You are on page 1of 36

Internet of Things

Operations Management for Manufacturing

SUBMITTED TO DR. SANJAY KUMAR

BY PGHR10 Group 4 B S Swathi (10PGHR10) Rohan Pai (10PGHR29) Prakhar Ranjan (10PGHR35) Ranjay Bera (10PGHR41)

Management Development Institute Gurgaon 122001

1|Page

Acknowledgement

We would like to express deep gratitude towards Prof. Sanjay Kumar for being a guiding light and for encouraging us all throughout the course of the project. Without him it wouldnt have been possible to gain insights into such vast and hugely influential facet of advancement of technologies and operations. We all sincerely thank you Sir.

BY PGHR10 Group 4 B S Swathi Rohan Pai Prakhar Ranjan Ranjay Bera Sivani Nanda (10PGHR10) (10PGHR29) (10PGHR35) (10PGHR41) (10PGHR47) (10PGHR58)

Vasudha Bhardwaj

2|Page

Table of Content

S.No.

Particulars

Page

INTRODUCTION

1.1

CONCEPT AND VISION OF INTERNET OF THINGS

1.2

UBIQUITOUS NETWORKS AND COMPUTING

1.3

NEXT GENERATION NETWORKS

TECHNOLOGIES FOR INTERNET OF THINGS

10

2.1

RADIO FREQUENCY IDENTIFICATION (RFID)

10

2.2

SENSOR TECHNOLOGIES

12

2.3

NANOTECHNOLOGY

13

APPLICATION SCENARIOS AND BENEFITS

14

3.1

SMART FACTORIES AND STORES

14

3.1.1

AUTOMATED INVENTORY CONTROL

15

3.1.2

AUTOMATED SUPPLY CHAIN MANAGEMENT

18

3.2

INTELLIGENT MONITORING AND CONTROL

18

3.2.1

ENVIRONMENT MONITORING AND CONTINGENCY CONTROL

18

3.2.2

SMART POWER GRIDS

21

3.3

INTELLIGENT TRANSPORTATION SYSTEMS

24

3|Page

3.3.1

ADAPTIVE CRUISE CONTROL

24

3.3.2

COLLISION AVOIDANCE NOTIFICATION

25

3.3.3

TRANS-SHIPMENT CONTROL

26

3.3.4

AUTO HIGHWAY TOLL, PARKING MANAGEMENT

27

3.3.5

AUTOMATED DRIVE

27

3.4

SMART HOMES AND HOSPITALS

27

3.4.1

AUTOMATED ENERGY CONSUMPTION CONTROL

28

3.4.2

AUTMATED PERSONAL PLANNING AND SCHEDULING SYSTEM

29

3.4.3

HEALTH CARE SYSTEM

29

CHALLENGES AND FUTURE DIRECTION

31

4.1

TECHNOLOGICAL

31

4.2

PRIVACY

32

4.3

SOCIAL

33

REFERENCES

34

1. Introduction
4|Page

1.1. Concept of Internet of Things


When entering a building of the future, you might be welcomed by name with a personal greeting and given security access suitable to your status (e.g., employee, delegate or guest). To do this without human intervention would require not only intelligent sensors but also perhaps ID tags, readers and interaction with one or more databases containing your profile. These three elements sensors, tags and communication and processing capacity together make up a future network vision identified by a number of different names. Some use the terms invisible, pervasive or ubiquitous computing, while others prefer to refer to an omnipresent intelligence to describe a future Internet of Things. The concept of ubiquitous is wider than just a geographical measure, and the expression anywhere, anytime, by anyone and anything (the 4A vision) has come to be used to illustrate the trend towards a ubiquitous network society. The significance of each A is: Anywhere: It signifies an omnipresent network of intelligent things wherever needed, be it at office, factories, home, stores, hospitals, while travelling, etc. Anytime: It signifies a 24x7 smart network of things that work irrespective of whether you are present or not, even while you are asleep in order to give you a better experience and functionality whenever you need it. Anyone: It signifies the utility of internet of things is not limited to localized needs but can be put to public use. Depending on the application the internet of things may provide selective access to authorized user or may be accessible to everyone. Anything: It signifies the scope of internet of things to include all kinds of things whose utility be more if the object has data storage and processing capability and is a part of the internet of things.

1.2. Ubiquitous Networks and Computing


5|Page

The term Ubiquitous Sensor Networks (USN) is used to describe a network of intelligent sensors that could, one day, become ubiquitous. The technology has enormous potential as it could facilitate new applications and services in a wide range of fields from smart factories and stores, to homes, healthcare, transportation, security and environmental monitoring, to promoting personal productivity and enhancing national competitiveness. But USN will also require huge investments and a large degree of customization and lot of standardization efforts. The Internet of Things is a technological revolution that represents the future of computing and communications, and its development depends on dynamic technical innovation in a number of important fields, from wireless sensors to nanotechnology. First, in order to connect everyday objects and devices to large databases and networks and indeed to the network of networks (the internet) a simple, unobtrusive and cost-effective system of item identification is crucial. Only then can data about things be collected and processed. Radio-frequency identification (RFID) offers this functionality. RFID technology, which uses radio waves to identify items, is seen as one of the pivotal enablers of the Internet of Things. RFID systems offer more than being the next generation barcodes in that they can track items in real-time to yield important information about their location and status. Early applications of RFID include automatic highway toll collection, supply-chain management (for factories and large retailers), pharmaceuticals (for the prevention of counterfeiting) and e-health (for patient monitoring). More recent applications range from smart stores to personal security. RFID tags are even being implanted under human skin for medical purposes. E-government applications such as RFID in drivers licenses, passports or cash are under consideration. RFID readers are now being embedded in mobile phones. Nokia, for instance, released its RFID-enabled phones for businesses with workforces in the field. In addition to RFID, the ability to detect changes in the physical status of things is also essential for recording changes in the environment. In this regard, sensors play a pivotal role in bridging the gap between the physical and virtual worlds, and enabling things to respond to changes in their physical environment. Sensors collect data from their environment, generating information and raising awareness about context. For example, sensors that detect intrusion in protected areas like vaults need to be able to distinguish an intruder from an authentic user, capture the information 6|Page

about the intruder like his biometrics, images and videos, secure the premises by alerting security mechanisms that a part of the internet of things and also send the intruder information to the authorities over the network. Indeed, with the benefit of integrated information processing, industrial products and everyday objects will take on smart characteristics and capabilities. They may also take on electronic identities that can be queried remotely, or be equipped with sensors for detecting physical changes around them. Eventually, even small objects might be tagged and networked. Such developments will turn the merely static objects of today into newly dynamic things, embedding intelligence in our environment, and stimulating the creation of innovative products and entirely new services. Embedded intelligence in things themselves will distribute processing power to the edges of the network, offering greater possibilities for data processing and increasing the resilience of the network. This will also empower things and devices at the edges of the network to take independent decisions. Advances in smart homes, smart vehicles and personal robotics are some of the leading areas. Scientists are using their imagination to develop new devices and appliances, such as intelligent ovens or online personal scheduling system that can be controlled through phones or the internet. More and more such devices might be connected to offer more useful functionality with reduced effort and more benefits. Second, data collection will benefit from the ability to detect changes in the physical status of things, using sensor technologies. Embedded intelligence in the things themselves can further enhance the power of the network by devolving information processing capabilities to the edges of the network. Finally, advances in miniaturization and nanotechnology mean that smaller and smaller things will have the ability to interact and connect. A combination of all of these developments will create an Internet of Things that connects the worlds objects in both a sensory and an intelligent manner. The Internet of Things will draw on the functionality offered by all of these technologies to realize the vision of a fully interactive and responsive network environment. Modern factories are increasingly producing highly customized products so as to satisfy the individual needs of their customers and to gain a sustainable advantage over competitors. In 7|Page

customized production the production process remains the same. However, the parts moving through the production lines vary, which results in different variants of the same product. In such an individualized production scenario it is essential to ensure that product parts move through the production lines in a desired sequence. A disruption in the correct sequence of these parts will produce an undesirable final product, which will not be consistent with the production plan. The Smart Real-Time Factory initiative envisions to create a context-sensitive manufacturing environment that can monitor production processes in real-time so that any disruptions in production can be detected immediately. RFID readers can be used for real-time production monitoring by putting RFID tags on the product parts and installing RFID readers on the production lines. The technology can yield significant benefits to factories of future by improving productivity and quality, reducing human intervention and reducing costs through higher level of automation and co-ordination. In this paper we consider the technologies that are making Internet of Things a possibility, the application scenarios and benefits offered by it, the challenges involved and future directions. 1.3.

Next Generation Networks (NGN)

In an NGN, there is a more defined separation between the transport (connectivity) portion of the network and the services that run on top of that transport. This means that whenever a provider wants to enable a new service, they can do so by defining it directly at the service layer without considering the transport layer - i.e. services are independent of transport details. Increasingly applications, including voice, tend to be independent of the access network (de-layering of network and applications) and will reside more on end-user devices (phone, PC, set-top box). The idea is to create seamless convergence and integration of services voice, data, video, and other increasingly intermingled multimedia services seamlessly over single or multiple infrastructures and platforms -- as well as the capability to access such services at any time, at any place, and with an ever-expanding array of network aware things be it fixed or mobile.

