Skip to main content

HOME APPLIANCES CONTROL USING LIFI

HOME APPLIANCES CONTROL USING LIFI

ABSTRACT

Nowadays there are various electronic equipment’s available for remote operation of electronic devices. But, the main disadvantage of these systems is that they can be operated only in short ranges and also less reliable. Thus, to overcome the above drawbacks, we are using one of the wireless communication technique i.e., LIFI.
This project is designed to make home automation easy to control when a user is not at home. The project is designed to allow easy use of a mobile phone to control appliances in the home. Using a mobile phone the development of the control system will be carried out using SMS. This will communicate with another mobile phone, which in turn controls the devices attached to microcontroller modules. When the action has been carried out then a response is sent to the user. The project involves three main areas, research, development\programming, testing and the writing of the report.



What is LI-FI??????
VLC represents only a fraction of what appears to be a much larger movement towards optical wireless technologies in general. This larger world has been dubbed ‘Li-Fi’ (Light Fidelity) by people such as Dr Harald Haas of Edinburgh University and organizations such as the Li-Fi Consortium.
Li-Fi is transmission of data through illumination of the LED by taking the fiber out of the fiber optics by sending data through the LED light bulb that varies in intensity faster than the human eye can follow.
The LED blubs will hold a micro-chip that will do the job of processing the data.
The light intensity can be manipulated to send the data by tiny changes in the amplitude.
This technology uses visible spectrum of light, a part of the electromagnetic spectrum that is still not greatly utilized.
In fact this technology transfers thousands of streams of data simultaneously in parallel in higher speed with the help of the special modulation using a unique signal processing technology.
The light used to transmit the data is called D-light by herald hass, the inventor of LiFi.










BLOCK DIAGRAM:
LIFI TX






LIFI RX






Features
ü  Transmit data serially at 57600 baud rate
ü  Distance of 1 feet to 10 feet can be achieved
ü  low power requirement
ü  no effect on human health
ü  highly secure compared to Wi-Fi
ü  high data density because visible light can be well contained


Application
ü   Indoor wireless open optical communication.
ü   Indoor navigation.
ü   Under water visible light communication.
ü   Smart indoor blind assistive application.
ü   Vehicle to vehicle communication.
ü   Depends on the LED power.

 HARDWARE REQUIRED:
1.      MICROCONTROLLER
2.      LCD 16X2
3.      LIFI TX&RX
4.      LED PANEL

SOFTWARE REQUIRED:  

1.      Keil u-Vision 3.0
2.      PRO51 Programmer Software




Comments

Popular posts from this blog

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD report

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD ABSTRACT More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and se...

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM

A SHOULDER SURFING RESISTANT GRAPHICAL AUTHENTICATION SYSTEM ABSTRACT Authentication based on passwords is used largely in applications for computer security and privacy. However, human actions such as choosing bad passwords and inputting passwords in an insecure way are regarded as”the weakest link” in the authentication chain. Rather than arbitrary alphanumeric strings, users tend to choose passwords either short or meaningful for easy memorization. With web applications and mobile apps piling up, people can access these applications anytime and anywhere with various devices. This evolution brings great convenience but also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, we proposed a novel authentication system PassMatrix, based on graphical passwords to resist shoulder surfing attacks. With a one-time valid login indicator and ...

garbage monitoring using arduino code with gsm

#include <SoftwareSerial.h> #include <LiquidCrystal.h> //LiquidCrystal lcd(7, 6, 5, 4, 3, 2); LiquidCrystal lcd(13, 12, 11, 10, 9, 8); SoftwareSerial mySerial(0,1); #define trigPin 2 #define echoPin 3 #define PIR_sensor 4 #define m11 5 #define m12 6 void setup() {    lcd.begin(16, 2);    lcd.print("    Garbage    ");    Serial.println("garbage ");   lcd.setCursor(0,1);   lcd.print("   Open Close    ");   Serial.println(" open close");   delay(3000);   lcd.clear();   //lcd.print(" ");   delay(2000); mySerial.begin(9600); // Setting the baud rate of GSM Module Serial.begin (9600); pinMode(trigPin, OUTPUT); pinMode(echoPin, INPUT);  pinMode(m11, OUTPUT);   pinMode(m12, OUTPUT);   } void loop() {  readPIR();  pingDist();  SendMessage(); } void pingDist ()   {     long duration, distance;...