts, bracelets, clocks, etc.) and organized
The Domotic Bus Layer includes the physical according to specific configuration of a Body Area Network
infrastructures of the domotic systems. They are substantially (BAN). This process leads to an evaluation workflow that
represented by the communication channels, which can may culminate in actions such as sounding alerts and/or
wired or wireless, depending on the domotic system in automated calls. Clearly, the process must be efficient
question. enough to eliminate, or at least minimize false alarms. It is in
The entire communications infrastructure between such process that the functionalities offered by the
ontologies belonging to the same or different levels have framework’s new semantic level become fundamental in
been implemented using the JADE open-source library [12]. ensuring that the application provides satisfactory results.
JADE provides for an agent-based network architecture in Indeed, the current system now acts in a contextualized
which each agent is responsible for managing a specific environment, which enables it to recognize the user’s actions
ontology. The various agents used for manipulating the in a “conscious” manner. And this is only made possible
ontologies have instead been built using the JENA library through the notions furnished by the special ontologies,
[13]. which give “meaning” to rooms, objects, devices and so
V. ANTICIPATING POTENTIAL HEALTH HAZARDS forth.
In our everyday lives we usually carry out the same, VI. CONCLUSIONS
often related, actions to achieve certain goals. By way of The developed framework is currently in operations at
example, when we leave home, we usually switch off all the the Domotics Lab of the CNR in Pisa. It is an integral part of
appliances, close all the windows, activate the alarm system the faithfully simulated home environment set up for
and so on. With the passing of time, these actions become demonstration and continued research purposes.
habits and are often performed at specific times of the day or The introduction of the semantic level, which has enabled
are related to certain events. DomoPredict [5] is a software the system to learn context, has provided numerous benefits.
module of the DomoNet framework able to learn the
748
The system now “reasons”, referring to devices based on The feedback from such tools would moreover serve to
their physical position rather than through syntactic-based increase the cognitive base used by DomoPredict to make
references such as, for instance, a physical address. The deductions and provide important indications for
command “Turn on the living room light” is valid in any determining whether living conditions are optimal and
home and will simply be contextualized in any given suitable for the person’s needs.
instance for the specific residence in which it is used. A further development will be to supply the platform
The system is able to produce “intelligent” behaviors, for with special Human-Computer Interaction (HCI) tools. Such
example, anticipating a user’s wish “to have more light” by work will aim at creating an advanced graphical user
taking account of the environmental context and interface for configuring the system. The envisioned
autonomously deciding whether to turn on a lamp or, interface will enable drawing a detailed graphical layout of
alternatively, open the blinds. the home environment, in which the devices recognized by
The software module that learns the inhabitant’s habits the framework, as well as furnishings and other objects, can
and acts to anticipate his needs, is a step forward both in the be positioned using the “drag and drop” technique.
direction of providing efficient e-health and toward realizing Exploiting the fact that such elements will already include
the vision of ambient intelligence. A good deal of work will the necessary semantics, their positioning inside the map will
certainly be needed on the part of both the computer science involve automatic creation of the necessary ontological
and the strictly medical fields. Nevertheless, the framework relations.
makes an important contribution to allowing the elderly and
disabled to live in a safe environment custom-designed to REFERENCES
their own personal needs and state of health.
During the testing stage, particular attention has been [1] Juan M. Silva, Abu Saleh Md. Mahfujur Rahman, and Abdulmotaleb
devoted to validating the ontologies, which have been found El Saddik, “Web 3.0: a vision for bridging the gap between real and
to be wholly free of consistency errors [14]. The first checks virtual”, Proc. of the 1st ACM international workshop on
Communicability design and evaluation in cultural and ecological
were effected at startup-time to detect and correct any multimedia system (CommunicabilityMS '08), ACM, New York, NY,
possible logical contradictions. Since fully populating the USA, pp. 9-14, 2008, doi:10.1145/1462039.1462042.
ontologies necessarily calls for the continuous introduction [2] B. Chandrasekaran, J.R. Josephson, and V.R. Benjamins,
of new objects and relations, careful checks were carried out “Ontologies: What are they? why do we need them?” IEEE Intelligent
with each and every update. All stages of validation have Systems and Their Applications, 14(1), pp. 20–26, 1999. Special
been carried out using the JENA library reasoner. Issue on Ontologies.
[3] ITU. Internet Reports 2005, “The Internet of Things”, November
VII. FUTURE WORK 2005.
[4] V. Miori, D. Russo, and M. Aliberti, “Domotic tecnologies
The results obtained allow us to envision and plan for the incompatibility becomes user transparent”, In: Communications of
future evolution of the platform A first step will be the the Acm, vol. 53 (1), pp. 153 - 157. ACM, 2010.
creation of a friendly human-machine interface (HMI) based [5] V. Miori, and D. Russo,. “An adaptive and anticipatory AmI
on the use of natural language, whence enable the use of approach tailored to user needs”, Proc. 5th International Symposium
utterances such as “the lamp on the table” or more simply on Ubiquitous Computing and Ambient Intelligence 2011
“more light in the bedroom” in order to achieve the desired (UCAmI11), Riviera Maya, Mexico, 5-9th december 2011.
effects. [6] G. Lamprinakos, E. Kosmatos, and D. Kaklamani, I.S. Venieris, “An
integrated architecture for remote healthcare monitoring", 14th
With the support of the ontologies it will then be possible Panhellenic Conference on Infomratics (PCI), pp. 12-15, 10-12 Sept.
to build more powerful and more interoperable medical 2010, doi: 10.1109/PCI.2010.20
information systems, and thereby support the needs of the [7] R. Martínez-López, D. Millán-Ruiz, A. Martín-Domínguez, and
healthcare process for the transmission, re-use and sharing of M.A.Toro-Escudero, “An architecture for next-generation of telecare
patient data. This process can be supported by providing systems using ontologies, rules engines and data mining”, Intl. Conf.
semantic-based criteria to support different statistical on Computational Intelligence for Modelling, Control and
Automation, pp. 31-36, 2008
information aggregations to simply represent complex,
[8] O. Nee; A. Hein; T. Gorath; N, Hulsmann, G.B. Laleci; M. Yuksel,
detailed medical data unambiguously. M. Olduz, I. Tasyurt, U. Orhan, A. Dogac, A. Fruntelata, S.
Further interesting developments will come from Ghiorghe, and R. Ludwig, “SAPHIRE: intelligent healthcare
supplementing DomoPredict with real-time systems for monitoring based on semantic interoperability platform: pilot
conducting behavioral analysis of elderly users in their home applications”, Communications, IET , vol.2, no.2, pp.192-201,
settings, including qualitative movement analysis [15], and February 2008 doi:10.1049/iet-com:20060699
evaluating emotional states. [9] D. Preuveneers, J. Van den Bergh, D. Wagelaar, A. Georges, P.
Rigole, T. Clerckx, Y. Berbers, K. Coninx, V. Jonckers, and K. De
Data on such aspects is directly or indirectly linked to Bosschere, “Towards an extensible context ontology for ambient
pathologies suffered by the elderly, such as quality of intelligence”, Proc. of the 2nd European Symposium on Ambient
movement, personal emotional state and behavior in general Intelligence (EUSAI 2004), pp. 148-159, 2004.
(troubled, nervous, confused and so on). Considering these [10] F. Latfi, B. Lefebvre, and C. Descheneaux, “Ontology-Based
factors, the aim is to determine methodologies and Management of the Telehealth Smart Home, Dedicated to Elderly in
algorithms for automatic or semi-automatic evaluation of Loss of Cognitive Autonomy”, Proc. of the OWLED 2007 Workshop
on OWL: Experiences and Directions (2007),
these aspects in order to provide direct support to the elderly,
disabled or sick (with feedback, focused exercises, etc).
749
[11] M. Klein, A. Schmidt, and R. Lauer, “Ontology-centred design of an [13] B. McBride "Jena: a semantic Web toolkit," Internet Computing,
ambient middleware for assisted living: the case of SOPRANO”, IEEE, vol.6, no.6, pp. 55-59, Nov/Dec 2002
Proc. of Towards Ambient Intelligence: Methods for Cooperating doi:10.1109/MIC.2002.1067737
Ensembles in Ubiquitous Environments (AIM-CU), 30th Annual [14] P. Haase, and L. Stojanovic, “Consistent evolution of OWL
German Conference on Artificial Intelligence (KI 2007), Osnabrück, ontologies”, Proc. of the 2nd European Semantic Web Conference
2007. (ESWC-05), pp. 182-197.
[12] F. Bellifemine, G. Rimassa, and A. Poggi, “JADE - A FIPA- [15] L. Ball, D. Bradley, A. Szymkowiak; S. Brownsell, “Linking
compliant agent framework”, Proc. of the 4th International recorded data with emotive and adaptive computing in an eHealth
Conference and Exhibition on The Practical Application of Intelligent environment," Healthcare Informatics, Imaging and Systems Biology
Agents and Multi-Agents, London, 1999. (HISB), 2011 First IEEE International Conference on , vol., no.,
pp.198-204, pp. 26-29, July 2011 doi:10.1109/HISB.2011.33
750
2013 19th International Conference on Control Systems and Computer Science
Abstract—Video surveillance is an important area of com- recognize and track persons from image sequences, and
puter vision research, its applications including both outdoor more importantly to understand and recognize their actions
and indoor automated surveillance systems. In the context of and activities.
smart home environments, the In-House Video Surveillance
systems have as main goal to control the safety and the security Video surveillance systems in smart home environments
of materials and of people living in a domestic environment. can be classified as: (a) centralized systems, where human
This paper provides an overview of various methods and activity analysis is performed on a centralized server, and
techniques from the computer vision research area that address (b) distributed systems, where analysis is performed on a
the problems of representation, recognition and learning of distributed cameras network.
events, actions and activities of inhabitants from a domotic
environment. In general, an in−house video surveillance system in−
cludes, as presented in Figure 1, the following modules: (a)
Keywords-video surveillance; smart home environments; am- motion detection, (b) object tracking, and (c) human motion
bient assisted living;
analysis, in order to detect simple events, or recognize com−
plex human (or group oh humans) activities. The first two
I. I NTRODUCTION
modules represent a syntactic low−level processing phase,
The smart home concept [1] is understood as an inte− while the last module represents a semantic high−level phase,
gration system that deliver a range of innovative services which is able to detect and recognize human activities.
to homeowners using a variety of intelligent, connected The rest of this paper is organized as follows. Section
devices. II covers approaches related to low−level video processing
The research in the field of vision surveillance meets with techniques, such as motion detection and object recognition,
the research in several smart home techniques, especially while Section III covers current computer vision approaches
in two important domotic aspects: home health, and home for human motion analysis. In Section IV privacy issues in
security. We identified two distinct directions where video video surveillance systems are discussed. Finally, conclu−
surveillance techniques can be used in smart home environ− sions are given in Section IV.
ments: (a) ambient assisted living, whose goal is to improve
the quality of life and to maintain independence of older II. M OTION E STIMATION AND O BJECT R ECOGNITION
and vulnerable people, and (b) vision-based fire detection, The low−level processing task of an indoor video surveil−
where video processing techniques are used to develop fire lance system contains two distinct components, as presented
monitoring systems for smart home environments. In this in Figure 1: motion detection and object recognition. The
paper, we focus attention only on the ambient assisted living. input for these modules is a video sequence, each element
An indoor surveillance system attempts to detect and from this sequence representing a video frame.
recognize objects of interest from video obtained by one
or more cameras along, eventually by fusion information A. Motion detection
obtained from cameras and other sensors installed in the Motion detection methods attempt to locate connected
monitored area. The aim of an automated video surveillance regions of pixels that represent the moving objects within
system is to understand what is happening in a monitored the scene. Conventional approaches for motion detection
area and to take appropriate actions like alerting appropriate methods use background subtraction, temporal differencing
services if an undesirable occurred [2]. [4], and optical flow [5]. The first approach consists in
Ambient assisted living (AAL) can be described as in− subtraction of a background or reference model from the
formation and communication technology based services current image followed by a labeling process. The second
and systems to provide older and vulnerable people with technique is based on the the subtraction of two or more
a secure environment, in order to improve their quality of consecutive frames followed by thresholding. The optical
life and reduce the costs of health and social care [3]. Video flow approach uses the velocity field that warps one image
surveillance in smart home environments, attempts to detect, into another image.
472
model and the pose of the real object [13]. Taylor models use Events
an incremental approach to improve an existing estimation,
using differentials of motion parameters with respect to the Space−time Sequential
approaches approaches
observation to predict better search directions [18]. The
Kalman filter is a recursive linear estimator used for tracking Space−time Space−time
Trajectories Exemplar−based State−based
the shape and position over time in which the density volume features
473
trajectory curves, representing an action as a set of peaks and In the first stage a head localization method is used from a
intervals between them. By analyzing peaks of trajectories, human detection bounding box, and a head pose classifier
the proposed method is able to recognize human actions such is estimated. The second stage is a framework for the joint
as ’opening a cabinet’ and ’picking up an object’. estimation of body position, body pose and head pose.
One major advantage of the trajectory−based approaches is In model-based approaches the human motion is repre−
the ability to analyze detailed levels of human movements. sented as a model composed of a set of states. The model is
However, the problem of the 3−D body−part detection and statistically trained, and one statistical model is constructed
tracking remains an unsolved and an open research problem. for each activity. Hidden Markov models (HMMs) and
Local features are extracted from 3D space−time vol− dynamic Bayesian networks (DBNs) have been widely used
umes, and they are used to represent and recognize human for state model−based approaches. In [38] a DBN is used to
motion. Several approaches extract these local features at recognize gestures of two interacting persons. Some gestures
every frame and concatenate them temporally to describe such as ’stretching an arm’ and ’turning a head left’ can
the human activities [30], while other approaches extract be recognized by constructing a tree−structured DBN. In
sparse spatio−temporal local interest points from 3D volumes [39] an efficient recognition algorithm using coupled hidden
[31], [32]. In [33] an approach using local spatio−temporal semi−Markov models (CHSMMs) has been proposed, which
features at multiple temporal scales is proposed, which can extends the coupled HMMs by modeling the duration of
handle execution speed variations of an action. In [32] an activity staying in each state. In [40] a method for
a spatio−temporal relationship matching is introduced in object detection and action recognition is presented that
order to recognize complex activities. The method measures uses a Histogram of Oriented Gradients (HOG) method for
structural similarity between two videos, which enables the object detection, and a Hidden Markov Model (HMM) for
detection and localization of complex−structured activities. capturing the temporal structure of the features.
In [34] a new model, called context space model, is pro− Exemplar−based approaches provide more flexibility for
posed for detecting anomalous behavior in video sequence. recognition of human activities than the model−based ap−
Context space is defined as an n−dimensional information proaches (e.g. such systems can maintain multiple and
space formed by parameters selected from the contextual different sample sequences). In addition, the amount of
information. The proposed method provides guidelines for necessary training data can be less than in the case of state
the system designers to select information that can be used model−based approaches. On the other hand, state−based
to describe context, and enables a system to distinguish approaches are able to perform probabilistic inference for
between different contexts. activity determination.
Methods using local descriptors have some advantages,
because background subtraction or other low−level compo− B. Modeling and Recognition of Activities
nents are not required, and the local features are affine Higher−level representation and reasoning methods are
invariant in most cases. They can be used for recognizing necessary for modeling complex activities having inherent
simple periodic actions such as ’walking’. structure and semantics. Accordingly to this assumption, in
2) Sequential approaches: These approaches consider as approaches for human activity recognition (or hierarchical
input a sequence of video frames, and determine if an approaches [24]) a high−level activity is considered as com−
activity has occurred in the video when a particular sequence posed of several simpler activities, denoted by sub-activities
of features characterizing the activity is observed. Depending (or actions, or events).
on the method used to recognize human motion, they are As presented in Figure 2, approaches for modeling and
classified into (i) exemplar-based, and (ii) model-based. recognition of activities are divided into four categories:
Exemplar-based approaches describe classes of human (i) statistical, (ii) graphical-based, (iii) syntactic, and (iv)
actions using training samples, and represent human activi− declarative.
ties by maintaining a template sequence or a set of sample 1) Statistical approaches: In the case of statistical ap-
sequences of actions. The dynamic time warping (DTW) proaches, multiple layers (usually two) of state−based mod−
algorithm has been adopted for matching two sequences els such as HMMs are used to recognize activities with
with variations [35]. In [36] human activities are recognized sequential structures. At the bottom layer, atomic actions
by modeling them as linear time invariant (LTI) systems. are recognized from sequences of feature vectors, while
The system converts a sequence of images into a sequence the second−level treats this sequence of atomic actions as
of silhouettes, extracts contour information, and then uses observations generated by the first−level. For each model, a
SVMs for classifying a new video input. In this way some classifier is constructed by using the maximum likelihood
simple actions such as ’slow walk’ and ’fast walk’ can be estimation (MLE), or the maximum a posteriori probability
recognized. In [37] a method for the analysis of human (MAP). The method of multi−layered HMMs has been
motion has been proposed that uses joint estimation of explored by various researchers. In [41] hierarchical HMMs
human behavioral information, such as head and body pose. of two layers are constructed to recognize human activities
474
such as ’a person having a meal’, or ’a person having of an activity represents a parsing process. There are several
a snack’. In [42] a multi−layered HMM is constructed to approaches for using grammars in in video activity under−
recognize group activities occurring in a meeting room. The standing, which use different type of grammars: context-free
system recognized atomic actions of speaking’, ’writing’, grammars, stochastic grammars, and attribute grammars.
and group activities such as ’monologue’, ’discussion’, and Context-free grammars (CFG) are one of the earliest
’presentation’. used type of grammars for video activity recognition [48].
2) Graphical-based approaches: These approaches con− In [49] a method that use the CFG formalism to model
tain a graphical representation of some state−based models. and recognize composite human activities and multi−person
Among others we can mention belief networks and Petri interactions is proposed. This method represents a hierarchi−
nets. cal approach, having the lower−levels composed of HMMs
Belief networks represent Bayesian networks that specify and BNs, while the higher−level interactions are modeled
complex conditional dependencies between a set of random by CFGs. In complex scenarios involving several persons,
variables that are encoded as local conditional probability and requiring temporal relations, it is difficult to formulate
densities. In addition, Dynamic Belief networks (DBNs) the grammatical rules manually. Learning the rules of the
represent a generalization of the Bayesian networks by grammar from training data is a promising alternative, but
incorporating temporal dependencies between random vari− it has proved to be extremely difficult in the general case
ables, and approaches using DBNs may contain multiple [50].
levels of hidden states. In [43] DBNs are constructed to Stochastic grammars allow probabilities to be associ−
recognize group activities in a conference room, such as ated with each production rule. This extension provides a
’break’, ’presentation’, and ’discussion’, based on atomic mechanism to deal with the uncertainty inherent in video
actions such as ’talking’, or ’asking’. In [44] a method for surveillance systems. In [51] Stochastic context−free gram−
interpretation of human−object interactions is presented, that mars (SCFG) were used to model the semantics of activities
integrates information from perceptual tasks such as human whose structure was assumed to be known, where low−
motion analysis, and object detection. level primitive detection is performed by using HMMs. In
The Petri net (PN) formalism allows a graphical represen− [52] SCFGs are used to model multi−tasked activities (i.e.
tation of activities that can be used to model semantic rela− activities that have several independent threads of execution
tions that occur in video events including temporal relations, with intermittent dependent interactions). As in the case of
spatial and logical composition, hierarchy, and concurrency. CFGs, approaches for learning the structure of SCFGs have
As specified in [45], PN event model approaches can be been proposed. In [53] a method for automatically learning
divided into two categories: object PNs and plan PNs. a Probabilistic Context−free grammar for recognizing human
Tokens in the object PN model correspond to objects and actions from sequences of human silhouettes is presented.
their properties in video sequences, places represent object Attribute grammars associate conditions with production
states, while transitions represent changes in an object state. rules. In video−surveillance systems, attributes can be at−
In [46] an enhanced PN model constructed on the object tached to primitive events. In [54] Probabilistic Attribute
PN model was used for people surveillance, which replaces Grammars have been used for multi−agent activities in video−
transitions with stochastic timed transitions for dealing with surveillance. The primitive events used in this approach are
uncertainty. In plan PN approaches each event is viewed as ’appear’, ’disappear’, ’stop’, and ’start’. The primitive events
a ’plan’ of sub−events, each sub−event being represented by are associated with attributes such as id (identity of the entity
a place. An event is recognized when the ’sink’ transition of involved, loc (location where the primitive event occurs), and
the plan fires. In this case a separate model for each event class (object classification label).
is required. In [47] an enhanced PN model constructed on 4) Declarative approaches: Declarative, or Knowledge-
the plan PN model is used for people surveillance, which based approaches represent activities in terms of primi−
associates probabilities with tokens. Though PNs represent tives and constraints on them. These methods can express
an intuitive tool for expressing complex activities, they suffer more complex constraints than grammar−based approaches.
from the disadvantage of having to manually create the Declarative approaches can be divided in two categories:
model structure. The problem of learning the PN structure logic-based approaches, and ontology-based approaches.
from training−data has not yet been formally addressed. Logic-based approaches use logical rules to describe
3) Syntactic approaches: These approaches are based common−sense domain knowledge that is used to describe
on grammars that express the structure of a process using human activities. In [55] a method for representing activities
a set of production rules. In video motion understanding using declarative models is presented, recognition being per−
approaches, terminals symbols correspond to abstraction formed by using a constraint−satisfaction algorithm. In [56]
primitives, nonterminal symbols correspond to semantic a hierarchical representation to recognize actions performed
concepts (i.e. sub−events), and production rules correspond by a single person is presented. The first level realizes
to the semantic structure of the activities. The recognition detection and tracking of moving objects from the video
475
stream, while the second level takes the inferred trajectory This approach targets surveillance applications where an
of each object, and the contextual information, to recognize alarm need to be detected, and persons are required to
the behavior of the moving objects among a large number wear colored hats or vests. Authors from [64] present
of potential scenarios. In [57] this representation is extended a privacy−preserving surveillance video system where the
by considering an activity to be composed of several action privacy information can be stored and retrieved in a secure
threads, each action thread being modeled as a stochastic and reliable manner. A digital signature is inserted into the
finite−state automaton. resulting video for authentication.
Ontology-based approaches represent taxonomy−based
methods that attempt to categorize human activities accord− V. C ONCLUSION
ing to some predefined criteria. Some methods decompose
In this paper, we have presented an overview of the current
human activities into a sequence of behaviors to obtain a
approaches on vision surveillance techniques in smart home
flexible description. In [58] a multi−level context hierarchy
environments. In this review, we have summarized the
ontology is proposed. The ontology is based on knowledge
methodologies used in several stages of an in−house video
gained from video recorded in the public spaces, and it
surveillance system: motion detection, object tracking, and
is constructed and implemented using a dynamic Bayesian
human activity recognition. An taxonomy−based approach
network. A formal language, called ”The Video Event Rep−
has been presented and applied to current research. In
resentation Language” (VERL) [59] was developed, which
addition privacy issues in video surveillance systems for
provides an ontological representation of complex events
smart home environments have been discussed.
in terms of simpler sub−events. In addition to annotating
specific events and defining composite properties, the lan−
R EFERENCES
guage allows to specify inference rules that can be used to
recognize complex human activities. [1] V. Ricquebourg, D. Menga, D. Durand, B. Marhic, L. Dela−
The main advantage of the statistical and syntactic ap− hoche, and C. Loge, “The smart home concept: our immediate
proaches is the fact that they allow reliable recognition future,” in Proc. IEEE Int. Conf. on E-Learning in Industrial
with noisy inputs, while the main drawback is the difficulty Electronics, dec 2006, pp. 23–28.
for representing and recognizing activities with concurrently
[2] G. Lavee, E. Rivlin, and M. Rudzsky, “Understanding video
organized sub−events. The main advantage of the graphical− events: a survey of methods for automatic interpretation of
based and declarative approaches is the possibility to repre− semantic occurrences in video,” Trans. Sys. Man Cyber Part
sent and recognize human activities with complex temporal C, vol. 39, no. 5, pp. 489–504, sep 2009.
structures, while the major drawback is the deterministic
structure at the high−level component. [3] F. Cardinaux, D. Bhowmik, C. Abhayaratne, and M. S.
Hawley, “Video based technology for ambient assisted living:
IV. P RIVACY AND V IDEO S URVEILLANCE S YSTEMS FOR A review of the literature,” Journal of Ambient Intelligence
A SSISTED L IVING and Smart Environments, vol. 3, no. 3, pp. 253–269, 2011.
Despite of the variety of the approaches for video surveil− [4] A. J. Lipton, H. Fujiyoshi, and R. S. Patil, “Moving target
lance in smart home environments, and of advances in classification and tracking from real−time video,” in Proc.
camera and computing equipment hardware in recent years, IEEE Workshop Applications of Computer Vision, 1998, pp.
8–14.
there is a real barrier to introduce the video surveillance
system at home. The most relevant problem is the total
[5] J. Barron, D. Fleet, and S. Beauchemin, “Performance of
lack of privacy. Actually relatively few surveillance systems optical flow techniques,” Intl. Journal of Computer Vision,
addressing privacy issues have been published. vol. 12, no. 1, pp. 42–77, 1994.