8|Page

Fig :1 NGN Layers

The key to the success of internet of things is standardization to make it possible for the variety of things to be able to seamlessly communicate with each other. The NGN would have an layered architecture where the service layer would hide the technicalities of the connectivity or transport layer from the application layer so that the service developers can use the standardized Service API without having to worry about the underlying transport layer details. Thus a smart object would be able to communicate with other smart objects over the internet of things irrespective of whether it is telephony or internet based object or the protocol it uses.

9|Page

Fig.1 Shows 3 layers, connectivity layer that will be the transport layer, the service layer that will provide a standardized service API for access, service, communications and session control to the feature or application layer. The service layer thus hides the implementation details of the transport layer from the application layer thereby providing a single uniform view of the network to all the objects on the network. Moreover, the over and about the traditional services like access/transport/ routing/switching services, basic connectivity/resource and session control services, and various value-added services. NGNs will likely enable a much broader array of service types, including: Specialized resource services (e.g., provision and management of trans-coders, multimedia multipoint conferencing bridges, media conversion units, voice recognition units, etc.) Processing and storage services (e.g., provision and management of information storage units for messaging, file servers, terminal servers, OS platforms, etc.) Middleware services (e.g., naming, brokering, security, licensing, transactions, etc.) Application-specific services (e.g., business applications, e-Commerce applications, supplychain management applications, interactive video games, etc.) Content provision services that provide or broker information content (e.g., electronic training, information push services, etc.) Interworking services for interactions with other types of applications, services, networks, protocols, or formats (e.g., EDI translation) Management services to maintain, operate, and manage communications or computing networks and services. One or more of these can be used by the smart objects for providing enhanced functionalities.

2. Technologies for Internet of Things


2.1. Radio frequency Identification

10 | P a g e

Radio-frequency identification (RFID) is a technology that uses communication via radio waves to exchange data between a reader and an electronic tag attached to an object, for the purpose of identification and tracking. It is possible in the near future, RFID technology will continue to proliferate in our daily lives the way that bar code technology did over the forty years leading up to the turn of the 21st century bringing unobtrusive but remarkable changes when it was new. The advantages of Radio Frequency Identification are many and include being able to assign an item with a unique identifier. Another perk to the new technology is that RFID tags do not have to be physically placed. Tagged devices can be read from up to 20 feet away from the reader and multiple items can be queried simultaneously. RFID has many applications; for example, it is used in supply chain management to improve the efficiency of inventory tracking and management. Some big names in the retail industry have climbed on board the RFID freight train. Notably Wal-Mart, which has not only adopted RFID but pressured its suppliers to do so too. The US retail giant issued a mandate to its top 100 suppliers in late 2004, requiring them to use RFID tags. The suppliers struggled to comply, so more Wal-Mart mandates followed. Finally, after years of slow take-up, Wal-Mart introduced fines for non-compliance in January 2008. In 2010 two key factors drove a significant increase in RFID usage: decreased cost of equipment and tags and increased performance to a reliability of 99.9%. Current areas of significant use are financial services for IT asset tracking and healthcare with more than 60% of the top medical device companies using passive RFID in 2010. RFID is becoming increasingly prevalent as the price of the technology decreases. In January 2009 Envego announced a 5.9 cent tag and in March 2010 a Korean laboratory successfully created a printed chip using carbon nanotubes that would halve the price of a passive UHF RFID tag to about three cents by late 2011. Bokodes: Could Compete With RFID in Some Areas Recently MIT announced a new type of bar code, called a bokode. Bokodes can hold thousands of times more information than bar codes and can be read by a standard mobile phone camera. 11 | P a g e

Bokodes could replace RFID systems "in some near-field communication applications," suggested MIT Media Labs. For example, RFID cannot be used for credit cards, because the data can be read at a distance and so isn't secure enough. The Bokode could encode just as much information, but require an open line-of-sight to the card to be read, increasing security. While Bokodes currently cost about $5 each in their prototype stage, MIT expects the price to drop to about 5 cents when produced in even relatively small volumes. 2.2.

Sensor Technologies

Sensor technologies are used for identification of objects and environment settings detection. More and more objects are becoming embedded with sensors and gaining the ability to communicate. The resulting information networks promise to create new business models, improve business processes, and reduce costs and risks. For example, IBM has a whole set of RFID and sensor technology solutions. But more importantly it has been busy working with various manufacturers and goods suppliers in recent months, to introduce those solutions to the world.

