Question

In: Computer Science

Design and implement a Fire Alarm IOT System, using the framework of the Raspberry PI device,...

Design and implement a Fire Alarm IOT System, using the framework of the Raspberry PI device, temperature, C02 and CO sensors.

•Define the process specification of the system. The system should collect and analyze the sensor data and email alerts when a fire is detected

•Define the domain model for this IOT device

•Define the Service specifications

Solutions

Expert Solution

Ans 1.

Process specification of the system

Temperature and CO2 & CO sensors are distributed throughout the home to get and analyze the data. These will collect data regarding the temperature, CO2 and CO presence in the surroundings. We will collect data using Raspberry Pi. Once the data are collected, then data will be analyzed to determine whether fire is present or not.

If the results determine of no sign of fire then sensors will wait for some moment, and will start again to collect the data. If fire detected, then through Raspberry Pi program the system will send an email alert to user. User can confirm the situation before contacting to local fire department.

The fire alarm IOT system will wait and return to collect sensor data.

Pictorial representation is below:

Ans 3. Service Specification:

System Integration
System integrators link IoT component subsystems, customize solutions, and ensure that IoT systems communicate with existing operational systems.
IoT Data Management
IoT data management consultancies help to make sense of big data, decide which data to maintain and for how long, and troubleshoot IT issues.
Hardware Development
IoT hardware consultancies provide services such as solution specification, product design, connectivity setup, and partner identification.
Software Development
IoT software consultancies support the development of data analytics, visualization solutions, and platforms, as well as integration into embedded systems.

Ans 2.Domain model for this Iot Device


Related Solutions

Which of the following is NOT an example of robust process design? A fire alarm that...
Which of the following is NOT an example of robust process design? A fire alarm that goes off when a fire is detected in a building  A saw that will not start if the blade is not inserted properly in its housing  A building that can withstand a major earthquake  A colorful liquid laundry packet that resembles a piece of candy
A fire alarm system inside an office building has two types of activation devices, A and...
A fire alarm system inside an office building has two types of activation devices, A and B, which operate independently. Probability that device A is turned on in the case of a fire is 0.97. Probability that device B is turned on in the case of a fire is 0.85. When there is a fire, the fire alarm system is turned on when at least one of two activation devices is turned on. Probability that both devices are turned on...
You have been hired by a home security company to design and implement a home alarm...
You have been hired by a home security company to design and implement a home alarm system. The logic of the system is as follows: once the alarm system has been armed, it is to sound if the front door is opened, the back door is opened or either of two windows is opened (you can assume there are only two windows). Design the necessary circuit to implement the situation described above. Your circuit should have five inputs (A =...
design a circuit of an alarm system that has buzzer that rings for 2 minutes and...
design a circuit of an alarm system that has buzzer that rings for 2 minutes and LED'S that flicker for 2minutes.
Create a high-level design for a home alarm system. Assume that there are 4 windows and...
Create a high-level design for a home alarm system. Assume that there are 4 windows and 2 doors. The windows and doors have light sensors, so if any object crosses the light path, an appropriate event will be registered. Also, each window and door has latches with sensors that detect if the latch has been turned. Your solution will consist of the following parts 1.       Use a variable “Armed” to allow a user to arm the alarm system. So if a...
a) why would a design engineer at PI compensator to a system? what would the compensator...
a) why would a design engineer at PI compensator to a system? what would the compensator system look like? b) why would a design engineer pick a LAG compensator over a IP compensator?
Car Rental Management System in C++ The aim of this project is to design and implement...
Car Rental Management System in C++ The aim of this project is to design and implement a computerized Car Rental Management System for a company called COEN244Cars. The company rents two types of cars: standard and luxury cars. A car is identified by a car identification number (int), a type (string), and a flag that indicates whether the car is currently available or not. The company distinguishes between three types of customers: regular customers, corporate customers, and VIPs (Very Important...
Design the database using the ER approach. Then using Java and SQL, implement the following functionality:...
Design the database using the ER approach. Then using Java and SQL, implement the following functionality: Implement a button called “Initialize Database”. When a user clicks it, all necessary tables will be created (or recreated) automatically, with each table be populated with at least 10 tuples so that each query below will return some results. All students should use the database name “sampledb”, username “john”, and password “pass1234”. Implement a user registration and login interface so that only a registered...
URGENT.. Using Johnson and Henderson’s (2002) framework, describe the conceptual models that underlie the design of:...
URGENT.. Using Johnson and Henderson’s (2002) framework, describe the conceptual models that underlie the design of: Metaphors and analogies: Concepts: Relationships: Mappings: An electronic personal calendar found on a personal computer. A shared calendar found on the web.
Implement heap sort by using the bottom-up insertion method. Add this sort to your sorting framework....
Implement heap sort by using the bottom-up insertion method. Add this sort to your sorting framework. Evaluate its performance in terms of the numbers of comparisons and exchanges, and compare it to the performance of the two advanced sorting methods that you have previously implemented. Submit your report with detailed empirical results and a thorough explanation of these results. Which of the three advanced sorting method is the best choice for a) ordered data, b) data in reverse order, and...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT