Академический Документы
Профессиональный Документы
Культура Документы
Engineering of the
In Partial Fulfilment
By
Adviser
October 2016
Table of Contents
Abstract ............................................................................................................................................ ii
Table of Contents ............................................................................................................................ iii
Table of Figures .............................................................................................................................. iv
Table of Tables ................................................................................................................................ v
1 Problem and its Settings........................................................................................................... 1
1.1 Introduction ...................................................................................................................... 1
1.2 Statement of the Problem ................................................................................................. 5
1.3 Significance of the Study ................................................................................................. 5
1.4 Scope and Limitations...................................................................................................... 6
1.5 Definition of Terms.......................................................................................................... 6
2 Review of Related Literature ................................................................................................... 8
2.1 Introduction ...................................................................................................................... 8
2.2 A Review on Fire Alarm Monitoring System .................................................................. 8
2.3 Communication Methods ............................................................................................... 10
2.3.1 ZigBee .................................................................................................................... 10
2.3.2 ZigBee-WiFi .......................................................................................................... 14
2.3.3 RF-433 MHz .......................................................................................................... 15
2.4 Sensors ........................................................................................................................... 17
2.4.1 Smoke Sensor......................................................................................................... 17
2.4.2 MQ7 Carbon Monoxide Gas Sensor ...................................................................... 17
2.4.3 DS18B20 Temperature Sensor............................................................................... 19
2.5 Algorithm ....................................................................................................................... 20
2.5.1 Comparison Algorithm .......................................................................................... 20
2.5.2 Received Signal Strength Indication (RSSI) Localization Algorithm ................... 22
2.5.3 Fuzzy Logic ........................................................................................................... 24
2.6 Internet of Things (IoT) in Fire Alarm Monitoring system ........................................... 26
3 Methodology .......................................................................................................................... 27
3.1 Introduction .................................................................................................................... 27
3.2 Hardware Design ........................................................................................................... 28
3.2.1 ESP8266 ESP-12E WiFi Module .......................................................................... 28
3.2.2 MQ7 Gas sensor ..................................................................................................... 29
3.2.3 DS18B20 Temperature sensor ............................................................................... 30
ii
3.2.4 Power bank (power supply) ................................................................................... 31
3.2.5 Buzzer .................................................................................................................... 32
3.2.6 Wireless Router ...................................................................................................... 32
3.2.7 Circuit Interface ..................................................................................................... 33
3.3 Develop a Decision rule algorithm ................................................................................ 35
3.4 Firmware Development ................................................................................................. 37
3.4.1 Firmware Loading Process..................................................................................... 38
3.5 Software Design ............................................................................................................. 38
3.6 Network and Communication Design ............................................................................ 39
3.7 Test Design .................................................................................................................... 41
3.8 System Deployment ....................................................................................................... 43
3.9 System Validation .......................................................................................................... 43
References ...................................................................................................................................... 38
Gantt Chart ..................................................................................................................................... 44
List of Figures
iii
Figure 3-6. Buzzer ............................................................................................................ 32
Figure 3-7. Linksys WRT 1900 ACS dual-band WiFi router........................................... 33
Figure 3-8. Gas sensor and ESP8266 ESP-12E WiFi module circuit interface................ 34
Figure 3-9. DS1820 temperature sensor and ESP8266 ESP-12E WiFi module circuit
interface............................................................................................................................. 34
Figure 3-10. Buzzer and ESP8266 ESP-12E WiFi module circuit interface .................... 35
Figure 3-11. Decision Rule Algorithm Flowchart ............................................................ 37
Figure 3-12. Software Design Program ............................................................................ 38
Figure 3-13. A network of star topology .......................................................................... 39
Figure 3-14. Communication System ............................................................................... 40
Figure 3-15. System Deployment ..................................................................................... 43
iv
Table of Tables
v
1 Problem and its Settings
1.1 Introduction
Fire has been used by the people over the years as a means to manipulate their
environment. It takes a weighty part in today’s world, however it is not always used
suitably and can oftentimes be destructive. The condition is modified by problems such
as changes in land use, increasing population in rural areas, inadequate or inappropriate
policy, and climate change. It could truly destroy the infrastructures including facilities,
water systems, and control ways. People often lose their houses as well if the fires are
close enough to human housing. Millions of dollars are spent repairing these damages
and re-building homes. Trees and plants which can help produce oxygen in the world
become lesser because of fire. With this, the lesser trees and plants there are, the lesser
clean air we can breathe. Correspondingly, some lives of the people are also lost because
of fire. These people are the ones who fight the fire, trying to save others. With regards to
health of the people, the smoke that they have inhaled would probably cause lung and
throat infection, fact that has already been happening over the years. Furthermore,
incomes and jobs in the agricultural field whose field crops and animals were destroyed
by the fire. In this modern era, the economic status of the country would suffer if people
are out of work.