This month IBM made an agreement with Matiq, an IT subsidiary of Norway's largest food supplier Nortura. The project involves using RFID (radio frequency identification) technology to track and trace poultry and meat products from the farm, through the supply chain, to 12 | P a g e

supermarket shelves. This food tracking solution will help ensure that meat and chicken are kept in optimal condition throughout the supply chain. The system uses IBM's WebSphere RFID Information Center, together with IBM's sensor and actuator solutions. IBM is also working with German car manufacturer Volkswagen to add sensor technology to its operations. The aim is to improve Volkswagen's material logistics operations through the use of sensor technology. HP Labs has joined the race to build an infrastructure for the emerging Internet of Things. The giant computing and IT services company has announced a project that aims to be a "Central Nervous System for the Earth" (CeNSE). It's a research and development program to build a planetwide sensing network, using billions of "tiny, cheap, tough and exquisitely sensitive detectors." The technology behind this is based on nano-sensing research done by HP Labs. The sensors are similar to RFID chips, but in this case they are tiny accelerometers which detect motion and vibrations. 2.3.

Nanotechnology

RFID was invented in the middle of the 20th century and materials using nanotechnology have been on the market for over a decade. Combining technologies like these gives rise to the smart items that we hear more and more about, such as robots, smart cars and intelligent buildings. Also, advances in miniaturization mean that smaller and smaller things will have the ability to connect and interact with the network, and with each other. The ITU report examines recent advances in nanotechnology that will embody greater processing capabilities in increasingly tiny packages. Nanotechnology is somewhat less mature, although excitement is building about its prospects. The National Science Foundation (NSF) in the United States estimates that worldwide annual production for nanotechnology sectors will reach USD 1 trillion by 2015, with electronics and semiconductors showing promising signs of growth. 13 | P a g e

Current applications of nanotechnology include Nanofilters unsed in Bangladesh to filter water so that it is safe to drink. Nanosensors could be used to monitor water quality at reduced cost, while nanomembranes could assist in the treatment of waste water. Elsewhere, emerging technologies could improve the quality and medical treatment in the developing world, through using the Internet of Things to monitor the origin of safe drugs and eliminating counterfeits.

3. Application scenarios and benefits


3.1.

Smart Factories and Stores

SmartFactory is a fully integrated, turnkey and affordable factory automation solution can be deployed in less than 60 days to track and streamline the flow of materials through a manufacturing facility. It improves product quality, boosts productivity and reduces operational costs quickly by using pre-built, technology-specific functionality that is based upon Applieds 30-plus years of manufacturing execution system (MES) experience in semiconductor, LED and solar factories. Key Features o Continuous, real-time WIP tracking o Material consumption and equipment maintenance tracking o Instant scrap and breakage monitoring o Integration with Applied Materials software How SmartFactory setup is helping Applied Materials Inc. Offers MES and factory-specific templates and data models for rapid setup and use Enables problem visibility and issue identification through work-in-progress (WIP) and equipment tracking, lot dispatching, recipe management and engineering data collection Delivers factory reports and dashboards to improve inventory control and decision making 14 | P a g e

Provides advanced process control capabilities with its pre-integration to Applied E3 equipment engineering system Scales and changes with factory needs and budgets. Integrates with Applieds portfolio of advanced factory automation software to expand capabilities

Benefits of SmartFactory

3.1.1. Automated Inventory Control

15 | P a g e

Source: http://www.varismine.com Resource Tracking System Smart Tag is the latest in long range RFID (Radio Frequency Identification) tagging technology that reliably tracks the location and movement of resources, including personnel, vehicles and goods, for underground mines and tunnels. Smart Tag consists of active RFID tags, networked RFID readers and PC/Server running Smart Tag software. The readers connect to an Ethernet network using twisted-pair, fiber optics .Smart Tags web based software distribution enables multiple user access and provides a real-time view of resource location network wide.

Automated Inventory System at Walmart

16 | P a g e

3.1.2.

Automated Supply Chain Management

17 | P a g e

Source: www.ef3systems.com The Automated Booking System (ABS) is a totally integrated component of the eF3 Automated Supply Chain solution. The above solution includes operational monitoring, financial auditing and business intelligence reporting that feeds metrics back into the decision support tools thereby delivering a system that improves over time. Manual tuning, review and approval can be inserted at any step.