The majority of work on image sequences applies simple
distortion methods such as pixelation (image subsampling) [6] M. Hedayati, W. Zaki, and A. Hussain, “Real−time back−
or blurring (smoothing the image with a Gaussian filter with ground subtraction for video surveillance: From research to
reality,” in Proc. Int. Colloquium on Signal Processing and
large variance) to obfuscate parts or all of the image [60]. Its Applications, 2010, pp. 1–6.
The PrivacyCam architecture proposed in [61] suppresses
automatically segmented foreground objects in the scene and [7] M. Murshed, A. Ramirez, and O. Chae, “Statistical back−
cryptographically secures access to the altered video stream ground modeling: An edge segment based moving object
produced by the system. In [62] it is proposed a method detection approach,” in Proc. IEEE Int. Conf. on Advanced
for face de−identification by using the k−Same algorithm, Video and Signal Based Surveillance, 2010, pp. 300–306.
which offers formal privacy protection guarantees. In [63]
[8] O. Barnich and M. V. Droogenbroeck, “Vibe: A universal
an interesting approach is proposed, the respectful camera, background subtraction algorithm for video sequences,” IEEE
where the problem of automatically obscuring faces in real Trans. on Image Processing, vol. 20, no. 6, pp. 1709–1724,
time to assist in video privacy enforcement is considered. 2011.
476
[9] W. Hu, T. Tan, L. Wang, and S. Maybank, “A survey on visual [23] P. Turaga, R. Chellappa, V. Subrahmanian, and O. Udrea,
surveillance of object motion and behaviors,” IEEE Trans. on “Machine recognition of human activities: A survey,” IEEE
Systems, Man, and Cybernetics, Part C, vol. 34, no. 3, pp. Trans. on Circuits and Systems for Video Technology, vol. 18,
334–352, 2004. pp. 1473–1488, 2008.
[10] I. A. Karaulova, P. M. Hall, and A. D. Marshall, “A hierar− [24] J. Aggarwal and M. Ryoo, “Human activity analysis: A
chical model of dynamics for tracking people with a single reviewmachine recognition of human activities: A survey,”
video camera,” in Proc. British Machine Vision Conf., 2000, ACM Computing Surveys, vol. 13, no. 3, 2011. [Online].
pp. 261–352. Available: doi:10.1145/1922649.1922653
[11] S. Ju, M. Black, and Y. Yaccob, “Cardboard people: a [25] A. Bobick and J. Davis, “The recognition of human move−
parameterized model of articulated image motion,” in Proc. ment using temporal templates,” IEEE Trans. Pattern Anal.
IEEE Int. Conf. Automatic Face and Gesture Recognition, Machine Intell., vol. 23, no. 3, pp. 257–267, 2001.
1996, pp. 38–44.
[26] Y. Ke, R. Sukthankar, and M. Hebert, “Spatio−temporal shape
[12] S. A. Niyogi and E. H. Adelson, “Analyzing and recognizing and ow correlation for action recognition,” in Proc. IEEE
walking figures in XYT,” in Proc. IEEE Int. Conf. Computer Conf. on Computer Vision and Pattern Recognition, 2007,
Vision and Pattern Recognition, 1994, pp. 496–474. pp. 1–8.
[13] Q. Delamarre and O. Faugeras, “3D articulated models and [27] C. M. Sharma, A. K. S. Kushwaha, S. Nigam, and A. Khar,
multi−view tracking with physical forces,” Comput. Vis. Image “Automatic human activity recognition in video using back−
Understanding, vol. 81, no. 3, pp. 328–357, 2001. ground modeling and spatio−temporal template matching
based technique,” in Proc. of the Int. Conf. on Advances in
[14] R. Plankers and P. Fua, “Articulated soft objects for video− Computing and Artificial Intelligence, 2011, pp. 97–101.
based body modeling,” in Proc. Int. Conf. Computer Vision,
Vancouver, BC, Canada, 2001, pp. 394–401. [28] Y. Sheikh, M. Sheikh, and M. Shah, “Exploring the space
of a human actione,” in Proc. IEEE Int. Conf. on Comput.
[15] T. Zhao, T. S. Wang, and H. Y. Shum, “Learning a highly Vision, vol. 1, 2005, pp. 144–149.
structured motion model for 3D human tracking,” in Proc.
Asian Conf. Computer Vision, Melbourne, Australia, 2002, [29] C. Rao and M. Shah, “View−invariance in action recognition,”
pp. 144–149. in Proc. IEEE Conf. on Computer Vision and Pattern Recog-
nition, vol. 2, 2001, pp. 316–322.
[16] C. Bregler, “Learning and recognizing human dynamics in
video sequences,” in Proc. IEEE Conf. Computer Vision and [30] M. Blank, L. Gorelick, E. Shechtman, M. Irani, R., and Basri,
Pattern Recognition, San Juan, Puerto Rico, 1997, pp. 568– “Actions as space−time shapes,” in Proc. IEEE Int. Conf. on
576. Comput. Vision, vol. 2, 2005, pp. 1395–1402.
[17] H. Sidenbladh and M. Black, “tochastic tracking of 3D human [31] J. C. Niebles, H. Wang, and L. Fei−Fei, “Unsupervised
figures using 2D image motion,” in Proc. European Conf. learning of human action categories using spatial−temporal
Computer Vision, Dublin, Ireland, 2000, pp. 702–716. words,” Int. J. Comp. Vis., vol. 79, no. 3, pp. 299–318, 2009.
[18] D. G. Lowe, “Fitting parameterized 3−D models to images,” [32] M. S. Ryoo and J. K. Aggarwal, “Spatio−temporal relationship
IEEE Trans. Pattern Anal. Machine Intell., vol. 13, pp. 441– match: Video structure comparison for recognition of complex
450, 1991. human activities,” in Proc. IEEE Int. Conf. on Comp. Vision,
2009, pp. 1593–1600.
[19] J. Hoshino, H. Saito, and M. Yamamoto, “A match moving
technique for merging CG cloth and human video,” J. Visu- [33] L. Zelnik−Manor and M. Irani, “Event−based analysis of
aliz. Comput. Animation, vol. 12, no. 1, pp. 23–29, 2001. video,” in Proc. IEEE Conf. on Comp. Vision and Pattern
Recognition, vol. 2, 2001, pp. 123–130.
[20] J. E. Bennett, A. Racine−Poon, and J. C. Wakefield, “Mcmc
for nonlinear hierarchical models,” in Markov Chain Monte [34] A. Wiliem, V. Madasu, W. Boles, and P. Yarlagadda, “Context
Carlo in Practice, W. R. Gilks, S. Richardson, and D. J. space model for detecting anomalous behaviour in video
Spiegelhalter, Eds. U.K.: Chapman and Hall, 1996, pp. 339– surveillance,” in Proc. IEEE Int. Conf. on Information Tech-
357. nology: New Generations, 2012, pp. 18–24.
[21] M. Isard and A. Blake, “CONDENSATIONconditional den− [35] A. Veeraraghavan, R. Chellappa, and A. Roy−Chowdhury,
sity propagation for visual tracking,” Int. J. Comput. Vis., “The function space of an activity,” in Proc. IEEE Conf. on
vol. 29, no. 1, pp. 5–28, 1998. Comp. Vision and Pattern Recognition, vol. 1, 2006, pp. 959–
968.
[22] T. B. Moeslund, A. Hilton, and V. Krger, “A survey of
advances in vision−based human motion capture and analysis,” [36] R. Lublinerman, N. Ozay, D. Zarpalas, and O. Camps, “Pa−
Comput. Vis. Image Understanding, vol. 104, pp. 96–126, rameterized modeling and recognition of activities,” in Proc.
2006. Int. Conf. on Pattern Recognition, 2006, pp. 347–350.
477
[37] C. Chen, A. Heili, and J. M. Odobez, “A joint estimation [51] Y. A. Ivanov and A. F. Bobick, “Recognition of visual
of head and body orientation cues in surveillance video,” in activities and interactions by stochastic parsing,” IEEE Trans.
Proc. IEEE Int. Conf. on Comp. Vision Workshops, 2011, pp. Pattern Anal. Machine Intell., vol. 22, no. 8, pp. 852–872,
860–867. 2001.
[38] S. Park and J. K. Aggarwal, “A hierarchical bayesian network [52] D. Moore and I. Essa, “Recognizing multitasked activities
for event recognition of human actions and interactions,” from video using stochastic context−free grammar,” in Proc.
Multimedia Systems, vol. 10, no. 2, pp. 164–179, 2004. Nat. Conf. on Artificial intelligence, 2002, pp. 770–776.
[39] P. Natarajan and R. Nevatia, “Coupled hidden semi markov [53] A. S. Ogale, A. Karapurkar, and Y. Aloimonos, “View−
models for activity recognition,” in Proc. IEEE Workshop on invariant modeling and recognition of human actions using
Motion and Video Computing, 2007. grammars,” in Proc. ECCV Workshop on Dynamical Vision,
2006, pp. 115–126.
[40] C. hao Wang, Y. Wang, and L. Guan, “Event detection and
[54] S. W. Joo and R. Chellappa, “Recognition of multi−object
recognition using histogram of oriented gradients and hidden
events using attribute grammars,” in Proc. Int. Conf. on Image
markov models,” in Proc. Int. Conf. on Image Analysis and
Processing, 2006, pp. 2897–2900.
Recognition, 2011, pp. 436–445.
[55] N. Rota and M. Thonnat, “Activity recognition from video
[41] N. T. Nguyen, D. Q. Phung, S. Venkatesh, and H. H. Bui, sequences using declarative models,” in Proc. European Conf.
“Learning and detecting activities from movement trajectories on Artificial Intelligence, 2000, pp. 673–680.
using the hierarchical hidden markov models,” in Proc. IEEE
Conf. on Comp. Vision and Pattern Recognition, vol. 2, 2005, [56] G. Medioni, I. Cohen, F. Bremond, S. Hongeng, , and
pp. 955–960. R. Nevatia, “Event detection and analysis from video
streams,” IEEE Trans. Pattern Anal. Machine Intell., vol. 23,
[42] D. Zhang, D. Gatica−Perez, S. Bengio, and I. McCowan, no. 8, pp. 873–889, 2001.
“Modeling individual and group actions in meetings with
layered hmms,” IEEE Trans. on Multimedia, vol. 8, no. 3, [57] S. Hongeng, R. Nevatia, and F. Bremond, “Video−based event
pp. 509–520, 2006. recognition: activity representation and probabilistic recog−
nition methods,” Comp. Vis. Image Understanding, vol. 96,
[43] P. Dai, H. Di, L. Dong, L. Tao, and G. Xu, “Group interaction no. 2, pp. 129–162, 2004.
analysis in dynamic context,” IEEE Trans. on Systems, Man,
and Cybernetics, Part B, vol. 38, no. 1, pp. 275–282, 2008. [58] D. Chen, J. Yang, and H. D. Wactlar, “Towards automatic
analysis of social interaction patterns in a nursing home en−
[44] A. Gupta and L. S. Davis, “Objects in action: An approach vironment from video,” in Proc. ACM SIGMM Int. workshop
for combining action understanding and object perception,” in on Multimedia information retrieval, 2004, pp. 283–290.
Proc. IEEE Conf. on Comp. Vision and Pattern Recognition,
2007, pp. 1–8. [59] A. Francois, R. Nevatia, J. Hobbs, and R. Bolles, “Verl: An
ontology framework for representing and annotating video
events,” IEEE Trans. on MultiMedia, vol. 12, no. 4, pp. 76–
[45] G. Lavee, A. Borzin, E. Rivlin, and M. Rudzsky, “Building
86, 2005.
petri nets from video event ontologies,” in Proc. Int. Symp.
Vis. Comput., 2007, pp. 442–451.
[60] C. Neustaedter, S. Greenberg, and M. Boyle, “Blur filtration
fails to preserve privacy for home−based video conferencing,”
[46] A. Borzin, E. Rivlin, and M. Rudzsky, “Surveillance inter− ACM Trans. on on Computer-Human Interaction, vol. 13,
pretation using generalized stochastic petri nets,” in Proc. Int. no. 1, pp. 1–36, 2005.
Workshop Image Anal. Multimedia Interactive Serv., 2007.
[61] A. Senior, S. Pankati, A. Hampapur, L. Brown, Y. Tian, and
[47] M. Albanese, V.Moscato, R. Chellappa, A. Picariello, P. T. A. Ekin, “Blinkering surveillance: enabling video surveillance
V. S. Subrahmanian, and O. Udrea, “A constrained proba− privacy through computer vision,” IEEE Security and Privacy,
bilistic petri−net framework for human activity detection in vol. 3, no. 5, pp. 50–57, 2005.
video,” IEEE Trans. Multimedia, vol. 6, pp. 982–996, 2008.