1
replaced with low-frequency, high-intensity crown fires that are outside the historical
range of variability for the environment. In contrast, in the eastern United States, fire
suppression has shifted oak and pine woodlands to mesophytic hardwoods, consequently
reducing flammability and fire activity [1]. In the same manner, in Europe, North
America, Australia, and elsewhere, urban areas have steadily prolonged into desolate land
extents, constructing more blast-off bases and uncovering more people to wildfires. The
outcome has been shattering to places wherein inhabitants have lengthened into logically
high-intensity summit environment such as in various Mediterranean-climate
constituencies.
For several years now, the World Fire Statistics Centre (WFSC) has been moving
beyond only collecting and disseminating data on fire deaths, injuries and damage to
structures and property, and embracing the wider view of “fire as vulnerability”. The
human cost of fires is a global public health concern. The effects of fires on people are
twofold: direct physical harm that causes deaths and injuries such as burns, and
psychological and emotional trauma. Although many countries have experienced an
improved long-term trend in terms of fire-related deaths due in large part to enhanced fire
prevention efforts, low and middle income countries continue to have a high incidence of
fire-related deaths and injuries [2]. According to the Center of Fire Statistics of the
International Association of Fire and Rescue Services, there were 70,000 to 80,000 fire
deaths and 500,000 to 800,000 fire injuries at the beginning of the 21st century [3].
2
prevention in the Philippines. Generally, half of all fires from 2010 to 2012 happened
during the day. Physical assemblies with fire hazards are at tangible risk of fires,
especially during periods when occupants may be asleep or physically absent from the
buildings. Such hazards in the Philippines include the use of open flames such as candles
and lamps during the evenings. Whatnot the fundamental cause may be, the result of a
slow comeback in fire is a longer fire interval, which is more likely to result in weighty
impairment to buildings and losses or grievances.
In [4], it states that in order to provide adequate warning to occupants, there must
be a corresponding fire alarm systems or devices in every building or structure. This
corresponds to the statement that there must be a maintained and operated building to
ensure safety of the occupants to avoid fire, vapor and fumes during the period of escape
from the building. Additionally, in accordance with internationally accepted standards,
fire alarm system must have an authorized maintenance which must also be developed by
the building management to secure functional wholeness. The records of conducted
maintenance, if required by the Chief or his duly authorized representative, should be
maintained and submitted together with Fire and Life Safety Assessment Report
(FALAR) [4]. And when the fire alarm system is out of service for more than four hours
in a twenty-four-hour period, the City/Municipal Marshal must be notified and must
assign a fire watch until the fire alarm system gets back to service. On the other hand,
there must be at least one manual fire alarm box to initiate a fire alarm signal for fire
alarm systems with automatic fire detection [4]. The additional fire alarm boxes must be
located thirty meters horizontally away from any part of the building. Furthermore, to
fully respond to a fire emergency, there should be a predesignated system to
3
automatically transmit alarm signal without delay to the nearest fire station or a fire
brigade [4].
With the unending occurrence of fire, truly, there is a need to develop more
effective methods in detecting fire so people would be aware of the very first stage of it.
The effectiveness of the fire detection and alarm system depends on the stage of the fire
at which it is operated. In order for all the occupants to escape without too much
difficulty, an early alarm should operate before the escape routes becomes smoke-logged
to such an extent as will cause occupants to have difficulty finding their way out of the
building. To attain the anticipated level of safety, many fire alarm systems will contain a
blend of smoke detectors, heat detectors and manual pull boxes. The type of detector to
be used in a given location depends on the nature of the fire expected, the response time
desired and the service conditions in which the detector must activate.
Today, smart network and institutions, and clever conveyance of fire are some of
the structures that associate our world more than we ever assumed possible. In order to
alert evacuees of the building to a fire and allow them to follow the emergency lights to
check their location and evacuation path, the IoT makes it easier to comprehend the
happenings in a particular building so as to make suitable corrections pertinent to some
factors. The IoT is a huge number of data points brought into a cloud environment
wherein analytics can be put on to influence the upshots. Using connected devices and
data driven decision support systems, IoT makes a variety of applications. This would
permit a swift explanation as to why fire happens and sort it conceivable to take
anticipatory action [5]. With 2G or 3G phones as text information, the system provides
approximate location information of the evacuees connected to the embedded control
system of each floor, and informs the location of ignition of fire and the location of the
evacuees.
4
1.2 Statement of the Problem
With today’s technological advances, the fire alarm monitoring system has been
seen as an area of technology with a room for big innovative improvements. The
traditional fire alarm monitoring system usually consists of cabling technology. The
scalability of this type is poor and the hardwiring connection affects its appearance. Also,
hardwiring is highly susceptible to wear and tear, aging, and failure thus making the
system lowly reliable. The construction of traditional fire alarm monitoring system is
fixed and inflexible. During building renovations and retrofitting, the system requires re-
installation which entails additional cost. The existing wireless technologies used in fire
alarm monitoring system is the ZigBee technology; however this system has an
interoperability problem which means that ZigBee profiles can interfere with one another
and it’s possible that they won’t be able to operate with each other, thus affecting the
exactness of data transmission.
iii.) Choose and integrate the sensing technologies and design a hardware
iv.) Develop a decision rule and algorithm based on the gathered data
This study can provide accessible information to the building occupants regarding
the temperature and smoke concentration of the corresponding rooms. It gives an early
warning to the building occupants in case of fire incidents. The building occupants can
constantly monitor their corresponding rooms anytime and anywhere through their
android smart phones and tablets as long as he/she is connected to the internet even when
they are not with their respective rooms, or even when they are out of town. Also, this
5
study will improve the reliability of a fire alarm monitoring system, since the system
eliminates the use of hardwiring connections which is highly susceptible to wear and tear,
aging and failure which causes high fault and false alarm rate.
When there is a need to update the layout of the building, the system is more
flexible, easy to modify and ease of installation compared to the traditional fire alarm
system. By implementing this system, it would be cost efficient compared to wired
system, since it eliminates the cost of wire in installation and improves safety conditions
throughout the building.
This study is a pilot study to test the capability of an Internet of Things (IoT) based
fire alarm monitoring system in one wing of the third floor, particularly from LB381 to
LB387, of the Lawrence Bunzel building of the University of San Carlos. It is mainly to
monitor the temperature and smoke concentration within the corresponding room. The
smoke concentration is based on a preset trigger level of smoke based on test-fires
experiment while the smoke concentration in terms of parts per million (ppm) is not part
of the study. Also automation of fire sprinkler systems and fire mitigation is not included
in the study.
6
IEEE 802.15.4 - is a standard created by Institute of Electrical and Electronics Engineers
(IEEE) which specifies the physical layer (PHY) and the media access control (MAC) for
low-data rate wireless networks.
Fire Alarm - Any visual or audible signal produced by a device or system to warn the
occupants of the building or fire fighting elements of the presence or danger of fire.
7
2 Review of Related Literature
2.1 Introduction
This part provides a review of the recent technologies, related works directly
associated with the study. This includes fire alarm system, communication method,
algorithms, sensors and wireless technologies used in fire alarm monitoring system.
People beforehand have absorbed that prompt reaction to fires had constructive
fallouts in scheming those fires. When roaming watchmen used hand bell-ringers or
factory steam whistles as someone revealed a fire, the fire taskforces and fire sectors
were forewarned. Incautiously, these systems did not afford very considerable point and
often directed the fire department to the incorrect whereabouts. However, the late Samuel
F.B. Morse invented the telegraph in which fire-fighters were bestowed a quicker and
more accurate fire reporting structure [6]. New York has become the first American city
to instigate production of a civic fire alarm system required by ordinance to construct a
line of telegraph way back to 1847. This has been done by setting posts in the ground to
interconnect fire alarms from the city hall to various fire locations, and inculcate the
several bell-ringers in the use of said invention. Year 1851 was when Moses G. Farmer
and William Channing persuaded the city of Boston that through telegraph, they wanted
to mount their variety of a municipal alarm system. This was then entailed of forty miles
of wire to bond the fundamental post to forty signal boxes and nineteen bells in churches,
schools and the like. The system therefore would diffuse an electric compulsion from a
code wheel halting the circuit and record a Morse code on the printing register. During
Channing’s lecture about fire alarm system at the Smithsonian Institute in 1855, John N.
Gamewell, a telegraph agent, was enthralled with the prospective of the system that he
credited the privileges to build these fire alarm systems, first in the South and the West,
8
so for the all-inclusive U.S.A. In 1866, Mr. Greenwood, Superintendent of the Fire Alarm
and Police Telegraph in San Francisco said: A careful study during the past year reveals
the fact that, out of the one hundred and nine actual fires that have occurred, fully two-
thirds of the alarms have been struck by the automatic telegraph fire alarm boxes.