3.2. Intelligent Monitoring and Control 3.2.1. Environment Monitoring and Contingency Control

Remote Sensing in Disaster Management Internet of things will prove to be invaluable source of information that enables disaster management. Satellite imagery for better preparedness and initial assessments of the nature and 18 | P a g e

magnitude of damage and destruction will be combined with information provided by nanosensors and transmitters that would be released in the water, atmosphere and on land. Each sensor would be capable of performing a specific function like monitoring toxicity, monitoring climate changes, monitoring other errant patterns. For example in the recent Japanese disaster, such sensors would be useful to monitor radiation levels in different parts, in water and in soil, etc. Data availability and its timely delivery are crucial to saving lives and property during disasters, and technological developments are making positive contributions.

Natural Disaster

Source: http://www.armageddononline.org/images/natural-disasters-list.jpg Water catchment and eco-system monitoring

19 | P a g e

A network of sensors can be utilized to monitor water flows into catchment areas and areas where access is difficult or expensive. Information can be combined with other sensor networks providing information on water quality and soil condition, together with long term weather forecasting to assist with the equitable and efficient distribution of water for irrigation and environmental purposes.

Source: http://www.earthcraftdesign.com/images/

3.2.2.

Smart Power Grid

20 | P a g e

The "Smart Grid" is envisioned to overlay the ordinary electrical grid with an information and net metering system,that includes smart meters (see fig on next page). In a smart power grid, utilities on the Internet of Things get the ability to communicate with and control end-user hardware, from industrial-scale air conditioners to residential water heaters. They use that to better balance supply and demand, in part by dropping demand during peak usage hours. In return for giving up a degree of control over their own hardware, users find that less of their power drain occurs during the pricier peak hours. For the utilities, the lure is obvious: less need to maintain excess generating capacity and fewer instances where the oldest and dirtiest generating equipment has to be brought online. This sort of balancing will become more important as renewable power provides a larger fraction of the generating capacity. Changing usage patterns will be layered on top of the variable supply of wind and solar energy, making the management enabled by a smart grid an essential part of most longer-term plans //

21 | P a g e

Smart power grids may include Phasor Measurement Technique In a power grid phasor measurement units would be sampled from widely dispersed locations in the power system network via the internet of things and synchronized from the common time source of a global positioning system (GPS) radio clock. Synchrophasors measure voltages and currents at diverse locations on a power grid and can output accurately time-stamped voltage and current phasors. Because these phasors are truly synchronized, synchronized comparison of two quantities is possible, in real time. These comparisons can be used to assess system conditions. The technology has the potential to change the economics of power delivery by allowing increased power flow over existing lines. Flexible AC Transmission System (FACTS) A flexible alternating current transmission system (FACTS) is a system composed of static equipment used for the AC transmission of electrical energy. It is meant to enhance controllability and increase power transfer capability of the network. It is generally a power electronics-based system and would be part of the smart power grid. Adoptive Islanding When a fault occurs in an energy distribution network, adaptive islanding is initiated to supply energy to customers who are disconnected from the primary source of energy on the network. The customers are selectively connected to secondary energy resources that are distributed within the network. The selected customers are chosen in accordance with a profile that takes into account the amount of energy available from the distributed resources, the expected length of time to repair the fault, the recent energy demands of the customers, and levels of priority that are assigned to respective customers. These factors are monitored, and the selected customers who are connected to the distributed resources are dynamically adjusted during the time that the fault

22 | P a g e

exists. This would be an important feature of the smart power grid supported by the internet of things.

Self healing Grids In recent years, utilities added distributed automation systems that pick up on problems and respond. One, called a closed loop distribution automation control system, relies on radio communication along the lines when there's a problem. All the devices report to a controller over the internet of things, which studies the situation and then isolates the problem to minimize an outage.

23 | P a g e

Even more advanced is an "automatic network reconfiguration" system that involves putting fiber optics and communication devices along the grid that can control circuit breakers. In a matter of milliseconds, the internet of things based devices can identify a fault--say a tree falling on the power line--and isolate it. Then the system allows energy to keep flowing normally if the line is still intact.

3.3. Intelligent Transportation Systems 3.3.1. Adaptive Cruise Control

Modern vehicles that would be a part of internet of things would automatically slow the vehicle depending on context information received from the traffic department or sensors fitted along the roads like accident prone spots, sharp turns, work in progress roads, congested areas, lane departures etc. thereby avoiding accidents. Automobile companies like Ford have implemented adaptive cruise control based on radar sensors to detect obstructions in path like slow vehicles, people suddenly coming in way, etc. to warn the driver well in advance (up to 600 feet) and adjust the speed of vehicle to keep it at a pre-set distance even in low visibility conditions like fog and rain. In addition, the accelerator and break control system allows the driver to set vehicles speed and maintain it without accelerator pedal and when there is an obstruction, it would accordingly adjust the speed.

24 | P a g e

The challenge with this is on curving roads and heavy traffic where radar based system would find it difficult to handle the contingency making it necessary for the vehicles to be able to communicate with each other by sending signals about its velocity, location and dimensions to be able to navigate efficiently.

3.3.2.

Collision Avoidance Notification

This is an advanced version of adaptive cruise control where the vehicles will handle contingencies for which information is not available well in advance. E.g. if a accident suddenly happens on the road, the vehicle(s) involved in the accident would send a broadcast warning message to the surrounding vehicles which will then control the speed. The sensors along the road will also receive the warning message which will then intimate the signal system to handle/divert traffic accordingly.

25 | P a g e

Depending on the details in the warning message like velocity of vehicle, severity and location of accident, the vehicle will engage the airbag and apply the brakes within milliseconds faster than any human driver could possibly react.

3.3.3.

Transshipment Control

Transshipment control involves handling the transportation of goods or people from one location to other where there needs to be a change from one mode of transport to other along the way. E.g. consider a person is travelling from one location to other and has to travel by rail part of the journey and by bus to the destination. If the rail is delayed then it will inform the transshipment system which will then reschedule the booking of the bus ticket to ensure that the journey is smooth for the passenger or the shipment reaches as early as possible. But the challenge in this system is that it requires that the entire journey including booking is done through the transshipment system. Typically the process would be 1. The booking is done through the transshipment system. Say first part of the journey is by a plane and rest of the journey is through a bus. The transshipment system will book the

26 | P a g e

seat timings such that the journey is smooth for the passenger or quickest for the shipment. 2. If the plane is delayed, the transshipment system will be informed about this, it will determine which passenger or shipment is there on the delayed flight and then reschedules the corresponding bus ticket booking accordingly and so on. International courier giant Fedex released a new tracking device and web service for packages called SenseAware, that keeps tabs on the temperature, location and other vital signs of a package including when it's opened and whether it was tampered with along the way. Fedex is running a trial period of about a year with 50 health care and life science companies, for tracking delivery of surgery kits, medical equipment and even live organs.

3.3.4.

Highway, Parking Toll

The vehicle will automatically communicate with the toll collection system fitted alongside the poll post or parking-lot, balance would be deducted from your prepaid vehicle account. In case of highway toll, the record would be entered into the computer when the vehicle passes through entry post and will be verified at the exit post.

3.3.5.

Automated Drive

This is a very futuristic application of the internet of things where vehicles would be fitted with a number of sensors, cams and an intelligent system that would be able to steer the vehicle unmanned through traffic. Though such a vehicle has been attempted, the contingencies in traffic are many for the vehicle to be totally unmanned especially when the other vehicles and objects on the road are not a part of the internet of things.

3.4. Smart Homes


Home automation (also called domotics) is the residential extension of "building automation". It is automation of the home, housework or household activity. Home automation may include 27 | P a g e

centralized control of lighting, HVAC (heating, ventilation and air conditioning), appliances, and other systems, to provide improved convenience, comfort, energy efficiency and security. Home automation for the elderly and disabled can provide increased quality of life for persons who might otherwise require caregivers or institutional care. A home automation system integrates electrical devices in a house with each other. The techniques employed in home automation include those in building automation as well as the control of domestic activities, such as home entertainment systems, houseplant and yard watering, pet feeding, changing the ambiance "scenes" for different events (such as dinners or parties), and the use ofdomestic robots. Devices may be connected through a computer network to allow control by a personal computer, and may allow remote access from the internet. Typically, a new home is outfitted for home automation during construction, due to the accessibility of the walls, outlets, and storage rooms, and the ability to make design changes specifically to accommodate certain technologies. Wireless systems are commonly installed when outfitting a pre-existing house, as they reduce wiring changes. These communicate through the existing power wiring, radio, or infrared signals with a central controller. Network sockets may be installed in every room like AC power receptacles.

3.4.1.

Automated Energy Consumption Control

Energy Management System : An energy management system (EMS) is a system of computeraided tools used by operators of electric utility grids to monitor, control, and optimize the performance of the generation and/or transmission system. The monitor and control functions are known as SCADA; the optimization packages are often referred to as "advanced applications". The computer technology is also referred to as SCADA/EMS or EMS/SCADA. In these respects, the terminology EMS then excludes the monitoring and control functions, but more specifically refers to the collective suite of power network applications and to the generation control and scheduling applications. Manufacturers of EMS also commonly supply a corresponding dispatcher training

simulator (DTS). This related technology makes use of components of SCADA and EMS as a 28 | P a g e

training tool for control centre operators. It is also possible to acquire an independent DTS from a non-EMS source such as EPRI. 3.4.2. Automated Personal Planning and Scheduling System Automated planning and scheduling is a branch of artificial intelligence that concerns the realization of strategies or action sequences, typically for execution by intelligent agents, autonomous robots and unmanned vehicles. Unlike classical control and classification problems, the solutions are complex and must be discovered and optimized in multidimensional space. In known environments with available models, planning can be done offline. Solutions can be found and evaluated prior to execution. In dynamically unknown environments, the strategy often needs to be revised online. Models and policies must be adapted. Solutions usually resort to iterative trial and error processes commonly seen in artificial intelligence. These include dynamic programming, reinforcement learning and combinatorial optimization.

3.4.3.

SMART HEALTH: An Example

Smart Integrated Biodiagnostic Systems for Healthcare The SmartHEALTH Integrated Project will develop and deliver the next generation of smart diagnostic systems fully integrated into healthcare systems in Europe. Driven by key applications in cancer diagnostics, SmartHEALTH will enable enhanced medical diagnosis leading to earlier and more precise results and thus contributing to an increased quality of life. Objectives of the project: In addressing the high economic burden of the healthcare sector, prevention, early diagnosis and informed therapeutics are indispensable. Tests must be highly accurate and well integrated into medical management to avoid unnecessary treatment and stress to users. SmartHEALTH will 29 | P a g e

address these complex issues by developing highly intelligent diagnostic technologies that are fully integrated into healthcare systems, optimising their impact in management and work practice. Driven by key targeted applications in cancer diagnostics (breast, cervical and colorectal), the project will deliver prototype systems with the aim of moving instrumentation from the laboratory, through to portable devices localised at the point of care. Intelligent Security Security systems keep homeowners, and their property, safe from intruders. A smart home security system, however, offers many more benefits. Home automation technology can notify you of any problems, so you can investigate, even if you're not home. Artificial intelligence programs keep track of your habits, and other important information, and can even notify emergency personnel when necessary. Smart Home Fire Safety The security system in a smart home offers much more protection than the typical home fire alarm. The more elaborate automated system monitors all areas of the home, checking carbon monoxide levels as well as heat levels and other signs of fire. In the event of a fire, the smart home system can alert you, as well as notifying emergency services. AI programs are even able to pinpoint the location of the fire in the home, and provide that information to fire department personnel as they respond, for more efficient firefighting. Smart Home Security System Access Control Motion detectors, security codes, and security camera provide information to a home control system, allowing it to determine whether an approaching individual is a resident, a cleared visitor, or an intruder. Motion detectors trigger an alert, letting the system know that there is someone or something to be evaluated. Facial recognition software and security codes tell the system to allow residents into the home, while restricting access to other individuals based on pre-programmed information.

4. Challenges and Future Direction


30 | P a g e

Some of the challenges that Internet of Things has to face in the next years: Mobilise a critical mass of research and innovation effort for the creation of new products, processes and services. Develop a new definition of privacy for a changing world Protect the different building blocks of the IoT, considering how these blocks will work together and what kind of interoperable security mechanisms must be created, and to assure a certain level of security during the cooperation among IoT multiple actors, especially human beings, machines, and objects. Develop an ethics of the Internet of things by promoting an important dialogue between computer scientists and the broader public and by bridging the digital divide between those with access to technology and those without. Establishment of the necessary standards to ensure that objects can talk to objects; in the construction of smart public infrastructure; and in the introduction of toll roads and other forms of metering. Use the IoT to assert its civilisational values, those like the primacy of law and good governance that determine the general ethos of its society and shape the attitudes and outlook of its people. This is perhaps the most difficult challenge. The challenges are big and the road ahead is still long but what its clear is that that there are millions of opportunities to develop products and services connected to the Internet of things to make easier life for people around world.

4.1. Technological
Building on the potential benefits offered by the Internet of Things poses a number of challenges, not only due to the nature of the enabling technologies but also to the sheer scale of their deployment. Technological standardization in most areas is still in its infancy, or remains fragmented. Not surprisingly, managing and fostering rapid innovation is a challenge for governments and industry alike.

31 | P a g e

Standardization is essential for the mass deployment and diffusion of any technology. Nearly all commercially successful technologies have undergone some process of standardization to achieve mass market penetration. Todays internet and mobile phones would not have thrived without standards such as TCP/IP and IMT-2000. Successful standardization in RFID was initially achieved through the Auto-ID Center and now by EPC Global. However, efforts are under way in different forums (ETSI, ISO, etc...) and there have been calls for the increased involvement of ITU in the harmonization of RFID protocols. Wireless sensor networks have received a boost through the work of the ZigBee Alliance, among others. By contrast, standards in nanotechnology and robotics are far more fragmented, with a lack of common definitions and a wide variety of regulating bodies.

4.2. Privacy
One of the most important challenges in convincing users to adopt emerging technologies is the protection of data and privacy. Concerns over privacy and data protection are widespread, particularly as sensors and smart tags can track users movements, habits and ongoing preferences. When everyday items come equipped with some or all of the five senses (such as sight and smell) combined with computing and communication capabilities, concepts of data request and data consent risk become outdated. Invisible and constant data exchange between things and people, and between things and other things, will occur unknown to the owners and originators of such data. The sheer scale and capacity of the new technologies will magnify this problem. Who will ultimately control the data collected by all the eyes and ears embedded in the environment surrounding us?

32 | P a g e

4.3. Social
Public concerns and active campaigns by consumers have already hampered commercial trials of RFID by two well-known retailers. To promote a more widespread adoption of the technologies underlying the Internet of Things, principles of informed consent, data confidentiality and security must be safeguarded. Moreover, protecting privacy must not be limited to technical solutions, but encompass regulatory, market-based and socio-ethical considerations. Unless there are concerted efforts involving all government, civil society and private sector players to protect these values, the development of the Internet of Things will be hampered if not prevented. It is only through awareness of these technological advances, and the challenges they present, that we can seize the future benefits of a fair and user-centric Internet of Things.

References
33 | P a g e

www.itu.int/itu-t/techwatch Lucke, D, et. al. Smart factory - a step towards the next generation of manufacturing. In: Manufacturing Systems and Technologies for the New Frontier, Springer (2008). Kawsar F., et. al. Supporting Interaction with the Internet of Things across Objects, Time and Space. School of Computing and Communications, Lancaster University. Hammersmith group, NY. The Internet of Things: Networked objects and smart devices. Crimi J. C., Next Generation Networks, Telcordia Technologies Whitepaper http://media.ford.com/images/10031/Adaptive_Cruise.pdf http://www.businessworld.in/bw/2010_04_09_World_Of_Sensors.html?offset=1&max=1 http://www.businessworld.in/bw/2011_02_18_The_Next_Spurt.html http://m2m.orangeom.com/ http://www.itu.int/dms_pub/itu-s/opb/pol/S-POL-IR.IT-2005-SUM-PDF-E.pdf Hameed et. al., An RFID Based Consistency Management Framework for Production Monitoring In a Smart Real-Time Factory, IEEE, 2010 Kawsar et. al., Supporting Interaction with the Internet of Thing across Objects, Time and Space, IEEE, 2010 Kortuem et. al., Market-Based User Innovation in the Internet of Things http://www.itu.int/itunews/manager/display.asp? lang=en&year=2005&issue=09&ipage=things&ext=html http://ils.unc.edu/~cbarthol/inls187/Future%20Forecast/futureforecast.html http://www.rfidjournal.com/article/view/7268 http://www.rsa.com/rsalabs/node.asp?id=2117 http://www.readwriteweb.com/archives/rfid_state_of_the_market.php http://www.readwriteweb.com/archives/sensor_rfid_apps_of_the_future_part_1.php 34 | P a g e

http://www.readwriteweb.com/archives/cense_hp_labs.php http://www.itu.int/itunews/manager/display.asp? lang=en&year=2005&issue=09&ipage=things&ext=html www.appliedmaterials.com www.ef3solutions.com http://www.varismine.com ABS white paper www.wikipedia.org www.walmart.com http://en.wikipedia.org/wiki/Home_automation www.peaklma.com/documents/promo1word97.doc http://en.wikipedia.org/wiki/Energy_management_system http://en.wikipedia.org/wiki/Automated_planning_and_scheduling www.smarthealthip.com/ http://www.suite101.com/content/ai-enhances-the-smart-home-security-system-a136697 http://www.itu.int/dms_pub/itu-s/opb/pol/S-POL-IR.IT-2005-SUM-PDF-E.pdf http://wsm.ezsitedesigner.com/share/scrapbook/42/425698/Role_of_Remote_Sensing_in_Disaste r_Management.pdf http://wsm.ezsitedesigner.com/share/scrapbook/42/425698/Role_of_Remote_Sensing_in_Disaste r_Management.pdf http://arstechnica.com/old/content/2008/12/how-smart-does-the-grid-need-to-be.ars http://www.mssanz.org.au/modsim05/papers/weber.pdf http://en.wikipedia.org/wiki/Phasor_measurement_unit http://www.faqs.org/patents/app/20080231114 http://news.discovery.com/tech/self-healing-grid-more-like-a-splint.html 35 | P a g e

36 | P a g e

You might also like