[62] E. Newton, L. Sweeney, and B. Malin, “Preserving privacy
[48] M. Brand, “Understanding manipulation in video,” in Proc. by de−identifying facial images,” IEEE Trans. on Knowledge
Int. Conf. on Automatic Face and Gesture Recognition, 1996, and Data Engineering, vol. 17, no. 2, pp. 232–243, 2005.
pp. 94–99.
[63] J. Schiff, M. Meingast, D. Mulligan, S. Sastry, and K. Gold−
[49] M. S. Ryoo and J. K. Aggarwal, “Recognition of composite berg, “Respectful cameras: Detecting visualmarkers in real−
human activities through context−free grammar based repre− time to address privacy concerns,” in Proc. IEEE/RSJ Inter-
sentation,” in Proc. IEEE Conf. on Comp. Vision and Pattern national Conference on Intelligent Robots and Systems, 2007,
Recognition, 2006, pp. 1709–1718. pp. 971–978.
[50] C. D. L. Higuera, “Current trends in grammatical inference,” [64] W. Zhang, S. ching S. Cheung, and M. Chen, “Hiding privacy
in Proc. Joint IAPR Int. Workshops on Adv. in Pattern information in video surveillance system,” in Proc. IEEE Intl.
Recognition, 2000, pp. 28–31. Conf. on Image Processing, 2005, pp. 868–871.
478
2014 28th International Conference on Advanced Information Networking and Applications Workshops
Abstract— The number of smart devices around us grows more lead to the creation of new business models as well. In such a
and more every day, and with it the need to interface them in scenario, companies must get used to the idea of sitting down
order to share data and activate functions. Each day, new and cooperating at a “virtual table”. Web-based platforms
scenarios and new applications emerge to make our lives easier can create the basis for partners to extend or supplement
in many different contexts. The race towards realizing a true what they offer in completely new ways.
Internet of Things (IoT) paradigm has already begun, and by The Internet of Things is however not just a distant vision
now such reality is at hand. The work presented herein aims to of the future – it’s already here and is having an impact on
offer a practicable, scalable solution for fulfilling many of the more than just technological developments.
promises of the Internet of Things, even in contexts rendered
Every device that connects to the Internet requires an IP
problematic by the continuing presence of closed proprietary
address, and it has been predicted that by the year 2020 there
systems, lacking any compatibility with Internet protocols,
such as the home automation industry. Starting with a major
will be 50-100 billion Internet-enabled devices in a world [3]
contribution by our laboratory to the field of interoperability with an expected global population of 7.6 billion people.
among natively incompatible domotic technologies, a software Considering that, according to a survey of urban
module has been developed to enable any and all home environments, each human being is surrounded by 1000 to
automation devices to interface and interact via the IPv6 5000 trackable objects [4], the move to IPv6 [5] is necessary,
network protocol. Each and every home automation device can as it provides a almost unimaginable number of IP addresses
thereby interact actively with the surrounding world, as it has — 18 quintillion blocks of 18 quintillion possible addresses.
been made reachable through its own IPv6 address that Domotics, or home automation in a so-called “Smart
identifies it uniquely on the Internet. The proposed system Home” involves the controlling and monitoring of home
thereby advances users’ ability to take full advantage of the appliances in a unified system. Such control systems include
benefits offered by the new IoT vision of the world. lighting, climate control (HVAC: Heating, Ventilation, and
Air Conditioning), security systems and even home
Keywords- IPv6; Interoperability; Web services; Internet of electronics. Home automation is closely related to
Things, Ambient Intelligence, Digital Ecosystem (industrial) building automation, which focuses on the
automation of large commercial buildings.
I. INTRODUCTION There are many different types of home automation
Although the Internet has already fundamentally changed systems available. These systems are typically designed and
society [1], the greatest transformation still lies ahead of us. purchased for different purposes. In fact, one of the major
Several new technologies are now converging in a way that problems in the area is that these different systems are
sets the Internet on the brink of a true revolution, as billions neither interoperable nor interconnected. These systems
of large and small objects are connected and take on their range from simple remote-controlled light switches to fully
own Web identity. integrated, networked devices controlling all appliances in an
Following on from the Internet of computers, the next entire building.
phase of development is the Internet of Things [2], when Home automation is an extremely appealing application
more or less everything will be connected and managed in of the Internet of Things. It envisions a future home
the virtual world. This transformation will be the Net’s environment where embedded sensors and actuators (e.g., in
largest expansion ever and will have sweeping effects on consumer electronic products and systems) are self-
every industry, and all of our everyday lives. configuring and can be controlled remotely through the
In fact, in the near future, more and more devices and Internet, enabling a variety of monitoring and control
systems will be capable of sending and receiving data applications. Such communication capabilities are often
automatically via the Internet. This new scenario involves offered by manufacturers of domotic systems, though
new developments with enormous potential, for example, in without Internet compatibility. In fact, each manufacturer
business markets. Indeed, the Internet of Things (IoT) will produces its own special device called an IP gateway that
enable connecting market participants and sectors that enables physically interfacing a proprietary domotic bus with
previously had no business dealings with one another. This an IPv4-enabled Ethernet socket. By connecting the IP
will generate new products and services, which will in turn gateway to the Internet, either directly or through a home /
810
of interfacing on a IPv6 network any home device regardless By exploiting the DomoML language, DomoNet
its belonging technology. constructs a technologically uniform view of all the devices
available on the network and their functions. In this context,
III. DOMONET FRAMEWORK all differences between domotic systems are leveled, making
Nowadays, the many domotic systems crowding the DomoNet able to interact with any and all devices using this
market are rarely interoperable and thus do not permit single high-level language alone. In this way, DomoNet
consumers to choose devices according to their requirements mediates the interactions between two or more different
or other relevant criteria, such as cost, performance, trends devices belonging to different domotic systems in order to
and confidence, instead of being constrained by issues of render them interoperable. DomoML in fact defines and
compatibility with their pre-existing systems. The current constitutes a new control layer, which can be viewed as a
lack of interoperability is due to the fact that current market meta-infrastructure of high-level services. This logical
practice effectively binds consumers to proprietary infrastructure binds several single domotic systems together
technologies, thereby forcing them to purchase only devices to provide them with common information exchange and
conforming to a specific manufacturer’s system to enjoy full control mechanisms.
interoperability. To date, no domotic technology has
emerged as a de facto standard in the industry.
To tackle this issue, our laboratory has created a digital
“ecosystem” called DomoNet [7]. DomoNet is an open-
source software application released under the GPL license
that takes advantage of W3C-recommended standard Web
technologies such as Web Services, SOA and XML. The
advantage to using W3C standard solutions is that it ensures
that applications are fully compatible with other standards-
based software and are not tied to any particular software
system, programming language or computer architecture.
DomoNet has been coded using the Java language and open-
source libraries and tools. It offers significant benefits in Figure 1. DomoNet architecture
terms of interoperability by means of a middleware
infrastructure offering a high level of abstraction and a At the time of system configuration, DomoNet assigns to
comprehensive approach to addressing technology each device detected by the TechManagers a unique id and
mismatches directly through the use of ad hoc mappings of the URL of its managing Web service, so that it can be
different proprietary standards. addressed from both within and outside the framework. By
The core of DomoNet consists of middleware based on exploiting the DomoNetWS Web services mechanism in a
the Web Services and Service Oriented Architecture (SOA) standard fashion, it is possible to remotely interact with
[13] paradigms, in which the services correspond to the devices regardless of the various different underlying
functionalities offered by the devices. domotic technologies. In fact, the Web services can provide a
The core of the DomoNet framework is represented by list of all the devices belonging to a DomoNet network,
domoNetWS a WebServices-based engine whose task is to recognize their available functions, and invoke them.
enable true cooperation between nodes. It constructs a The TechManagers represent the connecting links
unique view of the system, including all the devices interfacing the domotic systems with the DomoNet core.
belonging to all the different domotic systems available Each TechManager implements all the functions necessary
through a set of modules that act as gateways, called for DomoNetWS to manage a domotic system and provide
TechManagers, to deal with specific domotic systems. customized services. One important service permits
Figure 1 shows a schematic representation of the DomoNet interactions with devices by implementing the functions of
architecture. an out-and-out gateway using, on the one hand, DomoML,
To implement interoperability, DomoNet defines a when the communication is with DomoNet, and on the other,
standard language, called DomoML, for the semantic the language of the specific domotic system, when the
abstraction of heterogeneous systems in order to describe communication is with the domotic bus. A translation service
device functions, data types, messages and models of the is moreover provided for sharing information between these
interactions and communications among framework entities. two languages. Other important TechManager services
It represents a sort of universal domotic language to be include discovering devices and their functions, submitting
applied in any domotic context. commands, receiving notifications regarding system states,
DomoML consists of two main formalisms: and so on. The implementations of these various
• domoDevice: defines devices and their functions. In TechManager services differ from one to the next, as they
particular, it describes the characteristics of a device, its are strictly dependent on the underlying domotic technology.
location, functions (services) and the processes by which Extending DomoNet to support a new domotic system
interactions with other domoDevices must take place. requires simply adding a new TechManager. DomoNet
• domoMessage: formally describes events, commands provides well-documented class interfaces and APIs to
and responses. facilitate this process.
811
IV. THE IPV6 GATEWAY Linux machine, for instance, the ip command line is
Exploiting the peculiar feature of the DomoNet invoked to obtain the network prefix field and assign an
framework, that is, its ability to provide a uniform system address to the network interface;
view of networked devices implementing different • an interface identifier, which distinguishes the host
technologies, the aim of this work is to develop a module to network interface. This can be created randomly by the
make domotic devices compliant with IoT objectives. This is server machine itself. If combining the prefix with the
made possible by DomoNet’s inherent provisions for interface identifier leads to the generation of an already
interoperability. existing IPv6 address, a Duplicate Address Detection
To this end, IPv6 protocol support is a sine qua non. The error of the NDP protocol results.
software solution developed is perfectly scalable and
immediately adoptable without the need for hardware or
hybrid solutions that may require direct device alterations,
which can in general be risky and difficult for non-
specialized users. Moreover, modifying the hardware of a
large number of devices can be very demanding, especially
when some are not physically accessible.
The proposed software solution provides the DomoNet
framework with IPv6 protocol support, in particular it aims
to:
• link together each DomoNet device via an IPv6 address
using a mapping scheme. This function creates a
correspondence between the DomoNet and IPv6
addressing systems, which enables translating the
address from one representation to other bi-
directionally; Figure 2. IPv6 address assignment
• make each domotic device managed by the DomoNet
framework reachable anywhere and any way through an When a new device signals its entry into the DomoNet
IPv6 address. Obviously, all IPv6 addresses associated network (Figure 2) its associated TechManager creates the
to domotic devices must be globally valid, unique and corresponding DomoDevice. The DomoDevice formal
fully compliant with IPv6 rules; representation of the device is sent to the DomoNet server,
which assigns it both a DomoNet and an IPv6 address,
• implement a dedicated MVC (Model View Controller) thereby providing dual identification. In doing so, the
[14] Web interface for each domotic device. This DomoNet server compiles a bi-directional map in order to
interface, which must be reachable using the device’s enable identification of address correspondences. The choice
IPv6 address, displays each device’s status and available of providing this dual representation ensures backward
functions. compatibility with the applications and services previously
created for the DomoNet ecosystem.
In general, a set of different instances of DomoNet can Figure 2 illustrates a scenario in which the DomoNet
co-exist in the same or different environments. When two or server receives an IPv6 request from outside its network.
more DomoNet instances co-exist, they can share the same When an IPv6 request is forwarded by a resource belonging
devices. By way of example, it is possible to have one to the Internet of Things, the DomoNet server responsible for
instance of DomoNet at home and another at work. These the requester’s address responds. The mapping scheme is
two instances can cooperate and share values and functions. then used to find the correspondence between the IPv6
In this way, DomoNet enables, for example, switching a light address and the DomoNet address and identify the correct
off at the office using a push button at home, even if the two device involved. To process the request, the DomoNet server
domotic systems implement different technologies from forwards it to the proper TechManager, which then translates
different manufacturers. the request to a formalism that the device can process and
As shown in Figure 1, each DomoNet instance is made queries the device involved. The device’s response is
up of a server at the core of the architecture, and a set of delivered to the TechManager and, after the DomoML
TechManagers, which interface the heterogeneous translation process, is forwarded to the DomoNet server,
technologies. which finally sends it to the requester.
The solution presented requires assigning a set of global
IPv6 addresses to each machine running an instance of the V. THE PROTOTYPE
DomoNet server. Each IP address in the set, created by the
DomoNet server machine itself, must include two main fields To test the prototype developed, an instance of DomoNet
in order to be valid: equipped with the IPv6 gateway has been set up and running
in a simulated home environment in our demo lab.