Alexander Ross designed the first electric fire detector in Brooklyn, NY in 1863,
however, it was William Watkins’ invention that was first to see the commercial use and
later on had industrialized tenuously monitored fire alarm systems using heat detectors
way back to 1870 so as had formed the first private fire alarm company called the Boston
Automatic Fire Alarm Company in 1873 [6].
9
Figure 2-1. Intelligent Fire Alarm System [7]
Fire alarm systems are necessitated by law through building codes, fire codes and
special acts or bylaws. The choice of a particular type of equipment to be used in a fire
alarm system depends on the environment of the residence, the size of the building, the
number of occupants and the level of protection desired. In order for it to be operational,
a fire alarm system must be personalized to the building and the types of fire that could
advance.
2.3.1 ZigBee
In [8], ZigBee based wireless sensor network has been critically applied to deal
with low data rate and handle point to multi point network. It fulfills all the requirements
at the finest point and has become an accepted protocol because of its low power
consumption and capability of mesh networking with wide range of nodes. The need and
choice of many nodes are solved using ZigBee. As a proof of concept, the system is
designed to work with all available and ready-made platforms like Arduino, X-Bee which
10
can be improved by developing the antenna. Through ZigBee, the sensor nodes would not
require any cable joint to central processing box; damaged sensor node would not affect
the entire system; installation of sensor nodes would not create a messy connection;
wireless devices can provide encryption that ensures safety; system can accumulate huge
number of nodes; and the system can now mitigate damage caused by fire than traditional
fire detection system.
For the safety of huge areas, the Zigbee wireless network interface such that in case
of fire break in any buildings, a direct communication channel is developed which will
transmit a signal to the control room [10]. There are six individual nodes and a central
node. Individual nodes are placed on the six major fire hazard prone zones in the campus
and the central node is placed in the control room. The temperature of the specific area is
ceaselessly conveyed by each of the nodes. Each can observe the fundamental measure of
every area wherein the connections are situated. The data with respect to heat and
humidity will become important to decide the rescue operation in case of fire breakout. In
this system, each individual node measures and transmits the temperature and humidity
11
of the particular zone continuously. Through this, one can monitor the temperature status
of the zones where the nodes are placed through serial link in Terminal vl.9b from the
control room. Upon the occurrence of fire breakout, the fire sensor detects the fire and
from the signal sent to the control room, location of the zone can be identified and
necessary actions can be taken. The nodes maintains a wireless interlink among
themselves as well as with the central node for this purpose. Figure 2-2 shows the
diagrammatic representation of data being sent to the central node [10].
Figure 2-2. Representation of data being sent to the central node [10]
Likewise, the hooter in each node will alert the control room upon the occurrence
of fire breakout. Through transmission of data from the central node, the manual control
of the hooter can be done. The data transmission will be then carried out with the
assistance of the multi hopping technique whenever the distance of the central node and
the individual node becomes wider. A multi hoping technique is adopted for the effective
transmission of signal in case that the emergency zone lies beyond the reach of the
central node.
12
Meanwhile, wireless sensor nodes periodically detect environmental parameters
[11]. Micro-controller units (MCUs) and radio frequency (RF) chips will be initialized
first, will choose the passage, and will open interrupt to receive information when the
system starts to function. Eventually, it will split up ADC and accumulate information to
handle. The signal and sensor node address will be compounded as alarm data and
interpreted into ZigBee communication rule accumulation whenever there is an alarm
signal. The accumulation will be sent to the data sink node in order to return
substantiation upon choosing the best way of communication. Through this, an entire
ZigBee wireless communication will be fulfilled. After receiving the confirmation
returned from the sink node, the sensor node will stay at low power mode automatically
[11].
According to the network [12], the ZigBee will be set into three operating modes
including:
Mode 1: Connected with the system motherboard. ZigBee modules receive others
information and send the control command given by the system board to other ZigBee
modules. This is the core hub of the motherboard and wireless communications
equipment.
Mode 2: ZigBee module, connected with household appliances through the relay, is
placed in receiving state. The ZigBee module controls electronics to make the appropriate
action when receiving the control command from other ZigBee modules.
Mode 3: The sensors connected with the relay, placed sent state. The alarm signal will be
sent to other ZigBee module when ZigBee module receives the alarm signal to the sensor.
Indeed, ZigBee was arranged for low power applications which aim for longer
lasting battery life. To address the need for a cost-effective wireless networking solution,
the ZigBee was created. This would therefore support the low data rates, reliability and
safety. Furthermore, ZigBee wireless network can be implemented in any monitoring and
control application that requires a wireless link such as home control and security,
medical monitoring, sensor networks and active RFID [9]. Table 2-1 shows the
characteristics of Zigbee wireless network.
