The Design of Smart Home Security Alarm Monitoring Based on Jess

Abstract:

Article Preview

With the continuous progress and development of society , people's incomes increase greatly, and more attention is paid to improve the safety of their living conditions as well as the reliability of life quality. An expert system of Security Alarm Monitoring for Smart Home filed based on JESS is demonstrated in this paper, according to the tendency development of security market worldwide and the deep-level development of security technology. The security system proposed in the paper is based on the knowledge of Expert System, Embedded Technology and Wireless Sensor Technology.etc. It mainly includes Access Control Subsystem, Steal Precaution Subsystem, Fire alarm subsystem, Gas Leak Subsystem. etc. The expert system based on Jess rules engine is developed by Java. It is able to detect whether the family members and family situation in a safety state according to the various scenes within a family, then make timely reaction to non-security state and take appropriate measures to ensure security at home guided by a set of procedural rules .The effectiveness and feasibility of this system has be proved by the simulation results.

Info:

Periodical:

Edited by:

Robin G. Qiu and Yongfeng Ju

Pages:

1044-1050

DOI:

10.4028/www.scientific.net/AMM.135-136.1044

Citation:

Y. P. Gong et al., "The Design of Smart Home Security Alarm Monitoring Based on Jess", Applied Mechanics and Materials, Vols. 135-136, pp. 1044-1050, 2012

Online since:

October 2011

Export:

Price:

$35.00

[1] Tao Shen. The reasch of Smart Home Security Alarm Monitoring and Tranmission Embedded Based on Jess[D]. Shanghai Maritime University. (2007).

[2] Wu Jie, Zhang Guangwei, Li Bo. Digital Video Monitor For House Security. China Academic Journal Eiectronic Publishing House. [J]2002(5):25.30.

[3] Ernest Friedman -Hill Jess in Action: Java Rule-based Systems [M]. manning Publication Co., 2003. 136-140.

[4] Alvaro E, Monge and Charles P Elkan, efficient domain-independent algorithm for detecting approximately duplicate database record, 1997, 1-13.

[5] Mark Watson Practical Artificial Intelligence Programming in Java [M]. Addision2 Wesley Pub. Co., 2001, 20-23.

[6] Huining Huang, Overview of the Multi-sensor Date Fusion Thchnology[j]Science and Technology Information2010: 15.

[7] Wenguang Wang Summarization of wireless sensor network, Journal of hefei university of technology[J]2010(9): 9. 33.

[8] Wang Fang, Ma Youjun, Jiang Guoping. Design of the intelligent theft proof and fireproof alarm system for residential area. Journal of Transducer Technology[J]. 2002: 25. 10.

[9] Jangfeng Zhang. The design and application of Intelligent Security detection and control system . Scientific exploration and knowledge innovation[J] 2010. 8.

[10] D.Y. chen, Scheduling and Reasoning of Task in Expert System Development tool ESDT-HDK . Java/Jini Technologies and High-Perfor mance Pervasive Computing. 2002. 7. USA.

DOI: 10.1117/12.472940

[11] Zhiqiang Wei, The research of privacy policy in Pervasive Computing. Computer Journal Vol. 33 NO. 1 2010. 1.

In order to see related information, you need to Login.