• a prefix that it is used for routing purposes. This can be
The home automation technologies involved in the test
achieved by exploiting OS functions and apis. On a
are KNX, UPnP, ByMe and MyHome. Although these
812
technologies are different and cannot therefore interact end, JavaBean, JSP and Servlet technologies [16] have been
natively, DomoNet provides a unique view of the entire adopted in the test and applied under the constraints of the
system and is able to make them interoperate. MVC [14] paradigm. In this way, the Web server responds to
The DomoNet server with IPv6 gateway is executed on a requests with Web interfaces customized to each device,
common PC with two network cards to enable it to connect which are invoked using the device’s IPv6 address directly.
simultaneously to (figure 3): When a Web request originates from the Internet, Tomcat
responds because it shares the same set of IPv6 addresses as
DomoNet. The request is received by a servlet, which reads
the address of the device involved in the communication
from the requester URL. Using the IPv6DomoNet mapping,
DomoNet then identifies the device and queries it in order to
obtain the information needed to satisfy the request. To
display the results on a Web page, the DomoNet server
creates a JavaBean to represent the device involved and fills
it with the needed data. Tomcat takes the completed
JavaBean as input and shows the result through a JSP.
813
IPv6 capabilities even to domotic systems unable to interact REFERENCES
natively via IP protocols. [1] C. Fuchs, "Internet and society: Social theory in the information age.
To such aim, the software solution developed enables a Routledge", 2013.
unique IPv6 address to be assigned to each domotic device [2] L. Atzori, A. Iera and G. Morabito, "The internet of things: A survey"
on the DomoNet network, thereby making all remotely Computer Networks, 54(15), pp. 2787-2805, 2010.
accessible directly via the Web. A newly implemented Web [3] B. Emmerson, “M2M: the Internet of 50 billion devices”, WinWin
server mechanism handles the Internet-based information Magazine, pp. 19-22, 2010.
flow, allowing for direct interaction with each device. [4] J. B. Waldner, “Nanoinformatique et intelligence ambiante. Inventer
l'Ordinateur du XXIeme Siècle”, London: Hermes Science. pp. p254,
2007, ISBN 2-7462-1516-0.
[5] A. J. Jara, P. Moreno-Sanchez., A. F. Skarmeta, S. Varakliotis, and P.
Kirstein, “IPv6 Addressing Proxy: Mapping Native Addressing from
Legacy Technologies and Devices to the Internet of Things (IPv6)”
Sensors, 13(5), 6687-6712, 2013.
[6] Z. Wei, J. Li, Y. Yang, D. Jia, “A residential gateway architecture
based on Cloud computing”, Software Engineering and Service
Sciences (ICSESS), 2010 IEEE International Conference on, vol., no.,
pp.245,248, 16-18 July 2010, doi: 10.1109/ICSESS.2010.5552422
[7] V. Miori, D. Russo, and M. Aliberti. “Domotic technologies
incompatibility becomes user transparent”, Commun. ACM 53, 1
Figure 6. Response of the device function call January 2010, 153-157. DOI=10.1145/1629175.1629211Y.
[8] T.Y. Wu, C.C. Hsu, and H.C. Chao, “IPv6 Home Network Domain
The results obtained represent a first step in achieving Name Auto-configuration for Intelligent Appliances”, IEEE
Transactions on Consumer Electronics, Vol. 50, No. 2, pp. 491-497,
full integration of IPv6-based communications in domotic May 2004.
systems, and hence for realizing the promise of the Internet [9] L. van Moergestel, W. Langerak and J-J. Meyer, "Agents in Domestic
of Things. Environments," Control Systems and Computer Science (CSCS), 19th
Thanks to the flexibility of the DomoNet system, it can International Conference on , vol., no., pp.487,494, 29-31 May 2013,
be applied not only within homes, but also to all other doi: 10.1109/CSCS.2013.57
emerging fields where advanced automation is required but [10] M. Jung, J. Weidinger, W. Kastner, and A. Olivieri. “Heterogeneous
the necessary IPv6 support is lacking, such as Smart Cities, device interaction using an IPv6 enabled service-oriented architecture
for building automation systems”, In Proceedings of the 28th Annual
Smart Grid, Smart Lighting and transportation, in which ACM Symposium on Applied Computing (SAC '13). ACM, New
new and innovative services will be made possible. York, NY, USA, 1939-1941, 2013, DOI=10.1145/2480362.2480722
It is nevertheless to be hoped that in the near future [11] M. Jung, C. Reinisch, W. Kastner, “Integrating Building Automation
domotic manufacturers offer solutions that enable native Systems and IPv6 in the Internet of Things”, Innovative Mobile and
interaction with their with devices using standard Web Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth
protocols based on IPv6 in order to offer ever-more International Conference on , vol., no., pp.683,688, 4-6 July 2012
doi: 10.1109/IMIS.2012.134
advanced services and possibilities. The marketing
[12] S. Jeong, S. H. Kim; M. Ha; T. Kim; J. Yang; N. Giang; D. Kim,
considerations that limit the development of new, open “Enabling Transparent Communication with Global ID for the
technologies only for business reasons should be overcome Internet of Things” Innovative Mobile and Internet Services in
and be replaced by the adoption of open standards allowing Ubiquitous Computing (IMIS), 2012 Sixth International Conference
for fair competition based on the quality of services offered. on , vol., no., pp.695,701, 4-6 July 2012
Important future work regards the creation of useful doi: 10.1109/IMIS.2012.91
applications able to exploit all the benefits of adopting IPv6 [13] D. Guinard, V. Trifa, S. Karnouskos, P. Spiess, D. Savio, "Interacting
with the SOA-Based Internet of Things: Discovery, Query, Selection,
and the IoT paradigm. To this end, one important goal to and On-Demand Provisioning of Web Services," Services
pursue would be to assign each domotic device its own Computing, IEEE Transactions on , vol.3, no.3, pp.223,235, July-
personalized WSDL [17], which must be created Sept. 2010, doi: 10.1109/TSC.2010.3
dynamically, in order to export its functionality external to [14] T. Reenskaug, “Thing-Model-View-Editor–an Example from a
the DomoNet framework and thereby decentralize the current planning system”, Technical note, Xerox PARC, 1979.
DomoNet Web service support. [15] S. Nathan, S. S. Mohan, A. R., Harudas and K. Nisar, “BERKELEY
A further possible development is to decentralize the INTERNET NAME DOMAIN (BIND).”
entire DomoNet architecture in such a way as to create [16] D. Alur, D. Malks, J. Crupi, G. Booch and M. Fowler, “Core J2EE
virtual independent devices that act as agents able to Patterns (Core Design Series): Best Practices and Design Strategies.
Sun Microsystem, Inc., 2003.
cooperate with each other according to the Digital Ecosystem
[17] E. Christensen, F. Curbera, G. Meredith and S. Weerawarana, “Web
[18] architecture paradigm. Such an approach would further services description language (WSDL) 1.1”, 2001.
the realization of the concepts underlying the IoT paradigm
[18] G. Briscoe, “Complex adaptive digital EcoSystems”, In Proceedings
and promote a new model for thinking about the of the International Conference on Management of Emergent Digital
environment surrounding us and the objects contained EcoSystems (MEDES '10). ACM, New York, NY, USA, 39-46, 2010,
therein. DOI=10.1145/1936254.193
814
Simulation Platform for Domotic Systems
Abstract - The lack of a standard in the area of Automation has time [1]. In [2] Lazovik et al. claim that one of the greatest
led to all manufacturers and researchers to work in parallel on difficulties in the development of home automation
new technologies which have increased the heterogeneity of applications is that these systems are extremely difficult to test,
devices and drivers on the market. As a result, each because appropriate tests require a physical home dedicated just
manufacturer must provide the tools needed for the installation, for this purpose. In [3] Mateos et al. mention that a common
configuration and implementation of its technology. As a problem in automation and control is presented in the practice
consequence, different components of different brands have low or testing stage, because developers have to implement and test
compatibility. This paper presents a simulation platform which their designs using specialized devices control (such as micro
allows automated systems to evaluate a design without the need of
controllers or PLC) and in many cases, the use of scale models
physical implementation, regardless of the component
manufacturer. Furthermore, it increases the number of
or actual components is not possible, forcing to have to deal
components (software and hardware) that could be used as a with a large number of switches, leds, etc, which can lead to
controller, it supports multiple communication protocols, it confusion or reduce designer motivation. In [4] Lazovik et al.
provides 2D/3D views of simulated scenarios, and it is built using mention that one of the biggest challenges in home automation
free software. is the verification of the proposed solutions due to the high cost
of the components involved. This shows the need for generic
Keywords: Automation, simulation, virtual instrumentation, home tools to simulate and evaluate the designs without the need for
automation, smart home, pervasive computing, domotic. any implementation.
I. INTRODUCTION This paper is divided as follows. Section II provides a
Domotic is a set of elements that are installed, description of the state of the art. Section III describes our
interconnected and controlled by a central system for home simulation platform for domotic systems. Section IV describes
automation, providing energy management services, safety, the tests done to this work and the last section presents the
welfare and communication. The main objective is to improve conclusion and the future work.
quality of life for residential users by providing most daily
II. STATE OF THE ART
activities like turning on lights, open doors and windows.
Another goal is household resource management, for example One of the first works to address the issue of simulation of
water and gas, to make more efficient use of them. domotic design is VISIR [5]. VISIR is a software application
for Microsoft Windows that allow designing home automation
Pervasive computing is defined as the integration of installations and carrying out the simulation of the same in
computers in the environment of people, so that computers or direct connection with the series PLCs SIMATIC S5 and
controllers are not perceived as distinct objects. Domotic is SIMATIC S7-200 from Siemens, responsible for inspection of
included as an area of pervasive computing. the facility given. This paper focuses on the states of
The first problem associated with automated systems is the programming and debugging the system and notes that most of
lack of a standard to coordinate the efforts of the main this work is done in a laboratory at a stage prior to the physical
manufacturers towards common goals. As a consequence of system installation. Although there are several tools for this
that, there are multiple parallel developments increasing the purpose, they have several limitations about aspects such as
diversity of elements in automation based systems. This their cost, the proximity to the real systems, the development
increases the complexity of testing because a system can be time, the flexibility to build different systems, the connectivity
composed of different elements which use different protocols between devices, and the maintenance. These limitations make
of different brands or suppliers. Another of the problems necessary to develop an application for such tasks. The VISIR
associated with automation is the lack of means to evaluate the system allows using objects which are grouped into nine
system performance without the need of physical categories according to their characteristics: flat objects (leak
implementation, which increases costs and does not identify sensor, water solenoid), gas, irrigation, fire, intrusion, lights,
problems in the design stage. For these reasons it is very connect (switches, washing machines), 'sunshade' (rain sensors,
common to find statements like: Test and verify the anemometers), other (displays).
performance of services in pervasive computing systems is In [4] is done a description of one of the most common
highly expensive and prone to errors, also demands a lot of problem of Automation, the heterogeneity of all products on the
User Interfaces
Interaction
Views
Simulator
Abstract—Intelligent homes are nowadays equipped with all of lamps [5]. Also, methods have been proposed in order to
sort of smart devices for the control of appliances and domotic calculate the costs instead of directly metering [6].
applications. One of the main aims of these devices is, apart from In this paper, we present a smart lighting system that can be
the comfort of having automated systems, the efficient use of applied in smart homes, implemented experimentally on a
energy. This paper reports on the design and FPGA
implementation of a smart lighting system for application in
FPGA board and being capable of automatically adapting to
small smart homes. Unlike those systems using pervasive remote user needs and conditions, while requiring minimal field
controls, the proposed system is based on automatic detection of programming.
application conditions, and it requires minimum programming
by the end user. II. DESCRIPTION OF THE PROPOSED SYSTEM
Figure 1 shows the block structure of the system, which
Index Terms—FPGA, smart home, lighting automated control. was programmed using the Altera DE2 board, based on a
Cyclone II FPGA. A clock signal at 1Hz is generated in order
I. INTRODUCTION to regulate the operation of the entire system. Counters for
Usage of electricity is one of the most important issues in hours, minutes and seconds were synchronized and two buttons
the global concern about energy. At the domestic level, apart of the board are used to set the time, which is shown in a group
from electrical appliances such as fridges, cookers and washing of 7-segment displays.
machines, lighting is perhaps the main factor in power Programming of the timing for switching the lights on/off is
consumption and there have been a lot of research efforts accomplished by a second module on the system. Here, the
towards the reduction of its costs by means of smart devices user sets the times of the day in which automatic detection of
and systems. people will be operating. When the system is on, signals
Although there are many proposals for the automation of indicating the presence or traffic of people are used as inputs to
lighting in smart homes, it is clear that a balance must be made the control system, which in return will generate the outputs
between the prices of energy, the costs of smart devices and the controlling the state of the lamps.
actual comfort of users. Missaoui, Joumaa, Ploix & Bacha [1] Intelligence of the system is provided by another logic
report a recent study on a model that considers simultaneously module, in which counters, adders and subtractors keep a count
these perspectives. Also, it is always important to think about of people in every room, and this condition is evaluated
the real needs and living conditions of users before proposing a together with the timing programmed in the previous module.
smart home solution, i.e., a system that works well for a given This way, light in a room is on only when it is required by
application might not result suitable for other uses. people. Furthermore, deriving information from the sequence
Context-aware systems have been proposed both for the of activation of flip-flops in the counters, the system is capable
control of lighting [2] and for inference of family needs in to detect the direction of movements between rooms, which is
residential environments [3]. In effect, in order to have a real particularly critical in small houses, where rooms often share
“smart” system, it is desirable that the proposed system is able areas for communication between them.
to “learn” from the context or environment and from the usage
patterns of the inhabitants of a house or a building. This is one
of the ideas behind the system proposed in this paper.