13
Table 2-1. Characteristics of ZigBee Wireless Network [9]
2.3.2 ZigBee-WiFi
This network has low complexity, low power consumption, high cost
performance, and high fault tolerance, embedded with a high communication speed, good
firmness, and accessible way to terminal. The ZigBee in this network is based on
CC2530F256 core chip while the WiFi is based on RT5350 and serial ports. The system
adopts the thought of ZigBee network which transforms to WiFi network through which
the signals are transferred to the screening area. Fire signals and localization information
will be showed on the hand terminal and control center [13], so as to be real time
obtained by the security personnel. Figure 2-3 shows the construction of the scheme.
14
Figure 2-3. Zigbee-WiFi network [13]
Assets upon using the ZigBee-WiFi network would widen the extent and conduct
time interval farther than ZigBee network and ensure the monitoring center everywhere.
Additionally, it would convey easily the image video of each area in buildings to the
screening center, and scrutinize fire incisively. Through ZigBee-WiFi network, the
information gathered can be scrutinized, clarified and manipulated.
Both wired and wireless connection between the fire alarm controller and router can
be chosen according to the field environment [14]: Controller Area Network (CAN) bus
communication for wired system, and 433M RF or GPRS communication for wireless
system. Router only report to the controller when fire signal or fault signal is polled.
15
Field modules on the other hand have three modules, including fire trigger module
which extorts fire detector and manual alarm button; facility monitoring module which
lets in fire door monitoring device and fire hydrant pressure monitoring device; and
output module which includes sound and light alarm and connection output module.
Figure 2-3.
2-4. Architecture of Wireless Fire Alarm System [14]
The field module communication radius can reach up to 35m in case of 1-wall
barrier [14]. A same frequency network can cover a total space of approximately
1000𝑚2 . The communication radius will be longer in places without direct barrier wall.
Besides, the field module’s operating current with 2400mAH battery can be up to three
years which can meet the actual needs of 3-in-1 and other small places. The system’s
communication packet loss rate is as low as 1/11110, which means loss may occur once
out of a thousand times of communication at most [14]. Fire alarm reporting time can be
controlled within five seconds while the field module’s failure discovery can be
controlled within ten seconds at the measure of one relay module bringing off 100 field
modules.
16
signal, with strong diffraction ability [14]. 433M RF would complete the design of a
wireless fire alarm system so the actual fire fighting requirements of 3-in-1 places, brick
or other historical buildings, and other temporary buildings will be figured out.
2.4 Sensors
Rh is a heater resistance which promotes the reaction between Rs and CO. Series
parallel connection partial voltage circuit consists of Rp, Rj and Ri. The resistance of Rs
decreases while the output voltage rises when CO touches the sensor. The output voltage
rises proportionally and directs output voltage to enclosed processor with the rise of the
17
concentration of the gas CO. The relationship between CO concentration and output
voltage is shown [16].
Vcc R1 R j
Vout
Rs R1 R j R p R1 R j Rs R p
The CO sensor has the characteristics of high sensitivity and quick response [16]. It
can detect the smoke of low compactness by adopting high sensibility photo-voltaic cell
and optimized amplifying circuit. Additionally, it can detect CO gas of low concentration
in the short time.
In [15], studies show that CO is the best among the four warming gases which
include CO2, H2 and O2 upon presenting it in all six types of fires including cellulose
fires (wood), smoldering pyrolysis (cellulosic) and cotton fires, open plastic fire
(polyurethane), and liquid n-heptane and methylated spirit fires. Its concentration was
18
high in relatively slow burning fires and low in faster burning fires. Compared to the
conventional fire detectors, the CO sensor is able to supply security against smoldering
fires involving oxidization of integrated materials in which fundamental measures of CO
are produced at an early stage of the combustion.
2.5 Algorithm
20
Figure 2-7. Sensor Node flow chart [18] Figure 2-8. Coordinator node flow chart [18]
The design cost of sensor node is minimum [19]. Therefore, the low power mode
by the computer system is enforced to decrease the power intake. The data can be sighted
at the real time with the cost reduction. Truly, it is designed with all possible fire
detecting sensor types. Even the most compressible computing method to lessen the
software design complexity will be synthesized.
21
Figure 2-9. System block diagram [18]
22
The ZigBee localization algorithm is settled on the relation between the anchor
nodes and the blind nodes to attain the blind node perspective. The blind node sends
RSSI signal to the same anchor repeatedly to calculate the average distance between two
points as the final RSSI value. Figure 2-12 shows the relationship between the two [13].
