A Home Security Monitoring System Study of Intelligent Building

Article Preview

Abstract:

Aimed at the defects of security monitoring system in intelligent building with complicated design, higher production cost, uneasy to installation, and not suitable for ordinary family, this paper combined with the development needs of intelligent building, and designed a remote network security monitoring system based on Internet, used AT91SAM9260 as the main controller and used embedded technology, Internet technology, video compression/decompression technology and so on. So that users can detect the illegal intrusion and fire hazards at home in real-time, through computers or mobile phones. Then the validity and efficiency of the system was validated via test-experiment. The results show that this system has several merits such as good safety, good generality, simple operation, easy maintenance, low cost and so on. It can meet the needs of security monitoring for an ordinary home.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 255-260)

Pages:

2106-2110

Citation:

Online since:

May 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Jianjun Geng: Design and Application of Video Surveillance System in Intelligent Building (Shandong University Master's Thesis, 2007).

Google Scholar

[2] Information on http: /www. atmel. com/dyn/resources/prod_documents/6221s. pdf.

Google Scholar

[3] Xiang Yang, Yuanyi Zhang, Rongyang Zhao: Proceedings of the International Conference on Embedded Software and Systems Symposia (IEEE CS PRESS, 2008).

Google Scholar

[4] Dacheng Mei, Daqian Yang, Yong Zhou: Microcomputer Information. Vol. 23 19~20(2007).

Google Scholar

[5] Yuanyi Zhang, Xiang Yang: Proceedings of the 9th international conference on Electronic Measurement & Instruments (IEEE PRESS, 2009).

Google Scholar

[6] M. Can Filibeli, Oznur Ozkasap, M. Reha Civanlar: Journal of Network and Computer Applications Vol. 30 499~514(2007).

DOI: 10.1016/j.jnca.2006.04.001

Google Scholar