Different attempts to reduce the costs of electricity have PROGRAMMABLE INTELLIGENT INPUT – OUTPUT
DIGITAL CLOCK TIMER FOR DETECTION
been made, such as the sophisticated model proposed by GENERATOR SYSTEM OF LIGHTING
ASSIGNMENTS
AND CONTROL
Zhang, Liu & Papageorgiou [4] for the distribution of costs ENABLING NEEDS
among sets of smart homes with microgrids, and other more
conventional studies about energy efficiency of different types
Fig. 1. Logic structure of the lighting control system.
419
1569952859
Figure 2 shows the schematic of a circuit detecting the board. The system proved to be functional when adapted to the
conditions for the use of a lamp, depending on the counts of needs of a family in a small home. Programming required by
people entering and leaving the room, the time at which the end users is minimal and the operation of the system is
movement occurs, and the direction of traffic. adjusted automatically depending on the conditions of use.
The last block in the system diagram corresponds to the Practical implementation for actual smart home operation
inputs and outputs. Assignment of pins depends on the number would require a small PCB with the FPGA, a few
of rooms and lamps of a given application, which is limited in programming buttons, 7-segment displays and additional
this design to the availability of ports in the expansion headers interfaces for inputs (sensor signals) and outputs (light
of the Altera DE2 board. switching signals).
420
A ZigBee Wireless Domotic System
with Bluetooth Interface
Eurico Leite, Luis Varela, V. Fernão A. J. Pires João F. Martins
Pires, and Filipe D. Cardoso ESTSetúbal, IPS and CTS-UNINOVA FCT/UNL and CTS-UNINOVA
ESTSetúbal, IPS Portugal Monte de Caparica
Estefanilha, Portugal Portugal
Abstract— In this paper a wireless home automation system is As the number of devices grows, there is a possibility that
presented. The proposed system allows controlling devices in a inefficient management may occur. This is viewable in
home environment by using a simple Bluetooth equipped mobile appliances that are always on, regardless of having a standby
phone. The mobile phone communicates with a main mode or not, wasting power. Besides this, there is also the
Bluetooth/ZigBee module that communicates with the different matter of knowing which remote controller is associated with
ZigBee modules acting as the coordinator of the ZigBee network each device. Regarding compatibility it’s important that all
established between all nodes where electrical devices are devices are interoperable preventing spending time controlling
connected. The identification of each device is made through each one of them.
DomoML strings by using the KNX home automation standard
protocol. Thus, for appropriate monitoring and control all the devices
could be linked to a central automatic system that will handle
Keywords—Home automation; Smart homes; Low-power events activating devices, as they are needed. With this system,
electronics; Zigbee; Bluetooth power consumption can be reduced whereas resources are more
efficiently used. Moreover, the tenant can check all the data
I. INTRODUCTION
about the devices in a single place locally or remotely through
In recent years home automation has became an important a mobile device like a laptop, a mobile phone or a Personal
issue with increasing dissemination degrees in the future. This Digital Assistant (PDA).
technology allows tenants to manage the internal home
environment. Home automation is nowadays a key concept On the other hand, safety is also an important factor. The
regarding home energy efficiency improvement [1]. system must be protected against unauthorized accesses and at
the same time, allow monitoring the status of every device in
The evolution of low-power electronics and wireless based the house therefore improving security and allowing to identify
systems has given mankind the possibility of being more possible malfunctioning of given equipments.
demanding regarding his well-being without no significant
need for expensive investments. In the area of home From the business point of view wireless sensors networks
automation there are three basic features that need to be are not yet too much developed. The large variety of protocols,
addressed: comfort, efficiency and safety. These basic standards and solutions makes them confusing for potential
requirements of home automation are commonly known as investors [12]. In the literature one can find a considerable
building intelligence control. Following this evolution, homes number of research papers that discuss the existing wireless
have been improving in order to satisfy these needs. With the home automation technologies [13][14]. Amongst those
recent interest in low-cost wireless networks it is now possible technologies one can consider, ZigBee [16], Z-Wave,
to have small, energy-efficient electronic devices that can Bluetooth, 6LoWPAN, Insteon, Wavenis, UWB, Wi-Fi, X10,
monitor and control heating, air conditioning, lights, food KNX, LON, Powerelink or EnOcean, just to name a few.
preparation, entrance gates, security systems and appliances Several ZigBee based home automation systems have been
without any special wiring. presented just recently [3][4][5][17]. This technology usually
Home automation, specifically wireless home automation, implies the use of WiFi if the tenant wants to have wireless
presents several applications and advantages to home tenants. access to the system. Likewise, technologies like Bluetooth
Amongst the several applications one can consider light and were also applied to the home automation [2][6][18]. From a
HVAC control, surveillance, smart door lock and automated scalability point of view, there is a strict limitation of number
security system, electrical appliances control, water supply and of home equipments attachable to the Bluetooth master device
irrigation, smart metering and energy management. Users will due to the characteristics of the protocol. However the
benefit from wireless home automation systems, particular in Bluetooth protocol could be a good solution in the absence of a
energy savings, improved security and occupant safety, better WiFi network. On the other hand, the power consumption of
comfort and living conditions, reduced equipment maintenance Zigbee or Bluetooth devices is almost ten times lower than
and operational costs, increased equipment’s lifetime and WiFi devices. Some solutions integrate traditional wired
environmental gains. solutions with wireless ones, being [7] a good example on
using a KNX-ZigBee gateway for home automation. However,
k,(((
future home automation systems should discard intrusive Bluetooth devices are categorized in three power classes:
cabling throughout home. This paper puts together Bluetooth, class 1 (100 mW), class 2 (2.5 mW), which is the most
ZigBee and KNX in order to get the best of each technology common, and class 3 (1 mW) being rarely used. Datarates,
for the tenant’s well being. depending on the standard version, can go up to a few Mbps,
which is enough for most voice and low datarate applications.
In this paper, a wireless home automation system is The main drawback of Bluetooth is its low energy efficiency
proposed. The system allows controlling and monitoring and the maximum number of devices that it can support
electrical equipment by using a simple Bluetooth equipped simultaneously – a maximum of 7 devices is allowed.
mobile phone. The wireless home network is implemented with
wireless ZigBee modules that communicate centrally with a Instead, ZigBee devices are intended to be energy-efficient
Bluetooth ZigBee Central Module. The standard used for while providing datarates from several tenths to a few hundreds
communication between the different equipments using the of kbps while allowing connecting 65000 devices
ZigBee network is Konnex (KNX), a worldwide standard for simultaneously. Typical coverage range varies from a few
home and building control applications. The proposed system meters to several kilometers depending on the transmitting
allows easy Plug-and-Use addition and removal of devices. power, antennas and frequency band. Additionally, different
Integrating the proposed system into other home automation sleeping modes are possible therefore allowing energy
networks is also considered since Domotics Markup Language efficiency improvement. However, the structure of the
(DomoML) strings are used to ensure interoperability. established network limits the number of nodes, as well the
amount of traffic [21]. This makes Zigbee more suitable for
DomoML is a mark-up language aimed at the definition of home automation applications.
interoperability standard for domestic use. DomoML is the
glue which allows different home automaton systems to be B. Konnex Standard
interfaced since a semantic layer is defined on which novel There are more than 15 standard protocols related with
value-added services (agents) can easily be built. building’s communication. Some standards covering the
One last remark regarding available commercial home buildings communication issues are: BACNet (CEN EN ISO
automation solutions. There is an increasing number of home 16484-5), LonWorks (CEN EN 14908, ISO/IEC 14908-1),
automation and smart home control devices and systems (a KNX (CENELEC EN 50090, CEN EN 13321-1 ISO/IEC
quick internet query reports a huge number of commercial 14543-3) or ModBus, just to name a few.
solutions). However, those solutions are becoming more and Konnex (KNX) [10] resulted from the convergence of three
more sophisticated, using WiFi protocols and considering entities in the European market, which emerged in the early
PDAs, tablets or smartphones as preferred human-machine 90s. These are the European Installation Bus Association
interfaces. Regular Bluetooth mobile phones are no longer (EIBA), who has achieved great success in Germany and
considered. Thus it is important to consider wireless home northern Europe, the Batibus Club International (BCI), which
automation systems that not depend exclusively on WiFi is well established in Italy and Spain and the European Home
protocols and/or smartphone like devices. System Association (EHSA).
This paper is structured as follows. The system’s adopted In order to unify these systems on the market for intelligent
technologies are briefly described in Section II. The proposed homes the Konnex Association was created, in 1999. Given
system architecture and its operation are detailed in section III. that those different systems had their own manufacturing
In Section IV, different network devices are described in detail. partners, the need arose to create a single system encompassing
Implementation results and tests are presented in Section V. the areas of operation. Thus, to achieve interoperability of
Finally, in section VI, conclusion and final remarks are equipment from various manufacturers, the KNX becomes part
presented. of the control features in a widely varied set of devices for
II. ADOPTED TECHNOLOGIES various fields.
The proposed system incorporates different technologies Due to the fact that KNX is considered one of the most
that are based on already well known standards, used in promising standards in home automation systems, several
numerous consumer electronics devices and products. researchers proposed security mechanisms [22] and the
introduction of ambient intelligence mechanisms [22].
A. Wireless Standards
C. DomoML
Two different technologies are adopted, IEEE 802.15.1 [8]
and 802.15.4 [9], commonly known as Bluetooth and ZigBee Presently, there are a variety of different systems in a home
respectively. The ten years old Bluetooth standard is already such as the water system or the media system. Each of them
widely supported in most mobile devices and computers controls their own devices and specifications. However, most
whereas ZigBee is best suited for sensor and monitoring of these systems are heterogeneous which means that they
applications, thanks to its low power consumption, improved can’t “speak the same language”. It could be interesting if all
coverage range, low datarates (on the order of a few hundreds the systems could understand one another in order to provide a
of kbps) and low equipment cost. There are a lot of home real home system.
automation Zigbee applications, raging from security to light or In order to solve the interoperability between devices from
HVAC control [19][20][15]. heterogeneous systems, reference [11] proposes a new service
orientated architecture named DomoNet (Domotic Network). It
works based on the functionalities offered by the different
devices and consists in different network servers (WebServices
based) that identify a device and forwards the messages to a set
of modules known as TechManagers which are interfaced to
the different home automation systems.
The process of identifying the device and its function is
made by a universal language (DomoML) based on XML and
is used to describe messages and devices in the network. It
consists of two essential parts: domoDevice, which identifies
the network device through four levels of identification
(device, service, input or linkedService, allowed or
linkedInput), and domoMessage, which describes the
interactions between devices with two levels of identification
(message and input). Fig. 2. System architecture.
In the proposed system, DomoML is intended to describe
devices in a homogeneous and universal way, as presented in In order to access the system, a mobile device with a Java
Figure 1. This enables the user to update a database of devices application is used to interact with the network, allowing the
without any substantial changes to the source code. tenant to properly access and monitor different equipments.
However, there is still the possibility of gaining limited access
to the units through a portable standalone Remote Control Unit
(RCU).
The RCU allow controlling SU and DU, therefore, serving
as a backup solution for controlling different devices when the
mobile device is not available. Its use is limited since it can
only send control actions to SU and DU, monitoring is not
possible.
It should be underlined that any mobile phone with the
required Java application can be used, therefore improving the
flexibility of the developed system.
The SU is an interface that allows ON/OFF switching of a
Fig. 1. DomoML device description.
set of given devices. The DU has the possibility of changing
the device’s applied voltage, therefore being particularly suited
for lighting control, amongst any others possible applications.
The identification of each device or set of devices in the
proposed network is specified by a KNX address, as stated As an alternative, a RCU can be used to access the ZigBee
before, and presented in Table I. network if a mobile device is not available.
The mobile device communicates with the Bluetooth CU
TABLE I. EXAMPLE OF DEVICE ADDRESSES FOLLOWING THE KNX interface allowing control and monitoring actions that are sent
STANDARD.
and received from the SU or the DU. Information received
Device Address Group Address from the mobile terminal are processed by the CU. In the case
Mobile 0.1.1 of an unrecognized address (not in use by any active SU or
Coupling Unit 0.0.1 DU), the CU forwards the commands to a default gateway
(computer) via an RS-232 interface, making it available to
Switching Unit #1 0.0.2 1.0.0
other network, if other active networks are available.
Switching Unit #2 0.0.3 1.0.0
Dimming Unit 0.0.4 1.0.0 Valid addresses, the ones associated to active SUs and/or
Remote Unit 0.0.5 DUs, are accepted. The CU broadcasts the ZigBee network and
waits for reply from the SU or DU with the given specified
III. SYSTEM ARCHITECTURE address. Once the data is received by a SU or DU, it is checked
for validity and the corresponding switching or dimming
The proposed system was designed to be easy to install, command is activated.
flexible to use and modular. This means that is possible to
add/remove units while the system is operating without any IV. NETWORK ELEMENTS
required user action. Four distinct units were considered:
Coupler Unit (CU), Switching Unit (SU), Dimming Unit (DU) A. Coupler Unit
and Remote Control Unit (RCU), each of them with specific The CU, presented in Figure 3, is the brain of the proposed
features as it will be described in Section IV. These units, system. As referred, it is responsible for interfacing the
altogether made up the ZigBee home wireless network, which ZigBee network with the mobile device, being equipped with
is presented in Figure 2.
a Bluetooth and a ZigBee module, and a PIC16F684
microcontroller.
The Bluetooth module is a 2.5mW, class 2, 2.4 GHz
module, with a sensitivity of -80 dBm, providing about 10 m
coverage range in Line-of-Sight (LoS) environments. The
maximum datarate is imposed by the ZigBee network being
115.2 kbps.
The Zigbee module is a 1 mW XBee 2.4 GHz module with
a sensitivity of -92 dBm. Typical coverage range being in the
order of a few tenths of meters depending on the operating
conditions.
Fig. 5. SU architecture.
network. The application is flexible enough to allow easy
inclusion of devices from a remote or local database, for
which DomoML was used. Both the GUI and the KNX
messages were computed from the devices in the database
(interpreting the DomoML).
Figure 9 presents the block architecture of the developed
mobile application. It has five main classes: DisplayManager,
KnxManager, XmlManager, Menu e InterfaceIO. The Menu
class is a generic class; it has some pre-defined values and
Fig. 6. Remote Control Unit prototype. allows menus’ polymorphism. DisplayManager is the class
responsible for managing the menus holding until 10 menus’
layers. The KnxManager class is responsible for managing the
input/output datagrams coming from/to the InterfaceIO class,
which manages the I/O communication. The XmlManager
class is responsible for processing XML data, as the ones
coming from the DomoML language.
Fig. 7. RU architecture.
E. Mobile Terminal
In order to control the entire network a cell phone was
used. This choice was based on the fact that these devices are
quite common and flexible. Thus, a relatively inexpensive and Fig. 9. Mobile phone interface block architecture
personal universal controller can be achieved. Figure 8
presents a snapshot of the developed interface. For security
purposes each user must register using a personal password. V. TESTS AND RESULTS
In this Section some results of tests and trials conducted on
the developed system are presented. Parameters like maximum
range, line of sight viability and power consumption are
analyzed.
For the Bluetooth module was observed that this module
can keep a link in the line of sight, up to 17.5 meters.
Regarding the ZigBee module, it communicates within 100
meters line of sight conditions.
In order to measure the ratio attenuation / distance several
tests were made in line of sight, making four measurements at
four meters. Measurements were obtained using the X-
CTU. To this end, the command ATDB was used in the
ZigBee module to establish the power of the last received
message (RSSI), as presented in Table II.
VI. CONCLUSIONS AND REMARKS
The work presented in this paper refers to a ZigBee wireless
Fig. 8. Mobile phone interface. domotic system with a Bluetooth interface. It allows tenants to
connect a single mobile device to a ZigBee based wireless
The main interface is provided by a Java application home automation network. To assure a line of communication
installed on a mobile terminal. This choice was made because between the mobile device and the network units, a main
of its versatility; it can work almost on every mobile phone. module device is equipped with low-cost WPAN technology,
This application communicates directly, via Bluetooth, with widely used in mobile applications and sensor monitoring.
the Coupler Module that in turn has access to the remaining
TABLE II. AVERAGE RSSI VALUE [4] Maoheng Sun, Qian Liu, Min Jiang, "An Implementation of Remote
Lighting Control System Based on ZigBee Technology and Soc
Distance (meters) RSSI Value (dBm) Solution", International Conference on Audio, Language and Image
4 -63,25 Processing, 2008.
8 -61,25 [5] Michal Varchola, Miloš Druarovsky, "Zigbee Based Home Automation
Wireless Sensor Network", Acta Electrotechnica Et Informatica No. 4,
12 -73,75 Vol. 7, 2007.
16 -72 [6] R. Shepherd "Bluetooth Wireless Technology in the Home", Electronics
20 -67,75 & Communication Engineering Journal, Vol. 13 Issue.5, pp. 195 -203,
October 2001.
24 -72
[7] Woo Suk Lee and Seung Ho Hong, "Implementation of a KNXZigBee
28 -73 Gateway for Home Automation", The 13th IEEE International
32 -75 Symposium on Consumer Electronics (ISCE2009), 2009.
36 -82 [8] "IEEE IEEE 802.15 WPAN Task Group 1 (TG1)", official web site,
40 -80,25 http://www.ieee802.org/15/pub/TG1.html
44 -82,25 [9] "IEEE IEEE 802.15 WPAN Task Group 4 (TG4)", official web site,
http://www.ieee802.org/15/pub/TG4.html
48 -79,5 [10] Konnex Association, Handbook for Home and Building Control:
52 -80,5 Application Layer, 1st ed., 2001, vol. 3, ch. 3.7.
56 -79,75 [11] Miori, V.; Tarrini, L.; Manca, M.; Tolomei, G., "DomoNet: a framework
60 -78,25 and a prototype for interoperability of domotic middlewares based on
XML and Web Services," Consumer Electronics, 2006. ICCE '06. 2006
54 -81,75 Digest of Technical Papers. International Conference on , vol., no.,
68 -83,75 pp.117,118, 7-11 Jan. 2006
[12] Dietrich, D.; Bruckner, D.; Zucker, G.; Palensky, P., "Communication
The proposed system tries to implement the four pilars of a and Computation in Buildings: A Short Introduction and Overview,"
domotic system: comfort, safety, resources and Industrial Electronics, IEEE Transactions on , vol.57, no.11,
pp.3577,3584, Nov. 2010
communication; in order to improve the tenant’s quality of life
[13] Sauter, T., "The Three Generations of Field-Level Networks—Evolution
at home. and Compatibility Issues," Industrial Electronics, IEEE Transactions on ,
The system is built in order to be flexible, meaning that is vol.57, no.11, pp.3585,3595, Nov. 2010
possible to add devices to the network, such as a GSM or [14] Gomez, C.; Paradells, J., "Wireless home automation networks: A
modem modules or even connect another mixed network, with survey of architectures and technologies," Communications Magazine,
IEEE , vol.48, no.6, pp.92,101, June 2010
quick and easy programming, without interrupting the network
[15] Spadacini, M.; Savazzi, S.; Nicoli, M., " Wireless home automation
already working. Besides, it is also possible to swap the RF networks for indoor surveillance: technologies and experiments,"
chips with new chips and take advantage of other new features EURASIP Journal on Wireless Communications and Networking, vol. 6,
such as AES encryption for extra security and higher 2014
transmission rates. [16] Ramya, C.M.; Shanmugaraj, M.; Prabakaran, R., "Study on ZigBee
The number of devices in the network is only limited by the technology," Electronics Computer Technology (ICECT), 2011 3rd
International Conference on , vol.6, no., pp.297,301, 8-10 April 2011
number that the KNX standard allows and the number of
[17] Hwajeong Seo; Howon Kim, "Zigbee security for visitors in home
ZigBee devices used in the PAN network. automation using attribute based proxy re-encryption," Consumer
The Java application, installed on the mobile phone, can be Electronics (ISCE), 2011 IEEE 15th International Symposium on , vol.,
updated with more IO interfaces for the KNX Manager giving no., pp.304,307, 14-17 June 2011
the network more features such as text messaging commands [18] Piyare, R.; Tazil, M., "Bluetooth based home automation system using
cell phone," Consumer Electronics (ISCE), 2011 IEEE 15th
or internet access. International Symposium on , vol., no., pp.192,195, 14-17 June 2011
VII. ACKNOWLEDGEMENT [19] Shuai Yao; Mingguang Wu; Yanpeng Liu; Pinan Yang, "Research on
EIB and Development of Switch Module," Industrial Informatics, 2006
This work was supported by international funds through IEEE International Conference on , vol., no., pp.1241,1244, 16-18 Aug.
SOE3/P1/E508 - programa de Cooperação Territorial 2006
Europeia INTERREG IV B SUDOE and supported by [20] Collotta, M.; Nicolosi, G.; Toscano, E.; Mirabella, O., "A ZigBee-based
network for home heating control," Industrial Electronics, 2008. IECON
national funds through FCT Fundação para a Ciência e a 2008. 34th Annual Conference of IEEE , vol., no., pp.2724,2729, 10-13
Tecnologia, under project PEst- OE/EEI/UI0066/2014. Nov. 2008
[21] Bunyai, D.; Krammer, L.; Kastner, W., "Limiting constraints for ZigBee
REFERENCES networks," IECON 2012 - 38th Annual Conference on IEEE Industrial
[1] K. Bromley, M. Perry and G. Webb, Trends in Smart Home Systems, Electronics Society , vol., no., pp.4840,4846, 25-28 Oct. 2012
Connectivity and Services, 2003, [online] Available: [22] Cavalieri, S.; Cutuli, G.; Malgeri, M., "A study on security mechanisms
www.nextwave.org.uk in KNX-based home/building automation networks," Emerging
[2] N. Sriskanthan, F. Tan and A. Karande, “Bluetooth based home Technologies and Factory Automation (ETFA), 2010 IEEE Conference
automation system”, Microprocessors and Microsystems, vol. 26, no. 6, on , vol., no., pp.1,4, 13-16 Sept. 2010
pp. 281-289, 2002 [23] Ruta, M.; Scioscia, F.; Di Sciascio, E.; Loseto, G., "Semantic-Based
[3] Gill, K.; Shuang-Hua Yang; Fang Yao; Xin Lu, "A zigbee-based home Enhancement of ISO/IEC 14543-3 EIB/KNX Standard for Building
automation system," Consumer Electronics, IEEE Transactions on , Automation," Industrial Informatics, IEEE Transactions on , vol.7, no.4,
vol.55, no.2, pp.422,430, May 2009 pp.731,739, Nov. 2011
(
"
'( ((
3
(
>
!
2 (!
' (
(
7
(
#
#
"
(
(
2'*(
#(
&
&
8)
(
( (
#
*
! #
"
(
"
( (
5 (
'
"
(
(
(
*' *+!*+
2
(
2
(
(
*
"
,-#-./
#(
3
(
(
(
(
'
" (
(
&
0(
1 01
( (
" '
(
"
(
(
(
"
(
(
2
0
"
&
"
(
1 58)
(
"
2(
(
'
# (!
*
(
(
,B/
'(
(
(
&
"
(
*
( (
2
(
2
'"
(
"
(
,C/(
(
'(
(
(
'
(
"
(
"
(
(
,D/' (
( (
9*
( : 0*1 (
(
"
"
(
"
((
"
4 (
(
( (
7
(
"
"
4
2<(
(
(
("
=
'
(
*
"
"
(
"
! 0*!1(
,E/FG (
"
((
,H/# (
,I/
"
(
*'(
(
(
-@A(
(
!)
(
(
(
' M
"
' M
&
"
"
*J
(
(
(
%
J*
@"
"
8)
(
"
(
J
(
(
(
(
<
C( ( (
(
(
(
"
"
"
#(
(#
(
(
(
' M
(
"
"
"
M
(
"
<
"
(
(
"
"
(
(
2
(
"
(
"
(
("
(
"
' (
"
(
"
M
'M
(
3
(
"
(
7
( 3
(
(
(
(
"
(3
*2'
2
' *
"
& "
" *
?
( (
(
(
3
("
(
2
(
' (
*
?
2
( ( (
(
"
"
(
3 (
(
"
.