Figure 2-10. Spatial relationship between anchor node and blind node graph [13]
d
The general model is RS d RS do 10 lg (1) , equation (1) can
o
d
RS d RS do
Where:
RS (d0) - is the received RSSI value from the launch point d0, also called the
reference distance, and it is usually valuated 1m
23
ζσ – is the gaussian random noise, of which the standard deviation is σ and the
average is 0.
24
On the other hand, in order to continuously monitor the ambient environment for
smoke and abnormal increase in temperature, fuzzy logic provides an easy way of dealing
with uncertain data from multiple sensors by aggregating these to make a decision. For
instance [20], a crisp temperature value may be classified into cold, normal or hot fuzzy
set with a degree through rectification. The scheme utilizes the center of the area that was
being diversified to get the system output which gives the fire status. Figure 2-14
illustrates the underlying design of a fuzzy logic system.
A multi-sensor fire detection system using fuzzy logic has been designed and
developed. This scheme employs a multi-sensor formulation where the outputs of smoke,
flame and temperature modify to the fire alert option and bring forth an undeviating fire
detection system. Data-based upshot incurred by initiating flame, smoke, and heat to the
device shows that the system can efficaciously intensify the remarkableness of a fire
detection system.
25
2.6 Internet of Things (IoT) in Fire Alarm Monitoring system
Internet of Things (IoT) has now got over an important role in today’s economic
and technology improvement that its significance in advancing economic development
has gone productive [21]. Through this, people would immediately notice the various
kinds of smart convergences of internet with regards to the information of things because
of the exchanges of data that the things have perceived in the environment.
Technologically, IoT can be divided into three layers including perception layer, network
layer and application layer. The perception layer, which is made up of sensors, including
RFID electronic label, read-and-write equipment, is used to identify objects and collect
information around them. It is consider as the foundation for the application and
development of IOT. To transmit and process information sent by the perception layer,
the network layer is used whose data processing and management technology is one of
core technologies of internet. The application layer provides customized service for end
users by processing analyzed specific data from perception layer with software
development and intelligent control technology. Indeed, IoT could provide a huge
number of benefits to our modern world [21]. Scholars stated that the IoT could be
helpful in an inventory management, production efficiency, waste management, urban
planning, environmental sensing, social interaction gadgets, continuous care, emergency
response, and smart product management.
In case of fire, IoT helps any people feel personally at any time and make them have
awareness as to what is happening and might happen [21]. Through IoT, people within
buildings can have a good understanding on the safety of own living environment and can
make real-time monitoring on their homes. Additionally, it would be easier to send
signals and firefighting linked control signal, and display the location and time of fire so
people can timely detect fire and take effectual tools in putting out the fire and reducing
the death and damage of properties. Fire detection could then be realized with the
advancement of IoT in these modern times.
26
3 Methodology
3.1 Introduction
Methods
27
3.2 Hardware Design
28
serial communication and a myriad of other auxiliary components such as resistors,
capacitors and LEDs. With the provision of the Espressif systems, the Software
Development Kit (SDK) of the ESP8266 contains a lightweight implementation of a
TCP/IP control stack (lwIP) for WiFi communication.
29
which then can be applied as domestic gas leakage detector, industrial CO detector, and
portable gas detector [23].
30
Figure 3-4 DS18B20 Temperature sensor
31
Figure 3-5. PWB-064-NOS mobile power bank
3.2.5 Buzzer
The buzzer will serve as an alarm device that will alert the building occupants in
case of fire occurrence.
32
Upon maintaining the speed, the WRT1900ACS can simultaneously maintain 2.4 GHz
600 Mbps and 5 GHZ 1300 Mbps. To boost the connection, the unit is equipped with 4
antennas which are detachable and adjustable, so it can reach the maximum level upon
manipulating its wireless signal strength [25].
33
Figure 3-8. Gas sensor and ESP8266 ESP-12E WiFi module circuit interface
Figure 3-9. DS1820 temperature sensor and ESP8266 ESP-12E WiFi module circuit
interface
34
Figure 3-10. Buzzer and ESP8266 ESP-12E WiFi module circuit interface
The algorithm that will be used in the system is a decision-rule based algorithm. It
is a series of list of conditions to be able to come up with an action that is based on the
test-fire experiments. This algorithm maps an observation to an appropriate action. This
has the ability to conserve undependable human experience, acquire a more pursuant
system, and lessen human skills required in equal time and place.
The rule-based system uses human knowledge to solve real-world problems which
necessitate human intelligence [26]. This is often represented in the form of if-then rules
which are used to hypothesize the conditional statements which would then constitute the
complete knowledge base. The if-then rule takes over the form ‘if x is A, then y is B’.
Logically, the antecedent is the if-part of the rule while the conclusion is the then-part.
When the implementation of the rules and the language definition of the input and output
35
models are used during the analysis process without considering the specific output, the
analysis of a rule-based system is said to be static which would determine whether or not
the rule-based system itself meets various, specific requirements. Meanwhile, there is a
need for rules which would assist the verification and validation (V&V) of the algorithms
which is considered as the process to ensure that the rules carry out their supposed
function and come across qualifications [27]. Verification determines whether or not the
function is fulfilled, whereas validation finds out whether or not the end-user
requirements were met. In this case, the application order of the rules is assisted by a
conflict resolution strategy which can be determined by the actual area such as follows:
1. First applicable: Control over the order in which the rules are fired would be allowed
upon firing the first applicable rule when the rules are in a qualified order.
2. Random: Selects a single random rule upon firing from the conflict set.
3. Least recently used: This is perfect when all rules are required for the solution of such
a problem for it increases the number of each rule.
4. Best rule: Weight specifies the relative circumstance to the option and based on this,
the rule with the most preferred result is selected.
36
Figure 3-11. Decision Rule Algorithm Flowchart
The ESP8266 board manager is downloaded for board support to the Arduino IDE.
The Arduino IDE is used for coding the firmware that will be uploaded to the hardware
and used to program the transceiver nodes.
37
3.4.1 Firmware Loading Process
The coded firmware from the ESP8266 Arduino IDE and the program source code
is uploaded to the hardware via the USB to Transistor transistor logic (TTL) (3.3V) board
module for convenience of uploading programs from the computer via its USB port.
The software design program of the system is presented in the flowchart. Here it
discusses how the software handles the decision rule based algorithm.
38
3.6 Network and Communication Design
A network of star topology will be used in the system; all the nodes of the network
are connected to the central device which is the router with a point-to-point connection.
The router will handle the routing and configuring of the client nodes (i.e. tablet,
smartphones, computers, etc) [22]. However if the nodes are very far from the main
router, another wireless router will be used to act as a repeater and consequently increase
the signal transmission range and strength of the nodes until it reaches the main router.
39
wireless networking standard first supported by the original Apple TV. For simplicity,
Apple quietly started referring this wireless networking standard as 802.11n WiFi on July
20, 2011. To increase the data rates, the IEEE 802.11n, uses multiple antennas. The
multiple-input multiple-output (MIMO) which is a signal processing and smart antenna
technique is used to transmit multiple data streams through multiple antennas. This is a
supplementary improvement which results to five times the presentation and twice the
range compared to the earlier 802.11g standard [28].
At a theoretical maximum speed of 300 Mbps, the 802.11n can operate on either 5
GHz or 2.4 GHz frequency in mixed mode. This will help systems only able to use
802.11b or 802.11g, however, it will slow the entire network down to the maximum
speed of the earliest standard connected [28].
40
monitoring of the system. The communication system is based on IEEE802.11n standard
wireless protocol.
This entails the discussion of evaluating the proposed system. A can of charcoal
will be used to initialize the test-fires and this will be placed near to a sensor node.
During the conducting of the test-fire experiments, there should be a presence of fire
safety officers for safety and security reasons in case of any untoward incidents that may
happen during the test-fire experiments. These test-fire experiments will seek an approval
to the USC administration to be able to conduct the test-fire experiments of the study.
Table 3-1 summarizes the test-fires facilitated to assess the test design experiments.
41
TF1, TF2, TF3, TF4, TF5 Yes/No
LB382 office
and TF6
TF1, TF2, TF3, TF4, TF5 Yes/No
LB383
and TF6
TF1, TF2, TF3, TF4, TF5 Yes/No
LB384
and TF6
TF1, TF2, TF3, TF4, TF5 Yes/No
LB385 (SAL)
and TF6
TF1, TF2, TF3, TF4, TF5 Yes/No
LB386
and TF6
TF1, TF2, TF3, TF4, TF5 Yes/No
LB387
and TF6
In each corresponding rooms, there are corresponding nodes allocated. In this test,
the nodes were tested if it is reliable and able to transmit the data to the main router if
there is any fire occurrence within the corresponding rooms.
42
3.8 System Deployment
The proposed system will be deployed in one of the wing of the third floor,
particularly from LB381 to LB387, of the Lawrence Bunzel building of the University of
San Carlos.
The existing wired commercial products will be used for comparison with this
study in terms of installation time, communication and detection systems reliability, and
cost.
43
References
[1] Nowacki GJ, Abrams MD, "The demise of fire and mesophication of forests in the
eastern United States," in BioScience 58, 2008, pp. 123-128.
[2] The Geneva Association Staff, "World Fire Statistics Fire and Climate Risk," The
Geneva Association, 2014.
[5] Chang-Su Ryu, "IoT-based Intelligent for Fire Emergency Response Systems,"
International Journal of Smart Home, vol. 9, no. 3, pp. 161-168, September 2015.
[6] Wayne D. Moore, "Fire Alarm System Research - Where it's been and where it's
going," Hughes Associates, Inc., RI 02886, 2006.
[7] Honeywell, "Fire Detection Systems Guide," Morley IAS Fire systems, 2002.
[8] Taoufikul Islam; Hafiz Abdur Rahman; Minhaz Ahmed Syrus, "Fire Detection
System with Indoor Localization using ZigBee based Wireless Sensor Network," in
Informatics, Electronics & Vision (ICIEV), 2015 International Conference on IEEE
conference publications, Bangladesh, 2015, pp. 1-6.
[9] Mohd Faris Mohd Fuzi; Alif Faisal Ibrahim; Mohammad Hafiz Ismail; Nur Syakira
Ab Halim, "HOME FADS: A Dedicated Fire Alert Detection system using zigbee
wireless network," in Control and System Graduate Research Colloquium
(ICSGRC), 2014 IEEE 5th IEEE conference publications, Perlis, Malaysia, 2014, pp.
53-58.
44
[10] Meera C S; Pinisetti Swami Sairam; Sunil Sunny; Richa Singh; Rajesh Singh,
"Implementation of an Incampus Fire Alarm System using ZigBee," in Computing
for Sustainable Global Development (INDIACom), 2015 2nd International
Conference on IEEE Conference Publications, Dehradun, India, 2015, pp. 732-737.
[12] Jun Hou, Chengdong Wu, Zhongjia Yuan, Jiyuan Tan, Qiaoqiao Wang, Yun Zhou,
"Research of Intelligent Home Security Surveillance System Based on ZigBee," in
International Symposium on Intelligent Information Technology Application
Workshops, Liaoning, China, 2008, pp. 1-4.
[13] Liu Yunhong; Qi Meini, "The Design of Building Fire Monitoring System Based on
ZigBee-WiFi Networks," in 2016 Eighth International Conference on Measuring
Technology and Mechatronics Automation (ICMTMA), Dalian, China, 2016, pp.
733-735.
[14] Wen-hui Dong, Li Wang, Guang-zhi Yu, Zhi-bin Mei, "Design of Wireless
Automatic Fire Alarm System," in 2015 International Conference on Performance-
based Fire and Fire Protection Engineering (ICPFFPE 2015), Liaoning, China,
2016, pp. 413-417.
[15] Zhigang Liu, Andrew Kim, "Review of recent developments in fire detection
technologies," Journal of Fire Protection Engineering, vol. I, no. 39, pp. 1-22, May
2003.
[16] Liu Shixing; Luo Xinxin Yao Wei; Chen Changzheng; Yin Kun; Yi Maoxiang; Hu
Haibing; Zhang Yongming, "Aspirating fire detection system with high sensitivity
and multi-parameter," in Information Science, Electronics and Electrical
Engineering (ISEEE), 2014 International Conference on IEEE conference
publications, China, 2014, pp. 400-404.
45
[17] Xufeng Wei; Yahui Wang; Yanliang Dong, "Design of Fire Detection System in
Buildings based on wireless multimedia sensor networks," in Intelligent Control and
Automation (WCICA), 2014 11th World Congress on IEEE conference publications,
Beijing, 2014, pp. 3008-3012.
[18] Raditya Budi Nugroho; Erwin Susanto; Unang Sunarya, "Wireless Sensor Network
for Prototype of Fire Detection," in Information and Communication Technology
(ICoICT), 2014 2nd International Conference on Information and communication
technology, Bandung, 2014, pp. 469-474.
[20] Robert Sowah; Abdul R. Ofoli; Selase Krakani; Seth Fiawoo, "Hardware Module
Design of a Real-time Multi-Sensor Fire Detection and and notification system using
fuzzy logic," in 2014 IEEE Industry Application Society Annual Meeting, Ghana,
2014, pp. 1-6.
[25] YellowGurl.com, "Best Wireless Routers 2017 Reviews and Comparison," 2016.
46
[26] Ajith Abraham, "Rule-based Expert Systems," , vol. 130, Oklahoma State
University, Stillwater, OK, USA, 2005, pp. 909-919.
[27] László Lengyel, "Validating Rule-based Algorithms," vol. 12, no. 4, pp. 1-17, 2015.
[28] Online, "What is is 802.11n? How is it different from 802.11b, 802.11g, and
802.11a," EveryMac.com, 2012.
47
Gantt Chart
48