"
&
<
&
R F
((
4
' (
(
F
" 2
(?!*
(
C@ ( (
(
(
(
!*5F
"
(
(
K( (
(
(
2'
(
'
F
"
7
(
6
2
'K(2
(
(
'( (
#
&
# (
2
(
' 2
"
(
"
&
F
(
2
"
(
"
(
' (
(
(
(
F
(
F
&(
(
!P(
2
'
"
#2
&
7
#(
(
"
((
4
(
(
"
F (
&
7
' (
2
(
"
(
4('(
"
(
F
(
(
J (
"
"
(
'*
(
"
.(
(
( (
" F
"
(
"
2
(
((
"
'#(
7
(
(
"
'M
"
7
#(
" (
# (
"
*
(
"
'
F
(
(4 2
((
"
4 "
2
' (
(
"
"
*P' K!*G+*PG+*K*+
(" "
""
(
!
"
2
('(
"
(
(
' *
(
#
(
(
"
'
2
2
(
(
(
((
&
"
# (
(
"
#
"
(
(
"
(
2 (
(
'*
(
"
("
(
( " ' " # ( " " ( *
#
(
( %
# '
'(
2
'(
3
((
.' 6
2
( (
02
+
# (
3
2
F
1 7
2
+
(
*
! '
7((
"
"
#(
2' ! (%$
2
"
2
2
IE
"
+
2
(
2 (
S 2
(
'(
"
' =
" (
IE
(
F
#
(
"
#
(
( F
J
"
(
"
'
(
%*-$)/. *./, ("
(
'
(
(
(
"
((
=(
(
2
(
S
2
'(
&
"
(
"
((
"
#
(
((
F
7
"
( "
( (
(
(
"
2
2
(
(
(
7
"
'
%
' (
( (
F
7
(
*
M
(
(
"
"
(("
)
"
'
"
.
( (
"
(
(8'
(
F
"
("
(
(
"
(
"
C
(
(" %
7 ((
-((#
(
( %
'
F
2 (
2
(
8 ((
#
"
.
(
7
F
&
(
# (
"
@C
'
"
((
2
*
"
"
( %
"
3
"
"
"
"
'
#
"
(
2# ( (
""
(
(
(("
"
(
(
'*(
3
(
(
(
"
7
2
((
(
M
'(
W
V
"
(
"
( (
"
(
2
7
(
"
# ( (
(2
(
"
'
"
#
(
(
"
&
( 2
7
((
(
( (
7
' (
+
2 S 2
# (
(
"
3
#
6 (
(
2
(
'*
7
(
('*
(
#
(
+
2S
"
"
)
& ( (
(
*
! ( (
(
(
(
)
"
2
( 3 (
( ( .'
(
(
M
2
(
'( # 3
(
"
#(
"5 (
2
'
8)
(
=C 8)
(
K&
"
M
(
&
"
'K"
"
(
"
&
F*
(
'(
2("
(
2 (
"
&
"
(
(
"
" ' 7
(
"
'
"
# 2
#*!("
(
&
(
"
0
"
1
(
"
0
1'
"
+
#
(
2!)(
"
<
(
"
?!*
'
(
52%% " %
(
(
"
#(
"
(
&
"
"
"
(
'M
&
(
"
'
(
*(
&
(
"
#*!
@E( (
(
(
"
'(
"
(
(
'6
(
# (
E
M
(
B....
(
*!
(
(
-.
&
( (
&J 9=(
"
C
(
:(" (
&
(
"
'*
M
(
&
(
(
(
"
(
(
(
'
*!
2
?!*
"
(
(
# (
"
3
(
"
(
2
(
(
'* ( #(
*
M
(
( (
"
( (
P'
( (
"
"
('(
*
6
"
"
*
(
#*!
(
#
F
'
! 0@ F6 C@ F6
M(1 =H-..
,@/ (
3#
# 9
J
9K(
(
:#-.@*@
)K
(
:# K
"
#
X
C-
(
'(
"
( 0@.-@1BE.BHH'
(
(
,C/ (
#''
#( G
)
#9*
"
(
2 (
2
M
2
:#..BAC.IC5--@.--*KKK'
(
( - ' (
"
,E/ G=
F#( G#9!
(
(
(
?!*
:#
X*
CE0@.-@1-D--AA'
(
"
"
'(
,H/
(
%
'#9
2
"
(
( (
J M
7
:# (
S
F
" (
(
(
#
AE0@.--1-..A-.@-'
(
C)K4'(
(
?!* ,I/ K3 "
'# 9
(
2
(
( (
(
:#S?
K
C.CC@D@.--'
(
)K4
(
'(
,D/ P
'# 9
(
(
(
"
(
*
:#..BAC.IC5.I@..I*KKK'
' ,A/ S
'#9(
*
)
:#..BAC.IC5.I@..I*KKK
(
(
,B/ L 2
'# 9* 6
:# ..BA
"
( (
C.CI5-.@.-A*KKK'
,-./
( )# 9
3
(
(
"
2
+"
K&
P :#
@.-E'
From Hospital
to Home Care
Creating a domotic environment for elderly and disabled people.
For people without disabilities, technology makes things easier. even when the companies don’t specifi-
For people with disabilities, technology makes things possible. cally market them to disabled patients.
A
Assistive technologies have emerged as
dvances in medicine have led to a significant increase a useful aid to people with disabilities. They
in human life expectancy and, therefore, to a growing aim at improving residual functions or ca-
number of disabled elderly people who need chronic pabilities, allowing the command of several
care and assistance [1]. The World Health Organiza- devices. The main goal of these technologies
tion reports that the world’s population over 60 years is to support the independence of people
old will double between 2000 and 2050 and qua- with chronic or degenerative limitations in
druple for seniors older than 80 years, reaching 400 million motor or cognitive skills and to aid in care
[2]. In addition, strokes, traffic-related and other accidents, and of the elderly. The most cited needs for this
seemingly endless wars and acts of terrorism contribute to an population are those related to the activi-
increasing number of disabled younger people. ties of daily living and communication.
These and other causes have increased the population of dis- In this article, we present an assistive
abled patients, who mostly end up in clinics and hospitals—places home care system specially designed for
that are already overcrowded. Consequently, alternatives for care people with severe brain or spinal inju-
and rehabilitation need exploration. Rehab interventions involving ries and for poststroke survivors who are
virtual reality technology [3], Microsoft Kinect-based exercise and immobilized or face mobility difficulties.
“serious” games [4], and other similar proposals have been devel- The main objective is to create the easy,
oped around the world with encouraging results, especially in the low-cost automation of a room or house
case of stroke survivors, for whom age is a significant risk factor. to provide a friendly environment that
Domestic care is a novel and promising area, supported by enhances the psychological condition
the use of biomedical sensors and physiological monitoring of immobilized users (Figure 1).
through ECG portable devices, inertial sensors, video record-
ing, alarms for fall detection, and so on [5]. Patients can be System Overview
monitored using wearable sensors that provide early warn- At the system’s core is a personal computer (PC) and ichno-
ing of health deterioration. The demand for technologically graphic software (referred to as SICAA, for the Spanish Sistema
advanced methods of home-based care may easily expand, Integrado de Control y Automatización Asistida) that allow the pa-
so that expectations for wide-scale adoption are not merely tient to interact with the environment and peripheral devices,
well intentioned dreams. Moreover, almost daily, new smart such as a webcam, intercom, lights, and electrical blinds. Sev-
home products appear that can be adapted to special needs, eral human–computer interfaces (HCIs) were developed and
adapted for this system, according to the residual capability of
different users. The SICAA software has three main elements:
Digital Object Identifier 10.1109/MPUL.2016.2539105 environment control (operating blinds, lights, an orthope-
Date of publication: 13 May 2016 dic bed, an air conditioner, a television, and an intercom),
shape, big buttons, and low price. The inertial sensor-based stage is necessary for a complete HMI domain, especially for
console is easy to use and does not require training, but its patients with severe diseases.
use is only possible for patients who maintain the ability to The choice of the HCI will depend on the user capabilities and
move their hand. other interfaces can also be used with the system.
Home Control
• Television fort, self-esteem, and overall psycho-
Communication
• Text Processor
• Blinds logical condition.
• Voice
• Bed
Synthetizer
• Intercom
• Diary Planner
• Air Conditionning Acknowledgments
• Nurse Call
• Door Opening The authors thank the Universidad
Tecnológica Nacional, the Universidad
Nacional de San Juan, and the Na-
tional Council of Scientific Research of
Argentina (CONICET) for supporting
this research.
FIGURE 2 The principal panel of the SICAA system and its functionalities. Natalia M. López (nlopez@gateme.unsj.
edu.ar) is with the Gabinete de Tecnología
A QWERTY keyboard was designed, which appears in the Médica, Facultad de Ingeniería, Universidad Nacional de San Juan,
front panel when necessary for writing in the selected ap- Argentina. Sergio Ponce (sponce@rec.utn.edu.ar) and David
plication (such as the Internet browser, text processor, chat, Piccinini (davidp13@gmail.com) are with the Grupo de Análisis,
diary, or voice synthesizer). The keyboard is predictive and Desarrollos e Investigaciones Biomédicas, Facultad R
egional San Nico-
has two modes, basic and advanced. These two modes were lás, Universidad Tecnológica Nacional, Argentina. Elisa Perez (eperez
implemented for users with different capabilities and train- @gateme.unsj.edu.ar) is with the Gabinete de Tecnología Médica,
ing. The voice synthesizer panel shows preselected phrases, Facultad de Ingeniería, Universidad Nacional de San Juan, Argentina.
and it allows the addition of other expressions, defined by Martín Roberti (martinroberti@gmail.com) is with the Grupo de
individual users. Configuration parameters are accessible by Análisis, Desarrollos e Investigaciones Biomédicas, Facultad Regional
the programmer or authorized personnel to prevent mistakes San Nicolás, Universidad Tecnológica Nacional, Argentina.
and system failures. This menu allows the control of cursor
sensitivity and language (Spanish, Portuguese, and English), References
among other functions. [1] D. Webster and O. Celik, “Systematic review of Kinect applica-
The peripheral devices are controlled through a customized tions in elderly care and stroke rehabilitation,” J. Neuroeng. Reha-
and isolated control board, with eight digital outputs by relays, bil., vol. 11, p. 108, July 2014.
three analogical and six digital inputs, and an ATMega 8-16PU [2] Organización Mundial de la Salud. (2014). Desafios sanitarios
microcontroller of 1 MHz. To avoid incompatibilities with previ- planteados por el envejecimiento de la población. [Online]. Avail-
ously installed home appliances and devices, a generic infrared able: http://www.who.int/ageing/publications/es
transducer was used to control the air conditioning and televi- [3] A. Darekar, B. J. McFadyen, A. Lamontagne, and J. Fung, “Effi-
sion. The intercom must be adapted to a webcam, thereby pro- cacy of virtual reality-based intervention on balance and mobility
viding visual information to the patient. The door opens with disorders post-stroke: A scoping review,” J. Neuroeng. Rehabil., vol.
an electrical lock. The nurse call is a luminous sounding alarm, 12, p. 46, May 2015.
interrupted only by a physical button pressed by the caregiver, [4] C. Loconsole, F. Banno, A. Frisoli, and M. Bergamasco, “A new
assuring the presence of the caregiver. Other devices such as the Kinect-based guidance mode for upper limb robot-aided neurore-
bed, home appliances, and lights only need a minimal electri- habilitation,” in Proc. 2012 IEEE/RSJ Int. Conf. Intelligent Robots and
cal connection to be controlled by the SICAA. The peripheral Systems (IROS), Vilamoura, Portugal, pp. 1037–1042.
devices used are objects whose operation is not affected by the [5] L. Mertz, “Convergence revolution comes to wearables: Multiple
type of control input and that require no structural modifica- advances are taking biosensor networks to the next level in health
tions. The panel control shows the output state, offering a direct care,” IEEE Pulse, vol. 7, no. 1, pp. 13–17, Jan. 2016.
visual view of the entire system. [6] E. Perez, C. Soria, N. M. López, O. Nasisi, and V. Mut, “Vision-
The costs, calculated for a 32-in television, a PC, and all the based interfaces applied to assistive robots,” Int. J. Adv. Robot. Syst.,
electronics components, comes to a total of US$5,000. This is vol. 10, pp. 116, 2013.
a low-cost solution if we consider the psychological and physi- [7] N. M. Lopez, E. Orosco, E. Perez, S. Bajinay, R. Zanetti, and M. E.
cal benefits of the independence and ability to communicate Valentinuzzi, “Hybrid human-machine interface to mouse control
the system allows for its potential users. There are commercial for severely disabled people,” Int. J. Eng. Innovative Technol., vol. 4,
domotic systems available on the market and a lot of “smart no. 11, pp. 164–171, May 2015.
homes” projects in research groups, but our objective was a de- [8] D. Piccinini, N. M. López, E. Pérez, S. Ponce, and M. Valentinuzzi,
sign specifically for disabled people that provides a wide variety “Assistive home care system for people with severe disabilities,”
of plug-and-play HCIs, while also considering the economic con- presented in Proc. 4th IEEE Biosignals and Biorobotics Conf. (ISSNIP),
dition of the potential users. Feb. 2013.